Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Source
Journal of Information… | 3 |
Author
Alshare, Khaled A. | 1 |
El-Masri, Mazen | 1 |
Havelka, Douglas | 1 |
Hwang, Jae-Won | 1 |
Kim, Rosemary | 1 |
Lane, Peggy L. | 1 |
Yoon, Cheolho | 1 |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Tests/Questionnaires | 3 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Audience
Location
South Korea | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Havelka, Douglas – Journal of Information Systems Education, 2016
A study was performed to test the impact of factors suggested by social capital and social cognitive theories as important antecedents to team performance on information technology (IT) course projects. Specifically, the impact of personal outcome expectations and social interaction ties on the quality and quantity of knowledge sharing is…
Descriptors: Student Projects, Social Capital, Social Theories, Social Cognition
Alshare, Khaled A.; El-Masri, Mazen; Lane, Peggy L. – Journal of Information Systems Education, 2015
This paper develops a research model based on the Unified Theory of Acceptance and Use of Technology model (UTAUT) and Hofstede's cultural dimensions to explore factors that influence student effort at learning Enterprise Resource Planning (ERP) systems. A Structural Equation Model (SEM) using LISREL was utilized to validate the proposed research…
Descriptors: Management Information Systems, Adoption (Ideas), Models, College Students
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary – Journal of Information Systems Education, 2012
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
Descriptors: Internet, Privacy, Computer Security, Information Security