Information Technology Reference
In-Depth Information
buttons. In J. Carrasco & J. Whiteside (Eds.), Proceed-
ings of ACM CHI'90 , Seattle, Washington (pp. 175-182).
New York: ACM Press.
Mason, R. O. (1986). Four ethical issues of the informa-
tion age. MIS Quarterly, 10 (1), 5-12.
Mason, R. O., Mason, F. M., & Culnan, M. J. (1995).
Ethics of information management . Thousand Oaks,
CA: Sage.
Mahmood, M. A., Hall, L., & Swanberg, D. L. (2001).
Factors affecting information technology usage: A
meta-analysis of the empirical literature. Journal of
Organizational Computing & Electronic Commerce,
11 (2), 107-130.
Mathieson, K., Peacock, E., & Chin, W.W. (2001). Extend-
ing the technology acceptance model: The influence of
perceived user resources. The DATA BASE for Advances
in Information Systems, 32 (3), 86-112.
Malhotra, N.K., Kim, S.S., & Agarwal, J. (2004). Inter-
net users' information privacy concerns (IUIPC): The
construct, the scale and a causal model. Information
Systems Research, 15 , 336-355.
Mauldin, E., & Arunachalam, V. (2001). An experimental
examination of alternative forms of Web assurance for
business-to-consumer e-commerce. Journal of Informa-
tion System, 16 (1) , 33-54.
Marakas, G. M., Yi, M. Y., & Johnson, R. (1998). The
multilevel and multifaceted character of computer self-
efficacy: Toward a clarification of the construct and an
integrative framework for research. Information Systems
Research, 9 (2), 126-163.
Maury, M. D., & Kleiner, D. S. (2002). E-commerce, ethi-
cal commerce? Journal of Business Ethics, 36 , 21-31.
McCloskey, H. (1980). Privacy and the right to privacy.
Philosophy, 55 (211), 17-38.
Marcolin, B.L., Compeau, D.R., Munro, M.C., & Huff,
S.L. (2000, March). Assessing user competence: Con-
ceptualization and measurement. Information Systems
Research, 11 (1), 37-60.
McFarland, D.J., & Hamilton, D. (2006). Adding con-
textual specificity to the technology acceptance model.
Computers in Human Behavior, 22 , 427-447.
Marshall, K.P. (1999). Has technology introduced new
ethical problems? Journal of Business Ethics, 19 (1),
81-90.
McGill, T. (2004). The effect of end user development
on end user success. Journal of Organizational and End
User Computing, 16 (1), 41-58.
Martocchio, J. J. (1994). Effects of conceptions of ability
on anxiety, self-efficacy, and learning in training. Journal
of Applied Psychology, 79 (6), 819-825.
McGinnies, E., & Ward, C. (1980). Better liked than
right: Trustworthiness and expertise as factors in cred-
ibility. Personality and Social Psychology Bulletin ,
6 (1), 467-472.
Martocchio, J. J., & Hertenstein, E. J. (2003). Learning
orientation and goal orientation context: Relationships
with cognitive and affective learning outcomes. Human
Resources Development Quarterly, 14 (4), 413-434.
McGrath, J. E. (1984). Groups: Interaction and perfor-
mance . Englewood Cliffs, NJ: Prentice-Hall.
McGuinnes, D.L., Fikes, R., Hendler, J., & Stein, L.A.
(2002). DAML+OIL: An ontology language for the se-
mantic Web. IEEE Intelligent Systems, 1 7(5), 72-80.
Mascarenhas, O.A.J., Kesavan, R., & Bernacchi, M.D.
(2003). Co-managing online privacy: A call for joint
ownership. The Journal of Consumer Marketing, 20 (7),
686-702.
McKnight, H., Choudhury, V., & Kacmar, C. (2002).
Developing and validating trust measures for e-com-
merce: An integrative typology. Information Systems
Research , 13 (3), 334-359.
Mason, R.O. (1986). Four ethical issues of the informa-
tion age. MIS Quarterly, 10 (1), 4-12.
Mason, R. (1986). Four ethical issues of the information
age. MIS Quarterly, 10 (1), 5-12.
McKnight, H., Cummings, L., & Chervany, N. (1998).
Initial trust formation in new original relationships.
Academy of Management Review , 23 (3), 473-490.
Search WWH ::




Custom Search