參考文獻 |
中文文獻
財團法人資訊工業策進會(2018年2月21日)台灣人更黏手機了!近8成民眾每天使用手機逾2小時 資策會:掌握娛樂市場需求成下一波商機。檢自:https://www.iii.org.tw/Press/NewsDtl.aspx?nsp_sqno=2081&fm_sqno=14
財團法人資訊工業策進會(2017年5月1日)八成以上台灣人愛用Facebook、Line坐穩社群網站龍頭 1人平均擁4個社群帳號 年輕人更愛YouTube和IG。檢自:
https://www.iii.org.tw/Press/NewsDtl.aspx?nsp_sqno=1934&fm_sqno=14
科技產業資訊室(2017年10月18日)2017年近端行動支付市場規模接近580億美元。檢自:http://iknow.stpi.narl.org.tw/Post/Read.aspx?PostID=13871
資策會產業情報研究所(2017年2月9日)【行動支付消費者調查】80%消費者有意願使用行動支付。檢自:https://mic.iii.org.tw/IndustryObservations_PressRelease02.aspx?sqno=457
資策會產業情報研究所(2017年2月9日)【行動支付消費者調查】國人認知度已突破八成 NFC功能漸普及。檢自:https://mic.iii.org.tw/IndustryObservations_PressRelease02.aspx?sqno=456
資策會產業情報研究所(2018年1月12日)台灣行動支付消費者調查-用戶與非用戶分析。檢自:https://mic.iii.org.tw/aisp/ReportS.aspx?id=CDOC20180110002
資策會產業情報研究所(2018年1月12日)台灣行動支付消費者調查-整體消費者分析。檢自:https://mic.iii.org.tw/aisp/ReportS.aspx?id=CDOC20180110001
資策會產業情報研究所(2018年1月31日)【行動支付大調查一】近四成手機用戶曾使用行動支付 LINE Pay、Apple Pay認知度最高。檢自:https://mic.iii.org.tw/IndustryObservations_PressRelease02.aspx?sqno=486
英文文獻
Ajzen, I. (2002). Perceived behavioral control, self‐efficacy, locus of control, and the theory of planned behavior. Journal of applied social psychology, 32(4), 665-683.
Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behaviour.
Allen, V. L. (1965). Situational factors In conformity1. In Advances in experimental social psychology (Vol. 2, pp. 133-175). Academic Press.
Arvidsson, N. (2014). Consumer attitudes on mobile payment services–results from a proof of concept test. International Journal of Bank Marketing, 32(2), 150-170.
Asch, S. E., & Guetzkow, H. (1951). Effects of group pressure upon the modification and distortion of judgments. Groups, leadership, and men, 222-236.
Assael, H. (1998). Consumer behaviour and marketing action, Southwestern College Publishing, Ohio.
Au, Y. A., & Kauffman, R. J. (2008). The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application. Electronic Commerce Research and Applications, 7(2), 141-164.
Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the academy of marketing science, 16(1), 74-94.
Bandura, A. (Ed.). (1995). Self-efficacy in changing societies. Cambridge university press.
Bank for International Settlements. (2012). Innovations in Retail Payments. Report of the Working Group on Innovations in Retail Payments. Committee on Payment and Settlement Systems. Basel: BIS
Bawa, K. (1990). Modeling inertia and variety seeking tendencies in brand choice behavior. Marketing Science, 9(3), 263-278.
Bearden, W. O., Netemeyer, R. G., & Teel, J. E. (1989). Measurement of consumer susceptibility to interpersonal influence. Journal of consumer research, 15(4), 473-481.
Bentler, P. M. (1990). Comparative fit indexes in structural models. Psychological bulletin, 107(2), 238.
Bikhchandani, S., & Sharma, S. (2000). Herd behavior in financial markets. IMF Staff papers, 47(3), 279-310.
Bilgihan, A. (2016). Gen Y customer loyalty in online shopping: An integrated model of trust, user experience and branding. Computers in Human Behavior, 61, 103-113.
Bstieler, L., Hemmert, M., & Barczak, G. (2017). The changing bases of mutual trust formation in inter-organizational relationships: A dyadic study of university-industry research collaborations. Journal of Business Research, 74, 47-54.
Burger, J. M. (1989). Negative reactions to increases in perceived personal control. Journal of personality and social psychology, 56(2), 246.
Burnham, T. A., Frels, J. K., & Mahajan, V. (2003). Consumer switching costs: A typology, antecedents, and consequences. Journal of the Academy of marketing Science, 31(2), 109-126.
Campbell, J. D., & Fairey, P. J. (1989). Informational and normative routes to conformity: The effect of faction size as a function of norm extremity and attention to the stimulus. Journal of personality and social psychology, 57(3), 457.
Chandra, S., Srivastava, S. C., & Theng, Y. L. (2010). Evaluating the role of trust in consumer adoption of mobile payment systems: An empirical analysis. CAIS, 27(29), 27.
Chang, S., & Lin, C. S. (2007). Exploring organizational culture for information security management. Industrial Management & Data Systems, 107(3), 438-458.
Chellappa, R. K., & Pavlou, P. A. (2002). Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logistics Information Management, 15(5/6), 358-368.
Chen, P. Y., & Hitt, L. M. (2002). Measuring switching costs and the determinants of customer retention in Internet-enabled businesses: A study of the online brokerage industry. Information systems research, 13(3), 255-274.
Chou, D. C., Yen, D. C., Lin, B., & Hong-Lam Cheng, P. (1999). Cyberspace security management. Industrial Management & Data Systems, 99(8), 353-361.
Dahlberg, T., Guo, J., & Ondrus, J. (2015). A critical review of mobile payment research. Electronic Commerce Research and Applications, 14(5), 265-284.
Dahlberg, T., Mallat, N., & Öörni, A. (2003). Trust enhanced technology acceptance modelconsumer acceptance of mobile payment solutions: Tentative evidence. Stockholm Mobility Roundtable, 22, 23.
Deutsch, M., & Gerard, H. B. (1955). A study of normative and informational social influences upon individual judgment. The journal of abnormal and social psychology, 51(3), 629.
Dhillon, G., & Backhouse, J. (2000). Technical opinion: Information system security management in the new millennium. Communications of the ACM, 43(7), 125-128.
Doll, W. J., Xia, W., & Torkzadeh, G. (1994). A confirmatory factor analysis of the end-user computing satisfaction instrument. MIS quarterly, 453-461.
Doney, P. M., & Cannon, J. P. (1997). An examination of the nature of trust in buyer-seller relationships. the Journal of Marketing, 35-51.
Dong, P., & Zhong, C. B. (2017). Witnessing moral violations increases conformity in consumption. Journal of Consumer Research, 44(4), 778-793.
Eastman, J. K., Iyer, R., Shepherd, C. D., Heugel, A., & Faulk, D. (2018). Do they shop to stand out or fit in? The luxury fashion purchase intentions of young adults. Psychology & Marketing, 35(3), 220-236.
Fan, J., Shao, M., Li, Y., & Huang, X. (2018). Understanding users’ attitude toward mobile payment use: A comparative study between China and the USA. Industrial Management & Data Systems, 118(3), 524-540.
Fan, Y. W., Chen, C. D., Wu, C. C., & Fang, Y. H. (2015). The effect of status quo bias on cloud system adoption. Journal of Computer Information Systems, 55(3), 55-64.
Fang, Y., Qureshi, I., Sun, H., McCole, P., Ramsey, E., & Lim, K. H. (2014). Trust, Satisfaction, and Online Repurchase Intention: The Moderating Role of Perceived Effectiveness of E-Commerce Institutional Mechanisms. Mis Quarterly, 38(2).
Flavián, C., Guinalíu, M., & Gurrea, R. (2006). The role played by perceived usability, satisfaction and consumer trust on website loyalty. Information & management, 43(1), 1-14.
Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of marketing research, 382-388.
Galinsky, A. D., Magee, J. C., Gruenfeld, D. H., Whitson, J. A., & Liljenquist, K. A. (2008). Power reduces the press of the situation: implications for creativity, conformity, and dissonance. Journal of personality and social psychology, 95(6), 1450.
Garbarino, E., & Johnson, M. S. (1999). The different roles of satisfaction, trust, and commitment in customer relationships. the Journal of Marketing, 70-87.
Gefen, D., & Straub, D. W. (2004). Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services. Omega, 32(6), 407-424.
Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS quarterly, 27(1), 51-90.
Gordon, L. A., Loeb, M. P., & Zhou, L. (2011). The impact of information security breaches: Has there been a downward shift in costs?. Journal of Computer Security, 19(1), 33-56.
Guilford, J. P. (1965). Fundamental Statistics in psychology and education 4th Ed.
Guo, J., & Bouwman, H. (2016). An analytical framework for an m-payment ecosystem: A merchants׳ perspective. Telecommunications Policy, 40(2-3), 147-167.
Hartono, E., Holsapple, C. W., Kim, K. Y., Na, K. S., & Simpson, J. T. (2014). Measuring perceived security in B2C electronic commerce website usage: A respecification and validation. Decision Support Systems, 62, 11-21.
Heap, T., & Pollari, I. (2018). FINTECH 100 - Leading Global Fintech Innovators Report 2017. Available from:
https://s3-ap-southeast-2.amazonaws.com/h2vc/static/reports/innovators/2017/H2-Fintech-Innovators-2017.pdf [Accessed 6th June 2018.].
Hosmer, L. T. (1995). Trust: The connecting link between organizational theory and philosophical ethics. Academy of management Review, 20(2), 379-403.
Hsieh, P. J. (2016). An empirical investigation of patients’ acceptance and resistance toward the health cloud: The dual factor perspective. Computers in Human Behavior, 63, 959-969.
Hu, L. T., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural equation modeling: a multidisciplinary journal, 6(1), 1-55.
Huang, D. L., Rau, P. L. P., Salvendy, G., Gao, F., & Zhou, J. (2011). Factors affecting perception of information security and their impacts on IT adoption and security practices. International Journal of Human-Computer Studies, 69(12), 870-883.
Huang, J. H., & Chen, Y. F. (2006). Herding in online product choice. Psychology & Marketing, 23(5), 413-428.
Huang, M. H., & Yu, S. (1999). Are consumers inherently or situationally brand loyal?—A set intercorrelation account for conscious brand loyalty and nonconscious inertia. Psychology & Marketing, 16(6), 523-544.
Hwang, R. J., Shiau, S. H., & Jan, D. F. (2007). A new mobile payment scheme for roaming services. Electronic Commerce Research and Applications, 6(2), 184-191.
Idrissou, L., van Paassen, A., Aarts, N., Vodouhè, S., & Leeuwis, C. (2013). Trust and hidden conflict in participatory natural resources management: The case of the Pendjari national park (PNP) in Benin. Forest Policy and Economics, 27, 65-74.
Inder, B., & O′Brien, T. (2003). The endowment effect and the role of uncertainty. Bulletin of Economic Research, 55(3), 289-301.
Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000). Consumer trust in an Internet store. Information technology and management, 1(1-2), 45-71.
Jiang, Y., Ho, Y. C., Yan, X., & Tan, Y. (2018). Investor Platform Choice: Herding, Platform Attributes, and Regulations. Journal of Management Information Systems, 35(1), 86-116.
Johnson, V. L., Kiser, A., Washington, R., & Torres, R. (2018). Limitations to the rapid adoption of M-payment services: Understanding the impact of privacy risk on M-Payment services. Computers in Human Behavior, 79, 111-122.
Jones, M. A., Mothersbaugh, D. L., & Beatty, S. E. (2002). Why customers stay: measuring the underlying dimensions of services switching costs and managing their differential strategic outcomes. Journal of business research, 55(6), 441-450.
Kahneman, D., & Tversky, A. (1979). Prospect Theory: An Analysis of Decision under Risk. Econometrica, 47(2), 263-292.
Kempf, A., & Ruenzi, S. (2006). Status quo bias and the number of alternatives: An empirical illustration from the mutual fund industry. The journal of behavioral finance, 7(4), 204-213.
Khalilzadeh, J., Ozturk, A. B., & Bilgihan, A. (2017). Security-related factors in extended UTAUT model for NFC based mobile payment in the restaurant industry. Computers in Human Behavior, 70, 460-474.
Khedhaouria, A., Thurik, R., Gurau, C., & van Heck, E. (2016). Customers′ continuance intention regarding mobile service providers: A status quo bias perspective. Journal of Global Information Management (JGIM), 24(4), 1-21.
Kim, C., Tao, W., Shin, N., & Kim, K. S. (2010). An empirical study of customers’ perceptions of security and trust in e-payment systems. Electronic commerce research and applications, 9(1), 84-95.
Kim, H. W. (2011). The effects of switching costs on user resistance to enterprise systems implementation. IEEE Transactions on Engineering management, 58(3), 471-482.
Kim, H. W., & Gupta, S. (2012). Investigating customer resistance to change in transaction relationship with an internet vendor. Psychology & Marketing, 29(4), 257-269.
Kim, H. W., & Kankanhalli, A. (2009). Investigating user resistance to information systems implementation: A status quo bias perspective. MIS quarterly, 567-582.
Kim, Y. A., & Phalak, R. (2012). A trust prediction framework in rating-based experience sharing social networks without a Web of Trust. Information Sciences, 191, 128-145.
Kolsaker, A., & Payne, C. (2002). Engendering trust in e-commerce: a study of gender-based concerns. Marketing Intelligence & Planning, 20(4), 206-214.
Koufaris, M., & Hampton-Sosa, W. (2004). The development of initial trust in an online company by new customers. Information & management, 41(3), 377-397.
KPMG (2018). The Pulse of Fintech Q4 2017. Available from: https://assets.kpmg.com/content/dam/kpmg/xx/pdf/2018/02/pulse_of_fintech_q4_2017.pdf [Accessed 6 June 2018].
Lascu, D. N., & Zinkhan, G. (1999). Consumer conformity: review and applications for marketing theory and practice. Journal of Marketing Theory and Practice, 7(3), 1-12.
Lee, M., & Lee, J. (2012). The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet. Information Systems Frontiers, 14(2), 375-393.
Lee, Y. C. (2006). An empirical investigation into factors influencing the adoption of an e-learning system. Online information review, 30(5), 517-541.
Leibenstein, H. (1950). Bandwagon, snob, and Veblen effects in the theory of consumers′ demand. The quarterly journal of economics, 64(2), 183-207.
Lending, D., & Straub, D. W. (1997). Impacts of an Integrated Information Center on faculty end‐users: A qualitative assessment. Journal of the Association for Information Science and Technology, 48(5), 466-471.
Li, C. Y., & Ku, Y. C. (2017). The power of a thumbs-up: Will e-commerce switch to social commerce?. Information & Management.
Li, J., Liu, M., & Liu, X. (2016). Why do employees resist knowledge management systems? An empirical study from the status quo bias and inertia perspectives. Computers in Human Behavior, 65, 189-200.
Linck, K., Pousttchi, K., & Wiedemann, D. G. (2006). Security issues in mobile payment from the customer viewpoint.
Liu, C., Marchewka, J. T., Lu, J., & Yu, C. S. (2005). Beyond concern—a privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42(2), 289-304.
Lu, J., & Xie, X. (2014). To change or not to change: A matter of decision maker’s role. Organizational Behavior and Human Decision Processes, 124(1), 47-55.
Lu, Y., Yang, S., Chau, P. Y., & Cao, Y. (2011). Dynamics between the trust transfer process and intention to use mobile payment services: A cross-environment perspective. Information & Management, 48(8), 393-403.
Lucia-Palacios, L., Pérez-López, R., & Polo-Redondo, Y. (2016). Enemies of cloud services usage: inertia and switching costs. Service Business, 10(2), 447-467.
Mamonov, S., & Benbunan-Fich, R. (2018). The impact of information security threat awareness on privacy-protective behaviors. Computers in Human Behavior, 83, 32-44.
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of management review, 20(3), 709-734.
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). The impact of initial consumer trust on intentions to transact with a web site: a trust building model. The journal of strategic information systems, 11(3-4), 297-323.
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information systems research, 13(3), 334-359.
Moorman, C., Zaltman, G., & Deshpande, R. (1992). Relationships between providers and users of market research: The dynamics of trust within and between organizations. Journal of marketing research, 29(3), 314.
Morgan, R. M., & Hunt, S. D. (1994). The commitment-trust theory of relationship marketing. The journal of marketing, 20-38.
Nofsinger, J. R., & Sias, R. W. (1999). Herding and feedback trading by institutional and individual investors. The Journal of finance, 54(6), 2263-2295.
Nook, E. C., Ong, D. C., Morelli, S. A., Mitchell, J. P., & Zaki, J. (2016). Prosocial conformity: Prosocial norms generalize across behavior and empathy. Personality and Social Psychology Bulletin, 42(8), 1045-1062.
Nunnally, J. C., & Bernstein, I. H. (1978). Psychometric theory.
Oliveira, T., Thomas, M., Baptista, G., & Campos, F. (2016). Mobile payment: Understanding the determinants of customer adoption and intention to recommend the technology. Computers in Human Behavior, 61, 404-414.
Parker, D. B. (1997). The strategic values of information security in business. Computers & Security, 16(7), 572-582.
Pavlou, P. A. (2002). Institution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation. The Journal of Strategic Information Systems, 11(3-4), 215-243.
Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS quarterly, 105-136.
Peng, H., Xu, X., & Liu, W. (2011). Drivers and barriers in the acceptance of mobile payment in China. Communications in Information Science and Management Engineering, 1(5), 73–78.
Polites, G. L., & Karahanna, E. (2012). Shackled to the status quo: the inhibiting effects of incumbent system habit, switching costs, and inertia on new system acceptance. MIS quarterly, 21-42.
Prince, J. T. (2011). Relating inertia and experience in technology markets: an analysis of households’ personal computer choices. Applied Economics, 43(29), 4501-4514.
Qasim, H., & Abu-Shanab, E. (2016). Drivers of mobile payment acceptance: The impact of network externalities. Information Systems Frontiers, 18(5), 1021-1034.
Ransbotham, S., Mitra, S., & Ramsey, J. (2012). Are markets for vulnerabilities effective?. Mis Quarterly, 43-64.
Ross, L., Bierbrauer, G., & Hoffman, S. (1976). The role of attribution processes in conformity and dissent: Revisiting the Asch situation. American Psychologist, 31(2), 148.
Rousseau, D. M., Sitkin, S. B., Burt, R. S., & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Academy of management review, 23(3), 393-404.
Ryan, S. D., & Bordoloi, B. (1997). Evaluating security threats in mainframe and client/server environments. Information & Management, 32(3), 137-146.
Samuelson, W., & Zeckhauser, R. (1988). Status quo bias in decision making. Journal of risk and uncertainty, 1(1), 7-59.
Schierz, P. G., Schilke, O., & Wirtz, B. W. (2010). Understanding consumer acceptance of mobile payment services: An empirical analysis. Electronic commerce research and applications, 9(3), 209-216.
Schnackenberg, A. K., & Tomlinson, E. C. (2016). Organizational transparency: A new perspective on managing trust in organization-stakeholder relationships. Journal of Management, 42(7), 1784-1810.
Sharma, N., & Patterson, P. G. (2000). Switching costs, alternative attractiveness and experience as moderators of relationship commitment in professional, consumer services. International journal of service industry management, 11(5), 470-490.
Sherif, M. (1936). The psychology of social norms. New York: Harper.
Sirdeshmukh, D., Singh, J., & Sabol, B. (2002). Consumer trust, value, and loyalty in relational exchanges. Journal of marketing, 66(1), 15-37.
Skinner, E. A. (1996). A guide to constructs of control. Journal of personality and social psychology, 71(3), 549.
Stroborn, K., Heitmann, A., Leibold, K., & Frank, G. (2004). Internet payments in Germany: a classificatory framework and empirical evidence. Journal of Business Research, 57(12), 1431-1437.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11.
Takabi, H., Joshi, J. B., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6), 24-31.
Tan, G. W. H., Ooi, K. B., Chong, S. C., & Hew, T. S. (2014). NFC mobile credit card: the next frontier of mobile payment?. Telematics and Informatics, 31(2), 292-307.
Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information systems research, 6(2), 144-176.
Tsao, W. C., Hsieh, M. T., Shih, L. W., & Lin, T. M. (2015). Compliance with eWOM: The influence of hotel reviews on booking intention from the perspective of consumer conformity. International Journal of Hospitality Management, 46, 99-111.
Tsiakis, T., & Sthephanides, G. (2005). The concept of security and trust in electronic payments. Computers & Security, 24(1), 10-15.
Vatanasombut, B., Igbaria, M., Stylianou, A. C., & Rodgers, W. (2008). Information systems continuance intention of web-based applications customers: The case of online banking. Information & Management, 45(7), 419-428.
Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 157-178.
Walter, A., Mueller, T. A., & Helfert, G. (2000, September). The impact of satisfaction, trust, and relationship value on commitment: Theoretical considerations and empirical results. In IMP Conference Proceedings (pp. 07-09). United Kingdom: Bath.
Wang, W. T., Wang, Y. S., & Liu, E. R. (2016). The stickiness intention of group-buying websites: The integration of the commitment–trust theory and e-commerce success model. Information & Management, 53(5), 625-642.
Wang, X., Yu, C., & Wei, Y. (2012). Social media peer communication and impacts on purchase intentions: A consumer socialization framework. Journal of interactive marketing, 26(4), 198-208.
Wang, Y. Y., Wang, Y. S., & Lin, T. C. (2018). Developing and validating a technology upgrade model. International Journal of Information Management, 38(1), 7-26.
Whitten, D., & Wakefield, R. L. (2006). Measuring switching costs in IT outsourcing services. The Journal of Strategic Information Systems, 15(3), 219-248.
Williams, M. (2001). In whom we trust: Group membership as an affective context for trust development. Academy of management review, 26(3), 377-396.
Wilkie, W. (1994). Consumer behavior, 3rd. New York.
Wu, C. C. (2016). Status quo bias in information system adoption: a meta-analytic review. Online Information Review, 40(7), 998-1017.
Yanamandram, V., & White, L. (2006). Switching barriers in business-to-business services: a qualitative study. International Journal of Service Industry Management, 17(2), 158-192.
Yanamandram, V., & White, L. (2010). Are inertia and calculative commitment distinct constructs? An empirical study in the financial services sector. International Journal of Bank Marketing, 28(7), 569-584.
Yao, J., Ma, C., & He, W. P. (2014). Investor herding behaviour of Chinese stock market. International Review of Economics & Finance, 29, 12-29.
Yayla, A. A., & Hu, Q. (2011). The impact of information security events on the stock value of firms: The effect of contingency factors. Journal of Information Technology, 26(1), 60-77.
Zafar, H., Ko, M. S., & Osei-Bryson, K. M. (2016). The value of the CIO in the top management team on performance in the case of information security breaches. Information Systems Frontiers, 18(6), 1205-1215.
Zeelenberg, M., & Pieters, R. (2004). Beyond valence in customer dissatisfaction: A review and new findings on behavioral responses to regret and disappointment in failed services. Journal of business Research, 57(4), 445-455.
Zhang, X., Guo, X., Wu, Y., Lai, K. H., & Vogel, D. (2017). Exploring the inhibitors of online health service use intention: A status quo bias perspective. Information & Management, 54(8), 987-997.
Zhou, T. (2011). The effect of initial trust on user adoption of mobile payment. Information Development, 27(4), 290-300. |