Information Technology Reference
In-Depth Information
the International Symposium on Applications and the
Internet Workshops (SAINTW'04) (pp. 321-327).
Goffman, E. (1979). Gender advertisement . New York:
Harper and Row.
Fukuyama, R. (1995). Trust: Social virtues and the cre-
ation of prosperity . New York: The Free Press.
Goldsmith, R., Lafferty, B., & Newell, S. (2000). The
impact of corporate credibility and endorser celebrity on
consumer reaction to advertisement and brands. Journal
of Advertising, 29 (3), 43-54.
Gantt, M., & Nardi, B. (1992). Gardeners and gurus: Pat-
terns of cooperation among CAD users. In Proceedings
of the Conference on Computer-Human Interaction (CHI
'92) (pp. 107-117). New York: ACM Press.
Gomez, J., Han, S.-K., Toma, I., Sapkota, B., & Garcia-
Crespo, A. (2006). A semantically-enhanced component-
based architecture for software composition. In Proceed-
ings of the International Multi-Conference on Computing
in the Global Information Technology (p. 43).
Gefen, D. (2000). E-commerce: The role of familiarity
and trust. Omega , 28 , 725-737.
Gefen, D., & Straub, D. W. (1997). Gender differences
in the perception and use of e-mail: An extension to the
technology acceptance model. MIS Quarterly , 21 (4),
389-400.
Goodwin, C. (1991). Privacy: Recognition of a consumer
right. Journal of Public Policy and Marketing, 10 (1),
149-167.
Goodwin, C., & Goodwin, M.H. (1997). Seeing as a
situated activity: Formulating planes. In Y. Engeström
& D. Middleton (Eds.), Cognition and communication
at work (pp. 61-95). Cambridge, MA: Cambridge Uni-
versity Press.
George, G., & Sleeth, R. G. (2000). Leadership in
computer-mediated communication: Implications and
research directions. Journal of Business and Psychol-
ogy, 15 (2), 287-310.
George, J. F., Easton, G. K., Nunamaker, J. F., & North-
craft, G. B. (1990). A study of collaborative group work
with and without computer-based support. Information
Systems Research, 1 (4), 394-415.
Gopal, R., & Sanders, L. (1997). Preventive and deterrent
controls for software piracy. Journal of Management
Information Systems, 13 (4), 29-47.
Gopal, A. R., Bostrom, O., & Chin, Y. (1992-1993).
Applying adaptive structuration theory to investigate
the process of group support systems use. Journal of
Management Information Systems, 9 (3), 45-69.
Gerrity, T. P., & Rockart, J. F. (1986). End-user comput-
ing: Are you a leader or a laggard? Sloan Management
Review, 27 (4), 25-34.
Ghosh, A. (2001). Security and privacy for e-business .
New York: Wiley.
Gopalakishna, P., & Mummalaneni, V. (1993). Influencing
satisfaction for dental services. Journal of Health Care
Marketing , 13 (1), 16-22.
Gist, M.E. (1987). Self-efficacy: Implications for orga-
nizational behavior and human resource management.
Academy of Management Review, 12 (3), 472-485.
Gordon, L., Loeb, M., Lucyshyn, W., & Richardson,
R. (2006). 2006 CSI/FBI computer crime and security
survey. Retrieved August 6, 2007, from CSI, http://www.
gocsi.com/
Gist, M. E., Schwoerer, C., & Rosen, B. (1989). Effects
of alternative training methods on self-efficacy and
performance in computer software training. Journal of
Applied Psychology, 74 (6), 884-891.
Goupil, D. (2000, June). End-user application develop-
ment: Relief for IT. Computing Channels , pp. 2-4.
Glass, R., & Wood, W. (1996). Situational determinants
of software piracy: An equity theory perspective. Journal
of Business Ethics, 15 (11), 1189-1198.
Govindarajulu, C. (2003). End users: Who are they?
Communications of the ACM, 46 (9), 152-159.
Search WWH ::




Custom Search