Information Technology Reference
In-Depth Information
Venkatesh, V. (2000). Determinants of perceived ease of
use: Integrating control, intrinsic motivation and emo-
tion into the technology acceptance model.
Information
Systems Research,
11
(4), 342-365.
Wayman, J. (2000, February). Federal biometric technol-
ogy legislation.
Computer
, pp. 76-80.
Weber, R. P. (1985).
Basic content analysis
. Newbury
Park, CA: Sage.
Venkatesh, V. (2006). Where to go from here? Thoughts
on future directions for research on individual-level
technology adoption with a focus on decision making.
Decision Sciences, 37
(4), 497-518.
Wegner, P., & Goldin, D. (2003). Computation beyond
turing machines.
Communications of the ACM,
46
(4),
100-102.
Wenger, E. (1998).
Communities of practice: Learning,
meaning and identity.
New York: Cambridge University
Press.
Vidgen, R., Avison, D., Wood, B., & Wood-Harper, T.
(2002).
Developing Web information systems.
Butterworth-
Heinemann.
Wertsch, J. (1998).
Mind as action.
New York: Oxford
University Press.
VisiQuest. (2007). Retrieved August 10, 2007, from http://
www.accusoft.com/products/visiquest/
Westin, A. (1967).
Privacy and freedom
. New York:
Atheneum Publishers.
Volkoff, O., Strong, D.M., & Elmes, M.B. (2002, Au-
gust 9-11).
Between a rock and a hard place: Boundary
spanners in an ERP implementation.
Proceedings of the
Americas Conference on Information Systems
, Dallas,
Texas (pp. 958-962).
Wheeler, B. C., & Mennecke, B. E. (1992). The effects
of restrictiveness and preference for procedural order on
the appropriation of group decision heuristics in a GSS
environment. In
Proceedings of the Thirteenth Annual
International Conference on Information Systems,
Dallas
Texas (pp. 274-275).
Vygotsky, L.S. (1978).
Mind in society: The development
of higher psychological processes
. Cambridge, MA:
Harvard University Press.
Whitman, M. E., Perez, J., & Beise, C. (2001). A study
of user attitudes toward persistent cookies.
The Journal
of Computer Information Systems, 41
(3), 1-7.
W3C Semantic Web. (2001). Retrieved August 10, 2007,
from http://www.w3.org/2001/sw/
Wakefield, R. (2001).
A determination of the anteced-
ents of online trust and an evaluation of current Web
assurance seals
. Doctoral dissertation, University of
Mississippi, University, MS.
Wolfe, R. A., Gephart, R. P., & Johnson, T. E. (1993).
Computer-facilitated qualitative data analysis: Potential
contributions to management research.
Journal of Man-
agement, 19
(3), 637-660.
Walster, E., Berscheid, E., & Walster, G.W. (1973). New
directions in equity research.
Journal of Personality and
Social Psychology, 25
, 151-176.
Wolinsky, A. (1983). Prices as signals of product quality.
Review of Economic Studies
,
50
(163), 647-658.
Won, M., Stiemerling, O., & Wulf, V. (2006). Component-
based approaches to tailorable systems. In H. Lieberman,
F. Paterno, & V. Wulf (Eds.),
End-user development.
Berlin: Springer-Verlag.
Won, M., & Cremers, A.B. (2002). Supporting end-
user tailoring of component-based software: Checking
integrity of composition (TRNumber CLIP4/02.0) In
Proceedings of the Colognet,
Madrid, Spain.
Wood, R., & Bandura, A. (1989). Social cognitive theory
of organizational management.
Academy of Management
Review,
14
(3), 361-384.
Walster, E., Walster, G.W., & Berscheid, E. (1978).
Equity
theory and research
. Boston: Allyn & Bacon
Warren, S.D., & Brandeis, L.D. (1890, December). The
right for privacy.
Harvard Law Review, 4
, 193-220.
Watson, R. T., DeSanctis, G., & Poole, M. C. (1988).
Using a GDSS to facilitate group consensus: Some in-
tended and unintended consequences.
MIS Quarterly,
12
(3), 463-477.
Search WWH ::
Custom Search