| 5 | -- | 6 | Vladimir Zwass. Editorial Introduction |
| 7 | -- | 11 | Robert O. Briggs, Jay Nunamaker Jr., Ralph H. Sprague Jr.. Special Issue: Crossing Boundaries in Information Systems Research |
| 13 | -- | 37 | Natalia Levina, Emmanuelle Vaast. Turning a Community into a Market: A Practice Perspective on Information Technology Use in Boundary Spanning |
| 39 | -- | 68 | Ann L. Fruhling, Gert-Jan de Vreede. Field Experiences with eXtreme Programming: Developing an Emergency Response System |
| 69 | -- | 108 | Khalil Khoumbati, Marinos Themistocleous, Zahir Irani. Evaluating the Adoption of Enterprise Application Integration in Health-Care Organizations |
| 109 | -- | 142 | Lili Sun, Rajendra P. Srivastava, Theodore J. Mock. An Information Systems Security Risk Assessment Model Under the Dempster - Shafer Theory of Belief Functions |
| 143 | -- | 176 | David L. Paul. Collaborative Activities in Virtual Settings: A Knowledge Management Perspective of Telemedicine |
| 177 | -- | 206 | Jolie C. Y. Lam, Matthew K. O. Lee. Digital Inclusiveness - Longitudinal Study of Internet Adoption by Older Adults |
| 207 | -- | 235 | Jinwei Cao, Janna M. Crews, Ming Lin, Amit V. Deokar, Judee K. Burgoon, Jay Nunamaker Jr.. Interactions Between System Evaluation and Theory Testing: A Demonstration of the Power of a Multifaceted Approach to Information Systems Research |
| 237 | -- | 270 | Lina Zhou, Yongmei Shi, Dongsong Zhang, Andrew Sears. Discovering Cues to Error Detection in Speech Recognition Output: A User-Centered Approach |
| 271 | -- | 303 | Wonseok Oh, Michael J. Gallivan, Joung W. Kim. The Market’s Perception of the Transactional Risks of Information Technology Outsourcing Announcements |
| 305 | -- | 336 | Huimin Zhao, Ehsan S. Soofi. Exploring Attribute Correspondences Across Heterogeneous Databases by Mutual Information |
| 337 | -- | 376 | Kun Chang Lee, Soonjae Kwon. The Use of Cognitive Maps and Case-Based Reasoning for B2B Negotiation |