Information Technology Reference
In-Depth Information
Sheehan, K. B. (2002). Toward a typology of Internet
users and online privacy concerns. The Information
Society, 18 , 21-32.
Smith, H., Milberg, S., & Burke, S. (1996). Information
privacy: Measuring individuals' concerns about organi-
zational practices. MIS Quarterly, 20 (2), 167-196.
Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of on-
line privacy concerns among online consumers. Journal
of Public Policy & Marketing, 19 (1), 62-73.
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). In-
formation privacy: Measuring individuals' concerns
about organizational practices. MIS Quarterly, 20 (2),
167-196.
Shin, S.K., Gopal, R.D., Sanders, G.L., & Whinston, A.B.
(2004). Global software piracy revisited. Communica-
tions of the ACM, 47 (1), 103-107.
Solomon, S., & O'Brien, J. (1990). The effect of demo-
graphic factors on attitudes toward software piracy.
The Journal of Computer Information Systems, 30 (3),
45-45.
Shneiderman, B. (2002). Leonardo's laptop: Human
needs and the new computing technologies . Cambridge,
MA: MIT Press.
Sosik, J. J., Avolio, B. J., & Kahai, S. S. (1997). Effects
of leadership style and anonymity on group potency and
effectiveness in a group decision support system environ-
ment. Journal of Applied Psychology, 82 (1), 89-103.
Short, J., Williams, E., & Christie, B. (1976). The social
psychology of telecommunications . New York: John
Wiley.
Spence, M. (1973). Job market signaling. Quarterly
Journal of Economics , 87 (3), 355-374.
Simmers, C. A., & Anandarajan, M. (2001). User satisfac-
tion in the Internet-anchored workplace: An exploratory
study. Journal of Information Technology Theory and
Application, 3 (5), 39-61.
Stamps, D. (2000). Communities of practice: Learning
is social. Training is irrelevant? In E. L. Lesser, M. A.
Fontaine, & J. A. Slusher (Eds.), Knowledge and commu-
nities (pp. 53-64). Boston: Butterworth-Heinemann.
Simon, H. (1960). The new science of management deci-
sions . New York: Harper and Row.
Star, S.L., & Griesemer, J.R. (1989). Institutional ecol-
ogy, “translations” and boundary objects: Amateurs and
professionals in Berkley's Museum of Vertebrate Zoology
1907- 39. Social Studies of Science, 19 (3), 387-420.
Simon, S. J., Grover, G., Teng, J. T., & Whitcomb, K.
(1996). The relationship of information system training
methods and cognitive ability to end-user satisfaction,
comprehension, and skill transfer: A longitudinal field
study. Information Systems Research, 7 (4), 466-490.
Stary, C. (2000). TADEUS: Seamless development of
task-based and user-oriented interfaces. IEEE Transac-
tions on Systems, Man, and Cybernetics: Part A , 30 (5),
509-525.
Simon, S. J., & Werner, J. M. (1996). Computer training
through behavior modeling, self-paced, and instructional
approaches: A field experiment. Journal of Applied
Psychology, 81 (6), 648-659.
Stead, B. A., & Gilbert, J. (2001). Ethical issues in
electronic commerce. Journal of Business Ethics, 34 (2),
75-85.
Sinrod, E. J. (2001). The future of Internet privacy.
Journal of Internet Law, 4 (9), 22-25.
Steiner, I. D. (1972). Group process and productivity .
New York: Academic Press.
Siponen, M. (2000). A conceptual foundation for organi-
zational information security. Information Management
and Computer Security, 8 (1), 31-44.
Stempel, G. H., & Wesley, B. H. (Eds.). (1981). Research
methods in mass communication . Englewood Cliffs, NJ:
Prentice-Hall.
Slagter, R., & Hofte, H.T. (2002). End-user composition of
groupware behaviour: The CoCoWare .NET architecture .
Telematica Instituut. Retrieved August 10, 2007, from
http://www.telin.nl/project.cfm?language=en&id=241
Search WWH ::




Custom Search