177 | -- | 186 | Thompson S. H. Teo, Anol Bhattacherjee. Knowledge transfer and utilization in IT outsourcing partnerships: A preliminary model of antecedents and outcomes |
187 | -- | 205 | She-I Chang, David C. Yen, I-Cheng Chang, Derek Jan. Internal control framework for a compliant ERP system |
206 | -- | 216 | Yun Xu, Wai Fong Boh, Christina Soh. Vertical IS standards deployment and integration: A study of antecedents and benefits |
217 | -- | 224 | Mikko T. Siponen, M. Adam Mahmood, Seppo Pahnila. Employees' adherence to information security policies: An exploratory field study |
225 | -- | 239 | Qing Cao, Donald R. Jones, Hong Sheng. Contained nomadic information environments: Technology, organization, and environment influences on adoption of hospital RFID patient tracking |
240 | -- | 248 | Liu Fan, Yung Ho Suh. Why do users switch to a disruptive technology? An empirical study based on expectation-disconfirmation theory |
249 | -- | 259 | Linda Wallace, Steven D. Sheetz. The adoption of software measures: A technology acceptance model (TAM) perspective |
260 | -- | 269 | Jerrel Leung, Waiman Cheung, Sung-Chi Chu. Aligning RFID applications with supply chain strategies |
270 | -- | 282 | Jing Elaine Chen, Shan L. Pan, Tao Hua Ouyang. Routine reconfiguration in traditional companies' e-commerce strategy implementation: A trajectory perspective |
283 | -- | 295 | Jack Shih-Chieh Hsu, Tsai-hsin Chu, Tung-Ching Lin, Chiao-Fang Lo. Coping knowledge boundaries between information system and business disciplines: An intellectual capital perspective |