Information Technology Reference
In-Depth Information
Culnan, M. J., & Armstrong, P. K. (1999). Information
privacy concerns, procedural fairness, and impersonal
trust: An empirical investigation. Organization Science,
10 (1), 104-115.
Davis, F. (1989, September). Perceived usefulness, per-
ceived ease of use, and user acceptance of information
technology. MIS Quarterly , pp. 319-340.
Davis, G. B. (1988). The hidden costs of end-user com-
puting. Accounting Horizons, 2 (4), 103-106.
Culnan, M. J., & Markus, M. L. (1987). Information
technologies. Handbook of Organizational Communi-
cation , 420-443.
de Alfaro, L., & Henzinger, T.A. (2001). Interface au-
tomata. In Proceedings of the 8th European Software
Engineering Conference held jointly with the 9th AC-
MSIGSOFT International Symposium on Foundations
of Software Engineering, Vienna, Austria (pp. 109-120).
ACM Press.
Cunningham, P. J. (2002). Are cookies hazardous to
your privacy? Information Management Journal, 36 (3),
52-54.
Cypher, A. (Ed.). (1993). Watch what I do: Programming
by demonstration. Cambridge, MA: The MIT Press.
De Beauvoir, S. (1952). The second sex . New York:
Vintage Books.
Dale, L. (2001). Mobile biometric devices help in law
enforcement. Biometric Technology Today, 9 (8), 6-7.
De Vaus, D. (2001). Research design in social research .
London: Sage Publications.
Daly, J. P., Pouder, R. W., & Kabanoff, B. (2004). The
effects of initial differences in firms' espoused values on
their postmerger performance. The Journal of Applied
Behavioral Science, 40 (3), 323-343.
Dean, K. (2002). College seeks security in thumbs. Re-
trieved August 6, 2007, from Wired News, http://www.
wired.com
Dann, G. (1993). Limitations in the use of nationality and
country of residence variables. In D. Pearce, & R. Butler
(Eds.), Tourism research: Critiques and challenges (pp.
88-112). London: Routledge.
Dean, H., & Biswas, A. (2001). Third-party organization
endorsement of products: An advertising cue affecting
consumer pre-purchase evaluation of goods and services.
Journal of Advertising, 30 (4), 41-57.
Danna, A., & Gandy, O. H., Jr. (2002). All that glitters
is not gold: Digging beneath the surface of data mining.
Journal of Business Ethics, 40 , 373-386.
Deane, F., Barrelle, K., Henderson, R., & Mahar, D.
(1995). Perceived acceptability of biometric security
systems. Computers and Security, 14 , 225-231.
Davis, F. D. (1993). User acceptance of information
technology: System characteristics, user perceptions
and behavioral impacts. International Journal of Man-
Machine Studies, 38 (3), 475-487.
Deaux, K., & Kite, M. E. (1993). Gender stereotypes.
In F. Denmark, & M. Paludi (Eds.), Handbook on the
psychology of women (pp. 107-139). Westport, CT:
Greenwood Press.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989).
User acceptance of computer technology: A comparison
of two theoretical models. Management Science, 35 (8),
982-1003.
Delaney, E. M., Goldstein, C. E., Gutterman, J., & Wagner,
S. N. (2003). Automated computer privacy preferences
slowly gain popularity. Intellectual Property & Technol-
ogy Law Journal, 15 (8), 17.
Davis, S., & Bostrom, R. (1993). Training end users: An
experimental investigation of the roles of the computer
interface and training methods. MIS Quarterly, 17 (1),
61-79.
Dennis, A. R., George, J. F., Jessup, L. M., Nunamaker,
J. F., & Vogel, D.R. (1988). Information technology
to support electronic meetings. MIS Quarterly, 12 (4),
591-616.
Search WWH ::




Custom Search