Computer Self-Efficacy has been shown to be a critical construct in a number of research areas within the Information Systems literature, most notably training, technology adoption, and performance in computer-related tasks. Attention has been focused on its antecedents, approaches to manipulation, issues of measurement, and its relationship to other important variables such as computer anxiety and personal goals. On the other hand, its relationship to performance on a task that is supported by technology, but has extensive domain content, has not been yet established; nor how that relationship varies as the level of computer support differs for alternative tasks. This proposal develops a model of computer-supported task performance and pos...
This study examined the relationship between computer self-efficacy and learning performance and inv...
The current health care delivery system increasingly relies upon information technology (IT) to more...
Computer Self-Efficacy (CSE) has been traditionally viewed within the IS discipline as an important ...
Computer Self-Efficacy has been shown to be a critical construct in a number of research areas withi...
Integrating theory from research on training, computer self-efficacy (CSE), and motivation, this res...
Integrating theory from research on training, computer self-efficacy (CSE), and motivation, this res...
Information system researchers have recently devoted considerable attention to the concept of comput...
This paper discusses research in progress that examines the relationship between personality, comput...
This paper examines the effect of self-efficacy, belief in one's capabilities of using a comput...
Over the years, the computer self-efficacy (SE) construct in IS research has gone through multiple i...
To better understand how individual differences influence the use of information technology (IT), th...
Computer self-efficacy is a commonly used construct to explore user behavior and adoption of IS syst...
Understanding an individual's use of information technology has become an important determinant of ...
One of the streams of research on individual differences within the IS field is the malleability of ...
Today students arrive in introductory computer applications courses with a wide range of computer pr...
This study examined the relationship between computer self-efficacy and learning performance and inv...
The current health care delivery system increasingly relies upon information technology (IT) to more...
Computer Self-Efficacy (CSE) has been traditionally viewed within the IS discipline as an important ...
Computer Self-Efficacy has been shown to be a critical construct in a number of research areas withi...
Integrating theory from research on training, computer self-efficacy (CSE), and motivation, this res...
Integrating theory from research on training, computer self-efficacy (CSE), and motivation, this res...
Information system researchers have recently devoted considerable attention to the concept of comput...
This paper discusses research in progress that examines the relationship between personality, comput...
This paper examines the effect of self-efficacy, belief in one's capabilities of using a comput...
Over the years, the computer self-efficacy (SE) construct in IS research has gone through multiple i...
To better understand how individual differences influence the use of information technology (IT), th...
Computer self-efficacy is a commonly used construct to explore user behavior and adoption of IS syst...
Understanding an individual's use of information technology has become an important determinant of ...
One of the streams of research on individual differences within the IS field is the malleability of ...
Today students arrive in introductory computer applications courses with a wide range of computer pr...
This study examined the relationship between computer self-efficacy and learning performance and inv...
The current health care delivery system increasingly relies upon information technology (IT) to more...
Computer Self-Efficacy (CSE) has been traditionally viewed within the IS discipline as an important ...