{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:44:15Z","timestamp":1743039855406,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642369803"},{"type":"electronic","value":"9783642369810"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36981-0_102","type":"book-chapter","created":{"date-parts":[[2013,3,5]],"date-time":"2013-03-05T11:53:39Z","timestamp":1362484419000},"page":"1075-1085","source":"Crossref","is-referenced-by-count":1,"title":["Perceived Site Security as a Second Order Construct and Its Relationship to e-Commerce Site Usage"],"prefix":"10.1007","author":[{"given":"Edward","family":"Hartono","sequence":"first","affiliation":[]},{"given":"Ki-Yoon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Kwan-Sik","family":"Na","sequence":"additional","affiliation":[]},{"given":"James T.","family":"Simpson","sequence":"additional","affiliation":[]},{"given":"David","family":"Berkowitz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"102_CR1","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1080\/02642060600850873","volume":"26","author":"L.M. Alzola","year":"2006","unstructured":"Alzola, L.M., Robaina, V.P.: Quality in electronic commerce B2C: Perceptions, expectations and importance. Service Industries Journal\u00a026, 671\u2013687 (2006)","journal-title":"Service Industries Journal"},{"key":"102_CR2","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1108\/01443570710775801","volume":"27","author":"K. Amoako-Gyampah","year":"2007","unstructured":"Amoako-Gyampah, K., Meredith, J.R.: Examining cumulative capabilities in a developing economy. International Journal of Operations & Production Management\u00a027, 928\u2013950 (2007)","journal-title":"International Journal of Operations & Production Management"},{"key":"102_CR3","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1037\/0033-2909.103.3.411","volume":"103","author":"J.C. Anderson","year":"1988","unstructured":"Anderson, J.C., Gerbing, D.W.: Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin\u00a0103, 411\u2013423 (1988)","journal-title":"Psychological Bulletin"},{"key":"102_CR4","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1037\/0033-2909.88.3.588","volume":"88","author":"P.M. Bentler","year":"1980","unstructured":"Bentler, P.M., Bonnet, D.G.: Significance tests and goodness of fit in the analysis of covariance structures. Psychological Bulletin\u00a088, 588\u2013606 (1980)","journal-title":"Psychological Bulletin"},{"key":"102_CR5","doi-asserted-by":"publisher","first-page":"1558","DOI":"10.1016\/j.dss.2006.01.002","volume":"42","author":"T.C.E. Cheng","year":"2006","unstructured":"Cheng, T.C.E., Lam, D.Y.C., Yeung, A.C.L.: Adoption of Internet banking: An empirical study in Hong Kong. Decision Support Systems\u00a042, 1558\u20131572 (2006)","journal-title":"Decision Support Systems"},{"key":"102_CR6","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1002\/asi.20312","volume":"57","author":"C.M.K. Cheung","year":"2006","unstructured":"Cheung, C.M.K., Lee, M.K.O.: Understanding consumer trust in Internet shopping: A multidisciplinary approach. Journal of American Society for Information Science and Technology\u00a057, 479\u2013492 (2006)","journal-title":"Journal of American Society for Information Science and Technology"},{"key":"102_CR7","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","volume":"35","author":"F.D. Davis","year":"1989","unstructured":"Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User acceptance of computer technology: A comparison of two theoretical models. Management Science\u00a035, 982\u20131003 (1989)","journal-title":"Management Science"},{"key":"102_CR8","doi-asserted-by":"crossref","first-page":"123","DOI":"10.2753\/MIS0742-1222220305","volume":"22","author":"X. Fang","year":"2005","unstructured":"Fang, X., Chan, S., Brzezinski, J., Xu, S.: Moderating effects of task type on wireless technology acceptance. Journal of Management Information Systems\u00a022, 123\u2013157 (2005-2006)","journal-title":"Journal of Management Information Systems"},{"key":"102_CR9","volume-title":"Belief, attitude, intention, and behavior","author":"M. Fishbein","year":"1975","unstructured":"Fishbein, M., Ajzen, I.: Belief, attitude, intention, and behavior. Addison-Wesley, Reading (1975)"},{"key":"102_CR10","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2307\/3151312","volume":"18","author":"C. Fornell","year":"1981","unstructured":"Fornell, C., Larcker, D.: Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research\u00a018, 39\u201350 (1981)","journal-title":"Journal of Marketing Research"},{"key":"102_CR11","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"D. Gefen","year":"2003","unstructured":"Gefen, D., Karahanna, E., Straub, D.W.: Trust and TAM in online shopping: An integrated model. MIS Quarterly\u00a027, 51\u201390 (2003)","journal-title":"MIS Quarterly"},{"key":"102_CR12","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1037\/1082-989X.3.4.424","volume":"3","author":"L.T. Hu","year":"1998","unstructured":"Hu, L.T., Bentler, P.M.: Fit indices in covariance structure modeling: Sensitivity to underparameterization model misspecification. Psychological Methods\u00a03, 424\u2013453 (1998)","journal-title":"Psychological Methods"},{"key":"102_CR13","volume-title":"Causal analysis: Assumptions, models and data","author":"L.R. James","year":"1982","unstructured":"James, L.R., Stanley, A., Mulaik, S.A., Jeanne, J.M.: Causal analysis: Assumptions, models and data. Sage, Beverly Hills (1982)"},{"key":"102_CR14","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.im.2003.07.002","volume":"41","author":"S. Kim","year":"2004","unstructured":"Kim, S., Stoel, L.: Dimensional hierarchy of retail Website quality. Information & Management\u00a041, 619\u2013633 (2004)","journal-title":"Information & Management"},{"key":"102_CR15","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.chb.2007.01.002","volume":"24","author":"J.W. Lian","year":"2008","unstructured":"Lian, J.W., Lin, T.M.: Effects of consumer characteristics on their acceptance of online shopping: Comparisons among different product types. Computers in Human Behavior\u00a024, 48\u201365 (2008)","journal-title":"Computers in Human Behavior"},{"key":"102_CR16","unstructured":"Liao, Z., Cheung, M.T.: Service quality in Internet e-banking: A user-based core framework, e-Technology, e-Commerce and e-Service. In: IEEE International Conference on e-Technology, e-Commerce, and e-Service (EEE 2005), Hong Kong, pp. 628\u2013631 (2005)"},{"key":"102_CR17","unstructured":"Liao, Z., Wong, W.K.: The determinants of customer interactions with Internet-enabled e-banking services, working paper no. 0701. Department of Economics, National University of Singapore (2007)"},{"key":"102_CR18","doi-asserted-by":"crossref","first-page":"105","DOI":"10.2307\/25148783","volume":"31","author":"P. Pavlou","year":"2007","unstructured":"Pavlou, P., Liang, H., Xue, Y.: Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly\u00a031, 105\u2013136 (2007)","journal-title":"MIS Quarterly"},{"key":"102_CR19","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1509\/jmkg.72.1.27","volume":"72","author":"G. Ramani","year":"2008","unstructured":"Ramani, G., Kumar, V.: Interaction orientation and firm performance. Journal of Marketing\u00a072, 27\u201345 (2008)","journal-title":"Journal of Marketing"},{"key":"102_CR20","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1207\/s15327906mbr2301_3","volume":"23","author":"D. Rindskopf","year":"1988","unstructured":"Rindskopf, D., Rose, T.: Some theory and applications of confirmatory second-order factor analysis. Multivariate Behavioral Research\u00a023, 51\u201367 (1988)","journal-title":"Multivariate Behavioral Research"},{"key":"102_CR21","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1108\/02635570110390071","volume":"101","author":"W.D. Salisbury","year":"2001","unstructured":"Salisbury, W.D., Pearson, R.A., Pearson, A.W., Miller, D.W.: Perceived security and World Wide Web purchase intention. Industrial Management & Data Systems\u00a0101, 165\u2013176 (2001)","journal-title":"Industrial Management & Data Systems"},{"key":"102_CR22","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/1216218.1216224","volume":"38","author":"M.T. Siponen","year":"2007","unstructured":"Siponen, M.T., Oinas-Kukkonen, H.: A review of information security issues and respective research contributions. The DATABASE for Advances in Information Systems\u00a038, 60\u201380 (2007)","journal-title":"The DATABASE for Advances in Information Systems"},{"key":"102_CR23","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.elerap.2009.04.014","volume":"9","author":"W. Tao","year":"2010","unstructured":"Tao, W., Kim, C., Kim, K.S., Shin, N.: An empirical study of customers\u2019 perceptions of security and trust in e-payment systems. Electronic Commerce Research and Applications\u00a09, 84\u201395 (2010)","journal-title":"Electronic Commerce Research and Applications"},{"key":"102_CR24","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.cose.2004.11.001","volume":"24","author":"T. Tsiakis","year":"2005","unstructured":"Tsiakis, T., Sthephanides, G.: The concept of security and trust in electronic payments. Computers & Security\u00a024, 10\u201315 (2005)","journal-title":"Computers & Security"},{"key":"102_CR25","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.im.2008.03.005","volume":"45","author":"B. Vatanasombut","year":"2008","unstructured":"Vatanasombut, B., Igbaria, M., Stylianou, A.C., Rodgers, W.: Information systems continuance intention of web-based applications customers: The case of online banking. Information & Management\u00a045, 419\u2013428 (2008)","journal-title":"Information & Management"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36981-0_102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T11:00:55Z","timestamp":1676804455000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-36981-0_102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642369803","9783642369810"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36981-0_102","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}