Participatory Requirements Engineering - Using Factorial Surveys to understand Users' Attitude towards Emerging Technologies
暂无分享,去创建一个
[1] Merrill Warkentin,et al. The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions , 2011, AMCIS.
[2] F. T. Cullen,et al. The Structure of Punishment Norms: Applying the Rossi-Berk Model , 1998 .
[3] Robert E. Crossler,et al. Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption , 2013, ICIS.
[4] Peter M. Steiner,et al. Experimental Vignette Studies in Survey Research , 2010 .
[5] Frank E. Ritter,et al. Foundations for Designing User-Centered Systems , 2014, Springer London.
[6] S. Sorenson,et al. Shared Decision Making for Clients With Mental Illness , 2013 .
[7] D. Schwappach,et al. What makes an error unacceptable? A factorial survey on the disclosure of medical errors. , 2004, International journal for quality in health care : journal of the International Society for Quality in Health Care.
[8] F. Caro,et al. Implications of Changing Social Norms for Social Security Benefits: Results of Pilot Research , 2004 .
[9] P. Baker. Ageism, Sex, and Age: A Factorial Survey Approach , 1983, Canadian Journal on Aging / La Revue canadienne du vieillissement.
[10] Georgeanne M. Artz. Rural Area Brain Drain: Is It a Reality? , 2003 .
[11] Theresa A. Pardo,et al. Conceptualizing smart city with dimensions of technology, people, and institutions , 2011, dg.o '11.
[12] Lemuria Carter,et al. Dispositional and situational factors: influences on information security policy violations , 2016, Eur. J. Inf. Syst..
[13] Guillermina Jasso,et al. Measuring household social standing , 1974 .
[14] Lemuria Carter,et al. The Role of Individual Characteristics on Insider Abuse Intentions , 2012, AMCIS.
[15] J. Preece,et al. User-Centered Design , 2004 .
[16] Henri Barki,et al. Coping with Information Privacy Breaches: An Exploratory Framework , 2016, ICIS.
[18] Michael J. Campbell,et al. Statistics at Square One , 1976, British medical journal.
[19] Ken Eason,et al. Information technology and organisational change , 1988 .
[20] Darryl R. Hickman. Judgments of the short-term and long-term effects of conflict episodes on relationship cohesion. , 1984 .
[21] Paul Benjamin Lowry,et al. Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations , 2015, MIS Q..