Information Technology Reference
In-Depth Information
Bob, B. (1989). IBM offers customers new disaster re-
covery services.
Network World
,
6
(14), 4.
Bowman, B. (1990). Controlling application develop-
ment by end-users in a PC environment: A survey of
techniques.
Information Executive, 32
(2), 70-74.
Bødker, S., & Grønbæk, K. (1991). Cooperative prototyp-
ing: Users and designers in mutual activity.
International
Journal of Man-Machine Studies, 34
(3),
453-478.
Bradac, J. J. (2001). Theory comparison: Uncertainty
reduction, problematic integration, uncertainty manage-
ment, and other curious constructs.
Journal of Commu-
nication, 51
(3), 456-476.
Bødker, S., Grønbæk, K., & Kyng, M. (1993). Coop-
erative design: Techniques and experiences from the
Scandinavian scene. In D. Schuler & A. Namioka (Eds.),
Participatory design: Principles and practices
(pp. 157-
175).
Hillsdale, NJ: Lawrence Erlbaum Associates.
Brady, M. K., & Robertson, C.J. (1999). An exploratory
study of service value in the U.S.A. and Ecuador.
In-
ternational Journal of Service Industry Management
,
10
(5), 469-486.
Bommer, M., Gratto, C., Gravander, J., & Tuttle, M.
(1987). A behavioral model of ethical and unethical
decision making.
Journal of Business Ethics, 6
(4),
265-280.
Brancheau, J.C., & Brown, C.V. (1993). The management
of end-user computing: Status and directions.
ACM
Computing Surveys
,
25
(4), 437-482.
Bordia, P. (1997). Face-to-face versus computer-medi-
ated communication: A synthesis of the experimental
literature.
Journal of Business Communication,
34
(1),
99-120.
Bridges, J. S. (1989). Sex differences in occupational
values.
Sex Roles
,
20
(2), 205-211.
Briggs, R. O., Nunamaker, J. F., & Sprague, R. H.
(1997-1998). 1001 unanswered research questions in
GSS.
Journal of Management Information Systems,
14
(3), 3-21.
Boshoff, C., & Leong, J. (1998). Empowerment, attribu-
tion, and apologising as dimensions of service recovery:
An experimental study.
International Journal of Service
Industry Management
,
9
(1), 24-47.
Brodie, C.B., & Hayes, C.C. (2002). DAISY: A decision
support design methodology for complex: Experience-
centered domains.
IEEE Transactions on Systems, Man,
and Cybernetics: Part A
,
32
(1), 50-71.
Bostrom, R. P., Olfman, L., & Sein, M. K. (1990). The
importance of learning style in end user training.
MIS
Quarterly, 14
(1), 101-119.
Brown, M., & Muchira, R. (2004). Investigating the re-
lationship between Internet privacy concerns and online
purchase behavior.
Journal of Electronic Commerce
Research,
5
(1), 62-70.
Boulding, W., & Kirmani, A. (1993). A consumer-side
experimental examination of signaling theory.
Journal
of Consumer Research
,
20
(1), 111-123.
Bourguin, G., Derycke, A., & Tarby, J.C. (2001). Beyond
the interface: Co-evolution inside interactive systems:
A proposal founded on activity theory. In Blandford,
Vanderdonckt, Gray (Eds.),
Proceedings of the IHM-HCI
2001 Conference
, Lille, France (pp. 297-310). Berlin,
Germany: Springer-Verlag.
Bryman, A., & Cramer, D. (2001).
Quantitative data
analysis with SPSS Release 10 for Windows: A guide
for social scientists
. London: Routledge.
Bryman, A., & Cramer, D. (1994).
Quantitative data
analysis for social scientists
. New York: Routledge.
BTT. (2001). Biometrics secure Internet data centres
worldwide.
Biometric Technology Today,
9
(2), 3.
Bowman, B. (1988).
An investigation of application
development process controls.
Unpublished doctoral
dissertation, University of Houston.
BTT. (2006). Biometric statistics in focus.
Biometric
Technology Today
, 14
(), -.
Search WWH ::
Custom Search