Referencias Analíticas
*
Wireless Infidelity II: Airjacking.
Berghel, Hal
; Uecker, Jacob
pp. 15-22.; 28cm.; il.
|
*
WHY WE Blog.
Nardi, Bonnie A.
; Schiano., Diane J.
; Gumbrecht, Michelle
; Swartz, Luke
pp. 41-46.; 28cm.; il.
|
*
Using Choiceboards To Creatieve Business Value
Bharati, Pratyush
; Chaudhury, Abhijit
pp. 77-81.; 28cm.; il.
|
*
The OBSTACLES and MYTHS of USABILITY and SOFTWARE ENGINEERING.
Seffah, Ahmed
; Metzker, Eduard
pp .71-76.; 28cm.; il.
|
*
The Many Colors of Multimedia Security.
Mercuri, Rebecca T.
pp. 25-29.; 28cm.; il.
|
*
The Health of Research Conferences and the Dearth of Big Idea Papers. By: Patterson
Patterson, David A.
pp. 23-24.; 28cm.; il
|
*
THE Blogosphere.
Rosenbloom , Andrew
pp. 31-33.; 28 cm.; il.
|
*
Structure and Evolution of Blogspace.
Ravi, Kumar
; Novak, Jasmine
; Prabhakar, Raghavan
; Tomkins, Andrew
pp. 35-39.; 28cm.; il.
|
*
Spamming, Phishing, Authentication, and Privacy
Bellovin, Steven M.
p. 144.; 28cm.
|
*
Software Development Teams
Sawyer, Steve
pp. 95-99.; 28 cm. il.
|
*
Semantic Blogging AND DECENTRALIZED KNOWLEDGE MANAGEMENT.
Cayzer, Steve
pp. 47-52.; 28 cm.; il.
|
*
Like It or Not, Web Services Are Distributed Objects.
Birman, Kenneth R.
pp. 60-62.; 28cm.
|
*
How Blogging Software RESHAPES THE ONLINE COMMUNITY.
Blood, Rebecca
pp. 53-55.; 28cm.; il.
|
*
E-COMMERCE AND TOURISM.
Werthner, Hannes
; Ricci, Francesco
pp. 101-105.; 28cm.; il.
|
*
Democracy AND FILTERING.
Susnstein, Cass R.
pp. 57-59.; 28cm.; il.
|
*
Cyberaccess: WEB ACCESSIBILITY AND CORPORATE AMERICA.
Loiacono, Eleanor T.
pp. 83-87.; 28cm.; il.
|
*
Building Systems That Users Want to Use.
Malhotra, Yogesh
; Galletta, Dennis F.
pp. 89-94.; 28cm.; il.
|
*
ACM Annual Report for FY04.
Klawe, Maria M.
pp. 63-69.; 28 cm. ; il.
|
|