Information Technology Reference
In-Depth Information
Venkatesh, V. (2000). Determinants of perceived ease of
use: Integrating control, intrinsic motivation and emo-
tion into the technology acceptance model. Information
Systems Research, 11 (4), 342-365.
Wayman, J. (2000, February). Federal biometric technol-
ogy legislation. Computer , pp. 76-80.
Weber, R. P. (1985). Basic content analysis . Newbury
Park, CA: Sage.
Venkatesh, V. (2006). Where to go from here? Thoughts
on future directions for research on individual-level
technology adoption with a focus on decision making.
Decision Sciences, 37 (4), 497-518.
Wegner, P., & Goldin, D. (2003). Computation beyond
turing machines. Communications of the ACM, 46 (4),
100-102.
Wenger, E. (1998). Communities of practice: Learning,
meaning and identity. New York: Cambridge University
Press.
Vidgen, R., Avison, D., Wood, B., & Wood-Harper, T.
(2002). Developing Web information systems. Butterworth-
Heinemann.
Wertsch, J. (1998). Mind as action. New York: Oxford
University Press.
VisiQuest. (2007). Retrieved August 10, 2007, from http://
www.accusoft.com/products/visiquest/
Westin, A. (1967). Privacy and freedom . New York:
Atheneum Publishers.
Volkoff, O., Strong, D.M., & Elmes, M.B. (2002, Au-
gust 9-11). Between a rock and a hard place: Boundary
spanners in an ERP implementation. Proceedings of the
Americas Conference on Information Systems , Dallas,
Texas (pp. 958-962).
Wheeler, B. C., & Mennecke, B. E. (1992). The effects
of restrictiveness and preference for procedural order on
the appropriation of group decision heuristics in a GSS
environment. In Proceedings of the Thirteenth Annual
International Conference on Information Systems, Dallas
Texas (pp. 274-275).
Vygotsky, L.S. (1978). Mind in society: The development
of higher psychological processes . Cambridge, MA:
Harvard University Press.
Whitman, M. E., Perez, J., & Beise, C. (2001). A study
of user attitudes toward persistent cookies. The Journal
of Computer Information Systems, 41 (3), 1-7.
W3C Semantic Web. (2001). Retrieved August 10, 2007,
from http://www.w3.org/2001/sw/
Wakefield, R. (2001). A determination of the anteced-
ents of online trust and an evaluation of current Web
assurance seals . Doctoral dissertation, University of
Mississippi, University, MS.
Wolfe, R. A., Gephart, R. P., & Johnson, T. E. (1993).
Computer-facilitated qualitative data analysis: Potential
contributions to management research. Journal of Man-
agement, 19 (3), 637-660.
Walster, E., Berscheid, E., & Walster, G.W. (1973). New
directions in equity research. Journal of Personality and
Social Psychology, 25 , 151-176.
Wolinsky, A. (1983). Prices as signals of product quality.
Review of Economic Studies , 50 (163), 647-658.
Won, M., Stiemerling, O., & Wulf, V. (2006). Component-
based approaches to tailorable systems. In H. Lieberman,
F. Paterno, & V. Wulf (Eds.), End-user development.
Berlin: Springer-Verlag.
Won, M., & Cremers, A.B. (2002). Supporting end-
user tailoring of component-based software: Checking
integrity of composition (TRNumber CLIP4/02.0) In
Proceedings of the Colognet, Madrid, Spain.
Wood, R., & Bandura, A. (1989). Social cognitive theory
of organizational management. Academy of Management
Review, 14 (3), 361-384.
Walster, E., Walster, G.W., & Berscheid, E. (1978). Equity
theory and research . Boston: Allyn & Bacon
Warren, S.D., & Brandeis, L.D. (1890, December). The
right for privacy. Harvard Law Review, 4 , 193-220.
Watson, R. T., DeSanctis, G., & Poole, M. C. (1988).
Using a GDSS to facilitate group consensus: Some in-
tended and unintended consequences. MIS Quarterly,
12 (3), 463-477.
Search WWH ::




Custom Search