3Davis F. Perceived usefulness, perceived ease of use, and user acceptance of information technology [J]. MIS Quarterly, 1989, 13(3): 318-339.
4Yenisey M, Ozok A, Salvendy G. Perceived security determinants in e-commerce among Turkish university students [J ].Behaviour & Information Technology, 2005, (24) : 259-274.
5Bulgurcy B, Cavusoglu H, Benbasat I. Information se- curity policy compliance an empirical study of rationali- ty-based beliefs and information security awareness [J] MIS Quarterly, 2010, 34(3): 523-548.
6Shin D, Shin Y. Consumers' trust in virtual mall shop- ping: the role of social presence and perceived security [J]. International Journal of Human-Computer Interac- tion, 2011, 27(5):450-475.
7Bock G, Zmud R, Kim Y, Lee J. Behavioral intention formation in knowledge sharing: examining the roles of extrinsic motivators, social - psychological forces, and organizational climate[J]. MIS Quarterly, 2005, 29(1): 87-11I.
8Klopping I, McKinney E. Extending the technology ac- ceptance model and the task-technology fit model to consumer E~ommerce[J].Information Technology, Learn- ing,and Performance Journal, 2004,22 ( 1 ) : 35-48.
9Straub D, Boudreau M, Gefen D. Validation guidelines for IS positivist research [J].Communications of AIS, 2004, (13) : 380-427.
10Fornell C, Larcker D. Evaluating structural equation models with unobservable variables and measurement er- ror[J ] Journal of Marketing Research, 1981,18 (1) : 39-50.