Journal: IRMJ

Volume 18, Issue 4

1 -- 20Margi Levy, Philip Powell, Les Worrall. Strategic Intent and E-Business in SMEs: Enablers and Inhibitors
21 -- 39Neil F. Doherty, Heather Fulford. Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis
40 -- 61Abhishek Nirjar, Andrew Tylecote. Breaking Out of Lock-In: Insights from Case Studies into Ways Up the Value Ladder for Indian Software SMEs
62 -- 80Monideepa Tarafdar, Jie Zhang. Analyzing the Influence of Web Site Design Parameters on Web Site Usability
81 -- 99Souren Paul, Carol Stoak Saunders, William (Dave) Haseman. A Question of Timing: The Impact of Information Acquisitions on Group Design Making

Volume 18, Issue 3

1 -- 12Sanjay Bapna, Aryya Gangopadhyay. A Web-Based GIS for Analyzing Commercial Motor Vehicle Crashes
13 -- 31Virginia Ilie, Craig Van Slyke, Gina Green, Hao Lou. Gender Differences in Perceptions and Use of Communication Technologies: A Diffusion of Innovation Approach
32 -- 49D. Harrison McKnight, Norman L. Chervany. What Builds System Troubleshooter Trust the Best: Experiential or Non-Experiential Factors?
50 -- 67J. Michael Pearson, A. Pearson, J. P. Shim. The Relevancy of Information Systems Research: The Practitioner s View
68 -- 87Ronald Dattero, Stuart D. Galup, Jing Quan. Assessing Gender Differences in Software Developers Using the Human Capital Model

Volume 18, Issue 2

1 -- 23Mary C. Jones. Tacit Knowledge Sharing During ERP Implementation: A Multi-Site Case Study
24 -- 40Craig Van Slyke, France Belanger, Varadharajan Sridhar. A Comparison of American and Indian Consumers Perceptions of Electronic Commerce
41 -- 67Ned Kock. Compensatory Adaptation to Media Obstacles: An Experimental Study of Process Redesign Dyads
68 -- 93Omar E. M. Khalil, Manal M. Elkordy. EIS Information: Use and Quality Determinants
94 -- 113Victoria Y. Yoon, Barbara Broome, Rahul Singh, Tor Guimaraes. Using Agent Technology for Company Knowledge Management

Volume 18, Issue 1

1 -- 13Denise Johnson McManus, Houston H. Carr, Charles A. Snyder. An Investigation of Telecommunications as a Plan Location Decision Criterion
14 -- 28Laura Lally. Information Technology as a Target and Shield in the Post 9/11 Environment
29 -- 41Alan R. Peslak. Internet Privacy Policies: A Review and Survey of the Fortune 50
42 -- 60Tatyana V. Bondarouk, Klaas Sikkel. Explaining IT Implementation Through Group Learning