Information Technology Reference
In-Depth Information
Johnson-Page, G. F., & Thatcher, R. S. (2001). B2C data
privacy policies: Current trends.
Management Decision,
39
(4), 262-271.
Karahanna, E., Straub, D.W., & Chervany, N.L. (1999,
June). Information technology adoption across time: A
cross-sectional comparison of pre-adoption and post-
adoption beliefs.
MIS Quarterly, 23
(2), 183-213.
Jones, T.W. (1991). Ethical decision making by individuals
in organizations: An issue-contingent model.
Academy
of Management Review, 16
(2), 366-395.
Karasti, H. (2001).
Increasing sensitivity towards ev-
eryday work practice in system design
. Doctoral thesis,
University of Oulu, Oulu.
Joshi, K. (1989). The measurement of fairness or equity
perception of management information systems users.
MIS Quarterly, 13
(3), 343-358.
Katz, J.E., & Rice, R.E. (2002).
Social consequences
of Internet use: Access, involvement, and interaction
.
Cambridge, MA: MIT Press.
Kaasbøll, J., & Øgrim, L. (1994). Super-users: Hackers,
management hostages or working class heroes? A study
of user influence on redesign in distributed organizations.
In
Proceedings of the 17th Information Systems Research
Seminar in Scandinavia (IRIS-17)
(pp. 784-798). Depart-
ment of Information Processing Science, University of
Oulu, Finland.
Kay, R. (2004, March 15). Quick study: Privacy glossary.
Computerworld
, 41.
Kelle, U., & Laurie, H. (1995). Computer use in qualitative
research and issues of validity. In U. Kelle (Ed.),
Com-
puter-aided qualitative data analysis. Theory, methods
and practice
(pp. 19-28). London: Sage.
Kabanoff, B. (1996). Computers can read as well as
count: How computer-aided text analysis can benefit
organizational research.
Journal of Organizational Be-
havior, 3
, 1-21.
Keller, K. (1998).
Strategic brand management.
Upper
Saddle River, NJ: Prentice Hall.
Kihlstrom, R., & Riordan, M. (1984). Advertising a signal.
Journal of Political Economy
,
92
(3), 427-450.
Kadoda, G. (2000). A cognitive dimensions view of
the differences between designers and users of theorem
proving assistants. In
Proceedings of the 12th Annual
Meeting of the Psychology of Programming Interest
Group
(pp. 33-44).
Kim, H. (1995). Biometrics, is it a viable proposition for
identity authentication and access control?
Computers
and Security, 14
, 205-214.
Kim, J., Spraragen, M., & Gil, Y. (2004). An intelligent
assistant for interactive workflow composition. In
Proceed-
ings of the 9th International Conference on Intelligent
User Interfaces,
Funchal, Portugal (pp. 125-135).
Kanstrup, A-M. (2004). E-learning behind the facade:
The value of local gardeners. In A.M. Kanstrup, A.M.
Roskilde, & D.K. Universitesforlag (Eds.),
E-learning
at work
(pp. 149-166, in Danish).
Kim, Y. J., Hiltz, S. R., & Turoff, M. (2002). Coordina-
tion structures and system restrictiveness in distributed
group support systems.
Group Decision and Negotiation,
11
(5), 379-404.
Kaplan, L., Szybillo, G.J., & Jacoby, J. (1974). Compo-
nents of perceived risk in product purchase: A cross vali-
dation.
Journal of Applied Psychology, 59
, 287-291.
Kaptelinin, V. (1996). Activity theory: Implications for
human-computer interaction. In B. Nardi (Ed.),
Context
and consciousness: Activity theory and human-computer
interaction
(pp. 103-116). Cambridge: MIT Press.
Kirkpatrick, D. L. (1959). Techniques for evaluating
training programs.
Journal of the American Society of
Training Directors,
13
(11-12), 3-26.
Kirmani, A., & Rao, A. (2000). No pain, no gain: A critical
review of the literature on signaling unobservable product
quality.
Journal of Marketing,
64
(2), 66-79.
Karahanna, E., Straub, D., & Chervany, N. (1999).
Information technology adoption across time: A cross-
sectional comparison of pre-adoption and post-adoption
beliefs.
MIS Quarterly, 23
(2), 183-213.
Search WWH ::
Custom Search