Information Technology Reference
In-Depth Information
Klein, K.J., & Sorra, J.S. (1996). The challenge of in-
novation implementation. Academy of Management
Review, 21 , 1055-1080.
Journal of Management Information Systems, 11 (2),
137-155.
Lafferty, B., & Goldsmith, R. (1999). Corporate credibil-
ity's role in consumers' attitudes and purchase intentions
when a high versus a low credibility endorser is used in
the ad. Journal of Business Research, 44 (2), 109-116.
Kodukula, P. (2006). Project valuation using real options .
Ft. Lauderdale, FL: J. Ross Publishing.
Kohlberg, L. (1969). Stages and sequence: The cognitive-
developmental approach to socialization. In D. Grosling
(Ed.), Handbook of socialization theory and research .
Chicago: Rand McNally.
Lafferty, B., Goldsmith, R., & Newell, S. (2002). The dual
credibility model: The influence of corporate and endorser
credibility on attitudes and purchase intentions. Journal
of Marketing Theory and Practice , 10 (3), 1-12.
Kolbe, R. H., & Burnett, M. S. (1991). Content-analysis
research: An examination of applications with directives
for improving research reliability and objectivity. Journal
of Consumer Research, 18 (2), 243-250.
Lala V., Arnold, V., Sutton, S., & Guan L. (2002). The
impact of relative information quality of e-commerce
assurance seals on Internet purchasing behavior. Inter-
national Journal of Accounting Information Systems ,
3 (4), 237-253.
Koufaris, M. (2002). Applying the technology acceptance
model and flow theory to online consumer behavior.
Information Systems Research, 13 (2), 205-223.
Lammermann, S., & Tyugu, E. (2001). A specification
logic for dynamic composition of services. In Proceed-
ings of the Distributed Computing Systems Workshop,
2001 International Conference, Mesa, Arizona, USA
(pp. 157-162).
Kovar, S., Gladden-Burke, K., & Kovar, B. (2000).
Consumer responses to the CPA WebTrust assurance.
Journal of Information Systems, 14 (1), 17-35.
Kramer, M. W. (1993). Communication and uncertainty
reduction during job transfers: Leaving and joining pro-
cesses. Communication Monographs, 60 , 178-198.
Larkin, J., McDermott, J., Simon, D.P., & Simon, H.A.
(1980). Models of competence in solving physics prob-
lems. Cognitive Science, 208 , 317-345.
Kreie, J., Cronan, T. P., Pendley, J., & Renwick, J. S.
(2000). Applications development by end-users: Can
quality be improved? Decision Support Systems, 29 (2),
143-152.
Larsen, T.J., & Sorebo, O. (2005). Impact of personal
innovativeness on the use of the Internet among employ-
ees at work. Journal of Organizational and End User
Computing, 17 (2), 43-63.
Krippendorff, K. (1980). Content analysis. An introduc-
tion to its methodology . Beverly Hills, CA: Sage.
Larzelere, R., & Huston, T. (1980). The dyadic trust
scale: Toward understanding interpersonal trust in
close relationships. Journal of Marriage and Family ,
42 (3), 595-604.
Kruck, S. E., Maher, J. J., & Barkhi, R. (2003). Framework
for cognitive skill acquisition and spreadsheet training.
Journal of End User Computing, 15 (1), 20-37.
Lau, E. (2003). An empirical study of software piracy.
Business Ethics, 12 (3), 233-245.
Kuutti, K. (1996). Activity theory as a potential frame-
work for human-computer interaction research. In B.
Nardi (Ed.), Context and consciousness: Activity theory
and human-computer interaction (pp. 17-44). Cambridge:
MIT Press.
Lave, J., & Wenger, E. (1991). Situated learning: Legiti-
mate peripheral participation. Cambridge: University
Press.
Lavidge, R.J., & Steiner, G.A. (1961). A model for predic-
tive measurements of advertising effectiveness. Journal
of Marketing, 25 , 59-62.
Lacity, M. C., & Janson, M. A. (1994). Understanding
qualitative data: A framework of text analysis methods.
Search WWH ::




Custom Search