ijms.uum.edu · studied using the protocol analysis approach. Bouwman (1982) used Bouwman (1982)...
12
Transcript of ijms.uum.edu · studied using the protocol analysis approach. Bouwman (1982) used Bouwman (1982)...
![Page 1: ijms.uum.edu · studied using the protocol analysis approach. Bouwman (1982) used Bouwman (1982) used protocol analysis to identify the specific strategies and processes they](https://reader030.fdocuments.us/reader030/viewer/2022040418/5d5f745888c99370518b98dc/html5/thumbnails/1.jpg)
http
://ijm
s.uu
m.e
du.m
y
![Page 2: ijms.uum.edu · studied using the protocol analysis approach. Bouwman (1982) used Bouwman (1982) used protocol analysis to identify the specific strategies and processes they](https://reader030.fdocuments.us/reader030/viewer/2022040418/5d5f745888c99370518b98dc/html5/thumbnails/2.jpg)
http
://ijm
s.uu
m.e
du.m
y
![Page 3: ijms.uum.edu · studied using the protocol analysis approach. Bouwman (1982) used Bouwman (1982) used protocol analysis to identify the specific strategies and processes they](https://reader030.fdocuments.us/reader030/viewer/2022040418/5d5f745888c99370518b98dc/html5/thumbnails/3.jpg)
http
://ijm
s.uu
m.e
du.m
y
![Page 4: ijms.uum.edu · studied using the protocol analysis approach. Bouwman (1982) used Bouwman (1982) used protocol analysis to identify the specific strategies and processes they](https://reader030.fdocuments.us/reader030/viewer/2022040418/5d5f745888c99370518b98dc/html5/thumbnails/4.jpg)
http
://ijm
s.uu
m.e
du.m
y
![Page 5: ijms.uum.edu · studied using the protocol analysis approach. Bouwman (1982) used Bouwman (1982) used protocol analysis to identify the specific strategies and processes they](https://reader030.fdocuments.us/reader030/viewer/2022040418/5d5f745888c99370518b98dc/html5/thumbnails/5.jpg)
http
://ijm
s.uu
m.e
du.m
y
![Page 6: ijms.uum.edu · studied using the protocol analysis approach. Bouwman (1982) used Bouwman (1982) used protocol analysis to identify the specific strategies and processes they](https://reader030.fdocuments.us/reader030/viewer/2022040418/5d5f745888c99370518b98dc/html5/thumbnails/6.jpg)
http
://ijm
s.uu
m.e
du.m
y
![Page 7: ijms.uum.edu · studied using the protocol analysis approach. Bouwman (1982) used Bouwman (1982) used protocol analysis to identify the specific strategies and processes they](https://reader030.fdocuments.us/reader030/viewer/2022040418/5d5f745888c99370518b98dc/html5/thumbnails/7.jpg)
http
://ijm
s.uu
m.e
du.m
y
![Page 8: ijms.uum.edu · studied using the protocol analysis approach. Bouwman (1982) used Bouwman (1982) used protocol analysis to identify the specific strategies and processes they](https://reader030.fdocuments.us/reader030/viewer/2022040418/5d5f745888c99370518b98dc/html5/thumbnails/8.jpg)
http
://ijm
s.uu
m.e
du.m
y
![Page 9: ijms.uum.edu · studied using the protocol analysis approach. Bouwman (1982) used Bouwman (1982) used protocol analysis to identify the specific strategies and processes they](https://reader030.fdocuments.us/reader030/viewer/2022040418/5d5f745888c99370518b98dc/html5/thumbnails/9.jpg)
http
://ijm
s.uu
m.e
du.m
y
![Page 10: ijms.uum.edu · studied using the protocol analysis approach. Bouwman (1982) used Bouwman (1982) used protocol analysis to identify the specific strategies and processes they](https://reader030.fdocuments.us/reader030/viewer/2022040418/5d5f745888c99370518b98dc/html5/thumbnails/10.jpg)
http
://ijm
s.uu
m.e
du.m
y
![Page 11: ijms.uum.edu · studied using the protocol analysis approach. Bouwman (1982) used Bouwman (1982) used protocol analysis to identify the specific strategies and processes they](https://reader030.fdocuments.us/reader030/viewer/2022040418/5d5f745888c99370518b98dc/html5/thumbnails/11.jpg)
http
://ijm
s.uu
m.e
du.m
y
![Page 12: ijms.uum.edu · studied using the protocol analysis approach. Bouwman (1982) used Bouwman (1982) used protocol analysis to identify the specific strategies and processes they](https://reader030.fdocuments.us/reader030/viewer/2022040418/5d5f745888c99370518b98dc/html5/thumbnails/12.jpg)
http
://ijm
s.uu
m.e
du.m
y