Information Technology Reference
In-Depth Information
Information Systems, Nijenrode University (pp. 30-31).
Breukelen: Nijenrode University Press.
Benassi, P. (1999). TRUSTe: An online privacy seal pro-
gram. Communications of the ACM, 42 (2), 56-59.
Barclay, D.W., Higgins, C.A., & Thompson, R.L. (1995).
The partial least squares approach to causal modeling:
Personal computer adoption and use as an illustration.
Technology Studies: Special Issue on Research Meth-
odology, 2 (2), 285-324.
Benham, H., Delaney, M., & Luzi, A. (1993). Structured
techniques for successful end user spreadsheets. Journal
of End User Computing, 5 (2), 18-25.
Benson, D. H. (1983). A field study of end user computing:
Findings and issues. MIS Quarterly, 7 (4), 35-45.
Barkhi, R., Jacob, V. S., Pipino, L., & Pirkul, H. (1998).
A study of the effect of communication channel and
authority on group decision processes and outcomes.
Decision Support Systems, 23 (3), 205-226.
Berger, C. R. (1979). Beyond initial interactions: Un-
certainty, understanding and the development of inter-
personal relationships. In H. Giles, & R. Sinclair (Eds.),
Language and social psychology (pp. 122-144). Oxford:
Basil Blackwell.
Baron, A. (2003). A developer's introduction to Web parts.
Retrieved August 10, 2007, from http://msdn.microsoft.
com/library/
Berger, C. R., & Bradac, J. J. (1982). Language and so-
cial knowledge: Uncertainty in interpersonal relations .
London: Arnold.
Bartsch, R. A., Burnett, T., Diller, T. R., & Rankin-Wil-
liams, E. (2000). Gender representation in television
commercials: Updating and update. Sex Roles , 43 (9/10),
735-743.
Berger, C. R., & Calabrese, R. J. (1975). Some explorations
in initial interaction and beyond: Toward a developmental
theory of interpersonal communication. Human Com-
munication Theory, 1 , 99-112.
Bauer, M. W. (2000). Classical content analysis: A
review. In M.W. Bauer, & G. Gaskel (Eds.), Qualitative
researching with text, image and sound (pp. 131-151).
London: Sage.
Bergeron, F., & Berube, C. (1988). The management of
the end-user environment: An empirical investigation.
Information & Management, 14 , 107-113.
Baumer, D. L., Poindexter, J. C., & Earp, J. B. (2004).
Meaningful and meaningless choices in cyberspace.
Journal of Internet Law, 7 (11), 3-11.
Berry, L. L. (1995). Relationship marketing of services—
Growing interest, emerging perspectives. Journal of the
Academy of Marketing Science , 23 (4), 236-245.
BBBOnline. (2004). Retrieved from http://www.bbbon-
line.org/privacy/
Bhatnagar, A., Misra, S., & Rao, H.R. (2000). On risk,
convenience and Internet shopping behaviour. Com-
munications of the ACM, 43 , 98-105.
Beiser, V. (1999). Biometrics breaks into prisons. Re-
trieved August 6, 2007, from Wired News, http://www.
wired.com
Bhattacharjee, S., Gopal, R.D., & Sanders, G.L. (2003).
Digital music and online sharing: Software piracy 2.0?
Communication of the ACM, 46 (7), 107-111.
Belanger, F., Hiller, J.S., & Smith, W. J. (2002). Trust-
worthiness in electronic commerce: The role of privacy,
security, and site attributes. The Journal of Strategic
Information Systems, 11 (3/4), 245-270.
Bhattacherjee, A., & Premkumar, G. (2004). Understand-
ing changes in belief and attitude toward information
technology usage: A theoretical model and longitudinal
test. Management Information Systems Quarterly, 28 (2),
229-254.
Bellman, S., Johnson, E., Kobrin, S., & Lohse, G.
(2004). International differences in information privacy
concerns: A global survey of consumers. Information
Society, 20 (5), 313-324.
Bhattacherjee, A. (2001). Understanding information
systems continuance: An expectation-confirmation
model. MIS Quarterly , 25 (3), 351-370.
Search WWH ::




Custom Search