Information Technology Reference
In-Depth Information
Klein, K.J., & Sorra, J.S. (1996). The challenge of in-
novation implementation.
Academy of Management
Review, 21
, 1055-1080.
Journal of Management Information Systems, 11
(2),
137-155.
Lafferty, B., & Goldsmith, R. (1999). Corporate credibil-
ity's role in consumers' attitudes and purchase intentions
when a high versus a low credibility endorser is used in
the ad.
Journal of Business Research,
44
(2), 109-116.
Kodukula, P. (2006).
Project valuation using real options
.
Ft. Lauderdale, FL: J. Ross Publishing.
Kohlberg, L. (1969). Stages and sequence: The cognitive-
developmental approach to socialization. In D. Grosling
(Ed.),
Handbook of socialization theory and research
.
Chicago: Rand McNally.
Lafferty, B., Goldsmith, R., & Newell, S. (2002). The dual
credibility model: The influence of corporate and endorser
credibility on attitudes and purchase intentions.
Journal
of Marketing Theory and Practice
,
10
(3), 1-12.
Kolbe, R. H., & Burnett, M. S. (1991). Content-analysis
research: An examination of applications with directives
for improving research reliability and objectivity.
Journal
of Consumer Research, 18
(2), 243-250.
Lala V., Arnold, V., Sutton, S., & Guan L. (2002). The
impact of relative information quality of e-commerce
assurance seals on Internet purchasing behavior.
Inter-
national Journal of Accounting Information Systems
,
3
(4), 237-253.
Koufaris, M. (2002). Applying the technology acceptance
model and flow theory to online consumer behavior.
Information Systems Research, 13
(2), 205-223.
Lammermann, S., & Tyugu, E. (2001). A specification
logic for dynamic composition of services. In
Proceed-
ings of the Distributed Computing Systems Workshop,
2001 International Conference,
Mesa, Arizona, USA
(pp. 157-162).
Kovar, S., Gladden-Burke, K., & Kovar, B. (2000).
Consumer responses to the CPA WebTrust assurance.
Journal of Information Systems,
14
(1), 17-35.
Kramer, M. W. (1993). Communication and uncertainty
reduction during job transfers: Leaving and joining pro-
cesses.
Communication Monographs,
60
, 178-198.
Larkin, J., McDermott, J., Simon, D.P., & Simon, H.A.
(1980). Models of competence in solving physics prob-
lems.
Cognitive Science, 208
, 317-345.
Kreie, J., Cronan, T. P., Pendley, J., & Renwick, J. S.
(2000). Applications development by end-users: Can
quality be improved?
Decision Support Systems, 29
(2),
143-152.
Larsen, T.J., & Sorebo, O. (2005). Impact of personal
innovativeness on the use of the Internet among employ-
ees at work.
Journal of Organizational and End User
Computing, 17
(2), 43-63.
Krippendorff, K. (1980).
Content analysis. An introduc-
tion to its methodology
. Beverly Hills, CA: Sage.
Larzelere, R., & Huston, T. (1980). The dyadic trust
scale: Toward understanding interpersonal trust in
close relationships.
Journal of Marriage and Family
,
42
(3), 595-604.
Kruck, S. E., Maher, J. J., & Barkhi, R. (2003). Framework
for cognitive skill acquisition and spreadsheet training.
Journal of End User Computing, 15
(1), 20-37.
Lau, E. (2003). An empirical study of software piracy.
Business Ethics, 12
(3), 233-245.
Kuutti, K. (1996). Activity theory as a potential frame-
work for human-computer interaction research. In B.
Nardi (Ed.),
Context and consciousness: Activity theory
and human-computer interaction
(pp. 17-44). Cambridge:
MIT Press.
Lave, J., & Wenger, E. (1991).
Situated learning: Legiti-
mate peripheral participation.
Cambridge: University
Press.
Lavidge, R.J., & Steiner, G.A. (1961). A model for predic-
tive measurements of advertising effectiveness.
Journal
of Marketing, 25
, 59-62.
Lacity, M. C., & Janson, M. A. (1994). Understanding
qualitative data: A framework of text analysis methods.
Search WWH ::
Custom Search