Information Technology Reference
In-Depth Information
Buchanan, T., Paine, C., Joinson, A.N., & Reips, U.
(2007). Development of measures of online privacy
concern and protection for use on the Internet. Journal
of the American Society for Information Science and
Technology, 58 (2), 157-165.
Cappel, J.J., & Windsor, J.C. (1998). A comparative
investigation of ethical decision making: Information
systems professionals versus students. Database for
Advances in Information Systems, 29 (2), 20-34.
Carmien, S., Dawe, M., Fischer, G., Gorman, A., Kintsch,
A., & Sullivan, J.F. (2005). Socio-technical environments
supporting people with cognitive disabilities using public
transportation. ACM Transactions on Computer Human
Interaction , 12 (2), 233-262.
Buchholz, R.A., & Rosenthal, S.B. (2002). Internet
privacy: Individual rights and the common good. SAM
Advanced Manangement Journal, 67 (1), 34-41.
Buckner, T., Hesmer, S., Fischer, P., & Schuster, I. (2003).
Portlet development guide. IBM. Retrieved August 10,
2007, from http://www-128.ibm.com/developerworks/
websphere/zones/portal/portlet/portletdevelopment-
guide.html
Carrara, P., Fogli, D., Fresta, G., & Mussio, P. (2002).
Toward overcoming culture, skill and situation hurdles
in human-computer interaction. International Journal
Universal Access in the Information Society, 1 (4), 288-
304.
Carroll, J.M., Kellogg, W.A., & Rosson, M.B. (1992).
The task-artifact cycle. In J.M. Carroll (Ed.), Designing
interaction: Psychology at the human-computer interface
(Cambridge Series on Human-Computer Interaction, pp.
74-102). Cambridge University Press.
Bureau of Justice. (2005). Bureau of Justice statistics:
Criminal victimization. Retrieved August 6, 2007, from
http://www.ojp.usdoj.gov/bjs/cvictgen.htm.
Burn, J. M., & Loch, K. D. (2001). The societal impact
of the World Wide Web: Key challenges for the 21st
century. Information Resources Management Journal,
14 (4), 4-14.
Caudill, E. M., & Murphy, P. E. (2000). Consumer online
privacy: Legal and ethical issues. Journal of Public Policy
& Marketing, 19 (1), 7-19.
Burnett, M., Cook, C., & Rothermel, G. (2004). End-user
software engineering. Communications of the ACM ,
47 (9), 53-58.
Chaiklin, S., & Lave, J. (Eds.). (1993). Understanding
practice: Perspectives on activity and context . Cam-
bridge, MA: Cambridge University Press.
Busch, P., & Wilson, D. (1976). An experimental analysis
of a salesman's expert and referent bases of social power
in the buyer-seller dyad. Journal of Marketing Research ,
13 (1), 3-11.
Chan, Y. E., & Storey, V. C. (1996). The use of spread-
sheets in organizations: Determinants and consequences.
Information & Management, 31 , 119-134.
Button, G. (Ed.) (1993). Technology in working order:
Studies of work, interaction and technology. New York:
Routledge.
Charters, D. (2002). Electronic monitoring and privacy
issues in business-marketing: The ethics of the double
click experience. Journal of Business Ethics, 35 (4),
243-255.
Cabri, G., Loeonardi, L., & Zambonelli, F. (1998). Reac-
tive tuple spaces for mobile agent coordination. LNCS,
1477 , 237-248. Springer.
Chau, P., & Hu, P. (2001). Information technology accep-
tance by individual professionals: A model comparison
approach. Decision Sciences, 32 (4), 699-719.
Callow, K. (1998). Man and message. A guide to mean-
ing-based text analysis . Boston: University Press of
America.
Chen, L., Gillenson, M., & Sherrell, D. (2002). Enticing
online consumers: An extended technology acceptance
perspective. Information and Management, 39 , 705-
719.
Campbell, M.C., & Goodstein, R.C. (2001). The moderat-
ing effect of perceived risk on consumers' evaluations of
product incongruity: Preference for the norm. Journal
of Consumer Research, 28 (3), 439-450.
Search WWH ::




Custom Search