AuditWork

(Anjokal) #1
REFERÊNCIAS

__

__

[11] A. L. Sharon e C. Board, “Social networking and reputational risk in the
workplace,” Deloitte LLP 2009 Ethics & Workplace Survey results, 2009.
[12] J. Keating, I. Silva e H. Almeida, “Gestão de Recursos Humanos em pequenas e
médias empresas, Psicologia, Teoria, investigação e prática,” pp. 113-134, 2000.
[13] K. Bessiere, I. Ceaparu, J. Lazar, J. Robinson e B. Shneiderman, “Understanding
Computer User Frustration,” 21 09 2002.
[14] L. ESET Latin America and ESET, “Cybercrime Coming of Age,” ESET,
America, 2010.
[15] M. Bray, “Review of Computer Energy Consumption and Potential Savings,”
Dragon Systems Software Limited, 2006.
[16] J. G. Koomey, “Estimating total power consumption by servers in the US and the
world,” 2007.
[17] X. Fan,. W.-D. Weber e L. A. Barroso, “PowerProvisioningforaWarehouse-
sizedComputer,” Proceedings of the ACM International Symposiumon Computer
Architecture, SanDiego, 2007.
[18] P. Bertoldi e B. Atanasiu , “Electricity Consumption and,” Institute for
Environment and Sustainability, Italy, 2007.
[19] A. Berl e H. Meer, “Energy-Efficient Office Environments,” COST Action on
Energy Efficiency in Large, pp. 101-105, July 2010.
[20] J. A. Roberson, C. A. Webber, M. C. McWhi, R. E. Brown, M. J. Pinckard e J. F.
Busch, “After-hours power status of office equipment in the USA,” Berkeley CA,
2004.
[21] B. D. NG e P. W. Hastings, “Addiction to the Internet and Online Gaming,”
CyberPsychology & Behavior, vol. 2, pp. 110-113, 2005.
[22] L. I. a. N. Institute, “A Utilização de Internet em Portugal,” UMIC, 2010.
[23] Amplusnet, “Cyclope Series,” [Online]. Available: http://www.cyclope-series.com.
[Acedido em 01 03 2012].
[24] ManicTime, “Manictime,” [Online]. Available: http://www.manictime.com/.
[Acedido em 10 03 2012].
[25] R. Inc., “Refrog,” [Online]. Available: http://www.refog.com. [Acedido em 01 02
2012].
[26] L. Amaral, Sistemas de Informação Organizacionais, Edições Sílabo, 2005.
[27] R. L. Wakefield, “Employee Monitoring and Surveillance—The Growing Trend,”
Information Systems Control, vol. 1, 2004.
[28] Cisco, “Cisco Annual Security Report: Highlighting Global Security Threats and
Trends,” Cisco Systems, 2011.
[29] V. Friedman, “Data Visualization and Infographics,” Smashing Magazine, 14 01
2008.
Free download pdf