Abstract is missing.
- Understanding the Roles of Knowledge Sharing and Trust in Online Learning CommunitiesBrian Thoms, Nathan Garrett, Jesus Canelon Herrera, Terry Ryan. 3 [doi]
- The Power of We: Using Instant Messaging for Student Group Project DiscussionAaron X. L. Shen, Christy M. K. Cheung, Matthew K. O. Lee, Weiping Wang. 4 [doi]
- Can Peer-to-Peer Networks Facilitate Information Sharing in Collaborative Learning?Fu-ren Lin, Sheng-cheng Lin, Ying-fen Wang. 5 [doi]
- Support of Case-Based Authentic Learning Activities: A Collaborative Case Commenting Tool and a Collaborative Case BuilderLu Xiao, John M. Carroll, Pat Clemson, Mary Beth Rosson. 6 [doi]
- Engaging E-Learning in Virtual Worlds: Supporting Group CollaborationKatherine G. Franceschi, Ronald M. Lee, David Hinds. 7 [doi]
- A Dyadic Model of Interorganizational Systems (IOS) Adoption MaturityMazen Ali, Sherah Kurnia, Robert B. Johnston. 9 [doi]
- The Impact of Cultural Diversity on Global Virtual Team Collaboration A Social Identity PerspectiveYu-Ting Caisy Hung, Mary Thi Thao Duyen Nguyen. 10 [doi]
- Interorganizational Collaboration in Supply Chain Management: What Drives Firms to Share Information with Their Trading Partners?Maria Madlberger. 11 [doi]
- Determinants of IT Outsourcing Relationships: A Conceptual ModelStefan Blumenberg, Daniel Beimborn, Wolfgang König. 12 [doi]
- A Cross-Cultural Investigation of the Goal-Attainment-Likelihood Construct and Its Effect on Satisfaction with Technology Supported CollaborationBruce A. Reinig, Robert O. Briggs, Gert-Jan de Vreede. 13 [doi]
- Occurrence and Effects of Leader Delegation in Virtual TeamsSuling Zhang, Marilyn Tremaine, Richard Egan, Allen E. Milewski, Linda Plotnick, Patrick O Sullivan, Jerry Fjermestad. 14 [doi]
- A Prototype System for Exploring Disagreement in Group DecisionPaulo Melo, João Paulo Costa. 16 [doi]
- Best Practices for International eSourcing of Software Products and ServicesTimo Käkölä. 17 [doi]
- Changing Large-Scale Collaborative Spaces: Strategies and ChallengesTorstein Hjelle, Gasparas Jarulaitis. 18 [doi]
- Developing a Workflow Design Framework Based on Dataflow AnalysisSherry X. Sun, J. Leon Zhao. 19 [doi]
- Participant-Driven Collaborative ConvergenceJoel H. Helquist, John Kruse, Mark Adkins. 20 [doi]
- Role Separation in Strategies for Collaboration SupportGwendolyn L. Kolfschoten, Fred Niederman, Robert O. Briggs, Gert-Jan de Vreede. 21 [doi]
- The Organizing Pattern of Interaction: A Knowledge Centric ApproachDouglas A. Druckenmiller. 22 [doi]
- Virtual Communities for Innovations: Users Requirements for the Development of an Academic SAP User GroupWinfried Ebner, Ulrich Bretschneider, Jan Marco Leimeister, Helmut Krcmar. 23 [doi]
- WikiWinWin: A Wiki Based System for Collaborative Requirements NegotiationDa Yang, Di Wu, Supannika Koolmanojwong, A. Winsor Brown, Barry W. Boehm. 24 [doi]
- A Decision Analysis Framework for Emergency NotificationZhengchuan Xu, Yufei Yuan, Shaobo Ji. 26 [doi]
- Design and Development of a Virtual Emergency Operations Center for Disaster Management Research, Training, and DiscoveryIrma Becerra-Fernandez, Gregory R. Madey, Michael Prietula, Domingo Rodríguez, Ricardo Valerdi, Timothy Wright. 27 [doi]
- Coordination and Its ICT support in Crisis Response: Confronting the Information-Processing View of Coordination with a Case StudyRafael A. Gonzalez. 28 [doi]
- Leadership Roles and Communication Issues in Partially Distributed Emergency Response Software Development Teams: A Pilot StudyLinda Plotnick, Rosalie J. Ocker, Starr Roxanne Hiltz, Mary Beth Rosson. 29 [doi]
- Online Purchasing of Simple Retail Goods: The Impact of e-Service Quality as Provided by Electronic Commerce FunctionalitiesPierre Hadaya, Jean Éthier. 31 [doi]
- A Conceptual Model of Wiki Technology DiffusionAndrea J. Hester, Judy E. Scott. 32 [doi]
- Online Services, Customer Characteristics and Usability RequirementsAnne P. Massey, Vijay Khatri, Mitzi M. Montoya-Weiss. 33 [doi]
- Using Surprise in Human-Computer Interfaces to Enhance Knowledge Communication EffectivenessNed Kock, Ruth Chatelain-Jardón, Jesus Carmona. 34 [doi]
- An Empirical Investigation of the Roles of Outcome Controls and Psychological Factors in Collaboration Technology Supported Virtual TeamsFang He, Souren Paul. 35 [doi]
- Generating an Abstract User Interface from a Discourse Model Inspired by Human CommunicationCristian Bogdan, Jürgen Falb, Hermann Kaindl, Sevan Kavaldjian, Roman Popp, Helmut Horacek, Edin Arnautovic, Alexander Szep. 36 [doi]
- Quantitative Early-Phase User Research Methods: Hard Data for Initial Product DesignChristopher N. Chapman, Edwin Love, James L. Alford. 37 [doi]
- Some Implications of Comparing Brain and Computer ProcessingBrian Whitworth. 38 [doi]
- Effective Use of Collaborative IT Tools: Nature, Antecedents, and ConsequencesPaul A. Pavlou, Angelika Dimoka, Thomas J. Housel. 40 [doi]
- Exploring the Concept of Para Social Presence in Virtual Project TeamsEric Tze Kuan Lim, Yu-Ting Caisy Hung. 41 [doi]
- An Interview Protocol for Discovering and Assessing Collaboration Engineering OpportunitiesRobert O. Briggs, Alanah J. Davis, John D. Murphy. 42 [doi]
- A Mobile System and Application for Facilitating Emotional Awareness in Knowledge Work TeamsTimo Saari, Kari Kallinen, Mikko Salminen, Niklas Ravaja, Kliment Yanev. 44 [doi]
- Technology s Transformative Effects on When, Where and How Individuals Work: A Grounded-Narrative ApproachDavid J. Pauleen, Brian M. Harmer. 45 [doi]
- M-Fieldwork for Information Systems StudentsLaurel Evelyn Dyson, Elaine Lawrence, Andrew Litchfield, Agnieszka Zmijewska. 46 [doi]
- Place as Adoption Moderating Factor - Usage Implications for Mobile Data ServicesHomer Papadopoulos. 47 [doi]
- Mobile Advertising in Different Stages of Development: A Cross-Country Comparison of Consumer AttitudesParissa Haghirian, Maria Madlberger, Akihiro Inoue. 48 [doi]
- Smartphones Enabling Mobile CollaborationBettina Beurer-Zuellig, Miriam Meckel. 49 [doi]
- Bidder Valuation of Bundles in Combinatorial AuctionsSoumyakanti Chakraborty, Anup K. Sen, Amitava Bagchi. 51 [doi]
- Situated Decision Support for Managing Service Level Agreement NegotiationsRustam M. Vahidov, Dirk Neumann. 52 [doi]
- Preparing a Negotiated R&D Portfolio with a Prediction MarketCédric Gaspoz, Yves Pigneur. 53 [doi]
- What Happened to Cross-Cultural Dyadic E-Negotiation?Hsiangchu Lai, Wan-Jung Lin, Juin-Yi Lin. 54 [doi]
- The Impact of Cognitive Styles on Users Future Intention to Use E-Negotiation SystemsHer-Sen Doong, Hui-Chih Wang. 55 [doi]
- How Does Collaborative Group Technology Influence Social Network Structure?Mark Keith, Haluk Demirkan, Michael Goul. 57 [doi]
- Distributed Innovation in Classes of NetworksYoungjin Yoo, Kalle Lyytinen, Richard J. Boland Jr.. 58 [doi]
- Cooperation and Coordination in Decentralized Communication NetworksDevan Rosen. 59 [doi]
- Social Network Analysis as a Tool to Evaluate the Effectiveness of EC Funded Networks of Excellence: The Case of DEMO-netKathy Buckner, Peter Cruickshank. 60 [doi]
- The Effect of Internet Usage on Interpersonal Relationships: A Case StudySusan Bastani, Maryam Fazel-Zarandi. 61 [doi]
- A Cyc-Based Multi-agent SystemJingwen He, Hokyin Lai, Huaiqing Wang. 63 [doi]
- A Genetic Algorithm for the Two Machine Flow Shop ProblemKumar Adusumilli, Doina Bein, Wolfgang W. Bein. 64 [doi]
- Urban Traffic Signal Control Based on Distributed Constraint SatisfactionKazunori Mizuno, Yukio Fukui, Seiichi Nishihara. 65 [doi]
- A Two-Level Parallel Genetic Algorithm for the Uncapacitated Warehouse Location ProblemJörg Homberger, Hermann Gehring. 67 [doi]
- The Economic Production Quantity Problem with a Finite Production Rate and Fuzzy Cycle TimeKaj-Mikael Björk. 68 [doi]
- An Optimal Decision Making Model for Supplier and Buyer s Win-Win Strategy in a Two Echelon Supply ChainGeon Cho, Soon-Hoo So, Jae Jon Kim, Yi Sook Park, Hyong Ho Park, Kyung Ho Jung, Choon-Sup Noh. 69 [doi]
- Consensual Dynamics in Group Decision Making with Triangular Fuzzy NumbersMario Fedrizzi, Michele Fedrizzi, Ricardo A. Marques Pereira, Matteo Brunelli. 70 [doi]
- Decision-Guidance Management Systems (DGMS): Seamless Integration of Data Acquisition, Learning, Prediction and OptimizationAlexander Brodsky, Xiaoyang Sean Wang. 71 [doi]
- Development and Evaluation of an Intelligent Fleet Management System for City LogisticsVasileios Zeimpekis, George M. Giaglis, Ioannis Minis. 72 [doi]
- Combining RFID Technology and Business Intelligence for Supply Chain Optimization Scenarios for Retail LogisticsHenning Baars, Hans-Georg Kemper, Heiner Lasi, Marc Siegel. 73 [doi]
- Service Composition Language to Unify Simulation and Optimization of Supply ChainsAlexander Brodsky, Malak Al-Nory, Hadon Nash. 74 [doi]
- Intelligence Database Creation and Analysis: Network-Based Text Analysis versus Human CognitionJohn M. Graham, Kathleen M. Carley, Drew Cukor. 76 [doi]
- Organization-Ontology Based Framework for Implementing the Business Understanding Phase of Data Mining ProjectsSumana Sharma, Kweku-Muata Osei-Bryson. 77 [doi]
- A Case Study of Core Vector Machines in Corporate Data MiningStefan Lessmann, Ning Li, Stefan Voß. 78 [doi]
- Toward a Comprehensive Model in Internet Auction Fraud DetectionBin Zhang, Yi Zhou, Christos Faloutsos. 79 [doi]
- Exploration of Feature Selection and Advanced Classification Models for High-Stakes Deception DetectionChristie M. Fuller, David P. Biros, Dursun Delen. 80 [doi]
- Investigation of Factors That Have Impacts on Usage Increase and Decrease of Mobile Data ServiceSang-Hoon Lee, Bongsik Shin, Ho Geun Lee. 82 [doi]
- Lost Opportunity - Why Has Dominant Design Failed to Emerge for the Mobile Payment Services Market in Finland?Tomi Dahlberg, Milla Huurros, Antti Ainamo. 83 [doi]
- Are Mobile Payment and Banking the Killer Apps for Mobile Commerce?Xianpei Hu, Wenli Li, Qing Hu. 84 [doi]
- Emergent Distributed Narratives in Spatiotemporal Mobility: An Exploratory Study on Mobile 2.0 ServicesYoungjin Yoo, Iis P. Tussyadiah, Daniel R. Fesenmaier, Timo Saari, Ingvar Tjøstheim. 85 [doi]
- Making the Fun of Fishing Legal with Mobile Value ServicesChrister Carlsson, Arild Havnen, Pirkko Walden. 86 [doi]
- Global Optimization of Water Distribution SystemsKaj-Mikael Björk, Lazaros G. Papageorgiou. 88 [doi]
- Optimizing the Supplier Selection and Service Portfolio of a SOA Service IntegratorJan Christian Lang, Thomas Widjaja, Peter Buxmann, Wolfgang Domschke, Thomas Hess. 89 [doi]
- Online Grocery Order Fulfillment TradeoffsJudy E. Scott, Carlton H. Scott. 90 [doi]
- Supply Chain Coordination Using Returns Policy with Sales Rebate and Penalty under Effort and Price Dependent DemandYong He, Lindu Zhao, Ju He. 91 [doi]
- Risk-Constrained Generation Asset Scheduling for Price-Takers in the Electricity MarketsJianhui Wang. 92 [doi]
- A Real-Options Approach to Modeling Investments in Competitive, Dynamic Retail MarketsBaabak Ashuri, William B. Rouse, Douglas A. Bodner. 93 [doi]
- A Semantic Web Services-Based Architecture for Model Management SystemsAmit V. Deokar, Omar F. El-Gayar. 95 [doi]
- Integration Testing of Composite ApplicationsLiam Peyton, Bernard Stepien, Pierre Seguin. 96 [doi]
- Using k-Pricing for Penalty Calculation in Grid MarketMichael Becker, Nikolay Borrisov, Vikas Deora, Omer F. Rana, Dirk Neumann. 97 [doi]
- Business Process Modeling: A Service-Oriented ApproachCorine Cauvet, Gwladys Guzelian. 98 [doi]
- Business-Oriented Development Methodology for IT Service ManagementKevin Jin, Pradeep Ray. 99 [doi]
- Exploring Barriers to Innovation Diffusion in Health Care Service Organizations: An Issue for Effective Integration of Service Architecture and Information TechnologiesTugrul U. Daim, R. Tarcan Tarman, Nuri Basoglu. 100 [doi]
- Exploring the Service-Oriented Enterprise: Drawing Lessons from a Case StudyMarijn Janssen. 101 [doi]
- Formal Foundation of Workflow Hyperpaths and a Graph Search Algorithm for Workflow Hyperpath GenerationSinnakkrishnan Perumal, Ambuj Mahanti. 102 [doi]
- The Service System Is the Basic Abstraction of Service ScienceJim Spohrer, Stephen L. Vargo, Nathan Caswell, Paul P. Maglio. 104 [doi]
- Reference Models and Modeling Languages for Product-Service Systems - Status-Quo and Perspectives for Further ResearchJörg Becker, Daniel Beverungen, Ralf Knackstedt. 105 [doi]
- Bridging the Front Stage and Back Stage in Service System DesignRobert J. Glushko, Lindsay Tabas. 106 [doi]
- Toward a Ubiquitous Personalized Daily-Life Activity Recommendation Service with Contextual Information: A Services Science PerspectiveChen-Ya Wang, Yueh-Hsun Wu, Seng-cho Timothy Chou. 107 [doi]
- The Design of an Accountability Framework for Service EngineeringKwei-Jay Lin. 108 [doi]
- Using Process Models for the Design of Service-Oriented Architectures: Methodology and E-Commerce Case StudyOliver Thomas, Katrina Leyking, Florian Dreifus. 109 [doi]
- Towards a Framework for Evaluating Immersive Business Models: Evaluating Service Innovations in Second LifeHenry M. Kim, Kelly A. Lyons, Mary Ann Cunningham. 110 [doi]
- The Critical Issues about Deploying RFID in Healthcare Industry by Service PerspectiveChing-Huan Kuo, Houn-Gee Chen. 111 [doi]
- Collaborative Continuous Service Engineering: A Case Study in a Financial Service EnvironmentRyan Riordan, Benjamin Blau, Dirk Neumann, Christof Weinhardt. 112 [doi]
- A Lifecycle Approach towards Business Rules ManagementMatthew L. Nelson, Robert L. Rariden, Ravi Sen. 113 [doi]
- Towards Service Engineering: Service Orientation and Business-IT AlignmentHong-Mei Chen. 114 [doi]
- Service-Oriented Resource ManagementJürgen Dorn, Hannes Werthner. 115 [doi]
- Design of Service Systems under Variability: Research IssuesP. K. Kannan, João F. Proença. 116 [doi]
- Service Systems as Customer-Intensive Systems and Its Implications for Service Science and EngineeringClaudio S. Pinhanez. 117 [doi]
- Evolution and Maintenance of SOA-Based Systems at SASMira Kajko-Mattsson, Grace A. Lewis, Dennis B. Smith. 119 [doi]
- Formalizing the Role of Goals in the Development of Domain-Specific Ontological FrameworksFaezeh Ensan, Weichang Du. 120 [doi]
- Web-Based Service Exchange System for Agents and Humans AlikeEvens Jean, Machigar Ongtang, Ali R. Hurson. 121 [doi]
- Transcending the Digital Divide: A Framing Analysis of Information and Communication Technologies News in Native American Tribal NewspapersSajda Qureshi, Teresa Trumbly-Lamsam. 124 [doi]
- Digital Usage Behavior: A Sense Making PerspectiveJames B. Freedman, John C. Henderson. 125 [doi]
- Factors Influencing Users Intentions to Make the Web Accessible to People with DisabilitiesKarine Barzilai-Nahon, Izak Benbasat, Nancy Lou. 126 [doi]
- Understanding the Factors Influencing the Attitude Toward and the Use of Mobile Technology in Developing Countries: A Model of Cellular Phone Use in GuineaBangaly Kaba, Koffi N Da, Victor Wacham A. Mbarika. 127 [doi]
- Connecting Communities of Need with Public Health: Can SMS Text-Messaging Improve Outreach Communication?Elizabeth Avery Gomez. 128 [doi]
- Rethinking the Digital Divide: Towards a Path of Digital EffectivenessCorlane Barclay, Evan W. Duggan. 129 [doi]
- Using Visual Features for Fine-Grained Genre Classification of Web PagesRyan Levering, Michal Cutler, Lei Yu. 131 [doi]
- Examining Variations of Prominent Features in Genre ClassificationYunhyong Kim, Seamus Ross. 132 [doi]
- An Examination of Genre Attributes for Web Page ClassificationLei Dong, Carolyn R. Watters, Jack Duffy, Michael A. Shepherd. 133 [doi]
- Cross-Language Information Retrieval by Domain Restriction Using Web Directory StructureFuminori Kimura, Akira Maeda, Kenji Hatano, Jun Miyazaki, Shunsuke Uemura. 135 [doi]
- An Evaluation of How Search Engines Respond to Greek Language QueriesEfthimis N. Efthimiadis, Nicos Malevris, Apostolos Kousaridas, Alexandra Lepeniotou, Nikos Loutas. 136 [doi]
- Document Retrieval Using Proximity-Based Phrase SearchingKathryn Patterson, Carolyn R. Watters, Michael A. Shepherd. 137 [doi]
- Relationship between Uncertainty and Patterns of Pre-purchase Consumer Search in Electronic MarketsTheresa Lauraeus-Niinivaara, Timo Saarinen, Anne Sunikka, Anssi Öörni. 138 [doi]
- Video Content Description Using Fuzzy Spatio-temporal RelationsArchana M. Rajurkar, R. C. Joshi, Santanu Chaudhary. 139 [doi]
- Automatic New Topic Identification in Search Engine Transaction Logs Using Multiple Linear RegressionSeda Ozmutlu, Huseyin Cenk Ozmutlu, Amanda Spink. 140 [doi]
- A Context-Aware Approach Enhancing XML Semantics IntegrationDershing Luo, Ching-Cha Hsieh. 142 [doi]
- On Structural Analysis of Large NetworksNurcan Yuruk, Xiaowei Xu, Thomas A. J. Schweiger. 143 [doi]
- Television-Mediated Conversation: Coherence in Italian iTV SMS ChatAsta Zelenkauskaite, Susan C. Herring. 145 [doi]
- Cues to Deception in Online Chinese GroupsLina Zhou, Yu-wei Sung. 146 [doi]
- Communicators Perceptions of Social Presence as a Function of Avatar Realism in Small Display Mobile Communication DevicesSin-Hwa Kang, James H. Watt, Sasi Kanth Ala. 147 [doi]
- Social Exchange Online: Public Conversations in the BlogosphereMichael Stefanone, Chyng-Yang Jang. 148 [doi]
- Exploring the Corporate Blogosphere: A Taxonomy for Research and PracticeNicholas S. Lockwood, Alan R. Dennis. 149 [doi]
- Online Gestures: Icon Use by Fan Communities on LiveJournalClaudia Rebaza. 150 [doi]
- Venice, California and World of Warcraft: Persistence and Ephemerality in Playful SpacesSilvia Lindtner, Bonnie A. Nardi. 151 [doi]
- Mobile Social Networking: An Information Grounds PerspectiveScott Counts, Karen E. Fisher. 153 [doi]
- Prototyping a Community-Generated, Mobile Device-Enabled Database of Environmental Impact Reviews of Consumer ProductsBill Tomlinson. 154 [doi]
- Smarter Blogroll: An Exploration of Social Topic Extraction for Manageable BlogrollsEric Baumer, Danyel Fisher. 155 [doi]
- Structure and Network in the YouTube CoreJohn C. Paolillo. 156 [doi]
- Scaling Consensus: Increasing Decentralization in Wikipedia GovernanceAndrea Forte, Amy Bruckman. 157 [doi]
- Information Sharing and Patterns of Social Interaction in an Enterprise Social Bookmarking ServiceYing Xin Pan, David R. Millen. 158 [doi]
- Harry Potter and the Meat-Filled Freezer: A Case Study of Spontaneous Usage of Visualization ToolsFernanda B. Viégas, Martin Wattenberg, Matthew M. McKeon, Frank van Ham, Jesse Kriss. 159 [doi]
- Tag Clouds: Data Analysis Tool or Social Signaller?Marti A. Hearst, Daniela Karin Rosner. 160 [doi]
- Distributed State Estimator - Advances and DemonstrationA. P. Sakis Meliopoulos, George J. Cokkinides, Floyd Galvan, Bruce Fardanesh. 163 [doi]
- Issues Related to the Implementation of Synchrophasor MeasurementsMiroslav Begovic, Damir Novosel, Branislav Djokic. 164 [doi]
- North American SynchroPhasor InitiativeJ. E. Dagle. 165 [doi]
- Advanced Sensitivity Analysis for Long-Range Transmission Expansion PlanningScott R. Dahman, Donald J. Morrow, Keith Tynes, James D. Weber. 166 [doi]
- Smart Action: A Tool to Help Power System RestorationJorge Figueiredo, Jacques Philippe Sauvé, Pedro Nicolletti, Eloi Rocha, Sérgio Araújo, Fructuoso Amorim, Anderson Feitosa, Ronaldo Agra, Willames Ribeiro. 167 [doi]
- Contouring for Power Systems Using Graphical Processing UnitsJoseph Euzebe Tate, Thomas J. Overbye. 168 [doi]
- Temporal and Spatial Requirements for Optimized Fault LocationMladen Kezunovic, Maja Knezev. 169 [doi]
- Fast Algorithms for Detecting Circular VAR Flows in Large Power-Flow ModelsYonghong Chen, Xing Liu, Vaithianathan Venkatasubramanian. 170 [doi]
- Reference Values for Dynamic Calibration of PMUsGerard Stenbakken, Tom Nelson, Ming Zhou, Virgilio Centeno. 171 [doi]
- A Market Mechanism for Energy Allocation in Micro-CHP GridsCarsten Block, Dirk Neumann, Christof Weinhardt. 172 [doi]
- Agent-Based Electricity Balancing with Distributed Energy Resources, A Multiperspective Case StudyKoen Kok, Zsófia Derzsi, Jaap Gordijn, Maarten Hommelberg, Cor Warmer, René Kamphuis, Hans Akkermans. 173 [doi]
- An Integrated Architecture for Demand Response Communications and ControlMichael LeMay, Rajesh Nelli, George Gross, Carl A. Gunter. 174 [doi]
- Testing the Performance of a Forward Capacity Market with Barriers to EntryTimothy D. Mount, Surin Maneevitjit. 175 [doi]
- A Leader-Follower Computational Learning Approach to the Study of Restructured Electricity Markets: Investigating Price CapsKurian K. Tharakunnel, Siddhartha Bhattacharyya. 176 [doi]
- Spatial Arbitrage to Reduce Seams across Electricity System Control Areas: An Experimental AnalysisRichard E. Schuler. 177 [doi]
- Reducing the Variability of Wind Power Generation for Participation in Day Ahead Electricity MarketsC. Lindsay Anderson, Judith B. Cardell. 178 [doi]
- Electricity Load and Carbon Dioxide Emissions: Effects of a Carbon Price in the Short TermAdam Newcomer, Seth Blumsack, Jay Apt, Lester B. Lave, M. Granger Morgan. 179 [doi]
- Valuation of Reserve ServicesPablo A. Ruiz, Peter W. Sauer. 180 [doi]
- Evaluating the Effect of Upgrade, Control and Development Strategies on Robustness and Failure Risk of the Power Transmission GridDavid E. Newman, Benjamin A. Carreras, Vickie E. Lynch, Ian Dobson. 182 [doi]
- Generating Random Topology Power GridsZhifang Wang, Robert J. Thomas, Anna Scaglione. 183 [doi]
- Power System Extreme Event Detection: The Vulnerability FrontierBernard C. Lesieutre, Ali Pinar, Sandip Roy. 184 [doi]
- A Centrality Measure for Electrical NetworksPaul Hines, Seth Blumsack. 185 [doi]
- Monitoring of Power System Dynamic Behavior Using Characteristic Ellipsoid MethodYuri V. Makarov, Carl H. Miller, Tony B. Nguyen. 186 [doi]
- A Kalman-Based Coordination for Hierarchical State Estimation: Agorithm and AnalysisSaman A. Zonouz, William H. Sanders. 187 [doi]
- Engaging and Informing Citizens with Household IndicatorsJanet Davis. 190 [doi]
- Drop-Down Democracy: Internet Portal Design Influences Voters Search StrategiesScott P. Robertson, Christine E. Wania, George Abraham, Sang Joon Park. 191 [doi]
- InterDataNet: Interoperability Framework to Support Collaborative Creation and Management of Official Documents in e-Government ProcessesFranco Pirri, Michela Paolucci, Davide Chini, Maria Chiara Pettenati, Samuele Innocenti. 193 [doi]
- Conceiving Interoperability between Public Authorities - A Methodical FrameworkJörg Ziemann, Thomas Matheis, Dirk Werth. 194 [doi]
- Interoperability Registries in eGovernment: Developing a Semantically Rich Repository for Electronic Services and Documents of the New Public AdministrationYannis Charalabidis, Dimitris Askounis. 195 [doi]
- Causal Structure, Endogeneity, and the Missing Data Problem in Modeling the Impact of Information and Communication Technology (E-Government) Use: Theoretical and Methodological ChallengesHun Myoung Park. 196 [doi]
- Current Practices in Field Force Automation: Decision Support and Information Management for the Field ForceGwen Trentham, Hans Jochen Scholl. 197 [doi]
- Learning Object Development and Repository Design for Digital Government InstructionNathan Botts, Benjamin L. Schooley, Thomas A. Horan. 198 [doi]
- High-Level Factors Affecting Global Availability of Online Government ServicesKathleen M. Boyer-Wright, Jeffrey E. Kottemann. 199 [doi]
- Tools for Rules: Technology Transfer and Electronic RulemakingStuart W. Shulman, Namhee Kwon, Eduard H. Hovy, Emily Huisman. 200 [doi]
- An Exploratory Framework for Future E-Government Research InvestmentsSharon S. Dawes. 201 [doi]
- A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network AttacksIosif-Viorel Onut, Ali A. Ghorbani. 203 [doi]
- Internet Privacy in E-Commerce: Framework, Review, and Opportunities for Future ResearchJ. Efrim Boritz, Won Gyun No, R. P. Sundarraj. 204 [doi]
- Cyber Security and Government Fusion CentersNatalie Granado, Gregory White. 205 [doi]
- Pandemic Influenza, Worker Absenteeism and Impacts on Freight TransportationDean A. Jones, Linda K. Nozick, Mark A. Turnquist, William J. Sawaya. 206 [doi]
- Performance Monitoring and Accountability through Technology: E-government in GreeceDimitra I. Petrakaki, Niall Hayes, Lucas D. Introna. 208 [doi]
- Management of Technochange in an Interorganizational E-government ProjectAndreas Nilsson. 209 [doi]
- An Exploratory Approach for Benefits Management in e-Government: Insights from 48 Norwegian Government Funded ProjectsLeif Skiftenes Flak, Tom R. Eikebrokk, Willy Dertz. 210 [doi]
- Governance Structures in Cross-Boundary Information Sharing: Lessons from State and Local Criminal Justice InitiativesTheresa A. Pardo, José Ramón Gil-García, G. Brian Burke. 211 [doi]
- An Empirical Examination of Open Standards DevelopmentRajiv C. Shah, Jay P. Kesan. 212 [doi]
- Research on Constraints in Anti-Money Laundering (AML) Business Process in China Based on Theory of ConstraintsXuan Liu, Pengzhu Zhang. 213 [doi]
- An Activity-Based Approach towards Development and Use of E-Government Service OntologiesRalf Klischewski, Stefan Ukena. 215 [doi]
- Antecedents to E-File Adoption: The U.S. PerspectiveLemuria Carter, Ludwig Schaupp, Allison Evans. 216 [doi]
- Building Citizen Trust towards E-Government Services: Do High Quality Websites Matter?Chee-Wee Tan, Izak Benbasat, Ronald T. Cenfetelli. 217 [doi]
- Measuring Factors that Influence the Success of E-Government InitiativesRonnie Park. 218 [doi]
- The Use of the UTAUT Model in the Adoption of E-Government Services in KuwaitSuha AlAwadhi, Anne Morris. 219 [doi]
- Needs Driven Design for eGovernment Value WebsPetra Wolf, Helmut Krcmar. 220 [doi]
- The Futures of EU-Based eGovernment: A Scenario-Based ExplorationPatrick van der Duin, Noor Huijboom. 221 [doi]
- Future e-Government Research: 13 Research Themes Identified in the eGovRTD2020 ProjectMaria Wimmer, Cristiano Codagnone, Marijn Janssen. 223 [doi]
- Citizens Concerns about the Privacy of Personal Information Held by Government: A Comparative Study, Japan and New ZealandRowena Cullen. 224 [doi]
- An Analysis of Korean National Information Strategy of IT839Dong-Hee Shin, Won-Yong Kim. 225 [doi]
- The Impact of Directionality in Predications on Text MiningGondy Leroy, Marcelo Fiszman, Thomas C. Rindflesch. 228 [doi]
- RFLP-WAVE Analysis for Rapid Identification of Medically Important FungiDhundy Bastola, Sarfraz H. Chandio, Peter Iwen, Steven H. Hinrichs, Hesham H. Ali. 229 [doi]
- Tree Mining in Mental Health DomainMaja Hadzic, Fedja Hadzic, Tharam S. Dillon. 230 [doi]
- Stratified Modelling and Analysis of Confidentiality RequirementsAdeniyi Onabajo, Jens H. Weber-Jahnke. 232 [doi]
- Prospective Personal Health Record Use Among Different User Groups: Results of a Multi-wave StudyDeborah Beranek Lafky, Thomas A. Horan. 233 [doi]
- Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health SystemsRichard Au, Peter Croll. 234 [doi]
- An Investigation on the Use of Computerized Patient Care Documentation: Preliminary ResultsKenneth M. Cam, Efthimis N. Efthimiadis, Kenric W. Hammond. 235 [doi]
- Human-Centered Design of Persuasive Appointment RemindersMuhammad F. Walji, Jiajie Zhang. 236 [doi]
- Evaluating Ontologies Based on the Naturalness of Their Preferred TermsSoon Ae Chun, James Geller. 238 [doi]
- A Qualitative Study of Physicians, Surgeons, Nurses, Clinicians, and Administrators Perception of Training to Learn Mandated Healthcare Informatics Tool Conducted at DC Veterans Affair HospitalNina McGarry, Gordana Culjak. 239 [doi]
- Interoperability of Medical Applications and DevicesMark Gaynor, Dan Myung, Amar Gupta, James Rawn, Steve Moulton. 240 [doi]
- Prioritizing Clinical Information System Project Risk Factors: A Delphi StudyGuy Paré, Claude Sicotte, Mirou Jaana, David Girouard. 242 [doi]
- The Internal Value of Mobile Computing in Emergency Medical Services: An Australian Case StudyLiz Burley, Helana Scheepers, Libby Owen. 243 [doi]
- A TeleMedicine Transfer Model for Sub-Saharan AfricaMengistu Kifle, Victor Wacham A. Mbarika, Clive Tsuma, Derkirra Wilkerson, Joseph Tan. 244 [doi]
- From Adoption to Diffusion of a Telehealth InnovationSunyoung Cho, Lars Mathiassen, Michael Gallivan. 245 [doi]
- Soft Innovation as Data-Driven Process Improvement Exploited via Integrated Hospital Information SystemsJim Ryan, Barbara Doster, Sandra Daily, Marty Heslin. 246 [doi]
- Taking Charge of Your Health: The Drivers of Enrollment and Continued Participation in Online Health Intervention ProgramsJie-Mein Goh, Ritu Agarwal. 247 [doi]
- Electronic Medical Records: A Review Comparing the Challenges in Developed and Developing CountriesSanjay P. Sood, Stacie N. Nwabueze, Victor Wacham A. Mbarika, Nupur Prakash, Samir Chatterjee, Pradeep Ray, Saroj Mishra. 248 [doi]
- Electronic Medical Records Use - An Examination of Resident Physician IntentionsKenneth J. Trimmer, John C. Beachboard, Carla Wiggins, William Woodhouse. 249 [doi]
- A Light-Weight Component for Adding Decision Support to Electronic Medical RecordsJens H. Weber-Jahnke, Glen McCallum. 251 [doi]
- Building a Customizable Knowledge Management Environment to Support Public Health Practice: Design StrategiesDebra Revere, Sherrilynne S. Fuller. 252 [doi]
- Implementation of Ontology for Intelligent Hospital WardsPavandeep Kataria, Radmila Juric, Shamimabi Paurobally, Kambiz Madani. 253 [doi]
- Integrated Solutions for Information Sharing In Health Care ApplicationsSaverio Da Ronco, Guillermo Diez-Andino Sancho, Lorenzo Dini, Elisabetta Ronchieri, Matteo Selmi. 254 [doi]
- Pseudonymization for improving the Privacy in E-Health ApplicationsBernhard Riedl, Veronika Grascher, Stefan Fenz, Thomas Neubauer. 255 [doi]
- A Proposed Solution for Managing Doctor s Smart Cards in Hospitals Using a Single Sign-On Central ArchitectureChristian Mauro, Ali Sunyaev, Jan Marco Leimeister, Andreas Schweiger, Helmut Krcmar. 256 [doi]
- Value Propositions for Information Systems in HealthcareDaron Green, Terry Young. 257 [doi]
- Discursive Deployments: Mobilizing Support for Municipal and Community Wireless Networks in the U.SRosío Alvarez, Juana María Rodriguez. 260 [doi]
- Analysis of the Development of Kutztown Community NetworkDong-Hee Shin, Murali Venkatesh. 261 [doi]
- Improvements in Security Alert Analysis with a Truth Maintenance SystemAlbert Tang, Pradeep Ray, Lundy Lewis. 263 [doi]
- A Flexible, High Performance Service-Oriented Architecture for Detecting Cyber AttacksAdam Wynne, Ian Gorton, Justin Almquist, Jack Chatterton, Dave Thurman. 263 [doi]
- Towards a Methodology for Profiling Cyber CriminalsLeonard Kwan, Pradeep Ray, Greg Stephens. 264 [doi]
- Systems Theory Model for Information SecurityWm. Arthur Conklin, Glenn B. Dietrich. 265 [doi]
- Software Piracy: Original Insights from a Criminological PerspectiveRobert Willison, Mikko T. Siponen. 266 [doi]
- Toward a Generic Model of Security in an Organizational Context: Exploring Insider Threats to Information InfrastructureIgnacio J. Martinez-Moyano, Michael E. Samsa, James F. Burke, Bahadir K. Akcam. 267 [doi]
- Understanding the Blog Service Switching in Hong Kong: An Empirical InvestigationKem Z. K. Zhang, Christy M. K. Cheung, Matthew K. O. Lee, Huaping Chen. 269 [doi]
- Trust in Online Shopping: The Korean Student ExperienceJi-Seok Yoo, Jae-Nam Lee, Julian Hoffmann. 270 [doi]
- Virtual Experiential Marketing on Online Customer Intentions and LoyaltyJashen Chen, Russell K. H. Ching, Margaret Meiling Luo, Chu-Chi Liu. 271 [doi]
- An Investigation into the Determinants of Repurchase Loyalty in the E-MarketplaceHui-Chih Wang, Her-Sen Doong, Hui-Chin Shih, John Pallister, Gordon Foxall. 272 [doi]
- A Cognitive Map of People s Online Risk Perceptions and Attitudes: An Empirical StudyIsaac J. Gabriel, Easwar A. Nyshadham. 274 [doi]
- Internet Users Beliefs about Government Surveillance - The Role of Social Awareness and Internet LiteracyTamara Dinev. 275 [doi]
- CRM and Customer Portfolio Management for E-TailersDennis Kundisch, Stefan Sackmann, Markus Ruch. 276 [doi]
- The Business Value of CRM Systems: A Resource-Based PerspectiveShutao Dong, Kevin Zhu. 277 [doi]
- Beyond CRM: A System to Bridge the Gap between the Customer and the Global Manufacturing Supply ChainCharalampos Makatsoris, Yoon Seok Chang. 278 [doi]
- An Exploration of the Hygiene and Motivator Aspects of WebQual Constructs in Predicting Website ReuseBen Q. Liu, Dale Goodhue. 280 [doi]
- Marketing Using Web 2.0Salvatore Parise, Patricia J. Guinan. 281 [doi]
- Simulation of Online Selling with Posted-Price and Auctions: Comparison of Dual Channel s Performance under Different Auction MechanismsHila Etzion, Scott Moore. 282 [doi]
- What, Who and Where: Insights into PersonalizationAnne Sunikka, Johanna Bragge. 283 [doi]
- Web Accessibility for the Blind: Corporate Social Responsibility or Litigation Avoidance?Jonathan Frank. 284 [doi]
- A Taxonomy of Service Failures in Electronic RetailingNelson Massad, John C. Beachboard. 285 [doi]
- Examining the Perceived Credibility of Online Opinions: Information Adoption in the Online EnvironmentNeil Rabjohn, Christy M. K. Cheung, Matthew K. O. Lee. 286 [doi]
- Integrating Conflicting Reviews: Attributional Hypotheses of Consumer Response to Information Uncertainty depending on Prior Brand AttitudeDo-Hyung Park, Ingoo Han. 287 [doi]
- Chaos Theory as a Model for Interpreting Weblog TrafficXitong Guo, Doug Vogel, Zhongyun Zhou, Xi Zhang, Huaping Chen. 289 [doi]
- Morality in Cyberspace: A Comparison of Chinese and U.S. Youth s Beliefs about Acceptable Online BehaviorLinda A. Jackson, Yong Zhao, Wei Qiu, Anothony Kolenic III, Hiram E. Fitzgerald, Rena Harold, Alexander von Eye. 290 [doi]
- Social Network Analysis of Video Bloggers CommunityJohn Warmbrodt, Hong Sheng, Richard Hall. 291 [doi]
- Understanding Development and Usage of Social Networking Sites: The Social Software Performance ModelCatherine Dwyer, Starr Roxanne Hiltz, George Widmeyer. 292 [doi]
- Frameworks for Securing Limited-Device ApplicationsTimothy E. Lindquist, Aarthi Ramamurthy, Ramon Anguamea. 293 [doi]
- Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home NetworksJongpil Jeong, Min Young Chung, Hyunseung Choo. 294 [doi]
- Location Privacy for Users of Wireless Devices through CloakingCalvert L. Bowen III, David R. Raymond, Thomas L. Martin. 295 [doi]
- Mobile Device Profiling and Intrusion Detection Using Smart BatteriesTimothy Buennemeyer, Theresa M. Nelson, Lee M. Clagett, John P. Dunning, Randy C. Marchany, Joseph G. Tront. 296 [doi]
- Can a P2P File-Sharing Network Become an e-Marketplace?Fu-ren Lin, Hau-ming Lo, Cong-ren Wang. 298 [doi]
- Free-Riding and Competition in Network Markets for Digital GoodsAndreas U. Schmidt. 299 [doi]
- Pricing Product Lines of Digital Content: A Model Using Online Choice ExperimentP. K. Kannan, Barbara Kline Pope, Ai-Mei Chang. 300 [doi]
- E-Business Tools for Active Credit Risk Management - A Market AnalysisSimone Westerfeld, Hans-Dieter Zimmermann. 301 [doi]
- Critical Assumptions in Superdistribution Based Business Models - Empirical Evidence from the User PerspectiveSophie Ahrens, Thomas Hess, Tanja Pfister, Behrend Freese. 302 [doi]
- On the Inequality of Contributions to WikipediaFelipe Ortega, Jesús M. González-Barahona, Gregorio Robles. 304 [doi]
- An Exploratory Study on the Evolution of OSS Developer CommunitiesKawin Ngamkajornwiwat, Dongsong Zhang, Akif Günes Koru, Lina Zhou, Robert D. Nolker. 305 [doi]
- Shared Mental Models among Open Source Software DevelopersBarbara Scozzi, Kevin Crowston, U. Yeliz Eseryel, Qing Li. 306 [doi]
- Exploring the Suitability of IS Security Management Standards for SMEsYves Barlette, Vladislav Fomin. 308 [doi]
- The Impact of Direct and Indirect Network Effects on the Diffusion of Communication StandardsRoman Beck, Daniel Beimborn. 309 [doi]
- Do Firm R&D Investments Drive Decisions to Join? On the Value of Standard-Setting Organizations in the Consumer Electronics IndustryAlok Gupta, Robert J. Kauffman, Amy Ping Wu. 310 [doi]
- An Operational Framework for Service Oriented Architecture Network SecurityRobert Bunge, Sam Chung, Barbara Endicott-Popovsky, Don McLane. 312 [doi]
- Semantic Web Services Monitoring: An OWL-S Based ApproachRoman Vaculín, Katia P. Sycara. 313 [doi]
- Where to Start with SOA: Criteria for Selecting SOA ProjectsThorsten Hau, Nico Ebert, Axel Hochstein, Walter Brenner. 314 [doi]
- Service Oriented Architecture: Challenges for Business and AcademiaAmelia Maurizio, James Sager, Peter Jones, Gail Corbitt, Louis Girolami. 315 [doi]
- Software Architectural Reuse Issues in Service-Oriented ArchitecturesJulie A. Street, Hassan Gomaa. 316 [doi]
- e3service: An Ontological Approach for Deriving Multi-supplier IT-Service Bundles from Consumer NeedsSybren de Kinderen, Jaap Gordijn. 318 [doi]
- The 8C Framework as a Reference Model for Collaborative Value Webs in the Context of Web 2.0T. Andrew Yang, Dan J. Kim, Vishal Dhalwani, Tri K. Vu. 319 [doi]
- The Role and Emerging Landscape of Data Pools in the Retail and Consumer Goods IndustriesJan Schemm, Christine Legner. 320 [doi]
- Leveraging a Wiki to EnhanceVirtual Collaboration in the Emergency DomainConnie White, Linda Plotnick, Ronja Addams-Moring, Murray Turoff, Starr Roxanne Hiltz. 322 [doi]
- Social Network Structure as a Critical Success Condition for Virtual CommunitiesDavid Hinds, Ronald M. Lee. 323 [doi]
- Virtual Teams and Development: A Language Games PerspectiveSajda Qureshi, Anne-Laure Fayard. 324 [doi]
- Influence of Sense of Presence on Intention to Participate in a Virtual CommunityYoonhyuk Jung. 325 [doi]
- A Proposal for Examining Factors Leading to Knowledge EquityDave Croasdell, Vicki R. McKinney, Mike Allen, Nancy Burrell. 328 [doi]
- Knowledge Management for Healthcare Organizations: Comparing Strategies with Technical SupportBiswadip Ghosh, Judy E. Scott. 329 [doi]
- Managing Mathematical Texts with OWL and Their Graphical RepresentationSabina Jeschke, Marc Wilke, Nicole Natho, Olivier Pfeiffer. 330 [doi]
- Relative Importance of Knowledge Portal Functionalities: A Contingent Approach on Knowledge Portal Design for R&D TeamsHong Joo Lee, Jong Woo Kim, Joon Koh, Yunhee Lee. 331 [doi]
- Knowledge Management in Renewing Software Development ProcessesMarianne Kukko, Nina Helander, Pasi Virtanen. 332 [doi]
- Gathering Experience Knowledge from Iterative Software Development ProcessesJouni Kokkoniemi. 333 [doi]
- Using Agent Based Simulation and Game Theory Analysis to Study Information Sharing in Organizations - The InfoScapeRichard Jolly, Wayne W. Wakeland. 335 [doi]
- Systems Theory and Knowledge Management Systems: The Case of Pratt-Whitney RocketdyneMark Chun, Kiho Sohn, Priscilla Arling, Nelson F. Granados. 336 [doi]
- Formal Boundary Spanning and Informal Boundary Spanning in Cross-Border Knowledge Sharing: A Case StudyYongsuk Kim, Sirkka L. Jarvenpaa. 337 [doi]
- Individual Learning and Performance in Communities of PracticeZeying Wan, Yulin Fang, Derrick J. Neufeld. 338 [doi]
- Viewing Boundary Objects as Boundary ConstructionsW. David Holford, Mehran Ebrahimi, Omar Aktouf, Laurent Simon. 339 [doi]
- An Empirical Investigation of Knowledge Creation in Electronic Networks of Practice: Social Capital and Theory of Planned Behavior (TPB)Shih-Wei Chou, Yu-Chieh Chang. 340 [doi]
- Work Design in Knowledge-Based Network Organizations: Facilitating Supply Chain Knowledge Flows via Network EntrepreneurshipXun Li, Clyde W. Holsapple. 341 [doi]
- An Exploratory Examination of Knowledge Sharing Behaviors: Voluntary vs. SolicitedSeokwoo Song, James T. C. Teng. 342 [doi]
- Adaption-Innovation Theory and Cognitive Diversity: The Impact on Knowledge Use within OrganizationsMichael A. Chilton, James M. Bloodgood. 343 [doi]
- Knowledge Conversion in GSS-Aided Virtual Teams: An Empirical StudyImad Samarah, Souren Paul, Suresh Tadisina. 344 [doi]
- The Value of Weak vs. Strong Ties between Individuals and Projects for New Product ReviewLynne P. Cooper. 345 [doi]
- ICT Perceptions and Meanings: Implications for Knowledge TransferAnne P. Massey, Taylor M. Wells. 346 [doi]
- A Framework for the Co-design of Business and IT SystemsSusan Gasson. 348 [doi]
- How IT Supports Knowledge Discovery and Learning Processes on the WebTracy A. Jenkin. 349 [doi]
- N2 Heads Are Better than One: Collaborative Learning, Utilizing an Integrated Knowledge Repository, Facilitated through a Massively Multiplayer Online Gaming (MMOG) ParadigmDavid J. Lubliner, George Widmeyer. 350 [doi]
- Supporting Strategic Innovativeness: Scenario Planning for Driving Organizational Knowledge SharingKalle Piirainen, Hannu Kivijärvi, Markku Tuominen. 351 [doi]
- The Impact of Virtual Technologies on Organizational Knowledge Creation: An Empirical StudyAntonio Vaccaro, Francisco Veloso, Stefano Brusoni. 352 [doi]
- Eliciting and Validating Knowledge in Knowledge Management SystemsHind Benbya, Marshall W. van Alstyne. 353 [doi]
- How Knowledge Map and Personalization Affect Effectiveness of KMS in High-Tech FirmsJung-Yu Lai, Chao-Te Wang, Chun-Yi Chou. 355 [doi]
- KMS Quality - Impact on Competitive AdvantageNassim Belbaly. 356 [doi]
- Exploring the Relationships among Individual Knowledge Management OutcomesShahnawaz Muhammed, William J. Doll, Xiaodong Deng. 357 [doi]
- Does Knowledge Management Pay Off?Clyde W. Holsapple, Jiming Wu. 358 [doi]
- Elaboration Likelihood in Knowledge Management: A Model and Experimental TestKelly J. Fadel, Alexandra Durcikova, Hoon S. Cha. 359 [doi]
- Towards Measuring Knowledge Management SuccessMurray E. Jennex, Stefan Smolnik, David T. Croasdell. 360 [doi]
- A Value Network Model for Strategic AnalysisAlain Biem, Nathan Caswell. 361 [doi]
- An Information Ecology Structured by a Nexus between Accreditation and Practice: Boundary Objects, Brokers and Translation across the Boundaries of Standards Compliance and Practice-Oriented WorkJo-Anne Kelder, Paul Turner. 363 [doi]
- A Collaborative Dimensions Framework: Understanding the Mediating Role of Conceptual Visualizations in Collaborative Knowledge WorkSabrina Bresciani, Alan F. Blackwell, Martin J. Eppler. 364 [doi]
- A Conceptual Framework of Transactive Networks SystemSheng-cheng Lin, Yu-Min Wang, Daniel Y. Shee. 365 [doi]
- Social Network Behavior, Thought-Leaders and Knowledge Building in an Online Learning CommunityJim Waters. 366 [doi]
- Designing Multifunctional Knowledge Management SystemsRosina Weber, Sidath Gunawardena. 368 [doi]
- Knowledge Analysis with Tree PatternsFedja Hadzic, Tharam S. Dillon, Elizabeth Chang. 369 [doi]
- Service Process Innovation: A Case Study of BPMN in PracticeMichael zur Muehlen, Danny T. Ho. 372 [doi]
- Understanding Knowledge-Intensive, Practice-Oriented Business ProcessesOlivera Marjanovic, Ravi Seethamraju. 373 [doi]
- Organizational Readiness for Business Process Outsourcing: A Model of Determinants and Impact on Outsourcing SuccessSebastian F. Martin, Daniel Beimborn, Mihir A. Parikh, Tim Weitzel. 374 [doi]
- Modes of Governance in Business Process Outsourcing: Executive versus Market s PerspectiveAndreas Mattig. 375 [doi]
- Exploring Process-Modelling Practice: Towards a Conceptual ModelTom R. Eikebrokk, Jon Iden, Dag H. Olsen, Andreas L. Opdahl. 376 [doi]
- Integration of an Ontological Information Security Concept in Risk Aware Business Process ManagementGernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Simon Tjoa, Thomas Mück. 377 [doi]
- A Survey on the Flexibility Requirements Related to Business Processes and Modeling ArtifactsSelmin Nurcan. 378 [doi]
- Enabling On-the-Fly Business Process Composition through an Event-Based ApproachNancy Alexopoulou, Mara Nikolaidou, Yannis Chamodrakas, Drakoulis Martakos. 379 [doi]
- Should Online Auctions Employ Dynamic Buyout Pricing Models?Roumen Vragov, Di Shang, Karl Reiner Lang. 381 [doi]
- A Discriminatory Pay-as-Bid Mechanism for Efficient Scheduling in the Sun N1 Grid EngineJochen Stößer, Philipp Bodenbenner, Simon See, Dirk Neumann. 382 [doi]
- The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for UsersM. Eric Johnson, Dan McGuire, Nicholas D. Willey. 383 [doi]
- Resonance Marketing in the Age of the Truly Informed Consumer: Changes in Corporate Strategy Resulting from Changes in Customer BehaviorEric K. Clemons. 384 [doi]
- Development and Validation of Scales to Measure the Strategic Potential of IT-Enabled Resources: A Resource-Based ApproachSaggi Nevo, Michael R. Wade. 385 [doi]
- Partnerships between Software Firms: Is There Value from Complementarities?Lucia S. Gao, Bala Iyer. 386 [doi]
- Guidelines for Setting Organizational Policies for Data QualityRajiv M. Dewan, Veda C. Storey. 387 [doi]
- The Deterrent and Displacement Effects of Information Security Enforcement: International EvidenceIvan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang. 388 [doi]
- The Emerging Role of Vertical Search Engines in Travel Distribution: A Newly-Vulnerable Electronic Markets PerspectiveNelson F. Granados, Robert J. Kauffman, Bradley King. 389 [doi]
- Information Technology and the Number of Suppliers in a Supply Chain: Is There a Relationship?Jason L. Dedrick, Sean Xin Xu, Kevin Zhu. 390 [doi]
- Process Orientation of Information Logistics - An Empirical Analysis to Assess Benefits, Design Factors, and Realization ApproachesTobias Bucher, Barbara Dinter. 392 [doi]
- Measuring Data Believability: A Provenance ApproachNicolas Prat, Stuart E. Madnick. 393 [doi]
- From Federated Databases to a Federated Data Warehouse SystemStefan Berger, Michael Schrefl. 394 [doi]
- Processes for Enterprise Application Architecture ManagementMartin Hafner, Robert Winter. 396 [doi]
- A Consolidated Strategic Business and IT Alignment Representation: A Framework Aggregated From LiteratureNorman Vargas, Leonel Plazaola, Mathias Ekstedt. 397 [doi]
- Strategic Business and IT Alignment Assessment: A Case Study Applying an Enterprise Architecture-Based MetamodelLeonel Plazaola, Johnny Flores, Norman Vargas, Mathias Ekstedt. 398 [doi]
- Enterprise Information System Engineering: A Model-Based Approach Based on the Zachman FrameworkMara Nikolaidou, Nancy Alexopoulou. 399 [doi]
- Geographically Distributed Enterprise Architecting: Towards a Theoretical FrameworkJ. Alberto Espinosa, Frank Armour. 400 [doi]
- A Methodological Proposal to Assess the Feasibility of ERP Systems Implementation StrategiesGuido Capaldo, Pierluigi Rippa. 401 [doi]
- Enterprise Information Systems and Strategic FlexibilityWilliam MacKinnon, Gerald Grant, David Cray. 402 [doi]
- Stock Price Reactions to Investments in EAI and ERP: A Comparative Event StudyNarcyz Roztocki, Heinz Roland Weistroffer. 403 [doi]
- A Cross-Cultural Comparison of Perceived Strategic Importance of RFID for CIOs in Germany and ItalyStefanie Jahner, Jan Marco Leimeister, Uta Franziska Knebel, Helmut Krcmar. 405 [doi]
- Hybrid RFID-GPS Real-Time Location System for Human Resources: Development, Impacts and PerspectivesManon Ghislaine Guillemette, Isabelle Fontaine, Claude Caron. 406 [doi]
- Strategic and Institutional Perspectives in the Evaluation, Adoption and Early Integration of Radio Frequency Identification (RFID): An Empirical Investigation of Current and Potential AdoptersAditya Sharma, Dominic Thomas, Benn R. Konsynski. 407 [doi]
- Sustainability of Information Technology Therapy on Micro-enterprise DevelopmentSajda Qureshi, Mehruz Kamal, Peter Wolcott. 409 [doi]
- A Growth-Theoretic Empirical Analysis of Simultaneity in Cross-National E-Commerce DevelopmentShuchun Ho, Robert J. Kauffman, Ting-Peng Liang. 410 [doi]
- E-Government Challenges and the Role of Political Leadership in Indonesia: The Case of SragenBjørn Furuholt, Fathul Wahid. 411 [doi]
- On the Company We Keep: Combined Scale-and-Scope Externalities in the Growth of IT Industry Co-agglomerationsRobert J. Kauffman, Ajay Kumar. 412 [doi]
- Exploring E-Commerce Readiness in China: The Case of the Grocery IndustrySherah Kurnia. 413 [doi]
- Innovation Position: A Quantitative Analysis to Evaluate the Efficiency of Research and Development on the Basis of Patent DataKatsuhiro Suzuki, Junichi Sakata, Jun Hosoya. 415 [doi]
- Protecting Service Innovations against Imitation - The Case of Mobile TVPia Hurmelinna-Laukkanen, Paavo Ritala, Kirsimarja Blomqvist, Kaisa Henttonen. 416 [doi]
- Leveraging the Wisdom of Crowds: Designing an IT-Supported Ideas Competition for an ERP Software CompanyWinfried Ebner, Jan Marco Leimeister, Ulrich Bretschneider, Helmut Krcmar. 417 [doi]
- Communicative Incentives in Consumer Innovation BrokeringMikko Järvilehto, Kari Leppälä, Jouni Similä. 418 [doi]
- Enterprise Adoption of ICT Innovations: Multi-disciplinary Literature Analysis and Future Research OpportunitiesRahul C. Basole. 419 [doi]
- The Factors that Affect the Implementation Success of ISShih-Wei Chou, Mong-Young He, Pi-Yi Chen. 421 [doi]
- Corporate User Representatives and the Dialectics of Enterprise Systems: A Quest for Social Actors with Political SkillStig Nordheim. 422 [doi]
- Building Trust and Cooperation through Technology Adaptation in Virtual Teams: Empirical Field EvidenceDominic M. Thomas, Robert P. Bostrom. 423 [doi]
- 360-Degree Strategic Leadership Team Alignment: Profile of an Intervention ProgramJoseph W. Weiss, John Shenette. 424 [doi]
- Deal or No Deal? Vendor Issues in Two Multi-organization Pilot Test ProjectsJanis L. Gogan, Ashok Rao. 425 [doi]
- Determinants of CIO Compensation Structure and Its Impact on Firm PerformanceAli A. Yayla, Qing Hu. 427 [doi]
- Analysing the Relationship between IT Governance and Business/IT Alignment MaturitySteven De Haes, Wim Van Grembergen. 428 [doi]
- IT Business Alignment as Governance Tool for Firm-Internal Relationship Quality: A Longitudinal Case StudyHeinz-Theo Wagner, Tim Weitzel. 429 [doi]
- Evasive Maneuvers and Guerilla Tactics: A Scandinavian Institutional Perspective on Chief Information Officer s Strategies for LegitimizationJohan Magnusson, Bo Oskarsson. 430 [doi]
- The IT Organization Modeling and Assessment Tool: Correlating IT Governance Maturity with the Effect of ITMårten Simonsson, Pontus Johnson. 431 [doi]
- Decision Support Framework for the Implementation of IT-GovernanceK. Fink, C. Ploder. 432 [doi]
- A Study of the Causal Relationship between IT Governance Inhibitors and Its Success in Korea EnterprisesChi-Hoon Lee, Jung Hoon Lee, Jong-Sung Park, Kap-Young Jeong. 433 [doi]
- Business and IT Governance Alignment Simulation Essay on a Business Process and IT Service ModelEnrique Silva, Yves Chaix. 434 [doi]
- Making the Most of IT Governance Software: Understanding Implementation ProcessesHauke Heier, Hans P. Borgman, Thomas H. Hofbauer. 435 [doi]
- IT Offshoring Risks and Governance CapabilitiesAkemi Takeoka Chatfield, Padmaharsha Wanninayaka. 436 [doi]
- Building Inter-organizational Cooperative Network for IT CollaborationLauri Salmivalli, Hannu Salmela, Timo Kestilä. 437 [doi]
- Relational Risk Mitigation: The Relationship Approach to Mitigating Risks in Business Process OutsourcingKim Wüllenweber, Stefanie Jahner, Helmut Krcmar. 438 [doi]
- Exploring the Semantic Validity of Questionnaire ScalesKai R. Larsen, Dorit Nevo, Eliot Rich. 440 [doi]
- Examining the Urban Legend of Common Method Bias: Nine Common Errors and Their ImpactAndrew Schwarz, Colleen Schwarz, Tracey Rizzuto. 441 [doi]
- Conducting Qualitative Research in an International and Distributed Research Team: Challenges and Lessons LearnedRafael Prikladnicki, J. Roberto Evaristo, Daniela Damian, Jorge Luis Nicolas Audy. 442 [doi]
- Too Many Cooks Spoiling a Soup ? Making Sense of a Distributed, Multi-party IS ProjectRiitta Hekkala, Netta Iivari, Raija Halonen. 444 [doi]
- The Impact of Conflict and Conflict Management Style on Deadbeats and Deserters in Virtual TeamsKimberly A. Furumo. 445 [doi]
- Understanding the Relationship between Justice and Team Goal Commitment in Virtual Project Teams: An Empirical InvestigationEric Tze Kuan Lim, Yu-Ting Caisy Hung. 446 [doi]
- Information Technology Adoption by Small Businesses in Minority and Ethnic CommunitiesSajda Qureshi, Anne S. York. 447 [doi]
- Personality and Technology Acceptance: Personal Innovativeness in IT, Openness and Resistance to ChangeOded Nov, Chen Ye. 448 [doi]
- The Influence of Instant Messaging Usage Behavior on Organizational Communication SatisfactionShih-Ming Pi, Yi-Chih Liu, Tsang-Yao Chen, Shih-Hua Li. 449 [doi]
- Beyond Cognitions: A Call for Greater Consideration of Emotion in Information Systems Decision TheoriesBrent Furneaux, Dorit Nevo. 451 [doi]
- A Meta-theory for Understanding IS in Socio-technical SystemsDominic M. Thomas, Saurabh Gupta, Robert P. Bostrom. 451 [doi]
- Information System Development: A Categorical Analysis of User Participation ApproachesAngela Mattia, Heinz Roland Weistroffer. 452 [doi]
- Information Security Cultures of Four Professions: A Comparative StudySriraman Ramachandran, Srinivasan V. Rao, Tim Goles. 454 [doi]
- Information Technology Skill Management: A Systems Dynamics ApproachJae Choi, Derek L. Nazareth, Hemant K. Jain. 455 [doi]
- IT-Benefits-Management in the Swiss Financial SectorGerhard Schwabe, Pascal Bänninger. 456 [doi]
- Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS PackageJose D. Montero, YongSeog Kim, Jeff Johnson. 457 [doi]
- Bridge Methods: Complementary Steps Integrating Agile Development Tools and Methods with Formal Process MethodologiesStephen J. Cohen, William H. Money. 460 [doi]
- Rolling Out Agile in a Large EnterpriseGabrielle Benefield. 461 [doi]
- Great Scrums Need Great Product Owners: Unbounded Collaboration and Collective Product OwnershipKen H. Judy, Ilio Krumins-Beens. 462 [doi]
- Effects of Agile Methods on Website Quality for Electronic CommerceDavid F. Rico. 463 [doi]
- A Case Study: Introducing eXtreme Programming in a US Government System Development ProjectAnn L. Fruhling, Patrick McDonald, Christopher Dunbar. 464 [doi]
- Retrofitting Cyber Physical Systems for Survivability through External CoordinationKun Xiao, Shangping Ren, Kevin A. Kwiat. 465 [doi]
- Scrum and CMMI Level 5: The Magic Potion for Code WarriorsJeff Sutherland, Carsten Ruseng Jakobsen, Kent Johnson. 466 [doi]
- Bounding Prefix Transposition Distance for Strings and PermutationsBhadrachalam Chitturi, Ivan Hal Sudborough. 468 [doi]
- Finding a Minimum-Sum Dipolar Spanning Tree in R3Steven Bitner, Ovidiu Daescu. 469 [doi]
- How Many Attackers Can Selfish Defenders Catch?Marios Mavronicolas, Burkhard Monien, Vicky G. Papadopoulou. 470 [doi]
- K-Trunk and Efficient Algorithms for Finding a K-Trunk on a Tree NetworkYamin Li, Shietung Peng, Wanming Chu. 472 [doi]
- Elissa J. Chesler, Michael A. Langston: On Finding Bicliques in Bipartite Graphs: a Novel Algorithm with Application to the Integration of Diverse Biological Data TypesYun Zhang. 473 [doi]
- Towards Fast Incremental Hashing of Large Bit VectorsMichael Wilder, Clinton Jeffery. 474 [doi]
- Clustering and the Biclique Partition ProblemDoina Bein, Linda Morales, Wolfgang W. Bein, C. O. Shields Jr., Z. Meng, Ivan Hal Sudborough. 475 [doi]
- Knowledge States: A Tool for Randomized Online AlgorithmsWolfgang W. Bein, Lawrence L. Larmore, Rüdiger Reischuk. 476 [doi]
- Priority Approximation for BatchingWolfgang W. Bein, John Noga, Jeff Wiegley. 477 [doi]
- Building a Test Suite for Web Application ScannersElizabeth Fong, Romain Gaucher, Vadim Okun, Paul E. Black, Eric Dalci. 478 [doi]
- Privacy-Preserving 1-n-p Negotiation ProtocolSumit Chakraborty, Sushil K. Sharma, Asim Kumar Pal. 479 [doi]
- Pedagogy and Overview of a Graduate Program in Digital Investigation ManagementGary C. Kessler, Don Haggerty. 481 [doi]
- STEALing Lab Support in Digital Forensics EducationTimothy M. Vidas, David A. Branch, Alex Nicoll. 482 [doi]
- Overcoming Impediments to Cell Phone ForensicsWayne Jansen, Aurélien Delaitre, Ludovic Moenner. 483 [doi]
- Skype FingerprintRonald C. Dodge Jr.. 484 [doi]
- Using FPGAs to Parallelize Dictionary Attacks for Password CrackingYoginder S. Dandass. 485 [doi]
- E-Crime Investigative TechnologiesSudhir Aggarwal, Zhenhai Duan, Leo Kermes, Breno de Medeiros. 486 [doi]
- Of Paper Trails and Voter ReceiptsAlec Yasinsac, Matt Bishop. 487 [doi]
- Towards a Belief-Theoretic Model for Collaborative Conceptual Model DevelopmentEbrahim Bagheri, Ali A. Ghorbani. 489 [doi]
- Enterprise Modeling for Information System Development within MDAJanis Osis, Erika Asnina. 490 [doi]
- Multi-perspective Assessment of Scalability of IT-Enabled Networked ConstellationsZsófia Derzsi, Jaap Gordijn, Koen Kok. 491 [doi]
- Distributed Medium Access Control with Flow-Based Priority for Cooperative Multi-hop Wireless Sensor NetworksT. Owens Walker III, Murali Tummala, John C. McEachen. 493 [doi]
- Fault-Tolerant k-Fold Pivot Routing in Wireless Sensor NetworksDoina Bein. 494 [doi]
- A Method for Fast Radio Frequency Direction Finding Using Wireless Sensor NetworksMickey S. Batson, John C. McEachen, Murali Tummala. 495 [doi]
- Performance of a Wireless Unattended Sensor Network in a Freshwater EnvironmentJohn C. McEachen, Juan Casias. 496 [doi]
- MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor NetworksPruet Boonma, Junichi Suzuki. 497 [doi]
- Macroprogramming Spatio-temporal Event Detection and Data Collection in Wireless Sensor Networks: An Implementation and Evaluation StudyHiroshi Wada, Pruet Boonma, Junichi Suzuki. 498 [doi]