THE APPLICATION OF THE CRITICAL INCIDENT TECHNIQUE TO INVESTIGATE EMAIL USAGE: CONTRIBUTION TO THEORY AND PRACTICE
暂无分享,去创建一个
[1] P. Shrivastava. Rigor and practical usefulness of research in strategic management , 1987 .
[2] Michael A. Jones. Entertaining Shopping Experiences: An Exploratory Investigation , 1999 .
[3] B. Nagengast,et al. Evaluative conditioning in social psychology: Facts and speculations , 2005, Cognition & emotion.
[4] Helen Cowie,et al. Measuring workplace bullying , 2002 .
[5] Alexander Serenko,et al. Are interface agents scapegoats? Attributions of responsibility in human-agent interaction , 2007, Interact. Comput..
[6] J. Michael Pearson,et al. The Relevancy of Information Systems Research: The Practitioner's View , 2005, Inf. Resour. Manag. J..
[7] Victoria Bellotti,et al. E-mail as habitat: an exploration of embedded personal information management , 2001, INTR.
[8] Richard C. Hoffman,et al. The Relevance of Strategy Research: Practitioner and Academic Viewpoints* , 1995 .
[9] Janice R. Fauske,et al. Principals and the Political Economy of Environmental Enactment , 2000 .
[10] Izak Benbasat,et al. The Case Research Strategy in Studies of Information Systems , 1987, MIS Q..
[11] Mary Beth Rosson,et al. Comparative usability evaluation: critical incidents and critical threads , 1994, CHI Conference Companion.
[12] Matthew B. Miles,et al. Qualitative Data Analysis: An Expanded Sourcebook , 1994 .
[13] R. Weber. Basic Content Analysis , 1986 .
[14] Steve Muylle,et al. The conceptualization and empirical validation of web site user satisfaction , 2004, Inf. Manag..
[15] Klaus Krippendorff,et al. Content Analysis: An Introduction to Its Methodology , 1980 .
[16] H. Bernard,et al. Data Management and Analysis Methods , 2000 .
[17] A. Light,et al. Critical incident technique and explicitation interviewing in studies of information behavior , 2003 .
[18] Henry Lieberman,et al. Aria: an agent for annotating and retrieving images , 2001, Computer.
[19] Alexander Serenko,et al. Antecedents and Consequences of User Satisfaction with E-Mail Systems , 2006, Int. J. e Collab..
[20] Izak Benbasat,et al. Empirical Research in Information Systems: The Practice of Relevance , 1999, MIS Q..
[21] Richard Baskerville,et al. Special issue on action research in information systems: making is research relevant to practice--foreword , 2004 .
[22] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[23] P. Rajan Varadarajan,et al. Musings on relevance and rigor of scholarly research in marketing , 2003 .
[24] Donald C. Bryant,et al. Content Analysis of Communications , 1968 .
[25] M. Miles,et al. Data management and analysis methods. , 1994 .
[26] J. de Houwer,et al. Associative learning of likes and dislikes: a review of 25 years of research on human evaluative conditioning. , 2001, Psychological bulletin.
[27] Trevor Wood-Harper,et al. A critical perspective on action research as a method for information systems research , 1996, J. Inf. Technol..
[28] John D. Daniels,et al. Relevance in International Business Research: A Need for More Linkages , 1991 .
[29] Rohit Khare. Seventh Heaven: The Spec's in the Mail , 1998, IEEE Internet Comput..
[30] Deborah Hix,et al. Remote usability evaluation: can users report their own critical incidents? , 1998, CHI Conference Summary.
[31] A. Strauss,et al. The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .
[32] Alexander Serenko,et al. The use of interface agents for email notification in critical incidents , 2006, Int. J. Hum. Comput. Stud..
[33] Cheryl Tay,et al. User competence in information technology: a critical incident analysis , 1994, Proceedings of TENCON'94 - 1994 IEEE Region 10's 9th Annual International Conference on: 'Frontiers of Computer Technology'.
[34] Fred D. Davis. User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts , 1993, Int. J. Man Mach. Stud..
[35] John F. Rockart,et al. IS Research Relevance Revisited: Subtle Accomplishment, Unfulfilled Promise, or Serial Hypocrisy? , 2002, Commun. Assoc. Inf. Syst..
[36] Jean-David Ruvini,et al. Do users tolerate errors from their assistant?: experiments with an E-mail classifier , 2002, IUI '02.
[37] K. Stewart. Trust Transfer on the World Wide Web , 2002 .
[38] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[39] Lee Sproull,et al. Reducing social context cues: electronic mail in organizational communication , 1986 .
[40] Susan M. Keaveney,et al. Customer Switching Behavior in Service Industries: An Exploratory Study , 1995 .
[41] C. Brodsky. The Discovery of Grounded Theory: Strategies for Qualitative Research , 1968 .
[42] J. C. Flanagan. Psychological Bulletin THE CRITICAL INCIDENT TECHNIQUE , 2022 .
[43] Kuo-Ching Wang,et al. Critical service features in group package tour: An exploratory research , 2000 .
[44] I. Martin,et al. Classical conditioning of human 'evaluative' responses. , 1975, Behaviour research and therapy.
[45] Ajay Luthra,et al. Content Analysis for Communications , 2009 .
[46] George M. Alliger,et al. Toward an ADA-appropriate job analysis , 1997 .
[47] Gary P. Latham,et al. The reliability and validity of the critical incident technique: A closer look. , 1974 .
[48] Bengt-Erik Andersson,et al. Studies in the reliability and validity of the critical incident technique. , 1964 .
[49] Alexander Serenko,et al. A model of user adoption of interface agents for email notification , 2008, Interact. Comput..