Information Technology Reference
In-Depth Information
Scheeres, J. (2001). Smile, you're on camera.
Retrieved August 6, 2007, from Wired News,
http://www.wired.com
Szajna, B. (1994). Software evaluation and choice:
Predictive validation of the technology acceptance
instrument. MIS Quarterly, 18 (3), 319-324.
Siponen, M. (2000). A conceptual foundation for
organizational information security. Informa-
tion Management and Computer Security, 8 (1),
31-44.
Titsworth, T. (2002). More than face value: Air-
ports and multimedia security. IEEE Multimedia,
9 (2), 11-13.
Venkatesh, V., & Davis, F. (2000). A theoretical
extension of the technology acceptance model:
Four longitudinal field studies. Management
Science, 46 (2), 186-204.
Smith, H., Milberg, S., & Burke, S. (1996). Infor-
mation privacy: Measuring individuals' concerns
about organizational practices. MIS Quarterly,
20 (2), 167-196.
Wayman, J. (2000, February). Federal biometric
technology legislation. Computer , pp. 76-80.
Stewart, K., & Segars, A. (2002). An empirical
examination of the concern for information pri-
vacy instrument. Information Systems Research,
13 (1), 36-49.
Westin, A. (1967). Privacy and freedom . New
York: Atheneum Publishers.
Woodward, J. (1997). Biometrics: Privacy's foe
or privacy's friend? Proceedings of the IEEE,
85 (9), 1480-1492.
Straub, D. (1990). Effective IS security: An
empirical study. Information Systems Research,
1 (3), 255-276.
Suydam, M. (2000, March). Taking (health) care.
Information Security, p. 54.
Search WWH ::




Custom Search