Information Technology Reference
In-Depth Information
Information Systems,
Nijenrode University (pp. 30-31).
Breukelen: Nijenrode University Press.
Benassi, P. (1999). TRUSTe: An online privacy seal pro-
gram.
Communications of the ACM, 42
(2), 56-59.
Barclay, D.W., Higgins, C.A., & Thompson, R.L. (1995).
The partial least squares approach to causal modeling:
Personal computer adoption and use as an illustration.
Technology Studies: Special Issue on Research Meth-
odology, 2
(2), 285-324.
Benham, H., Delaney, M., & Luzi, A. (1993). Structured
techniques for successful end user spreadsheets.
Journal
of End User Computing, 5
(2), 18-25.
Benson, D. H. (1983). A field study of end user computing:
Findings and issues.
MIS Quarterly, 7
(4), 35-45.
Barkhi, R., Jacob, V. S., Pipino, L., & Pirkul, H. (1998).
A study of the effect of communication channel and
authority on group decision processes and outcomes.
Decision Support Systems,
23
(3), 205-226.
Berger, C. R. (1979). Beyond initial interactions: Un-
certainty, understanding and the development of inter-
personal relationships. In H. Giles, & R. Sinclair (Eds.),
Language and social psychology
(pp. 122-144). Oxford:
Basil Blackwell.
Baron, A. (2003).
A developer's introduction to Web parts.
Retrieved August 10, 2007, from http://msdn.microsoft.
com/library/
Berger, C. R., & Bradac, J. J. (1982).
Language and so-
cial knowledge: Uncertainty in interpersonal relations
.
London: Arnold.
Bartsch, R. A., Burnett, T., Diller, T. R., & Rankin-Wil-
liams, E. (2000). Gender representation in television
commercials: Updating and update.
Sex Roles
,
43
(9/10),
735-743.
Berger, C. R., & Calabrese, R. J. (1975). Some explorations
in initial interaction and beyond: Toward a developmental
theory of interpersonal communication.
Human Com-
munication Theory, 1
, 99-112.
Bauer, M. W. (2000). Classical content analysis: A
review. In M.W. Bauer, & G. Gaskel (Eds.),
Qualitative
researching with text, image and sound
(pp. 131-151).
London: Sage.
Bergeron, F., & Berube, C. (1988). The management of
the end-user environment: An empirical investigation.
Information & Management, 14
, 107-113.
Baumer, D. L., Poindexter, J. C., & Earp, J. B. (2004).
Meaningful and meaningless choices in cyberspace.
Journal of Internet Law, 7
(11), 3-11.
Berry, L. L. (1995). Relationship marketing of services—
Growing interest, emerging perspectives.
Journal of the
Academy of Marketing Science
,
23
(4), 236-245.
BBBOnline. (2004). Retrieved from http://www.bbbon-
line.org/privacy/
Bhatnagar, A., Misra, S., & Rao, H.R. (2000). On risk,
convenience and Internet shopping behaviour.
Com-
munications of the ACM, 43
, 98-105.
Beiser, V. (1999). Biometrics breaks into prisons. Re-
trieved August 6, 2007, from Wired News, http://www.
wired.com
Bhattacharjee, S., Gopal, R.D., & Sanders, G.L. (2003).
Digital music and online sharing: Software piracy 2.0?
Communication of the ACM, 46
(7), 107-111.
Belanger, F., Hiller, J.S., & Smith, W. J. (2002). Trust-
worthiness in electronic commerce: The role of privacy,
security, and site attributes.
The Journal of Strategic
Information Systems, 11
(3/4), 245-270.
Bhattacherjee, A., & Premkumar, G. (2004). Understand-
ing changes in belief and attitude toward information
technology usage: A theoretical model and longitudinal
test.
Management Information Systems Quarterly, 28
(2),
229-254.
Bellman, S., Johnson, E., Kobrin, S., & Lohse, G.
(2004). International differences in information privacy
concerns: A global survey of consumers.
Information
Society, 20
(5), 313-324.
Bhattacherjee, A. (2001). Understanding information
systems continuance: An expectation-confirmation
model.
MIS Quarterly
,
25
(3), 351-370.
Search WWH ::
Custom Search