Abstract is missing.
- Mastery Level Learning and the Art of Database DesignM. Pamela Neely. 1 [doi]
- A Web-based DSS Supporting the Multiple-Perspectives of the Manatee-Watercraft Collision ProblemLars P. Linden, James F. Courtney. 2 [doi]
- Investigating the Development of a Multi-objective Decision Model that Seeks to Generate Informed Alternatives for Maximizing IS Security within an OrganizationJeffrey May, Gurpreet Dhillon. 3 [doi]
- Roles of Attitudes in Initial and Continued ICT Use: A Longitudinal StudyPing Zhang 0002. 4 [doi]
- Electronic Trading Venue PeersAdrian Wranik. 5 [doi]
- Cultural Aspects of Emergence of e- Relationships: A Study in a Newly Formed Large Chinese Telecom EnterpriseSusanna Xu, Joe Nandhakumar. 6 [doi]
- Influential Factors on Purchasing Frequency in Virtual Bookstores in BrazilLuiz Antonio Joia, Elaine Tavares Rodrigues. 7 [doi]
- Resource Constraints Related to Emerging Integration Technologies Adoption: The Case of Small and Medium-Sized EnterprisesHsin Chen, Man Lee, Nick Wilson. 8 [doi]
- Understanding Self-Disclosure in Electronic Communities: An Exploratory Model of Privacy Risk Beliefs, Reciprocity, and TrustClay Posey, T. Selwyn Ellis. 9 [doi]
- The Effects of Online Rating Validity on Decision PerformanceRobin S. Poston, Amy Hennington. 10 [doi]
- All Stakeholders are Flexible But Some are More Flexible Than Others - External Stakeholder Influence: A Case Study ExperienceHilary Berger. 11 [doi]
- Data Mining and Knowledge Discovery: An Analytical InvestigationTal Ben-Zvi, Israel Spiegler. 12 [doi]
- How Advice and Its Source Characteristics Prompts Changes in Investment DecisionsRobin Poston, Clayton A. Looney, Asli Yagmur Akbulut. 13 [doi]
- Integration of Models for Understanding Continuance of Process Modeling TechniquesJan Recker, Michael Rosemann. 14 [doi]
- Incorporating M-Commerce into Organizational Strategy: A Case Study in the Tourism SectorAmit Srivastava, Rana Tassabehji, James Wallace. 15 [doi]
- GameTheoretic Analysis of Digital Multimedia Broadcasting IndustrySeungJae Shin, J. P. Shim, Martin B. Weiss. 16 [doi]
- Aligning IT Strategy to Business Strategy in a Multi-Business CompanyA. J. Gilbert Silvius. 17 [doi]
- Accommodating Differences in the Uniformity and Stability of Information Systems ArtifactsAnand Jeyaraj. 18 [doi]
- Mind the Gap: Positioning Information Systems/Information Technology within the Process of Post-merger IntegrationDragos Vieru, Suzanne Rivard. 19 [doi]
- Aligning Organizational Requirements with Enterprise Systems Capabilities: The Role of Domain-Specific KnowledgeMichael Rosemann, Iris Vessey, Ron Weber, Corina Raduescu. 20 [doi]
- Freeware Downloads: An Empirical Investigation Into the Impact of Expert and User Reviews On Demand for Digital GoodsNaveen Amblee, Tung X. Bui. 21 [doi]
- Adoption of SMS for Business-to-Consumer Usage: Supporting Adherence to Healthy ActivitiesMihail Cocosila, Norman P. Archer, Yufei Yuan. 22 [doi]
- The Moderating Effect of Cognitive Capability on Task Conflict: A Longitudinal Study of Task Conflict and Team Performance in Student Software Development TeamsJun He. 23 [doi]
- How May E-Learning Groups Interact?Chia-Ping Yu, Feng-Yang Kuo. 24 [doi]
- Retention and Quality in Open Source Software ProjectsVishal Midha, Prashant Palvia. 25 [doi]
- Semantic SOA - IT Catalyst for Business TransformationBhavin Raichura, Rajat Kumar. 26 [doi]
- How the Organizations Change in ERP ImplementationJen-Yin Yeh. 27 [doi]
- CIOs in the Public Sector: The Gap Between Theory and LiteratureRachel Lawry, Dianne Waddell, Mohini Singh. 28 [doi]
- Towards the Causal Structure of Problems in Enterprise System AdoptionPiotr Soja, Grazyna Paliwoda-Pekosz. 29 [doi]
- Why They Enjoy Using This Gaming ApplicationJiming Wu, Pentago Li. 30 [doi]
- Agent-oriented e-Learning Process ModelingHokyin Lai, Huaiqing Wang, Minhong Wang. 31 [doi]
- The Influence of WebCT Information Technology and Structure of Instruction on Students Academic PerformanceKonstantin Taskov. 32 [doi]
- Where Do We Draw The Line? Tolerance of Escalating Commitment To Troubled ProjectsJonathan Paul, Marcus O'Connor. 33 [doi]
- Managing Virtual Communities - A Case Study of a Viable SystemChristoph Rosenkranz, Christoph Feddersen. 34 [doi]
- The Adoption of POUE and OUE of IT Investments in the Jordanian Business EnvironmentHussein Al-Yaseen, Ramzi El-Haddadeh, Saheer Al-Jaghoub, Ali Al-Gweri. 35 [doi]
- Cost Impacts on Information Lifecycle Management DesignLars Arne Turczyk, Martin Behrens, Nicolas Liebau, Ralf Steinmetz. 36 [doi]
- Organisational Adoption of Mobile Distributed Work: An Empirical ExaminationSarah P. W. Shek, Choon-Ling Sia, Probir Banerjee. 37 [doi]
- A Method for File Valuation in Information Lifecycle ManagementLars Arne Turczyk, Marcel Groepl, Nicolas Liebau, Ralf Steinmetz. 38 [doi]
- Modeling Information Lifecycle ManagementLars Arne Turczyk, Nicolas Liebau. 39 [doi]
- Privacy-Friendly LBS: A Prototype-Supported Case StudyJan Zibuschka, Lothar Fritsch, Mike Radmacher, Tobias Scherner, Kai Rannenberg. 40 [doi]
- Enterprise Architecture Stakeholders - a Holistic ViewEetu Niemi. 41 [doi]
- Internet Use from the Perspective of the Theory of Planned BehaviourJohann Kerschbaum, Elisabeth Donat, Roman Brandtweiner. 42 [doi]
- How to Manage Knowledge Transfer in IT - Outsourcing Relationships Towards a Reference ModelBenjamin J. J. Voigt, Jasminko Novak, Gerhard Schwabe. 43 [doi]
- An Agent-Based Reverse Pricing Model for Reducing Bullwhip Effect in Supply ChainsYll Mujaj, Jörg Leukel. 44 [doi]
- Public Sector Business Intelligence - An Open Source ApproachBjörn Niehaves, Felix Müller-Wienbergen, Jörg Becker. 45 [doi]
- Use of Knowledge in ICT Investment Decision-Making of SMEsTorsti Rantapuska, Outi Ihanainen. 46 [doi]
- Replacing the Project Manager in Information System Projects: What Knowledge Should be Transferred?Maritta Pirhonen, Tero Vartiainen. 47 [doi]
- Optimal Staffing Policy and TelemedicineHakan Tarakci, Moosa Sharafali, Zafer D. Özdemir. 48 [doi]
- Mobile Technologies for Efficient Service Processes: A Case Study in the German Machine and Plant Construction IndustryOliver Thomas, Philipp Walter, Peter Loos, Markus Nüttgens, Michael Schlicker. 49 [doi]
- Open Source Software Adoption: Differences Between Developed and Developing EconomiesSolomon Negash, Michelle Carter. 50 [doi]
- Information Technology and Knowledge Worker Productivity: A Taxonomy of Technology CrowdingPamela Carr, Ying Lu. 51 [doi]
- Towards Enhanced Business Process Models Based on Fuzzy Attributes and RulesOliver Thomas, Thorsten Dollmann, Peter Loos. 52 [doi]
- Sharing of Knowledge in Public Knowledge Spaces: Influencing FactorsTejaswini Herath, G. Lawrence Sanders. 53 [doi]
- A Realist Social Theory of Information SystemsMichael J. Cuellar. 54 [doi]
- Offshoring of Software Development from Japan to ChinaNobuhiro Takahashi, Mita Li. 55 [doi]
- Configurative Method Engineering - On the Applicability of Reference Modeling Mechanisms in Method EngineeringJörg Becker, Ralf Knackstedt, Daniel Pfeiffer, Christian Janiesch. 56 [doi]
- The Impact of Personal Dispositions on Privacy and Trust in Disclosing Health Information OnlineGaurav Bansal, Fatemeh Zahedi, David Gefen. 57 [doi]
- Outsourcing Success: Psychological Contract PerspectiveTejaswini Herath, Rajiv Kishore. 58 [doi]
- Effect of the Food Traceability System for Building Trust: Price Premium and Buying BehaviorYoung Chan Choe, Joowon Park, Miri Chung, Cheol Lee, Junghoon Moon. 59 [doi]
- Consumer Adoption of Broadband in PakistanKhalil Khoumbati, Banita Lal, Hsin Chen. 60 [doi]
- Development of an Information Technology Audit Process Quality FrameworkDouglas Havelka, Jeffrey W. Merhout. 61 [doi]
- Protection Motivation Theory in Information System Adoption: A Case of Anti-Plagiarism SystemYounghwa Lee, Jeong-Yeon Lee, Yucong Liu. 62 [doi]
- ISO Security Standards as a Leverage on IT Security ManagementIgli Tashi, Solange Ghernaouti-Helie. 63 [doi]
- An Assessment of Electronic Banking Initiatives in NigeriaFrancis Andoh-Baidoo, Babajide Osatuyi, Muhammadou Kah, Emmanuel Aidoo. 64 [doi]
- An Integrated Framework for Code Reuse and Refactoring in Extreme ProgrammingVijayan Sugumaran, Gerald DeHondt. 65 [doi]
- The Role of Diversity and Technology in Global Virtual TeamsPraveen Pinjani, Prashant Palvia. 66 [doi]
- Improving the Knowledge Base by Integrating Vital Sign Data into Pre-Hospital Patient Care RecordsMark Gaynor, Dan Myung, Joseph Restuccia, Steve Moulton. 67 [doi]
- Knowledge Networking across the Social Divide: A Model for Distributed Decision MakingSajda Qureshi, Mehruz Kamal, Peter Keen. 68 [doi]
- Improving the Knowledge Base by Integrating Vital Sign Data into Pre-Hospital Patient Care RecordsMark Gaynor, Dan Myung, Steve Moulton. 69 [doi]
- Massively Multiplayer Online Role-Playing Games (MMORPGs) and Commitment Behavior: An Integrated ModelSooran Jo, Junghoon Moon, Edward J. Garrity, G. Lawrence Sanders. 70 [doi]
- The Effect of Simplicity and Perceived Control on Perceived Ease of UseDongwon Lee, Junghoon Moon, Yongjin Kim. 71 [doi]
- Antecedent factors influencing customer decision support satisfaction from e-WOM systemsChul Woo Yoo, Junghoon Moon, Young Chan Choe. 72 [doi]
- An Information Technology Therapy Approach to Micro-enterprise Adoption of ICTsPeter Wolcott, Sajda Qureshi, Mehruz Kamal. 73 [doi]
- Examining Measurements of Process Capital - A System Model PerspectiveShari S. C. Shang, Ya-Ling Wu. 74 [doi]
- Acceptance and Benefits of Web-based Self-Assessments at UniversitiesSonja Fischer, Michael Amberg, Nadja Knarr. 75 [doi]
- Online Communities for Customer Relationship Management on Financial Stock Markets - A Case Study from a Project at the Berlin Stock ExchangeChristoph Lattemann, Stefan Stieglitz. 76 [doi]
- Household Technology Acceptance: Heterogeneity in Computer AdoptionAlastair Robertson, Didier Soopramanien, Robert Fildes. 77 [doi]
- A Generic Process for Individual Knowledge Reuse: Potential Problems and SolutionsStacie Petter, Vijay K. Vaishnavi. 78 [doi]
- Estudio Exploratorio de la Distribucion Espacial de los Estudiantes de Ingenieria de Una Universidad Privada en la Ciudad de MexicoMarcelo Mejia. 79 [doi]
- An Approach for Capacity Planning of Web Service WorkflowsJulian Eckert, Nicolas Repp, Stefan Schulte 0002, Rainer Berbner, Ralf Steinmetz. 80 [doi]
- Analyzing Scrum Agile Software Development with Development Process, Social Factor, and Project Management LensesYongSeog Kim. 81 [doi]
- Investigating EAI Adoption in LGAs: A Case Study Based AnalysisMuhammad Mustafa Kamal, Marinos Themistocleous. 82 [doi]
- The BWW-Model as Method Engineering TheoryClaudia Montiel-Sanchez, Daniel Pfeiffer, Jörg Becker. 83 [doi]
- The Effect of Third Party Seals on Consumers' Repurchase Process in Online Shopping: A Multi-Group AnalysisInsu Park, Amit Bhatnagar, H. Raghav Rao. 84 [doi]
- Deception, Cultural Differences and Computer-Mediated CommunicationCarmen Lewis. 85 [doi]
- Fundraising and the InternetKemal Altinkemer, Prabuddha De, Yasin Ozcelik, Zafer D. Özdemir. 86 [doi]
- Reap from ERP Systems -The Management of Absorptive Capacity in Post-ERP ImplementationShari S. C. Shang, Chih-Hsien Hsu. 87 [doi]
- Un Estudio Exploratorio de los Departamentos de Tecnologias de Informacion en un Pais en DesarrolloJuan Manuel Gómez Reynoso, Carlos Torers Quicones, Carlos Argelio Arevalo Mercado, Estela Lizbeth Muñoz Andrade. 88 [doi]
- Assessing Business Process Security Awareness: A Service-Oriented ApproachMariagrazia Fugini, Ernesto Damiani, Karl Reed. 89 [doi]
- Service-Oriented Architecture Paradigm: Major Trend or Hype for the German Banking Industry?Stefan Schulte 0002, Nicolas Repp, Rainer Berbner, Ralf Steinmetz, Ralf Schaarschmidt. 90 [doi]
- Evaluating Students' Acceptance and Use of Tablet PCs in Collegiate ClassroomsOmar F. El-Gayar, Mark Moran. 91 [doi]
- Organizational Factors and Bad News Reporting on Troubled IT ProjectsChongWoo Park, Mark Keil. 92 [doi]
- Conference Paper Sharing: Social-Psychological PerspectivesJeong-Yeon Lee, Younghwa Lee, Preeti Wadhwa. 93 [doi]
- Return on Security Investments - Design Principles of Measurement Systems Based on Capital BudgetingJan vom Brocke, Christian Buddendick, Gereon Strauch. 94 [doi]
- Will Your Acquisitions Increase Your IT Budget? The Effects of Mergers and Acquisitions Strategy on Firms? Information Technology Strategy\r\nViet Dao. 95 [doi]
- Investigating Knowledge Transfer: A Preliminary Model to Improve Our Understanding of the LiteratureTodd Peachey, Summer E. Bartczak, Dianne Hall. 96 [doi]
- E-Business Use in Small and Medium-Sized Tourism Enterprises: A Post Adoption PerspectiveLaddawan Kaewkitipong, David H. Brown. 97 [doi]
- A Descriptive Case Study of Electronic Records Taxonomy Development at the Central Intelligence AgencyDavid Balda, Summer E. Bartczak, Rhonda Syler, Alan R. Heminger. 98 [doi]
- eGovernment Initiatives and Ex-Ante IT Investment EvaluationThanos Papadopoulos, Panagiotis Kanellis. 99 [doi]
- On the Centrality of Social Norms in Determining MBA Program SuccessNitza Geri, Orr Mendelson, David Gefen. 100 [doi]
- Knowledge Discovery on Consumer Trust in B2C Electronic CommerceDan Kim. 101 [doi]
- The Different Mechanisms of Habit and Past Behavior on Evaluations and IS Continuance Intention: An Empirical InvestigationMei-Chun Wu. 102 [doi]
- Achieving Flexibility via Service-Centric Community Source: The Case of KualiManlu Liu, Harry J. Wang, J. Leon Zhao. 103 [doi]
- Train to Work Effectively in Virtual Environments: A Framework of Virtual Team CompetencyFang Chen, James Sager. 104 [doi]
- Everyday Simplicity: The Implications of Everyday Tasks for Ubiquitous Computing ApplicationsFlorian Resatsch, Uwe Sandner, Daniel Michelis, Christian Hoechst, Thomas Schildhauer. 105 [doi]
- Estimating Risk in Information Technology ProjectsAndrew Gemino, Christopher Sauer, Blaize Horner Reich. 106 [doi]
- Exploring Student Perceptions of an Electronic Textbook: A TAM PerspectiveKlara Nelson, Harold Webb. 107 [doi]
- An Open Platform for Context-aware Short Message ServiceHeng Tang, Shaoyi Liao, David Jingjun Xu. 108 [doi]
- A Dynamic Voting Wiki ModelConnie White, Linda Plotnick, Murray Turoff, Starr Roxanne Hiltz. 109 [doi]
- Usability in Multiple Monitor DisplaysJacob M. Truemper, Richard H. Hall, Morris Kalliny, Hong Sheng. 110 [doi]
- Managing the Implementation of an Enterprise System in an Accounting and Finance EnvironmentJanet Williams, Michael D. Williams. 111 [doi]
- RFID-Enabled Shelf Replenishment with Case-Level Tagging: A Simulation StudyFrédéric Thiesse, Elgar Fleisch, C. Sorensen, Christian Tellkamp. 112 [doi]
- Explaining Radical Technology-Based Innovations in OrganizationsUri Gal, Kalle Lyytinen, Jessica Luo Carlo, Gregory M. Rose. 113 [doi]
- Cross Cultural Implications of the Technology ArtifactSusan Clemmons. 114 [doi]
- The Essential Components of Disaster Recovery Methods: A Delphi Study Among Small BusinessesBarry A. Cumbie. 115 [doi]
- Electronic Personal Health Records and Systems to Improve Care for Vulnerable PopulationsNathan Botts. 116 [doi]
- Pair Programming: Effects of Trust on Software QualityGeorge Mangalaraj, Vikram S. Bhadauria. 117 [doi]
- The Application of DEA to Measure the Efficiency of Open Source Security Tool ProductionRichard Mathieu, Barry Wray. 118 [doi]
- Without Permission: Privacy on the LineJoanne H. Pratt, Sue A. Conger. 119 [doi]
- Branding 2.0 - Designing an Information System to build a Brand based on User-generated ContentMartin Mairinger. 120 [doi]
- The Hidden Side of E-Mail Use: How to Explain Problems of Electronic Coordination?Nabila Boukef Charki. 121 [doi]
- The Roles of Positive and Negative Utility in Predicting Online Wine Purchase BehaviorMichael Sheridan, Joseph A. Cazier, Douglas May. 122 [doi]
- E-government Diffusion: A Comparison of Adoption ConstructsLemuria Carter. 123 [doi]
- Knowledge Transfer for ERP UpgradesJeff Erickson 0002, Judy E. Scott. 124 [doi]
- Measuring User Coping Strategies of Adaptation to Information TechnologiesChristophe M. Elie-Dit-Cosaque. 125 [doi]
- Mobile Computing Technologies and Organizational Control: A Disciplinary Power PerspectiveJijie Wang. 126 [doi]
- A Framework for Stylometric Similarity Detection in Online SettingsAhmed Abbasi, Hsinchun Chen. 127 [doi]
- Investigating the Roles of Virtual Experience in Consumers' Online Purchasing DecisionsY. Ken Wang, Pratim Datta. 128 [doi]
- Project-Based Learning across the MIS Curriculum: An Assessment on Team BuildingM. Abdur Rob. 129 [doi]
- Towards a Benefits Realization Roadmap for ERP Usage in Small and Medium-Sized EnterprisesJose Sousa. 130 [doi]
- The Impact of Operational Alignment on IT Flexibility - Empirical Evidence from a Survey in the German Banking IndustryDaniel Beimborn, Jochen Franke, Heinz-Theo Wagner, Tim Weitzel. 131 [doi]
- Differences in Factors Affecting Academic Success for Disabled Individuals in Technology-Mediated Learning EnvironmentsRamesh Babu, Rahul Singh, Lakshmi S. Iyer, Vishal Midha. 132 [doi]
- Gender Preferences in Web Design: Usability Testing through Eye TrackingSoussan Djamasbi, Thomas S. Tullis, Joseph Hsu, Erin Mazuera, Kelly Osberg, John Bosch. 133 [doi]
- The Role of the Business Unit CIO: A Study of the Interaction Between Corporate IT Governance and Local LeadershipAlan Thorogood, Colin Wood. 134 [doi]
- E-Government Implementation Challenges in UK: A Case Study of Trading Standards DepartmentVikas Jain, Shalini Kesar. 135 [doi]
- How to Measure Relationships - Merging Alignment and Outsourcing Research towards a Unified Relationship Quality ConstructDaniel Beimborn, Stefan Blumenberg. 136 [doi]
- IS Professionals Assess the Usefulness of the Four Most Common IS CoursesDeborah J. Ballou, Brian R. Huguenard. 137 [doi]
- An Empirical Study Examining the Usage and Perceived Importance of XP PracticesAnn L. Fruhling, Jessica Zhang. 138 [doi]
- Knowledge Creation in Virtual Communities of Patients: The Role of Quality AssuranceAchim Dannecker, Ulrike Lechner. 139 [doi]
- Managing Project-Based IS Initiatives in the Vocational and Technical Education Sector of Developing Asian Countries: A Soft Systems Approach to Identifying the Role of Information and Information SystemsChanna Gunawardena, David Brown. 140 [doi]
- General Systems Theory: A Guiding Framework for IS ResearchShivraj Kanungo, Vikas Jain. 141 [doi]
- Using Event Based Markov Model Simulation to Analyze Interactive Human BehaviorThomas George Kannampallil, Steven R. Haynes. 142 [doi]
- Understanding Consumer Motivation for Taking Action against SpywareXin (Robert) Luo, Anil Gurung. 143 [doi]
- Understanding Information System Outsourcing Failure: Lessons from a Case StudyR. Chandrasekaran, Ahmed Tayeh, Vaishali Nagoore. 144 [doi]
- A Research Framework for Investigating the Successful Configuration of Globally Distributed Agile TeamsJason H. Sharp, Sherry D. Ryan. 145 [doi]
- The Impact of Government Trust Perception on Privacy Risk Perceptions and Consumer Acceptance Of Residual RFID TechnologiesAndrew Jensen, Joseph A. Cazier, Dinesh S. Dave. 146 [doi]
- Segmenting the Fixed and Mobile Service Markets in the USA: A Cluster AnalysisAlexander Serenko, Ofir Turel, Mehdi Zahaf. 147 [doi]
- IT Innovation Persistence: An Exploratory AnalysisTheophanis C. Stratopoulos, Jee-Hae Lim. 148 [doi]
- The Impact of Managerial Characteristics of Top Management Team on the Extent of Information Technology Adoption: An Exploratory Study with the Upper Echelon TheoryTa-Tao Chuang, Kazuo Nakatani, Duanning Zhou. 149 [doi]
- A Wiki That Knows Where It Is Being Used: Social Hazard or Social Service?Maria M. Plummer, Linda Plotnick, Starr Roxanne Hiltz, Quentin Jones. 150 [doi]
- Logic Agents and Conceptual Interoperability through Semantic Web TechnologiesTobias Lehmann, Andreas Karcher. 151 [doi]
- Differences in Contracting: Anchoring Formal and Relational Norms within BPO GovernanceCornelia Gellings, Kim Wüllenweber. 152 [doi]
- Computer Forensics, E-Discovery, and Spoliation: Impact of the New Federal RulesBurke T. Ward, Janice C. Sipior, Linda Volonino, Georgina Peterson. 153 [doi]
- Workplace Internet Use Monitoring and Employee Behavior Intention ChangeQinyu Liao, Xin (Robert) Luo, Anil Gurung, Long Li. 154 [doi]
- Modeling the Motivating and Enabling Factors of Students' Acceptance of Web-Based Course Management SystemsMichael D. Williams, Janet Williams, Jun Chen. 155 [doi]
- Collaborative Recommender Systems for Online ShopsUwe Leimstoll, Henrik Stormer. 156 [doi]
- Instructor Perception of Online Discussion BoardsNathan Botts, Terry Ryan. 157 [doi]
- Connecting Mobile Phones to the Internet of Things: A Discussion of Compatibility Issues Between EPC and NFCThomas Wiechert, Frédéric Thiesse, Florian Michahelles, Patrick Schmitt, Elgar Fleisch. 158 [doi]
- Computer-aided Credibility Assessment by Novice Lie-CatchersMatthew L. Jensen, Judee K. Burgoon, Jay Nunamaker Jr.. 159 [doi]
- Decision-Making Effectiveness: The Role of IT use, Decision Processes and Organizational CultureShivraj Kanungo. 160 [doi]
- Diversity in Collaborative Information Systems (IS) Research Methods: Academic Breadth or 'Re-Inventing the Wheel'?Claudia Loebbecke, Olivier Berthod, Claudio Huyskens. 161 [doi]
- Exploring the Relationship Between IS performance and Organizational Culture in the Government and Public Sector OrganizationsShivraj Kanungo. 162 [doi]
- User Experience Design: A Strategy for Competitive AdvantageDavid Sward. 163 [doi]
- Horizontal Selection: An Evaluation of a Digital Tabletop Input DeviceMark Micire, Martin Schedlbauer, Holly A. Yanco. 164 [doi]
- Towards Item-Level RFID in the Japanese Publishing IndustryClaudia Loebbecke, Masakazu Fujita, Claudio Huyskens. 165 [doi]
- A Trend Toward More Centralized Information Technology (IT) ManagementCarl R. Adams, Eric C. Larson, Weidong Xia. 166 [doi]
- An Exploration of Antecedent Characteristics for Predicting User Perseverance in Online Travel ShoppingJoseph A. Cazier, Antonina Durfee, B. Dawn Medlin. 167 [doi]
- Comparing Alignment Factors in SMEs and Large Organizations: A Planning Integration PerspectiveAnabel Gutierrez, Jorge Orozco, Alan Serrano, Ali Nawazish, Homa Yaz. 168 [doi]
- Jamaica: Implementing the National ICT Strategy through Policy and InitiativesSheryl Thompson. 169 [doi]
- Seeking Dragons in IS ResearchElham Mousavidin, Lakshmi Goel. 170 [doi]
- An Exploratory Study of the Influence of External Stakeholders on the Strategic Alignment of IS ProjectsDavid Murungi. 171 [doi]
- Do They Really Know It? Students' Perceptions of the Software Applications CourseMarcy Courier, Raymond Papp. 172 [doi]
- Quality Evaluation of Economic Decision-Making Support Systems: Oil Industry CaseE. Méndez, María A. Pérez, Luis Eduardo Mendoza. 173 [doi]
- Data Quality Begins with the Business ModelMary Ann Robbert, Donna Fletcher. 174 [doi]
- Information Assurance in B2C e-Commerce Transactions: A Process-Oriented Framework and Empirical Analysis of Websites using Semantic NetworksDan J. Kim, Kwok-bun Yue, T. Andrew Yang. 175 [doi]
- The Influence of Online Word of Mouth on Product Sales in Retail E-commerce: An Empirical InvestigationAlanah J. Davis, Deepak Khazanchi. 176 [doi]
- Piloting Knowledge Transfer in IT/IS Outsourcing Relationship Towards Sustainable Knowledge Transfer Process: Learnings from Swiss Financial InstitutionMalgorzata Bugajska. 177 [doi]
- Development of a Framework for Analyzing Individual and Environmental Factors Preceding Attitude toward Information SecurityRuben Mancha, Glenn Dietrich. 178 [doi]
- A Facilitators' Perspective on Successful Virtual Communities of PracticeHalbana Tarmizi, Gert-Jan de Vreede, Ilze Zigurs. 179 [doi]
- The Influence of Regulations on Innovation in Information SecurityLara Khansa, Divakaran Liginlal. 180 [doi]
- Exploring Control Modes in Globally Distributed IT Work ManagementMin Zhang, Donald Chand, Gary C. David. 181 [doi]
- Real vs. Virtual: A Theoretical Framework for Assessing the Role of Authenticity in Visitor Interactions with Museum TechnologiesJessie Pallud, Detmar W. Straub. 182 [doi]
- An Empirical Investigation of the Determinants of Online Information DisclosureRiza Ergun Arsal, Chris Zimmer, Mohammad Al-Marzouq, Varun Grover. 183 [doi]
- Improving Work Through HCI: A Case Study on Information Sharing PracticesBreanne Kunz, Youn-Kyung Lim, Erik Stolterman. 184 [doi]
- Predicting Crime Reporting with Decision Trees and the National Crime Victimization SurveyJuliette Gutierrez, Gondy Leroy. 185 [doi]
- Making Information Systems Research More ValuableNik R. Hassan. 186 [doi]
- Reducing Requirement Perception Gaps through Coordination Mechanisms in Software Development TeamYuzhu Li, James J. Jiang, Gary Klein. 187 [doi]
- The Importance of Deliberative Inquiry for IS ResearchZaheeruddin Asif, Heinz K. Klein. 188 [doi]
- The Moderating Role of Perceived Effectiveness of Third-Party Control on Trust and Online Purchasing IntentionsYulin Fang, Israr Qureshi, Patrick McCole, Elaine Ramsey. 189 [doi]
- Health Information Websites: Is the Health Consumer Being Well-Served?Julie Fisher, Frada Burstein, Kathy Lynch, Kate Lazarenko, Sue McKemmish. 190 [doi]
- Social Capital and Knowledge Exchange in Hybrid Virtual Communities for Patients with Multiple Sclerosis: Preliminary ResultsSherry D. Ryan. 191 [doi]
- Ontology Structure of Elements for Web-based Natural Disaster Preparedness SystemsChen-Huei Chou, Fatemeh Zahedi. 192 [doi]
- Confidence in Crises: Time-Pressed Interorganizational Information SharingJanis L. Gogan, Monica J. Garfield, Mary Ann Robbert. 193 [doi]
- The Emergence of On-Demand Software Aggregators: Implications for Developers, Customers, and Software CompaniesJulie David, Arti Mann. 194 [doi]
- Investigating the Antecedents and Benefits of SOA Implementation: A Multi-Case Study ApproachTom E. Yoon, Pamela E. Carter. 195 [doi]
- Synthesis and Analysis of Moore and Benbasat's PCI and Witte's Susceptibility and Severity of Threat ScalesMark B. Schmidt, Kirk P. Arnett. 196 [doi]
- A Dialectical Sensemaking Model for Making Electronic Record Control Practice DecisionsJames L. Parrish Jr.. 197 [doi]
- Key Considerations for Designing Electronic Medical Records SystemsEdward Wright, Michel Avital. 198 [doi]
- Toward Recruitment And Retention Strategies Based on the Early Exposure to the IT Occupational CultureIsabelle Fagnot, Indira R. Guzman, Jeffrey M. Stanton. 199 [doi]
- Getting Ready for Success: May Alignment Be of Help?Sebastian F. Martin, Daniel Beimborn, Mihir A. Parikh, Tim Weitzel. 200 [doi]
- Classification Algorithm Sensitivity to Training Data with Non Representative Attribute NoiseMichael V. Mannino, Yanjuan Yang, Young Ryu. 201 [doi]
- Evaluating Information Systems Flexibility: a Research Approach to Build a FrameworkLaura Jacome. 202 [doi]
- Exploring Technology Frames through Interview NarrativesMaureen MacLeod, Elizabeth Davidson. 203 [doi]
- Dimensions of Perceived Ecommerce Risks: An Empirical Study Using the Psychometric ParadigmEaswar A. Nyshadham, Ling Wang, Bill Hafner. 204 [doi]
- Business Intelligence Impact AssessmentMohamed Sidahmed. 205 [doi]
- A Personal Information Auction: Measuring the Differential Value of PrivacyDaniel Rice, John D'Arcy. 206 [doi]
- Do Perceptions of An Organizing Vision Influence Physicians Assimilation of Electronic Medical Records'John Lee Reardon, Elizabeth J. Davidson. 207 [doi]
- Outsourcing and the Arbitrage Myth: Valuing the Intrinsic Risk of IT OffshoringJames Davis. 208 [doi]
- An Electronic Market Framework for Context-Sensitive Mobile Consumer Profiles in the Marketing DomainAndreas Albers. 209 [doi]
- A Cross-Discipline Investigation of Students' Acceptance of Podcasting as a Learning ToolMichele L. Gribbins, Harshavardhan Bapat. 210 [doi]
- Building Consumer-to-Consumer Trust in e-Finance MarketplacesMartina E. Greiner, Hui Wang. 211 [doi]
- Assisting Teams to Learn About Their Teams: Preliminary Experiences with Team-based Assessment Software in Face-to-Face and Online TeamsKatia Passerini, Dezhi Wu, Liz Avery. 212 [doi]
- Creating Innovation Systems through Virtual CommunitiesMolly McLure Wasko, Robin Teigland, Brian Donnellan. 213 [doi]
- Barriers IT Employees Face - A Gender PerspectiveCynthia K. Riemenschneider, Deborah J. Armstrong, Margaret F. Reid, Rachel Rashe, Myria W. Allen. 214 [doi]
- An Extended Model of IT Governance: A Conceptual ProposalGerald Grant, Allen Brown, Aareni Uruthirapathy, Shawn McKnight. 215 [doi]
- The Role of IT Human Capability in Knowledge Transfer Process Under IT Outsourcing SituationsJoo-Yeon Park, Kun Shin Im. 216 [doi]
- Problems, Challenges, and Suggestions for Reverse Logistics of Publishing Industry in ChinaCansheng Wei, Yongjian Li. 217 [doi]
- Facilitating Employee Creativity: What Can We Learn from Online Work Community?Dejin Zhao, Mary Beth Rosson. 218 [doi]
- Network Governance in the E-Lance EconomyRobert Hooker, Carmen Lewis, Molly Wasko, James Worrell, Tom E. Yoon. 219 [doi]
- Economic Outcomes of E-Professional, Home-based EntrepreneursJoanne Pratt. 220 [doi]
- Rejection and Selection Decisions in the IT Portfolio Composition Process: An Enterprise Risk Management Based PerspectivePrasanna P. Karhade, Michael J. Shaw. 221 [doi]
- Using Genetic Algorithms for Software Testing: Performance Improvement TechniquesJames A. McCart, Donald J. Berndt, Alison Watkins. 222 [doi]
- Assessing the Impact of Privacy-Enhancing Technologies for RFID in the Retail IndustryFrédéric Thiesse, Christian Floerkemeier, Elgar Fleisch. 223 [doi]
- Texts as Maps: Deconstruction as an Approach to Exploring IS PracticeMike Chiasson, Elizabeth Davidson. 224 [doi]
- Exploring the Determinants of Web-Based E-Business Evolution in CanadaCarla Carnaghan, Ken Klassen. 225 [doi]
- A SCOR-Based Method for Supply Chain Process Reengineering with Applications in Chinese Automotive IndustryJianyuan Yan, Kai Li, Dongliang Qiu. 226 [doi]
- ICT Investment Impacts on Future Levels of Democracy, Corruption, and E-Government Acceptance in Emerging CountriesDaniel S. Soper. 227 [doi]
- The Impact of Cultural Distance on the Internationalization of Online Professional Communities -An Empirical Investigation of ISWorldMartin Yuecheng Yu, Nanda Kumar, Karl Reiner Lang. 228 [doi]
- An Information Technology Literacy Self-Assessment Instrument: Development and Pilot ResultsJorge Perez, Meg Murray, Martha Myers. 229 [doi]
- A Meta-Analysis of Security Risk Theory Literature in IS from 2000-2006April Adams, Gary F. Templeton, Natalie Campbell. 230 [doi]
- Towards an Intelligent Property Valuation Model: An Exploratory and Conceptual StudyYong Seog Kim, Matt Manley, John Johnson. 231 [doi]
- The Use of Mixed Methodology in the Study of the IT Occupational Culture: Utilizando Metodología de Investigación Mixta en el Estudio de la Cultura Ocupacional de SistemasIndira R. Guzman. 232 [doi]
- Assessing Customer Value of Net-Enabled Firms: Test of Panel DataPankaj Setia, Ken Boyer, Roger Calantone. 233 [doi]
- IS Curriculum Recommendations for Web Courses Based on Current Technology Use by Fortune 400 CompaniesJuyun Cho, Jason Couraud, David Olsen. 234 [doi]
- Distributed Scrum for Large-Scale and Mission-Critical ProjectsJuyun Cho. 235 [doi]
- Understanding Organizational Transformation from IT Implementations: A Look at Structuration TheoryLinying Dong, Thilini Ariyachandra. 236 [doi]
- Introducing User Profiles and Personas into Information Systems DevelopmentJaio Ma, Cindy LeRouge. 237 [doi]
- Incorporating Information Assurance in Systems Analysis and Design CurriculaStephen Barnes, David P. Biros, Mark Weiser, Nicholas C. Romano Jr.. 238 [doi]
- The Impacts of Electronic Collaboration and Information Exploitation Capability on Firm PerformanceIlsang Ko, Lorne Olfman, Sujung Choi. 239 [doi]
- Technology Mediated Interruptions: The Effects of Task and Interruption Characteristics on Decision-MakingK. Asli Basoglu, Mark A. Fuller. 240 [doi]
- Information Systems Impact Model Proof of ConceptBob McQuaid. 241 [doi]
- Systemic Involvement in Human Discourse: A Bi-modal Approach to IT DiscourseDavid Marlow. 242 [doi]
- Knowledge Management Practices in Thai SMEs: Influence of SME Characteristics on Knowledge Management ProcessesVarintorn Supyuenyong, Nazrul Islam, Uday R. Kulkarni. 243 [doi]
- Integrating Institutional and Individual Information Systems Assessment Through the Center for Computing Education ResearchLynn J. McKell, Herbert E. Longenecker Jr., Jeffrey P. Landry, J. Harold Pardue. 244 [doi]
- Implications of Complexity Theory on Real Option Analysis in IT Portfolio ManagementJohn C. Burke, Michael J. Shaw. 245 [doi]
- Semantic Machine Translation in Object Oriented Programming: Toward a Comprehensive, Idiomatic Model for Multilingual CommunicationPhilip Crowder, David Marlow. 246 [doi]
- Impacts of Web 2.0 on Business Models in Mass CustomizationBettina Bazijanec, Oliver Gausmann, Jan Oetjen, Klaus Turowski. 247 [doi]
- Programming Standards for the Information Systems CurriculumJulie Tomlin, John A. Hoxmeier, Susan Athey. 248 [doi]
- Why College Undergraduates Choose to Major in Information Technology: A Multi-Theoretical PerspectiveNathan Heinze, Qing Hu. 249 [doi]
- Information Security Governance Arrangements: The Devil is in the DetailsSrinivasan V. Rao, Sriraman Ramachandran. 250 [doi]
- Information Security Awareness: An Evaluation among Business Students with Regard to Computer Self-efficacy and Personal InnovationJames Ryan. 251 [doi]
- The UK SMEs Experience of Broadband DiffusionOluwasola Oni, Anastasia Papazafeiropoulou. 252 [doi]
- Comunidades Virtuales Como Alternativa Para Facilitar el Intercambio de Conocimiento en OrganizacionesEdgar S. Vilcapoma-Escurra, Jose Antonio Robles-Flores. 253 [doi]
- Cultural Issues in Globally Distributed Information Systems Development: A Survey and AnalysisHaiyan Huang. 254 [doi]
- The Impact of the P2P Paradigm on the New Media IndustriesNicolas Liebau, Konstantin Pussep, Kalman Graffi, Sebastian Kaune, Andre Beyer, Eric Jahn, Ralf Steinmetz. 255 [doi]
- Leader Delegation, Task Significance, and Trust in Global Software Development TeamsSuling Zhang, Marilyn Tremaine, Richard Egan, Allen E. Milewski, Jerry Fjermestad, Patrick O'Sullivan. 256 [doi]
- Outcome-Driven Experiential Learning MIS Courses in Web 2.0 EnvironmentC. Derrick Huang, Ravi S. Behara. 257 [doi]
- Examining Alignment of Frames Using Actor-Network Constructs: The Implementation of an IT ProjectBizan Ajad, Samer Faraj. 258 [doi]
- Ethics for Information Resource Management: The Role of Objective Ethical Standards in Decision-MakingJohn Drake, Charles Snyder, Casey G. Cegielski. 259 [doi]
- Tiered Approach for Mitigating Big Security Losses: A Variance Reduction ModelArunabha Mukhopadhyay, Samir Chatterjee, Debashis Saha, Ambuj Mahanti, Samir K. Sadhukhan. 260 [doi]
- A Spatial Decision Support System for Flood Risk MonitoringSuzette Burckhard. 261 [doi]
- How to Convince People Who Don't Like IT to Use IT: A Case Study on E-RecruitingAndreas Eckhardt, Tim Weitzel, Wolfgang König, Josef Buschbacher. 262 [doi]
- Intention to Use Mobile Commerce: A Demographic Analysis of the Chinese MarketHua Dai, Rahul Singh, Lakshmi S. Iyer. 263 [doi]
- Computer Interaction for Older Users: A Literature ReviewNicole L. Wagner, Khaled Hassanein, Milena M. Head. 264 [doi]
- An Empirical Investigation of Knowledge-Based AuthenticationYe Chen, Divakaran Liginlal. 265 [doi]
- Agrupamiento en Grandes Bases de Datos vía la Reducción Estadística del Espacio de BúsquedaIgnacio Ania, Angel Kuri. 266 [doi]
- An Empirical Investigation of the Equity Implementation Model: An Alternative Lens for Understanding Technology AdoptionTraci J. Hess, Kailash Joshi, Anna Lazarova McNab. 267 [doi]
- Out of Fear or Desire: Why do Employees Follow Information Systems Security Policies?Jai-Yeol Son, Hyeun-Suk Rhee. 268 [doi]
- Management of Interorganizational Open Source Software Projects - Lessons from a Case Study in Developing Country ContextJussi Nissilä, Jussi Puhakainen, Pasi Malinen. 269 [doi]
- Extended-Enterprise Information Security: A Risk Propagation Framework for Information Supply ChainsRavi S. Behara, C. Derrick Huang, Qing Hu. 270 [doi]
- An Investigation of Consumer's Security and Privacy Perceptions in Mobile CommerceHua Dai, Lakshmi S. Iyer, Rahul Singh. 271 [doi]
- Know Thyself: The Importance of Identity in Achieving Software Development Project Temporal SuccessJeff Crawford. 272 [doi]
- Risk Perspectives in Systems DevelopmentMerrill Warkentin, Ernst Bekkering, Allen C. Johnston, Robert S. Moore. 273 [doi]
- Knowledge Integration in Software Teams: An Assessment of Project Uncertainty and IT-Usage as AntecedentsNikhil Mehta, Terry Anthony Byrd, Dianne Hall, Kittipong Laosethakul. 274 [doi]
- Reaching New Heights and Seeing New Realities: A Study of Software Services in an Emerging EconomyPratyush Bharati. 275 [doi]
- The IT Security Adoption Conundrum: An Initial Step Toward Validation of Applicable MeasuresMerrill Warkentin, Jordan Shropshire, Allen C. Johnston. 276 [doi]
- An Assessment of U.S. and Chinese Online Gaming Environments and FuturesMerrill Warkentin, Chengqi Guo, Xin (Robert) Luo, Feifei Xie. 277 [doi]
- Impact of Knowledge Management Systems on Knowledge Intensive Business ProcessesGregory Schymik, Uday R. Kulkarni, Ronald D. Freeze. 278 [doi]
- Electronic Monitoring in Workplace: Synthesis and TheorizingRui Chen, G. Lawrence Sanders. 279 [doi]
- Early Consumer Adoption of Mobile TV from the Perspective of Flow ExperienceYoonhyuk Jung, Sonja Wiley-Patton. 280 [doi]
- The Effectiveness of Customer Service Policies on Intentions in Business-To-Consumer E-Commerce: A Psychological Contract PerspectiveWei Sha. 281 [doi]
- Mediated Interaction: Social Informatics in the Era of Ubiquitous ComputingHamid R. Ekbia. 282 [doi]
- Web-Based Information Systems: Developing a Design TheoryKeng Siau, Xiaofeng Chen 0006, Xin Tan. 283 [doi]
- Understanding Online Community Effectiveness: The Efficacy of Integrating Group Development and Social Capital TheoriesRoderick Lee. 284 [doi]
- Roles of Information Technology in Distributed and Open Innovation ProcessKevin C. Desouza, Yukika Awazu, Christoph Wecht, Jeffrey Y. Kim, Sanjeev Jha. 285 [doi]
- Measuring Mobile Device Usability as a Second Order Construct in Mobile Information SystemsAndrew Urbaczewski, Matti Koivisto. 286 [doi]
- Building on Leavitt's Diamond Model of Organizations: The Organizational Interaction Diamond Model and the Impact of Information Technology on Structure, People, and TasksDianne Lux Wigand. 287 [doi]
- Comparing Security Perceptions of E-Commerce UsersMark B. Schmidt, Jim Q. Chen, Dien D. Phan, Kirk P. Arnett. 288 [doi]
- Conceptualizing Creative Use: An Examination of the Construct and its DeterminantsAnnette Mills, Wynne Chin. 289 [doi]
- A Research Model of Relationship Quality in E-Commerce: Connecting IS Factors with Marketing ProfitabilityHeshan Sun, Ping Zhang 0002, Xue Xiao. 290 [doi]
- E-Collaboration and Government - Collaboration Using Virtual Teams In Law Enforcement To Counter Internet Crimes Against ChildrenRahul Bhaksar. 291 [doi]
- Evaluación del Alineamiento estratégico TI - Negocio y su impacto en la productividad de las Pequeñas y Medianas Empresas del Cluster Minero en Antofagasta, ChileAurora D. Sanchez. 292 [doi]
- Design and Implementation of Semantic Decision Support System for Supplier Performance Contract Monitoring and Execution: Integrating Description Logics, Semantic Web Rules and Service-Oriented Computing in the Context of the Extended EnterpriseA. Salam. 293 [doi]
- IT Value of Software Development: A Multi-theoretic PerspectiveVenugopal Balijepally, Sridhar P. Nerur, Radha K. Mahapatra. 294 [doi]
- Examining the Relationships Among Personality Traits, IT-specific Traits, and Perceived Ease of UseJoshua M. Davis, Lorraine Lee, Mun Y. Yi. 295 [doi]
- Emergency Response Coordination and IT Support: Contingency and StrategiesRui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya. 296 [doi]
- Good Project Management Practices Drive More Than Project Success: Learning, Knowledge Sharing and Job Satisfaction in IT Project TeamsFrank Braun, Michel Avital. 297 [doi]
- Measuring Knowledge Sharing in Open Source Software Development TeamsYuan Long, Keng Siau, Kris Howell. 298 [doi]
- A Grounded Theory Approach to Investigate Patient Empowerment in E-HealthcareSherrie Drye Cannoy, A. F. Salam, Lakshmi Iyer. 299 [doi]
- The Influence of Website Quality and Expectancy-Disconfirmation on Assessments of Service Quality: A Signaling Theory PerspectiveJohn Wells, Ryan Wright, Thomas Carnigan. 300 [doi]
- An Augmented Approach To Support Collaborative Distance Learning Of Unified Modeling LanguageKeng Siau, Fiona Fui-Hoon Nah, Brenda Eschenbrenner, Ashu Guru. 301 [doi]
- Business Continuity Preparedness and the Mindfulness State of MindTiffany Braun, Ben Martz. 302 [doi]
- Antecedents of e-Government Success: A Phenomenological StudyM. Naveed Baqir, Prashant Palvia, Amna Latif. 303 [doi]
- An Information Systems Security FrameworkJoseph Schuessler. 304 [doi]
- Bank of One: Empirical Analysis of Peer-to-Peer Financial MarketplacesSanjeev Kumar. 305 [doi]
- Effects of Color Temperature and Gender on Website AestheticsConstantinos K. Coursaris, Sarah J. Swierenga, Ethan Watrall. 306 [doi]
- The Role of Proximity in Willingness to Transact: The Effects of Trust and CultureSophie Cockroft, Raul Trejo. 307 [doi]
- A Typology for Community Wireless Networks Business ModelsAbdelnasser Abdelaal, Hesham H. Ali. 308 [doi]
- The Influence of Demographic Variables on Citizens' Adoption of E-GovernmentMichael D. Williams, Yogesh Kumar Dwivedi. 309 [doi]
- Relationship Between Importance and Performance of E-Business Motivations Among SMEsSimha R. Magal, Parag Kosalge, Nancy M. Levenburg. 310 [doi]
- IS/IT in Developing and Emerging EconomiesNarcyz Roztocki, Heinz Roland Weistroffer, Sonali Morar, Syed Nasirin. 311 [doi]
- Information Systems Strategy & Implementation: A Decade of ChangeLance Revenaugh, Raymond Papp. 312 [doi]
- Knowledge Management: The Hidden Power Behind Network-Centric HealthcareNilmini Wickramasinghe, Rajeev K. Bali, Brian Lehaney, Ian M. Marshall, Raouf N. Gorgui-Naguib. 313 [doi]
- Applying IT to Healthcare: Humans, Errors, and a Data Quality PerspectiveLeo Pipino, Yang W. Lee. 314 [doi]
- CEIP Maps: Context-embedded Information Product MapsYang Lee, Samuel Chase, Jonathan Fisher, Andrew Leinung, Dillon McDowell, Michael Paradiso, Jonathan Simons, Christopher Yarsawich. 315 [doi]
- How to Configure Cost-optimal Procurement Consortia for Academic LibrariesDaniel Beimborn, Rainer B. Fladung, Franz Rothlauf. 316 [doi]
- Input Information Complexity and Information Processing in GSS-Based Virtual Work Groups: An Experimental InvestigationSouren Paul, Derek L. Nazareth. 317 [doi]
- Going Online? The Case of an E-Pharmacy in JordanSaheer Al-Jaghoub, Moh'd Al-Jedaya, Hussein Al-Yaseen. 318 [doi]
- Interpersonal Relationship Needs of Virtual Community Participation: A FIRO PerspectiveHonglei Li, Vincent S. Lai. 319 [doi]
- An Evaluation of a Workshop with a Focus on Fostering Teaching Excellence through ResearchChetan S. Sankar, Victor Mbarika, P. Raju. 320 [doi]
- Expanding Views of Technology Acceptance: Seeking Factors Explaining Security Control AdoptionTim Chenoweth, Robert P. Minch, Sharon Tabor. 321 [doi]
- Decision-Making in a Distributed Global Environment (DDGE): Lessons from Web-Based Education (WBE)A. K. Aggarwal, Minnie Yi-Miin Yen, Pekka Makkonen. 322 [doi]
- E-government Implementation in Zambia: Contributing FactorsVishanth Weerakkody, Yogesh Kumar Dwivedi, Mike Williams, Laurence Brooks, Anthony Mwange. 323 [doi]
- Gender Perception toward Computing: Cross Culture Comparison - the US, China, and IndiaKittipong Laosethakul, Thaweephan Leingpibul, Yajiong Xue, Nikhil Mehta. 324 [doi]
- Is There a Business Case for RFID?Cynthia K. Riemenschneider, Bill C. Hardgrave, Deborah J. Armstrong. 325 [doi]
- Studying Microscopic Peer-to-Peer Communication PatternsPeter A. Gloor, Daniel Oster, Kai Fischbach, Koji Ara, Robert Laubacher, Benjamin N. Waber. 326 [doi]
- Facilitating Browsing with Information Visualization: A Cognitive Fit PerspectiveStella Taylor, David Schuff, Ozgur Turetken. 327 [doi]
- A Comparative Analysis of Offshored and Onshored Software Development ProjectsKallol Kumar Bagchi, Peeter Kirs, Godwin J. Udo. 328 [doi]
- Decision Support for Individuals, Groups, and Organizations: Ethics and Values in the Context of Complex Problem SolvingRussell Robbins, Dianne Hall. 329 [doi]
- Information Security in the Extended Enterprise: A Research AgendaScott Dynes, Lutz Kolbe, Ragnar Schierholz. 330 [doi]
- Secure Integration of eBusiness Processes in the Extended-EnterpriseFergle D'Aubeterre, Rahul Singh, Lakshmi Iyer, Richard Ehrhardt. 331 [doi]
- Web 2.0: Conceptual Framework and Research DirectionsJai Ganesh, Srinivas Padmanabhuni. 332 [doi]
- Using Cross-Tabulation and Kendall's TAU-C in an Effort to Understand Gender Issues of Socio-Technical Systems Development of a Healthcare Informatics ApplicationNina McGarry. 333 [doi]
- Where Have All the Students Gone? Strategies for Tackling Falling EnrollmentsGeoffrey N. Dick, Mary Granger, Carolyn Jacobson, Craig Van Slyke. 334 [doi]
- Music Sharing in Russia: Understanding Behavioral Intention and Use of Music DownloadingDonald Amiroso, Thomas Case. 335 [doi]
- An Exploratory Study of Capturing and Reusing Project Knowledge from a Stage-based PerspectiveI.-Chin Wu, William Wang. 336 [doi]
- The Need for Disruptive Technologies in the Intelligence CommunityJeffrey Morrison. 337 [doi]
- Towards a Taxonomy of Mobile ApplicationsRobert C. Nickerson, Upkar Varshney, Jan Muntermann, Henri Isaac. 338 [doi]
- Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpaceCatherine Dwyer, Starr Roxanne Hiltz, Katia Passerini. 339 [doi]
- SMEs and IT Innovation. What's the Way Forward?Anastasia Papazafeiropoulou, Yogesh Kumar Dwivedi, Oluwasola Oni. 340 [doi]
- Cross-Organizational and Cross-Border IS/IT Collaboration: Mini-Track IntroductionNicholas C. Romano Jr., James B. Pick, Narcyz Roztocki. 341 [doi]
- Using Neural Networks to Forecast Box Office SuccessMike Henry, Ramesh Sharda, Dursun Delen. 342 [doi]
- Service-Oriented Enterprises and Architectures: State of the Art and Research OpportunitiesPadmal Vitharana, Kumar Bhaskaran, Hemant K. Jain, Harry J. Wang, J. Leon Zhao. 343 [doi]
- A Model for Estimating the Savings from Dimensional versus Keyword SearchKaren Corral, David Schuff, Robert D. St. Louis, Ozgur Turetken. 344 [doi]
- The eXperience Methodology for Writing IS Case StudiesPetra Schubert, Kumar Bhaskaran. 345 [doi]
- Towards a Research Agenda for Virtual CommunitiesAchim Dannecker, Jan Marco Leimeister. 346 [doi]
- A Theoretical Basis for Defining Internal Control Objectives for Information Systems SecuritySushma Mishra, Gurpreet Dhillon. 347 [doi]
- Privacy in the YouTube Era: Evolving Concepts in the Protection of Personal InformationJeffrey M. Stanton, Hamid Nemati, Soon Chun, Jengchung Chen. 348 [doi]
- A Value Oriented Conceptual Model for Innovation in Local GovernmentAh Lian Kor, Graham Orange, Tony Elliman, Rana Tassabehji. 349 [doi]
- Web 2.0: A Social Informatics PerspectiveJ. P. Allen, Howard Rosenbaum, Pnina Shachaf. 350 [doi]
- Design Science Research on Systems Analysis and Design: The Case of UMLXin Tan, Keng Siau, John Erickson. 351 [doi]
- Interface Design for Handheld Mobile DevicesPeter Tarasewich, Jun Gong, Fiona Fui-Hoon Nah. 352 [doi]
- Information Systems Research in the Nonprofit Context: A New FrontierOscar Gutierrez, Wei Zhang. 353 [doi]
- Information Systems: The Toolbox for Accounting; The Historical Relationship between IS and AccountingWilliam S. Remington, Terry L. Fox, Richard Huff. 354 [doi]
- Flexibility of Multiagent Problem-Solving Based on Mutual UnderstandingStefan Kirn, Vijayan Sugumaran. 355 [doi]
- Heidegger's Phenomenology still a 'Preferred Research Approach' for User-Driven Research? The Case of Cultural OrganizationsEmmanuel Monod, Jessie Pallud, Heinz K. Klein. 356 [doi]
- Regulatory Compliance in Information Technology and Information SecurityHerbert J. Mattord, Michael E. Whitman. 357 [doi]
- Designing ThinkLets for ConvergenceAlanah J. Davis, Gert-Jan de Vreede, Robert O. Briggs. 358 [doi]
- Information Technology Sourcing Research: Critique, Lessons and ProspectsLeslie P. Willcocks, Mary Lacity, Sara Cullen. 359 [doi]
- Ten Years of The Philosophical Foundations Mini-Track at AMCIS - Some PatternsDouglas Steel, Jaana Porra, Michael S. Parks. 360 [doi]
- Everyone is Different! Exploring the Issues and Problems with ERP Enabled Shared Service InitiativesDarshana Sedera, Sharmistha Dey. 361 [doi]
- Spatial Technologies: An Evolutionary Framework and Case Study Analysis of Company StrategiesJames B. Pick. 362 [doi]
- Lessons Learned in Health Care Research: Four IS Case StudiesSonja Wiley-Patton, Aisha Malloy, Dorothea Abraham, Stephanie Mills, Suzanne D. Pawlowski, Karen Hare, Sean Lane, Irma Becerra, Bill Sallas. 363 [doi]
- Cross Cultural IS Research Minitrack IntroductionScott McCoy, Jon Heales, Guillermo Rodríguez-Abitia. 364 [doi]
- Web-Coin - Revolutionizing e-Payment in ChinaKuanhai Zhang, Haishan Tian, Jin Zhang, Nanshu Ying. 365 [doi]
- An Integrated Social Actor and Service Oriented Architecture (SOA) Approach for Improved Electronic Health Record (EHR) Privacy and Confidentiality in the US National Healthcare Information Network (NHIN)Elliot Sloane, Gondy Leroy, Steven D. Sheetz. 366 [doi]
- Information Systems Evaluation: Mini-Track IntroductionZahir Irani, Marinos Themistocleous, Peter E. D. Love, Edith Cowan. 367 [doi]
- Understanding IS Impacts in Mandatory Environments: Usage, Compatibility Beliefs, Stress and BurnoutAmy Hennington. 368 [doi]
- Critical Risk Factors in Virtual Software ProjectsApril H. Reed. 369 [doi]
- The Role of Social Capital in Determining BPO OutcomeBiswadip Ghosh. 370 [doi]
- Time for a Change: An Exploration of Information Systems DiscontinuanceBrent Furneaux. 371 [doi]
- The Influence of Top Management Team Characteristics on the Contribution of Enterprise Information Systems to Long-Term Firm PerformanceCarlos Dorantes. 372 [doi]
- The Impact of Computer-Mediated Communications Monitoring on Organizational Communications ContentCarolyn F. Holton. 373 [doi]
- Task Technology Fit, The Social Technical Gap and Social Networking SitesCatherine Dwyer. 374 [doi]
- Ontology Structure of Elements for Web-Based Natural Disaster Management SystemsChen-Hui Chou. 375 [doi]
- Studies in Adaptation to Information Systems: Multiple Roles and Coping StrategiesChristophe M. Elie-Dit-Cosaque. 376 [doi]
- Channel and Recipient Characteristics: Effects on Communication Effectiveness and PerformanceChristopher Scott. 377 [doi]
- Diagnosing and Managing Online B2C Relationships: Toward a B2C Relationship Stage TheoryDamon Campbell. 378 [doi]
- Organizational Standards StrategyDongBack Seo. 379 [doi]
- A Design Theory for Secure Semantic eBusiness ProcessesFergle D'Aubeterre. 380 [doi]
- Three Research Essays on Examining Online Privacy Concerns: The Role of Personal Dispositions, Contexts and Privacy-Assurance FeaturesGaurav Bansal. 381 [doi]
- A Visual Exploration Approach to Project Portfolio ManagementGuangzhi Zheng. 382 [doi]
- Nothing Endures But Change: An Investigation of the Effects of Enterprise Systems Implementation and Business Process Changes on Employees' Work LifeHillol Bala. 383 [doi]
- Decision Support to Improve Service Quality in Demand Surge SituationsHina Arora. 384 [doi]
- The Influence of Computer Mediated Communication on Social Capital: A Disaggregated ApproachIsrar Qureshi. 385 [doi]
- An Investigation of the Effects of ERP Post-Implementation Support Structure on ERP/Business Unit FitJames Worrell. 386 [doi]
- A Study on the Decision to Continue Using a Modeling GrammarJan Recker. 387 [doi]
- Channel and CoordinationCath Oh. 388 [doi]
- Closing the Defect Reduction Gap Between Software Inspection and Test-Driven Development: Applying Mutation Analysis to Iterative Test-First ProgrammingJerod Wilkerson. 389 [doi]
- Exploring the Link Between Knowledge Management Performance and Firm PerformanceJiming Wu. 390 [doi]
- The Implication of Complexity Theory on Real Option Analysis in IT Portfolio ManagementJohn Burke. 391 [doi]
- Tolerance of Escalating Commitment to Troubled ProjectsJonathan Paul. 392 [doi]
- An Exploratory Study on Management of Virtual Teams in Distributed Scrum Software Development Method for Large-Scale and Complex ProjectsJuyun Cho. 393 [doi]
- Sharing Knowledge in Global Virtual Teams: How do Chinese Team Members Perceive the Impact of National Cultural Differences on Knowledge Sharing?Kangning Wei. 394 [doi]
- Information Security Economics: An Investigation of Demand-Driven Innovation and Market ValueLara Khansa. 395 [doi]
- Information Technology's Impact on Cost Management and Control in the Healthcare ContextLorraine Lee. 396 [doi]
- IS Success Model and Perceived IT ValueHo-Chang Chae. 397 [doi]
- A Study of the Nature of the Deaf Effect Response to Bad News ReportingMichael J. Cuellar. 398 [doi]
- Regulatory Impact on IT Governance: A Multiple Case Study on the Sarbanes-Oxley ActMichael Leih. 399 [doi]
- An Empirical Investigation into the Moderating Relationship of Computer Self-Efficacy on Performance in a Computer-Supported TaskMiguel I. Aguirre-Urreta. 400 [doi]
- Mail and the Internet versus The Mall: The Impact of the Local Market Structure on the Internet and Catalog RetailingMohammad Rahman. 401 [doi]
- Internationalization of Mobile Telecommunications Operators: Country Factors, Institutional Distance and Regional EffectsNicolai Pogrebnyakov. 402 [doi]
- Broadband Adoption by SMEs in the United Kingdom (UK)Oluwasola Oni. 403 [doi]
- Commitment, Communication & Connection: Understanding Participation in Online Communities from Multiple PerspectivesPatrick J. Bateman. 404 [doi]
- IT Portfolio Management: An Enterprise Risk Management-Based PerspectivePrasanna P. Karhade. 405 [doi]
- Building Successful Knowledge Repository Systems: Knowledge Refinement, Quality and UsageTingting Rachel Chung. 406 [doi]
- Examining the Dynamics of Managing Information Systems Development Projects: A Control Loss PerspectiveRavi Narayanaswami. 407 [doi]
- Explaining Ethical IT Behavior, Judgment and Awareness Using a Domain Theory ContextRichard Schilavy. 408 [doi]
- IT Service Climate and IT Service QualityRonnie Jia. 409 [doi]
- Linking Perceived Electronic Service Quality and Service Loyalty on the Dimensional Level: An Aspect of Multi-Channel ServicesSamar Swaid. 410 [doi]
- Impact of Service-Oriented Architecture Adoption on Electronic Supply Chain PerformanceSanjeev Kumar. 411 [doi]
- Aligning Information Systems Security and Usability Requirements for Computer-Based Information SystemsSanta Susarapu. 412 [doi]
- Dissemination of Culture in a Networked World: The Influence of Network Structure on the Outcomes of the Axelrod Cultural ModelSascha Vitzthum. 413 [doi]
- A Grounded Theory Investigation of Patient Empowerment in E-HealthcareSherrie Cannoy. 414 [doi]
- Offshore Sourcing DecisionsShirish C. Srivastava. 415 [doi]
- Dissertation Outline: Success Factors of Organizational Relationships Between Business and IT EntitiesStefan Blumenberg. 416 [doi]
- A Business Process Management Perspective on Creativity: Creativity Intensive ProcessesStefan Seidel. 417 [doi]
- Improving Reliability and Power Management of Patient Monitoring Solutions Based on Mobile Ad Hoc NetworksSweta Sneha. 418 [doi]
- Improving Usability of Analysis Sequence Diagram in Transaction-Oriented ApplicationsThant Sin. 419 [doi]
- Click-Tracks: Consumers' Online Information Seeking Behaviors and Their Implications for Seller StrategiesVandana Ramachandran. 420 [doi]
- An Integrative Theoretic Approach to Open Source Software DevelopmentVikram S. Bhadauria. 421 [doi]
- A Reputation-Based Mechanism for Software Vulnerability DisclosureXia Zhao. 422 [doi]
- A Bayesian Network Model of Knowledge-Based AuthenticationYe Chen. 423 [doi]
- Essays on Global Knowledge Management Systems UseYinglei Wang. 424 [doi]
- Negotiating Technology Choice in Groups: The Importance of Shared Realms of ConsiderationAaron Becker. 425 [doi]
- Impact of Knowledge Management Strategy on Organizational Learning: A Simulation StudyAditi Mukherjee. 426 [doi]
- Antecedents and Performance Effects of IT-Business Strategic AlignmentAli Alper Yayla. 427 [doi]
- Building Theory from Practice: Opportunities in IS Project ManagementPeter Reynolds, Philip Yetton. 428 [doi]
- Cultural Barriers/ Enablers in Implementing E-Government Initiatives in MalaysiaStephen Jackson, Meng Seng Wong, George Philip. 429 [doi]
- GIGO or not GIGO: Error Propagation in Basic Information Processing OperationsIrit Askira Gelman. 430 [doi]
- Technology Adoption at the Consumer Level: Focus on Internet Based Communication TechnologyKyootai Lee, Shaji Khan. 431 [doi]
- Voting Early and Often Can Be a Good ThingGerald Post. 432 [doi]
- Selecting While Walking: An Investigation of Aiming Performance in a Mobile Work ContextMartin Schedlbauer, Jesse Heines. 433 [doi]
- A Theoretical Framework for Information Systems Portfolio ManagementBrandis Phillips. 434 [doi]
- Differences in National IT Investment: What Really MattersSusan A. Sherer, Joseph Manzo. 435 [doi]
- Comparing Neural Network, Logistic Regression, and Discriminant Analysis for Knowledge Representation and Classification ExplanationMonica Lam. 436 [doi]
- A Ten-Year Odyssey of the 'IS Productivity Paradox' - A Citation Analysis (1996-2006)Zeying Wan, Yulin Fang, Michael Wade. 437 [doi]
- Why Do Firms Have Information Systems?E. Burton Swanson. 438 [doi]
- Are We There Yet-Seamless Mapping of BPMN to BPEL4WSMarta Indulska, Jan Recker, Peter F. Green, Michael Rosemann. 439 [doi]
- Development of a Primary Health Centre Data Warehouse System for Disease Management in Developing CountriesIyabo Awoyelu, Rhoda Ikono. 440 [doi]
- Adapting the MSIS Curriculum for HealthcareXiaoni Zhang, Ben Martz, Gary Ozanich. 441 [doi]
- Public Sector Innovation and Diffusion Processes: Decentralisation and InnovationBjörn Niehaves. 442 [doi]
- Web-Based Corporate Training in Brazil: An Exploratory Investigation into Key Success FactorsLuiz Antonio Joia. 443 [doi]
- Using Information Systems Theory to Increase IS EnrollmentHope Koch, Timothy R. Kayworth. 444 [doi]
- Collaboration Engineering for Interdisciplinary TeamsJohn Murphy, Gary Ozanich. 445 [doi]
- Perceptions of Information Technology Risk: A Delphi StudyJames Worrell, Ashley A. Bush. 446 [doi]
- Towards an Understanding of the Influence of Organisational Factors on the Cosourcing DecisionMark Borman. 447 [doi]
- An Exploratory Study of Information Systems Resistance: The Case of Mobile Banking Systems in Korea and FinlandCheon-Pyo Lee, Minna Mattila, Jung P. Shim. 448 [doi]
- Context, Process and Outcomes of ISD: An Allegorical TaleMichael Newman. 449 [doi]
- Tying Context to Post-Adoption Behavior with Information Technology: A Conceptual and Operational Definition of MindfulnessNicholas H. Roberts, Jason Thatcher, Richard Klein 0001. 450 [doi]
- Online versus Traditional Classroom Environments: An Exploratory Study of Course CharacteristicsTim Klaus, Chuleeporn Changchit, Florian Heidecke. 451 [doi]
- A Model of Identity Credibility in Virtual Communities: An Elaboration Likelihood Model PerspectiveJie Yu, Zhenhui Jiang, Hock Chuan Chan. 452 [doi]
- Student-Created Screen Capture Videos as a Part of Information Systems Science Course: Learning in the Spirit of YouTubePekka Makkonen. 453 [doi]
- E-Collaboration Within the Dispersed Sales Force Training Process of Multinational Pharmaceutical CompaniesFlorian Heidecke, Andrea Back. 454 [doi]
- A Service Model for the Development of Management Systems for IT-enabled ServicesNico Ebert, Falk Uebernickel, Axel Hochstein, Walter Brenner. 455 [doi]
- Attracting Students to the IS Major: The Role of IT Sophistication in Introductory IS CoursesAsli Yagmur Akbulut, Clayton Arlen Looney. 456 [doi]
- RFID Application in the Food Industry: A Case Study of Korean Food Safety Information Systems ProjectJongtae Yu, Carmen Lewis, Chengqi Guo. 457 [doi]
- Boundaries and Knowledge Contribution in Interorganizational Relationships: A Social Capital PerspectiveAshley A. Bush, Joerg Evermann. 458 [doi]
- Improving Mutual Understanding of Development Artifacts: A Semiotics-Based ApproachJenniifer Ferreira, Robert Crossler, Gary Haggard. 459 [doi]
- Parents and the Internet: Privacy Awareness, Practices and ControlMichael S. Hsiao, France Belanger, Janine S. Hiller, Payal Aggarwal, Karthik Channakeshava, Kaigui Bian, Jung-Min Park 0001. 460 [doi]
- Personal Health Records: Addressing the Consumer NeedsEbrahim Randeree, Melinda Whetstone. 461 [doi]
- Contents of Information Strategies in PracticeAlexander Teubner, Martin Mocker. 462 [doi]
- Facilitating Design Knowledge Management by Tailoring Software Patterns to Organizational RolesRiikka Ahlgren. 463 [doi]
- Requirements Elicitation Technique Selection: A Theory-Based Contingency ModelGeorge M. Marakas, Miguel I. Aguirre-Urreta. 464 [doi]
- RFID and Interorganizational Collaboration: Political and Administrative ChallengesJane Fedorowicz, Janis L. Gogan, Christine B. Williams. 465 [doi]
- Mining Quarterly Reports for Intraday Stock Price TrendsAnna Mironenko, Antonina Durfee. 466 [doi]
- Reconciling IS Strategic Alignment ApproachesYolande Chan, James S. Denford. 467 [doi]
- Medical Material Management Support Using Data Mining and AnalyticsRichard J. Mayer, Madhav Erraguntla. 468 [doi]
- Dioptra: An Ethics Decision Support SystemKieran Mathieson. 469 [doi]
- Measuring Web-based Service Quality: The Online Customer Point of ViewRolf T. Wigand, Samar Swaid. 470 [doi]
- Social Capital in Knowledge Based Business Process OutsourcingJudy E. Scott, Biswadip Ghosh. 471 [doi]
- Human-Centered Decision Aid: Activity Theory, Individual and Collective DecisionFrançois Legras, Frédéric Cadier, John D'Ambra, Gilles Coppin. 472 [doi]
- A Taxonomy of Virtual Information Tasks and e-capability of Visitor Information Centres: An Australian Case StudyNina Mistilis, John D'Ambra. 473 [doi]
- Knowledge Sharing as a Work of Self-Presentation: A Phenomenological Study in Knowledge Management SystemsMei-Lien Young, Feng-Yang Kuo. 474 [doi]
- User Acceptance of Hedonic Information Technologies: A Perceived Value PerspectiveAlexander Serenko, Ofir Turel, Nick Bontis. 475 [doi]
- Banking Regulatory Response - The Case of Strong AuthenticationPaul Witman. 476 [doi]
- Service Responsibility Tables: A New Tool for Analyzing and Designing SystemsSteven Alter. 477 [doi]
- Fun, Simple and Instructive: Towards a Design Theory for a Constructivist Gaming Learning EnvironmentRoberto Muñoz Rosario, George R. Widmeyer. 478 [doi]
- Investigating Data Integration Using Sequence Analysis and Process TrackingJoerg Evermann. 479 [doi]
- Consumer's Initial Acceptance of E-Commerce Website: A Contingency ApproachRui Chen. 480 [doi]
- Online Communication & Baby Boomers: Current Use, Preferences, and Future ExpectationsDavid Gurzick, A. Ozok, Barbara Morris. 481 [doi]
- Managing the Dark Side of Computer Use at Work: A Typology of Information Technology Abuse and Management StrategyMatt Campbell, Ying Lu. 482 [doi]
- Uses of Social Software in Personal and Organizational SettingsRachael Kwai Fun Ip. 483 [doi]
- Application of GIS for Mapping Oil-Contaminated Soil in KuwaitWaleed Roy, Samira Asem. 484 [doi]
- Understanding Internet Banking: An Empirical Investigation of Potential Customers' Acceptance in Mainland ChinaZhangxi Lin, Weiling Ke, Bingjia Shao, Linhua Yang. 485 [doi]
- TQM in IS?: The Case of a Government Agency in SingaporeMichael T. K. Tan, Hung-Pheng Tan, Nian-Jin Lee. 486 [doi]
- Good CARMA for the High PlainsAlexandre V. Latchininsky, Scott P. Schell, John D. Hastings. 487 [doi]
- The Impact of Information Technology Innovation on Firm PerformanceNamchul Shin. 488 [doi]
- Voice over Internet Protocol (VoIP) in the Emergency Department (ED): A Process InnovationPeter Marks, Kenneth Jones, Michael Hilliard, Bruce Adams, Stephen Sample. 489 [doi]
- Attractiveness of Open Source Projects: A Path to Software QualityKay Nelson, Carlos Santos. 490 [doi]
- Strategic Planning for Enterprise Mobility: A Readiness-Centric ApproachRahul C. Basole. 491 [doi]
- A Qualitative Analysis of Computing Students' Professional Identity and its Relationship to Strategies for Coping with Stressors in the Computing DisciplinesK. Vernard Harrington, Tracy Lewis, Wanda J. Smith, France Belanger. 492 [doi]
- Do Task Complexity and Knowledge Recency Affect Knowledge Reuse? Implications for Knowledge Management EffortsSuryanarayanan Ravindran, Govind S. Iyer. 493 [doi]
- A Study on the Impact of Values on the Open Source Design Decision-making ProcessBryan Hosack, Glen W. Sagers. 494 [doi]
- Integration of a Business Rules Engine to Manage Frequently Changing Workflow: A Case Study of Insurance Underwriting WorkflowGeorge Royce. 495 [doi]
- IT Offshore Outsourcing: Contingency and StrategiesRui Chen, Rajiv Kishore. 496 [doi]
- Is Offshore Sourcing Decision a Strategic Response to Declining Firm Performance?Shirish C. Srivastava, Thompson S. H. Teo, Partha S. Mohapatra. 497 [doi]
- Exploration vs. Exploitation: An IT Dilemma?Nitin Walia, Peter Haried. 498 [doi]
- Exploring the Value Structure Behind Mobile Auction Adoption IntentionYa Tang, Paul W. Forster. 499 [doi]
- Establishment of a Database System for the Environmental Rehabilitation of KuwaitWaleed Roy, Adel Asem. 500 [doi]
- The Adoption of Open Source Desktop Software in a Large Public AdministrationKris Ven, Philip Huysmans, Jan Verelst. 501 [doi]
- IT expenditure in a Dutch HospitalRonald Spanjers. 502 [doi]
- Global Diffusion on the Internet: The Case of UgandaMoses Niwe, Victor Mbarika, Kibily Samake, Micheal Niyitegeka. 503 [doi]
- Optimizing U.S. Health Care Processes - A Case Study in Business Process ManagementJörg Becker, Robin Fischer, Christian Janiesch. 504 [doi]
- Identification of Customer Value of Healthcare Services in TaiwanWan-I Lee, Bih-Yaw Shih, Harm Scherpbier. 505 [doi]
- Community Response Grids for Older Adults: Motivations, Usability, and SociabilityPhilip Fei Wu, Jenny Preece, Ben Shneiderman, Paul T. Jaeger, Yan Qu. 506 [doi]
- Dynamic Alignment of ERP Systems and their Documentations - An Approach for Documentation Quality ImprovementRalf Knackstedt, Axel Winkelmann, Jörg Becker. 507 [doi]
- Knowledge Transfer in Information Systems Research: State of the Art of and Perspectives for Internet Literature ServicesRalf Knackstedt, Axel Winkelmann, Robert Braun. 508 [doi]
- Multi-dimensional Data Visualization Techniques for Exploring Financial Performance DataDorina Marghescu. 509 [doi]
- Enabling Efficient and Privacy-friendly Location-based Services with Standardized Intermediary InfrastructuresTobias Scherner. 510 [doi]
- A Study of Global Marketing Strategies of Taiwan's Personal Computer Industry - Based on the National Culture Dimensions of HofstedeChristina Ling-Hsing Chang, I.-Chun Lin, He Yan. 511 [doi]