Flylib.com
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
ISBN: 1558606432
EAN: 2147483647
Year: 2005
Pages: 103
Authors:
B.J. Fogg
BUY ON AMAZON
Introduction Persuasion in the Digital Age
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
Credibility and Computers
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
Captology Looking Forward
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
ISBN: 1558606432
EAN: 2147483647
Year: 2005
Pages: 103
Authors:
B.J. Fogg
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
Challenging the Unpredictable: Changeable Order Management Systems
The Second Wave ERP Market: An Australian Viewpoint
The Effects of an Enterprise Resource Planning System (ERP) Implementation on Job Characteristics – A Study using the Hackman and Oldham Job Characteristics Model
Data Mining for Business Process Reengineering
Intrinsic and Contextual Data Quality: The Effect of Media and Personal Involvement
Snort Cookbook
Installing Snort from Source on Unix
Capturing Without Putting the Interface into Promiscuous Mode
Generating Real-Time Alerts
Experimental Preprocessors
Integrating Snort with Webmin
Java for RPG Programmers, 2nd Edition
The World Of Java
Structured Operations And Statements
String Manipulation
Exceptions
Appendix C Obtaining The Code Samples
PMP Practice Questions Exam Cram 2
Project PlanningCore Processes
Exam Prep Questions
Answers and Explanations
Answers and Explanations
Answers and Explanations
.NET-A Complete Development Cycle
Using OpenGL.NET
References for Further Reading
Analysis of the Editor Optimization Requirement
Secure Checkout
Integration Test
MPLS Configuration on Cisco IOS Software
Outbound Route Filters
Case Study-Inter-AS Implementing Route-Reflector and BGP Confederation in Provider Networks
Implementing VPNs with Layer 2 Tunneling Protocol Version 3
Implementing MPLS QoS for Layer 2 VPN Implementations
Case Study 4: Implementing Layer 3 VPNs over Layer 2 VPN Topologies and Providing L2 VPN Redundancy
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies