-
1
-
-
23344451064
-
Busting the ghost in the machine
-
Arnett, K.P. and Schmidt, M.B. (2005), "Busting the ghost in the machine", Communications of the ACM, Vol. 48 No. 8, pp. 92-5.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 92-5
-
-
Arnett, K.P.1
Schmidt, M.B.2
-
2
-
-
23344443023
-
The deceptive behaviors that offend us most about spyware
-
Awad, N.F. and Fitzgerald, K. (2005), "The deceptive behaviors that offend us most about spyware", Communications of the ACM, Vol. 48 No. 8, pp. 55-60.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 55-60
-
-
Awad, N.F.1
Fitzgerald, K.2
-
3
-
-
0040217653
-
Trust in internet shopping: Instrument development and validation through classical and modern approaches
-
Cheung, C. and Lee, M.K.O. (2000), "Trust in internet shopping: instrument development and validation through classical and modern approaches", Journal of Global Information Management, Vol. 9 No. 3, pp. 23-35.
-
(2000)
Journal of Global Information Management
, vol.9
, Issue.3
, pp. 23-35
-
-
Cheung, C.1
Lee, M.K.O.2
-
4
-
-
72249114849
-
Information systems success: The quest for the dependent variable
-
DeLone, W. and McLean, E. (1992), "Information systems success: the quest for the dependent variable", Information Systems Research, Vol. 3 No. 1, pp. 60-95.
-
(1992)
Information Systems Research
, vol.3
, Issue.1
, pp. 60-95
-
-
Delone, W.1
McLean, E.2
-
5
-
-
55249106033
-
The measure of end-user computing satisfaction
-
Doll, W. and Torkzadeh, G. (1988), "The measure of end-user computing satisfaction", MIS Quarterly, Vol. 12 No. 2, pp. 259-74.
-
(1988)
MIS Quarterly
, vol.12
, Issue.2
, pp. 259-74
-
-
Doll, W.1
Torkzadeh, G.2
-
6
-
-
0001454849
-
A confirmatory factor analysis of the end-user computing satisfaction instrument
-
Doll, W., Xia, W. and Torkzadeh, G. (1994), "A confirmatory factor analysis of the end-user computing satisfaction instrument", MIS Quarterly, Vol. 18 No. 4, pp. 453-61.
-
(1994)
MIS Quarterly
, vol.18
, Issue.4
, pp. 453-61
-
-
Doll, W.1
Xia, W.2
Torkzadeh, G.3
-
7
-
-
0031502147
-
An examination of the nature of trust in buyer-seller relationships
-
Doney, P.M. and Cannon, J.P. (1997), "An examination of the nature of trust in buyer-seller relationships", Journal of Marketing, Vol. 61, pp. 35-51.
-
(1997)
Journal of Marketing
, vol.61
, pp. 35-51
-
-
Doney, P.M.1
Cannon, J.P.2
-
10
-
-
23344450939
-
Why do people hate spyware?
-
Freeman, L.A. and Urbaczewski, A. (2005), "Why do people hate spyware?", Communications of the ACM, Vol. 48 No. 8, pp. 50-3.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 50-3
-
-
Freeman, L.A.1
Urbaczewski, A.2
-
11
-
-
21744448471
-
Determinants of long-term orientation in buyer-seller relationships
-
Ganeson, S. (1994), "Determinants of long-term orientation in buyer-seller relationships", Journal of Marketing, Vol. 58 No. 2, pp. 1-19.
-
(1994)
Journal of Marketing
, vol.58
, Issue.2
, pp. 1-19
-
-
Ganeson, S.1
-
13
-
-
1142268386
-
Reflections on the dimensions of trust and trustworthiness among online consumers
-
Gefen, D. (2002), "Reflections on the dimensions of trust and trustworthiness among online consumers", Data Base, Vol. 33 No. 3, pp. 38-53.
-
(2002)
Data Base
, vol.33
, Issue.3
, pp. 38-53
-
-
Gefen, D.1
-
14
-
-
4444308350
-
Lessons learned from the successful adoption of an ERP system
-
Athens, Greece
-
Gefen, D. and Silver, M. (1999), "Lessons learned from the successful adoption of an ERP system", proceedings of the 5th International Conference of the Decision Sciences Institute, Athens, Greece, pp. 1054-7.
-
(1999)
5th International Conference of the Decision Sciences Institute
, pp. 1054-7
-
-
Gefen, D.1
Silver, M.2
-
15
-
-
0000615936
-
The 'science of sophomore' revisited: From conjecture to empiricism
-
Gordon, M.E., Slade, L.A. and Schmitt, N. (1986), "The 'science of sophomore' revisited: from conjecture to empiricism", Academy of Management Review, Vol. 11 No. 1, pp. 191-207.
-
(1986)
Academy of Management Review
, vol.11
, Issue.1
, pp. 191-207
-
-
Gordon, M.E.1
Slade, L.A.2
Schmitt, N.3
-
16
-
-
23344444212
-
Is spyware an internet nuisance or public menace?
-
Hu, Q. and Dinev, T. (2005), "Is spyware an internet nuisance or public menace?", Communications of the ACM, Vol. 48 No. 8, pp. 61-6.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 61-6
-
-
Hu, Q.1
Dinev, T.2
-
17
-
-
0002135118
-
Consumer trust in an internet store: A cross-cultural validation
-
Jarvenpaa, S.L. and Tractinsky, N. (1999), "Consumer trust in an internet store: a cross-cultural validation", Journal of Computer Mediated Communication, Vol. 5 No. 2, pp. 1-35.
-
(1999)
Journal of Computer Mediated Communication
, vol.5
, Issue.2
, pp. 1-35
-
-
Jarvenpaa, S.L.1
Tractinsky, N.2
-
18
-
-
33746435753
-
Who says that old dogs cannot learn new tricks?
-
Juznic, P., Blazic, M., Mercun, T., Plestenjak, B. and Majcenovic, D. (2006), "Who says that old dogs cannot learn new tricks?", New Library World, Vol. 107 Nos 7/8, p. 332.
-
(2006)
New Library World
, vol.107
, Issue.78
, pp. 332
-
-
Juznic, P.1
Blazic, M.2
Mercun, T.3
Plestenjak, B.4
Majcenovic, D.5
-
19
-
-
38349147785
-
Spyware: The ethics of covert software
-
Klang, M. (2004), "Spyware: the ethics of covert software", Ethics and Information Technology, Vol. 6 No. 3, pp. 193-202.
-
(2004)
Ethics and Information Technology
, vol.6
, Issue.3
, pp. 193-202
-
-
Klang, M.1
-
20
-
-
27844477240
-
An empirical investigation of the prevalence of spyware in internet shareware and freeware distributions
-
Kucera, K., Plaisent, M., Bernard, P. and Maguiraga, L. (2005), "An empirical investigation of the prevalence of spyware in internet shareware and freeware distributions", Journal of Enterprise Information Management, Vol. 18 Nos 5/6, pp. 697-708.
-
(2005)
Journal of Enterprise Information Management
, vol.18
, Issue.56
, pp. 697-708
-
-
Kucera, K.1
Plaisent, M.2
Bernard, P.3
Maguiraga, L.4
-
21
-
-
23344453209
-
Investigating factors affecting the adoption of anti-spyware systems
-
Lee, Y. and Kozar, K.A. (2005), "Investigating factors affecting the adoption of anti-spyware systems", Communications of the ACM, Vol. 48 No. 8, pp. 72-7.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 72-7
-
-
Lee, Y.1
Kozar, K.A.2
-
22
-
-
0033241307
-
The effect of the performance appraisal system on trust in management: A field quasi-experiment
-
Mayer, R.C. and Davis, J.H. (1999), "The effect of the performance appraisal system on trust in management: a field quasi-experiment", Journal of Applied Psychology, Vol. 84 No. 1, pp. 123-36.
-
(1999)
Journal of Applied Psychology
, vol.84
, Issue.1
, pp. 123-36
-
-
Mayer, R.C.1
Davis, J.H.2
-
23
-
-
0042495505
-
An integration model of organizational trust
-
Mayer, R.C., Davis, J.H. and Schoorman, F.D. (1995), "An integration model of organizational trust", Academy of Management Review, Vol. 20 No. 3, pp. 709-34.
-
(1995)
Academy of Management Review
, vol.20
, Issue.3
, pp. 709-34
-
-
Mayer, R.C.1
Davis, J.H.2
Schoorman, F.D.3
-
24
-
-
38349128305
-
-
available at: www.paristech.com (accessed March 12, 2006)
-
Paris Technologies, Inc. (n.d.), available at: www.paristech.com (accessed March 12, 2006).
-
-
-
Paris Technologies, Inc.1
-
26
-
-
23344452974
-
Spyware: A view from the (online) street
-
Poston, R., Stafford, T.F. and Hennington, A. (2005), "Spyware: a view from the (online) street", Communications of the ACM, Vol. 48 No. 8, pp. 96-9.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 96-9
-
-
Poston, R.1
Stafford, T.F.2
Hennington, A.3
-
27
-
-
0345014259
-
E-loyalty: Your secret weapon on the web
-
Reichheld, F.F. and Schefter, P. (2000), "E-loyalty: your secret weapon on the web", Harvard Business Review, Vol. 78 No. 4, pp. 105-13.
-
(2000)
Harvard Business Review
, vol.78
, Issue.4
, pp. 105-13
-
-
Reichheld, F.F.1
Schefter, P.2
-
28
-
-
23344441723
-
Spyware: A little knowledge is a wonderful thing
-
Schmidt, M.B. and Arnett, K.P. (2005), "Spyware: a little knowledge is a wonderful thing", Communications of the ACM, Vol. 48 No. 8, pp. 67-70.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 67-70
-
-
Schmidt, M.B.1
Arnett, K.P.2
-
29
-
-
23344444659
-
Web browsing and spyware intrusion
-
Shukla, S. and Nah, F.F. (2005), "Web browsing and spyware intrusion", Communications of the ACM, Vol. 48 No. 8, p. 85.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 85
-
-
Shukla, S.1
Nah, F.F.2
-
30
-
-
15744395148
-
The ethical and legal concerns of spyware
-
Sipior, J.C., Ward, B.T. and Roselli, G.R. (2005), "The ethical and legal concerns of spyware", Information Systems Management, Vol. 22 No. 2, pp. 39-49.
-
(2005)
Information Systems Management
, vol.22
, Issue.2
, pp. 39-49
-
-
Sipior, J.C.1
Ward, B.T.2
Roselli, G.R.3
-
31
-
-
23344454070
-
Spyware: The ghost in the machine
-
Stafford, T.F. and Urbaczewski, A. (2004), "Spyware: the ghost in the machine", Communications of the AIS, Vol. 14, pp. 291-306.
-
(2004)
Communications of the AIS
, vol.14
, pp. 291-306
-
-
Stafford, T.F.1
Urbaczewski, A.2
-
32
-
-
23344441842
-
A framework for spyware assessment
-
Warkentin, M., Luo, X. and Templeton, G.F. (2005), "A framework for spyware assessment", Communications of the ACM, Vol. 48 No. 8, pp. 79-84.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 79-84
-
-
Warkentin, M.1
Luo, X.2
Templeton, G.F.3
-
33
-
-
23344449408
-
What do consumers really know about spyware?
-
Zhang, X. (2005), "What do consumers really know about spyware?", Communications of the ACM, Vol. 48 No. 8, pp. 44-8.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 44-8
-
-
Zhang, X.1
|