Information Technology Reference
In-Depth Information
Taylor, M. J., Moynihan, E. P., & Wood-Harper, A. T.
(1998). End-user computing and information systems
methodologies.
Information Systems Journal, 8
, 85-
96.
Trevino, L.K. (1986). Ethical decision making in organi-
zations: A person-situation interactionist model.
Academy
of Management Review, 11
(3), 601-617.
Triandis, H.C. (1980). Values, attitudes and interpersonal
behavior. In H.E. Howe (Ed.),
Nebraska Symposium on
Motivation, 1979: Beliefs, Attitudes and Values
(pp.
195-259). Lincoln, NE: University of Nebraska Press,
195-259.
Teo, H. H., Wan, W., & Li, L. (2004). Volunteering
personal information on the Internet: Effects of reputa-
tion, privacy initiatives, and reward on online consumer
behavior. In
Proceedings of the 37th Hawaii International
Conference on System Sciences
. Retrieved from http://
csdl.computer.org/comp/proceedings/hicss/2004/2056/
07/205670181c.pdf
Trigg, R.H., Moran, T.P., & Halasz, F.G. (1987). Adapt-
ability and tailorability in NoteCards. In H.-J. Bullinger
& B. Shackel (Eds.),
Proceedings of lNTERACT'87
(pp.
723-728). Amsterdam: North-Holland.
Thatcher, J. B., & Perrewé, P. L. (2002). An empirical
examination of individual traits as antecedents to com-
puter anxiety and computer self-efficacy.
MIS Quarterly
,
26
(4), 381-395.
Turner, E. C., & Dasgupta, S. (2003, Winter). Privacy on
the Web: An examination of user concerns, technology,
and implications for business organizations and individu-
als.
Information Systems Management
, 8-18.
Thibodeau, P. (2002). P3P supporters struggle to increase
adoption of data privacy standard.
Computerworld,
36
(47), 20.
Turoff, M., Hiltz, S. R., Baghat, A., & Rana, A. (1993).
Distributed group support systems.
MIS Quarterly,
17
(4), 399-417.
Thompson, R.L., Higgins, C.H., & Howell, J.M. (1991,
March). Towards a conceptual model of utilization.
MIS
Quarterly, 15
(1), 125-143.
United States Bureau of the Census. (2003).
Computer
use in the United States
. Washington, DC: Department
of Commerce.
Urban, G., Sultan, F., & Qualls, W. (2000). Placing trust
at the center of your Internet strategy.
Sloan Management
Review,
42
(1), 39-48.
Thompson, R.L., Higgins, C.H., & Howell, J.M (1994).
Influence of experience on personal computer utilization:
Testing a conceptual model.
Journal of Management
Information Systems, 11
, 167-187.
Titsworth, T. (2002). More than face value: Airports and
multimedia security.
IEEE Multimedia, 9
(2), 11-13.
Venkatesh, V., Morris, M.G., Davis, G.B., & Davis, F.D.
(2003). User acceptance of information technology: To-
wards a unified view.
MIS Quarterly, 27
(3), 425-478.
Torkzadeh, G., Chang, J. C. J., & Demirhan, D. (2006). A
contingency model of computer and Internet self-efficacy.
Information & Management, 43
(4), 541-550.
Venkatesh, V. (2000). Determinants of perceived ease of
use: Integrating perceived behavioral control, computer
anxiety and enjoyment into the technology acceptance
model.
Information Systems Research,
11
(4), 342-365.
Trafimow, D., & Finlay, K. (1996). The importance of
subjective norms for a minority of people: Between-
subjects and within-subjects analyses.
Personality &
Social Psychology Bulletin, 22
(8), 820-829.
Venkatesh, V., & Davis, F. D. (1996). A model of the
antecedents of perceived ease of use: Development and
test.
Decision Sciences, 27
(3), 451-481.
Treiblmaier, H., Madlberger, M., Knotzer, N., & Pollach,
I. (2004). The ethics of personalization and customiza-
tion on the Internet: An empirical study. In
Proceedings
of the 37th Hawaii International Conference on System
Sciences
. Retrieved from http://csdl.computer.org/comp/
proceedings/hicss/2004/2056/07/205670181b.pdf
Venkatesh, V., & Davis, F. (2000). A theoretical extension
of the technology acceptance model: Four longitudinal
field studies.
Management Science, 46
(2), 186-204.
Search WWH ::
Custom Search