Information Technology Reference
In-Depth Information
Costabile, M.F., Fogli, D., Mussio, P., & Piccinno, A.
(2006a). End user development: The software shaping
workshop approach. In H. Lieberman, F. PaternĂ², &
V. Wulf. (Eds.), End user development (pp. 183-205).
Dordrecht, The Netherlands: Springer.
about online privacy (AT&T Labs-Research Technical
Report TR 99.4.3). Retrieved from http://www.research.
att.com/projects/privacystudy/
Cronan, T.P., & Al-Rafee, S. (2007). Factors that influ-
ence the intention to pirate software and media. Journal
of Business Ethics .
Costabile, M.F., Fogli, D., Lanzilotti, R., Mussio, P., &
Piccinno, A. (2006b). Supporting work practice through
end user development environments. Journal of Organi-
zational and End User Computing , 18 (4), 43-65.
Cronan, T.P., Leonard, L.N.K., & Kreie, J. (2005). An
empirical validation of perceived importance and be-
havior intention in IT ethics. Journal of Business Ethics,
56 (3), 231-238.
Costabile, M.F., Fogli, D., Marcante, A., & Piccinno, A.
(2006c). Supporting interaction and co-evolution of users
and systems. In A. Celentano & P. Mussio (Eds.), Pro-
ceedings of the International Conference on Advanced
Visual Interfaces (AVI 2006) , Venice, Italy (pp. 143-150).
New York: ACM Press.
Crosby, L. A., Evans, K. R., & Cowles, D. (1990). Relation-
ship quality in services selling: An interpersonal influence
perspective. Journal of Marketing , 54 (3), 68-81.
Crosby, L. A., & Stephens, N. (1987). Effects of relation-
ship marketing on satisfaction, retention, and prices in the
life insurance industry. Journal of Marketing Research ,
24 (4), 404-411.
Costabile, M.F., Fogli, D., Mussio, P., & Piccinno, A. (in
press). Visual interactive systems for end-user develop-
ment: A model-based design methodology. IEEE Transac-
tions on Systems, Men and Cybernetics: Part A .
Crotts, J. C., & Erdmann, R. (2000). Does national culture
influence consumers' evaluation of travel services? A
test of Hofstede's model of cross-cultural differences.
Managing Service Quality , 10 (5), 410-419.
Cragan, J. F., & Shields, D. C. (1998). Understanding
communication theory. The communicative forces for
human action . Boston: Allyn and Bacon.
Crowell, W. (2001). Trust, the e-commerce difference.
Credit Card Management, 14 (5), 80.
Cragg, P. G., & King, M. (1993). Spreadsheet modelling
abuse: An opportunity for OR? Journal of the Operational
Research Society, 44 (8), 743-752.
Culnan, M.J. (1995). Consumer awareness of name
removal procedures: Implications for direct marketing.
Journal of Direct Marketing, 9 (2), 10-20.
Craig Jr., J. (2000). AICPA modifies WebTrust to respond
to marketplace. The Trusted Professional, 6 , 3-4.
Culnan, M.J., & Bies, R. (2003). Consumer privacy:
Balancing economic and justice considerations. Journal
of Social Issues, 59 (2), 323-342.
Cranor, L. F. (1998). Internet privacy: A public concern.
netWorker: The Craft of Network Computing, 2 (2),
13-18.
Culnan, M. J. (1993). How did they get my name? An
exploratory investigation of consumer attitudes toward
secondary information use. MIS Quarterly, 17 (3), 341-
361.
Cranor, L. F., Byers, S., & Kormann, D. (2003). An analy-
sis of P3P deployment on commercial, government, and
children's Web sites as of May 2003 (Technical Report
prepared for the 14 May 2003 Federal Trade Commis-
sion Workshop on Technologies for Protecting Personal
Information). Retrieved from http://www.research.att.
com/projects/p3p/
Culnan, M. J. (1999). Georgetown Internet privacy
policy survey: Report to the Federal Trade Commission .
Retrieved from http://www.msb.edu/faculty/culnanm/
gippshome.html
Cranor, L. F., Reagle, J., & Ackerman, M. S. (1999).
Beyond concern: Understanding net users' attitudes
Search WWH ::




Custom Search