Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 3 |
Descriptor
Source
| Journal of Information… | 3 |
Author
| Alshare, Khaled A. | 1 |
| El-Masri, Mazen | 1 |
| Havelka, Douglas | 1 |
| Hwang, Jae-Won | 1 |
| Kim, Rosemary | 1 |
| Lane, Peggy L. | 1 |
| Yoon, Cheolho | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 3 |
| Tests/Questionnaires | 3 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
Audience
Location
| South Korea | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Havelka, Douglas – Journal of Information Systems Education, 2016
A study was performed to test the impact of factors suggested by social capital and social cognitive theories as important antecedents to team performance on information technology (IT) course projects. Specifically, the impact of personal outcome expectations and social interaction ties on the quality and quantity of knowledge sharing is…
Descriptors: Student Projects, Social Capital, Social Theories, Social Cognition
Alshare, Khaled A.; El-Masri, Mazen; Lane, Peggy L. – Journal of Information Systems Education, 2015
This paper develops a research model based on the Unified Theory of Acceptance and Use of Technology model (UTAUT) and Hofstede's cultural dimensions to explore factors that influence student effort at learning Enterprise Resource Planning (ERP) systems. A Structural Equation Model (SEM) using LISREL was utilized to validate the proposed research…
Descriptors: Management Information Systems, Adoption (Ideas), Models, College Students
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary – Journal of Information Systems Education, 2012
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
Descriptors: Internet, Privacy, Computer Security, Information Security

Peer reviewed
Direct link
