


default search action
Charlie C. Chen
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j40]Makoto Nakayama
, Charlie C. Chen:
Digital Distraction, Non-Digital Distraction and Psychological Bearing of Remote Workers. Interact. Comput. 35(6): 789-800 (2023) - 2022
- [j39]Makoto Nakayama, Charlie C. Chen:
Digital Distractions and Remote Work: A Balancing Act at Home. Inf. Resour. Manag. J. 35(1): 1-17 (2022) - [j38]Hoon Seok Choi, Shin-Yuan Hung, Cheng-Yung Peng, Charlie C. Chen:
Different Perspectives on BDA Usage by Management Levels. J. Comput. Inf. Syst. 62(3): 503-515 (2022) - 2021
- [j37]Shin-Yuan Hung, Charlie C. Chen, Hoon Seok Choi, Peter Ractham:
A holistic framework to examine the impact of user, organizational and data factors on the use of big data analytics systems. Inf. Res. 26(4) (2021) - 2020
- [j36]Wen-Lung Shiau
, Ye Yuan, Xiaodie Pu, Soumya Ray, Charlie C. Chen:
Understanding fintech continuance: perspectives from self-efficacy and ECT-IS theories. Ind. Manag. Data Syst. 120(9): 1659-1689 (2020) - [j35]Wen-Lung Shiau
, Xiaodie Pu, Soumya Ray, Charlie C. Chen:
Guest editorial. Ind. Manag. Data Syst. 120(12): 2153-2160 (2020)
2010 – 2019
- 2019
- [j34]Min-Fang Tsai, Shin-Yuan Hung, Wen-Ju Yu, Charlie C. Chen, David C. Yen:
Understanding physicians' adoption of electronic medical records: Healthcare technology self-efficacy, service level and risk perspectives. Comput. Stand. Interfaces 66 (2019) - [j33]Makoto Nakayama, Charlie C. Chen:
Length of Cloud Application Use on Functionality Expectation, Usability, Privacy, and Security: A Case of Google Docs. Pac. Asia J. Assoc. Inf. Syst. 11(3): 2 (2019) - 2018
- [j32]Charlie C. Chen, Steven Leon, Makoto Nakayama:
Converting music streaming free users to paid subscribers: social influence or hedonic performance. Int. J. Electron. Bus. 14(2): 128-145 (2018) - [j31]Charlie C. Chen, Steven Leon, Makoto Nakayama
:
Are You Hooked on Paid Music Streaming?: An Investigation into the Millennial Generation. Int. J. E Bus. Res. 14(1): 1-20 (2018) - [j30]Charlie C. Chen, Makoto Nakayama, Yongyi Shou, Danuvasin Charoen:
Increasing Project Success in China from the Perspectives of Project Risk, Methodology, Tool Use, and Organizational Support. Int. J. Inf. Technol. Proj. Manag. 9(1): 40-58 (2018) - [c19]Xiaogang Chen, Darrell Carpenter, Xue Li, Charlie C. Chen, Shin-Yuan Hung:
Why do Individuals Continue Using Mobile Payments - A Qualitative Study in China. HICSS 2018: 1-10 - 2016
- [j29]Laddawan Kaewkitipong, Charlie C. Chen, Peter Ractham
:
A community-based approach to sharing knowledge before, during, and after crisis events: A case study from Thailand. Comput. Hum. Behav. 54: 653-666 (2016) - [j28]Laddawan Kaewkitipong, Charlie C. Chen, Peter Ractham
:
Using social media to enrich information systems field trip experiences: Students' satisfaction and continuance intentions. Comput. Hum. Behav. 63: 256-263 (2016) - [j27]Shin-Yuan Hung, Charlie C. Chen, Ralph Keng-Jung Yeh, Li-Chia Huang:
Enhancing the use of e-learning systems in the public sector: a behavioural intention perspective. Electron. Gov. an Int. J. 12(1): 1-26 (2016) - [j26]Tien Wang, Trong Danh Duong, Charlie C. Chen:
Intention to disclose personal information via mobile applications: A privacy calculus perspective. Int. J. Inf. Manag. 36(4): 531-542 (2016) - [j25]Charlie C. Chen, Makoto Nakayama:
Key factors increasing the trust and intention to adopt standard cloud-based applications. Int. J. Inf. Syst. Chang. Manag. 8(2): 144-159 (2016) - [j24]Tien Wang, Ralph Keng-Jung Yeh, Charlie C. Chen, Zorikto Tsydypov
:
What drives electronic word-of-mouth on social networking sites? Perspectives of social capital and self-determination. Telematics Informatics 33(4): 1034-1047 (2016) - [c18]Makoto Nakayama, B. Dawn Medlin, Charlie C. Chen, Sandra A. Vannoy:
Key Factors Increasing the Trust and Intention to Adopt Standard Cloud-based Applications. PACIS 2016: 229 - 2015
- [j23]Charlie C. Chen, Makoto Nakayama
, Peter Ractham
:
The Impact of Social Influence, Information Quality and Online Forum Features on the Credibility of Doctors and Hospitals for Medical Tourism Services. Int. J. Heal. Inf. Syst. Informatics 10(4): 22-37 (2015) - [c17]B. Dawn Medlin, Sandra A. Vannoy, Charlie C. Chen:
Music Piracy Among College Students. AMCIS 2015 - 2014
- [j22]Shin-Yuan Hung, Charlie C. Chen, Kuan-Hsiuang Wang:
Critical Success Factors for the Implementation of Integrated Healthcare Information Systems Projects: An Organizational Fit Perspective. Commun. Assoc. Inf. Syst. 34: 39 (2014) - [c16]Laddawan Kaewkitipong, Charlie C. Chen, Peter Ractham
:
The Use of Social Media to Enrich Information Systems Field Trip Experiences. ICE-B 2014: 14-21 - [c15]Hsiang-Lin Wu, Shin-Yuan Hung, Charlie C. Chen:
The cognitions and Affects of Moral attitude toward Software Piracy Intention. PACIS 2014: 315 - [c14]Charlie C. Chen, Peter Ractham, Laddawan Kaewkitipong:
The Community-Based Model of using Social Media to Share Knowledge to Combat crises. PACIS 2014: 387 - 2013
- [j21]Shin-Yuan Hung, Wen-Ju Yu, Charlie C. Chen, Jung-Chang Hsu:
Enhancing Organizational Fit Factors to Achieve ERP Project Success. Pac. Asia J. Assoc. Inf. Syst. 5(1): 4 (2013) - [j20]Sandra A. Vannoy, Charlie C. Chen, B. Dawn Medlin:
Investigating the impact of differences in kind upon resource consumption in web-based social networks. Soc. Netw. Anal. Min. 3(3): 437-456 (2013) - [c13]Peter Ractham, Charlie C. Chen, Makoto Nakayama:
The Trust in Online Discussion Forums and How they Influence Patients' Intention to Adopt Medical Tourism Services . DCNET/ICE-B/OPTICS 2013: 298-305 - [c12]Charlie C. Chen, Peter Ractham:
Adopting Internet Telephony Technology as a Cross-Cultural Communication Training Tool. PACIS 2013: 207 - 2012
- [j19]Charlie C. Chen, Alanah Mitchell, D. Scott Hunsinger:
Understanding Continuance of Using VoIP Applications to Improve Intercultural Communication: Information and System Quality Perspectives. Int. J. Soc. Organ. Dyn. IT 2(1): 1-16 (2012) - [c11]Peter Ractham, Charlie C. Chen:
The Efficacy of Social Learning Technology on Case-based Learning: A Task-Technology Perspective. AMCIS 2012 - [c10]Peter Ractham, Charlie C. Chen:
Affective and Social Factors Influencing the Continuance Intention of Using Social Technology for the Case-based Learning. CONF-IRM 2012: 31 - [c9]Laddawan Kaewkitipong, Charlie C. Chen, Peter Ractham:
Lessons Learned from the Use of Social Media in Combating a Crisis: a Case Study of 2011 Thailand Flooding Disaster. ICIS 2012 - [c8]Shin-Yuan Hung, Wen-Ju Yu, Charlie C. Chen, Jung-Chang Hsu:
Managing ERP Success by Enhancing Key Project Management And Organizational Fit Factors. PACIS 2012: 89 - 2011
- [j18]Charlie C. Chen:
Cloud Computing in Case-Based Pedagogy: An Information Systems Success Perspective. Int. J. Dependable Trust. Inf. Syst. 2(3): 1-16 (2011) - [j17]Sandra A. Vannoy, B. Dawn Medlin, Charlie C. Chen:
Enhancing the Trust of Members in Online Social Networks: An Integrative Technical and Marketing Perspective. Int. J. Virtual Communities Soc. Netw. 3(4): 15-31 (2011) - [j16]Charlie C. Chen, Julie Yu-Chih Liu
, Houn-Gee Chen:
Discriminative effect of user influence and user responsibility on information system development processes and project management. Inf. Softw. Technol. 53(2): 149-158 (2011) - 2010
- [j15]Chuck C. H. Law, Charlie C. Chen, Bruce J. P. Wu:
Managing the full ERP life-cycle: Considerations of maintenance and support requirements and IT governance practice as integral elements of the formula for successful ERP adoption. Comput. Ind. 61(3): 297-308 (2010) - [j14]D. Scott Hunsinger, Judy Land, Charlie C. Chen:
Enhancing Students' Loyalty to the Information Systems Major. Int. J. Inf. Commun. Technol. Educ. 6(1): 81-95 (2010) - [c7]Charlie C. Chen, Alanah Mitchell:
Improving the Trust of Users on Social Networking Sites via Self-Construal Traits. AMCIS 2010: 5 - [c6]Alanah Mitchell, Charlie C. Chen, B. Dawn Medlin:
E-Learning to Improve Intercultural Communication. AMCIS 2010: 10
2000 – 2009
- 2009
- [j13]R. S. Shaw, Charlie C. Chen, Albert L. Harris, Hui-Jou Huang:
The impact of information richness on information security awareness training effectiveness. Comput. Educ. 52(1): 92-100 (2009) - [j12]Charlie C. Chen, Chuck C. H. Law, Samuel C. Yang:
Managing ERP Implementation Failure: A Project Management Perspective. IEEE Trans. Engineering Management 56(1): 157-170 (2009) - 2008
- [j11]Houn-Gee Chen, Charlie C. Chen, Louis Lo, Samuel C. Yang:
Online privacy control via anonymity and pseudonym: Cross-cultural implications. Behav. Inf. Technol. 27(3): 229-242 (2008) - [j10]Charlie C. Chen, Jiinpo Wu, Samuel C. Yang, Hsin-Yi Tsou:
Importance of Diversified Leadership Roles in Improving Team Effectiveness in a Virtual Collaboration Learning Environment. J. Educ. Technol. Soc. 11(1): 304-321 (2008) - [j9]Charlie C. Chen, B. Dawn Medlin, R. S. Shaw:
A cross-cultural investigation of situational information security awareness programs. Inf. Manag. Comput. Secur. 16(4): 360-376 (2008) - [j8]Jengchung V. Chen
, Charlie C. Chen, Hsiao-Han Yang:
An empirical evaluation of key factors contributing to internet abuse in the workplace. Ind. Manag. Data Syst. 108(1): 87-106 (2008) - 2007
- [j7]Charlie C. Chen, Jiinpo Wu, Richard E. Crandall:
Obstacles to the adoption of radio frequency identification technology in the emergency rooms of hospitals. Int. J. Electron. Heal. 3(2): 193-207 (2007) - [j6]Charlie C. Chen, Rong-An Shang
, Albert L. Harris:
A structurational Analysis of users and Management in a Knowledge Management system Project implementation. Int. J. Knowl. Manag. 3(4): 18-36 (2007) - 2006
- [j5]Charlie C. Chen, Rong-An Shang
, Albert L. Harris:
The Efficacy of Case Method Teaching in an Online Asynchronous Learning Environment. Int. J. Distance Educ. Technol. 4(2): 72-86 (2006) - [j4]Charlie C. Chen, R. S. Shaw:
Online Synchronous vs. Asynchronous Software Training Through the Behavioral Modeling Approach: A Longitudinal Field Experiment. Int. J. Distance Educ. Technol. 4(4): 88-102 (2006) - [j3]Charlie C. Chen, Terry Ryan, Lorne Olfman:
Online Behavior Modeling: An Effective and Affordable Software Training Method. Int. J. Web Based Learn. Teach. Technol. 1(4): 36-53 (2006) - [c5]Charlie C. Chen, Jiinpo Wu, Albert Hayashi:
Importance of Diversified Leadership Roles in Improving Team Effectiveness in a Virtual Collaboration Learning Environment. AMCIS 2006: 277 - 2005
- [j2]Charlie C. Chen, Lorne Olfman, Albert L. Harris:
Differential Impacts of Social Presence on the Behavior Modeling Approach. Int. J. Technol. Hum. Interact. 1(2): 64-84 (2005) - [c4]Rong-An Shang
, Charlie C. Chen, Ying-Ching Liu:
Internet EDI adoption factors: power, trust and vision. ICEC 2005: 101-108 - [c3]Jiinpo Wu, Charlie C. Chen, Yue Jeff Zhang, Donald L. Amoroso:
Virtual Group Learning Effectiveness via eLearning Mediums. AMCIS 2005: 306 - [c2]Charlie C. Chen, Rong-An Shang
, Yen-Chieh Yu:
Assessing the Effectiveness of Online Asynchronous Case Method. ICALT 2005: 210-212 - 2004
- [j1]Albert Hayashi, Charlie C. Chen, Terry Ryan, Jiinpo Wu:
The Role of Social Presence and Moderating Role of Computer Self-Efficacy in Predicting the Continuance Usage of E-Learning Systems. J. Inf. Syst. Educ. 15(2): 139-154 (2004) - [c1]Charlie C. Chen, Terry Ryan, Lorne Olfman:
The Efficacy of Behavior Modeling: A Comparison of Face-to-Face and Online Asynchronous Software-Training Methods. HICSS 2004
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint