-
1
-
-
1242290069
-
The validity of Haire's shopping list projective technique
-
Anderson, J. C. (1978). The validity of Haire's shopping list projective technique. Journal of Marketing Research, 15(4), 644-649.
-
(1978)
Journal of Marketing Research
, vol.15
, Issue.4
, pp. 644-649
-
-
Anderson, J.C.1
-
2
-
-
0036644509
-
Computer monitoring: Benefits and pitfalls facing management
-
Ariss, S. S. (2002). Computer monitoring: Benefits and pitfalls facing management. Information & Management, 39(7), 553-558.
-
(2002)
Information & Management
, vol.39
, Issue.7
, pp. 553-558
-
-
Ariss, S.S.1
-
3
-
-
38949115254
-
When does national identity matter? Convergence and divergence in international business ethics
-
Bailey, W. J., & Spicer, A. (2007). When does national identity matter? Convergence and divergence in international business ethics. Academy of Management Journal, 50(6), 1462-1480.
-
(2007)
Academy of Management Journal
, vol.50
, Issue.6
, pp. 1462-1480
-
-
Bailey, W.J.1
Spicer, A.2
-
4
-
-
0002520483
-
Modeling IT ethics: A study in situational ethics
-
Banerjee, D., Cronan, T. P., & Jones, T. M. (1998). Modeling IT ethics: A study in situational ethics. MIS Quarterly, 22(1), 31-60.
-
(1998)
MIS Quarterly
, vol.22
, Issue.1
, pp. 31-60
-
-
Banerjee, D.1
Cronan, T.P.2
Jones, T.M.3
-
5
-
-
54149095626
-
An exploration of ethical decision-making processes in the United States and Egypt
-
Beekun, R. I., Hamdy, R., Westerman, J. W., & HassabElnaby, H. R. (2008). An exploration of ethical decision-making processes in the United States and Egypt. Journal of Business Ethics, 82(3), 587-605.
-
(2008)
Journal of Business Ethics
, vol.82
, Issue.3
, pp. 587-605
-
-
Beekun, R.I.1
Hamdy, R.2
Westerman, J.W.3
HassabElnaby, H.R.4
-
6
-
-
0034195071
-
Development of a measure of workplace deviance
-
Bennett, R. J., & Robinson, S. L. (2000). Development of a measure of workplace deviance. Journal of Applied Psychology, 85(3), 349-360.
-
(2000)
Journal of Applied Psychology
, vol.85
, Issue.3
, pp. 349-360
-
-
Bennett, R.J.1
Robinson, S.L.2
-
7
-
-
1842590346
-
Human research and data collection via the internet
-
Birnbaum, M. H. (2004). Human research and data collection via the internet. Annual Reviews of Psychology, 55, 803-832.
-
(2004)
Annual Reviews of Psychology
, vol.55
, pp. 803-832
-
-
Birnbaum, M.H.1
-
8
-
-
67650100804
-
If someone is watching, I'll do what I'm asked: Mandatoriness, control, and information security
-
Boss, S. R., Kirsch, L. J., Angermeier, I., Shingler, R. A., & Boss, R. W. (2009). If someone is watching, I'll do what I'm asked: Mandatoriness, control, and information security. European Journal of Information Systems, 18(2), 151-164.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 151-164
-
-
Boss, S.R.1
Kirsch, L.J.2
Angermeier, I.3
Shingler, R.A.4
Boss, R.W.5
-
9
-
-
9744260316
-
Validation in information systems research: A state-of-the-art assessment
-
Boudreau, M. C., Gefen, D., & Straub, D. W. (2001). Validation in information systems research: A state-of-the-art assessment. MIS Quarterly, 25(1), 1-16.
-
(2001)
MIS Quarterly
, vol.25
, Issue.1
, pp. 1-16
-
-
Boudreau, M.C.1
Gefen, D.2
Straub, D.W.3
-
10
-
-
0000158425
-
Business meta-ethics: An analysis of two theories
-
Brady, F. N., & Dunn, C. P. (1995). Business meta-ethics: An analysis of two theories. Business Ethics Quarterly, 3, 5.
-
(1995)
Business Ethics Quarterly
, vol.3
, pp. 5
-
-
Brady, F.N.1
Dunn, C.P.2
-
11
-
-
0030242162
-
An empirical study of ethical predispositions
-
Brady, F. N., & Wheeler, G. E. (1996). An empirical study of ethical predispositions. Journal of Business Ethics, 15(9), 927-940.
-
(1996)
Journal of Business Ethics
, vol.15
, Issue.9
, pp. 927-940
-
-
Brady, F.N.1
Wheeler, G.E.2
-
12
-
-
33750922314
-
Ethics in information technology and software use
-
Calluzzo, V. J., & Cante, C. J. (2004). Ethics in information technology and software use. Journal of Business Ethics, 51(3), 301-312.
-
(2004)
Journal of Business Ethics
, vol.51
, Issue.3
, pp. 301-312
-
-
Calluzzo, V.J.1
Cante, C.J.2
-
13
-
-
67649529385
-
Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems
-
Cavusoglu, H., Raghunathan, S., & Cavusoglu, H. (2009). Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems. Information Systems Research, 20(2), 198-217.
-
(2009)
Information Systems Research
, vol.20
, Issue.2
, pp. 198-217
-
-
Cavusoglu, H.1
Raghunathan, S.2
Cavusoglu, H.3
-
14
-
-
72049101186
-
Interpretation of formative measurement in information systems research
-
Cenfetelli, R. T., & Bassellier, G. (2009). Interpretation of formative measurement in information systems research. MIS Quarterly, 33(4), 689-707.
-
(2009)
MIS Quarterly
, vol.33
, Issue.4
, pp. 689-707
-
-
Cenfetelli, R.T.1
Bassellier, G.2
-
15
-
-
70749103039
-
Ethical information systems development: A Baumanian postmodernist perspective
-
Chatterjee, S., Sarker, S., & Fuller, M. (2009). Ethical information systems development: A Baumanian postmodernist perspective. Journal of the Association for Information Systems, 10(11), 787-815.
-
(2009)
Journal of the Association for Information Systems
, vol.10
, Issue.11
, pp. 787-815
-
-
Chatterjee, S.1
Sarker, S.2
Fuller, M.3
-
16
-
-
27844581775
-
Cross-national differences in cooperative decision-making in mixed-motive business contexts: The mediating effect of vertical and horizontal individualism
-
Chen, X. P., & Li, S. (2005). Cross-national differences in cooperative decision-making in mixed-motive business contexts: The mediating effect of vertical and horizontal individualism. Journal of International Business Studies, 36, 622-636.
-
(2005)
Journal of International Business Studies
, vol.36
, pp. 622-636
-
-
Chen, X.P.1
Li, S.2
-
17
-
-
0031288383
-
To purchase or to pirate software: An empirical study
-
Cheng, H. K., Sims, R. R., & Teegen, H. (1997). To purchase or to pirate software: An empirical study. Journal of Management Information Systems, 13(4), 49-60.
-
(1997)
Journal of Management Information Systems
, vol.13
, Issue.4
, pp. 49-60
-
-
Cheng, H.K.1
Sims, R.R.2
Teegen, H.3
-
18
-
-
84901346165
-
-
December 16-18, Paper presented at the 17th International conference on information systems, Cleveland, OH, USA
-
Chin, W. W., Marcolin, B. L., & Newsted, P. R. (1996, December 16-18). A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and voice mail emotion/adoption study. Paper presented at the 17th International conference on information systems, Cleveland, OH, USA.
-
(1996)
A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and voice mail emotion/adoption study
-
-
Chin, W.W.1
Marcolin, B.L.2
Newsted, P.R.3
-
19
-
-
0042242856
-
A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic mail emotion/adoption study
-
Chin, W., Marcolin, B., & Newsted, P. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic mail emotion/adoption study. Information Systems Research, 14(2), 189-217.
-
(2003)
Information Systems Research
, vol.14
, Issue.2
, pp. 189-217
-
-
Chin, W.1
Marcolin, B.2
Newsted, P.3
-
20
-
-
0001003693
-
A question of ethics: Developing information system ethics
-
Cohen, E., & Cornwell, L. (1989). A question of ethics: Developing information system ethics. Journal of Business Ethics, 8(6), 431-437.
-
(1989)
Journal of Business Ethics
, vol.8
, Issue.6
, pp. 431-437
-
-
Cohen, E.1
Cornwell, L.2
-
22
-
-
72049116025
-
How ethics can enhance organizational privacy: Lessons from the ChoicePoint and TJX data breaches
-
Culnan, M., & Williams, C. (2009). How ethics can enhance organizational privacy: Lessons from the ChoicePoint and TJX data breaches. MIS Quarterly, 33(4), 673-686.
-
(2009)
MIS Quarterly
, vol.33
, Issue.4
, pp. 673-686
-
-
Culnan, M.1
Williams, C.2
-
23
-
-
34848873123
-
Deterring internal information systems misuse
-
D'Arcy, J., & Hovav, A. (2007). Deterring internal information systems misuse. Communications of the ACM, 50(10), 113-117.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 113-117
-
-
D'Arcy, J.1
Hovav, A.2
-
24
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
D'Arcy, J., Hovav, A., & Galletta, D. F. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79-98.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.F.3
-
25
-
-
70749115325
-
The ethics of IT professionals in Japan and China
-
Davison, R. M., Martinsons, M. G., Ou, C. X. J., Murata, K., Drummond, D., Li, Y., et al. (2009). The ethics of IT professionals in Japan and China. Journal of the Association for Information Systems, 10(11), 834-859.
-
(2009)
Journal of the Association for Information Systems
, vol.10
, Issue.11
, pp. 834-859
-
-
Davison, R.M.1
Martinsons, M.G.2
Ou, C.X.J.3
Murata, K.4
Drummond, D.5
Li, Y.6
-
26
-
-
33845439549
-
Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration
-
Diamantopoulos, A., & Siguaw, J. A. (2006). Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration. British Journal of Management, 17(2006), 263-282.
-
(2006)
British Journal of Management
, vol.17
, Issue.2006
, pp. 263-282
-
-
Diamantopoulos, A.1
Siguaw, J.A.2
-
27
-
-
0035534144
-
Index construction with formative indicators: An alternative to scale development
-
Diamantopoulos, A., & Winklhofer, H. M. (2001). Index construction with formative indicators: An alternative to scale development. Journal of Marketing Research, 38(2), 269-277.
-
(2001)
Journal of Marketing Research
, vol.38
, Issue.2
, pp. 269-277
-
-
Diamantopoulos, A.1
Winklhofer, H.M.2
-
28
-
-
0003100216
-
Values in tension: Ethics away from home
-
Donaldson, T. (1996). Values in tension: Ethics away from home. Harvard Business Review, 74(5), 48-62.
-
(1996)
Harvard Business Review
, vol.74
, Issue.5
, pp. 48-62
-
-
Donaldson, T.1
-
29
-
-
34447342255
-
Equity perceptions as a deterrent to software piracy behavior
-
Douglas, D. E., Cronan, T. P., & Behel, J. D. (2007). Equity perceptions as a deterrent to software piracy behavior. Information & Management, 44(5), 503-512.
-
(2007)
Information & Management
, vol.44
, Issue.5
, pp. 503-512
-
-
Douglas, D.E.1
Cronan, T.P.2
Behel, J.D.3
-
31
-
-
33744785923
-
Organizational behaviour across cultures: Theoretical and methodological issues for developing multi-level frameworks involving culture
-
Fischer, R., Ferreira, M. C., Assmar, E. M. L., Redford, P., & Harb, C. (2005). Organizational behaviour across cultures: Theoretical and methodological issues for developing multi-level frameworks involving culture. International Journal of Cross Cultural Management, 5(1), 27-48.
-
(2005)
International Journal of Cross Cultural Management
, vol.5
, Issue.1
, pp. 27-48
-
-
Fischer, R.1
Ferreira, M.C.2
Assmar, E.M.L.3
Redford, P.4
Harb, C.5
-
32
-
-
21144473928
-
Social desirability bias and the validity of indirect questioning
-
Fisher, R. J. (1993). Social desirability bias and the validity of indirect questioning. Journal of Consumer Research, 20(2), 303-315.
-
(1993)
Journal of Consumer Research
, vol.20
, Issue.2
, pp. 303-315
-
-
Fisher, R.J.1
-
33
-
-
85047670115
-
Using individualism and collectivism to compare cultures-A critique of the validity and measurement of the constructs: Comment on Oyserman et al. (2002)
-
Fiske, A. P. (2002). Using individualism and collectivism to compare cultures-A critique of the validity and measurement of the constructs: Comment on Oyserman et al. (2002). Psychological Bulletin, 128(1), 78-88.
-
(2002)
Psychological Bulletin
, vol.128
, Issue.1
, pp. 78-88
-
-
Fiske, A.P.1
-
34
-
-
0000009769
-
Evaluating structural equation models with unobservable variables and measurement error
-
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1981), 39-50.
-
(1981)
Journal of Marketing Research
, vol.18
, Issue.1981
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
35
-
-
67650565830
-
Using the internet for personality research: What can be done, how to do it, and some concerns
-
R. W. Robins, R. C. Fraley, and R. F. Krueger (Eds.), New York: Guilford
-
Fraley, R. C. (2007). Using the internet for personality research: What can be done, how to do it, and some concerns. In R. W. Robins, R. C. Fraley, & R. F. Krueger (Eds.), Methods in personality psychology (pp. 130-148). New York: Guilford.
-
(2007)
Methods in Personality Psychology
, pp. 130-148
-
-
Fraley, R.C.1
-
36
-
-
33745932103
-
An empirical study of software piracy among tertiary institutions in Singapore
-
Gan, L. L., & Koh, H. C. (2006). An empirical study of software piracy among tertiary institutions in Singapore. Information & Management, 43(5), 640-649.
-
(2006)
Information & Management
, vol.43
, Issue.5
, pp. 640-649
-
-
Gan, L.L.1
Koh, H.C.2
-
37
-
-
0005766289
-
Morality and computers: Attitudes and differences in moral judgments
-
Gattiker, U. E., & Kelley, H. (1999). Morality and computers: Attitudes and differences in moral judgments. Information Systems Research, 10(3), 233-254.
-
(1999)
Information Systems Research
, vol.10
, Issue.3
, pp. 233-254
-
-
Gattiker, U.E.1
Kelley, H.2
-
38
-
-
29444460597
-
A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example
-
Gefen, D., & Straub, D. W. (2005). A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example. Communications of the Association for Information Systems, 16(5), 91-109.
-
(2005)
Communications of the Association for Information Systems
, vol.16
, Issue.5
, pp. 91-109
-
-
Gefen, D.1
Straub, D.W.2
-
39
-
-
34247845989
-
Situational influences on ethical decision-making in an IT context
-
Haines, R., & Leonard, L. N. K. (2007). Situational influences on ethical decision-making in an IT context. Information & Management, 44(3), 313-320.
-
(2007)
Information & Management
, vol.44
, Issue.3
, pp. 313-320
-
-
Haines, R.1
Leonard, L.N.K.2
-
40
-
-
34547798962
-
Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection
-
Hansen, J. V., Lowry, P. B., Meservy, R., & McDonald, D. (2007). Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. Decision Support Systems, 43(4), 1362-1374.
-
(2007)
Decision Support Systems
, vol.43
, Issue.4
, pp. 1362-1374
-
-
Hansen, J.V.1
Lowry, P.B.2
Meservy, R.3
McDonald, D.4
-
41
-
-
0000917858
-
The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
-
Harrington, S. J. (1996). The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly, 20(3), 257-278.
-
(1996)
MIS Quarterly
, vol.20
, Issue.3
, pp. 257-278
-
-
Harrington, S.J.1
-
42
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
Herath, T., & Rao, H. R. (2009a). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154-165.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
43
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
Herath, T., & Rao, H. R. (2009b). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
44
-
-
0346111578
-
Information systems ethics: A practitioner survey
-
Hilton, T. (2000). Information systems ethics: A practitioner survey. Journal of Business Ethics, 28(4), 279-284.
-
(2000)
Journal of Business Ethics
, vol.28
, Issue.4
, pp. 279-284
-
-
Hilton, T.1
-
48
-
-
23044529048
-
The pitfalls of cross-national survey research: A reply to the article by Spector et al. on the psychometric properties of the Hofstede value survey module 1994
-
Hofstede, G. (2002). The pitfalls of cross-national survey research: A reply to the article by Spector et al. on the psychometric properties of the Hofstede value survey module 1994. Applied Psychology: An International Review, 51(1), 170-178.
-
(2002)
Applied Psychology: An International Review
, vol.51
, Issue.1
, pp. 170-178
-
-
Hofstede, G.1
-
49
-
-
84970109540
-
A general theory of marketing ethics
-
Hunt, S. D., & Vitell, S. J. (1986). A general theory of marketing ethics. Journal of Macromarketing, 6(Spring), 5-16.
-
(1986)
Journal of Macromarketing
, vol.6
, Issue.Spring
, pp. 5-16
-
-
Hunt, S.D.1
Vitell, S.J.2
-
50
-
-
0034238348
-
The impact of national culture on software piracy
-
Husted, B. W. (2000). The impact of national culture on software piracy. Journal of Business Ethics, 26(3), 197-211.
-
(2000)
Journal of Business Ethics
, vol.26
, Issue.3
, pp. 197-211
-
-
Husted, B.W.1
-
51
-
-
53649094719
-
Toward a model of cross-cultural business ethics: The impact of individualism and collectivism on the ethical decision-making process
-
Husted, B., & Allen, D. (2008). Toward a model of cross-cultural business ethics: The impact of individualism and collectivism on the ethical decision-making process. Journal of Business Ethics, 82(2), 293-305.
-
(2008)
Journal of Business Ethics
, vol.82
, Issue.2
, pp. 293-305
-
-
Husted, B.1
Allen, D.2
-
52
-
-
0030501658
-
The impact of cross-national carriers of business ethics on attitudes about questionable practices and form of moral reasoning
-
Husted, B. W., Dozier, J. B., McMahon, J. T., & Kattan, M. W. (1996). The impact of cross-national carriers of business ethics on attitudes about questionable practices and form of moral reasoning. Journal of International Business Studies, 27(2), 391-411.
-
(1996)
Journal of International Business Studies
, vol.27
, Issue.2
, pp. 391-411
-
-
Husted, B.W.1
Dozier, J.B.2
McMahon, J.T.3
Kattan, M.W.4
-
53
-
-
0000842967
-
Marketing jobs and management controls: Toward a framework
-
Jaworski, B. J., & MacInnis, D. J. (1989). Marketing jobs and management controls: Toward a framework. Journal of Marketing Research, 26, 406-419.
-
(1989)
Journal of Marketing Research
, vol.26
, pp. 406-419
-
-
Jaworski, B.J.1
MacInnis, D.J.2
-
54
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34, 549-566.
-
(2010)
MIS Quarterly
, vol.34
, pp. 549-566
-
-
Johnston, A.C.1
Warkentin, M.2
-
55
-
-
1542633735
-
The link between ethical judgment and action in organizations: A moral approbation approach
-
Jones, T. M., & Ryan, L. V. (1997). The link between ethical judgment and action in organizations: A moral approbation approach. Organization Science, 8(6), 663-680.
-
(1997)
Organization Science
, vol.8
, Issue.6
, pp. 663-680
-
-
Jones, T.M.1
Ryan, L.V.2
-
56
-
-
70749087044
-
A behavioral analysis of passphrase design and effectiveness
-
Keith, M., Shao, B., & Steinbart, P. (2009). A behavioral analysis of passphrase design and effectiveness. Journal of the Association for Information Systems, 10(2), 63-89.
-
(2009)
Journal of the Association for Information Systems
, vol.10
, Issue.2
, pp. 63-89
-
-
Keith, M.1
Shao, B.2
Steinbart, P.3
-
58
-
-
2342489402
-
An integrative model of computer abuse based on social control and general deterrence theories
-
Lee, S. M., Lee, S. G., & Yoo, S. (2004). An integrative model of computer abuse based on social control and general deterrence theories. Information & Management, 41, 707-718.
-
(2004)
Information & Management
, vol.41
, pp. 707-718
-
-
Lee, S.M.1
Lee, S.G.2
Yoo, S.3
-
59
-
-
4644242309
-
Illegal, inappropriate, and unethical behavior in an information technology context: A study to explain influences
-
Leonard, L. N. K., & Cronan, T. P. (2001). Illegal, inappropriate, and unethical behavior in an information technology context: A study to explain influences. Journal of the Association for Information Systems, 1(12), 1-31.
-
(2001)
Journal of the Association for Information Systems
, vol.1
, Issue.12
, pp. 1-31
-
-
Leonard, L.N.K.1
Cronan, T.P.2
-
60
-
-
4544362187
-
What influences IT ethical behavior intentions-Planned behavior, reasoned action, perceived importance, or individual characteristics?
-
Leonard, L. N. K., Cronan, T. P., & Kreie, J. (2004). What influences IT ethical behavior intentions-Planned behavior, reasoned action, perceived importance, or individual characteristics? Information & Management, 42(2004), 143-158.
-
(2004)
Information & Management
, vol.42
, Issue.2004
, pp. 143-158
-
-
Leonard, L.N.K.1
Cronan, T.P.2
Kreie, J.3
-
61
-
-
33847761422
-
Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management
-
Liang, H., Saraf, N., Hu, Q., & Xue, Y. (2007). Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management. MIS Quarterly, 31(1), 59-87.
-
(2007)
MIS Quarterly
, vol.31
, Issue.1
, pp. 59-87
-
-
Liang, H.1
Saraf, N.2
Hu, Q.3
Xue, Y.4
-
62
-
-
0030194196
-
Evaluating ethical decision making and computer use
-
Loch, K. D., & Conger, S. (1995). Evaluating ethical decision making and computer use. Communications of the ACM, 39(7), 74-83.
-
(1995)
Communications of the ACM
, vol.39
, Issue.7
, pp. 74-83
-
-
Loch, K.D.1
Conger, S.2
-
63
-
-
69249098534
-
The CMC interactivity model: How interactivity enhances communication quality and process satisfaction in lean-media groups
-
Lowry, P. B., Romano, N. C., Jenkins, J. L., & Guthrie, R. W. (2009). The CMC interactivity model: How interactivity enhances communication quality and process satisfaction in lean-media groups. Journal of Management Information Systems, 26(1), 159-200.
-
(2009)
Journal of Management Information Systems
, vol.26
, Issue.1
, pp. 159-200
-
-
Lowry, P.B.1
Romano, N.C.2
Jenkins, J.L.3
Guthrie, R.W.4
-
64
-
-
44249091185
-
Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites
-
Lowry, P. B., Vance, A., Moody, G., Beckman, B., & Read, A. (2008). Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites. Journal of Management Information Systems, 24(4), 199-224.
-
(2008)
Journal of Management Information Systems
, vol.24
, Issue.4
, pp. 199-224
-
-
Lowry, P.B.1
Vance, A.2
Moody, G.3
Beckman, B.4
Read, A.5
-
65
-
-
23444456749
-
Integrating national culture into IS research: The need for current individual-level measures
-
McCoy, S., Galletta, D. F., & King, W. R. (2005). Integrating national culture into IS research: The need for current individual-level measures. Communications of the AIS, 15, 211-224.
-
(2005)
Communications of the AIS
, vol.15
, pp. 211-224
-
-
McCoy, S.1
Galletta, D.F.2
King, W.R.3
-
66
-
-
67249144000
-
Information technology auditing: A value-added IT governance partnership between IT management and audit
-
Merhout, J. W., & Havelka, D. (2008). Information technology auditing: A value-added IT governance partnership between IT management and audit. Communications of the Association for Information Systems, 23(26), 463-482.
-
(2008)
Communications of the Association for Information Systems
, vol.23
, Issue.26
, pp. 463-482
-
-
Merhout, J.W.1
Havelka, D.2
-
67
-
-
0030516130
-
Are studies of dark side variables confounded by socially desirable responding? The case of materialism
-
Mick, D. G. (1996). Are studies of dark side variables confounded by socially desirable responding? The case of materialism. Journal of Consumer Research, 23(2), 106-111.
-
(1996)
Journal of Consumer Research
, vol.23
, Issue.2
, pp. 106-111
-
-
Mick, D.G.1
-
68
-
-
33845728874
-
Ethical decision making in software piracy: Initial development and test of a four-component model
-
Moores, T. T., & Chang, J. C.-J. (2006). Ethical decision making in software piracy: Initial development and test of a four-component model. MIS Quarterly, 30(1), 167-180.
-
(2006)
MIS Quarterly
, vol.30
, Issue.1
, pp. 167-180
-
-
Moores, T.T.1
Chang, J.C.-J.2
-
69
-
-
4344702911
-
A reversed context analysis of software piracy issues in Singapore
-
Moores, T. T., & Dhaliwal, J. (2004). A reversed context analysis of software piracy issues in Singapore. Information & Management, 41(8), 1037-1042.
-
(2004)
Information & Management
, vol.41
, Issue.8
, pp. 1037-1042
-
-
Moores, T.T.1
Dhaliwal, J.2
-
70
-
-
67650143327
-
What levels of moral reasoning and values explain adherence to information security rules? An empirical study
-
Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., & Vance, A. (2009). What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18(2), 126-139.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 126-139
-
-
Myyry, L.1
Siponen, M.2
Pahnila, S.3
Vartiainen, T.4
Vance, A.5
-
72
-
-
34248575340
-
High power, low power, and equality: Culture beyond individualism and collectivism
-
Oyserman, D. (2006). High power, low power, and equality: Culture beyond individualism and collectivism. Journal of Consumer Psychology, 16(4), 352-356.
-
(2006)
Journal of Consumer Psychology
, vol.16
, Issue.4
, pp. 352-356
-
-
Oyserman, D.1
-
73
-
-
0036370845
-
Rethinking individualism and collectivism: Evaluation of the theoretical assumptions and meta-analysis
-
Oyserman, D., Coon, M., & Kemmelmeier, M. (2002). Rethinking individualism and collectivism: Evaluation of the theoretical assumptions and meta-analysis. Psychological Bulletin, 128(1), 3-72.
-
(2002)
Psychological Bulletin
, vol.128
, Issue.1
, pp. 3-72
-
-
Oyserman, D.1
Coon, M.2
Kemmelmeier, M.3
-
74
-
-
40749152218
-
Does culture influence what and how we think? Effects of priming individualism and collectivism
-
Oyserman, D., & Lee, S. W. S. (2008). Does culture influence what and how we think? Effects of priming individualism and collectivism. Psychological Bulletin, 134(2), 311-342.
-
(2008)
Psychological Bulletin
, vol.134
, Issue.2
, pp. 311-342
-
-
Oyserman, D.1
Lee, S.W.S.2
-
75
-
-
84867141838
-
Making sense of the diversity of ethical decision making in business: An illustration of the Indian context
-
Patel, T., & Schaefe, A. (2009). Making sense of the diversity of ethical decision making in business: An illustration of the Indian context. Journal of Business Ethics, 90(2), 171-186.
-
(2009)
Journal of Business Ethics
, vol.90
, Issue.2
, pp. 171-186
-
-
Patel, T.1
Schaefe, A.2
-
76
-
-
33847764616
-
Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective
-
Pavlou, P., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31(1), 105-136.
-
(2007)
MIS Quarterly
, vol.31
, Issue.1
, pp. 105-136
-
-
Pavlou, P.1
Liang, H.2
Xue, Y.3
-
77
-
-
0041426663
-
Software piracy in the workplace: A model and empirical test
-
Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153-177.
-
(2003)
Journal of Management Information Systems
, vol.20
, Issue.1
, pp. 153-177
-
-
Peace, A.G.1
Galletta, D.F.2
Thong, J.Y.L.3
-
78
-
-
38549116762
-
Specifying formative constructs in information systems research
-
Petter, S., Straub, D. W., & Rai, A. (2007). Specifying formative constructs in information systems research. MIS Quarterly, 31(4), 623-656.
-
(2007)
MIS Quarterly
, vol.31
, Issue.4
, pp. 623-656
-
-
Petter, S.1
Straub, D.W.2
Rai, A.3
-
79
-
-
0141907688
-
Common method biases in behavioral research: A critical review of the literature and recommended remedies
-
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879-903.
-
(2003)
Journal of Applied Psychology
, vol.88
, Issue.5
, pp. 879-903
-
-
Podsakoff, P.M.1
MacKenzie, S.B.2
Lee, J.Y.3
Podsakoff, N.P.4
-
80
-
-
84875487357
-
When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse
-
Posey, C., Bennett, R., Roberts, T. L., & Lowry, P. B. (2011). When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse. Journal of Information System Security, 7(1), 24-47.
-
(2011)
Journal of Information System Security
, vol.7
, Issue.1
, pp. 24-47
-
-
Posey, C.1
Bennett, R.2
Roberts, T.L.3
Lowry, P.B.4
-
81
-
-
38049183252
-
The impact of national culture and economic ideology on managerial work values: A study of the United States, Russia, Japan, and China
-
Ralston, D. A., Holt, D. H., Terpstra, R. H., & Kai-Cheng, Y. (2008). The impact of national culture and economic ideology on managerial work values: A study of the United States, Russia, Japan, and China. Journal of International Business Studies, 39(1), 8-26.
-
(2008)
Journal of International Business Studies
, vol.39
, Issue.1
, pp. 8-26
-
-
Ralston, D.A.1
Holt, D.H.2
Terpstra, R.H.3
Kai-Cheng, Y.4
-
82
-
-
67649548424
-
Choice and chance: A conceptual model of paths to information security compromise
-
Ransbotham, S., & Mitra, S. (2009). Choice and chance: A conceptual model of paths to information security compromise. Information Systems Research, 20(1), 121-139.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 121-139
-
-
Ransbotham, S.1
Mitra, S.2
-
83
-
-
38349168980
-
Host country resource availability and information system control mechanisms in multinational corporations: An empirical test of resource dependence theory
-
Rao, M. T., Brown, C. V., & Perkins, W. C. (2007). Host country resource availability and information system control mechanisms in multinational corporations: An empirical test of resource dependence theory. Journal of Management Information Systems, 23(4), 11-28.
-
(2007)
Journal of Management Information Systems
, vol.23
, Issue.4
, pp. 11-28
-
-
Rao, M.T.1
Brown, C.V.2
Perkins, W.C.3
-
84
-
-
56749152239
-
-
Retrieved September 17
-
Ringle, C. M., Wende, S., & Will, S. (2005). SmartPLS 2. 0 (M3) Beta. Retrieved September 17, 2010, from http://www. smartpls. de.
-
(2005)
SmartPLS 2. 0 (M3) Beta
-
-
Ringle, C.M.1
Wende, S.2
Will, S.3
-
85
-
-
0037381651
-
Mapping moral philosophies: Strategic implications for multinational firms
-
Robertson, C. J., & Crittenden, W. F. (2002). Mapping moral philosophies: Strategic implications for multinational firms. Strategic Management Journal, 24(4), 327-338.
-
(2002)
Strategic Management Journal
, vol.24
, Issue.4
, pp. 327-338
-
-
Robertson, C.J.1
Crittenden, W.F.2
-
86
-
-
0141448634
-
Situational ethics across borders: A multicultural examination
-
Robertson, C., Crittenden, W., Brady, M., & Hoffman, J. (2002). Situational ethics across borders: A multicultural examination. Journal of Business Ethics, 38(4), 327-338.
-
(2002)
Journal of Business Ethics
, vol.38
, Issue.4
, pp. 327-338
-
-
Robertson, C.1
Crittenden, W.2
Brady, M.3
Hoffman, J.4
-
87
-
-
0033131830
-
Ethical decision making in multinational organizations: A culture-based model
-
Robertson, C., & Fadil, P. A. (1999). Ethical decision making in multinational organizations: A culture-based model. Journal of Business Ethics, 19(4), 385-392.
-
(1999)
Journal of Business Ethics
, vol.19
, Issue.4
, pp. 385-392
-
-
Robertson, C.1
Fadil, P.A.2
-
88
-
-
39749088673
-
Trade liberalization, corruption, and software piracy
-
Robertson, C., Gilley, K., & Crittenden, W. (2008). Trade liberalization, corruption, and software piracy. Journal of Business Ethics, 78(4), 623-634.
-
(2008)
Journal of Business Ethics
, vol.78
, Issue.4
, pp. 623-634
-
-
Robertson, C.1
Gilley, K.2
Crittenden, W.3
-
89
-
-
21844526560
-
A typology of deviant workplace behaviors: A multidimensional scaling study
-
Robinson, S. L., & Bennett, R. J. (1995). A typology of deviant workplace behaviors: A multidimensional scaling study. Academy of Management Journal, 38(2), 555-572.
-
(1995)
Academy of Management Journal
, vol.38
, Issue.2
, pp. 555-572
-
-
Robinson, S.L.1
Bennett, R.J.2
-
90
-
-
0032218162
-
Monkey see, monkey do: The influence of work groups on the antisocial behavior of employees
-
Robinson, S. L., & O'Leary-Kelly, A. M. (1998). Monkey see, monkey do: The influence of work groups on the antisocial behavior of employees. Academy of Management Journal, 41(6), 658-672.
-
(1998)
Academy of Management Journal
, vol.41
, Issue.6
, pp. 658-672
-
-
Robinson, S.L.1
O'Leary-Kelly, A.M.2
-
91
-
-
85132290401
-
The influence of country and industry on ethical perceptions of senior executives in the U.S. and Europe
-
Schlegelmilch, B. B., & Robertson, D. C. (1995). The influence of country and industry on ethical perceptions of senior executives in the U. S. and Europe. Journal of International Business Studies, 26(4), 859-881.
-
(1995)
Journal of International Business Studies
, vol.26
, Issue.4
, pp. 859-881
-
-
Schlegelmilch, B.B.1
Robertson, D.C.2
-
92
-
-
0031256491
-
The effect of ethical frameworks on perceptions of organizational justice
-
Schminke, M., Ambrose, M. L., & Noel, T. W. (1997). The effect of ethical frameworks on perceptions of organizational justice. Academy of Management Journal, 40(5), 1190-1207.
-
(1997)
Academy of Management Journal
, vol.40
, Issue.5
, pp. 1190-1207
-
-
Schminke, M.1
Ambrose, M.L.2
Noel, T.W.3
-
93
-
-
0007083048
-
Group processes and performance and their effects on individuals' ethical frameworks
-
Schminke, M., & Wells, D. (1999). Group processes and performance and their effects on individuals' ethical frameworks. Journal of Business Ethics, 18(4), 367-381.
-
(1999)
Journal of Business Ethics
, vol.18
, Issue.4
, pp. 367-381
-
-
Schminke, M.1
Wells, D.2
-
94
-
-
33847076149
-
An empirical investigation of socio-cultural factors of information sharing in China
-
Shin, S. K., Ishman, M., & Sanders, G. L. (2007). An empirical investigation of socio-cultural factors of information sharing in China. Information & Management, 44(2), 165-174.
-
(2007)
Information & Management
, vol.44
, Issue.2
, pp. 165-174
-
-
Shin, S.K.1
Ishman, M.2
Sanders, G.L.3
-
95
-
-
77957068563
-
Neutralization: New insights into the problem of employee information systems security policy violations
-
Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34, 487-502.
-
(2010)
MIS Quarterly
, vol.34
, pp. 487-502
-
-
Siponen, M.1
Vance, A.2
-
96
-
-
4644234503
-
Unauthorized copying of software and levels of moral development: A literature analysis and its implications for research and practice
-
Siponen, M., & Vartiainen, T. (2007). Unauthorized copying of software and levels of moral development: A literature analysis and its implications for research and practice. Information Systems Journal, 14(4), 387-407.
-
(2007)
Information Systems Journal
, vol.14
, Issue.4
, pp. 387-407
-
-
Siponen, M.1
Vartiainen, T.2
-
97
-
-
0007137976
-
Ethics and information systems: The corporate domain
-
Smith, H. J., & Hasnas, J. (1999). Ethics and information systems: The corporate domain. MIS Quarterly, 23(1), 109-127.
-
(1999)
MIS Quarterly
, vol.23
, Issue.1
, pp. 109-127
-
-
Smith, H.J.1
Hasnas, J.2
-
98
-
-
0037227503
-
The reluctance to report bad news on troubled software projects: A theoretical model
-
Smith, H. J., & Keil, M. (2003). The reluctance to report bad news on troubled software projects: A theoretical model. Information Systems Journal, 13(1), 69-95.
-
(2003)
Information Systems Journal
, vol.13
, Issue.1
, pp. 69-95
-
-
Smith, H.J.1
Keil, M.2
-
99
-
-
14344281803
-
Keeping mum as the project goes under: Toward an explanatory model
-
Smith, H. J., Keil, M., & Depledge, G. (2001). Keeping mum as the project goes under: Toward an explanatory model. Journal of Management Information Systems, 18(2), 189-227.
-
(2001)
Journal of Management Information Systems
, vol.18
, Issue.2
, pp. 189-227
-
-
Smith, H.J.1
Keil, M.2
Depledge, G.3
-
100
-
-
50249151484
-
Internet users' information privacy-protective responses: A taxonomy and a nomological model
-
Son, J.-Y., & Kim, S. S. (2008). Internet users' information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32(3), 503-529.
-
(2008)
MIS Quarterly
, vol.32
, Issue.3
, pp. 503-529
-
-
Son, J.-Y.1
Kim, S.S.2
-
102
-
-
33846076044
-
The role of espoused national cultural values in technology acceptance
-
Srite, M., & Karahanna, E. (2006). The role of espoused national cultural values in technology acceptance. MIS Quarterly, 30(3), 679-704.
-
(2006)
MIS Quarterly
, vol.30
, Issue.3
, pp. 679-704
-
-
Srite, M.1
Karahanna, E.2
-
103
-
-
0033260584
-
A self-efficacy theory explanation for the management of remote workers in virtual organizations
-
Staples, D. S., Hulland, J. S., & Higgins, C. A. (1999). A self-efficacy theory explanation for the management of remote workers in virtual organizations. Organization Science, 10(6), 758-776.
-
(1999)
Organization Science
, vol.10
, Issue.6
, pp. 758-776
-
-
Staples, D.S.1
Hulland, J.S.2
Higgins, C.A.3
-
104
-
-
55249123249
-
Validating instruments in MIS research
-
Straub, D. W. (1989). Validating instruments in MIS research. MIS Quarterly, 13(2), 147-169.
-
(1989)
MIS Quarterly
, vol.13
, Issue.2
, pp. 147-169
-
-
Straub, D.W.1
-
105
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D. W. (1990). Effective IS security: An empirical study. Information Systems Research, 1(3), 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
106
-
-
13244286108
-
Validation guidelines for IS positivist research
-
Straub, D. W., Boudreau, M. C., & Gefen, D. (2004). Validation guidelines for IS positivist research. Communications of the Association for Information Systems, 14(2004), 380-426.
-
(2004)
Communications of the Association for Information Systems
, vol.14
, Issue.2004
, pp. 380-426
-
-
Straub, D.W.1
Boudreau, M.C.2
Gefen, D.3
-
107
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
108
-
-
0032355201
-
Predicting and explaining intentions and behavior: How well are we doing?
-
Sutton, S. (1998). Predicting and explaining intentions and behavior: How well are we doing? Journal of Applied Social Psychology, 28(15), 1317-1338.
-
(1998)
Journal of Applied Social Psychology
, vol.28
, Issue.15
, pp. 1317-1338
-
-
Sutton, S.1
-
109
-
-
56949085904
-
Risk analysis in extended enterprise environments: Identification of critical risk factors in B2B e-commerce relationships
-
Sutton, S. G., Khazanchi, D., Hampton, C., & Arnold, V. (2008). Risk analysis in extended enterprise environments: Identification of critical risk factors in B2B e-commerce relationships. Journal of the Association for Information Systems, 9(3/4), 151-174.
-
(2008)
Journal of the Association for Information Systems
, vol.9
, Issue.3-4
, pp. 151-174
-
-
Sutton, S.G.1
Khazanchi, D.2
Hampton, C.3
Arnold, V.4
-
110
-
-
0001354192
-
The morality of software piracy: A cross-cultural analysis
-
Swinyard, W. R., Rinne, H., & Kau, A. K. (1990). The morality of software piracy: A cross-cultural analysis. Journal of Business Ethics, 9(8), 655-664.
-
(1990)
Journal of Business Ethics
, vol.9
, Issue.8
, pp. 655-664
-
-
Swinyard, W.R.1
Rinne, H.2
Kau, A.K.3
-
111
-
-
0347301551
-
Culture and whistleblowing an empirical study of Croatian and United States managers utilizing Hofstede's cultural dimensions
-
Tavakoli, A. A., Keenan, J. P., & Crnjak-Karanovic, B. (2003). Culture and whistleblowing an empirical study of Croatian and United States managers utilizing Hofstede's cultural dimensions. Journal of Business Ethics, 43(1/2), 49-64.
-
(2003)
Journal of Business Ethics
, vol.43
, Issue.1-2
, pp. 49-64
-
-
Tavakoli, A.A.1
Keenan, J.P.2
Crnjak-Karanovic, B.3
-
112
-
-
0032223746
-
Testing an ethical decision-making theory: The case of softlifting
-
Thong, J. Y. L., & Yap, C.-s. (1998). Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15(1), 213-237.
-
(1998)
Journal of Management Information Systems
, vol.15
, Issue.1
, pp. 213-237
-
-
Thong, J.Y.L.1
Yap, C.-S.2
-
113
-
-
33748425097
-
Individuality or conformity? The effects of independent and interdependent self-concepts on public judgments
-
Torelli, C. J. (2006). Individuality or conformity? The effects of independent and interdependent self-concepts on public judgments. Journal of Consumer Research, 16(3), 240-248.
-
(2006)
Journal of Consumer Research
, vol.16
, Issue.3
, pp. 240-248
-
-
Torelli, C.J.1
-
114
-
-
0032331156
-
Converging measurement of horizontal and vertical individualism and collectivism
-
Triandis, H. C., & Gelfand, M. J. (1998). Converging measurement of horizontal and vertical individualism and collectivism. Journal of Personality and Social Psychology, 74, 118-128.
-
(1998)
Journal of Personality and Social Psychology
, vol.74
, pp. 118-128
-
-
Triandis, H.C.1
Gelfand, M.J.2
-
115
-
-
0035343372
-
Some cross-cultural evidence on ethical reasoning
-
Tsui, J., & Windsor, C. (2001). Some cross-cultural evidence on ethical reasoning. Journal of Business Ethics, 31(2), 143-150.
-
(2001)
Journal of Business Ethics
, vol.31
, Issue.2
, pp. 143-150
-
-
Tsui, J.1
Windsor, C.2
-
116
-
-
0031288368
-
Moral hazard, ethical considerations, and the decision to implement an information system
-
Tuttle, B., Harrell, A., & Harrison, P. (1997). Moral hazard, ethical considerations, and the decision to implement an information system. Journal of Management Information Systems, 13(4), 7-27.
-
(1997)
Journal of Management Information Systems
, vol.13
, Issue.4
, pp. 7-27
-
-
Tuttle, B.1
Harrell, A.2
Harrison, P.3
-
117
-
-
0035255557
-
The effects of organizational and ethical climates on misconduct at work
-
Vardi, Y. (2001). The effects of organizational and ethical climates on misconduct at work. Journal of Business Ethics, 29, 325-337.
-
(2001)
Journal of Business Ethics
, vol.29
, pp. 325-337
-
-
Vardi, Y.1
-
118
-
-
0001440837
-
The effects of culture on ethical decision-making: An application of Hofstede's typology
-
Vitell, S. J., Nwachukwu, S. L., & Barnes, J. H. (1993). The effects of culture on ethical decision-making: An application of Hofstede's typology. Journal of Business Ethics, 12(10), 753-760.
-
(1993)
Journal of Business Ethics
, vol.12
, Issue.10
, pp. 753-760
-
-
Vitell, S.J.1
Nwachukwu, S.L.2
Barnes, J.H.3
-
119
-
-
0036675216
-
The myth of individualism-collectivism: A critical review
-
Voronov, M., & Singer, J. A. (2002). The myth of individualism-collectivism: A critical review. Journal of Social Psychology, 142(4), 461-480.
-
(2002)
Journal of Social Psychology
, vol.142
, Issue.4
, pp. 461-480
-
-
Voronov, M.1
Singer, J.A.2
-
120
-
-
61349180141
-
A value-at-risk approach to information security investment
-
Wang, J., Chaudhury, A., & Rao, H. R. (2008). A value-at-risk approach to information security investment. Information Systems Research, 19(1), 106-123.
-
(2008)
Information Systems Research
, vol.19
, Issue.1
, pp. 106-123
-
-
Wang, J.1
Chaudhury, A.2
Rao, H.R.3
-
121
-
-
70350752562
-
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use
-
Wang, J., Chen, R., Herath, T., & Rao, H. R. (2009). Visual e-mail authentication and identification services: An investigation of the effects on e-mail use. Decision Support Systems, 48(1), 92-102.
-
(2009)
Decision Support Systems
, vol.48
, Issue.1
, pp. 92-102
-
-
Wang, J.1
Chen, R.2
Herath, T.3
Rao, H.R.4
-
122
-
-
85077348702
-
Case of Machiavellianism and ethical ideology
-
Winter, S., Stylianou, A., & Giacalone, R. (2004). Case of Machiavellianism and ethical ideology. Journal of Business Ethics, 54(3), 279-301.
-
(2004)
Journal of Business Ethics
, vol.54
, Issue.3
, pp. 279-301
-
-
Winter, S.1
Stylianou, A.2
Giacalone, R.3
-
123
-
-
49249108825
-
Issues, limitations, and opportunities in cross-cultural research on collaborative software in information systems
-
Zhang, D., & Lowry, P. B. (2008). Issues, limitations, and opportunities in cross-cultural research on collaborative software in information systems. Journal of Global Information Management, 16(1), 61-92.
-
(2008)
Journal of Global Information Management
, vol.16
, Issue.1
, pp. 61-92
-
-
Zhang, D.1
Lowry, P.B.2
-
124
-
-
38349101624
-
The impact of individualism-collectivism, social presence, and group diversity on group decision making under majority influence
-
Zhang, D., Lowry, P. B., Zhou, L., & Fu, X. (2008). The impact of individualism-collectivism, social presence, and group diversity on group decision making under majority influence. Journal of Management Information Systems, 23(4), 53-80.
-
(2008)
Journal of Management Information Systems
, vol.23
, Issue.4
, pp. 53-80
-
-
Zhang, D.1
Lowry, P.B.2
Zhou, L.3
Fu, X.4
-
125
-
-
67650156801
-
Improving multiple-password recall: An empirical study
-
Zhang, J., Luo, X., Akkaladevi, S., & Ziegelmayer, J. (2009). Improving multiple-password recall: An empirical study. European Journal of Information Systems, 18(2), 165-176.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 165-176
-
-
Zhang, J.1
Luo, X.2
Akkaladevi, S.3
Ziegelmayer, J.4
-
126
-
-
70349356396
-
Identification and authentication: Technology and implementation issues
-
Zviran, M., & Erlich, Z. (2006). Identification and authentication: Technology and implementation issues. Communications of the Association for Information Systems, 17(4), 90-105.
-
(2006)
Communications of the Association for Information Systems
, vol.17
, Issue.4
, pp. 90-105
-
-
Zviran, M.1
Erlich, Z.2
|