Information Technology Reference
In-Depth Information
Eliashberg, J., & Robertson, T. (1988). New product pre-
announcing behavior: A market signaling study.
Journal
of Marketing Research
,
25
(3), 282-292.
Federal Trade Commission. (2007). FTC issues annual
list of top consumer complaints. Retrieved August 6,
2007, from the Federal Trade Commission, http://www.
ftc.gov/opa/2007/02/topcomplaints.htm
Ellström, P.E., Gustavsson, B., & Larsson, S. (1996).
Livslångt lärande
[Lifelong learning]. Lund: Student-
litteratur.
Felter, M. (1985). Sex differences on the California
statewide assessment of computer literacy.
Sex Roles
,
13
(2), 181-192.
Engeström, Y. (1987).
Learning by expanding: An ac-
tivity-theoretical approach to developmental research.
Helsinki: Orienta-Konsultit.
Ferneley, E. H. (2007). Covert end user development:
A study of success.
Journal of Organizational and End
User Computing, 19
(1), 62-71.
Engeström, Y. (2001). Expansive learning at work: To-
wards an activity theoretical reconceptualization.
Journal
of Education and Work, 14
, 133-156.
Ferris, C, & Farrel, J. (2003). What are Web services?
Communications of the ACM, 46
(6),
31-36.
Engeström, Y., & Middleton, D. (Eds.). (1996).
Cognition
and communication at work
. Cambridge: Cambridge
University Press.
Festerand, T.A., Snyder, D.R., & Tsalikis, J.D. (1986).
Influence of catalog versus store shopping and prior
satisfaction on percieved risk.
Journal of the Academy
of Marketing Science, 14
(4), 28-36.
Fairclough, N. (2001).
Language and power
(2nd ed.).
London: Longman.
Fiedler, F. E. (1974). The contingency model—New direc-
tions for leadership utilization.
Journal of Contemporary
Business
, 65-79.
Federal Trade Commission. (1996).
Consumer informa-
tion privacy hearings.
Retrieved August 4, 2007, from
http://www.ftc.gov
First Annual BSA and IDC Global Software Piracy Study.
(2004). Retrieved August 3, 2007, from
http://www.bsa.
org/globalstudy/
Federal Trade Commission. (1998).
Privacy online:
A report to Congress
. Retrieved from http://www.ftc.
gov/reports/privacy3/priv-23a.pdf
Fischer, G., & Girgensohn, A. (1990). End-user modifi-
ability in design environments. In
Proceedings of the
Conference on Human Factors in Computing Systems
(CHI'90)
(pp. 183-192). New York: ACM Press.
Federal Trade Commission. (2000).
Privacy online: Fair
information practices in the electronic marketplace
(A
Report to Congress). Retrieved from http://www.ftc.
gov/reports/privacy2000/privacy2000.pdf
Fischer, G., Giaccardi, E., Ye, Y., Sutcliffe, A.G., &
Mehandjiev, N. (2004). Meta-design: A manifesto for
end-user development.
Communications of the ACM,
47
(9), 33-37.
Federal Trade Commission. (2000a).
FTC sues failed
Website, Toysmart.com, for deceptively offering for sale
personal information of Website visitors.
Retrieved Au-
gust 4, 2007, from http://ftc.gov/opa/2000/07/toysmart.
htm
Fischer, G., & Lemke, A.C. (1988). Constrained design
processes: Steps toward convivial computing. In R.
Guindon (Ed.),
Cognitive science and its application
for human-computer interaction
(pp. 1-58). Hillsdale,
NJ: Lawrence Erlbaum.
Federal Trade Commission. (2000b, July 21).
FTC an-
nounces settlement with bankrupt Website, Toysmart.
Com, regarding alleged privacy violations.
Retrieved
August 4, 2007, from http://www.ftc.gov/opa/2000/07/
toysmart2.htm
Fischer, G. (1998). Seeding, evolutionary growth,
and reseeding: Constructing, capturing, and evolving
knowledge in domain-oriented design environments.
Automated Software Engineering, 5
(4), 447-468.
Search WWH ::
Custom Search