Information Technology Reference
In-Depth Information
Paine, C., Reips, U.-D., Stieger, S., Joinson, A.N., &
Buchanan, T. (2006).
Internet users' perceptions of
“privacy concerns” and “privacy actions.”
Manuscript
submitted for publication.
International Conference on Information Systems
(pp.211-222).
Perlis, A. (1982). Epigrams on programming.
SIGPLAN
Notices,
17
(9), 7-13.
Palmer, J., Bailey, J., & Faraj, S. (2000). The role of in-
termediaries in the development of trust on the WWW:
The use and prominence of trusted third parties and
privacy statements.
Journal of Computer Mediated
Communication
,
5
(3). Retrieved from
http://www.ascusc.
org/jcmc/vol5/issue3/palmer.html
Perri 6. (2002). Who wants privacy protection and what
do they want?
Journal of Consumer Behaviour, 2
(1),
80-100.
Peslak, A.R. (2006). Internet privacy policies of the
largest international companies.
Journal of Electronic
Commerce in Organisations,
4
(3), 46-62.
Panko, R. R. (2007). Two experiments in reducing
overconfidence in spreadsheet development.
Journal of
Organizational and End User Computing, 19
(1), 1-23.
Petre, M. (1995). Why looking isn't always seeing:
Readership skills and graphical programming.
Com-
munication of ACM
,
38
(6), 33-44.
Panko, R. R., & Halverson, R. P. (1996). Spreadsheets
on trial: A survey of research on spreadsheet risks.
Pro-
ceedings of the 29th Hawaii International Conference
on System Sciences, 2
, 326-335.
Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy
concerns and consumer willingness to provide personal
information.
Journal of Public Policy & Marketing,
19
(1), 27-41.
Parent, M., & Gallupe, R. B. (2001). The role of leader-
ship in group support systems failure.
Group Decision
and Negotiation,
10
(5), 405-422.
Pirim, T., James, T., Boswell, K., Reithel, B., & Barkhi,
R. (in press). An empirical investigation of an individual's
perceived need for privacy and security.
International
Journal of Information Security and Privacy
.
Pastore, S. (2007) Introducing semantic technologies in
Web services-based application discovery within grid
environments. In
Proceedings of the Fourth European
Conference on Universal Multiservice Networks
(pp.
22-31).
Plouffe, C., Hulland, J., & Vandenbosch, M. (2001). Re-
search report: Richness versus parsimony in modeling
technology adoption decisions: Understanding merchant
adoption of a smart card-based payment system.
Infor-
mation Systems Research, 12
(2), 208-222.
Pavlou, P. (2003). Consumer acceptance of electronic
commerce: Interrating trust and risk with the technology
acceptance model.
International Journal of Electronic
Commerce, 7
(3), 101-134.
Plouffe, C.R., Hulland, J.S., & Vandenbosch, M. (2001).
Richness versus parsimony in modelling technology
adoption decisions: Understanding merchant adoption
of a smart card-based payment system.
Information
Systems Research,
12
(2), 208-222.
Peace, A., Galletta, D., & Thong, J. (2003). Software
piracy in the workplace: A model and empirical test.
Journal of Management Information Systems, 20
(1),
153-177.
Polanyi, M. (1967).
The tacit dimension.
London:
Rouledge & Kegan Paul.
Penner, R.R., & Steinmetz, E.S. (2002). Model-based
automation of the design of user interfaces to digital
control systems.
IEEE Transactions on Systems, Man,
and Cybernetics: Part A, 32
(1), 41-49.
Presler-Marshall, M. (2000). Web privacy and the P3P
standard.
IBM Raleigh Lab
.
Retrieved from http://www7.
software.ibm.com/vad.nsf/Data/Document2363?OpenD
ocument&p =1&BCT=1Footer=1
Pentland, B. T. (1989). Use and productivity in personal
computing: An empirical test
.
Proceedings of the 10th
Search WWH ::
Custom Search