[1] Lipner, S. (2014) The Trustworthy Computing Security Development Lifecycle. Computer Security Applications Conference, 2004. 20th Annual. IEEE, Tucson, December 2004, 2-13.
[2] Davis, F.D. (1989) Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13, 319-340.
http://dx.doi.org/10.2307/249008
[3] Fishbein, M. and Ajzen, I. (1975) Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley, Boston.
[4] Lun, Y.B. and Xun, H.M. (2006) An Empirical Study Review on Technology Acceptance Model. Research and Development Management, 18, 93-99.
[5] Davenport, T.H. and Grover, V. (2001) General Perspectives on Knowledge Management: Fostering a Research Agenda. Journal of Management Information Systems, 18, 5-23.
[6] Ryan, R.M. and Deci, E.L. (2000) Intrinsic and Extrinsic Motivations: Classic Definitions and New Directions. Contemporary Educational Psychology, 25, 54-67.
http://dx.doi.org/10.1006/ceps.1999.1020
[7] Liu, L.N., Feng, Y.Q., Hu, Q., et al. (2011) From Transactional User to VIP: How Organizational and Cognitive Factors affect ERP Assimilation at Individual Level. European Journal of Information Systems, 20, 186-200.
http://dx.doi.org/10.1057/ejis.2010.66
[8] Guo, Y.Y. (2010) A Research on Continuous Use Influential Factors of Mobile Internet Business. Beijing University of Posts and Telecommunications, Beijing.
[9] Wesley, M., Cohen, W.M. and Levinthal, D.A. (1990) Absorptive Capacity: A New Perspective on Learning and Innovation. Administrative Science Quarterly, 35, 128-152.
http://dx.doi.org/10.2307/2393553
[10] Weber, E.U., Blais, A.R. and Betz, N.E. (2002) A Domain-Specific Risk-Attitude Scale: Measuring Risk Perceptions and Risk Behaviors. Journal of Behavioral Decision Making, 15, 263-290.
http://dx.doi.org/10.1002/bdm.414
[11] Duan, M.S., Zhang, X.L. and Gu, S.H. (2001) Innovation Diffusion Model Based on the Theory of the Micro Decision-Making. System Engineering Theory and Practice, 21, 46-51.
[12] Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989) User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science, 35, 983-1003.
http://dx.doi.org/10.1287/mnsc.35.8.982
[13] Taylor, S. and Todd, P.A. (1995) Understanding Information Technology Usage: A Test of Competing Models. Information Systems Research, 6, 144-176.
http://dx.doi.org/10.1287/isre.6.2.144
[14] Premkumar, G. and Bhattacherjee, A. (2008) Explaining Information Technology Usage: A Test of Competing Models. Omega, 36, 64-75.
http://dx.doi.org/10.1016/j.omega.2005.12.002
[15] Maslow, A.H. (1943) A Theory of Human Motivation. Psychological Review, 50, 370-396.
http://dx.doi.org/10.1037/h0054346
[16] Wahba, M.A. and Bridwell, L.G. (1976) Maslow Reconsidered: A Review of Research on the Need Hierarchy Theory. Organizational Behavior and Human Performance, 15, 212-240.
http://dx.doi.org/10.1016/0030-5073(76)90038-6
[17] Hou, J.T., Wen, Z.L. and Cheng, Z.J. (2004) Structural Equation Model and Its Application. Education Science Press, Beijing.
[18] Zeller, R.A. and Carmines, E.G. (1980) Measurement in the Social Sciences: The Link between Theory and Data. Cambridge University Press, New York.
[19] Wu, M.L. (2009) Structural Equation Model: The Operation and Application of AMOS. Chongqing University Press, Chongqing.
[20] Ma, X.Y., Lou, Z.S. and Liu, C.Y. (2011) Path Analysis of Influence of Pilot Adaptation and Anxiety Personality on Mental Health. Rehabilitation Medicine in China, 20, 332-334.
[21] Liu, L.C. and Sun, K. (2012) Empirical Research on User Satisfaction and Continued Use of SaaS Outsourcing Service. Journal of Information Resources Management, 2, 26-32.
[22] Bi, L.J. (2012) Energy Conservation and Environmental Protection Car Purchase Behavior Study under Subsidy Policy. Southwest Jiaotong University, Chengdu.
[23] Liu, Y. (2011) The Empirical Study of Influence of Human Capital on Organizational Innovation. University of Electronic Science and Technology, Chengdu.