Information Technology Reference
In-Depth Information
Eliashberg, J., & Robertson, T. (1988). New product pre-
announcing behavior: A market signaling study. Journal
of Marketing Research , 25 (3), 282-292.
Federal Trade Commission. (2007). FTC issues annual
list of top consumer complaints. Retrieved August 6,
2007, from the Federal Trade Commission, http://www.
ftc.gov/opa/2007/02/topcomplaints.htm
Ellström, P.E., Gustavsson, B., & Larsson, S. (1996).
Livslångt lärande [Lifelong learning]. Lund: Student-
litteratur.
Felter, M. (1985). Sex differences on the California
statewide assessment of computer literacy. Sex Roles ,
13 (2), 181-192.
Engeström, Y. (1987). Learning by expanding: An ac-
tivity-theoretical approach to developmental research.
Helsinki: Orienta-Konsultit.
Ferneley, E. H. (2007). Covert end user development:
A study of success. Journal of Organizational and End
User Computing, 19 (1), 62-71.
Engeström, Y. (2001). Expansive learning at work: To-
wards an activity theoretical reconceptualization. Journal
of Education and Work, 14 , 133-156.
Ferris, C, & Farrel, J. (2003). What are Web services?
Communications of the ACM, 46 (6), 31-36.
Engeström, Y., & Middleton, D. (Eds.). (1996). Cognition
and communication at work . Cambridge: Cambridge
University Press.
Festerand, T.A., Snyder, D.R., & Tsalikis, J.D. (1986).
Influence of catalog versus store shopping and prior
satisfaction on percieved risk. Journal of the Academy
of Marketing Science, 14 (4), 28-36.
Fairclough, N. (2001). Language and power (2nd ed.).
London: Longman.
Fiedler, F. E. (1974). The contingency model—New direc-
tions for leadership utilization. Journal of Contemporary
Business , 65-79.
Federal Trade Commission. (1996). Consumer informa-
tion privacy hearings. Retrieved August 4, 2007, from
http://www.ftc.gov
First Annual BSA and IDC Global Software Piracy Study.
(2004). Retrieved August 3, 2007, from http://www.bsa.
org/globalstudy/
Federal Trade Commission. (1998). Privacy online:
A report to Congress . Retrieved from http://www.ftc.
gov/reports/privacy3/priv-23a.pdf
Fischer, G., & Girgensohn, A. (1990). End-user modifi-
ability in design environments. In Proceedings of the
Conference on Human Factors in Computing Systems
(CHI'90) (pp. 183-192). New York: ACM Press.
Federal Trade Commission. (2000). Privacy online: Fair
information practices in the electronic marketplace (A
Report to Congress). Retrieved from http://www.ftc.
gov/reports/privacy2000/privacy2000.pdf
Fischer, G., Giaccardi, E., Ye, Y., Sutcliffe, A.G., &
Mehandjiev, N. (2004). Meta-design: A manifesto for
end-user development. Communications of the ACM,
47 (9), 33-37.
Federal Trade Commission. (2000a). FTC sues failed
Website, Toysmart.com, for deceptively offering for sale
personal information of Website visitors. Retrieved Au-
gust 4, 2007, from http://ftc.gov/opa/2000/07/toysmart.
htm
Fischer, G., & Lemke, A.C. (1988). Constrained design
processes: Steps toward convivial computing. In R.
Guindon (Ed.), Cognitive science and its application
for human-computer interaction (pp. 1-58). Hillsdale,
NJ: Lawrence Erlbaum.
Federal Trade Commission. (2000b, July 21). FTC an-
nounces settlement with bankrupt Website, Toysmart.
Com, regarding alleged privacy violations. Retrieved
August 4, 2007, from http://www.ftc.gov/opa/2000/07/
toysmart2.htm
Fischer, G. (1998). Seeding, evolutionary growth,
and reseeding: Constructing, capturing, and evolving
knowledge in domain-oriented design environments.
Automated Software Engineering, 5 (4), 447-468.
Search WWH ::




Custom Search