The Web of System Performance: Extending the TAM Model
暂无分享,去创建一个
[1] Mark Fischetti,et al. Weaving the web - the original design and ultimate destiny of the World Wide Web by its inventor , 1999 .
[2] Olivia R. Liu Sheng,et al. Examining the Technology Acceptance Model Using Physician Acceptance of Telemedicine Technology , 1999, J. Manag. Inf. Syst..
[3] Leslie P. Willcocks,et al. Measuring organizational IS effectiveness: an overview and update of senior management perspectives , 2002, DATB.
[4] Steven L. Alter. A General, Yet Useful Theory of Information Systems , 1999, Commun. Assoc. Inf. Syst..
[5] John Mylopoulos,et al. Non-Functional Requirements in Software Engineering , 2000, International Series in Software Engineering.
[6] Ian Sommerville,et al. Software Engineering (7th Edition) , 2004 .
[7] William A. Wulf,et al. A practical approach to security assessment , 1998, NSPW '97.
[8] Julio Cesar Sampaio do Prado Leite,et al. Non-functional requirements: from elicitation to modelling languages , 2002, Proceedings of the 24th International Conference on Software Engineering. ICSE 2002.
[9] Richard Hackworth,et al. OECD 'Guidelines for the Security of Information Systems" , 1993, Security and Control of Information Technology in Society.
[10] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[11] Sirkka L. Jarvenpaa,et al. Information technology alignment or “fit” in highly turbulent environments: the concept of flexibility , 1994, SIGCPR '94.
[12] David Wright,et al. Towards Operational Measures of Computer Security , 1993, J. Comput. Secur..
[13] Erik Brynjolfsson,et al. The productivity paradox of information technology , 1993, CACM.
[14] Brian Whitworth,et al. The WOSP Model: Balanced Information System Design and Evaluation , 2003, Commun. Assoc. Inf. Syst..
[15] Paola Benassi,et al. TRUSTe: an online privacy seal program , 1999, CACM.
[16] Richard J. Cleary,et al. Statistical Methods for Engineers , 1999 .
[17] Louis Raymond,et al. Development of a measure to assess the quality of user-developed applications , 1997, DATB.
[18] Rolph E. Anderson,et al. Multivariate Data Analysis with Readings , 1979 .
[19] Brian Whitworth,et al. Spam and the social-technical gap , 2004, Computer.
[20] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[21] Edward Tenner,et al. Why Things Bite Back , 1997 .
[22] Melinda A. Miller,et al. Statistical Methods for Engineers , 1984, Technometrics.
[23] William E. McCarthy,et al. Agility---: the key to survival of the fittest in the software market , 2003, CACM.
[24] Erland Jonsson,et al. An integrated framework for security and dependability , 1998, NSPW '98.
[25] H. Kopetz,et al. Dependability: Basic Concepts and Terminology , 1992, Dependable Computing and Fault-Tolerant Systems.
[26] Rolph E. Anderson,et al. Multivariate data analysis (4th ed.): with readings , 1995 .
[27] Hermann Kopetz,et al. Dependability: Basic Concepts and Terminology , 1992 .
[28] A. Tversky,et al. Judgment under Uncertainty , 1982 .
[29] Bill McCarty,et al. Java Distributed Objects , 1998 .
[30] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[31] Akhilesh Bajaj,et al. A Study of Senior Information Systems Managers' Decision Models in Adopting New Computing Architectures , 2000, J. Assoc. Inf. Syst..