Information Technology Reference
In-Depth Information
buttons. In J. Carrasco & J. Whiteside (Eds.),
Proceed-
ings of ACM CHI'90
, Seattle, Washington (pp. 175-182).
New York: ACM Press.
Mason, R. O. (1986). Four ethical issues of the informa-
tion age.
MIS Quarterly,
10
(1), 5-12.
Mason, R. O., Mason, F. M., & Culnan, M. J. (1995).
Ethics of information management
. Thousand Oaks,
CA: Sage.
Mahmood, M. A., Hall, L., & Swanberg, D. L. (2001).
Factors affecting information technology usage: A
meta-analysis of the empirical literature.
Journal of
Organizational Computing & Electronic Commerce,
11
(2), 107-130.
Mathieson, K., Peacock, E., & Chin, W.W. (2001). Extend-
ing the technology acceptance model: The influence of
perceived user resources.
The DATA BASE for Advances
in Information Systems, 32
(3), 86-112.
Malhotra, N.K., Kim, S.S., & Agarwal, J. (2004). Inter-
net users' information privacy concerns (IUIPC): The
construct, the scale and a causal model.
Information
Systems Research, 15
, 336-355.
Mauldin, E., & Arunachalam, V. (2001). An experimental
examination of alternative forms of Web assurance for
business-to-consumer e-commerce.
Journal of Informa-
tion System, 16
(1)
,
33-54.
Marakas, G. M., Yi, M. Y., & Johnson, R. (1998). The
multilevel and multifaceted character of computer self-
efficacy: Toward a clarification of the construct and an
integrative framework for research.
Information Systems
Research, 9
(2), 126-163.
Maury, M. D., & Kleiner, D. S. (2002). E-commerce, ethi-
cal commerce?
Journal of Business Ethics,
36
, 21-31.
McCloskey, H. (1980). Privacy and the right to privacy.
Philosophy, 55
(211), 17-38.
Marcolin, B.L., Compeau, D.R., Munro, M.C., & Huff,
S.L. (2000, March). Assessing user competence: Con-
ceptualization and measurement.
Information Systems
Research, 11
(1), 37-60.
McFarland, D.J., & Hamilton, D. (2006). Adding con-
textual specificity to the technology acceptance model.
Computers in Human Behavior, 22
, 427-447.
Marshall, K.P. (1999). Has technology introduced new
ethical problems?
Journal of Business Ethics, 19
(1),
81-90.
McGill, T. (2004). The effect of end user development
on end user success.
Journal of Organizational and End
User Computing, 16
(1), 41-58.
Martocchio, J. J. (1994). Effects of conceptions of ability
on anxiety, self-efficacy, and learning in training.
Journal
of Applied Psychology, 79
(6), 819-825.
McGinnies, E., & Ward, C. (1980). Better liked than
right: Trustworthiness and expertise as factors in cred-
ibility.
Personality and Social Psychology Bulletin
,
6
(1), 467-472.
Martocchio, J. J., & Hertenstein, E. J. (2003). Learning
orientation and goal orientation context: Relationships
with cognitive and affective learning outcomes.
Human
Resources Development Quarterly, 14
(4), 413-434.
McGrath, J. E. (1984).
Groups: Interaction and perfor-
mance
. Englewood Cliffs, NJ: Prentice-Hall.
McGuinnes, D.L., Fikes, R., Hendler, J., & Stein, L.A.
(2002). DAML+OIL: An ontology language for the se-
mantic Web.
IEEE Intelligent Systems, 1
7(5), 72-80.
Mascarenhas, O.A.J., Kesavan, R., & Bernacchi, M.D.
(2003). Co-managing online privacy: A call for joint
ownership.
The Journal of Consumer Marketing, 20
(7),
686-702.
McKnight, H., Choudhury, V., & Kacmar, C. (2002).
Developing and validating trust measures for e-com-
merce: An integrative typology.
Information Systems
Research
,
13
(3), 334-359.
Mason, R.O. (1986). Four ethical issues of the informa-
tion age.
MIS Quarterly, 10
(1), 4-12.
Mason, R. (1986). Four ethical issues of the information
age.
MIS Quarterly, 10
(1), 5-12.
McKnight, H., Cummings, L., & Chervany, N. (1998).
Initial trust formation in new original relationships.
Academy of Management Review
,
23
(3), 473-490.
Search WWH ::
Custom Search