Author image not provided
 Paul J Hart

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article22.43
Citation Count314
Publication count14
Publication years1990-2008
Available for download5
Average downloads per article424.60
Downloads (cumulative)2,123
Downloads (12 Months)34
Downloads (6 Weeks)4
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


14 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 14 of 14
Sort by:

1
September 2008 The Journal of Strategic Information Systems: Volume 17 Issue 3, September, 2008
Publisher: Butterworth-Heinemann
Bibliometrics:
Citation Count: 15

This U.S.-based research attempts to understand the relationships between users' perceptions about Internet privacy concerns, the need for government surveillance, government intrusion concerns, and the willingness to disclose personal information required to complete online transactions. We test a theoretical model based on a privacy calculus framework and Asymmetric Information Theory ...
Keywords: E-commerce, Privacy, LISREL, Surveillance, Government

2
June 2007 The Journal of Strategic Information Systems: Volume 16 Issue 2, June, 2007
Publisher: Butterworth-Heinemann
Bibliometrics:
Citation Count: 13

This research is an attempt to better understand how external and internal organizational influences shape organizational actions for improving information systems security. A case study of a multi-national company is presented and then analyzed from the perspective of neo-institutional theory. The analysis indicates that coercive, normative, and mimetic isomorphic processes ...
Keywords: Sarbanes-Oxley Act, Information security, Institutional theory, Institutional isomorphism, Neo-institutionalism

3
March 2006 Information Systems Research: Volume 17 Issue 1, March 2006
Publisher: INFORMS
Bibliometrics:
Citation Count: 138

While privacy is a highly cherished value, few would argue with the notion that absolute privacy is unattainable. Individuals make choices in which they surrender a certain degree of privacy in exchange for outcomes that are perceived to be worth the risk of information disclosure. This research attempts to better ...
Keywords: trust, LISREL, e-commerce, privacy calculus, risk

4
January 2006 HICSS '06: Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 06
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 5

This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies and security policies. The study focuses on how institutional forces shaped and motivated managers and employees at different levels in different ways. We found that low ...
Keywords: Institutional Theory, Information Security, Sarbanes-Oxley Act, Organizational Isomorphism.

5
January 2006 International Journal of Electronic Commerce: Volume 10 Issue 2, Number 2/Winter 2005-6
Publisher: M. E. Sharpe, Inc.
Bibliometrics:
Citation Count: 34

This study focuses on antecedents to Internet privacy concerns and the behavioral intention to conduct on-line transactions. Perceptions of privacy are socially constructed through communication and transactions with social entities over a networked environment, a process that involves a certain level of technical skill and literacy. The research model specifies ...
Keywords: Intention To Transact On-Line, Internet Literacy, Internet Privacy, Social Awareness

6
December 2003 Journal of Management Information Systems: Volume 20 Issue 3, Number 3/Winter 2003
Publisher: M. E. Sharpe, Inc.
Bibliometrics:
Citation Count: 10

Over the past two decades, numerous empirical studies have been conducted on the contribution of information technology (IT) to productivity and other measures of firm performance. However, few theoretical studies have attempted to explain the contingencies under which IT investments may or may not be valuable to a firm in ...
Keywords: Competitive Strategies, Duopoly, Game Theory, Information Technology Impacts, Information Technology Investments, Information Technology Productivity Paradox

7
December 2003 European Journal of Information Systems - Managing e-business transformation: Volume 12 Issue 4, December 2003
Publisher: Macmillan Press Ltd.
Bibliometrics:
Citation Count: 9

Businesses have embraced the Internet to reap economic advantages through the use of Websites. Most Website design guidelines fail to address issues of branding and identity formation, focusing instead on concerns adapted from previous technologies. However, many firms are not getting their desired results from the Website investments they have ...
Keywords: impression management, organizational image, websites

8
January 1999 ICIS '99: Proceedings of the 20th international conference on Information Systems
Publisher: Association for Information Systems
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 3,   Downloads (Overall): 260

Full text available: PDFPDF

9
March 1998 Journal of Management Information Systems - Special section: Managing virtual workplaces and teleworking with information technology: Volume 14 Issue 4, March 1998
Publisher: M. E. Sharpe, Inc.
Bibliometrics:
Citation Count: 58

The diffusion of network technologies and the developing interest in emerging organizational forms suggest that researchers ought to pay more attention to the development of "electronic partnerships." This preliminary investigation tests a theoretical framework relating two pivotal themes, power and trust, to the use of electronic data interchange (EDI). Separate ...
Keywords: electronic partnerships, diffusion of information technology, information partnerships, electronic data interchange

10
December 1997 ICIS '97: Proceedings of the eighteenth international conference on Information systems
Publisher: Association for Information Systems
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 2,   Downloads (Overall): 221

Full text available: PDFPDF

11 published by ACM
October 1991 ACM Transactions on Information Systems (TOIS): Volume 9 Issue 4, Oct. 1991
Publisher: ACM
Bibliometrics:
Citation Count: 16
Downloads (6 Weeks): 4,   Downloads (12 Months): 17,   Downloads (Overall): 950

Full text available: PDFPDF

12
September 1991 Information Processing and Management: an International Journal: Volume 27 Issue 5, 1991
Publisher: Pergamon Press, Inc.
Bibliometrics:
Citation Count: 6


13 published by ACM
September 1990 CSCW '90: Proceedings of the 1990 ACM conference on Computer-supported cooperative work
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 2,   Downloads (12 Months): 9,   Downloads (Overall): 391

Full text available: PDFPDF
Inter-organization computer networks (IONS) provide significant opportunities for improving coordination between firms engaged in mutually dependent activities. This research paper focuses on how IONS affect information processing requirements, and production and transaction costs when they interconnect firms with internally integrated computer systems and when they are used only as substitutes ...

14 published by ACM
March 1990 COCS '90: Proceedings of the ACM SIGOIS and IEEE CS TC-OA conference on Office information systems
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 0,   Downloads (12 Months): 8,   Downloads (Overall): 297

Full text available: PDFPDF
As firms increasingly adopt inter-organization computer networks (IONs) to improve coordination, researchers must be concerned about the long term impact of IONs on organizational relationships. This paper reports on an exploratory study of the use of IONs in design and manufacturing activities in the semiconductor industry. We identify the potential ...
Also published in:
April 1990  ACM SIGOIS Bulletin: Volume 11 Issue 2-3, Apr. 1990



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us