Motivating information system engineers’ acceptance of Privacy by Design in China: An extended UTAUT model
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Motivating information system engineers’ acceptance of Privacy by Design in China: An extended UTAUT model
Authors
Keywords
Privacy by Design, Privacy information protection, Information system security, Technology acceptance, Unified theory of acceptance and use of technology model
Journal
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT
Volume 60, Issue -, Pages 102358
Publisher
Elsevier BV
Online
2021-04-28
DOI
10.1016/j.ijinfomgt.2021.102358
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Acceptance of autonomous delivery vehicles for last-mile delivery in Germany – Extending UTAUT2 with risk perceptions
- (2020) Sebastian Kapser et al. TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES
- Is Privacy Regulation Slowing Down Research on Pervasive Computing?
- (2020) Claudio Bettini et al. COMPUTER
- Inside the Organization: Why Privacy and Security Engineering Is a Challenge for Engineers[40pt]
- (2018) Sarah Spiekermann et al. PROCEEDINGS OF THE IEEE
- The use and acceptance of ICT by senior citizens: a comparison of technology acceptance model (TAM) for elderly and young adults
- (2018) Hacer Guner et al. Universal Access in the Information Society
- Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model
- (2017) Yogesh K. Dwivedi et al. INFORMATION SYSTEMS FRONTIERS
- Minimizing Method Bias through Programmatic Research
- (2017) Burton-Jones MIS QUARTERLY
- Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- (2017) Bulgurcu et al. MIS QUARTERLY
- Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
- (2016) Viswanath Venkatesh et al. Journal of the Association for Information Systems
- Going beyond intention: Integrating behavioral expectation into the unified theory of acceptance and use of technology
- (2016) Likoebe M. Maruping et al. Journal of the Association for Information Science and Technology
- Citizens’ adoption of an electronic government system: towards a unified view
- (2015) Nripendra P. Rana et al. INFORMATION SYSTEMS FRONTIERS
- Predicting the use of online information services based on a modified UTAUT model
- (2013) Jong-Chul Oh et al. BEHAVIOUR & INFORMATION TECHNOLOGY
- Determinants of end-user acceptance of biometrics: Integrating the “Big 3” of technology acceptance with privacy context
- (2013) Caroline Lancelot Miltgen et al. DECISION SUPPORT SYSTEMS
- Privacy by Design [Leading Edge]
- (2013) Ann Cavoukian IEEE TECHNOLOGY AND SOCIETY MAGAZINE
- The challenges of privacy by design
- (2012) Sarah Spiekermann COMMUNICATIONS OF THE ACM
- Goodness-of-fit indices for partial least squares path modeling
- (2012) Jörg Henseler et al. COMPUTATIONAL STATISTICS
- Generalising user behaviour in online travel sites through the Travel 2.0 website acceptance model
- (2012) Francisco Muñoz‐Leiva et al. ONLINE INFORMATION REVIEW
Become a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get StartedAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started