Managerial perspectives on risk and risk taking
Management Science
Assessing IT usage: the role of prior experience
MIS Quarterly
Issues and opinion on structural equation modeling
MIS Quarterly
Building consumer trust online
Communications of the ACM
The development of a hybrid intelligent system for developing marketing strategy
Decision Support Systems
Journal of Systems and Software
Communications of the ACM
Inside risks: Risks in email security
Communications of the ACM
Information Systems Research
Has the Internet become indispensable?
Communications of the ACM - Has the Internet become indispensable?
A Theoretical Integration of User Satisfaction and Technology Acceptance
Information Systems Research
Economics of first-contact email advertising
Decision Support Systems
Adoption of internet banking: an empirical study in Hong Kong
Decision Support Systems
Information Systems Research
Understanding the Adoption of Multipurpose Information Appliances: The Case of Mobile Data Services
Information Systems Research
A Trust Model for Consumer Internet Shopping
International Journal of Electronic Commerce
Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence
International Journal of Electronic Commerce
International Journal of Electronic Commerce
Fighting cybercrime: a review and the Taiwan experience
Decision Support Systems - Special issue: Intelligence and security informatics
Toward user patterns for online security: Observation time and online user identification
Decision Support Systems
Hi-index | 0.00 |
The prevalence of cyber crimes has threatened the business model enabled by email. Users have to evaluate email related risks before forming their attitude and read intention toward commercial emails. Drawing on a seminal theoretical framework in risky decision making, we propose a research model that incorporates computer risk taking propensity and email risk perception as influential in cultivating commercial email attitude and read intention. The research model is empirically validated using survey data and the results provide significant support. This study contributes to the literature on email use by exploring the process of risky decision making and influence sources.