The use and abuse of Personas for end-user computing strategies

Subscriber Only Content

Please login below or register for a free account.

Search