Information Technology Reference
In-Depth Information
Mørch, A. (1996). Evolving a generic application into
a domain-oriented design environment. Scandinavian
Journal of Information Systems, 8 (2), 63-90.
Myspace.com. (2007). Privacy policy . Retrieved August
4, 2007, from http://www.myspace.com/Modules/Com-
mon/Pages/Privacy.aspx
Mørch, A.I. (2003). Aspect-oriented software compo-
nents. In N. Patel (Ed.), Adaptive evolutionary infor-
mation systems (pp. 105-123). Hershey, PA: Idea Group
Publishing.
Narayanan, S., & Mcllraith, S.A. (2002). Simulation,
verification and automated composition of Web services.
In Proceedings of the 11th International Conference on
World Wide Web, Honolulu, Hawaii (pp. 77-88).
Mørch, A.I., Engen, B.K., & Åsand, H.-R.H. (2004a).
The workplace as a learning laboratory: The winding
road to e-learning in a Norwegian service company. In
Proceedings of PDC 2004 (pp. 142-151).
Nardi, B. (1996). Studying context: A comparison of
activity theory, situated action models, and distributed
cognition. In B. Nardi (Ed.), Context and consciousness:
Activity theory and human-computer interaction (pp.
69-102). Cambridge, MA: MIT Press.
Mørch, A.I., Stevens, G., Won, M., Klann, M., Dittrich,
Y., & Wulf, V. (2004b). Component-based technologies
for end-user development. Communications of the ACM,
47 (9), 59-62.
Nardi, B., & Engeström, Y.A. (Guest Eds.). (1999). Web
on the wind: The structure of invisible work. Computer-
Supported Cooperative Work , 8 (1-2), 1-8.
Morgan, R., & Hunt, S. (1994). The commitment-trust
theory of relationship marketing. Journal of Marketing
Research , 29 (3), 20-38.
National Eye Institute Resource Guide. (2006). Retrieved
August 10, 2007, from http://www.nei.nih.gov/health
Nelson, R. R. (1991). Educational needs as perceived by
IS and end-user personnel: A survey of knowledge and
skill requirements. MIS Quarterly, 15 (4), 503-525.
Morris, M.G., Venkatesh, V., & Ackerman, P.L. (2005).
Gender and age differences in employee decisions about
new technology: An extension to the theory of planned
behavior. IEEE Transactions on Engineering Manage-
ment, 52 (1), 69-84.
Nelson, R. R., & Todd, P. (1999). Strategies for manag-
ing EUC on the Web. Journal of End User Computing,
11 (1), 24-31.
Moseley, O., & Whitis, R. (1995, December). Preventing
software piracy. Management Accounting , pp. 42-47.
Netteland, G., Wasson, B., & Mørch, A.I. (2007). E-
learning in a large organization: A study of the critical
role of information sharing [Special issue]. Journal of
Workplace Learning, 19 (6), 392-411.
MPAA Report. (2003). Thoughts on the digital future
of movies, the threat of piracy, the hope of redemption.
Encino, CA: Motion Picture Association of America.
Neuendorf, K. A. (2002). The content analysis guidebook .
Thousand Oaks, CA: Sage.
Mullen, B., Salas, E., & Drisekll, J. E. (1987). Salience,
motivation, and artifact as contribution to the relation
between participation rate and leadership. Journal of
Experimental Social Psychology, 25 , 809-826.
Nielsen, J. (1993). Usability engineering. San Diego,
CA: Academic Press.
Nielsen/Net Ratings. (2003). Retrieved from www.
nielsen-netratings.com.
Myers, B.A., Hudson, S.E., & Randy, P. (2003). Past,
present, and future of user interface software tools. In
J. Carroll (Ed.), Human-computer interaction in the new
millennium (pp. 213-233). New York: ACM Press.
Nijboer, J. (2004). Big brother versus anonymity on the
Internet: Implications for Internet service providers. New
Library World, 105 (7/8), 256-261.
Myers, B.A., Smith, D.C., & Horn, B. (1992). Report of
the “end-user programming” working group: Languages
for developing user interfaces (pp. 343-366). Boston:
Jones and Bartlett.
Norton, R. (2002, October). The evolving biometric
marketplace to 2006. Biometric Technology Today ,
pp. 7-8.
Search WWH ::




Custom Search