Information Technology Reference
In-Depth Information
Lebart, L., Salem, A., & Berry, L. (1998). Exploring
textual data . Dordrecht: Kluwer Academic Publishers.
Loch, K., Carr, H., & Warkentin, M. (1992). Threats to
information systems: Today's reality, yesterday's under-
standing. MIS Quarterly, 16 (2), 173-186.
Leonard, L.N.K., Cronan, T.P., & Kreie, J. (2004).
What influences IT ethical behavior intentions: Planned
behavior, reasoned action, perceived importance, or
individual characteristics? Information and Manage-
ment, 42 (1), 143-158.
Lowry, G. (2002). Modeling user acceptance of build-
ing management systems. Automation in Construction,
11 , 695-705.
Lu, J., Yu, C., & Liu, C. (2003). Learning style, learning
patterns, and learning performance in a WebCT-based
MIS course. Information & Management, 40 (6), 497-
507.
Letondal, C., & Mackay, W.E. (2004). Participatory
programming and the scope of mutual responsibility:
Balancing scientific, design and software commitment.
In A. Clement & P. Van den Besselaar (Eds.), Proceed-
ings of the 8th Conference on Participatory Design
Conference (PDC 2004) , Toronto, Canada (pp. 31-41).
New York: ACM Press.
Lu, J., Yao, J.E., & Yu, C.-S. (2005). Personal innovative-
ness, social influences and adoption of wireless Internet
services via mobile technology. Strategic Information
Systems, 14 , 245-268.
Lieberman, H., Paterno, F., & Wulf, V. (Eds.). (2006).
End-user development . Berlin: Springer-Verlag.
Luhmann, N. (1988). Familiarity, confidence, trust:
Problems and alternatives. In D. Gambetta (Ed.), Trust
(pp. 94-107). New York: Basil Blackwell.
Lieberman, H. (2001). Your wish is my command:
Programming by example . San Francisco: Morgan
Kaufman.
Luo, X., & Seyedian, M. (2004). Contextual marketing
and customer-orientation strategy for e-commerce: An
empirical analysis. International Journal of Electronic
Commerce, 8 (2), 95-118.
Lieberman, H., Paternò, F., & Wulf, V. (2006). End-user
development (Human-Computer Interaction Series, Vol.
9). Dordrecht, The Netherlands: Springer.
Lwin, M.O., & Williams, J.D. (2003). Model integrating
the multidimensional developmental theory of privacy
and theory of planned behaviour to examine fabrication of
information online. Marketing Letters, 14 (4), 257-272.
Lim, L. H., Raman, K. S., & Wei, K. K. (1994). Interact-
ing effects of GDSS and leadership. Decision Support
Systems, 12 , 199-211.
Lin, C., & Ding, C.G. (2003). Moderating information
ethics: The joint moderaing role of locus of control and job
insecurity. Journal of Business Ethics, 48 (4), 335-346
Lynch, B. (2004, March). Web-privacy management
increases in importance. Wall Street & Technology ,
48-49.
Lippert, S.K., & Forman, H. (2005). Utilization of infor-
mation technology: Examining cognitive and experiential
factors of post-adoption behavior. IEE Transactions on
Engineering Management, 52 (3), 363-381.
Mackay, W.E. (1990). Patterns of sharing customizable
software. In Proceedings of the Conference on Computer
Supported Cooperative Work (CSCW'90) (pp. 209-221).
New York: ACM Press.
Liu, S., & Silverman, M. (2001, January/February). A
practical guide to biometric security technology. IT
Professional , pp. 27-32.
MacLean, A., Carter, K., Lövstrand, L., & Moran, T.
(1990). User-tailorable systems: Pressing the issue with
buttons. In Proceedings of the Conference on Human
Factors in Computing Systems (CHI'90) (pp. 175-182).
New York: ACM Press.
Liu, C., & Arnett, K. P. (2002). An examination of pri-
vacy policies in Fortune 500 Web sites. Mid-American
Journal of Business, 17 (1), 13-21.
MacLean, A., Kathleen, C., Lövstrand, L., & Moran, T.
(1990). User-tailorable systems: Pressing the issues with
Search WWH ::




Custom Search