20
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Do Concerns about Error in Data and Access to Data Affect Students’ Feeling of Alienation?

Pages 29-45 | Published online: 10 Sep 2014

References

  • Allison, Neil K., “A Psychometric Development of a Test for Consumer Alienation from the Marketplace.” Journal of Marketing Research (JMR), Nov 78, Vol. 15 Issue 4, p565, 11.
  • Alvarez, Antonio G.; Welsh, James J.., “Adventure: A model of experiential learning.” Social Work in Education Oct 90, Vol. 13 Issue 1, p49, 9.
  • Barnard, C. I. (1938) The functions of the executive. Cambridge, M.A: Harvard University Press.
  • Bennett, C. J. Regulating Privacy: Data Protection and Public Policy in Europe and the United States, Cornell University Press, Ithaca, NY, (1992).
  • Berghel, Hal; “Caustic Cookies.” Communications of the ACM, May 2001, Vol. 44 Issue 5, p19, 4.
  • Borna, Shaheen; Avila, Stephen; “Genetic information: Consumers’ right to privacy versus insurance companies’ right to know…” Journal of Business Ethics, May 99, Vol. 19 Issue 4, p355, 8.
  • Brookes, Geoff, “From rebellion to class war”. Times Educational Supplement, 3/29/2002 Issue 4474, p33, 1/2p;]
  • Cespedes, F. V. and Smith, H. J. “Database Marketing: New Rules for Policy and Practice,” Sloan Management Review (34), Summer 1993, pp. 7–22.
  • Culnan, M. J. ‘“How Did They Get My Name?’: An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use,” MIS Quarterly (17:3), September 1993, pp. 341–363.
  • Culnan, Mary J.; Armstrong, Pamela K., “Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation.” Organization Science: A Journal of the Institute of Management Sciences, Jan/Feb 99, Vol. 10 Issue 1, p104, 12p.
  • Date, C.J. An Introduction to Database Systems (4th ed.), Addison-Wesley Publishing Company, Reading, MA, (1986).
  • Dean, Dwight. “Alienation and Political Apathy,” Social Forces, 38 (March 1960), 185–9.
  • Dean, Dwight. “Alienation: Its Meaning and Measurement,” American Sociological Review, 26 (October 1961), 753–8.
  • Donaldson, Lex (1995). American anti-management theories of organization: a critique of paradigm proliferation; Cambridge studies in management 25; Cambridge University Press, New York.
  • Drucker, P.F. (1988, January-February). “The coming of the new organization.” Harvard Business Review, pp. 48–53
  • Freeman, R. E. 1984. Strategic management: A stakeholder approach. Boston: Pitman Publishing.
  • Friedland, Stan., “Less Violence?” Change School Culture.; Education Digest, Sep 99, Vol. 65 Issue 1, p 6, 4p;
  • Garfinkel, Simson (2000). Database Nation. O’Reilly & Associates, Inc.
  • Hafner, K.M.., “How Computer Associates climbed to No. 1” Business Week, 7/11/88 Issue 3060, p 77, 2.
  • Hair, Joseph F. Jr. Anderson, Rolph E. Tatham, Ronald L. and Black, William C. Multivariate Data Analysis (1998), fifth edition, Prentice Hall
  • Hancock, Bill; “Student Privacy A Congressional Concern.” Computers & Security, 2001, Vol. 20 Issue 2, p 106
  • Hemphill, Thomas A. “DoubleClick and Consumer Online Privacy: An E-Commerce Lesson Learned.” Business & Society Review, Fall 2000, Vol. 105 Issue 3, p 361, 12.
  • HEW (U.S. Department of Health, Education, and Welfare). Records, Computers, and the Rights of Citizens: Report of the Secretary’s Advisory Committee on Automated Personal Data Systems, U.S. Government Printing Office, Washington, D.C., (1973).
  • Kent, Stephen T. “Internet privacy enhanced mail. (cover story)”. Communications of the ACM, Aug 93, Vol. 36 Issue 8, p 48, 13.
  • Kling, R. “Value Conflicts and Social Choices in Electronic Funds Transfer Systems Developments,” Communications of the ACM (21:8), August 1978, pp. 642–657.
  • Laudon, K.C. Dossier Society: Value Choices in the Design of National Information Systems, Columbia University Press, New York, (1986).
  • Linowes, D. F. Privacy in America: Is Your Private Life in the Public Eye? University of Illinois Press, Urbana, IL, (1989).
  • Lipton, David., “Now hear this…Customer complaints are not bad if viewed as business-building occasions.” Nation’s Restaurant News, 08/28/2000, Vol. 34 Issue 35, p 30, 2p Ma, Qingxiong; Pearson.
  • John M. “An Exploratory Study of Information Security Objectives and Practices” Doctoral Dissertation, Southern Illinois University at Carbondale, IL, USA. (Supervisor: Pearson, John M.), (2004).
  • Mason, R. O. “Four Ethical Issues of the Information Age,” MIS Quarterly (10:1), March 1986, pp. 4–12.
  • Mason, Richard O. Mason, Florence M. Culnan, Mary J. Ethics of Information Management. Sage series in business ethics (SSBE). Sage Publications, (1995).
  • Milberg, Sandra J.; Burke, Sandra J., “Values, personal information privacy, and regulatory approaches.” (cover story); Communications of the ACM, Dec 95, Vol. 38 Issue 12, p 65, 10.
  • Milberg, Sandra J.; Smith, H. Jeff; Burke, Sandra J., “Information Privacy: Corporate Management and National Regulation.” Organization Science: A Journal of the Institute of Management Sciences, Jan/Feb 2000, Vol. 11 Issue 1, p 35, 23p.
  • Miller, A. “Computers and Privacy,” Ethics and the Management of Computer Technology, W. M. Hoffman, and J. M. Moore (eds.), Oelgeschlager, Gunn, and Hain Publishers, Inc., Cambridge, MA, 1982.
  • Mollick, Joseph S.; Pearson, John M. “Effects of Two Information Privacy Concerns on Students’ Feeling of Alienation” Proceedings of the Americas Conference on Information Systems 2003: August 4–6: Tampa, Florida.
  • Mowshowitz, A. The Conquest of Will, Addison-Wesley, Reading, MA, (1976).
  • Nettler, G.A. “A Measure of Alienation,” American Sociological Review, 22 (December 1957), 870–7.
  • Panichpathom, Supeecha. Doctoral dissertation: “An Examination of the Willingness to Engage in Web-Based Purchase: The Impact of an Individual Buyer’s Trust of Sensitive Information Exchange,” University of Texas at Arlington, December 2000.
  • PPSC (Privacy Protection Study Commission). Personal Privacy in an Information Society: Report of the Privacy Protection Study Commission, U.S. Government Printing Office, Washington, D.C., 1977
  • Rackow, Sharon H., “How the USA Patriot Act Will Permit Governmental Infringement upon the Privacy of Americans in the Name of Intelligence Investigations.” University of Pennsylvania Law Review, May 2002, Vol. 150 Issue 5, p 1651, 46p.
  • Rindfleisch, Thomas C. “Privacy, information technology, and health care.” Communications of the ACM, Aug 97, Vol. 40 Issue 8, p 93, 8.
  • Rotenberg, Marc “Communications privacy: Implications for network design.” (cover story) Communications of the ACM, Aug 93, Vol. 36 Issue 8, p 61, 8.
  • Sethna, Beheruz; Barnes, Cynthia C. “E-Mail Communications in Colleges and Universities: Are They Private?” Journal of Education for Business, Jul/Aug 99, Vol. 74 Issue 6, p 347, 4.
  • Smith, H. J. Managing Privacy: Information Technology and Organizational America, University of North Carolina Press, Chapel Hill, NC, (1994).
  • Smith, H. Jeff; Milberg, Sandra J. “Information privacy: Measuring individuals’ concerns about organizational practices.” MIS Quarterly, Jun 96, Vol. 20 Issue 2, p 167, 30.
  • Singh, Jagdip (1988). “Consumer Complaint Intentions and Behaviors: Definitional and Taxonomical Issues,” Journal of Marketing, 52 (January), 93–107.
  • Singh, Jagdip (1990) “A typology of Consumer Dissatisfaction Response Styles,” Journal of Retailing, 66 (Spring), 57–97.
  • Singh, Jagdip and Robert E. Wilkes (1996), “When Consumers Complain: A Path Analysis of the Key Antecedents of Consumer Complaint Response Estimates,” Journal of the Academy of Marketing Science, 24 (Fall), 350–65
  • Simon, H. A. (1976). Administrative behavior (3rd ed.). New York: Mcmillan
  • Stone, E. F. and Stone, D. L. “Privacy in Organizations: Theoretical Issues, Research Findings, and Protection Mechanisms,” Research in Personnel and Human Resources Management (8), K. M. Rowland and G. R. Ferris (eds.), JAI Press, Greenwich, CT, 1990, pp. 349–411.
  • Stone, E. F., Gardner, D.G., Gueutal, H. G., and McClure, S. “A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations,” Journal of Applied Psychology (68:3), August 1983, pp. 459–468.
  • Studdert, David M. “Direct Contracts, Data Sharing and Employee Risk Selection: New Stakes for Patient Privacy in Tomorrow’s Health Insurance Markets.” American Journal of Law & Medicine, 1999, Vol. 25 Issue 2/3, p 233, 33.
  • Tanner, John C., “Do I know you?” Telecom Asia, Apr 98, Vol. 9 Issue 4, p 6, 1/2p
  • Thompson, James D. (1967). Organizations in action; social science bases of administrative theory; Published: New York, McGraw-Hill
  • Tolchinsky, P.D., McCuddy, M.K., Adams, J., Ganster, D.C., Woodman, R.W., and Fromkin, H.L. “Employee Perceptions of Invasion of Privacy: A Field Simulation Experiment,” Journal of Applied Psychology (66:3), June 1981, pp. 308–313.
  • Vance, David (2000). Dissertation: On the Effect of Information Privacy Policy on Employment Opportunity Attractiveness (Supervisor: Arlyn Melcher), Southern Illinois University at Carbondale, IL 6290.
  • Wang, Huaiqing; Lee, Matthew K.O.; et al. “Consumer privacy concerns about Internet marketing.” Communications of the ACM, Mar 98, Vol. 41 Issue 3, p 63, 8.
  • Warren, Samuel D.; Brandeis, Louis D., “Privacy, photography, and the press.” Harvard Law Review, Feb 98, Vol. 111 Issue 4, p 1086, 18p (Originally published in 1890.
  • Westin, A. F. The Dimensions of Privacy: A National Opinion Research Survey of Attitudes Toward Privacy. January, (1979).
  • Westin, A. F. and Baker, M. A. Databanks in a Free Society, Quadrangle Books, New York, (1972).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.