1. Arnett, K.P. and Schmidt, M.B. (2005), “Busting the ghost in the machine”, Communications of the ACM, Vol. 48 No. 8, pp. 92‐5.
2. Awad, N.F. and Fitzgerald, K. (2005), “The deceptive behaviors that offend us most about spyware”, Communications of the ACM, Vol. 48 No. 8, pp. 55‐60.
3. Cheung, C. and Lee, M.K.O. (2000), “Trust in internet shopping: instrument development and validation through classical and modern approaches”, Journal of Global Information Management, Vol. 9 No. 3, pp. 23‐35.
4. DeLone, W. and McLean, E. (1992), “Information systems success: the quest for the dependent variable”, Information Systems Research, Vol. 3 No. 1, pp. 60‐95.
5. Doll, W. and Torkzadeh, G. (1988), “The measure of end‐user computing satisfaction”, MIS Quarterly, Vol. 12 No. 2, pp. 259‐74.