Information Technology Reference
In-Depth Information
Scheeres, J. (2001). Smile, you're on camera.
Retrieved August 6, 2007, from Wired News,
http://www.wired.com
Szajna, B. (1994). Software evaluation and choice:
Predictive validation of the technology acceptance
instrument.
MIS Quarterly, 18
(3), 319-324.
Siponen, M. (2000). A conceptual foundation for
organizational information security.
Informa-
tion Management and Computer Security, 8
(1),
31-44.
Titsworth, T. (2002). More than face value: Air-
ports and multimedia security.
IEEE Multimedia,
9
(2), 11-13.
Venkatesh, V., & Davis, F. (2000). A theoretical
extension of the technology acceptance model:
Four longitudinal field studies.
Management
Science, 46
(2), 186-204.
Smith, H., Milberg, S., & Burke, S. (1996). Infor-
mation privacy: Measuring individuals' concerns
about organizational practices.
MIS Quarterly,
20
(2), 167-196.
Wayman, J. (2000, February). Federal biometric
technology legislation.
Computer
, pp. 76-80.
Stewart, K., & Segars, A. (2002). An empirical
examination of the concern for information pri-
vacy instrument.
Information Systems Research,
13
(1), 36-49.
Westin, A. (1967).
Privacy and freedom
. New
York: Atheneum Publishers.
Woodward, J. (1997). Biometrics: Privacy's foe
or privacy's friend?
Proceedings of the IEEE,
85
(9), 1480-1492.
Straub, D. (1990). Effective IS security: An
empirical study.
Information Systems Research,
1
(3), 255-276.
Suydam, M. (2000, March). Taking (health) care.
Information Security,
p. 54.
Search WWH ::
Custom Search