357 | -- | 368 | Rebeca Méndez-Durón. Do the allocation and quality of intellectual assets affect the reputation of open source software projects? |
369 | -- | 382 | Philip Woodall, Alexander Borek, Ajith Kumar Parlikad. Data quality assessment: The Hybrid Approach |
383 | -- | 397 | Madjid Tavana, Faramak Zandi, Michael N. Katehakis. A hybrid fuzzy group ANP-TOPSIS framework for assessment of e-government readiness from a CiRM perspective |
398 | -- | 414 | Mark Keil, Hyung Koo Lee, Tianjie Deng. Understanding the most critical skills for managing IT projects: A Delphi study of IT project managers |
415 | -- | 430 | Jack Shih-Chieh Hsu, Yu Wen Hung. Exploring the interaction effects of social capital |
431 | -- | 438 | Roya Gholami, Ainin Binti Sulaiman, T. Ramayah, Alemayehu Molla. Senior managers' perception on green information systems (IS) adoption and environmental performance: Results from a field survey |
439 | -- | 445 | Man Kit Chang, Waiman Cheung, Mincong Tang. Building trust online: Interactions among trust building mechanisms |
446 | -- | 456 | Robyn L. Raschke, Sagnika Sen. A value-based approach to the ex-ante evaluation of IT enabled business process improvement projects |
457 | -- | 465 | Yuan Sun, Anand Jeyaraj. Information technology adoption and continuance: A longitudinal study of individuals' behavioral intentions |
466 | -- | 488 | Amy Van Looy, Manu De Backer, Geert Poels, Monique Snoeck. Choosing the right business process maturity model |
489 | -- | 506 | Egon Berghout, Chee-Wee Tan. Understanding the impact of business cases on IT investment decisions: An analysis of municipal e-government projects |
507 | -- | 522 | June Lu, Jun Yang, Chun-Sheng Yu. Is social capital effective for online learning? |
523 | -- | 539 | Soumya Ray, DongBack Seo. The interplay of conscious and automatic mechanisms in the context of routine use: An integrative and comparative study of contrasting mechanisms |
540 | -- | 552 | Abeer A. Al-Hassan, Faleh Alshameri, Edgar H. Sibley. A research case study: Difficulties and recommendations when using a textual data mining tool |
553 | -- | 561 | Sangjae Lee, Sungbum Park, Gyoo Gun Lim. Using balanced scorecards for the evaluation of "Software-as-a-service" |
562 | -- | 570 | Yu Tong, Xin Wei Wang, Chuan-Hoo Tan, Hock-Hai Teo. An empirical study of information contribution to online feedback systems: A motivation perspective |
571 | -- | 581 | Yi-Cheng Ku, Rui Chen, Han Zhang. Why do users continue using social networking sites? An exploratory study of members in the United States and Taiwan |
582 | -- | 589 | Sheng-Pao Shih, James J. Jiang, Gary Klein, Eric T. G. Wang. Job burnout of the information technology worker: Work exhaustion, depersonalization, and personal accomplishment |
590 | -- | 597 | David S. Kerr, Uday S. Murthy. The importance of the CobiT framework IT processes for effective internal control over financial reporting in organizations: An international survey |
598 | -- | 605 | Janine L. Spears, Henri Barki, Russell R. Barton. Theorizing the concept and role of assurance in information systems security |