{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:01:23Z","timestamp":1760061683624},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,4,13]],"date-time":"2011-04-13T00:00:00Z","timestamp":1302652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Educ Inf Technol"],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1007\/s10639-011-9160-1","type":"journal-article","created":{"date-parts":[[2011,4,12]],"date-time":"2011-04-12T09:44:26Z","timestamp":1302601466000},"page":"315-330","source":"Crossref","is-referenced-by-count":12,"title":["An examination of gender differences among college students in their usage perceptions of the internet"],"prefix":"10.1007","volume":"17","author":[{"given":"Tao","family":"Hu","sequence":"first","affiliation":[]},{"given":"Xihui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,4,13]]},"reference":[{"issue":"2","key":"9160_CR1","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/S1047-8310(02)00049-4","volume":"13","author":"JB Arbaugh","year":"2002","unstructured":"Arbaugh, J. B. (2002). Managing the online classroom: a study of technological and behavioral characteristics of Web-based MBA courses. Journal of High Technology Management Research, 13(2), 203\u2013223.","journal-title":"Journal of High Technology Management Research"},{"issue":"1","key":"9160_CR2","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/BF02723327","volume":"16","author":"RP Bagozzi","year":"1988","unstructured":"Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Science, 16(1), 74\u201394.","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"2","key":"9160_CR3","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1037\/0033-295X.84.2.191","volume":"84","author":"A Bandura","year":"1977","unstructured":"Bandura, A. (1977). Self-efficacy: toward a unifying theory of behavioral change. Psychological Review, 84(2), 191\u2013215.","journal-title":"Psychological Review"},{"key":"9160_CR4","volume-title":"Social foundations of thought and action","author":"A Bandura","year":"1986","unstructured":"Bandura, A. (1986). Social foundations of thought and action. Englewood Cliffs: Prentice Hall."},{"issue":"3","key":"9160_CR5","doi-asserted-by":"crossref","first-page":"351","DOI":"10.2307\/3250921","volume":"25","author":"A Bhattacherjee","year":"2001","unstructured":"Bhattacherjee, A. (2001). Understanding information systems continuance: an expectation-confirmation model. MIS Quarterly, 25(3), 351\u2013370.","journal-title":"MIS Quarterly"},{"issue":"3","key":"9160_CR6","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1016\/S0022-4359(01)00056-2","volume":"77","author":"TL Childers","year":"2001","unstructured":"Childers, T. L., Carr, C. L., Peck, J., & Carson, S. (2001). Hedonic and utilitarian motivations for online retail shopping behavior. Journal of Retailing, 77(4), 511\u2013535.","journal-title":"Journal of Retailing"},{"key":"9160_CR7","first-page":"295","volume-title":"Modern methods for business research","author":"W Chin","year":"1998","unstructured":"Chin, W. (1998). The partial least squares approach to structural equation modeling. In G. Marcoulides (Ed.), Modern methods for business research (pp. 295\u2013336). Mahwah: Lawrence Erlbaum Associate."},{"issue":"2","key":"9160_CR8","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1287\/isre.14.2.189.16018","volume":"14","author":"W Chin","year":"2003","unstructured":"Chin, W., Marcolin, B., & Newsted, P. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and electronic-mail emotion\/adoption study. Information Systems Research, 14(2), 189\u2013217.","journal-title":"Information Systems Research"},{"issue":"2","key":"9160_CR9","doi-asserted-by":"crossref","first-page":"189","DOI":"10.2307\/249688","volume":"19","author":"DR Compeau","year":"1995","unstructured":"Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: development of a measure and initial test. MIS Quarterly, 19(2), 189\u2013211.","journal-title":"MIS Quarterly"},{"issue":"3","key":"9160_CR10","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319\u2013340.","journal-title":"MIS Quarterly"},{"issue":"8","key":"9160_CR11","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","volume":"35","author":"FD Davis","year":"1989","unstructured":"Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management Science, 35(8), 982\u20131003.","journal-title":"Management Science"},{"issue":"5","key":"9160_CR12","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1080\/01972240490507974","volume":"20","author":"MJ Eppler","year":"2004","unstructured":"Eppler, M. J., & Mengis, J. (2004). The concept of information overload: a review of literature from organization science, accounting, marketing, MIS, and related disciplines. The Information Society, 20(5), 325\u2013344.","journal-title":"The Information Society"},{"issue":"1","key":"9160_CR13","doi-asserted-by":"crossref","first-page":"39","DOI":"10.2307\/3151312","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell, C., & Larcker, V. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39\u201350.","journal-title":"Journal of Marketing Research"},{"key":"9160_CR14","volume-title":"Multivariate data analysis","author":"J Hair Jr","year":"2005","unstructured":"Hair, J., Jr., Black, W., Babin, B., Anderson, R., & Tatham, R. (2005). Multivariate data analysis (6th ed.). Upper Saddle River: Prentice Hall.","edition":"6"},{"issue":"2","key":"9160_CR15","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1111\/j.1540-6237.2006.00389.x","volume":"87","author":"E Hargittai","year":"2006","unstructured":"Hargittai, E., & Shafer, S. (2006). Differences in actual and perceived online skills: the role of gender. Social Science Quarterly, 87(2), 432\u2013448.","journal-title":"Social Science Quarterly"},{"issue":"6","key":"9160_CR16","first-page":"1","volume":"6","author":"BA Kaifi","year":"2009","unstructured":"Kaifi, B. A., Mujtaba, B. G., & Williams, A. A. (2009). Online college education for computer-savvy students: a study of perceptions and needs. Journal of College Teaching and Learning, 6(6), 1\u201316.","journal-title":"Journal of College Teaching and Learning"},{"issue":"2","key":"9160_CR17","doi-asserted-by":"crossref","first-page":"183","DOI":"10.2307\/249751","volume":"23","author":"E Karahanna","year":"1999","unstructured":"Karahanna, E., Straub, D. W., & Chervany, N. L. (1999). Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Quarterly, 23(2), 183\u2013213.","journal-title":"MIS Quarterly"},{"issue":"2","key":"9160_CR18","doi-asserted-by":"crossref","first-page":"129","DOI":"10.2307\/249798","volume":"17","author":"L Kraemer","year":"1993","unstructured":"Kraemer, K. L., Danziger, J. N., Dunkle, D. E., & King, J. L. (1993). The usefulness of computer-based information to public managers. MIS Quarterly, 17(2), 129\u2013148.","journal-title":"MIS Quarterly"},{"key":"9160_CR19","unstructured":"Lenhart, A. (2009, January 14). Pew Internet project data memo. Retrieved from http:\/\/www.pewinternet.org\/~\/media\/\/Files\/Reports\/2009\/PIP_Adult_social_networking_data_memo_FINAL.pdf.pdf"},{"issue":"2","key":"9160_CR20","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.compedu.2005.01.007","volume":"48","author":"N Li","year":"2007","unstructured":"Li, N., & Kirkup, G. (2007). Gender and cultural differences in Internet use: a study of China and the UK. Computers & Education, 48(2), 301\u2013317.","journal-title":"Computers & Education"},{"issue":"4","key":"9160_CR21","doi-asserted-by":"crossref","first-page":"705","DOI":"10.2307\/25148817","volume":"31","author":"M Limayem","year":"2007","unstructured":"Limayem, M., Hirt, S. G., & Cheung, C. M. K. (2007). How habit limits the predictive power of intention: the case of information systems continuance. MIS Quarterly, 31(4), 705\u2013737.","journal-title":"MIS Quarterly"},{"issue":"1","key":"9160_CR22","doi-asserted-by":"crossref","first-page":"38","DOI":"10.4018\/joeuc.2005010103","volume":"17","author":"Q Ma","year":"2005","unstructured":"Ma, Q., & Liu, L. (2005). The role of Internet self-efficacy in the acceptance of Web-based electronic medical records. Journal of Organizational and End User Computing, 17(1), 38\u201357.","journal-title":"Journal of Organizational and User Computing"},{"issue":"1","key":"9160_CR23","doi-asserted-by":"crossref","first-page":"16","DOI":"10.17705\/1jais.00112","volume":"8","author":"GM Marakas","year":"2007","unstructured":"Marakas, G. M., Johnson, R. D., & Clay, P. F. (2007). The evolving nature of the computer self-efficacy construct: an empirical investigation of measurement construction, validity, reliability and stability over time. Journal of the Association for Information Systems, 8(1), 16\u201346.","journal-title":"Journal of the Association for Information Systems"},{"key":"9160_CR24","volume-title":"Psychometric theory","author":"J Nunnally","year":"1994","unstructured":"Nunnally, J., & Bernstein, I. (1994). Psychometric theory. New York: McGraw Hill."},{"issue":"1","key":"9160_CR25","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1111\/1540-6237.t01-1-8401007","volume":"84","author":"H Ono","year":"2003","unstructured":"Ono, H., & Zavodny, M. (2003). Gender and the internet. Social Science Quarterly, 84(1), 111\u2013121.","journal-title":"Social Science Quarterly"},{"issue":"2","key":"9160_CR26","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1287\/orsc.3.3.398","volume":"3","author":"WJ Orlikowski","year":"1992","unstructured":"Orlikowski, W. J. (1992). The duality of technology: rethinking the concept of technology in organizations. Organization Science, 3(2), 398\u2013427.","journal-title":"Organization Science"},{"issue":"3","key":"9160_CR27","first-page":"125","volume":"74","author":"S Qureshi","year":"1995","unstructured":"Qureshi, S., & Hoppel, C. (1995). Ruling the net. Harvard Business Review, 74(3), 125\u2013133.","journal-title":"Harvard Business Review"},{"issue":"3","key":"9160_CR28","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1108\/10650740810886349","volume":"25","author":"SM Rekabdarkolaei","year":"2008","unstructured":"Rekabdarkolaei, S. M., & Amuei, F. (2008). Evaluation of ICT literacy differences in trainee student teachers from the view of sexuality. Campus-Wide Information Systems, 25(3), 176\u2013188.","journal-title":"Campus-Wide Information Systems"},{"issue":"3","key":"9160_CR29","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/08917779008248751","volume":"3","author":"LD Rosen","year":"1990","unstructured":"Rosen, L. D., & Maguire, P. D. (1990). Myths and realities in computerphobia: a meta-analysis. Anxiety Research, 3(3), 175\u2013191.","journal-title":"Anxiety Research"},{"issue":"5","key":"9160_CR30","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1089\/10949310050191854","volume":"3","author":"RC Sherman","year":"2000","unstructured":"Sherman, R. C., End, C., Kraan, E., Cole, A., Campbell, J., Birchmeier, Z., et al. (2000). The Internet gender gap among college students: forgotten but not gone? CyberPsychology and Behavior, 3(5), 885\u2013894.","journal-title":"Cyber Psychology and Behavior"},{"issue":"6\u20137","key":"9160_CR31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1108\/eb010696","volume":"16","author":"T Teo","year":"1997","unstructured":"Teo, T., & Lim, V. (1997). Usage patterns and perceptions of the Internet: the gender gap. Equal Opportunities International, 16(6\u20137), 1\u20138.","journal-title":"Equal Opportunities International"},{"issue":"4","key":"9160_CR32","doi-asserted-by":"crossref","first-page":"695","DOI":"10.2307\/25148660","volume":"28","author":"H Heijden van der","year":"2004","unstructured":"van der Heijden, H. (2004). User acceptance of hedonic information systems. MIS Quarterly, 28(4), 695\u2013704.","journal-title":"MIS Quarterly"},{"issue":"1","key":"9160_CR33","doi-asserted-by":"crossref","first-page":"115","DOI":"10.2307\/3250981","volume":"24","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh, V., & Morris, M. (2000). Why don\u2019t men ever stop to ask for direction? Gender, social influence, and their role in technology acceptance and usage behaviors. MIS Quarterly, 24(1), 115\u2013139.","journal-title":"MIS Quarterly"},{"issue":"3","key":"9160_CR34","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M., Davis, G., & Davis, F. (2003). User acceptance of information technology: toward a unified view. MIS Quarterly, 27(3), 425\u2013478.","journal-title":"MIS Quarterly"}],"container-title":["Education and Information Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-011-9160-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10639-011-9160-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-011-9160-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T23:28:09Z","timestamp":1560122889000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10639-011-9160-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4,13]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,9]]}},"alternative-id":["9160"],"URL":"https:\/\/doi.org\/10.1007\/s10639-011-9160-1","relation":{},"ISSN":["1360-2357","1573-7608"],"issn-type":[{"value":"1360-2357","type":"print"},{"value":"1573-7608","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,13]]}}}