Information Technology Reference
In-Depth Information
Johnson-Page, G. F., & Thatcher, R. S. (2001). B2C data
privacy policies: Current trends. Management Decision,
39 (4), 262-271.
Karahanna, E., Straub, D.W., & Chervany, N.L. (1999,
June). Information technology adoption across time: A
cross-sectional comparison of pre-adoption and post-
adoption beliefs. MIS Quarterly, 23 (2), 183-213.
Jones, T.W. (1991). Ethical decision making by individuals
in organizations: An issue-contingent model. Academy
of Management Review, 16 (2), 366-395.
Karasti, H. (2001). Increasing sensitivity towards ev-
eryday work practice in system design . Doctoral thesis,
University of Oulu, Oulu.
Joshi, K. (1989). The measurement of fairness or equity
perception of management information systems users.
MIS Quarterly, 13 (3), 343-358.
Katz, J.E., & Rice, R.E. (2002). Social consequences
of Internet use: Access, involvement, and interaction .
Cambridge, MA: MIT Press.
Kaasbøll, J., & Øgrim, L. (1994). Super-users: Hackers,
management hostages or working class heroes? A study
of user influence on redesign in distributed organizations.
In Proceedings of the 17th Information Systems Research
Seminar in Scandinavia (IRIS-17) (pp. 784-798). Depart-
ment of Information Processing Science, University of
Oulu, Finland.
Kay, R. (2004, March 15). Quick study: Privacy glossary.
Computerworld , 41.
Kelle, U., & Laurie, H. (1995). Computer use in qualitative
research and issues of validity. In U. Kelle (Ed.), Com-
puter-aided qualitative data analysis. Theory, methods
and practice (pp. 19-28). London: Sage.
Kabanoff, B. (1996). Computers can read as well as
count: How computer-aided text analysis can benefit
organizational research. Journal of Organizational Be-
havior, 3 , 1-21.
Keller, K. (1998). Strategic brand management. Upper
Saddle River, NJ: Prentice Hall.
Kihlstrom, R., & Riordan, M. (1984). Advertising a signal.
Journal of Political Economy , 92 (3), 427-450.
Kadoda, G. (2000). A cognitive dimensions view of
the differences between designers and users of theorem
proving assistants. In Proceedings of the 12th Annual
Meeting of the Psychology of Programming Interest
Group (pp. 33-44).
Kim, H. (1995). Biometrics, is it a viable proposition for
identity authentication and access control? Computers
and Security, 14 , 205-214.
Kim, J., Spraragen, M., & Gil, Y. (2004). An intelligent
assistant for interactive workflow composition. In Proceed-
ings of the 9th International Conference on Intelligent
User Interfaces, Funchal, Portugal (pp. 125-135).
Kanstrup, A-M. (2004). E-learning behind the facade:
The value of local gardeners. In A.M. Kanstrup, A.M.
Roskilde, & D.K. Universitesforlag (Eds.), E-learning
at work (pp. 149-166, in Danish).
Kim, Y. J., Hiltz, S. R., & Turoff, M. (2002). Coordina-
tion structures and system restrictiveness in distributed
group support systems. Group Decision and Negotiation,
11 (5), 379-404.
Kaplan, L., Szybillo, G.J., & Jacoby, J. (1974). Compo-
nents of perceived risk in product purchase: A cross vali-
dation. Journal of Applied Psychology, 59 , 287-291.
Kaptelinin, V. (1996). Activity theory: Implications for
human-computer interaction. In B. Nardi (Ed.), Context
and consciousness: Activity theory and human-computer
interaction (pp. 103-116). Cambridge: MIT Press.
Kirkpatrick, D. L. (1959). Techniques for evaluating
training programs. Journal of the American Society of
Training Directors, 13 (11-12), 3-26.
Kirmani, A., & Rao, A. (2000). No pain, no gain: A critical
review of the literature on signaling unobservable product
quality. Journal of Marketing, 64 (2), 66-79.
Karahanna, E., Straub, D., & Chervany, N. (1999).
Information technology adoption across time: A cross-
sectional comparison of pre-adoption and post-adoption
beliefs. MIS Quarterly, 23 (2), 183-213.
Search WWH ::




Custom Search