Network externalities and the perception of innovation characteristics: mobile banking
Tóm tắt
Từ khóa
Tài liệu tham khảo
Agarwal, R. and Prasad, J. (1997), “The role of innovation characteristics and perceived voluntariness in the acceptance of information technologies”, Decision Sciences , Vol. 28 No. 3, pp. 557-582.
Ahmad, J.I. (2011), “Technophobia phenomenon in higher educational institution: a case study”, Humanities, Science and Engineering (CHUSER), 2011 IEEE Colloquium, IEEE Conference Publications, Penang, pp. 111-116.
Anderson, J.C. and Gerbing, D.W. (1988), “Structural equation modeling in practice: a review and recommended two-step approach”, Psychological Bulletin , Vol. 103 No. 3, pp. 411-423.
Bagozzi, R.P. and Yi, Y. (1988), “On the evaluation of structural equation models”, Journal of the Academy of Marketing Science , Vol. 16 No. 1, pp. 74-94.
Baron, R.M. and Kenny, D.A. (1986), “The moderator-mediator variable distinction in social psychological research: strategic, and statistical consideration”, Journal of Personality and Social Psychology , Vol. 51 No. 6, pp. 1173-1182.
BNM (2014), “Financial stability and payment systems report 2013”, Bank Negara Malaysia, Kuala Lumpur.
Brynjolfsson, E. and Kemerer, C.F. (1996), “Network externalities in micro-computer software: an econometric analysis of the spreadsheet market”, Management Science , Vol. 42 No. 12, pp. 1627-1648.
Cheong, J. and Park, M. (2005), “Mobile internet acceptance in Korea”, Internet Research , Vol. 15 No. 2, pp. 125-140.
Chou, C. and Shy, O. (1990), “Network effects without network externalities”, International Journal of Industrial Organization , Vol. 8, pp. 259-270.
CNNIC (2011), “27th statistical survey report on the internet development in China”, China Internet Network Information Center, China.
Compeau, D.H. and Huff, S. (1999), “Social cognitive theory and individual reactions to computing technology: a longitudinal study”, MIS Quarterly , Vol. 23 No. 2, pp. 145-158.
Dew, N. and Read, S. (2007), “The move we get together: coordinating network externality product introduction in the RFID industry”, Technovation , Vol. 27, pp. 569-581.
Dickerson, M. and Gentry, J. (1983), “Characteristics of adopters and non-adopters of home computers”, Journal of Comsumer Research , Vol. 10 No. 2, pp. 225-235.
Fagan, M. , Neill, S. and Wooldridge, B. (2003-2004), “An empirical investigation into the relationship between computer self-efficacy, anxiety, experience, support and usage”, Journal of Computer Information Systems , Vol. 44 No. 2, pp. 95-104.
Farrell, J. and Saloner, G. (1985), “Standardization, compatibility, and innovation”, RAND Journal of Economics , Vol. 16 No. 1, pp. 70-83.
Fornell, C. and Larcker, D. (1981), “Evaluating structural equation models with unobservable variables and measurement error”, Journal of Marketing Research , Vol. 18 No. 1, pp. 39-50.
Gaski, J. and Nevin, J. (1985), “The differential effects of exercised and unexercised power sources in a marketing channel”, Journal of Marketing Research , Vol. 22 No. 2, pp. 130-142.
Gu, J. , Lee, S. and Suh, Y. (2009), “Determinants of behavioral intention to mobile banking”, Expert Systems with Applications , Vol. 36 No. 9, pp. 11605-11616.
Hair, J.F. , Black, W.C. , Babin, B. and Anderson, R.E. (2010), Multivariate Data Analysis , Pearson Prentice Hall, New York, NY.
Hernández-Ortega, B. , Jiménez-Martınez, J. and Martín-DeHoyos, M.J. (2008), “Differences between potential, new and experienced e-customers: analysis of e-purchasing behaviour”, Internet Research , Vol. 18 No. 3, pp. 248-265.
Ho, S.H. and Ko, Y.Y. (2008), “Effects of self-service technology on customer value and customer readiness: the case of internet banking”, Internet Research , Vol. 18 No. 4, pp. 427-446.
Hu, L. and Bentler, P. (1999), “Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives”, Structural Equation Modeling , Vol. 6 No. 1, pp. 1-55.
Igbaria, M. and Iivari, J. (1995), “The effects of self-efficacy on computer usage”, Omega, International Journal of Management Science , Vol. 23 No. 6, pp. 587-605.
Jay, T. (1981), “Computerphobia: what to do about it”, Educational Technology , Vol. 21 No. 1, pp. 47-48.
Katz, M. and Shapiro, C. (1985), “Network externalities, competition, and compatibility”, American Economic Review , Vol. 75 No. 3, pp. 424-440.
Katz, M. and Shapiro, C. (1986), “Technology adoption in the presence of network externalities”, The Journal of Political Economy , Vol. 94 No. 4, pp. 822-841.
Kauffman, R.J. , McAndrews, J. and Wang, Y.M. (2000), “Opening the black box of network externalities in network adoption”, Information Systems Research , Vol. 11 No. 1, pp. 61-82.
Kim, G. , Shin, B. and Lee, H. (2009), “Understanding dynamics between initial trust and usage intentions of mobile banking”, Information Systems Journal , Vol. 19 No. 3, pp. 283-311.
Kim, J. and Forsythe, S. (2008), “Sensory enabling technology acceptance model (SE-TAM): a multiple-group structural model comparison”, Psychology & Marketing , Vol. 25 No. 9, pp. 901-922.
Kline, R.B. (2005), Principles and Practice of Structural Equation Modeling , 2nd ed., The Guilford Press, New York, NY.
Laukkanen, T. and Lauronen, J. (2005), “Consumer value creation in mobile banking services”, International Journal of Mobile Communications , Vol. 3 No. 4, pp. 325-338.
Lee, Y.C. (2006), “An empirical investigation into factors influencing the adoption of an e-learning system”, Online Information Review , Vol. 30 No. 5, pp. 517-541.
Leibenstein, H. (1950), “Bandwagon, Snob, and Veblen effects in the theory of consumers’ demand”, The Quarterly Journal of Economics , Vol. 64 No. 2, pp. 183-207.
Lewis, N.K. , Palmer, A. and Moll, A. (2010), “Predicting young consumers’ taken up of mobile banking services”, International Journal of Bank Marketing , Vol. 28 No. 5, pp. 410-432.
Liebowitz, S. and Margolis, S.E. (1994), “Network externality: an uncommon tragedy”, The Journal of Economic Perspectives , Vol. 8 No. 2, pp. 133-150.
Lu, H. and Su, P.Y. (2009), “Factors affecting purchase intention on mobile shopping web sites”, Internet Research , Vol. 19 No. 4, pp. 442-458.
Luarn, P. and Lin, H.H. (2005), “Toward an understanding of the behavioral intention to use mobile banking”, Computers in Human Behavior , Vol. 21 No. 6, pp. 873-891.
McFarland, D. and Hamilton, D. (2006), “Adding contextual specificity to the technology acceptance model”, Computers in Human Behavior , Vol. 22 No. 3, pp. 427-447.
Malaysian Communications and Multimedia Commission (2009), Statistical Brief No.9, Hand Phone Users Survey , Malaysian Communications and Multimedia Commission, Selangor, available at: www.skmm.gov.my
Meuter, M. , Ostrom, A. , Bitner, M. and Roundtree, R. (2003), “The influence of technology anxiety on consumer use and experiences with self-service technologies”, Journal of Business Research , Vol. 56 No. 11, pp. 899-906.
Moon, J. and Kim, Y. (2001), “Extending the TAM for a world-wide-web context”, Information and Management , Vol. 38 No. 4, pp. 217-230.
Moore, G.C. and Benbasat, I. (1991), “Development of an instrument to measure the perceptions of adopting an information technology innovation”, Information Systems Research , Vol. 2 No. 3, pp. 192-221.
Ooi, K.B. , Sim, J.J. , Yew, K.T. and Lin, B. (2011), “Exploring factors influencing consumers’ behavioral intention to adopt broadband in Malaysia”, Computers in Human Behavior , Vol. 27 No. 3, pp. 1168-1178.
Padmanabhan, V. , Rajiv, S. and Srinivasan, K. (1997), “New products, upgrades, and new releases: a rationale for sequential product introduction”, Journal of Marketing Research , Vol. 34 No. 4, pp. 456-472.
Parthasarathy, M. and Bhattacherjee, A. (1998), “Understanding post-adoption behavior in the context of online services”, Information Systems Research , Vol. 9 No. 4, pp. 362-379.
Persaud, A. and Azhar, I. (2012), “Innovative mobile marketing via smartphones. Are consumers ready?”, Marketing Intelligence and Planning , Vol. 30 No. 4, pp. 418-443.
Plouffe, C. , Hulland, J. and Vandenbosch, M. (2001), “Research report: richness vs parsimony in modeling technology adoption decisions – understanding merchant adoption of a smart card-based payment system”, Information Systems Research , Vol. 12 No. 2, pp. 208-222.
Podsakoff, P. , MacKenzie, S. , Lee, J.Y. and Podsakoff, N. (2003), “Common method biases in behavioral research: a critical review of the literature and recommended remedies”, Journal of Applied Psychology , Vol. 88 No. 5, pp. 879-903.
Redmond, W.H. (1991), “When technologies compete: the role of externalities in nonlinear market response”, Journal of Product Innovation Management , Vol. 8 No. 3, pp. 170-183.
Rogers, E. (1995), Diffusion of Innovations , The Free Press, New York, NY.
Rogers, E. (2003), Diffusion of Innovations , 5th ed., Free Press, New York, NY.
Schilling, M.A. (2002), “Technology success and failure in winner-take-all markets: the impact of learning orientation, timing, and network externalities”, The Academy of Management Journal , Vol. 45 No. 2, pp. 387-398.
Shurmer, M. (1993), “An investigation into sources of network externalities in the packaged PC software market”, Information Economics and Policy , Vol. 5 No. 3, pp. 231-251.
Siau, K. , Sheng, H. , Nah, F. and Davis, S. (2004), “A qualitative investigation on consumer trust in mobile commerce”, International Journal of Electronic Business , Vol. 2 No. 3, pp. 283-300.
Smallwood, D. and Conlisk, J. (1979), “Product quality in markets where consumers are imperfectly informed”, Quarterly Journal of Economics , Vol. 93 No. 1, pp. 1-23.
Song, M. , Parry, M. and Kawakami, T. (2009), “Incorporating network externalities into the technology acceptance model”, Journal of Product Innovation Management , Vol. 26 No. 3, pp. 291-307.
Steenkamp, J.B. and Baumgartner, H. (1998), “Assessing measurement invariance in cross-national consumer research”, Journal of Consumer Research , Vol. 25 No. 1, pp. 78-90.
Strader, T. , Ramaswami, S. and Houle, P. (2007), “Perceived network externalities and communication technology acceptance”, European Journal of Information Systems , Vol. 16 No. 1, pp. 54-65.
Straub, D.W. (1989), “Validating instruments in MIS research”, MIS Quarterly , Vol. 13 No. 2, pp. 147-169.
Tornatzky, L. and Klein, R. (1982), “Innovation characteristics and innovation adoption-implementation: a meta-analysis of findings”, IEEE Transactions on Engineering Management , Vol. EM-29 No. 1, pp. 28-45.
Van Slyke, C. , Belanger, F. and Comunale, C. (2004), “Factors influencing the adoption of web-based shopping: the impact of trust”, Database for Advances in Information Systems , Vol. 35 No. 2, pp. 32-49.
Van Slyke, C. , Ilie, V. , Lou, H. and Stafford, T. (2007), “Perceived critical mass and the adoption of a communication technology”, European Journal of Information Systems , Vol. 16 No. 3, pp. 270-283.
Venkatesh, V. and Bala, H. (2008), “Technology acceptance model 3 and a research agenda on interventions”, Decision Sciences , Vol. 39 No. 2, pp. 273-315.
Venkatesh, V. , Morris, M.G. , Davis, G.B. and Davis, F.D. (2003), “User acceptance of information technology: toward a unified view”, MIS Quarterly , Vol. 27 No. 3, pp. 425-478.
Wang, C. , Lo, S. and Fang, W. (2008), “Extending the technology acceptance model to mobile telecommunication innovation: the existence of network externalities”, Journal of Consumer Behavior , Vol. 7 No. 2, pp. 101-110.