Information Technology Reference
In-Depth Information
Bob, B. (1989). IBM offers customers new disaster re-
covery services. Network World , 6 (14), 4.
Bowman, B. (1990). Controlling application develop-
ment by end-users in a PC environment: A survey of
techniques. Information Executive, 32 (2), 70-74.
Bødker, S., & Grønbæk, K. (1991). Cooperative prototyp-
ing: Users and designers in mutual activity. International
Journal of Man-Machine Studies, 34 (3), 453-478.
Bradac, J. J. (2001). Theory comparison: Uncertainty
reduction, problematic integration, uncertainty manage-
ment, and other curious constructs. Journal of Commu-
nication, 51 (3), 456-476.
Bødker, S., Grønbæk, K., & Kyng, M. (1993). Coop-
erative design: Techniques and experiences from the
Scandinavian scene. In D. Schuler & A. Namioka (Eds.),
Participatory design: Principles and practices (pp. 157-
175). Hillsdale, NJ: Lawrence Erlbaum Associates.
Brady, M. K., & Robertson, C.J. (1999). An exploratory
study of service value in the U.S.A. and Ecuador. In-
ternational Journal of Service Industry Management ,
10 (5), 469-486.
Bommer, M., Gratto, C., Gravander, J., & Tuttle, M.
(1987). A behavioral model of ethical and unethical
decision making. Journal of Business Ethics, 6 (4),
265-280.
Brancheau, J.C., & Brown, C.V. (1993). The management
of end-user computing: Status and directions. ACM
Computing Surveys , 25 (4), 437-482.
Bordia, P. (1997). Face-to-face versus computer-medi-
ated communication: A synthesis of the experimental
literature. Journal of Business Communication, 34 (1),
99-120.
Bridges, J. S. (1989). Sex differences in occupational
values. Sex Roles , 20 (2), 205-211.
Briggs, R. O., Nunamaker, J. F., & Sprague, R. H.
(1997-1998). 1001 unanswered research questions in
GSS. Journal of Management Information Systems,
14 (3), 3-21.
Boshoff, C., & Leong, J. (1998). Empowerment, attribu-
tion, and apologising as dimensions of service recovery:
An experimental study. International Journal of Service
Industry Management , 9 (1), 24-47.
Brodie, C.B., & Hayes, C.C. (2002). DAISY: A decision
support design methodology for complex: Experience-
centered domains. IEEE Transactions on Systems, Man,
and Cybernetics: Part A , 32 (1), 50-71.
Bostrom, R. P., Olfman, L., & Sein, M. K. (1990). The
importance of learning style in end user training. MIS
Quarterly, 14 (1), 101-119.
Brown, M., & Muchira, R. (2004). Investigating the re-
lationship between Internet privacy concerns and online
purchase behavior. Journal of Electronic Commerce
Research, 5 (1), 62-70.
Boulding, W., & Kirmani, A. (1993). A consumer-side
experimental examination of signaling theory. Journal
of Consumer Research , 20 (1), 111-123.
Bourguin, G., Derycke, A., & Tarby, J.C. (2001). Beyond
the interface: Co-evolution inside interactive systems:
A proposal founded on activity theory. In Blandford,
Vanderdonckt, Gray (Eds.), Proceedings of the IHM-HCI
2001 Conference , Lille, France (pp. 297-310). Berlin,
Germany: Springer-Verlag.
Bryman, A., & Cramer, D. (2001). Quantitative data
analysis with SPSS Release 10 for Windows: A guide
for social scientists . London: Routledge.
Bryman, A., & Cramer, D. (1994). Quantitative data
analysis for social scientists . New York: Routledge.
BTT. (2001). Biometrics secure Internet data centres
worldwide. Biometric Technology Today, 9 (2), 3.
Bowman, B. (1988). An investigation of application
development process controls. Unpublished doctoral
dissertation, University of Houston.
BTT. (2006). Biometric statistics in focus. Biometric
Technology Today , 14 (), -.
Search WWH ::




Custom Search