Information Technology Reference
In-Depth Information
Sheehan, K. B. (2002). Toward a typology of Internet
users and online privacy concerns.
The Information
Society,
18
, 21-32.
Smith, H., Milberg, S., & Burke, S. (1996). Information
privacy: Measuring individuals' concerns about organi-
zational practices.
MIS Quarterly, 20
(2), 167-196.
Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of on-
line privacy concerns among online consumers.
Journal
of Public Policy & Marketing, 19
(1), 62-73.
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). In-
formation privacy: Measuring individuals' concerns
about organizational practices.
MIS Quarterly,
20
(2),
167-196.
Shin, S.K., Gopal, R.D., Sanders, G.L., & Whinston, A.B.
(2004). Global software piracy revisited.
Communica-
tions of the ACM, 47
(1), 103-107.
Solomon, S., & O'Brien, J. (1990). The effect of demo-
graphic factors on attitudes toward software piracy.
The Journal of Computer Information Systems, 30
(3),
45-45.
Shneiderman, B. (2002).
Leonardo's laptop: Human
needs and the new computing technologies
. Cambridge,
MA: MIT Press.
Sosik, J. J., Avolio, B. J., & Kahai, S. S. (1997). Effects
of leadership style and anonymity on group potency and
effectiveness in a group decision support system environ-
ment.
Journal of Applied Psychology, 82
(1), 89-103.
Short, J., Williams, E., & Christie, B. (1976).
The social
psychology of telecommunications
. New York: John
Wiley.
Spence, M. (1973). Job market signaling.
Quarterly
Journal of Economics
,
87
(3), 355-374.
Simmers, C. A., & Anandarajan, M. (2001). User satisfac-
tion in the Internet-anchored workplace: An exploratory
study.
Journal of Information Technology Theory and
Application, 3
(5), 39-61.
Stamps, D. (2000). Communities of practice: Learning
is social. Training is irrelevant? In E. L. Lesser, M. A.
Fontaine, & J. A. Slusher (Eds.),
Knowledge and commu-
nities
(pp. 53-64). Boston: Butterworth-Heinemann.
Simon, H. (1960).
The new science of management deci-
sions
. New York: Harper and Row.
Star, S.L., & Griesemer, J.R. (1989). Institutional ecol-
ogy, “translations” and boundary objects: Amateurs and
professionals in Berkley's Museum of Vertebrate Zoology
1907- 39.
Social Studies of Science, 19
(3), 387-420.
Simon, S. J., Grover, G., Teng, J. T., & Whitcomb, K.
(1996). The relationship of information system training
methods and cognitive ability to end-user satisfaction,
comprehension, and skill transfer: A longitudinal field
study.
Information Systems Research, 7
(4), 466-490.
Stary, C. (2000). TADEUS: Seamless development of
task-based and user-oriented interfaces.
IEEE Transac-
tions on Systems, Man, and Cybernetics: Part A
,
30
(5),
509-525.
Simon, S. J., & Werner, J. M. (1996). Computer training
through behavior modeling, self-paced, and instructional
approaches: A field experiment.
Journal of Applied
Psychology,
81
(6), 648-659.
Stead, B. A., & Gilbert, J. (2001). Ethical issues in
electronic commerce.
Journal of Business Ethics,
34
(2),
75-85.
Sinrod, E. J. (2001). The future of Internet privacy.
Journal of Internet Law, 4
(9), 22-25.
Steiner, I. D. (1972).
Group process and productivity
.
New York: Academic Press.
Siponen, M. (2000). A conceptual foundation for organi-
zational information security.
Information Management
and Computer Security, 8
(1), 31-44.
Stempel, G. H., & Wesley, B. H. (Eds.). (1981).
Research
methods in mass communication
. Englewood Cliffs, NJ:
Prentice-Hall.
Slagter, R., & Hofte, H.T. (2002).
End-user composition of
groupware behaviour: The CoCoWare .NET architecture
.
Telematica Instituut. Retrieved August 10, 2007, from
http://www.telin.nl/project.cfm?language=en&id=241
Search WWH ::
Custom Search