The WOSP Model: Balanced Information System Design and Evaluation
暂无分享,去创建一个
[1] Brian Whitworth,et al. Measuring disagreement in groups facing limited-choice problems , 1999, DATB.
[2] Steven L. Alter. Which Life Cycle - Work System, Information System, or Software? , 2001, Commun. Assoc. Inf. Syst..
[3] Chris W. Clegg,et al. Software development: Some critical views , 1997, Behav. Inf. Technol..
[4] J. Casti. Would-Be Worlds: How Simulation Is Changing the Frontiers of Science , 1996 .
[5] Brian A. Nixon,et al. Managing performance requirements for information systems , 1998, WOSP '98.
[6] Edward Tenner,et al. Why Things Bite Back , 1997 .
[7] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[8] Julio Cesar Sampaio do Prado Leite,et al. Non-functional requirements: from elicitation to modelling languages , 2002, Proceedings of the 24th International Conference on Software Engineering. ICSE 2002.
[9] Nils J. Nilsson,et al. Artificial Intelligence , 1974, IFIP Congress.
[10] Marie A. Wright,et al. The erosion of privacy , 1997, CSOC.
[11] David J. DeWitt,et al. Benchmarking Database Systems A Systematic Approach , 1983, VLDB.
[12] J. Moor. What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.
[13] K. Popper,et al. The Open Society and Its Enemies , 1946 .
[14] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[15] Sara Kiesler,et al. Social psychological aspects of computer-mediated communication , 1984 .
[16] David Wright,et al. Towards Operational Measures of Computer Security , 1993, J. Comput. Secur..
[17] Omar El Sawy,et al. Toward the Design of Robust Information Systems , 1989, J. Manag. Inf. Syst..
[18] P. Agre,et al. Technology and privacy: The new landscape , 1998 .
[19] Heather A. Smith,et al. New Developments in Practice III: Riding the Wave: Extracting Value from Mobile Technology , 2002, Commun. Assoc. Inf. Syst..
[20] Steven L. Alter. A General, Yet Useful Theory of Information Systems , 1999, Commun. Assoc. Inf. Syst..
[21] John Mylopoulos,et al. Non-Functional Requirements in Software Engineering , 2000, International Series in Software Engineering.
[22] Gregory Tassey,et al. Prepared for what , 2007 .
[23] Richard Hackworth,et al. OECD 'Guidelines for the Security of Information Systems" , 1993, Security and Control of Information Technology in Society.
[24] David A. Duce,et al. Systems, interactions, and macrotheory , 2000, TCHI.
[25] Juliet B. Schor,et al. The Overworked American: The Unexpected Decline Of Leisure , 1991 .
[26] R. McQueen,et al. A Cognitive Three-Process Model of Computer-Mediated Group Interaction , 2000 .
[27] George R. Ribeiro-Justo,et al. A framework for building non-functional software architectures , 2001, SAC.
[28] E. C. Pielou,et al. An introduction to mathematical ecology , 1970 .
[29] Paul Dickson. The official rules and explanations , 1980 .
[30] David A. Fisher,et al. Survivability—a new technical and business perspective on security , 1999, NSPW '99.
[31] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[32] Walid G. Aref,et al. Security models for web-based applications , 2001, CACM.
[33] William E. McCarthy,et al. Agility---: the key to survival of the fittest in the software market , 2003, CACM.
[34] Willis H. Ware,et al. Information systems security and privacy , 1984, CACM.
[35] David Brin,et al. The Transparent Society , 1998 .
[36] Nathaniel S. Borenstein,et al. Power, Ease of Use and Cooperative Work in a Practical Multimedia Message System , 1991, Int. J. Man Mach. Stud..
[37] K. L. Wheatley,et al. The pitfalls of portability . . or . . why more is not better , 1991, Proceedings of the Twenty-Fourth Annual Hawaii International Conference on System Sciences.
[38] Deborah Hix,et al. Human-computer interface development tools: a methodology for their evaluation , 1991, CACM.
[39] Sirkka L. Jarvenpaa,et al. Information technology alignment or “fit” in highly turbulent environments: the concept of flexibility , 1994, SIGCPR '94.
[40] K. Boulding. General Systems Theory---The Skeleton of Science , 1956 .
[41] M. Lea,et al. Rationalist assumptions in cross-media comparisons of computer-mediated communication. , 1991 .
[42] Erland Jonsson,et al. An integrated framework for security and dependability , 1998, NSPW '98.
[43] Karl R. Popper,et al. The Open Society and Its Enemies , 1946 .
[44] Nancy C. Goodwin,et al. Functionality and usability , 1987, CACM.
[45] William A. Wulf,et al. A practical approach to security assessment , 1998, NSPW '97.
[46] Mark S. Sanders,et al. Human Factors in Engineering and Design , 1957 .
[47] Ivo Düntsch,et al. The IsoMetrics usability inventory: An operationalization of ISO 9241-10 supporting summative and formative evaluation of software systems , 1999, Behav. Inf. Technol..
[48] Brian Whitworth,et al. Generating Agreement in Computer-Mediated Groups , 2001 .
[49] António Dias de Figueiredo,et al. Programming for Serendipity , 2002 .
[50] Jakob Nielsen,et al. Usability engineering , 1997, The Computer Science and Engineering Handbook.
[51] Mark Fischetti,et al. Weaving the web - the original design and ultimate destiny of the World Wide Web by its inventor , 1999 .
[52] Lauren Ruth Wiener. Digital woes - why we should not depend on software , 1993 .
[53] F. Darley,et al. Brain Mechanisms Underlying Speech and Language , 1967 .
[54] Alan R. Dennis,et al. Rethinking media richness: towards a theory of media synchronicity , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.
[55] H. Maturana. The tree of knowledge , 1987 .
[56] Tom Brier,et al. Communications of the Association for Information Systems , 1999 .
[57] João Araújo,et al. Crosscutting quality attributes for requirements engineering , 2002, SEKE '02.
[58] E. C. Pielou. An introduction to mathematical ecology , 1970 .
[59] R. Wright. Nonzero: The Logic of Human Destiny , 1999 .
[60] Abraham Bernstein,et al. Software infrastructure and design challenges for ubiquitous computing applications , 2002, CACM.
[61] H. Nissenbaum. Toward an Approach to Privacy in Public: Challenges of Information Technology , 1997 .
[62] M Esfeld,et al. Holism and analytic philosophy , 1998 .
[63] Tom Standage. The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century's On-line Pioneers , 1998 .
[64] Eugene H. Spafford,et al. The Power of Standards , 1993 .
[65] Herbert H. Blumberg,et al. Small Groups and Social Interaction , 1983 .
[66] C. West Churchman,et al. The Systems Approach , 1979 .
[67] Catherine A. Meadows. Three paradigms in computer security , 1998, NSPW '97.
[68] B. Alberts,et al. Molecular Biology of the Cell, Third Edition , 1994 .
[69] Brian Whitworth,et al. Legitimate by design: towards trusted virtual community environments , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[70] Paola Benassi,et al. TRUSTe: an online privacy seal program , 1999, CACM.
[71] J. Davies,et al. Molecular Biology of the Cell , 1983, Bristol Medico-Chirurgical Journal.
[72] Ilze Zigurs,et al. A test of task-technology fit theory for group support systems , 1999, DATB.
[73] Lotfi A. Zadeh,et al. General System Theory , 1962 .
[74] Thomas Herrmann,et al. Vagueness in models of socio-technical systems , 1999, Behav. Inf. Technol..
[75] Bill McCarty,et al. Java Distributed Objects , 1998 .
[76] Susan M. Dray. The importance of designing usable systems , 1995, INTR.
[77] Peter G. Neumann,et al. Risks in our information infrastructures , 2000, UBIQ.