Using Biometric Authentication to Improve Fire Ground Accountability: An Assessment of Firefighter Privacy Concerns
暂无分享,去创建一个
Alexander J. McLeod | Jan Guynes Clark | Darrell Carpenter | J. Clark | Alexander J. McLeod | D. Carpenter
[1] Suzanne Rivard,et al. A Multilevel Model of Resistance to Information Technology Implementation , 2005, MIS Q..
[2] Ronald W. Perry,et al. Incident management systems in disaster management , 2003 .
[3] S. Coleman. COMPREHENSIVE STUDY OF PERSONNEL ACCOUNTABILITY SYSTEMS IN THE FIRE SERVICE , 2003 .
[4] Robert M. Davison,et al. Information Privacy in a Globally Networked Society: Implications for IS Research , 2003, Commun. Assoc. Inf. Syst..
[5] Dara V. O'Neil. Analysis of Internet Users’ Level of Online Privacy Concerns , 2001 .
[6] R. Clarke. Privacy as a Means of Engendering Trust in Cyberspace Commerce , 2001 .
[7] Rhona Flin,et al. Disaster stress: an emergency management perspective , 1999 .
[8] Michel G. Bertrand. PLANNING FOR A PERSONNEL ACCOUNTABILITY SYSTEM STRATEGIC MANAGEMENT OF CHANGE , 1998 .
[9] Erik R. Eddy,et al. THE EFFECTS OF INFORMATION MANAGEMENT POLICIES ON REACTIONS TO HUMAN RESOURCE INFORMATION SYSTEMS: AN INTEGRATION OF PRIVACY AND PROCEDURAL JUSTICE PERSPECTIVES , 1999 .
[10] John D. Woodward,et al. Biometrics: privacy's foe or privacy's friend? , 1997, Proc. IEEE.
[11] Woodward Jd. Biometric scanning, law & policy: identifying the concerns--drafting the biometric blueprint. , 1997 .
[12] J D Woodward. Biometric scanning, law & policy: identifying the concerns--drafting the biometric blueprint. , 1997, University of Pittsburgh law review. University of Pittsburgh. School of Law.
[13] William B. Gudykunst,et al. The Influence of Cultural Individualism-Collectivism, Self Construals, and Individual Values on Communication Styles Across Cultures , 1996 .
[14] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[15] H. Jeff Smith,et al. Values, personal information privacy, and regulatory approaches , 1995, CACM.
[16] T. Singelis,et al. The Measurement of Independent and Interdependent Self-Construals , 1994 .
[17] Alma T. Mintu. Cultures and Organizations: Software of the Mind , 1992 .
[18] G. Hofstede,et al. Cultures and Organizations: Software of the Mind , 1991 .
[19] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[20] Paul D. Tolchinsky,et al. Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .
[21] Dianna Lynn Stone. The effects of the valence of outcomes for providing data and the perceived relevance of the data requested on privacy-related behaviors, beliefs, and attitudes , 1981 .
[22] I. Ajzen,et al. Understanding Attitudes and Predicting Social Behavior , 1980 .
[23] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[24] E. Kelly. Individualism and collectivism , 1901 .