Information Technology Reference
In-Depth Information
Department of Communications Information Technology
and the Arts. (2002). Consumer privacy fact sheet. Re-
trieved August 4, 2007, from http://www.dcita.gov.au
Douglas, D.E., Cronan, T.P., & Behel, J.D. (2006). Equity
perceptions as a deterrent to software piracy behavior
(Working Paper). Information Systems Department,
University of Arkansas, Fayetteville, AR.
DeSanctis, G., & Gallupe, R. (1987). A foundation for the
study of group decision support systems. Management
Science, 33 (5), 589-609.
Dowling, G.R., & Staelin, R. (1994). A model of per-
ceived risk and intended risk handling activity. Journal
of Consumer Research, 21 (1), 119-154.
DeSarbo, W., & Harshman, R. (1985). Celebrity brand
congruence analysis. Current Issues and Research in
Advertising, 8 (1), 17-52.
Downey, J. P. (2004). Towards a comprehensive frame-
work: EUC research issues and trends (1990-2000).
Journal of Organizational and End User Computing,
16 (4), 1-16.
Dess, G. G., & Orieger, N. K. (1987). Environment
structure and consensus in strategy formulation: A con-
ceptual integration. Academy of Management Review,
12 (2), 313-330.
Dubinsky, A., & Loken, B. (1989). Analyzing ethical
decision making in marketing. Journal of Business
Research, 19 (2), 83-107.
Dhillon, G. S., & Moores, T. T. (2001). Internet privacy:
Interpreting key issues. Information Resources Manage-
ment Journal, 14 (4), 33-37.
Dwyer, F. R., Schurr, P. H., & Oh, S. (1987). Develop-
ing buyer-seller relationships. Journal of Marketing ,
51 (2), 11-27.
Dickson, G. W., Lee-Partridge, J., & Robinson, L. H.
(1993). Exploring ,modes of facilitative support for GDSS
technology. MIS Quarterly, 17 (2), 173-194.
Dyck, J. L., Gee, N. R., & Smither, J. A. (1998). The chang-
ing construct of computer anxiety for younger and older
adults. Computers in Human Behavior, 14 (1), 61-77.
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., &
Colautti, C. (2006). Internet users' privacy concerns
and beliefs about government surveillance: An explor-
atory study of differences between Italy and the United
States. Journal of Global Information Management,
14 (4), 57-93.
Eagly, A. H. (1987). Sex differences in social behavior:
A social-role interpretation . Hillsdale, NJ: Erlbaum.
Easton, A., George, J. F., Nunamaker, J. F., & Pendergast,
M. O. (1990). Using two different electronic meeting
system tools for the same task: An experimental com-
parison. Journal of Management Information Systems,
7 (1), 85-100.
Dommeyer, C. J., & Gross, B. L. (2003). What consumers
know and what they do: An investigation of consumer
knowledge, awareness, and use of privacy protection strat-
egies. Journal of Interactive Marketing, 17 (2), 34-51.
Ebenkamp, B. (2002). Brand keys to travel sites. Brand-
week, 43 (25), 19.
Döring, N. (2002). Personal home pages on the Web:
A review of research. Journal of Computer-Mediated
Communication, 7 (3). Retrieved from http://www.ascusc.
org/jcmc/vol7/issue3/doering.html
Edge Diagrammed. (2006). Retrieved August 10, 2007,
from http://www.pacestar.com/edge/
Edwards, R. (1997). Changing places: Flexibility, lifelong
learning, and a learning society. London: Routledge.
Doucet, F., Shukla, S., Gupta, R., & Otsuka, M. (2002).
An environment for dynamic component composition for
efficient co-design. In Proceedings of the Design, Automa-
tion, and Test in Europe Conference, Paris (pp. 736-744).
IEEE Computer Society.
Eirinaki, M., & Vazirgiannis, M. (2003). Web mining
for Web personalization. ACM Transactions on Internet
Technology, 3 (1), 1-27.
Eisenberg, M. (1995). Programmable applications: Inter-
preter meets interface. SIGCHI Bulletin, 27 (2), 68-83.
Search WWH ::




Custom Search