Information Technology Reference
In-Depth Information
Mørch, A. (1996). Evolving a generic application into
a domain-oriented design environment.
Scandinavian
Journal of Information Systems, 8
(2), 63-90.
Myspace.com. (2007).
Privacy policy
. Retrieved August
4, 2007, from
http://www.myspace.com/Modules/Com-
mon/Pages/Privacy.aspx
Mørch, A.I. (2003). Aspect-oriented software compo-
nents. In N. Patel (Ed.),
Adaptive evolutionary infor-
mation systems
(pp. 105-123). Hershey, PA: Idea Group
Publishing.
Narayanan, S., & Mcllraith, S.A. (2002). Simulation,
verification and automated composition of Web services.
In
Proceedings of the 11th International Conference on
World Wide Web,
Honolulu, Hawaii (pp. 77-88).
Mørch, A.I., Engen, B.K., & Åsand, H.-R.H. (2004a).
The workplace as a learning laboratory: The winding
road to e-learning in a Norwegian service company. In
Proceedings of PDC 2004
(pp. 142-151).
Nardi, B. (1996). Studying context: A comparison of
activity theory, situated action models, and distributed
cognition. In B. Nardi (Ed.),
Context and consciousness:
Activity theory and human-computer interaction
(pp.
69-102). Cambridge, MA: MIT Press.
Mørch, A.I., Stevens, G., Won, M., Klann, M., Dittrich,
Y., & Wulf, V. (2004b). Component-based technologies
for end-user development.
Communications of the ACM,
47
(9), 59-62.
Nardi, B., & Engeström, Y.A. (Guest Eds.). (1999). Web
on the wind: The structure of invisible work.
Computer-
Supported Cooperative Work
,
8
(1-2), 1-8.
Morgan, R., & Hunt, S. (1994). The commitment-trust
theory of relationship marketing.
Journal of Marketing
Research
,
29
(3), 20-38.
National Eye Institute Resource Guide. (2006). Retrieved
August 10, 2007, from http://www.nei.nih.gov/health
Nelson, R. R. (1991). Educational needs as perceived by
IS and end-user personnel: A survey of knowledge and
skill requirements.
MIS Quarterly, 15
(4), 503-525.
Morris, M.G., Venkatesh, V., & Ackerman, P.L. (2005).
Gender and age differences in employee decisions about
new technology: An extension to the theory of planned
behavior.
IEEE Transactions on Engineering Manage-
ment, 52
(1), 69-84.
Nelson, R. R., & Todd, P. (1999). Strategies for manag-
ing EUC on the Web.
Journal of End User Computing,
11
(1), 24-31.
Moseley, O., & Whitis, R. (1995, December). Preventing
software piracy.
Management Accounting
, pp. 42-47.
Netteland, G., Wasson, B., & Mørch, A.I. (2007). E-
learning in a large organization: A study of the critical
role of information sharing [Special issue].
Journal of
Workplace Learning, 19
(6), 392-411.
MPAA Report. (2003). Thoughts on the digital future
of movies, the threat of piracy, the hope of redemption.
Encino, CA: Motion Picture Association of America.
Neuendorf, K. A. (2002).
The content analysis guidebook
.
Thousand Oaks, CA: Sage.
Mullen, B., Salas, E., & Drisekll, J. E. (1987). Salience,
motivation, and artifact as contribution to the relation
between participation rate and leadership.
Journal of
Experimental Social Psychology, 25
, 809-826.
Nielsen, J. (1993).
Usability engineering.
San Diego,
CA: Academic Press.
Nielsen/Net Ratings.
(2003). Retrieved from www.
nielsen-netratings.com.
Myers, B.A., Hudson, S.E., & Randy, P. (2003). Past,
present, and future of user interface software tools. In
J. Carroll (Ed.),
Human-computer interaction in the new
millennium
(pp. 213-233). New York: ACM Press.
Nijboer, J. (2004). Big brother versus anonymity on the
Internet: Implications for Internet service providers.
New
Library World, 105
(7/8), 256-261.
Myers, B.A., Smith, D.C., & Horn, B. (1992).
Report of
the “end-user programming” working group: Languages
for developing user interfaces
(pp. 343-366). Boston:
Jones and Bartlett.
Norton, R. (2002, October). The evolving biometric
marketplace to 2006.
Biometric Technology Today
,
pp. 7-8.
Search WWH ::
Custom Search