by
Laverack, Glenn, author.
Format:
Books
Publication Date
2015
Excerpt:
. social entrepreneurship -- 66. social movements -- 67. theory of change -- 68. tobacco control -- 69
by
Leith, Philip, 1954- editor.
Table of contents only http://catdir.loc.gov/catdir/toc/fy16pdf02/2014946839.html
Format:
Books
Publication Date
2015
Excerpt:
/ Brent Hecht, Lichan Hong, Bongwon Suh and Ed H. Chi -- Teens, privacy and online social networks : how
by
Uldam, Julie, 1977-
Format:
Books
Publication Date
2015
Excerpt:
Online social networks -- Political aspects.
by
Halfpenny, Peter J., author.
Format:
Books
Publication Date
2015
Excerpt:
Research -- Computer network resources.
by
Scott, Victoria C. (Victoria Celeste), 1984- editor.
Format:
Books
Publication Date
2015
Excerpt:
Psychology, Social.
by
Turban, Efraim, author.
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1513/2015410532-d.html
Table of contents only http://catdir.loc.gov/catdir/enhancements/fy1513/2015410532-t.html
Table of contents only http://catdir.loc.gov/catdir/enhancements/fy1513/2015410532-t.html
Format:
Books
Publication Date
2015
Excerpt:
with search, semantic, and recommendation technology -- Social networking, engagement, and social
by
Dainton, Marianne.
Format:
Books
Publication Date
2015
Excerpt:
-- Assumptions of Politeness Theory -- Preserving Face -- Social Exchange Theory -- Assumptions of SET -- Core
by
Robins, Garry author.
Format:
Books
Publication Date
2015
Excerpt:
Doing social network research : network-based research design for social scientists / Robins, Garry
by
Chen, Wenhong, editor.
Format:
Books
Publication Date
2015
Excerpt:
Information technology -- Social aspects -- China.
by
Tuten, Tracy L., 1967- author.
Format:
Books
Publication Date
2015
Excerpt:
Online social networks.
by
Boyd-Barrett, Oliver author.
Format:
Books
Publication Date
2015
Excerpt:
Mass media -- Social aspects.
by
Pfleeger, Charles P., 1948- author.
Format:
Regular print
Publication Date
2015
Excerpt:
readers' familiarity with networks, and present attacks delivered by a network-assisted attacker based on
Limit Search Results

