Changes

Jump to navigation Jump to search
Line 75: Line 75:     
Kim, D., and I. Benbasat (2009) "Trust-Assuring Arguments in B2C E-commerce: Impact of Content, Source, and Price on Trust", Journal of Management Information Systems, (26) 3, pp. 175-206.
 
Kim, D., and I. Benbasat (2009) "Trust-Assuring Arguments in B2C E-commerce: Impact of Content, Source, and Price on Trust", Journal of Management Information Systems, (26) 3, pp. 175-206.
 +
 +
Paul Benjamin Lowry, Gregory D. Moody, Anthony Vance, Matthew L. Jensen, Jeffrey L. Jenkins, and Taylor Wells (2012). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1948055 Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers],” Journal of the Association for Information Science and Technology (JASIST), vol. 63(4), pp. 755-766 (doi: http://dx.doi.org/10.1002/asi.21705).
    
Meservy, T. O., M. L. Jensen, and K. J. Fadel (2013) "Evaluation of Competing Candidate Solutions in Electronic Networks of Practice", Information Systems Research, (25) 1, pp. 15-34.
 
Meservy, T. O., M. L. Jensen, and K. J. Fadel (2013) "Evaluation of Competing Candidate Solutions in Electronic Networks of Practice", Information Systems Research, (25) 1, pp. 15-34.
73

edits

Navigation menu