Chapter 2. References

Alberts, B., Bray, D., Lewis, J., Raff, M., Roberts, K., & Watson, J. D.. (1994). Molecular Biology of the Cell. 3rd Edition. New York: Garland Publishing Inc,

Alexander, C. (1964). Notes on the Synthesis of Form. Cambridge, Ma: Harvard University Press.

Alter, S., “A general, yet useful theory of information systems,” Communications of the AIS, 1, March, pp. 13–60.

Berners-Lee, T. (2000) Weaving The Web: The original design and ultimate destiny of the world wide web. New York: Harper-Collins.

Borenstein, N. S. & Thyberg, C.A. (1991). “Power, ease of use and cooperative work in a practical multimedia message system,” International Journal of Man-Machine Studies. 34, (2), pp. 229–259.

Campbell-Kelly, M. (2008). “Will the Future of Software be Open Source?,” Communications of the ACM. 51, (10). pp. 21–23.

Chung, L., Nixon, B. A., Yu, E., & Mylopoulos, J. (1999). Non-functional requirements in Software Engineering. Boston: Kluwer Academic.

Cysneiros, L. M., & Leite, J. (2002). Non-functional requirements: From elicitation to modeling languages. Paper presented at the International Conference on Software Engineering 2002, Orlando, Florida.

David, J. S., McCarthy, W.E., & Sommer, B. S. (2003). “Agility – The key to survival of the fittest,” Communications of the ACM, 46, (5) pp. 65–69.

De Simone, M., & Kazman, R. (1995). Software Architectural Analysis: An Experience Report. In Proceedings of CASCON’95, (pp. 251–261).Toronto, ON.

Esfeld, M. (1998). “Holism and Analytic Philosophy,” Mind, 107, pp. 365–380.

Gargaro, A., Rada, R., Moore, J., Carson, G.S., DeBlasi, J., Emery, D., Haynes, C,. Klensin, J., Montanez, I., & Spafford, E. (1993). “The Power of Standards.” Communications of the ACM, 36, (8), pp. 11–12.

Gediga, G., Hamborg, K. & Duntsc, I. (1999). “The IsoMetrics usability inventory: an operationalization of ISO9241-10 supporting summative and formative evaluation of software systems,” Behaviour & Information Technology. 18, (3), pp. 151–164.

Golden, L., & Figart, D. M.. (2000). Working Time: International Trends, Theory and Policy Perspectives. London and New York: Routledge.

Jonsson, E. (1998). An integrated framework for security and dependability. In Proceedings of New Security Paradigms Workshop (NSPW) (pp. 22-29). Charlottesville, VA, USA.

Keeney, R. L., &. Raiffa, H. (1976). Decisions with multiple objectives: Preferences and Value Tradeoffs. New York: Wiley.

Kienzle, D. M., & Wulf, W. A. (1997). A practical approach to security assessment. In Proceedings of New Security Paradigms Workshop (NSPW) (pp. 5–16). Langdale, Cumbria, U.K.

Knoll, K., & Jarvenpaa, S. L. (1994). Information technology alignment or ‘fit’ in highly turbulent environments: The concept of flexibility. In Proceedings of the 1994 ACM SIGCPR Conference, Alexandria, Virginia, USA.

Laprie, J. C., & Costes, A. (1982). Dependability: A unifying concept for reliable computing. In Proceedings of 12th International Symposium on Fault-Tolerant Computing, FTCS-12. (pp. 18–21).

Lindquist, C. (2005). “Fixing the requirements mess,” CIO, Nov 15, 2005. pp. 53–66.

Lorenz, E. N. (1963). “Deterministic nonperiodic flow,” Journal of the Atmospheric Sciences. 20, pp. 130–141.

Losavio, F., Chirinos, L., Mateo, A., Levy, N., & Ramdane-Cherif, A. (2004) “Designing quality architecture: incorporating ISO standards into the unified process,” Information Systems Management. 21, (1), pp. 27 – 44.

Moreira, A., Araujo, J., & Brita, I. (2002). Crosscutting quality attributes for requirements engineering. In Proceedings of the 14th International Conference on Software Engineering and Knowledge Engineering (SEKE). Ischia, Italy.

Nuseibeh, B., & Easterbrook, S. (2000). “Requirements Engineering: A roadmap.” In Finkelstein, A. (ed.), The Future of Software Engineering. Limerick, Ireland: ACM Press.

Organisation for Economic Cooperation and Development. (1996). Guidelines for the Security of Information Systems. OECD.

Pinto, J. K. (2002). “Project Management 2002.” Research Technology Management. 45, (2), pp. 22–37.

Regan, P. (1995). Legislating privacy, technology, social values and public policy. Chapel Hill, NC: University of North Carolina Press.

Rosa, N. S., Justo, G. R. R. & Cunha P. R. F. (2001). A Framework for Building Non-Functional Software Architectures. Paper presented at the 2001 Symposium on Applied Computing (SAC 2001), Las Vegas, NV.

Sanai, H. (1968). The Enclosed Garden of Truth. New York: Samuel Weiser.

Smith, H. A., Kulatilaka, N. & Venkatramen, N. (2002). “Developments in IS practice III: Riding the wave: extracting value from mobile technology,” Communications of Association of Information Systems, 8, pp. 467–481.

Sommerville, I. (2004) Software Engineering, 7th edition. Boston, MA: Addison-Wesley.

Tenner, E. (1997). Why Things Bite Back. New York: Vintage Books, Random House.

Toffler, A. (1980). The Third Wave. New York: Bantam Books.

Whitworth, B., Banuls, V., Sylla, C., & Mahinda, E. (2008). “Expanding the Criteria for Evaluating Socio-technical Software”. IEEE Transactions on Systems, Man and Cybernetics, Part A, 38, (4), pp. 777 – 790.