Information Technology Reference
In-Depth Information
Sternthal, B., Dholakia, R., & Leavitt, C. (1978). The
persuasive effects of source credibility: Tests of cogni-
tive response. Journal of Consumer Research, 4 (4),
252-260.
Cooperative design of computer systems (pp. 65-89).
Hillsdale, NJ: Lawrence Erlbaum.
Sun, H., & Zhang, P. (2006). The role of moderating
factors in user technology acceptance. International
Journal of Human-Computer Studies, 64 , 53-78.
Stevens, G., & Wulf, V. (2002). A new dimension in ac-
cess control: Studying maintenance engineering across
organizational boundaries. In Proceedings of CSCW'92
(pp. 196-205). New York: ACM Press.
Sutcliffe, A., & Mehandjiev, M. (Guest Eds.). (2004).
End-user development. Communications of the ACM ,
47 (9), 31-32.
Stewart, K., & Segars, A. (2002). An empirical examina-
tion of the concern for information privacy instrument.
Information Systems Research, 13 (1), 36-49.
Suydam, M. (2000, March). Taking (health) care. Infor-
mation Security, p. 54.
Sweat, J. (2001). Earthlink: An ISP that customers can
trust? InformationWeek, 851 , 36.
Stillar, G. F. (1998). Analyzing everyday texts. Discourse,
rhetoric, and social perspectives . Thousand Oaks, CA:
Sage.
Syke, C., Shim, J.T., Johnson, R., & Jiang, J. (2006).
Concern for information privacy and online consumer
purchasing. Journal of the Association for Information
Systems, 7 (6), 415-444.
Stone, R.N., & Winter, F.W (1987). Risk: It is still un-
certainty times consequences? In R.W. Belk et al. (Eds.),
Proceedings of the American Marketing Association
(pp. 261-265).
Szajna, B. (1994). Software evaluation and choice: Predic-
tive validation of the technology acceptance instrument.
MIS Quarterly, 18 (3), 319-324.
Straub, D.W., & Nance, W.D. (1990). Discovering and
disciplining computer abuse in organizations: A field
study. MIS Quarterly, 14 (1), 45-60.
Szajna, B. (1996, January). Empirical evaluation of the
revised technology acceptance model. Management
Science, 42 (1), 85-92.
Straub, D. (1990). Effective IS security: An empirical
study. Information Systems Research, 1 (3), 255-276.
Szewczak, E. (2002). Beware the cookie monster. Infor-
mation Resources Management Journal, 15 (1), 3-4.
Strauss, A. L., & Corbin, J. (1990). Basics of qualitative
research: Grounded theory procedures and techniques .
Newbury Park, CA: Sage.
Tai, W.-T. (2006). Effects of training framing, general
self-efficacy and training motivation on trainees' training
effectiveness. Personnel Review, 35 (1), 51-65.
Stubbs, M. (2001). Words and phrases. Corpus studies
of lexical semantics . Oxford: Blackwell.
Tan, B., Wei, K., & Lee-Partridge, J. E. (1999). Effects
of facilitation and leadership on meeting outcomes in a
group support system environment. European Journal
of Information Systems , 8 , 223-246.
Stump, R., & Heide, J. (1996). Controlling supplier oppor-
tunism in industrial relationships. Journal of Marketing
Research , 33 (4), 431-441.
Suchman, L., Blomberg, J., Orr, J., & Trigg, R. (1999).
Reconstructing technologies as social practice. American
Behavioral Scientist, 43 (3), 392-408.
Taylor, S., & Todd, P.A. (1995a, June). Understanding in-
formation technology usage: A test of competing models.
Information Systems Research, 6 (2), 144-176.
Suchman, L., & Trigg, R.H. (1991). Understanding
practice: Video as a medium for reflection and design.
In J. Greenbaum & M. Kyng (Eds.), Design at work:
Taylor, S., & Todd, P.A. (1995b). Assessing IT usage: The
role of prior experience. MIS Quarterly, 19 , 561-570.
Search WWH ::




Custom Search