References
- 김병수 (2012), 모바일 소셜네트워크서비스 환경에서 지속 사용 의도의 선행 요인에 관한 연구: 신뢰와 프라이버시 우려의 역할, 지식경영연구, 13(4), 83-100.
- 김조영, 이충기, 김정만 (2013), 스마트폰 기반 관광정보 수용과 관광상품 구매의도에 관한 연구, 관광연구, 27(6), 15-38.
- 구철모, 김희웅, 전유희 (2011), 스마트폰의 탐색적 사용과 충분한 활용에 대한 연구, 한국전자거래학회지, 16(3), 67-91. https://doi.org/10.7838/jsebs.2011.16.3.067
- 산업연구원 (2014), 중국인 관광객 소비패턴 분석 및 산업연계 활용방안.
- 이건창, 이근영, 채성욱 (2008), 3 차원 아바타가 소비자 신뢰 및 구매의도에 미치는 영향에 관한 실증연구: 세컨드라이프를 중심으로, 지식경영연구, 9(4), 91-112.
- 이금실, 이형룡 (2011), 스마트폰 서비스에 대한 여행자의 지각이 태도와 사용 의도에 미치는 영향에 관한 연구, 관광학연구, 35(2), 271-292.
- 조휘형 (2012), 스마트폰의 지각된 품질요인이 만족 및 지속적 사용의도에 미치는 영향에 관한 연구-수정된 DeLone & McLean 의 정보시스템 성공모델 관점으로, Entrue Journal of Informatio Technology, 11(2), 167-180.
- 최재원, 전엘, 김경규 (2014), 연구논문: 소셜커머스 환경에서 정보중개상에 대한 구전 의도의 결정요인, 지식경영연구, 15(3), 209-228.
- 한국문화산업교류재단 (2015), 2014 한류백서.
- 한국정보화진흥원 (2015), 2014년 중국 스마트폰시장 결산 및 2015년 전망.
- Ahuja, M. K. and Thatcher, J. B. (2005), Moving Beyond Intentions and toward the Theory of Trying : Effects of Work Environment and Gender on Post-Adoption Information Technology Use, MIS Quarterly, 29(3), 427-459,
- Agarwal, R., and Karahanna, E. (2000), Time Flies When You're Having Fun: Cognitive Absorption and Beliefs about Information Technology Usage, MIS Quarterly, 24(4), 665-694. https://doi.org/10.2307/3250951
- Bagozzi, R. P., and Yi, Y. (1988), On the evaluation of structural equation models, Journal of the academy of marketing science, 16(1), 74-94. https://doi.org/10.1007/BF02723327
- Bandura, A. (1986), Social foundations of thought and action: A social cognitive theory, NJ: Prentice-Hall, Inc.
- Bandura, A. (1997), Self-efficacy: The exercise of control, New York: Freeman.
- Baroudi, J.J., Olson, M. H., and Ives, B. (1986), An Empirical Study of the Impact of User Involvement on System Usage and Information Satisfaction, Communications of the ACM , (29)3, 232-238.
- Brown, H. G., Poole, M. S., and Rodgers, T.L. (2004), Interpersonal traits, complementarity, and trust in virtual collaboration, Journal of Management Information Systems, 20(4), 115-138. https://doi.org/10.1080/07421222.2004.11045785
- Chin, W. W. (1998), The partial least squares approach to structural equation modeling, In G.A. Marcoulides(ed.), Modern methods for Business Research, Lawrence Erlbaum Associates, Mahwah, Nj, pp.295-336.
- Cooper, R. B., and Zmud, R. W. (1990), Information technology implementation research: a technological diffusion approach, Management science, 36(2), 123-139. https://doi.org/10.1287/mnsc.36.2.123
- Doll, W., and Deng, X. (2010), A technology empowerment model for engineering work, ACM SIGMIS Database, 41(4), 52-74. https://doi.org/10.1145/1899639.1899643
- Ericsson, N. (2015), Ericsson Mobility Report.
- Fornell, C. and Larcker. D. (1981), Evaluating structural equation models and unobservable variables and measurement error, Journal of Marketing Research, (18), 39-50.
- Gefen, D., E. Karahanna. D.W. Straub., (2003), Trust and TAM in Online Shopping: An integrated model, MIS Quarterly, 27(1), 51-90. https://doi.org/10.2307/30036519
- Gagne, M., and Deci, E. L. (2005), Self-Determination Theory and Work Motivation, Journal of Organizational Behavior, (26), 331-362.
- Goo, J., Huang, C. D., and Koo, C. (2015), Learning for healthy outcomes: Exploration and exploitation with electronic medical records, Information & Management, 52, 550-562. https://doi.org/10.1016/j.im.2015.04.002
- Gorsline, K. (1996), A competency profile for human resources: No more shoemaker's children, Human Resource Management, 35(1),
- Hair, J. F., R ingle, C. M., and Sarstedt, M. (2011), PLS-SEM: Indeed a silver bullet, Journal of Marketing Theory and Practice, 19(2), 139-152. https://doi.org/10.2753/MTP1069-6679190202
- Hannan, M. T., and Freeman, J. (1984), Structural inertia and organizational change, American sociological review, 149-164.
- He, Z. L., and Wong, P. K. (2004), Exploration vs. exploitation: An empirical test of the ambidexterity hypothesis, Organization science, 15(4), 481-494. https://doi.org/10.1287/orsc.1040.0078
- Hong, I. B., and Cho, H. (2011), The impact of consumer trust on attitudinal loyalty and purchase intentions in B2C e-marketplaces: Intermediary trust vs. seller trust, International Journal of Information Management, 31(5), 469-479. https://doi.org/10.1016/j.ijinfomgt.2011.02.001
- Hong, W., Thong, J. Y., and Wai-Man Wong, K. Y. T. (2002), Determinants of user acceptance of digital libraries: an empirical examination of individual differences and system characteristics, Journal of Management Information Systems, 18(3), 97-124. https://doi.org/10.1080/07421222.2002.11045692
- Hsieh, J. P. A . a nd Wa ng, W. (2007), Explaining employees' extended use of complex information systems, European Journal of Information Systems, (16), 216-227.
- Hunton, J. E., and Price, K. H. (1997), Effects of the user participation process and task meaningfulness on key information system outcomes, Management Science, 43(6), 797-812. https://doi.org/10.1287/mnsc.43.6.797
- Jackson, C. M., Chow, S., and Leitch, R. A. (1997), Toward an Understanding of the Behavioral Intention to Use an Information System, Decision Sciences, 28(2), 357-389. https://doi.org/10.1111/j.1540-5915.1997.tb01315.x
- Jones, E., Sundaram, S., and Chin, W. (2002), Factors Leading to Sales Force Automation Use: A Longitudinal Analysis, Journal of Personal Selling & Sales Management, (3), 145-156.
- Kim, D. Y., Park, O. J., and Morrison, A. M. (2008), A model of traveler acceptance of mobile technology, International Journal of Tourism Research, 10(5), 393-407. https://doi.org/10.1002/jtr.669
- Kim, H. W., Chan, H. C., and Lee, S. H. (2012), A User Commitment Approach to Information Systems Infusion, In PACIS, 101.
- Kim, H. W., and Gupta, S. (2014), A User Empowerment Approach to Information Systems Infusion, IEEE Transactions on Engineering Management, 61(4), 656-668. https://doi.org/10.1109/TEM.2014.2354693
- Kim, M. J., Chung, N., and Lee, C. K. (2011), The effect of perceived trust on electronic commerce: Shopping online for tourism products and ser vices in South Korea, Tourism Management, 32(2), 256-265. https://doi.org/10.1016/j.tourman.2010.01.011
- Kirkman, B. L., and Rosen, B. (1999), Beyond Self-Management: Antecedents and Consequences of Team Empowerment, Academy of Management Journal, 42(1), 58-74. https://doi.org/10.2307/256874
- Koo, C., Chung, N. and Kim, H. W. (2015), Examining explorative and exploitative uses of smartphones: a user competence perspective, Information Technology & People, 28(1).
- Locke, E. A., Frederick, E., Lee, C., and Bobko, P. (1984), Effect of self-efficacy, goals, and task strategies on task performance, Journal of applied psychology, 69(2), 241. https://doi.org/10.1037/0021-9010.69.2.241
- Luo, Y., and Ling, H. (2013), Exploration and Exploitation of Information Systems Usage and Individual Performance, Procedia Computer Science, 22, 863-872. https://doi.org/10.1016/j.procs.2013.09.169
- Marakas, G. M., Johnson, R. D., and Palmer, J. W. (2000), A theoretical model of differential social attributions toward computing technology: when the metaphor becomes the model, International Journal of Human-Computer Studies, 52(4), 719-750. https://doi.org/10.1006/ijhc.1999.0348
- Marcolin, B. L ., Compeau, D. R., Munro, M.C., and Huff, S. L. (2000), Assessing User Comp etence: Conceptualization and Measurement, Information Systems Research, 11(1), 37-60 https://doi.org/10.1287/isre.11.1.37.11782
- Marcolin, B., Huff, S. L., and Munro, M. C. (1992), End user sophistication: Measurement and research model, Administrative Sciences Association of Canada, 108-20.
- March, J. G. (1991), Exploration and exploitation in organizational learning, Organization science, 2(1), 71-87. https://doi.org/10.1287/orsc.2.1.71
- May, D. R., Gilson, R. L., and Harter, L. M. (2004), The Psychological Conditions of Meaningfulness, Safety and Availability and the Engagement of the Human Spirit at Work, Journal of Occupational and Organizational Psychology, (77), 11-37. https://doi.org/10.1348/096317904322915892
- Mayer, R. C., Davis, J. H., and Schoorman, F.D. (1995), An integrative model of organizational trust, Academy of management review, 20(3), 709-734. https://doi.org/10.5465/amr.1995.9508080335
- McKnight, D. H., Choudhur y, V., and Kacmar, C. (2002), Developing and validating trust measures for e-commerce: An integrative typology, Information systems research, 13(3),334-359. https://doi.org/10.1287/isre.13.3.334.81
- Ng, E. H., and Kim, H. W. (2009), Investigating Information systems infusion and the moderating role of habit: A user empowerment perspective, ICIS 2009 Proceedings, 137.
- Ratnasingam, P., and Pavlou, P. A. (2003), Technology trust in internet-based interorganizational electronic commerce, The Social and Cognitive Impacts of E-commerce on Modern Organizations, 311.
- Saeed, and Abdinnour-Helm, S. (2008), Examining the effects of information system characteristics and perceived usefulness on post adoption usage of information systems, Information and Management, 376-386.
- Seibert, S. E., Wang, G., and Courtright, S. H. (2011), Antecedents and consequences of psychological and team empowerment in organizations: a meta-analytic review, Journal of Applied Psychology, 96(5), 981. https://doi.org/10.1037/a0022676
- Soikkeli, T., Karikoski, J., and Hammainen, H. (2011), Diversity and end user context in smartphone usage sessions. In Next generation mobile applications, services and technologies (NGMAST), IEEE 2011 5th international conference on, 7-12.
- Song, J. (2007), Trust in health infomediaries, Decision Support Systems, 43(2), 390-407. https://doi.org/10.1016/j.dss.2006.11.011
- Spreit zer, G. M. (1995), Psychological Empowerment in the Workplace: Dimensions, Measurement, and Validation, Academy of Management Journal, 38(5), 1442-1465. https://doi.org/10.2307/256865
- Thatcher, J. B., McKnight, D. H., Baker, E. W., Arsal, R. E., and Roberts, N. H. (2011), The role of trust in postadoption it exploration: An empirical examination of knowledge management systems, IEEE Transactions on Engineering Management, 58(1), 56-70. https://doi.org/10.1109/TEM.2009.2028320
- Thomas, K. W., and Velthouse, B. A. (1990), Cognitive Elements of Empowerment: An "Interpretive" Model of Intrinsic Task Motivation, Academy of Ma nagement Review, 15(4), 666-681.
- Vroom, V. H. (1982), Work and motivation. New york: Robert E. Krieger Publishing Company.
- Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. (2003), User acceptance of information technology: Toward a unified view, MIS quarterly, 425-478.
- Wang, W., and Benbasat, I. (2005), Integrating TAM with trust to explain online recommendation agent adoption, Journal of Association for Information Systems, 6(3), 72-101. https://doi.org/10.17705/1jais.00065
- Wang, D., Park, S., and Fesenmaier, D. R. (2012), The role of smartphones in mediating the touristic experience, Journal of Travel Research, 51(4), 371-387. https://doi.org/10.1177/0047287511426341
- Wixom., B. and Todd, P. (2005), A theoretical integration of user satisfaction and technology acceptance, Information systems research, 16(1), 85-102. https://doi.org/10.1287/isre.1050.0042
- Zhang, X., and Bartol, K. M. (2010), Linking empower ing leadership a nd employee creativity: The inf luence of psychological empowerment, intrinsic motivation, and creative process engagement, Academy of Management Journal, 53(1), 107-128. https://doi.org/10.5465/amj.2010.48037118