Information Technology Reference
In-Depth Information
Al-Rafee, S., & Cronan, T.P. (2005). Digital piracy: Fac-
tors that influence attitude toward behavior (Working
Paper). Information Systems Department, University of
Arkansas, Fayetteville, AR.
Kanstrup, A.M. Roskilde, & D.K. Universitesforlag
(Eds.), E-learning at work (pp. 131-147, in Danish).
Ashton, R., & Kramer, S. (1980). Students as surrogates in
behavioral accounting research: Some evidence. Journal
of Accounting Research, 18 (1), 1-3.
Amoroso, D. L., & Cheney, P. H. (1992). Quality end
user-developed applications: Some essential ingredients.
Data Base, 23 (1), 1-11.
Atkinson, R. (2002, May). Biometrics drivers' licenses
on the cards. Biometric Technology Today, 10 (5), 1-2.
Anderson, E., & Weitz, B. (1992). The use of pledges to
build and sustain commitment in distribution channels.
Journal of Marketing Research , 29 (1), 18-34.
Atkinson, M., & Kydd, C. (1997). Individual characteris-
tics associated with World Wide Web use: An empirical
study of playfulness and motivation. The DATA BASE for
Advances in Information Systems, 28 (2), 53-62.
Anderson, J. C., & Gerbing, D. W. (1988). Structural
equation modeling in practice: A review and recom-
mended two-step approach. Psychological Bulletin ,
103 (3), 411-423.
Australian Bureau of Statistics. (2001). Use of the Internet
by householder: Australia (Catalogue: 8147.0). Canberra,
Australia: Government Printing Office.
Andrade, E. B., Kaltechva, V., & Weitz, B. (2002). Self-
disclosure on the Web: The impact of privacy policy,
reward, and company reputation. Advances in Consumer
Research , 29, 350-353.
Australian Bureau of Statistics. (2004). Measures of a
knowledge-based economy and society: Australia infor-
mation and communications technology indicators. Re-
trieved August 4, 2007, from http://www. abs.gov.au
Andreassen, T. W. (2000). Antecedents to satisfaction
with service recovery. European Journal of Marketing ,
34 (1/2), 156-175.
Ausubel, D. P. (1968). Educational psychology, a cogni-
tive view . New York: Holt, Rinehart and Winston, Inc.
Bagozzi, R. P. (1995). Reflections on relationship mar-
keting in consumer markets. Journal of the Academy of
Marketing Science , 23 (4), 272-277.
Arent, L. (1999). ATM wants to be your friend. Retrieved
August 6, 2007, from Wired News, http://www.wired.
com
Balaban, M., Barzilay, E., & Elhadad, M. (2002). Ab-
straction as a means for end-user computing in creative
applications. IEEE Transactions on Systems, Man, and
Cybernetics: Part A , 32 (6), 640-653.
Armstrong, H.L., & Forde, P.J. (2003). Internet anonymity
practices in computer crime. Information Management
& Computer Security, 11 (5), 209-215.
Arondi, S., Baroni, P., Fogli, D., & Mussio, P. (2002).
Supporting co-evolution of users and systems by the
recognition of interaction patterns. In M. De Marsico,
S. Levialdi, & E. Panizzi (Eds.), Proceedings of the
International Conference Advanced Visual Interfaces
(AVI 2002) , Trento, Italy (pp. 177-189). New York: ACM
Press.
Bandura, A. (1986). S ocial foundations of thought and
action: A social cognitive theory . Upper Saddle River,
NJ: Prentice Hall.
Bandura, A. (1997). Self-efficacy: The exercise of control.
New York: W.H. Freeman & Co.
Banerjee, D., Cronan, T.P., & Jones, T.W. (1998). Modeling
IT ethics: A study in situational ethics. MIS Quarterly,
22 (1), 31-60.
Aronson, E. (1972). The social animal . San Francisco,
CA: W. H. Freeman and Company.
Åsand, H.-R.H., Mørch, A., & Ludvigsen, S. (2004).
Super users: A strategy for ICT-introduction. In A.M.
Bansler, J.P., & Havn, E. (1994). Information systems
development with generic systems. In W.R.J. Baets
(Ed.), Proceedings of the 2nd European Conference on
Search WWH ::




Custom Search