Information Technology Reference
In-Depth Information
Costabile, M.F., Fogli, D., Mussio, P., & Piccinno, A.
(2006a). End user development: The software shaping
workshop approach. In H. Lieberman, F. PaternĂ², &
V. Wulf. (Eds.),
End user development
(pp. 183-205).
Dordrecht, The Netherlands: Springer.
about online privacy
(AT&T Labs-Research Technical
Report TR 99.4.3). Retrieved from http://www.research.
att.com/projects/privacystudy/
Cronan, T.P., & Al-Rafee, S. (2007). Factors that influ-
ence the intention to pirate software and media.
Journal
of Business Ethics
.
Costabile, M.F., Fogli, D., Lanzilotti, R., Mussio, P., &
Piccinno, A. (2006b). Supporting work practice through
end user development environments.
Journal of Organi-
zational and End User Computing
,
18
(4), 43-65.
Cronan, T.P., Leonard, L.N.K., & Kreie, J. (2005). An
empirical validation of perceived importance and be-
havior intention in IT ethics.
Journal of Business Ethics,
56
(3), 231-238.
Costabile, M.F., Fogli, D., Marcante, A., & Piccinno, A.
(2006c). Supporting interaction and co-evolution of users
and systems. In A. Celentano & P. Mussio (Eds.),
Pro-
ceedings of the International Conference on Advanced
Visual Interfaces (AVI 2006)
, Venice, Italy (pp. 143-150).
New York: ACM Press.
Crosby, L. A., Evans, K. R., & Cowles, D. (1990). Relation-
ship quality in services selling: An interpersonal influence
perspective.
Journal of Marketing
,
54
(3), 68-81.
Crosby, L. A., & Stephens, N. (1987). Effects of relation-
ship marketing on satisfaction, retention, and prices in the
life insurance industry.
Journal of Marketing Research
,
24
(4), 404-411.
Costabile, M.F., Fogli, D., Mussio, P., & Piccinno, A. (in
press). Visual interactive systems for end-user develop-
ment: A model-based design methodology.
IEEE Transac-
tions on Systems, Men and Cybernetics: Part A
.
Crotts, J. C., & Erdmann, R. (2000). Does national culture
influence consumers' evaluation of travel services? A
test of Hofstede's model of cross-cultural differences.
Managing Service Quality
,
10
(5), 410-419.
Cragan, J. F., & Shields, D. C. (1998).
Understanding
communication theory. The communicative forces for
human action
. Boston: Allyn and Bacon.
Crowell, W. (2001). Trust, the e-commerce difference.
Credit Card Management,
14
(5), 80.
Cragg, P. G., & King, M. (1993). Spreadsheet modelling
abuse: An opportunity for OR?
Journal of the Operational
Research Society, 44
(8), 743-752.
Culnan, M.J. (1995). Consumer awareness of name
removal procedures: Implications for direct marketing.
Journal of Direct Marketing, 9
(2), 10-20.
Craig Jr., J. (2000). AICPA modifies WebTrust to respond
to marketplace.
The Trusted Professional, 6
, 3-4.
Culnan, M.J., & Bies, R. (2003). Consumer privacy:
Balancing economic and justice considerations.
Journal
of Social Issues, 59
(2), 323-342.
Cranor, L. F. (1998). Internet privacy: A public concern.
netWorker: The Craft of Network Computing, 2
(2),
13-18.
Culnan, M. J. (1993). How did they get my name? An
exploratory investigation of consumer attitudes toward
secondary information use.
MIS Quarterly, 17
(3), 341-
361.
Cranor, L. F., Byers, S., & Kormann, D. (2003).
An analy-
sis of P3P deployment on commercial, government, and
children's Web sites as of May 2003
(Technical Report
prepared for the 14 May 2003 Federal Trade Commis-
sion Workshop on Technologies for Protecting Personal
Information). Retrieved from http://www.research.att.
com/projects/p3p/
Culnan, M. J. (1999).
Georgetown Internet privacy
policy survey: Report to the Federal Trade Commission
.
Retrieved from http://www.msb.edu/faculty/culnanm/
gippshome.html
Cranor, L. F., Reagle, J., & Ackerman, M. S. (1999).
Beyond concern: Understanding net users' attitudes
Search WWH ::
Custom Search