Burke T. Ward

According to our database1, Burke T. Ward authored at least 42 papers between 1995 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
COVID-19: State Sales and Use Tax Implications.
Inf. Syst. Manag., 2020

2018
A Ransomware Case for Use in the Classroom.
Commun. Assoc. Inf. Syst., 2018

2014
Benefits and Risks of Social Business: Are Companies Considering E-Discovery?
Inf. Syst. Manag., 2014

2013
Empirically assessing the continued applicability of the IUIPC construct.
J. Enterp. Inf. Manag., 2013

A Framework for the E-Discovery of Social Media Content in the United States.
Inf. Syst. Manag., 2013

Privacy in Online Social Networking: Applying a Privacy Calculus Model.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013

2012
The E-Commerce Sales and Use Tax Controversy: Is the End Near?
Inf. Syst. Manag., 2012

2011
Spyware: Ethical and Legal Concerns.
Proceedings of the Encyclopedia of Information Assurance, 2011

The Battle Over E-commerce Sales Taxes Heats Up.
Inf. Syst. Manag., 2011

The digital divide and t-government in the United States: using the technology acceptance model to understand usage.
Eur. J. Inf. Syst., 2011

2010
The Internet Jurisdiction Risk of Cloud Computing.
Inf. Syst. Manag., 2010

An Empirical Evaluation of E-Government Inclusion Among the Digitally Disadvantaged in the United States.
Inf. Resour. Manag. J., 2010

E-Government Website Awareness and Visitation Among the Techno-Disadvantaged.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2009
Recognizing the Impact of E-Discovery Amendments on Electronic Records Management.
Inf. Syst. Manag., 2009

2008
User perceptions of software with embedded spyware.
J. Enterp. Inf. Manag., 2008

Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation.
Inf. Syst. Frontiers, 2008

2007
The Ethical and Legal Concerns of Spyware.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Managing the Lifecycle of Electronically Stored Information.
Inf. Syst. Manag., 2007

Unintended invitation: organizational wi-fi use by external roaming users.
Commun. ACM, 2007

Computer Forensics, E-Discovery, and Spoliation: Impact of the New Federal Rules.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
A comparison of United States and European union taxation of e-commerce.
Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce, 2006

2005
The Ethical and Legal Concerns of Spyware.
Inf. Syst. Manag., 2005

A United States perspective on the ethical and legal issues of spyware.
Proceedings of the 7th International Conference on Electronic Commerce, 2005

2004
Ethics of Collecting and Using Consumer Internet Data.
Inf. Syst. Manag., 2004

A Community Initiative that Diminished the Digital Divide.
Commun. Assoc. Inf. Syst., 2004

Should spam be on the menu?
Commun. ACM, 2004

The Taxing Issue of E-Commerce.
Proceedings of the 10th Americas Conference on Information Systems, 2004

2002
A Strategic Response to the Broad Spectrum of Internet Abuse.
Inf. Syst. Manag., 2002

An Initiative To Narrow The Digital Divide : Preliminary Results.
Proceedings of the 10th European Conference on Information Systems, 2002

2001
Cyberliability: Is the Chief Privacy Officer the Solution?
Proceedings of the 9th European Conference on Information Systems, 2001

2000
The United States Responds to Spam.
Proceedings of the 8th European Conference on Information Systems, 2000

1999
Preparing for Euro Business Transactions.
Inf. Syst. Manag., 1999

A Strategy for Ethical Management of E-mail Privacy.
Inf. Secur. J. A Glob. Perspect., 1999

The Dark Side of Employee Email.
Commun. ACM, 1999

1998
Ethical Management of Employee E-Mail Privacy.
Inf. Syst. Manag., 1998

Ethical Responsibility for Software Development.
Inf. Syst. Manag., 1998

The ethical issued of using cookies from a United States perspective.
Proceedings of the Sixth European Conference on Information Systems, 1998

1997
The Ethical Dilemma of Employee E-mail Privacy in the United States.
Proceedings of the Fifth European Conference on Information Systems, 1997

Sexual Harassment Via Employee E-mail: An International Issue Or Just A United States Quirk?
Proceedings of the Fifth European Conference on Information Systems, 1997

1996
United States Cases of Employee E-Mail Privacy Intrusions: Do You Really Know the Legal Consequences?
Proceedings of the Seventeenth International Conference on Information Systems, 1996

Email Privacy from a United States Perspective.
Proceedings of the Fourth European Conference on Information Systems, 1996

1995
The Ethical and Legal Quandary of Email Privacy.
Commun. ACM, 1995


  Loading...