Journal: JIT

Volume 26, Issue 4

221 -- 258Mary Lacity, Stan Solomon, Aihua Yan, Leslie P. Willcocks. Business process outsourcing studies: a critical review and research directions
259 -- 267Helga Drummond. MIS and illusions of control: an analysis of the risks of risk management
268 -- 270Kalle Lyytinen. MIS: the urge to control and the control of illusions - towards a dialectic
271 -- 273Nathalie N. Mitev. Beyond health warnings: risk, regulation, failure and the paradoxes of risk management
274 -- 276Alexander Budzier. The risk of risk registers - managing risk is managing discourse not tools
277 -- 279Li Liu. Mirage or implementation pitfalls - in defence of risk registers as an effective risk management tool
280 -- 281Henri Barki. Managing illusions of control
282 -- 283David Wastell. Risk as 'make-believe': the case of child protection
284 -- 287Helga Drummond. 'Fools with tools', mirrors of imagination, masks of science and electronic metonyms: a response
288 -- 293Robert M. Davison, Maris G. Martinsons. Methodological practice and policy for organisationally and socially relevant IS research: an inclusive-exclusive perspective
294 -- 295Michael D. Myers. Is there a methodological crisis?
296 -- 298Allen S. Lee. IS research methods: inclusive or exclusive?
299 -- 301Robert D. Galliers. In celebration of diversity in information systems research
302 -- 303Joe Nandhakumar, Harry Scarbrough. Open sources? A commentary on 'IS research methods: inclusive or exclusive?'
304 -- 305Matt Germonprez. Pluralism is not about me, it is about us
306 -- 312Rajeev Sharma. Research methods and the relevance of the IS discipline: a critical analysis of the role of methodological pluralism
313 -- 322Aaron M. French, Jung P. Shim. Multinational diversity in IS research: the effects of education on publication outlets

Volume 26, Issue 3

153 -- 169Huoy Min Khoo, Daniel Robey, Srinivasan Venkoba Rao. An exploratory study of the impacts of upgrading packaged software: a stakeholder perspective
170 -- 192Placide Poba-Nzaou, Louis Raymond. Managing ERP system risk in SMEs: a multiple case study
193 -- 204Jerry Luftman, Hossein S. Zadeh. Key information technology and management issues 2010-11: an international study
205 -- 219Tim Coltman, Timothy M. Devinney, David F. Midgley. Customer relationship management and firm performance

Volume 26, Issue 2

95 -- 98Steve Sawyer, Susan J. Winter. Special issue on futures for research on information systems: prometheus unbound?
99 -- 108Susan J. Winter, Brian S. Butler. Creating bigger problems: grand challenges as boundary objects and the legitimacy of the information systems field
109 -- 119William H. Dutton. The politics of next generation research: democratizing research-centred computational networks
120 -- 128Erwin P. Gianchandani. Toward smarter health and well-being: an implicit role for networking and information technology
129 -- 138John Leslie King. CIO: concept is over
139 -- 152Jennifer Blaskovich, Natalia Mintchik. Accounting executives and IT outsourcing recommendations: an experimental study of the effect of CIO skills and institutional isomorphism

Volume 26, Issue 1

1 -- 15Jason L. Dedrick, Erran Carmel, Kenneth L. Kraemer. A dynamic model of offshore software development
16 -- 31Christina Soh, Cecil Chua Eng Huang, Harminder Singh. Managing diverse stakeholders in enterprise systems projects: a control portfolio approach
32 -- 45Bendik Bygstad, Bjørn Erik Munkvold. Exploring the role of informants in interpretive case study research in IS
46 -- 59Mikko Valorinta. IT alignment and the boundaries of the IT function
60 -- 77Ali Alper Yayla, Qing Hu. The impact of information security events on the stock value of firms: the effect of contingency factors
78 -- 93Matthew L. Smith. Limitations to building institutional trustworthiness through e-government: a comparative study of two e-services in Chile