Open Access
SHS Web Conf.
Volume 36, 2017
The 2016 4th International Conference on Governance and Accountability (2016 ICGA)
Article Number 00032
Number of page(s) 7
Published online 24 July 2017
  1. Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211. doi:10.1016/0749-5978(91)90020-t [CrossRef] [Google Scholar]
  2. Ajzen, I. (2002). Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior1. Journal of Applied Social Psychology, 32(4), 665–683. doi:10.1111/j.1559-1816.2002.tb00236.x [CrossRef] [Google Scholar]
  3. Chatterjee, S. (2008). Unethical behavior using information technology. (Ph.D. 3370378), Washington State University, United States – Washington. ABI/INFORM Complete; ProQuest Central; ProQuest Dissertations & Theses (PQDT) database. [Google Scholar]
  4. Chen, F. F., Sousa, K. H., & West, S. G. (2005). Teacher’s Corner: Testing Measurement Invariance of Second-Order Factor Models. Structural Equation Modeling: A Multidisciplinary Journal, 12(3), 471–492. doi:10.1207/s15328007sem1203_7 [CrossRef] [Google Scholar]
  5. Djajadikerta, H. G., Mat Roni, S., & Trireksani, T. (2015). Dysfunctional information system behaviors are not all created the same: Challenges to the generalizability of security-based research. Information & Management, 52(8), 1012–1024. doi: [CrossRef] [Google Scholar]
  6. Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. JMR, Journal of Marketing Research, 18(1), 39. [CrossRef] [Google Scholar]
  7. Greene, G., & D’Arcy, J. P. (2010, 16-17 June 2010). Assessing the impact of security culture and the employee-organisation relationship on IS security compliance. Paper presented at the 5th Annual Symposium on Information Assurance 2010, New York. [Google Scholar]
  8. Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis (7 ed.). Upper Saddle River, NJ, USA: Prentice-Hall, Inc. [Google Scholar]
  9. Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis (6 ed.). New Jersey: Pearson Prentice Hall. [Google Scholar]
  10. Kline, R. B. (2010). Principles and Practice of Structural Equation Modeling, Third Edition (3 ed.). New York: Guilford Publications. [Google Scholar]
  11. Schumacker, R. E., & Lomax, R. G. (2012). A Beginner’s Guide to Structural Equation Modeling: Third Edition (3 ed.). Hoboken: Taylor and Francis. [Google Scholar]
  12. Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: Toward a conceptual model of utilization. MIS Quarterly, 15(1), 125–143. [Google Scholar]
  13. Urbach, N., & Ahlemann, F. (2010). Structural Equation Modeling in Information Systems Research Using Partial Least Squares. Journal of Information Technology Theory and Application, 11(2), 5–40. [Google Scholar]
  14. Venkatesh, V., Morris, M. G., Gordon, B. D., & Davis, F. D. (2003). User Acceptance of Information Technology: Toward a Unified View. MIS Quarterly, 27(3), 425–478. [Google Scholar]
  15. Wold, H. (1985). Partial least square. In S. Kotz & N. L. Johnson (Eds.), Encyclopedia of statistical sciences (Vol. 6, pp. 581–591). New York: Wiley. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.