Motivating information system engineers’ acceptance of Privacy by Design in China: An extended UTAUT model
Author
Abstract
Suggested Citation
DOI: 10.1016/j.ijinfomgt.2021.102358
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Lai-Ying Leong & Teck-Soon Hew & Keng-Boon Ooi & Bhimaraya Metri & Yogesh K. Dwivedi, 2023. "Extending the Theory of Planned Behavior in the Social Commerce Context: A Meta-Analytic SEM (MASEM) Approach," Information Systems Frontiers, Springer, vol. 25(5), pages 1847-1879, October.
- Lavaei Adaryani, Rasool & Palouj, Mojtaba & Karbasioun, Mostafa & Asadi, Ali & Gholami, Hesamedin & Kianirad, Ali & Joodi Damirchi, Milad, 2024. "Antecedents of blockchain adoption in the poultry supply chain: An extended UTAUT model," Technological Forecasting and Social Change, Elsevier, vol. 202(C).
- Berrin Arzu Eren, 2024. "Antecedents of robo-advisor use intention in private pension investments: an emerging market country example," Journal of Financial Services Marketing, Palgrave Macmillan, vol. 29(3), pages 683-698, September.
- Balakrishnan, Janarthanan & Abed, Salma S. & Jones, Paul, 2022. "The role of meta-UTAUT factors, perceived anthropomorphism, perceived intelligence, and social self-efficacy in chatbot-based services?," Technological Forecasting and Social Change, Elsevier, vol. 180(C).
- Ivo Benke & Michael Knierim & Marc Adam & Michael Beigl & Verena Dorner & Ulrich Ebner-Priemer & Manfred Herrmann & Martin Klarmann & Alexander Maedche & Julia Nafziger & Petra Nieken & Jella Pfeiffer, 2024. "Hybrid Adaptive Systems," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 66(2), pages 233-247, April.
More about this item
Keywords
Privacy by Design; Privacy information protection; Information system security; Technology acceptance; Unified theory of acceptance and use of technology model;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ininma:v:60:y:2021:i:c:s0268401221000517. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-information-management .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.