Information Technology Reference
In-Depth Information
Hall, J. E., Shaw, M. R., Lascheit, J., & Robertson, N.
(2000). Gender differences in a modified perceived value
construct for intangible products. In Proceedings of the
ANZMEC Conference 2000, Melbourne.
Hasan, B. (2006). Delineating the effects of general and
system-specific computer self-efficacy beliefs on IS ac-
ceptance. Information and Management, 43 , 565-571.
Haskell, R. E. (2001). Transfer of learning: Cognition, in-
struction and reasoning . San Diego: Academic Press.
Halliday, M. A. K. (1994). Introduction to functional
grammar (2nd ed.). London: Edward Arnold.
Hatcher, L. (1994). A step-by-step approach to using the
SAS system for factor analysis and structural equation
modeling . Cary, NC: SAS Institute.
Hammer, M. R., & Martin, J. N. (1992). The effects
of cross-cultural training on American managers in a
Japanese-American joint venture. Journal of Applied
Communication Research, 20 , 161-182.
Havelka, D., Beasley, F., & Broome, T. (2004). A study
of computer anxiety among business students. Mid-
American Journal of Business, 19 (1), 63-71.
Han, P., & Maclaurin, A. (2002). Do consumers really
care about online privacy? Marketing Management,
11 (1), 35-38.
Hawkins, D., Best, R., & Coney, K. (1998). Consumer
behavior: Building marketing strategy . Boston, MA:
McGraw Hill.
Harder, J.W. (1991). Equity theory versus expectancy
theory: The case of major league baseball free agents.
Journal of Applied Psychology, 76 (3), 458-464.
Hayes, J.R. (1985). Three problems in teaching general
skills . Hillsdale, NJ: Lawrence Erlbaum Associates.
Harding, W. T., Reed, A. J., & Gray, R. L. (2001). Cookies
and Web bugs: What they are and how they work together.
Information Systems Management, 18 (3), 17-24.
Heflin, J. (2004). OWL Web ontology language: Use
cases and requirements. World Wide Web Consortium.
Retrieved August 10, 2007, from http://www.w3.org/TR/
webont-req/
Harmon, B., Conroy, R., Emory, C, & Macfarlane, K.
(2000). Using digital dashboards. Retrieved August 10,
2007, from http://www.microsoft.com/education/default.
asp?ID=DigitalDashTutorial
Henderson, S., & Snyder, C. (1999). Personal information
privacy: Implications for MIS managers. Information
and Management, 36 , 213-220.
Harmon, R., & Coney, K. (1982). The persuasive effects
of source credibility in buy and lease situations. Journal
of Marketing Research, 19 (2), 255-260.
Herman, A. (2002). Major bank signs up for digital
signature verification technology. Biometric Technology
Today, 10 (1), 1.
Harrington, S.J. (1996). The effects of codes of ethics and
personal denial of responsibility on computer abuse judg-
ments and intentions. MIS Quarterly, 20 (3), 257-278.
Hightower, R., & Sayeed, L. (1996). Effects of commu-
nication mode and prediscussion information distribu-
tion characteristics on information exchange in groups.
Information Systems Research, 7 (4), 451-465.
Harrison, A. W., & Rainer, R. K. (1992). The influence
of individual differences on skill in end-user comput-
ing. Journal of Management Information Systems, 9 (1),
93-111.
Hiltz, S. R., & Johnson, K. (1990). User satisfaction with
computer-mediated communication systems. Manage-
ment Science, 36 (6), 739-764.
Hart, C. W. L., Heskett, J. L., & Sasser, W. E. (1990).
The profitable art of service recovery. Harvard Business
Review , 68 (4), 148-156.
Hiltz, S. R., Johnson, K., & Turoff, M. (1982). The effects of
formal human leadership and computer-generated deci-
sion aids on problem solving via computer: A controlled
experiment [Research Report No. 18]. Computerized
Conferencing and Communication Center, New Jersey
Institute of Technology.
Hartson, H.R., & Hix, D. (1993). Developing user inter-
faces: Ensuring usability through product & process .
New York: John Wiley.
Search WWH ::




Custom Search