214 | -- | 232 | Salomée Ruel, Sabry Shaaban, Margaux Ducros. Supply chain vulnerability: contributions from an edifying case study |
233 | -- | 250 | Yuan Sun, Xinjie Zhou, Anand Jeyaraj, Rong-An Shang, Feng Hu. The impact of enterprise social media platforms on knowledge sharing |
251 | -- | 273 | Christopher Reichstein. Strategic IT management: how companies can benefit from an increasing IT influence |
274 | -- | 300 | Md Abu Saleh, M. Yunus Ali Back to, Ali Quazi, Deborah Blackman. Buyer-supplier relational paradigm in internationalization process |
301 | -- | 324 | Zahoor Ahmed Soomro, Javed Ahmed, Mahmood Hussain Shah, Khalil Khoumbati. Investigating identity fraud management practices in e-tail sector: a systematic review |
325 | -- | 344 | Meng-Meng Wang, Jian-Jun Wang. How vendor capabilities impact IT outsourcing performance |
345 | -- | 363 | Sang-Soo Kim. The role of knowledge and organizational support in explaining managers' active risk management behavior |