Information Technology Reference
In-Depth Information
the International Symposium on Applications and the
Internet Workshops (SAINTW'04)
(pp. 321-327).
Goffman, E. (1979).
Gender advertisement
. New York:
Harper and Row.
Fukuyama, R. (1995).
Trust: Social virtues and the cre-
ation of prosperity
. New York: The Free Press.
Goldsmith, R., Lafferty, B., & Newell, S. (2000). The
impact of corporate credibility and endorser celebrity on
consumer reaction to advertisement and brands.
Journal
of Advertising, 29
(3), 43-54.
Gantt, M., & Nardi, B. (1992). Gardeners and gurus: Pat-
terns of cooperation among CAD users. In
Proceedings
of the Conference on Computer-Human Interaction (CHI
'92)
(pp. 107-117). New York: ACM Press.
Gomez, J., Han, S.-K., Toma, I., Sapkota, B., & Garcia-
Crespo, A. (2006). A semantically-enhanced component-
based architecture for software composition. In
Proceed-
ings of the International Multi-Conference on Computing
in the Global Information Technology
(p. 43).
Gefen, D. (2000). E-commerce: The role of familiarity
and trust.
Omega
,
28
, 725-737.
Gefen, D., & Straub, D. W. (1997). Gender differences
in the perception and use of e-mail: An extension to the
technology acceptance model.
MIS Quarterly
,
21
(4),
389-400.
Goodwin, C. (1991). Privacy: Recognition of a consumer
right.
Journal of Public Policy and Marketing, 10
(1),
149-167.
Goodwin, C., & Goodwin, M.H. (1997). Seeing as a
situated activity: Formulating planes. In Y. Engeström
& D. Middleton (Eds.),
Cognition and communication
at work
(pp. 61-95). Cambridge, MA: Cambridge Uni-
versity Press.
George, G., & Sleeth, R. G. (2000). Leadership in
computer-mediated communication: Implications and
research directions.
Journal of Business and Psychol-
ogy,
15
(2), 287-310.
George, J. F., Easton, G. K., Nunamaker, J. F., & North-
craft, G. B. (1990). A study of collaborative group work
with and without computer-based support.
Information
Systems Research, 1
(4),
394-415.
Gopal, R., & Sanders, L. (1997). Preventive and deterrent
controls for software piracy.
Journal of Management
Information Systems, 13
(4), 29-47.
Gopal, A. R., Bostrom, O., & Chin, Y. (1992-1993).
Applying adaptive structuration theory to investigate
the process of group support systems use.
Journal of
Management Information Systems, 9
(3), 45-69.
Gerrity, T. P., & Rockart, J. F. (1986). End-user comput-
ing: Are you a leader or a laggard?
Sloan Management
Review, 27
(4), 25-34.
Ghosh, A. (2001).
Security and privacy for e-business
.
New York: Wiley.
Gopalakishna, P., & Mummalaneni, V. (1993). Influencing
satisfaction for dental services.
Journal of Health Care
Marketing
,
13
(1), 16-22.
Gist, M.E. (1987). Self-efficacy: Implications for orga-
nizational behavior and human resource management.
Academy of Management Review,
12
(3), 472-485.
Gordon, L., Loeb, M., Lucyshyn, W., & Richardson,
R. (2006). 2006 CSI/FBI computer crime and security
survey. Retrieved August 6, 2007, from CSI, http://www.
gocsi.com/
Gist, M. E., Schwoerer, C., & Rosen, B. (1989). Effects
of alternative training methods on self-efficacy and
performance in computer software training.
Journal of
Applied Psychology, 74
(6), 884-891.
Goupil, D. (2000, June). End-user application develop-
ment: Relief for IT.
Computing Channels
, pp. 2-4.
Glass, R., & Wood, W. (1996). Situational determinants
of software piracy: An equity theory perspective.
Journal
of Business Ethics, 15
(11), 1189-1198.
Govindarajulu, C. (2003). End users: Who are they?
Communications of the ACM, 46
(9), 152-159.
Search WWH ::
Custom Search