Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 3: Techniques for Visualizing Website Usage Patterns with an Adaptive Neural Network
Figure 1: A Jittered Grid Depicting Clusters of Web Pages
Chapter 5: Social Issues in the Administration of Information Systems Survey Research
Figure 1: Survey Instrument Performance Parameters
Figure 2: Response Rate Comparisons Between Electronic and Paper and Pencil Surveys
Figure 3: Participation Ease Sequencing Activities
Figure 4: Example of Website Survey Solicitation
Chapter 6: User Interfaces and Markup Language Programming: The Effects of Interaction Mode on User Performance and Satisfaction
Figure 1: Command Language Mode
Figure 2: Wizard Mode
Chapter 7: Development of a Task Model for the Analysis and Retrieval of Statistical Data
Figure 1: Comparison of Goodhue's Model and a Proposed Model for ESD Use
Figure 2: A Screen from Value Mode Showing the Process of Defining a Rule
Figure 3: A Screen Showing Table Mode
Figure 4: A Proposed Model for ESD Use Based on Goodhue's Model (1998)
Figure 5: A Proposed Model for the Location Sub-Task
Figure 6: Proposed Model of the Organization Sub-Task Using OLAP
Chapter 8: Media Selection and End-User Satisfaction: An Empirical Study of Help-Desk Using SERVQUAL
Figure 1: Continuum of Communication Media in Help Desk
Chapter 9: End User Support Usage
Figure 1: Research Model
Figure 2: Summarizing the Results
Chapter 10: Users as Developers — Conditions and Effects of User Systems Development
Figure 1: The Relation Between Knowledge and Development
Figure 2: Continuous Change and User Systems Development
Chapter 12: Changing a Business School Corporate Culture: Teaching in the 21st Century on a Different Blackboard
Diagram A: Snapshot of SOBA-Net's Structure
Chapter 13: The Role of the Organizational Context in the Use of a Workflow System: Lessons From a Case Study
Figure 1: Framework of Analysis
Figure 2: Model of WS Based on the Language/Action Approach
Figure 3: The Process Before the Adoption of the WS
Figure 4: The Process After the Adoption of the WS
Figure 5: The Interaction Between the Organizational Factors
Chapter 15: Role of Behavioral Factors in Strategic Alliances
Figure 1: Strategic Alliance Phases (Bronder & Pritzl, 1992)
Figure 2: Forces Affecting Overall IT Architecture
Figure 3: Energy Trading Risks
Figure 4: Relationships Between TEL and Third Parties
Chapter 16: Building a Custom Client-Side Research Tool for Online Web-Based Experiments
Figure 1: Snapshot of a Custom Browser that was Created by the Author for a Recent Research Project
Figure 2: Record structure for a data file
Chapter 17: Towards a Sociopragmatic-Constructivist Understanding of Information Systems
Figure 1: Framework for the Conceptualization of Paradigms of Inquiry
Figure 2: Paradigms of Inquiry in Social Sciences (Morgan & Smircich, 1980, p. 492)
Figure 3: Paradigm of Sociopragmatic Constructivism
Previous page
Table of content
Next page
Computing Information Technology: The Human Side
ISBN: 1931777527
EAN: 2147483647
Year: 2003
Pages: 186
BUY ON AMAZON
Network Security Architectures
What Is a Security Policy?
Applied Knowledge Questions
Topology Considerations
References
Introduction
C & Data Structures (Charles River Media Computer Engineering)
Control Structures
Function
Storage of Variables
Strings
Structures
The Java Tutorial: A Short Course on the Basics, 4th Edition
Code Samples
Synchronizing Thread
Questions and Exercises
Overview of the Swing API
Integrated Development Environments
An Introduction to Design Patterns in C++ with Qt 4
Copy Constructors and Assignment Operators
Overloading, Hiding, and Overriding
QObjects Child Managment
Different Kinds of Arrays
Preference: An Enumerated Type
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Running SQL Queries
Subqueries
Unions
Creating HTML Reports
Using Substitution Variables
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Numbers, Dates, and Other Data Types
Network Programming
Windows Programming
Remoting and Enterprise Services
Security and Cryptography
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies