Information Technology Reference
In-Depth Information
Sternthal, B., Dholakia, R., & Leavitt, C. (1978). The
persuasive effects of source credibility: Tests of cogni-
tive response.
Journal of Consumer Research,
4
(4),
252-260.
Cooperative design of computer systems
(pp. 65-89).
Hillsdale, NJ: Lawrence Erlbaum.
Sun, H., & Zhang, P. (2006). The role of moderating
factors in user technology acceptance.
International
Journal of Human-Computer Studies, 64
, 53-78.
Stevens, G., & Wulf, V. (2002). A new dimension in ac-
cess control: Studying maintenance engineering across
organizational boundaries. In
Proceedings of CSCW'92
(pp. 196-205). New York: ACM Press.
Sutcliffe, A., & Mehandjiev, M. (Guest Eds.). (2004).
End-user development.
Communications of the ACM
,
47
(9), 31-32.
Stewart, K., & Segars, A. (2002). An empirical examina-
tion of the concern for information privacy instrument.
Information Systems Research, 13
(1), 36-49.
Suydam, M. (2000, March). Taking (health) care.
Infor-
mation Security,
p. 54.
Sweat, J. (2001). Earthlink: An ISP that customers can
trust?
InformationWeek, 851
, 36.
Stillar, G. F. (1998).
Analyzing everyday texts. Discourse,
rhetoric, and social perspectives
. Thousand Oaks, CA:
Sage.
Syke, C., Shim, J.T., Johnson, R., & Jiang, J. (2006).
Concern for information privacy and online consumer
purchasing.
Journal of the Association for Information
Systems, 7
(6), 415-444.
Stone, R.N., & Winter, F.W (1987). Risk: It is still un-
certainty times consequences? In R.W. Belk et al. (Eds.),
Proceedings of the American Marketing Association
(pp. 261-265).
Szajna, B. (1994). Software evaluation and choice: Predic-
tive validation of the technology acceptance instrument.
MIS Quarterly, 18
(3), 319-324.
Straub, D.W., & Nance, W.D. (1990). Discovering and
disciplining computer abuse in organizations: A field
study.
MIS Quarterly, 14
(1), 45-60.
Szajna, B. (1996, January). Empirical evaluation of the
revised technology acceptance model.
Management
Science, 42
(1), 85-92.
Straub, D. (1990). Effective IS security: An empirical
study.
Information Systems Research, 1
(3), 255-276.
Szewczak, E. (2002). Beware the cookie monster.
Infor-
mation Resources Management Journal, 15
(1), 3-4.
Strauss, A. L., & Corbin, J. (1990).
Basics of qualitative
research: Grounded theory procedures and techniques
.
Newbury Park, CA: Sage.
Tai, W.-T. (2006). Effects of training framing, general
self-efficacy and training motivation on trainees' training
effectiveness.
Personnel Review, 35
(1), 51-65.
Stubbs, M. (2001).
Words and phrases. Corpus studies
of lexical semantics
. Oxford: Blackwell.
Tan, B., Wei, K., & Lee-Partridge, J. E. (1999). Effects
of facilitation and leadership on meeting outcomes in a
group support system environment.
European Journal
of Information Systems
,
8
, 223-246.
Stump, R., & Heide, J. (1996). Controlling supplier oppor-
tunism in industrial relationships.
Journal of Marketing
Research
,
33
(4), 431-441.
Suchman, L., Blomberg, J., Orr, J., & Trigg, R. (1999).
Reconstructing technologies as social practice.
American
Behavioral Scientist, 43
(3), 392-408.
Taylor, S., & Todd, P.A. (1995a, June). Understanding in-
formation technology usage: A test of competing models.
Information Systems Research, 6
(2), 144-176.
Suchman, L., & Trigg, R.H. (1991). Understanding
practice: Video as a medium for reflection and design.
In J. Greenbaum & M. Kyng (Eds.),
Design at work:
Taylor, S., & Todd, P.A. (1995b). Assessing IT usage: The
role of prior experience.
MIS Quarterly, 19
, 561-570.
Search WWH ::
Custom Search