参考文献
|
-
Muhammad, A. (2006) ‘Capability maturity model for software (CMM): Business process management & quality improvement concepts', The Code Project, 11 December, http://www.codeproject.com/KB/architecture/Capability_Maturity_Model.aspx
-
McKenna, J. (2006) ‘Digital divide narrows according to the McKenna's seventh annual e-readiness rankings', Economist Intelligence Unit, 22 December, http://store.eiu.com
-
Kind, P.A. and Ferguson, J. (1997) 'The software acquisition capability maturity modelSM', Software Technology Support Center, 5 April, http://www.stsc.hill.af.mil/crosstalk/1997/03/acq_cmm.asp
-
BV2016C [Botswana Vision 2016 Council] (2004) 'Towards prosperity for all', 18 January, 2008, http://www.vision2016.co.bw
-
SEI [Software Engineering Institute] (2006) 'Appraisal requirements for CMMI, version 1.2 (ARC, V1.2)', 2 May, 2008, http://www.norauskypsi.com/06tr011.pdf
-
Blanke, J. (2007) ‘Assessing Africa's competitiveness in a global context', World Economic Forum, 21 July, http:/www.weforum.org/pdf/gcr/Africa/1.1.pdf
-
Venson, P. (2005) 'Report poor performers', Botswana Daily News, June 7, Gaborone, Botswana.
-
WITF [World Information Technology Forum] (2005) ‘The status of information and communication technology in Botswana', ICT in Botswana, 18 January, http://www.witfor.co.bw
-
ROB [Republic of Botswana] (2006) ‘Democracy, development, self-reliance and unity. BOPA', Daily News, 18 June, http://www.gov.bw/cgi-bin/news.cgi?d=20060313
-
Wikipedia (n.d.) 'Capability maturity model', 15 May, http://www.wikipedia.org/wiki/Capability_maturity_model
-
Shewhart, W.A. and Deming, W.E. (eds.) (1939) Statistical Method from the Viewpoint of Quality Control, Dover, New York.
-
Ahern, D.,Clouse, A.,Turner, R.(2001).CMMI Distilled: A Practical Introduction to Integrated Process Improvement.Boston:Addison Wesley.
-
Armstrong, J. S.,Overton, T. S.(1977).Estimating non-response bias in mail surveys.Journal of Marketing Research,14,396-402.
-
Barati, P.,Berg, D.(2003).Managing information systems for service quality: A study from the other side.Information Technology and People,16(2),183-202.
-
Capone, J. M.,Fritsch, J.,Smith, R.,Bhattacharya, S.,Palangala, S.(1998).Concepts for a network maturity model.Proceedings of 1998 IEEE Workshop,Richardson:
-
Doherty, N.,MacAulay, L.(2001).The relationship between ex ante and ex post information systems evaluation: Reflections from the literature and practice of evaluating e-commerce investments.Proceedings of the 9th European Conference on IT Evaluation,Prague:
-
Fincher, A.,Ginger, L.(1997).Project management maturity model.Project Management Institute 28th Annual Seminar,Upper Darby:
-
Gainer, J.(1998).Process improvement: The capability maturity model.itmWEB,October
-
Hartman, F.,Skulmoski, G.(1998).Project management maturity.Project Management,4(1),74-78.
-
Heeks, R.(2001).Full Final Report for Institute for Development Policy and ManagementFull Final Report for Institute for Development Policy and Management,Manchester:University of Manchester.
-
Herbsleb, J.,Zubrow, D.,Goldenson, D.,Hayes, W.,Paulk, M.(1997).Software quality and the capability maturity model.Communications of the ACM,40(6),30-40.
-
Hinks, J.(1998).A conceptual model for the interrelationship between Information Technology and facilities management process capability.Facilities,16(9/10),233-245.
-
Humphrey, W.S.(1988).Characterizing the software process: A maturity framework.IEEE Software,5(2),73-79.
-
Jung, H.-W.,Hunter, R.(2001).The relationship between ISO/IEC 15504 process capability levels and organization size: An empirical study.The Journal of Systems and Software,59,43-55.
-
Kawoski , W.(ed.)(2001).International Encyclopedia of Emgonomics and Human Factors.London:Taylor and Francis.
-
Lane, M.S.,Van Der Vyver, G.,Delpachitra, S.,Howard, S.(2004).An electronic commerce initiative in regional Sri Lanka: The vision for the central province electronic commerce portal.The Electronic Journal of Information Systems in Developing Countries,16(1),1-18.
-
Lee, G.,Xia, W.(2006).Organizational size and IT innovation adoption: A metaanalysis.Information and Management,43(8),975-985.
-
McBride, T.,Henderson-Sellers, B.,Zowghi, D.(2004).Project management capability levels: an empirical study.Proceedings of Software Engineering Conference,Sydney:
-
Murine, G. E.,Carpenter, C. L.(1984).Measuring computer system security using software security metrics.Proceedings of the 2nd IFIP International Conference on Computer Security: A Global Challenge,Toronto:
-
Mutula, S. M.(2004).Making Botswana an information society: Current developments.The Electronic Library,22(2),144-153.
-
Mutula, S. M.,Brakel, P. V.(2006).E-readiness of SMEs in the ICT sector in Botswana with respect o information access.The Electronic Library,24(3),402-417.
-
O''Brien, J. A.,Marakas, G. M.(2007).Enterprise Information Systems.Boston:McGraw-Hill International.
-
Olson, T. G.,Reizer, N. R.,Oyer, W. J.(1994).Handbook CMU/SEI-94-HB-01.Pittsburgh:Software Engineering Institute.
-
Paulk, M. C.,Curtis, B.,Chrissis, M. B.,Weber, C. V.(1993).Technical Report of the Software Engineering InstituteTechnical Report of the Software Engineering Institute,Pittsburgh, Pennsylvania:Carnegie Mellon University.
-
Ravichandram,T.,Lertwongsatien, C.(2005).Effect of information systems resources and capabilities on firm performance: A resource based perspective.Journal of Management Information Systems,21(4),237-276.
-
Remenyi, D.,White, T.,Sherwood-Smith, M.(1997).Information systems management: The need for a postmodern approach.International Journal of Information Management,17(6),421-435.
-
Remy, R.(1997).Adding focus to improvement efforts with PM3.PM Network,11(7),43-47.
-
Sackman, H.(1981).Computers in Developing Nations.Amsterdam:North-Holland.
-
Sairosse, T. M.,Mutula, S. M.(2004).Use of cybercafés: Study of Gaborone city Use of cybercafés: Study of Gaborone city, Botswana.Program: Electronic Library and Information Systems,38(1),60-66.
-
Smith, A.M.(2004).Fundamentals of the capability maturity model.The Data Administration Newsletter,May
-
Stacey, T. R.(1996).Information security program maturity grid.Information Systems Security,5(2),22-33.
-
Staples, M.,Niazi, M.,Jeffery, R.,Abrahams, A.,Byatt, P.,Murphy, R.(2006).An exploratory study of why organizations do not adopt CMM.Journal of Systems and Software,80(6),883-895.
|