The JISC User Behaviour Monitoring and Evaluation Framework. Banwell, L., Ray, K., Coulson, G., Urquhart, C., Lonsdale, R., Armstrong, C., Thomas, R., Spink, S., Yeoman, A., Fenton, R., & Rowley, J. Journal of Documentation, 60(3):302–320, 2004.
Paper doi bibtex @article{Banwell2004,
title = {The {JISC} {User} {Behaviour} {Monitoring} and {Evaluation} {Framework}},
volume = {60},
issn = {0022-0418},
url = {http://www.emeraldinsight.com/10.1108/00220410410534202},
doi = {10.1108/00220410410534202},
number = {3},
urldate = {2012-05-12},
journal = {Journal of Documentation},
author = {Banwell, Linda and Ray, Kathryn and Coulson, Graham and Urquhart, Christine and Lonsdale, Ray and Armstrong, Chris and Thomas, Rhian and Spink, Siân and Yeoman, Alison and Fenton, Roger and Rowley, Jennifer},
year = {2004},
pages = {302--320},
}
Downloads: 0
{"_id":"95PDK6ShkgPcgQYyb","bibbaseid":"banwell-ray-coulson-urquhart-lonsdale-armstrong-thomas-spink-etal-thejiscuserbehaviourmonitoringandevaluationframework-2004","author_short":["Banwell, L.","Ray, K.","Coulson, G.","Urquhart, C.","Lonsdale, R.","Armstrong, C.","Thomas, R.","Spink, S.","Yeoman, A.","Fenton, R.","Rowley, J."],"bibdata":{"bibtype":"article","type":"article","title":"The JISC User Behaviour Monitoring and Evaluation Framework","volume":"60","issn":"0022-0418","url":"http://www.emeraldinsight.com/10.1108/00220410410534202","doi":"10.1108/00220410410534202","number":"3","urldate":"2012-05-12","journal":"Journal of Documentation","author":[{"propositions":[],"lastnames":["Banwell"],"firstnames":["Linda"],"suffixes":[]},{"propositions":[],"lastnames":["Ray"],"firstnames":["Kathryn"],"suffixes":[]},{"propositions":[],"lastnames":["Coulson"],"firstnames":["Graham"],"suffixes":[]},{"propositions":[],"lastnames":["Urquhart"],"firstnames":["Christine"],"suffixes":[]},{"propositions":[],"lastnames":["Lonsdale"],"firstnames":["Ray"],"suffixes":[]},{"propositions":[],"lastnames":["Armstrong"],"firstnames":["Chris"],"suffixes":[]},{"propositions":[],"lastnames":["Thomas"],"firstnames":["Rhian"],"suffixes":[]},{"propositions":[],"lastnames":["Spink"],"firstnames":["Siân"],"suffixes":[]},{"propositions":[],"lastnames":["Yeoman"],"firstnames":["Alison"],"suffixes":[]},{"propositions":[],"lastnames":["Fenton"],"firstnames":["Roger"],"suffixes":[]},{"propositions":[],"lastnames":["Rowley"],"firstnames":["Jennifer"],"suffixes":[]}],"year":"2004","pages":"302–320","bibtex":"@article{Banwell2004,\n\ttitle = {The {JISC} {User} {Behaviour} {Monitoring} and {Evaluation} {Framework}},\n\tvolume = {60},\n\tissn = {0022-0418},\n\turl = {http://www.emeraldinsight.com/10.1108/00220410410534202},\n\tdoi = {10.1108/00220410410534202},\n\tnumber = {3},\n\turldate = {2012-05-12},\n\tjournal = {Journal of Documentation},\n\tauthor = {Banwell, Linda and Ray, Kathryn and Coulson, Graham and Urquhart, Christine and Lonsdale, Ray and Armstrong, Chris and Thomas, Rhian and Spink, Siân and Yeoman, Alison and Fenton, Roger and Rowley, Jennifer},\n\tyear = {2004},\n\tpages = {302--320},\n}\n\n","author_short":["Banwell, L.","Ray, K.","Coulson, G.","Urquhart, C.","Lonsdale, R.","Armstrong, C.","Thomas, R.","Spink, S.","Yeoman, A.","Fenton, R.","Rowley, J."],"key":"Banwell2004","id":"Banwell2004","bibbaseid":"banwell-ray-coulson-urquhart-lonsdale-armstrong-thomas-spink-etal-thejiscuserbehaviourmonitoringandevaluationframework-2004","role":"author","urls":{"Paper":"http://www.emeraldinsight.com/10.1108/00220410410534202"},"metadata":{"authorlinks":{}},"html":""},"bibtype":"article","biburl":"https://bibbase.org/zotero/ifromm","dataSources":["N4kJAiLiJ7kxfNsoh"],"keywords":[],"search_terms":["jisc","user","behaviour","monitoring","evaluation","framework","banwell","ray","coulson","urquhart","lonsdale","armstrong","thomas","spink","yeoman","fenton","rowley"],"title":"The JISC User Behaviour Monitoring and Evaluation Framework","year":2004}