default search action
Jennie Carroll
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j6]Jennie Carroll, Blaize Horner Reich:
Technology Portfolios: How Individuals Manage Multiple Digital Technologies. Data Base 48(1): 75-92 (2017) - 2013
- [c38]Jennie Carroll, Justin Fidock:
Investigating Training Technologies in the Australian Armed Forces. ACIS 2013: 61 - 2012
- [c37]Jennie Carroll, Justin Fidock:
'Re-composing the Elephant': Bringing the Big Picture back into IS Research. ACIS 2012 - [c36]Jennie Carroll:
Experiences in Designing an Undergraduate Project Management Degree. AMCIS 2012 - 2011
- [j5]Justin Fidock, Jennie Carroll:
Why Do Users Employ the Same System in So Many Different Ways? IEEE Intell. Syst. 26(4): 32-39 (2011) - [c35]Jennie Carroll, Justin Fidock:
Beyond Resistance to Technology Appropriation. HICSS 2011: 1-9 - 2010
- [c34]Antonette Mendoza, Linda Stern, Jennie Carroll:
Support Mechanisms for Early, Medium and Longer-Term Use of Technologies. ACIS 2010 - [c33]Nor Zairah Ab. Rahim, Rose Alinda Alias, Jennie Carroll:
Multiple Perspectives Technology Appropriation: Analysis of Open Source Software Implementation Failure. PACIS 2010: 110 - [c32]Jenny Leonard, Jennie Carroll:
Drift and Good-Enough Control in A Complex Information Systems Infrastructure. PACIS 2010: 197
2000 – 2009
- 2009
- [c31]Rob Barrow, Jennie Carroll, Ross Smith:
Towards An Integrated Model Of ISDM Tailoring. ACIS 2009 - [c30]Jennie Carroll:
Reconciling the Tensions Between Innovation and the Process Focus in Information Systems Project Management. ACIS 2009 - [c29]Justin Fidock, Jennie Carroll:
Combining Variance and Process Research Approaches to Understand System Use. ACIS 2009 - [c28]Susan Keller, Jennie Carroll:
The Social Role of Design Representation. ACIS 2009 - 2008
- [j4]Nick Letch, Jennie Carroll:
Excluded again: implications of integrated e-government systems for those at the margins. Inf. Technol. People 21(3): 283-299 (2008) - [c27]Nick Letch, Jennie Carroll:
Towards Anticipating IS Consequences: An Anatomy of Sociotechnical Interaction Networks (STINs). ACIS 2008 - [c26]Antonette Mendoza, Jennie Carroll, Linda Stern:
Influences on Continued Use of an Information System: A Longitudinal Study. ECIS 2008: 985-996 - [c25]Jennie Carroll:
Theorizing the IT Artifact for Mobility: A Portfolio, Not a Singularity. ICIS 2008: 64 - 2007
- [c24]Antonette Mendoza, Linda Stern, Jennie Carroll:
Plateaus in Long-term Appropriation of an Information System. ACIS 2007 - [c23]Nick Letch, Jennie Carroll:
Integrated E-Government Systems: Unintended Impacts for those at the Margins. ECIS 2007: 2197-2208 - [c22]Jennie Carroll:
Where to Now? Generating Visions for mBusiness from the Drivers of Use. ICMB 2007: 13 - [c21]Valerie Henderson-Summet, Rebecca E. Grinter, Jennie Carroll, Thad Starner:
Electronic Communication: Themes from a Case Study of the Deaf Community. INTERACT (1) 2007: 347-360 - [c20]Rob Barrow, Jennie Carroll, Ross T. Smith, Keith Frampton:
The Application of an Information Systems Development Methodology in Practice - An Exploratory Study. PACIS 2007: 95 - 2006
- [c19]Justin Fidock, Jennie Carroll:
The model of technology appropriation: A lens for understanding systems integration in a Defence context. ACIS 2006 - [c18]Keith Frampton, James A. Thom, Jennie Carroll:
Enhancing IT Architect capabilities: Experiences within a university subject. ACIS 2006 - [c17]Jennie Carroll:
'What's in It for Me?': Taking M-Government to the People. Bled eConference 2006: 49 - [c16]Lois Fitz-Gerald, Jennie Carroll:
A Good Fit? Implementing Enterprise Resource Planning Systems in Loosely Coupled Organisational Systems. PACIS 2006: 43 - [c15]Keith Frampton, James A. Thom, Jennie Carroll, Bruce Crossman:
Information technology architects: approaching the longer view. CPR 2006: 221-229 - 2005
- [j3]Susan Keller, Ross T. Smith, Steve Howard, Jennie Carroll:
Altered Images: the relations between design representation and design practice. Australas. J. Inf. Syst. 12(2) (2005) - [c14]Cheryl Calvert, Jennie Carroll:
Training for ERP: Does the IS Training Literature Have Value? ACIS 2005 - [c13]Jennie Carroll:
Technology Portfolios: A Metaphor For Users' Technology Selections While Mobile? ACIS 2005 - [c12]Jennie Carroll, Lois Fitz-Gerald:
Beyond an IT Project: Governance in ERP-driven Business Transformation. ACIS 2005 - [c11]Jennie Carroll, Antonette Mendoza, Linda Stern:
Adoption, adaptation, stabilization and stagnation: software appropriation over time. ACIS 2005 - 2004
- [c10]Jennie Carroll:
Acting Out in Context: Envisioning Users' Needs while Mobile. ACIS 2004 - [c9]Susan Keller, Ross T. Smith, Steve Howard, Jennie Carroll:
Altered images: the relations between design representations and design practice. ACIS 2004 - [c8]Jennie Carroll:
Completing design in use: closing the appropriation cycle. ECIS 2004: 337-347 - 2003
- [j2]Jennie Carroll, Steve Howard, Jane Peck, John Murphy:
From Adoption to Use: the process of appropriating a mobile phone. Australas. J. Inf. Syst. 10(2) (2003) - [c7]Jennie Carroll, Daniel Tobin:
Acting out the future: a process for envisionment. ECIS 2003: 363-378 - [c6]Jennie Carroll:
The process of ISD methodology selection and use: a case study. ECIS 2003: 379-392 - [c5]Jennie Carroll, Jesper Kjeldskov, Daniel Tobin, Frank Vetere:
A User-centred Process for Determining Requirements for Mobile Technologies: the TramMate Project. PACIS 2003: 47 - 2002
- [c4]Jennie Carroll, Steve Howard, Jane Murphy, John Peck:
'No' to a free mobile: when adoption is not enough. ACIS 2002 - [c3]Jennie Carroll, Graeme G. Shanks:
Modelling the Requirements Process: where are the people? ACIS 2002 - [c2]Steve Howard, Jennie Carroll, John Murphy, Jane Peck:
Using 'endowed props' in scenario-based design. NordiCHI 2002: 1-10 - 2001
- [c1]Jennie Carroll, Steve Howard, Frank Vetere, Jane Peck, John Murphy:
Identity, Power And Fragmentation in Cyberspace: Technology Appropriation by Young People. ACIS 2001
1990 – 1999
- 1995
- [j1]Jennie Carroll:
The application of total quality management to software development. Inf. Technol. People 8(4): 35-47 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint