{"id":95,"date":"2018-06-08T19:13:00","date_gmt":"2018-06-08T19:13:00","guid":{"rendered":"http:\/\/opentextbook.site\/informationsystems\/back-matter\/bibliography\/"},"modified":"2018-06-08T21:57:37","modified_gmt":"2018-06-08T21:57:37","slug":"bibliography","status":"publish","type":"back-matter","link":"https:\/\/opentextbook.site\/informationsystems\/back-matter\/bibliography\/","title":{"rendered":"Bibliography"},"content":{"raw":"\n<p>Anderson, Chris.&nbsp;<em>Makers: The New Industrial Revolution<\/em>. New York: Crown Business, 2012.<\/p>\n<p>Brynjolfsson, Erik. \"The Productivity Paradox of Information Technology: Review and Assessment.\"&nbsp;<em>Communications of the ACM<\/em>, December, 1993. http:\/\/ccs.mit.edu\/papers\/CCSWP130\/ccswp130.html.<\/p>\n<p>Brynjolfsson, Erik and Lorin Hitt. \"Beyond the Productivity Paradox:&nbsp;Computers are the Catalyst for Bigger Changes.\"&nbsp;<em>Communications of the ACM<\/em>, August 1998, vol. 41(8): pp. 49\u201355.&nbsp;http:\/\/ebusiness.mit.edu\/erik\/bpp.pdf<\/p>\n<p>Castells, Manuel.&nbsp;<em>The Rise of the Network Society<\/em>.&nbsp;2nd ed. Cambridge, MA: Blackwell Publishers,&nbsp;2000.<span style=\"line-height: 1.5em\">Valacich, Joseph, and&nbsp;Christoph Schneider.&nbsp;<\/span><em style=\"line-height: 1.5em\">Information Systems Today: Managing in the Digital World<\/em><span style=\"line-height: 1.5em\">.&nbsp;4th ed. Upper Saddle River, NJ:&nbsp;Prentice-Hall, 2010.<\/span><\/p>\n<p><span style=\"line-height: 1.5em\">Chui, Michael, Markus L\u00f6ffler, and Roger Roberts. \"The Internet of Things.\"&nbsp;<em>McKinsey Quarterly<\/em>, March 2010.&nbsp;http:\/\/www.mckinsey.com\/insights\/high_tech_telecoms_internet\/<\/span><span style=\"line-height: 1.5em\">the_internet_of_things<\/span><\/p>\n<p>Columbus, Louis. \"IDC: 87% of Connected Devices Sales by 2017 Will Be Tablets and Smartphones.\" Tech section of forbes.com, September 12, 2013. http:\/\/www.forbes.com\/sites\/louiscolumbus\/2013\/09\/12\/idc-87-of-connected-devices-by-2017-will-be-tablets-and-smartphones\/<\/p>\n<p>Friedman, T. L.&nbsp;<em>The World Is Flat: A Brief History of the Twenty-First Century<\/em>. New York: Farrar, Straus and Giroux, 2005.<\/p>\n<p>Gallagher, Sean.&nbsp;\"Born to Be Breached: The Worst Passwords Are Still the Most Common.\"&nbsp;<em>Arstechnica<\/em>,<em>&nbsp;<\/em>November 3, 2012. Retrieved from http:\/\/arstechnica.com\/information-technology\/2012\/11\/born-to-be-breached-the-worst-passwords-are-still-the-most-common\/ on May 15, 2013.<\/p>\n<p>Godin, Seth.<i>&nbsp;Really Bad PowerPoint (and How to Avoid It).<\/i>&nbsp;Do You Zoom, Inc., 2001.&nbsp;http:\/\/www.sethgodin.com\/freeprize\/reallybad-1.pdf.<\/p>\n<p>Guel,&nbsp;Michele D.&nbsp;\"A Short Primer for Developing Security Policies.\" SANS Institute, 2007.&nbsp;Accessed from http:\/\/www.sans.org\/security-resources\/policies\/Policy_Primer.pdf on May 31, 2013.<\/p>\n<p>Hammer, Michael. \"Reengineering Work: Don't Automate, Obliterate.\"&nbsp;<em>Harvard Business<\/em>&nbsp;Review,<em>&nbsp;<\/em>68.4 (1990): 104\u2013112.<\/p>\n<p>Kibum, Kim. \"Challenges in HCI: Digital Divide.\"&nbsp;<em>Crossroads<\/em>, vol.&nbsp;12, issue 2 (December 2005), 2\u20132, doi: 10.1145\/1144375.1144377. http:\/\/doi.acm.org\/10.1145\/1144375.1144377.<\/p>\n<p>Kim, P., E. Buckner, T. Makany, and H. Kim. \"A Comparative Analysis of a Game-Based Mobile Learning Model in Low-Socioeconomic Communities of India.\"&nbsp;<em>International Journal of Educational Development<\/em>, vol. 32, issue 2 (March 2012),&nbsp;pp. 205\u2013366,&nbsp;doi:10.1016\/j.ijedudev.2011.05.008.<\/p>\n<p>Kraemer,&nbsp;Kenneth L., Jason Dedrick, and Prakul Sharma. \"One Laptop Per Child: Vision vs. Reality.\"&nbsp;<em>Communications of the ACM<\/em>, vol. 52, no. 6, pp. 66\u201373.<\/p>\n<p>Laudon, Kenneth C., and Jane P. Laudon.&nbsp;<em>Management Information Systems: Managing the Digital Firm<\/em>.&nbsp;12th ed. Upper Saddle River, NJ: Prentice-Hall, 2012.<\/p>\n<p>McAfee, Andrew and Erik Brynjolfsson. \"Investing in the IT That Makes a Competitive Difference.\"&nbsp;<em>Harvard Business Review<\/em>, July-August, 2008.<\/p>\n<p>McCallister, Erika,&nbsp;Tim Grance, and Karen Scarfone.&nbsp;<em>Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)<\/em>. National Institute of Standards and Technology, US Department of Commerce Special Publication 800-122, April 2010. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-122\/sp800-122.pdf<\/p>\n<p>Moore, Gordon E.&nbsp;\u201cCramming More Components onto&nbsp;Integrated Circuits.\u201d <em>Electronics<\/em>, pp. 114\u2013117, April 19, 1965.<\/p>\n<p>Porter, Michael. \"Strategy and the Internet.\"&nbsp;<em>Harvard Business Review<\/em>, vol. 79, no. 3, March 2001.&nbsp;http:\/\/hbswk.hbs.edu\/item\/2165.html<\/p>\n<p>Rogers, E. M.&nbsp;<em>Diffusion of Innovations<\/em>. New York: Free Press, 1962.<\/p>\n<p>Whitney, Lance. \"Smartphone Shipments to Surpass Feature Phones This Year.\" CNet, June 4, 2013. http:\/\/news.cnet.com\/8301-1035_3-57587583-94\/smartphone-shipments-to-surpass-feature-phones-this-year\/<\/p>\n<p><span style=\"line-height: 1.5em\">Wiseman, C., and I. C.&nbsp;MacMillan. \"Creating Competitive Weapons from Information Systems.\"&nbsp;<\/span><em style=\"line-height: 1.5em\">Journal Of Business Strategy<\/em><span style=\"line-height: 1.5em\">, 5(2) (1984), p. 42.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"line-height: 1.5em\">&nbsp;<\/span><\/p>\n\n","rendered":"<p>Anderson, Chris.&nbsp;<em>Makers: The New Industrial Revolution<\/em>. New York: Crown Business, 2012.<\/p>\n<p>Brynjolfsson, Erik. &#8220;The Productivity Paradox of Information Technology: Review and Assessment.&#8221;&nbsp;<em>Communications of the ACM<\/em>, December, 1993. http:\/\/ccs.mit.edu\/papers\/CCSWP130\/ccswp130.html.<\/p>\n<p>Brynjolfsson, Erik and Lorin Hitt. &#8220;Beyond the Productivity Paradox:&nbsp;Computers are the Catalyst for Bigger Changes.&#8221;&nbsp;<em>Communications of the ACM<\/em>, August 1998, vol. 41(8): pp. 49\u201355.&nbsp;http:\/\/ebusiness.mit.edu\/erik\/bpp.pdf<\/p>\n<p>Castells, Manuel.&nbsp;<em>The Rise of the Network Society<\/em>.&nbsp;2nd ed. Cambridge, MA: Blackwell Publishers,&nbsp;2000.<span style=\"line-height: 1.5em\">Valacich, Joseph, and&nbsp;Christoph Schneider.&nbsp;<\/span><em style=\"line-height: 1.5em\">Information Systems Today: Managing in the Digital World<\/em><span style=\"line-height: 1.5em\">.&nbsp;4th ed. Upper Saddle River, NJ:&nbsp;Prentice-Hall, 2010.<\/span><\/p>\n<p><span style=\"line-height: 1.5em\">Chui, Michael, Markus L\u00f6ffler, and Roger Roberts. &#8220;The Internet of Things.&#8221;&nbsp;<em>McKinsey Quarterly<\/em>, March 2010.&nbsp;http:\/\/www.mckinsey.com\/insights\/high_tech_telecoms_internet\/<\/span><span style=\"line-height: 1.5em\">the_internet_of_things<\/span><\/p>\n<p>Columbus, Louis. &#8220;IDC: 87% of Connected Devices Sales by 2017 Will Be Tablets and Smartphones.&#8221; Tech section of forbes.com, September 12, 2013. http:\/\/www.forbes.com\/sites\/louiscolumbus\/2013\/09\/12\/idc-87-of-connected-devices-by-2017-will-be-tablets-and-smartphones\/<\/p>\n<p>Friedman, T. L.&nbsp;<em>The World Is Flat: A Brief History of the Twenty-First Century<\/em>. New York: Farrar, Straus and Giroux, 2005.<\/p>\n<p>Gallagher, Sean.&nbsp;&#8220;Born to Be Breached: The Worst Passwords Are Still the Most Common.&#8221;&nbsp;<em>Arstechnica<\/em>,<em>&nbsp;<\/em>November 3, 2012. Retrieved from http:\/\/arstechnica.com\/information-technology\/2012\/11\/born-to-be-breached-the-worst-passwords-are-still-the-most-common\/ on May 15, 2013.<\/p>\n<p>Godin, Seth.<i>&nbsp;Really Bad PowerPoint (and How to Avoid It).<\/i>&nbsp;Do You Zoom, Inc., 2001.&nbsp;http:\/\/www.sethgodin.com\/freeprize\/reallybad-1.pdf.<\/p>\n<p>Guel,&nbsp;Michele D.&nbsp;&#8220;A Short Primer for Developing Security Policies.&#8221; SANS Institute, 2007.&nbsp;Accessed from http:\/\/www.sans.org\/security-resources\/policies\/Policy_Primer.pdf on May 31, 2013.<\/p>\n<p>Hammer, Michael. &#8220;Reengineering Work: Don&#8217;t Automate, Obliterate.&#8221;&nbsp;<em>Harvard Business<\/em>&nbsp;Review,<em>&nbsp;<\/em>68.4 (1990): 104\u2013112.<\/p>\n<p>Kibum, Kim. &#8220;Challenges in HCI: Digital Divide.&#8221;&nbsp;<em>Crossroads<\/em>, vol.&nbsp;12, issue 2 (December 2005), 2\u20132, doi: 10.1145\/1144375.1144377. http:\/\/doi.acm.org\/10.1145\/1144375.1144377.<\/p>\n<p>Kim, P., E. Buckner, T. Makany, and H. Kim. &#8220;A Comparative Analysis of a Game-Based Mobile Learning Model in Low-Socioeconomic Communities of India.&#8221;&nbsp;<em>International Journal of Educational Development<\/em>, vol. 32, issue 2 (March 2012),&nbsp;pp. 205\u2013366,&nbsp;doi:10.1016\/j.ijedudev.2011.05.008.<\/p>\n<p>Kraemer,&nbsp;Kenneth L., Jason Dedrick, and Prakul Sharma. &#8220;One Laptop Per Child: Vision vs. Reality.&#8221;&nbsp;<em>Communications of the ACM<\/em>, vol. 52, no. 6, pp. 66\u201373.<\/p>\n<p>Laudon, Kenneth C., and Jane P. Laudon.&nbsp;<em>Management Information Systems: Managing the Digital Firm<\/em>.&nbsp;12th ed. Upper Saddle River, NJ: Prentice-Hall, 2012.<\/p>\n<p>McAfee, Andrew and Erik Brynjolfsson. &#8220;Investing in the IT That Makes a Competitive Difference.&#8221;&nbsp;<em>Harvard Business Review<\/em>, July-August, 2008.<\/p>\n<p>McCallister, Erika,&nbsp;Tim Grance, and Karen Scarfone.&nbsp;<em>Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)<\/em>. National Institute of Standards and Technology, US Department of Commerce Special Publication 800-122, April 2010. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-122\/sp800-122.pdf<\/p>\n<p>Moore, Gordon E.&nbsp;\u201cCramming More Components onto&nbsp;Integrated Circuits.\u201d <em>Electronics<\/em>, pp. 114\u2013117, April 19, 1965.<\/p>\n<p>Porter, Michael. &#8220;Strategy and the Internet.&#8221;&nbsp;<em>Harvard Business Review<\/em>, vol. 79, no. 3, March 2001.&nbsp;http:\/\/hbswk.hbs.edu\/item\/2165.html<\/p>\n<p>Rogers, E. M.&nbsp;<em>Diffusion of Innovations<\/em>. New York: Free Press, 1962.<\/p>\n<p>Whitney, Lance. &#8220;Smartphone Shipments to Surpass Feature Phones This Year.&#8221; CNet, June 4, 2013. http:\/\/news.cnet.com\/8301-1035_3-57587583-94\/smartphone-shipments-to-surpass-feature-phones-this-year\/<\/p>\n<p><span style=\"line-height: 1.5em\">Wiseman, C., and I. C.&nbsp;MacMillan. &#8220;Creating Competitive Weapons from Information Systems.&#8221;&nbsp;<\/span><em style=\"line-height: 1.5em\">Journal Of Business Strategy<\/em><span style=\"line-height: 1.5em\">, 5(2) (1984), p. 42.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"line-height: 1.5em\">&nbsp;<\/span><\/p>\n","protected":false},"author":1,"menu_order":2,"template":"","meta":{"pb_show_title":"","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"back-matter-type":[27],"contributor":[],"license":[],"class_list":["post-95","back-matter","type-back-matter","status-publish","hentry","back-matter-type-appendix"],"_links":{"self":[{"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/back-matter\/95","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/back-matter"}],"about":[{"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/wp\/v2\/types\/back-matter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":1,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/back-matter\/95\/revisions"}],"predecessor-version":[{"id":111,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/back-matter\/95\/revisions\/111"}],"metadata":[{"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/back-matter\/95\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/wp\/v2\/media?parent=95"}],"wp:term":[{"taxonomy":"back-matter-type","embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/back-matter-type?post=95"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/wp\/v2\/contributor?post=95"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/wp\/v2\/license?post=95"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}