ASSURING HOMELAND SECURITY : CONTINUOUS MONITORING , CONTROL & ASSURANCE OF EMERGENCY PREPAREDNESS
暂无分享,去创建一个
Miklos A. Vasarhelyi | Alexander Kogan | Murray Turoff | Michael Chumer | Starr Roxanne Hiltz | Michael Alles | Robert M. Klashner | R. Hiltz | Michael J. Chumer | Robb Klashner | Murray Turoff | Michael Alles | Miklos Vasarhelyi | Alexander Kogan | Michael Alles | Miklos A. Vasarhelyi | Alexander Kogan | Murray Turoff | Michael Alles | Alexander Kogan
[1] Wendy A. Kellogg,et al. Socially translucent systems: social proxies, persistent conversation, and the design of “babble” , 1999, CHI '99.
[2] Walt Scacchi,et al. Process Life Cycle Engineering: A Knowledge-Based Approach and Environment , 1997, Intell. Syst. Account. Finance Manag..
[3] Bartel Van de Walle,et al. The role of experts in decision making upon urgent countermeasures in nuclear emergency situations , 1999 .
[4] Judy E. Scott,et al. Managing risks in enterprise systems implementations , 2002, CACM.
[5] Starr Roxanne Hiltz,et al. Network Nation: Human Communication Via Computer , 1979 .
[6] BARTEL VAN DE WALLE,et al. TOWARDS GROUP AGREEMENT : THE SIGNIFICANCE OF PREFERENCE ANALYSIS , 2001 .
[7] Leon J. Osterweil,et al. Software processes are software too , 1987, ISPW.
[8] Murray Turoff,et al. Computer‐mediated communication requirements for group support , 1991 .
[9] Ben Shneiderman,et al. Book Reviews : Online Communities: A Case Study of the Office of the Future , 1984 .
[10] Murray Turoff,et al. Past and future emergency response information systems , 2002, CACM.
[11] Omar El Sawy,et al. Building an Information System Design Theory for Vigilant EIS , 1992, Inf. Syst. Res..
[12] Joanne E. Hale,et al. A Layered Communication Architecture for the Support of Crisis Response , 1997, J. Manag. Inf. Syst..
[13] Christian Robottom Reis,et al. An Overview of the Software Engineering Process and Tools in the Mozilla Project , 2002 .
[14] Herbert Snyder,et al. The Network Nation: Human Communication Via Computer , 1995 .
[15] S. R. Hiltz. The Network Nation , 1978 .
[16] Starr Roxanne Hiltz,et al. Social Decision Support Systems (SDSS) , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[17] Bartel Van de Walle,et al. A relational analysis of decision makers' preferences , 2003, Int. J. Intell. Syst..
[18] Walt Scacchi,et al. Supporting Software Development in Virtual Enterprises , 2006, J. Digit. Inf..
[19] Walt Scacchi,et al. Process modeling across the web information infrastructure , 2005, Softw. Process. Improv. Pract..
[20] Leon J. Osterweil,et al. A Process-Object Centered View of Software Environment Architecture , 1986, Advanced Programming Environments.
[21] Mac Nason,et al. Learning together online: Research on asynchronous learning networks , 2006, Education and Information Technologies.
[22] G. Anthony Gorry,et al. Creating a knowledge-sharing community: if you build it, will they come? , 2003, CACM.
[23] Walt Scacchi. Understanding software process redesign using modeling, analysis and simulation , 2000 .
[24] Abbe Mowshowitz,et al. On the theory of virtual organization , 1997 .
[25] Robert M. Hayes,et al. Systems analysis and design , 1970, ACM '70.
[26] Steve Howard,et al. Methods & tools: the rich picture: a tool for reasoning about work context , 1998, INTR.
[27] Starr Roxanne Hiltz,et al. What makes learning networks effective? , 2002, CACM.
[28] Martin Fowler,et al. Planning Extreme Programming , 2000 .
[29] Kalle Lyytinen,et al. Identifying Software Project Risks: An International Delphi Study , 2001, J. Manag. Inf. Syst..
[30] Ken Peffers,et al. How to identify new high-payoff information systems for the organization , 2003, CACM.
[31] Paul Clements,et al. Software architecture in practice , 1999, SEI series in software engineering.
[32] Barry M. Staw,et al. Threat-rigidity effects in organizational behavior: A multilevel analysis. , 1981 .
[33] Leon J. Osterweil,et al. Understanding process and the quest for deeper questions in software engineering research , 2003, ESEC/FSE-11.
[34] H. A. Lingstone,et al. The Delphi Method: Techniques and Applications , 1976 .
[35] Andreas Girgensohn,et al. Making web sites be places for social interaction , 2002, CSCW '02.
[36] Walt Scacchi,et al. Modeling and simulating software acquisition process architectures , 2001, J. Syst. Softw..
[37] Yi Zhang,et al. Modeling usage of an online research community , 2004 .
[38] Abbe Mowshowitz,et al. Virtual organization: toward a theory of societal transformation stimulated by information technology , 2003, UBIQ.
[39] Catherine Brunner. More than an Ounce of Prevention , 1965 .
[40] Russell R. Dynes,et al. Organizational Communications and Decision Making in Crises , 1976 .
[41] J. Horsley,et al. Toward a Synthesis Model for Crisis Communication in the Public Sector , 2002 .
[42] Katherine Schipper,et al. Discussion of "Opportunities for assurance services in the 21st century: A progress report of the Special Committee on Assurance Services:; , 1996 .
[43] Miklos A. Vasarhelyi,et al. Principles of Analytic Monitoring for Continuous Assurance , 2004 .
[44] Delvin Grant,et al. A wider view of business process reengineering , 2002, CACM.
[45] Starr Roxanne Hiltz,et al. Distributed Group Support Systems , 1993, MIS Q..
[46] Xiang Yao,et al. The Design of a Dynamic Emergency Response Management Information System (DERMIS) , 2004 .
[47] P. Asmus,et al. Reinventing Electric Utilities: Competition, Citizen Action, and Clean Power , 1996 .
[48] Starr Roxanne Hiltz,et al. Structuring computer-mediated communication systems to avoid information overload , 1985, CACM.
[49] Miklos A. Vasarhelyi,et al. Feasibility and Economics of Continuous Assurance , 2002 .
[50] Fiona Fui-Hoon Nah,et al. Critical factors for successful implementation of enterprise systems , 2001, Bus. Process. Manag. J..