5 | -- | 6 | Diane Crawford. Editorial pointers |
7 | -- | 8 | . News track |
13 | -- | 16 | Phillip G. Armour. The inaccurate conception |
17 | -- | 18 | Robert L. Glass. Managing for innovation |
19 | -- | 21 | Chenglie Hu. Just say A Class Defines a Data Type |
24 | -- | 33 | Dana Cuff, Mark H. Hansen, Jerry Kang. Urban sensing: out of the woods |
35 | -- | 39 | Jason O. B. Soh, Bernard C. Y. Tan. Mobile gaming |
40 | -- | 46 | Liping Zhao. Patterns, symmetry, and symmetry breaking |
47 | -- | 50 | Robert Pinsker, Shaomin Li. Costs and benefits of XBRL adoption: early evidence |
51 | -- | 55 | Bernd Carsten Stahl, Carole Brooke. The contribution of critical IS research |
56 | -- | 63 | David Wright, Michael Friedewald, Wim Schreurs, Michiel Verlinden, Serge Gutwirth, Yves Punie, Ioannis Maghiros, Elena Vildjiounaite, Petteri Alahuhta. The illusion of security |
65 | -- | 69 | Iris A. Junglas, Richard T. Watson. Location-based services |
71 | -- | 76 | Robert LaRose, Nora J. Rifon, Richard J. Enbody. Promoting personal responsibility for internet safety |
77 | -- | 82 | Frank Safayeni, P. Robert Duimering, Kimberley Zheng, Natalia Derbentseva, Christopher Poile, Bing Ran. Requirements engineering in new product development |
83 | -- | 88 | Kwangsu Cho, Tingting Rachel Chung, William R. King, Christian Schunn. Peer-based computer-supported knowledge refinement: an empirical investigation |
89 | -- | 91 | Dinesh K. Gauri, Amit Bhatnagar, H. Raghav Rao. Role of word of mouth in online store loyalty |
104 | -- | 0 | Xiaoming Lu, George Ledin Jr.. Wireless sensor networks and the risks of vigilance |