Bibliography

Anderson, Chris. Makers: The New Industrial Revolution. New York: Crown Business, 2012.

Brynjolfsson, Erik. “The Productivity Paradox of Information Technology: Review and Assessment.” Communications of the ACM, December, 1993. http://ccs.mit.edu/papers/CCSWP130/ccswp130.html.

Brynjolfsson, Erik and Lorin Hitt. “Beyond the Productivity Paradox: Computers are the Catalyst for Bigger Changes.” Communications of the ACM, August 1998, vol. 41(8): pp. 49–55. http://ebusiness.mit.edu/erik/bpp.pdf

Castells, Manuel. The Rise of the Network Society. 2nd ed. Cambridge, MA: Blackwell Publishers, 2000.Valacich, Joseph, and Christoph Schneider. Information Systems Today: Managing in the Digital World. 4th ed. Upper Saddle River, NJ: Prentice-Hall, 2010.

Chui, Michael, Markus Löffler, and Roger Roberts. “The Internet of Things.” McKinsey Quarterly, March 2010. http://www.mckinsey.com/insights/high_tech_telecoms_internet/the_internet_of_things

Columbus, Louis. “IDC: 87% of Connected Devices Sales by 2017 Will Be Tablets and Smartphones.” Tech section of forbes.com, September 12, 2013. http://www.forbes.com/sites/louiscolumbus/2013/09/12/idc-87-of-connected-devices-by-2017-will-be-tablets-and-smartphones/

Friedman, T. L. The World Is Flat: A Brief History of the Twenty-First Century. New York: Farrar, Straus and Giroux, 2005.

Gallagher, Sean. “Born to Be Breached: The Worst Passwords Are Still the Most Common.” Arstechnica, November 3, 2012. Retrieved from http://arstechnica.com/information-technology/2012/11/born-to-be-breached-the-worst-passwords-are-still-the-most-common/ on May 15, 2013.

Godin, Seth. Really Bad PowerPoint (and How to Avoid It). Do You Zoom, Inc., 2001. http://www.sethgodin.com/freeprize/reallybad-1.pdf.

Guel, Michele D. “A Short Primer for Developing Security Policies.” SANS Institute, 2007. Accessed from http://www.sans.org/security-resources/policies/Policy_Primer.pdf on May 31, 2013.

Hammer, Michael. “Reengineering Work: Don’t Automate, Obliterate.” Harvard Business Review, 68.4 (1990): 104–112.

Kibum, Kim. “Challenges in HCI: Digital Divide.” Crossroads, vol. 12, issue 2 (December 2005), 2–2, doi: 10.1145/1144375.1144377. http://doi.acm.org/10.1145/1144375.1144377.

Kim, P., E. Buckner, T. Makany, and H. Kim. “A Comparative Analysis of a Game-Based Mobile Learning Model in Low-Socioeconomic Communities of India.” International Journal of Educational Development, vol. 32, issue 2 (March 2012), pp. 205–366, doi:10.1016/j.ijedudev.2011.05.008.

Kraemer, Kenneth L., Jason Dedrick, and Prakul Sharma. “One Laptop Per Child: Vision vs. Reality.” Communications of the ACM, vol. 52, no. 6, pp. 66–73.

Laudon, Kenneth C., and Jane P. Laudon. Management Information Systems: Managing the Digital Firm. 12th ed. Upper Saddle River, NJ: Prentice-Hall, 2012.

McAfee, Andrew and Erik Brynjolfsson. “Investing in the IT That Makes a Competitive Difference.” Harvard Business Review, July-August, 2008.

McCallister, Erika, Tim Grance, and Karen Scarfone. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). National Institute of Standards and Technology, US Department of Commerce Special Publication 800-122, April 2010. http://csrc.nist.gov/publications/nistpubs/800-122/sp800-122.pdf

Moore, Gordon E. “Cramming More Components onto Integrated Circuits.” Electronics, pp. 114–117, April 19, 1965.

Porter, Michael. “Strategy and the Internet.” Harvard Business Review, vol. 79, no. 3, March 2001. http://hbswk.hbs.edu/item/2165.html

Rogers, E. M. Diffusion of Innovations. New York: Free Press, 1962.

Whitney, Lance. “Smartphone Shipments to Surpass Feature Phones This Year.” CNet, June 4, 2013. http://news.cnet.com/8301-1035_3-57587583-94/smartphone-shipments-to-surpass-feature-phones-this-year/

Wiseman, C., and I. C. MacMillan. “Creating Competitive Weapons from Information Systems.” Journal Of Business Strategy, 5(2) (1984), p. 42.