Остановите войну!
for scientists:
default search action
Jennie Carroll
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j6]Jennie Carroll, Blaize Horner Reich:
Technology Portfolios: How Individuals Manage Multiple Digital Technologies. Data Base 48(1): 75-92 (2017) - 2013
- [c19]Jennie Carroll, Justin Fidock:
Investigating Training Technologies in the Australian Armed Forces. ACIS 2013: 61 - 2012
- [c18]Jennie Carroll:
Experiences in Designing an Undergraduate Project Management Degree. AMCIS 2012 - 2011
- [j5]Justin Fidock, Jennie Carroll:
Why Do Users Employ the Same System in So Many Different Ways? IEEE Intell. Syst. 26(4): 32-39 (2011) - [c17]Jennie Carroll, Justin Fidock:
Beyond Resistance to Technology Appropriation. HICSS 2011: 1-9 - 2010
- [c16]Nor Zairah Ab. Rahim, Rose Alinda Alias, Jennie Carroll:
Multiple Perspectives Technology Appropriation: Analysis of Open Source Software Implementation Failure. PACIS 2010: 110 - [c15]Jenny Leonard, Jennie Carroll:
Drift and Good-Enough Control in A Complex Information Systems Infrastructure. PACIS 2010: 197
2000 – 2009
- 2008
- [j4]Nick Letch, Jennie Carroll:
Excluded again: implications of integrated e-government systems for those at the margins. Inf. Technol. People 21(3): 283-299 (2008) - [c14]Antonette Mendoza, Jennie Carroll, Linda Stern:
Influences on Continued Use of an Information System: A Longitudinal Study. ECIS 2008: 985-996 - [c13]Jennie Carroll:
Theorizing the IT Artifact for Mobility: A Portfolio, Not a Singularity. ICIS 2008: 64 - 2007
- [c12]Nick Letch, Jennie Carroll:
Integrated E-Government Systems: Unintended Impacts for those at the Margins. ECIS 2007: 2197-2208 - [c11]Jennie Carroll:
Where to Now? Generating Visions for mBusiness from the Drivers of Use. ICMB 2007: 13 - [c10]Valerie Henderson-Summet, Rebecca E. Grinter, Jennie Carroll, Thad Starner:
Electronic Communication: Themes from a Case Study of the Deaf Community. INTERACT (1) 2007: 347-360 - [c9]Rob Barrow, Jennie Carroll, Ross T. Smith, Keith Frampton:
The Application of an Information Systems Development Methodology in Practice - An Exploratory Study. PACIS 2007: 95 - 2006
- [c8]Jennie Carroll:
'What's in It for Me?': Taking M-Government to the People. Bled eConference 2006: 49 - [c7]Lois Fitz-Gerald, Jennie Carroll:
A Good Fit? Implementing Enterprise Resource Planning Systems in Loosely Coupled Organisational Systems. PACIS 2006: 43 - [c6]Keith Frampton, James A. Thom, Jennie Carroll, Bruce Crossman:
Information technology architects: approaching the longer view. CPR 2006: 221-229 - 2005
- [j3]Susan Keller, Ross T. Smith, Steve Howard, Jennie Carroll:
Altered Images: the relations between design representation and design practice. Australas. J. Inf. Syst. 12(2) (2005) - 2004
- [c5]Jennie Carroll:
Completing design in use: closing the appropriation cycle. ECIS 2004: 337-347 - 2003
- [j2]Jennie Carroll, Steve Howard, Jane Peck, John Murphy:
From Adoption to Use: the process of appropriating a mobile phone. Australas. J. Inf. Syst. 10(2) (2003) - [c4]Jennie Carroll, Daniel Tobin:
Acting out the future: a process for envisionment. ECIS 2003: 363-378 - [c3]Jennie Carroll:
The process of ISD methodology selection and use: a case study. ECIS 2003: 379-392 - [c2]Jennie Carroll, Jesper Kjeldskov, Daniel Tobin, Frank Vetere:
A User-centred Process for Determining Requirements for Mobile Technologies: the TramMate Project. PACIS 2003: 47 - 2002
- [c1]Steve Howard, Jennie Carroll, John Murphy, Jane Peck:
Using 'endowed props' in scenario-based design. NordiCHI 2002: 1-10
1990 – 1999
- 1995
- [j1]Jennie Carroll:
The application of total quality management to software development. Inf. Technol. People 8(4): 35-47 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-10-23 23:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint