Information Technology Reference
In-Depth Information
Buchanan, T., Paine, C., Joinson, A.N., & Reips, U.
(2007). Development of measures of online privacy
concern and protection for use on the Internet.
Journal
of the American Society for Information Science and
Technology, 58
(2), 157-165.
Cappel, J.J., & Windsor, J.C. (1998). A comparative
investigation of ethical decision making: Information
systems professionals versus students.
Database for
Advances in Information Systems, 29
(2), 20-34.
Carmien, S., Dawe, M., Fischer, G., Gorman, A., Kintsch,
A., & Sullivan, J.F. (2005). Socio-technical environments
supporting people with cognitive disabilities using public
transportation.
ACM Transactions on Computer Human
Interaction
,
12
(2), 233-262.
Buchholz, R.A., & Rosenthal, S.B. (2002). Internet
privacy: Individual rights and the common good.
SAM
Advanced Manangement Journal, 67
(1), 34-41.
Buckner, T., Hesmer, S., Fischer, P., & Schuster, I. (2003).
Portlet development guide.
IBM. Retrieved August 10,
2007, from http://www-128.ibm.com/developerworks/
websphere/zones/portal/portlet/portletdevelopment-
guide.html
Carrara, P., Fogli, D., Fresta, G., & Mussio, P. (2002).
Toward overcoming culture, skill and situation hurdles
in human-computer interaction.
International Journal
Universal Access in the Information Society, 1
(4), 288-
304.
Carroll, J.M., Kellogg, W.A., & Rosson, M.B. (1992).
The task-artifact cycle. In J.M. Carroll (Ed.),
Designing
interaction: Psychology at the human-computer interface
(Cambridge Series on Human-Computer Interaction, pp.
74-102). Cambridge University Press.
Bureau of Justice. (2005). Bureau of Justice statistics:
Criminal victimization. Retrieved August 6, 2007, from
http://www.ojp.usdoj.gov/bjs/cvictgen.htm.
Burn, J. M., & Loch, K. D. (2001). The societal impact
of the World Wide Web: Key challenges for the 21st
century.
Information Resources Management Journal,
14
(4), 4-14.
Caudill, E. M., & Murphy, P. E. (2000). Consumer online
privacy: Legal and ethical issues.
Journal of Public Policy
& Marketing,
19
(1), 7-19.
Burnett, M., Cook, C., & Rothermel, G. (2004). End-user
software engineering.
Communications of the ACM
,
47
(9), 53-58.
Chaiklin, S., & Lave, J. (Eds.). (1993).
Understanding
practice: Perspectives on activity and context
. Cam-
bridge, MA: Cambridge University Press.
Busch, P., & Wilson, D. (1976). An experimental analysis
of a salesman's expert and referent bases of social power
in the buyer-seller dyad.
Journal of Marketing Research
,
13
(1), 3-11.
Chan, Y. E., & Storey, V. C. (1996). The use of spread-
sheets in organizations: Determinants and consequences.
Information & Management, 31
, 119-134.
Button, G. (Ed.) (1993).
Technology in working order:
Studies of work, interaction and technology.
New York:
Routledge.
Charters, D. (2002). Electronic monitoring and privacy
issues in business-marketing: The ethics of the double
click experience.
Journal of Business Ethics, 35
(4),
243-255.
Cabri, G., Loeonardi, L., & Zambonelli, F. (1998). Reac-
tive tuple spaces for mobile agent coordination.
LNCS,
1477
, 237-248. Springer.
Chau, P., & Hu, P. (2001). Information technology accep-
tance by individual professionals: A model comparison
approach.
Decision Sciences, 32
(4), 699-719.
Callow, K. (1998).
Man and message. A guide to mean-
ing-based text analysis
. Boston: University Press of
America.
Chen, L., Gillenson, M., & Sherrell, D. (2002). Enticing
online consumers: An extended technology acceptance
perspective.
Information and Management, 39
, 705-
719.
Campbell, M.C., & Goodstein, R.C. (2001). The moderat-
ing effect of perceived risk on consumers' evaluations of
product incongruity: Preference for the norm.
Journal
of Consumer Research, 28
(3), 439-450.
Search WWH ::
Custom Search