Information Technology Reference
In-Depth Information
Paine, C., Reips, U.-D., Stieger, S., Joinson, A.N., &
Buchanan, T. (2006). Internet users' perceptions of
“privacy concerns” and “privacy actions.” Manuscript
submitted for publication.
International Conference on Information Systems
(pp.211-222).
Perlis, A. (1982). Epigrams on programming. SIGPLAN
Notices, 17 (9), 7-13.
Palmer, J., Bailey, J., & Faraj, S. (2000). The role of in-
termediaries in the development of trust on the WWW:
The use and prominence of trusted third parties and
privacy statements. Journal of Computer Mediated
Communication , 5 (3). Retrieved from http://www.ascusc.
org/jcmc/vol5/issue3/palmer.html
Perri 6. (2002). Who wants privacy protection and what
do they want? Journal of Consumer Behaviour, 2 (1),
80-100.
Peslak, A.R. (2006). Internet privacy policies of the
largest international companies. Journal of Electronic
Commerce in Organisations, 4 (3), 46-62.
Panko, R. R. (2007). Two experiments in reducing
overconfidence in spreadsheet development. Journal of
Organizational and End User Computing, 19 (1), 1-23.
Petre, M. (1995). Why looking isn't always seeing:
Readership skills and graphical programming. Com-
munication of ACM , 38 (6), 33-44.
Panko, R. R., & Halverson, R. P. (1996). Spreadsheets
on trial: A survey of research on spreadsheet risks. Pro-
ceedings of the 29th Hawaii International Conference
on System Sciences, 2 , 326-335.
Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy
concerns and consumer willingness to provide personal
information. Journal of Public Policy & Marketing,
19 (1), 27-41.
Parent, M., & Gallupe, R. B. (2001). The role of leader-
ship in group support systems failure. Group Decision
and Negotiation, 10 (5), 405-422.
Pirim, T., James, T., Boswell, K., Reithel, B., & Barkhi,
R. (in press). An empirical investigation of an individual's
perceived need for privacy and security. International
Journal of Information Security and Privacy .
Pastore, S. (2007) Introducing semantic technologies in
Web services-based application discovery within grid
environments. In Proceedings of the Fourth European
Conference on Universal Multiservice Networks (pp.
22-31).
Plouffe, C., Hulland, J., & Vandenbosch, M. (2001). Re-
search report: Richness versus parsimony in modeling
technology adoption decisions: Understanding merchant
adoption of a smart card-based payment system. Infor-
mation Systems Research, 12 (2), 208-222.
Pavlou, P. (2003). Consumer acceptance of electronic
commerce: Interrating trust and risk with the technology
acceptance model. International Journal of Electronic
Commerce, 7 (3), 101-134.
Plouffe, C.R., Hulland, J.S., & Vandenbosch, M. (2001).
Richness versus parsimony in modelling technology
adoption decisions: Understanding merchant adoption
of a smart card-based payment system. Information
Systems Research, 12 (2), 208-222.
Peace, A., Galletta, D., & Thong, J. (2003). Software
piracy in the workplace: A model and empirical test.
Journal of Management Information Systems, 20 (1),
153-177.
Polanyi, M. (1967). The tacit dimension. London:
Rouledge & Kegan Paul.
Penner, R.R., & Steinmetz, E.S. (2002). Model-based
automation of the design of user interfaces to digital
control systems. IEEE Transactions on Systems, Man,
and Cybernetics: Part A, 32 (1), 41-49.
Presler-Marshall, M. (2000). Web privacy and the P3P
standard. IBM Raleigh Lab . Retrieved from http://www7.
software.ibm.com/vad.nsf/Data/Document2363?OpenD
ocument&p =1&BCT=1Footer=1
Pentland, B. T. (1989). Use and productivity in personal
computing: An empirical test . Proceedings of the 10th
Search WWH ::




Custom Search