5 | -- | 0 | Diane Crawford. Editorial pointers |
9 | -- | 10 | . News track |
11 | -- | 13 | Diane Crawford. Forum |
15 | -- | 19 | Hal Berghel. Malware month |
21 | -- | 25 | Rebecca Mercuri. Standards insecurity |
27 | -- | 29 | Alan H. Karp. Enforce POLA on processes to control viruses |
30 | -- | 32 | Andrew Urbaczewski, Joseph S. Valacich, Leonard M. Jessup. Introduction |
33 | -- | 34 | Thomas F. Stafford, Mark L. Gillenson. Mobile commerce: what it is and what it could be |
35 | -- | 40 | Suprateek Sarker, John D. Wells. Understanding mobile handheld device use and adoption |
41 | -- | 44 | Sirkka L. Jarvenpaa, Karl Reiner Lang, Yoko Takeda, Virpi Kristiina Tuunainen. Mobile commerce at crossroads |
45 | -- | 47 | Jun Sun. Information requirement elicitation in mobile commerce |
48 | -- | 52 | Young Eun Lee, Izak Benbasat. Interface design for mobile commerce |
53 | -- | 56 | Viswanath Venkatesh, V. Ramesh, Anne P. Massey. Understanding usability in mobile commerce |
57 | -- | 60 | Peter Tarasewich. Designing mobile commerce applications |
61 | -- | 65 | Bharat Rao, Louis Minakakis. Evolution of mobile location-based services |
66 | -- | 72 | William E. Spangler, Mordechai Gal-Or, Jerrold H. May. Using data mining to profile TV viewers |
73 | -- | 78 | Jim Q. Chen, Ted E. Lee, Ruidong Zhang, Yue Jeff Zhang. Systems requirements for organizational learning |
80 | -- | 85 | Xu Yan. Mobile data communications in China |
86 | -- | 92 | Rajiv Kishore, H. Raghav Rao, Kichan Nam, S. Rajagopalan, Abhijit Chaudhury. A relationship perspective on IT outsourcing |
93 | -- | 98 | Tim Chenoweth, David Schuff, Robert D. St. Louis. A method for developing dimensional data marts |
99 | -- | 102 | Coskun Bayrak, Chad Davis. The relationship between distributed systems and open software development |
144 | -- | 0 | Lauren Weinstein. The devil you know |
145 | -- | 151 | Manju Ahuja, Babita Gupta, Pushkala Raman. An empirical investigation of online consumer purchasing behavior |
152 | -- | 158 | Ravi Bapna. When snipers become predators: can mechanism design save online auctions? |
159 | -- | 166 | Amit Basu, Steve Muylle. Authentication in e-commerce |
167 | -- | 177 | Sidney A. Davis, Keng Siau, Kumar Dhenuvakonda. A fit-gap analysis of e-business curricula vs. industry needs |
178 | -- | 185 | Pattarawan Prasarnphanich, Mark L. Gillenson. The hybrid clicks and bricks business model |
186 | -- | 195 | Sanjay Gosain, Arvind Malhotra, Omar El Sawy, Fadi Chehade. The impact of common e-business interfaces |
196 | -- | 205 | Stefano Grazioli, Sirkka L. Jarvenpaa. Deceived: under target online |
206 | -- | 212 | Khawaja Asjad Saeed, Varun Grover, Yujong Hwang. Creating synergy with a clicks and mortar approach |
213 | -- | 216 | Andrew Holmes, John Ryan. Viewpoint: the end of the long boom |
217 | -- | 225 | Philip M. Johnson, Mette L. Moffett, Brian T. Pentland. Lessons learned from VCommerce |
226 | -- | 232 | Pairin Katerattanakul, Keng Siau. Creating a virtual store image |
233 | -- | 239 | Mohamed Khalifa, Moez Limayem. Drivers of Internet shopping |
240 | -- | 247 | Minhee Chae, Jinwoo Kim. What s so different about the mobile Internet? |
248 | -- | 250 | Ziqi Liao, Michael Tow Cheung. Challenges to Internet e-banking |
251 | -- | 257 | Zakaria Maamar. Commerce, e-commerce, and m-commerce: what comes next? |
258 | -- | 264 | David M. Martin Jr., Hailin Wu, Adil Alsaid. Hidden surveillance by Web sites: Web bugs in contemporary use |
265 | -- | 271 | Trevor T. Moores, Gurpreet Dhillon. Do privacy seals in e-commerce really work? |
272 | -- | 278 | Kyle B. Murray, Gerald Häubl. A human capital perspective of skill acquisition and interface loyalty |
279 | -- | 288 | G. Premkumar. Perspectives of the e-marketplace by multiple stakeholders |
289 | -- | 299 | Robert W. Proctor, Kim-Phuong L. Vu, Lawrence J. Najjar, Misha W. Vaughan, Gavriel Salvendy. Content preparation and management for e-commerce Web sites |
300 | -- | 307 | Mani R. Subramani, Balaji Rajagopalan. Knowledge-sharing and influence in online social networks via viral marketing |
308 | -- | 316 | C. Ranganathan, Vern Goode, Arkalgud Ramaprasad. Managing the transition to bricks and clicks |
317 | -- | 324 | Dan Jong Kim, Manish Agrawal, Bharat Jayaraman, H. Raghav Rao. A comparison of B2B e-service solutions |
325 | -- | 331 | Al Farooq Salam, H. Raghav Rao, C. C. Pegels. Consumer-perceived risk in e-commerce transactions |
332 | -- | 336 | Xiaowen Fang, Gavriel Salvendy. Customer-centered rules for design of e-commerce Web sites |
337 | -- | 344 | Fang-Fang Tang, Marcel G. Thom, Liang Toon Wang, Joai Ching Tan, Wai Yee Chow, Xiaoyun Tang. Using insurance to create trust on the Internet |
345 | -- | 350 | Amrit Tiwana, Ephraim R. McLean. The tightrope to e-business project success |
351 | -- | 353 | Anthony M. Townsend, James T. Bennett. Viewpoint: living and bidding in an auction economy |
354 | -- | 361 | Ganesh Vaidyanathan, Sarv Devaraj. A five-factor framework for analyzing online risks in e-businesses |