-
1
-
-
0346085299
-
A general, yet useful theory of information systems
-
Alter, S. (1999) A general, yet useful theory of information systems, Communications oftheAIS, 1, 13.
-
(1999)
Communications OftheAIS
, vol.1
, pp. 13
-
-
Alter, S.1
-
2
-
-
0006372914
-
A study of senior information systems manager's decision models in adopting new computing architectures
-
Bajaj, A. (2000) A study of senior information systems manager's decision models in adopting new computing architectures, Journal of The Association of Information Systems, 1, 4.
-
(2000)
Journal of the Association of Information Systems
, vol.1
, pp. 4
-
-
Bajaj, A.1
-
3
-
-
0002587094
-
TRUSTe: An online privacy seal program
-
Benassi, P. (1999). TRUSTe: An online privacy seal program, Communications oftheACM, 42, 2, 56-59.
-
(1999)
Communications OftheACM
, vol.42
, Issue.2
, pp. 56-59
-
-
Benassi, P.1
-
5
-
-
0027883457
-
The productivity paradox of information technology
-
Brynjolfsson, E. (1993) The productivity paradox of information technology, Communicatioins of the ACM, 36, 12, 67-77.
-
(1993)
Communicatioins of the ACM
, vol.36
, Issue.12
, pp. 67-77
-
-
Brynjolfsson, E.1
-
6
-
-
0003696305
-
-
Kluwer Academic Publishers, Boston
-
Chung, L., Nixon, B. A., Yu, E. and Mylopoulos, J. (1999) Non-functional requirements in software engineering, Kluwer Academic Publishers, Boston.
-
(1999)
Non-functional Requirements In Software Engineering
-
-
Chung, L.1
Nixon, B.A.2
Yu, E.3
Mylopoulos, J.4
-
7
-
-
0036041894
-
Non-functional requirements: From elicitation to modeling languages
-
Cysneiros, L. M. and Leita, J. (2002), Non-functional requirements: from elicitation to modeling languages, Proceedings of the 24th ICSE, 699-700
-
(2002)
Proceedings of the 24th ICSE
, pp. 699-700
-
-
Cysneiros, L.M.1
Leita, J.2
-
8
-
-
0038442900
-
Agility - The key to survival of the fittest
-
David, J. S., McCarthy, W. E., & Sommer, B. S. (2003). Agility - The key to survival of the fittest, Communications of theACM, 46(5), 65-69.
-
(2003)
Communications of TheACM
, vol.46
, Issue.5
, pp. 65-69
-
-
David, J.S.1
McCarthy, W.E.2
Sommer, B.S.3
-
9
-
-
84869778858
-
-
Dept. of Defence, Trusted computer system evaluation criteria, No. DOD 5200.28. STD
-
Dept. of Defence (1985) Trusted computer system evaluation criteria, No. DOD 5200.28. STD.
-
(1985)
-
-
-
10
-
-
84869844598
-
-
European Commission, Information technology security evaluation criteria (ITSEC), Provisional Harmonized Criteria, ISBN 92-826-7024-4
-
European Commission (1993) Information technology security evaluation criteria (ITSEC), Provisional Harmonized Criteria, ISBN 92-826-7024-4.
-
(1993)
-
-
-
11
-
-
84869795215
-
-
Multivariate data analysis with readings, Prentice-Hall
-
Hair, J. F., Anderson, R. E., Tatham, R. L. and Black, W. C. (1995) Multivariate data analysis with readings, Prentice-Hall.
-
(1995)
-
-
Hair, J.F.1
Anderson, R.E.2
Tatham, R.L.3
Black, W.4
-
12
-
-
0033277433
-
Examining the technology acceptance model using physician acceptance of telemedicine
-
Hu, P. J., Chau, P. Y. K., Sheng, O. R. L. and Tam, K. Y. (1999) Examining the technology acceptance model using physician acceptance of telemedicine, Journal of Management Information Systems, 16, 2, 91-112.
-
(1999)
Journal of Management Information Systems
, vol.16
, Issue.2
, pp. 91-112
-
-
Hu, P.J.1
Chau, P.Y.K.2
Sheng, O.R.L.3
Tam, K.Y.4
-
13
-
-
84884727787
-
An integrated framework for security and dependability
-
Jonsson, E. (1998) An integrated framework for security and dependability, Proceedings of the 1998 NSPW, 22-29.
-
(1998)
Proceedings of the 1998 NSPW
, pp. 22-29
-
-
Jonsson, E.1
-
14
-
-
0003768818
-
-
Cambridge University Press, New York
-
Kahneman, D., Slovic, P. and Tversky, A. (1982) Judgment under uncertainty, Cambridge University Press, New York.
-
(1982)
Judgment Under Uncertainty
-
-
Kahneman, D.1
Slovic, P.2
Tversky, A.3
-
16
-
-
0028121915
-
Information technology alignment or fit in highly turbulent environments: The concept of flexibility
-
Knoll, K., & Jarvenpaa, S. L. (1994) Information technology alignment or fit in highly turbulent environments: The concept of flexibility, L{cyrillic} CM SIGCPR 94, 1-14
-
(1994)
L{cyrillic} CM SIGCPR
, vol.94
, pp. 1-14
-
-
Knoll, K.1
Jarvenpaa, S.L.2
-
17
-
-
0003414571
-
-
Springer-Verlag New York, Secaucus, NJ
-
Avizienis, A., Kopetz, H., Laprie, J. C. (1992) Dependability: Basic concepts and terminology, Springer-Verlag New York, Secaucus, NJ, 5.
-
(1992)
Dependability: Basic Concepts and Terminology
, pp. 5
-
-
Avizienis, A.1
Kopetz, H.2
Laprie, J.C.3
-
18
-
-
84974774507
-
Towards Operational Measures of Computer Security
-
Littlewood, B., Brockhurst, S., Fenton, N., Mellor, P., Page, S., Wright, D., Dobson, J., McDermid, J., & Gollman, D. (1993). Towards Operational Measures of Computer Security, Journal of Computer Security, 2(3), 211-229.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.3
, pp. 211-229
-
-
Littlewood, B.1
Brockhurst, S.2
Fenton, N.3
Mellor, P.4
Page, S.5
Wright, D.6
Dobson, J.7
McDermid, J.8
Gollman, D.9
-
19
-
-
84869795214
-
-
Java Distributed Objects: The Authoritative Solution, Sams, Indianapolis
-
McCarty, B., &Cassady-Dorion, L. (1999). Java Distributed Objects: The Authoritative Solution, Sams, Indianapolis.
-
(1999)
-
-
McCarty, B.1
Cassady-Dorion, L.2
-
20
-
-
85009906652
-
Guidelines for the Security of Information Systems
-
OECD, Paris, France
-
OECD (1996) Guidelines for the Security of Information Systems, OECD, Paris, France.
-
(1996)
OECD
-
-
-
21
-
-
0041990699
-
Development of a measure to assess the quality of user-developed applications
-
Rivard, S., Poirier, G., Raymond, L. and Bergeron, F. (1997) Development of a measure to assess the quality of user-developed applications, CMSIGMISDatabase, 28, 3, 44-58.
-
(1997)
CMSIGMISDatabase
, vol.28
, Issue.3
, pp. 44-58
-
-
Rivard, S.1
Poirier, G.2
Raymond, L.3
Bergeron, F.4
-
22
-
-
0038515826
-
Measuring organizational is effectiveness an overview and update of senior management perspectives
-
Seddon, P. B., Graeser, V. and Willcocks, L. P. (2002) Measuring organizational is effectiveness an overview and update of senior management perspectives, A CM SIGMIS Database, 33, 2, 11-18.
-
(2002)
A CM SIGMIS Database
, vol.33
, Issue.2
, pp. 11-18
-
-
Seddon, P.B.1
Graeser, V.2
Willcocks, L.P.3
-
23
-
-
0003885423
-
-
7th ed.), Pearson Education, Harlow, UK
-
Sommerville, I. (2004) Software Engineering (7th ed.), Pearson Education, Harlow, UK.
-
(2004)
Software Engineering
-
-
Sommerville, I.1
-
24
-
-
73549120882
-
Understanding information technology usage: A test of competing models
-
Taylor, S. and Todd, P. A. (1995) Understanding information technology usage: A test of competing models, Information Systems Research, 6,2, 144-176.
-
(1995)
Information Systems Research
, vol.6
, Issue.2
, pp. 144-176
-
-
Taylor, S.1
Todd, P.A.2
-
25
-
-
84869741677
-
-
Why Things Bite Back. New York, Vintage Books, Random House
-
Tenner, E. (1997). Why Things Bite Back. New York, Vintage Books, Random House.
-
(1997)
-
-
Tenner, E.1
-
26
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
Venkatesh, V, Morris, M. G., Davis, G. B. and Davis, F. D. (2003) User acceptance of information technology: Toward a unified view, MIS Quarterly, 27, 3, 425-478
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
-
30
-
-
7244254280
-
Reducing spam by closing the social-technical gap
-
October
-
Whitworth, B., & Whitworth, E. (2004). Reducing spam by closing the social-technical gap IEEE Computer, October, 38-45.
-
(2004)
IEEE Computer
, pp. 38-45
-
-
Whitworth, B.1
Whitworth, E.2
|