Information Technology Reference
In-Depth Information
Taylor, M. J., Moynihan, E. P., & Wood-Harper, A. T.
(1998). End-user computing and information systems
methodologies. Information Systems Journal, 8 , 85-
96.
Trevino, L.K. (1986). Ethical decision making in organi-
zations: A person-situation interactionist model. Academy
of Management Review, 11 (3), 601-617.
Triandis, H.C. (1980). Values, attitudes and interpersonal
behavior. In H.E. Howe (Ed.), Nebraska Symposium on
Motivation, 1979: Beliefs, Attitudes and Values (pp.
195-259). Lincoln, NE: University of Nebraska Press,
195-259.
Teo, H. H., Wan, W., & Li, L. (2004). Volunteering
personal information on the Internet: Effects of reputa-
tion, privacy initiatives, and reward on online consumer
behavior. In Proceedings of the 37th Hawaii International
Conference on System Sciences . Retrieved from http://
csdl.computer.org/comp/proceedings/hicss/2004/2056/
07/205670181c.pdf
Trigg, R.H., Moran, T.P., & Halasz, F.G. (1987). Adapt-
ability and tailorability in NoteCards. In H.-J. Bullinger
& B. Shackel (Eds.), Proceedings of lNTERACT'87 (pp.
723-728). Amsterdam: North-Holland.
Thatcher, J. B., & Perrewé, P. L. (2002). An empirical
examination of individual traits as antecedents to com-
puter anxiety and computer self-efficacy. MIS Quarterly ,
26 (4), 381-395.
Turner, E. C., & Dasgupta, S. (2003, Winter). Privacy on
the Web: An examination of user concerns, technology,
and implications for business organizations and individu-
als. Information Systems Management , 8-18.
Thibodeau, P. (2002). P3P supporters struggle to increase
adoption of data privacy standard. Computerworld,
36 (47), 20.
Turoff, M., Hiltz, S. R., Baghat, A., & Rana, A. (1993).
Distributed group support systems. MIS Quarterly,
17 (4), 399-417.
Thompson, R.L., Higgins, C.H., & Howell, J.M. (1991,
March). Towards a conceptual model of utilization. MIS
Quarterly, 15 (1), 125-143.
United States Bureau of the Census. (2003). Computer
use in the United States . Washington, DC: Department
of Commerce.
Urban, G., Sultan, F., & Qualls, W. (2000). Placing trust
at the center of your Internet strategy. Sloan Management
Review, 42 (1), 39-48.
Thompson, R.L., Higgins, C.H., & Howell, J.M (1994).
Influence of experience on personal computer utilization:
Testing a conceptual model. Journal of Management
Information Systems, 11 , 167-187.
Titsworth, T. (2002). More than face value: Airports and
multimedia security. IEEE Multimedia, 9 (2), 11-13.
Venkatesh, V., Morris, M.G., Davis, G.B., & Davis, F.D.
(2003). User acceptance of information technology: To-
wards a unified view. MIS Quarterly, 27 (3), 425-478.
Torkzadeh, G., Chang, J. C. J., & Demirhan, D. (2006). A
contingency model of computer and Internet self-efficacy.
Information & Management, 43 (4), 541-550.
Venkatesh, V. (2000). Determinants of perceived ease of
use: Integrating perceived behavioral control, computer
anxiety and enjoyment into the technology acceptance
model. Information Systems Research, 11 (4), 342-365.
Trafimow, D., & Finlay, K. (1996). The importance of
subjective norms for a minority of people: Between-
subjects and within-subjects analyses. Personality &
Social Psychology Bulletin, 22 (8), 820-829.
Venkatesh, V., & Davis, F. D. (1996). A model of the
antecedents of perceived ease of use: Development and
test. Decision Sciences, 27 (3), 451-481.
Treiblmaier, H., Madlberger, M., Knotzer, N., & Pollach,
I. (2004). The ethics of personalization and customiza-
tion on the Internet: An empirical study. In Proceedings
of the 37th Hawaii International Conference on System
Sciences . Retrieved from http://csdl.computer.org/comp/
proceedings/hicss/2004/2056/07/205670181b.pdf
Venkatesh, V., & Davis, F. (2000). A theoretical extension
of the technology acceptance model: Four longitudinal
field studies. Management Science, 46 (2), 186-204.
Search WWH ::




Custom Search