8 | -- | 12 | Amir M. Sharif. Paralysis by analysis? The dilemma of choice and the risks of technology evaluation |
13 | -- | 23 | Janice C. Sipior, Burke T. Ward. User perceptions of software with embedded spyware |
24 | -- | 38 | Euripidis Loukis, Ioakim A. Sapounas, Konstantinos Aivalis. The effect of generalized competition and strategy on the business value of information and communication technologies |
39 | -- | 51 | Angel L. Merono-Cerdan, Pedro Soto-Acosta, Carolina López-Nicolás. Analyzing collaborative technologies' effect on performance through intranet use orientations |
52 | -- | 70 | Ajchara Vararuk, Ilias Petrounias, Vassilis Kodogiannis. Data mining techniques for HIV/AIDS data management in Thailand |
71 | -- | 80 | Soha Maad, Samir Garbaya, Saïda Bouakaz. From virtual to augmented reality in financial trading: a CYBERII application |
81 | -- | 92 | Peng Liu, Elia El-Darzi, Lei Lei, Christos Vasilakis, Panagiotis Chountas, Wei Huang. Applying data mining algorithms to inpatient dataset with missing values |
93 | -- | 104 | Ruxandra Gorunescu, Peter H. Millard, Dumitru Dumitrescu. Evolutionary placement decisions of a multidisciplinary panel using genetic chromodynamics |