Journal: IRMJ

Volume 25, Issue 4

1 -- 25Rafay Ishfaq, Uzma Raja. Task-Resource Capability Alignment: Discerning Staffing and Service Issues in Software Maintenance
26 -- 45Jianping Peng, Jing Quan. Characteristics of Social Networks and Employee Behavior and Performance A Chinese Case Study of a State-Owned Enterprise
46 -- 64Soni Agrawal, Kishor Goswami, Bani Chatterjee. Factors Influencing Performance of ITES Firms in India
65 -- 83Haya Ajjan, Richard Hartshorne, Scott Buechler. Investigating Web 2.0 Application Impacts on Knowledge Workers' Decisions and Performance

Volume 25, Issue 3

1 -- 29Alex Ng, Paul Andrew Watters, Shiping Chen. A Consolidated Process Model for Identity Management
30 -- 60Mahmud Akhter Shareef, Vinod Kumar. Prevent/Control Identity Theft: Impact on Trust and Consumers' Purchase Intention in B2C EC
61 -- 77Marco Viviani, Nadia Bennani, Elöd Egyed-Zsigmond. G-Profile: A Hybrid Solution for Extended Identity Management in the Field of Personalized Service Provision
78 -- 97Lara Khansa, Divakaran Liginlal. Regulatory Influence and the Imperative of Innovation in Identity and Access Management
98 -- 116Martin Juhrisch, Gunnar Dietz. Usage and Impact of Model-Based User Authorization

Volume 25, Issue 2

1 -- 21Luís Ferreira, Goran D. Putnik, Maria Manuela Cruz-Cunha, Zlata Putnik. Towards Effective Tourism Dynamic Packages
22 -- 33Pedro Sá Silva, Jorge Pinto, João Varajão, António Trigo, Isabel Bentes, Humberto Varum. Potential Use of the Theory of Vulnerability in Information Systems
34 -- 51António Rodrigues, Henrique O'Neill. Framework Based on Benefits Management and Enterprise Architecture
52 -- 68Carlos Páscoa, Nuno Belo, José M. Tribolet. Business Objectives and Business Processes: Alignment and Verification
69 -- 84Rinaldo C. Michelini, Roberto P. Razzoli. The Mankind Growth Consistency: Outlook on Political Sceneries
85 -- 102Silja Eckartz, Christiaan Katsma, Maya Daneva. Exploring the Business Case Development Process in Inter-Organizational Enterprise System Implementations

Volume 25, Issue 1

1 -- 20Dave Hendersen, Steven D. Sheetz, France Belanger. Explaining Developer Attitude Toward Using Formalized Commercial Methodologies: Decomposing Perceived Usefulness
21 -- 37Humayun Zafar, Myung Ko, Kweku-Muata Osei-Bryson. Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors
38 -- 60Pratyush Bharati, Abhijit Chaudhury. Technology Assimilation Across the Value Chain: An Empirical Study of Small and Medium-Sized Enterprises
61 -- 80Joseph Nwankpa, Pratim Datta. Perceived Audit Quality from ERP Implementations