Abstract is missing.
- The Role of Innovation Projects in Institutionalization: The Case of Resource Planning SystemsHarry Scarbrough, Maxine Robertson. 1-6 [doi]
- Combination of Interoperability Registries with Process and Data Management Tools for Governmental Services TransformationYannis Charalabidis, Fenareti Lampathaki, John E. Psarras. 1-10 [doi]
- Mycrocosm: Visual MicrobloggingYannick Assogba, Judith S. Donath. 1-10 [doi]
- Multiwavelets for Quantitative Pattern MatchingBruce Kessler. 1-10 [doi]
- Virtual Networks and Ethics: An Empirical Research in a Non-Governmental OrganizationAntonino Vaccaro, Peter Madsen. 1-9 [doi]
- Self-Teaching Semantic Annotation Method for Knowledge Discovery from TextKaiquan Xu, Stephen Shaoyi Liao, Raymond Y. K. Lau, Lejian Liao, Heng Tang. 1-7 [doi]
- EM Enforcing Information Flow Properties using Compensating EventsThoshitha T. Gamage, Bruce M. McMillin. 1-7 [doi]
- Future Development of Project Management CompetencesA. J. Gilbert Silvius, Ronald Batenburg. 1-10 [doi]
- The Enhancement of Graduate Digital Forensics Education via the DC3 Digital Forensics ChallengeTimothy H. Lacey, Gilbert L. Peterson, Robert F. Mills. 1-9 [doi]
- A Framework for the Development of Multi-Agent Systems in Supply Chain ManagementBernd Hellingrath, Carsten Böhle, Jan van Hueth. 1-9 [doi]
- Exploring Mobile Service Adoption: Customer PreferencesBanu Kargin, Nuri Basoglu, Tugrul U. Daim. 1-8 [doi]
- Case Studies of an Insider FrameworkMatt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates. 1-10 [doi]
- Managing Projects in an Embedded System Development Context: An In-Depth Case Study from an Improvisational PerspectiveWolfgang Molnar, Joe Nandhakumar. 1-10 [doi]
- Applying Bayesian Belief Networks in Rapid Response SituationsWilliam L. Gibson, Deborah A. Leishman, Ed Van Eeckhout. 1-8 [doi]
- Exploring User Preference for the Dashboard Menu DesignAaron Read, Alvin Tarrell, Ann L. Fruhling. 1-10 [doi]
- Enabling Distributed Model Management Using Semantic Web TechnologiesAmit V. Deokar, Omar F. El-Gayar. 1-9 [doi]
- The Commit Size Distribution of Open Source SoftwareOliver Arafat, Dirk Riehle. 1-8 [doi]
- An Evaluation of Agreement and Conflict Among Computer Forensics ExpertsGregory H. Carlton, Reginald Worthley. 1-10 [doi]
- Government Enterprise Architecture Grid Adaptation in FinlandKatariina Valtonen, Ville Seppänen, Mauri Leppänen. 1-10 [doi]
- Can Eye Movements Reveal Visual Preference?Laurel A. King. 1-10 [doi]
- A Systems Dynamics View of Security Assurance Issues: The Curse of Complexity and Avoiding Chaos Dennis K. Holstein. 1-9 [doi]
- Proceedings Overview1 [doi]
- Innovations across Borders: FDI and Innovative Capacity of Russian CompaniesJuha Väätänen, Daria Podmetina, Marina Aleksandrova, Maria Smirnova. 1-6 [doi]
- Integrating Action Research and System Dynamics: Towards a Generic Process Design for Participative ModellingBenedict Oyo, Ddembe Williams, Erik Barendsen. 1-11 [doi]
- Infrastructure Protection in the Ancient WorldMichael J. Assante. 1-10 [doi]
- Systematic Risk Management for the Innovative EnterpriseRay Strong, Ruoyi Zhou, Jaakko Paasi, Tuija Luoma. 1-9 [doi]
- An Overview of the Adoption of IT Governance Models and Software Process Quality Instruments at Brazil - Preliminary Results of a SurveyRodrigo Santos de Espindola, Edimara Mezzomo Luciano, Jorge Luis Nicolas Audy. 1-9 [doi]
- Bridge Methods: Using a Balanced Project Practice Portfolio to Integrate Agile and Formal Process MethodologiesStephen J. Cohen, William H. Money. 1-10 [doi]
- E-Commerce Oriented Negotiating Agent Communication ModelMukun Cao, Yuqiang Feng, Zhenyu Liu. 1-9 [doi]
- Social Structures, Isomorphic Pressures, and B2B Utilisation in the Thai Tourism IndustrySavanid Vatanasakdakul, Chadi Aoun. 1-10 [doi]
- Project Management Strategies for Prototyping BreakdownsMaren Sander Granlien, Jan Pries-Heje, Richard Baskerville. 1-10 [doi]
- Rejection in a Gay Chat RoomRodney H. Jones. 1-9 [doi]
- Literature Clustering using Citation SemanticsTuanjie Tong, Deendayal Dinakarpandian, Yugyung Lee. 1-10 [doi]
- Impact of Requirements Discovery Pattern on Software Project Outcome: Preliminary ResultsRahul Thakurta, Rahul Roy, Subir Bhattacharya. 1-6 [doi]
- Fast Talking, Fast Shooting: Text Chat in an Online First-Person GameSusan C. Herring, Daniel O. Kutz, John C. Paolillo, Asta Zelenkauskaite. 1-10 [doi]
- Social Visualization of Health MessagesBrant Chee, Karrie G. Karahalios, Bruce Schatz. 1-10 [doi]
- I Am a Black Cat, Letting Day Come and Go : Multimodal Conversations in a Poetry WorkshopRuy Cervantes, Jahmeilah Richardson, Bonnie Nardi. 1-10 [doi]
- New Development of Advanced ITG FrameworkJung Hoon Lee, S.-H. Juhn, K.-T. Hwang. 1-10 [doi]
- Integrating Formal Analysis and Design to Preserve Security PropertiesRiham Hassan, Shawn A. Bohner, Sherif El-Kassas, Michael G. Hinchey. 1-10 [doi]
- SOA and EA - Sustainable Contributions for Increasing Corporate AgilityJoachim Schelp, Stephan Aier. 1-8 [doi]
- Modeling Resources in a Service-Oriented WorldAndreas Heil, Martin Gaedke, Johannes Meinecke. 1-10 [doi]
- Citation Format1 [doi]
- CitiScape Architecture for eGovernment EffectivenessVasudha Gupta, Farha Mukri, Jay Ramanathan, Rajiv Ramnath, Kelly Yackovich. 1-10 [doi]
- A Model-Based Approach to Aid the Development of E-Government Projects in Real-Life Setting Focusing on Stakeholder ValueZsófia Kräussl, Yao-Hua Tan, Jaap Gordijn. 1-10 [doi]
- Aligning CIO Characteristics to Business Strategy: An Empirical InvestigationYan Li, Chuan-Hoo Tan. 1-10 [doi]
- How Spreadsheets Get Us to Mars and BeyondJairus Hihn, Scott Lewicki, Belinda Wilkinson. 1-9 [doi]
- Structured Variation Management in Software Product LinesFelix Bachmann, Linda M. Northrop. 1-7 [doi]
- Interorganizational Governance of Information TechnologyAnne-Marie Croteau, François Bergeron. 1-8 [doi]
- Optimal Pumping Schedule and Salinity Control in a Coastal Aquifer: a Decision Support SystemT. Ka eo Duarte, Riccardo Minciardi, Michela Robba, Roberto Sacile. 1-9 [doi]
- Signs: Increasing Expression and Clarity in Instant MessagingAaron Zinman, Judith S. Donath. 1-10 [doi]
- Using Knowledge Management Systems to Structure Knowledgeable PracticesChad Saunders, Mike Chiasson. 1-10 [doi]
- Encouraging Knowledge Sharing in Global Virtual Teams: The Interaction Effect of Individual Difference and Perceived Sharing BenefitsZhenjiao Chen, Xi Zhang, Dingtao Zhao. 1-10 [doi]
- People Sensemaking and Relationship Building on an Enterprise Social Network SiteJoan Morris DiMicco, Werner Geyer, David R. Millen, Casey Dugan, Beth Brownholtz. 1-10 [doi]
- Understanding the Boundary in Information Sharing and IntegrationLei Zheng, Tung-Mou Yang, Theresa A. Pardo, Yuanfu Jiang. 1-10 [doi]
- The Demographic Challenge: Aging and Depopulation and their Consequences for E-Government - A Case StudyBjörn Niehaves, Kevin Ortbach, Jörg Becker. 1-8 [doi]
- Trapping Malicious Insiders in the SPDR WebJ. Thomas Haigh, Steven A. Harp, Richard C. O Brien, Charles N. Payne, Johnathan Gohde, John Maraist. 1-10 [doi]
- Comparison of Social Presence in Voice-Based and Text-Based Asynchronous Computer ConferencesKaren King, Timothy J. Ellis. 1-10 [doi]
- Designing Proxy Bidders for Online Combinatorial AuctionsSoumyakanti Chakraborty, Anup K. Sen, Amitava Bagchi. 1-10 [doi]
- Emergent Stakeholder CompetenceAnne Live Vaagaasar. 1-9 [doi]
- Determining Appropriate Modes for Service Trade from Value Chain and Value Co-Creation PerspectivesDavid Chien-Liang Kuo, Fu-ren Lin, Hubert H. D. Chih, Yu-Chen Benjamin Yang. 1-10 [doi]
- Running Code as Part of an Open Standards PolicyRajiv C. Shah, Jay P. Kesan. 1-7 [doi]
- Towards Tool Support for the Configuration of Non-Functional Properties in SPLsJulio Sincero, Wolfgang Schröder-Preikschat, Olaf Spinczyk. 1-7 [doi]
- Decision Support for Flow Management in a Recycling NetworkUlrich Derigs, Stefan Friederichs. 1-9 [doi]
- Study on Information Needs of Rural Consumers and amp; Exploring Alternatives: A Study in the Indian ContextRajanish Dass. 1-8 [doi]
- Emerging Role of Public Librarians as E-Government ProvidersAmelia N. Gibson, John Carlo Bertot, Charles R. McClure. 1-10 [doi]
- Modeling Collaborative Behavior: Foundations for Collaboration TechnologiesSteven E. Poltrock, Mark Handel. 1-10 [doi]
- Simulating Large-Scale P2P Assisted Video StreamingRyan LaFortune, Christopher D. Carothers, William D. Smith, Joe Czechowski, Xi Wang. 1-10 [doi]
- Users of Open Source Software - How Do They Get Help?Vandana Singh, Michael B. Twidale, David M. Nichols. 1-10 [doi]
- Ontological Support for Managing Non-Functional Requirements In Pervasive HealthcareNigel Koay, Pavandeep Kataria, Radmila Juric, Patricia A. Oberndorf, Gábor Terstyánszky. 1-10 [doi]
- Integrated Patient Health Information Systems to Improve Traffic Crash Emergency Response and TreatmentBenjamin L. Schooley, Thomas A. Horan, Michael Marich, Brian Hilton, Aisha Noamani. 1-10 [doi]
- Re-Visiting the Knowledge PyramidMurray E. Jennex. 1-7 [doi]
- Privacy Preserving Decision Tree Mining from Perturbed DataLi Liu, Murat Kantarcioglu, Bhavani M. Thuraisingham. 1-10 [doi]
- Government Multichannel Marketing: How to Seduce Citizens to the Web Channels?Marije Teerling, Willem Pieterson. 1-10 [doi]
- Service-Quality Criteria of Web Recruiters: A Content AnalysisElfi Ettinger, Celeste Wilderom, Huub J. M. Ruël. 1-10 [doi]
- A Framework Linking Information Quality Dimensions and Coordination Challenges during Interagency Crisis ResponseRafael A. Gonzalez, Nitesh Bharosa. 1-10 [doi]
- Replicating and Sharing Computer Security Laboratory EnvironmentsKara L. Nance, Brian Hay, Ronald Dodge, James Wrubel, Steve Burd, Alex Seazzu. 1-10 [doi]
- Aligning Service Maps - A Methodological Approach from the Financial IndustryFalk Kohlmann, Rainer Alt. 1-10 [doi]
- Hello Stranger! A Study of Introductory Communication Structure and Social Match SuccessDaphne R. Raban, Stephen R. Ricken, Sukeshini A. Grandhi, Nathaniel Laws, Quentin Jones. 1-9 [doi]
- Consumer e-Satisfaction and Site Stickiness: An Empirical Investigation in the Context of Online Hotel ReservationsElena Karahanna, Greta L. Polites, Larry Seligman, Clay K. Williams. 1-10 [doi]
- Privacy Concerns, Trust in Government and Attitudes to Identity Cards in the United KingdomAdam N. Joinson. 1-10 [doi]
- Packaged Software Configuration through the Lens of Social Construction of TechnologyElham Mousavidin, Leiser Silva. 1-8 [doi]
- Systems Modeling for IP-Based Handoff Using Timed Petri NetsAshutosh Dutta, Bryan Lyles, Henning Schulzrinne, Jiacun Wang. 1-10 [doi]
- A Framework for the Design of Ubiquitous Learning ApplicationsAmarolinda Zanela Saccol, Marcos Kich, Eliane Schlemmer, Nicolau Reinhard, Jorge L. V. Barbosa, Rodrigo Hahn. 1-10 [doi]
- Building Leadership for Life Cycle Business Transition by Hybrid InnovationVesa Salminen. 1-10 [doi]
- The Potential of Renewable Energy to Reduce the Dependence of the State of Hawaii on OilDoug Arent, John Barnett, Gail Mosey, Alison Wise. 1-11 [doi]
- Service-Oriented Architecture Adoption PatternsMarc N. Haines, William (Dave) Haseman. 1-9 [doi]
- Pricing Strategies for Information Technology Services: A Value-Based ApproachRobert Harmon, Haluk Demirkan, Bill Hefley, Nora Auseklis. 1-10 [doi]
- Machine Learning Algorithm Selection for Forecasting Behavior of Global Institutional InvestorsJae Joon Ahn, Suk Jun Lee, Kyong Joo Oh, Tae-Yoon Kim, Hyoung Yong Lee, Min Sik Kim. 1-9 [doi]
- Word of Mouth and Critical Reviews for the Motion Picture Industry in South Korea: On Mainstream and Non-Mainstream MoviesJoonhyuk Yang, Luke Kim, Naveen Amblee, Wonjoon Kim. 1-10 [doi]
- Factors Affecting Use of Mobile Advertising: A Quantitative StudyRamin Vatanparast, Ali Hasan Butt. 1-8 [doi]
- From Software Documents to Experience Knowledge Based ArtifactsJouni Kokkoniemi, Lasse Harjumaa. 1-9 [doi]
- Inside Agile Processes: A Practitioner s PerspectiveOlivera Marjanovic. 1-10 [doi]
- Service Quality s Impact on Mobile Satisfaction and Intention to Use 3G ServiceYung-Ming Li, Yung-Shao Yeh. 1-10 [doi]
- Learning 2.0 in the Information Systems CurriculumConan C. Albrecht, Kyle Matthews. 1-10 [doi]
- Joint Capacity and Contract Management for Operating Service FacilitiesYabing Jiang, Abraham Seidmann. 1-7 [doi]
- Consumer Informedness and Hyperdifferentiation: An Empirical Test of the Trading Down and Trading Out HypothesesRobert J. Kauffman, Ting Li, Eric van Heck, Peter Vervest. 1-10 [doi]
- Information Strategies to Support Full Information Product Pricing: the Role of TrustLuis F. Luna-Reyes, David F. Andersen, Josune Arcelus de Diego, Jing Zhang, Madeleine Andersen, Andy Whitmore, Rejean Roy. 1-10 [doi]
- A Pervasive Computing Platform for Wearable SensorsRamin Vatanparast. 1-7 [doi]
- Design, Implementation, and Preliminary Evaluation of a Web-Based Health Risk CalculatorChristopher A. Harle, Rema Padman, Julie S. Downs. 1-10 [doi]
- Contribution of Knowledge and Knowledge Management Capability on Business Processes among Healthcare OrganizationsSree Nilakanta, Les Miller, Andrea Peer, Vani M. Bojja. 1-9 [doi]
- Supporting the Design of Health Information Systems: Action Research as Knowledge TranslationPernille Bjørn, Ellen Balka. 1-10 [doi]
- Monetizing the Internet: Surely There Must be Something other than AdvertisingEric K. Clemons. 1-10 [doi]
- Virtual Communities: A Bibliometric AnalysisMikko O. J. Laine. 1-10 [doi]
- Linking Technology and New Product DevelopmentTugrul U. Daim, Neslihan Sener, Chris Galluzzo. 1-9 [doi]
- Examining the Relationship between IT Governance Software, Processes, and Business Value: A Quantitative Research ApproachHauke Heier, Hans P. Borgman, Christos Mileos. 1-11 [doi]
- How Students Search for Consumer Health Information on the WebEfthimis N. Efthimiadis. 1-8 [doi]
- Blogs are Echo Chambers: Blogs are Echo ChambersEric Gilbert, Tony Bergstrom, Karrie Karahalios. 1-10 [doi]
- Do Textual Comments and Existing Orders Affect Consumer Participation in Online Group-Buying?Robert J. Kauffman, Hsiangchu Lai, Huang-chi Lin, Yu-sang Chang. 1-10 [doi]
- Improving the Effectiveness of Business Process Development through Collaboration Engineering: A Method for Process ElicitationKalle Piirainen, Kalle Elfvengren, Jukka Korpela, Markku Tuominen. 1-10 [doi]
- Using Software Archaeology to Measure Knowledge Loss in Software Projects Due to Developer TurnoverDaniel Izquierdo-Cortazar, Gregorio Robles, Felipe Ortega, Jesús M. González-Barahona. 1-10 [doi]
- The Impact of Grid on Health Care Digital RepositoriesFlavia Donno, Elisabetta Ronchieri. 1-9 [doi]
- Power System Level Impacts of PHEVsCurtis Roe, Farantatos Evangelos, Jerome Meisel, A. P. Sakis Meliopoulos, Thomas J. Overbye. 1-10 [doi]
- A Model of Antecedents of RFID Adoption Intention in the Supply ChainMaria Madlberger. 1-10 [doi]
- Enterprise Architecture in Government: Fad or Future?Kristian Hjort-Madsen, Jan Pries-Heje. 1-10 [doi]
- Second Life as a Medium for Lecturing in College CoursesDaniel C. Cliburn, Jeffrey L. Gross. 1-8 [doi]
- Forming Social Networks of Trust to Incentivize CooperationStuart M. Allen, Gualtiero Colombo, Roger M. Whitaker. 1-10 [doi]
- Task Behaviors During Web Search: The Difficulty of Assigning LabelsDaniel M. Russell, Diane Tang, Melanie Kellar, Robin Jeffries. 1-5 [doi]
- North American SynchroPhasor Initiative - An Update of ProgressJeff Dagle. 1-5 [doi]
- Project Knowledge Management Organizational Design and Success Factors - An Empirical Study in GermanyPatricia Frey, Frank Lindner, Ana Müller, Andreas Wald. 1-14 [doi]
- The Myth of Population Density and ICT InfrastructureKurt DeMaagd. 1-10 [doi]
- A Comparison of Maps and Signs for Ordered and Unordered Navigation Tasks in Virtual WorldsDaniel C. Cliburn, Todd Heino. 1-8 [doi]
- Designing an Intelligent Agent that Negotiates Tactfully with Human Counterparts: A Conceptual Analysis and Modeling FrameworkYinping Yang, Sharad Singhal. 1-10 [doi]
- Maximum Lifetime Broadcasting Topologies in Wireless Sensor Networks: Advanced Mathematical Programming ModelsRoberto Montemanni. 1-10 [doi]
- Real Time Dynamics Monitoring System (RTDMS): Phasor Applications for the Control RoomManu Parashar, Jianzhong Mo. 1-11 [doi]
- Specifying and Analyzing Workflows for Automated Identification and Data CaptureElsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, Anh Nguyen. 1-11 [doi]
- A Cross-Cultural Comparison of UCC usage in Korea and U.S.ASora Kang, Yoo-Jung Kim, Hyunju Lee. 1-10 [doi]
- Formalizing Operations Intent and Effects for Network-Centric ApplicationsPer M. Gustavsson, Michael R. Hieb, Lars Niklasson, Philp Moore, Patric Eriksson. 1-10 [doi]
- Evaluating the Effectiveness of Information Service for SMEs on Information Orientation and Firm PerformanceC. S. Lee, I. S. Ko, C. Jung. 1-9 [doi]
- Exploring End-User Reactions to Variations in the Value Proposition of Value ServicesPer E. Pedersen, Herbjørn Nysveen. 1-10 [doi]
- The Role of Social Capital in the Creation of Community Wireless NetworksAbdelnasser Abdelaal, Hesham H. Ali, Deepak Khazanchi. 1-10 [doi]
- Monitoring High-Quality Wine Production using Wireless Sensor NetworksGiuseppe Anastasi, Orazio Farruggia, Giuseppe Lo Re, Marco Ortolani. 1-7 [doi]
- Adoption of Electronic Commerce Technologies by SMEs in MalaysiaSherah Kurnia, Basil Alzougool, Mazen Ali, Saadat M. Alhashmi. 1-10 [doi]
- Process Models of Medication InformationJoonas Mäkinen, Pirkko Nykänen. 1-7 [doi]
- E-Mail Bounce Management Using Text MiningLukas Grieser, Hajo Hippner, Klaus D. Wilde. 1-10 [doi]
- Longitudinal Analysis of the Effects of IT Characteristics on Web Site Ratings Across State Governments in the US (2001-2006)Gabriel Puron Cid, José Ramón Gil-García, Theresa A. Pardo. 1-10 [doi]
- Proposition of a Faceted Classification Model to Support Corporate Information Organization and Digital Records ManagementSabine Mas, Yves Marleau. 1-10 [doi]
- Knowing Who Knows What: Information Technology, Knowledge Visibility, and Organizational ChangeJeffrey William Treem, Paul M. Leonardi. 1-10 [doi]
- Taxonomy of Online Communities: Ownership and Value PropositionsM. Gordon Hunter, Rosemary Stockdale. 1-7 [doi]
- The Impact of Security Issues on Willingness-to-Share in Community Wireless NetworksPaul Beckman, Dirk Shim. 1-9 [doi]
- Empirical Assessment of an Instrument for Operationalising Factors Affecting Use of B2E PortalsMd. Mahbubur Rahim, Mohammad Quaddus, Mohini Singh. 1-11 [doi]
- Evaluating Longitudinal Success of Open Source Software Projects: A Social Network PerspectiveJing Wu, Khim-Yong Goh. 1-10 [doi]
- Changing Psychological Contracts and their Effect on Control Modes in IT Offshore Outsourcing Projects - A Case from the Financial Services IndustryMichael Prifling, Robert Gregory, Roman Beck. 1-10 [doi]
- Errors in Operational Spreadsheets: A Review of the State of the ArtStephen G. Powell, Kenneth R. Baker, Barry Lawson 0002. 1-8 [doi]
- Towards Conceptual Metamodeling of IT Governance Frameworks Approach - Use - BenefitsMatthias Goeken, Stefanie Alter. 1-10 [doi]
- Balancing Boundaries: Everyday Boundary Work in Information Technology Project ManagementEva Maaninen-Olsson, Magnus Mähring. 1-10 [doi]
- Knowledge Workers and the Realm of Social TaggingRalph Boeije, Gwendolyn L. Kolfschoten, Pieter de Vries, Wim Veen. 1-10 [doi]
- Optimizing Visual Feature Perception for an Automatic Wearable Speech Supplement in Face-to-Face Communication and Classroom SituationsDominic W. Massaro, Miguel Á. Carreira-Perpiñán, David J. Merrill. 1-10 [doi]
- Development Outcomes from IT Adoption in Micro-EnterprisesMehruz Kamal, Travis Good, Sajda Qureshi. 1-10 [doi]
- The Impact of Organizational Culture on Agile Method UseDiane E. Strode, Sid L. Huff, Alexei Tretiakov. 1-9 [doi]
- Collaborative Knowledge Creation and Problem Solving: A Systems Design PerspectiveElahe Javadi, Judith Gebauer. 1-10 [doi]
- Celebrating Diversity in Volunteer ComputingDavid P. Anderson, Kevin Reed. 1-8 [doi]
- An Optimization Model for Tactical Planning of Wood ProcurementAnders Skjäl, Kaj-Mikael Björk, Jenny Östman, Christer Carlsson. 1-9 [doi]
- Revaluation of Bundles by Bidders in Combinatorial AuctionsSoumyakanti Chakraborty, Anup K. Sen, Amitava Bagchi. 1-10 [doi]
- Temporal Patterns in Student-Advisor Instant Messaging Exchanges: Individual Variation and AccommodationAmaury de Siqueira, Susan C. Herring. 1-10 [doi]
- Forming a Value Network - Analyzing the Negotiations Between Actors in the E-Newspaper CaseCarina Ihlström Eriksson, Maria Åkesson, Magnus Bergquist, Jan Ljungberg. 1-10 [doi]
- A Real Options Model for Risk Hedging in Grid Computing ScenariosThomas Meinl, Dirk Neumann. 1-10 [doi]
- Undetectable Monitoring in a Fully-Virtualized Environment - A Continuation of the HAL Keystroke LoggerMichael Kranch, Roy Ragsdale. 1-9 [doi]
- SAVVY: A Semantic Associative Browsing System for Heterogeneous Knowledge ResourcesTakafumi Nakanishi, Koji Zettsu, Yutaka Kidawara, Yasushi Kiyoki. 1-10 [doi]
- An Exploratory Study on the Two New Trends in Open Source Software: End-Users and ServiceNamjoo Choi, InduShobha N. Chengalur-Smith. 1-10 [doi]
- The Role of Domain Expertise in Smart, User-Sensitive, Health Information PortalsJoanne Evans, Rosetta Manaszewicz, Jue Xie. 1-10 [doi]
- Customer Relationship Management Processes in Retail Banking - Best Practice and Business Value EvaluationSven C. Berger, Sonja Gensler, Bernd Skiera, Thorsten Wiesel. 1-10 [doi]
- Effects of Language Familiarity on e-Negotiation: Use of Native vs. Nonnative LanguageHsiangchu Lai, Wan-Jung Lin, Gregory E. Kersten. 1-9 [doi]
- Automatic Web Services GenerationErnest Cho, Sam Chung, Daniel Zimmerman. 1-8 [doi]
- Challenges in Software Product Line CompositionHorst Schirmeier, Olaf Spinczyk. 1-7 [doi]
- A Radical Approach to Network-on-Chip Operating SystemsMichael Engel, Olaf Spinczyk. 1-10 [doi]
- Information Logistics Strategy - Analysis of Current Practices and Proposal of a FrameworkBarbara Dinter, Robert Winter. 1-10 [doi]
- AURUM: A Framework for Information Security Risk ManagementAndreas Ekelhart, Stefan Fenz, Thomas Neubauer. 1-10 [doi]
- Investigating the Use and Effectiveness of Virtual Collaboration Desks for Collaborative Military PlanningPanos Louvieris, Catherine Collins, Natasha Mashanovich. 1-10 [doi]
- Security and Privacy Trust in E-Government: Understanding System and Relationship Trust AntecedentsAlexander J. McLeod Jr., Sonja E. Pippin. 1-10 [doi]
- A Field Study of G2G Information Sharing in Chinese Context Based on the Layered Behavioral ModelJing Fan, Pengzhu Zhang. 1-13 [doi]
- Impacts of the Implementation of Electronic Invoicing on Buyer-Seller RelationshipsEsko Penttinen, Petri Hallikainen, Tuija Salomäki. 1-10 [doi]
- Building a Better Similarity Trap with Statistically Improbable FeaturesVassil Roussev. 1-10 [doi]
- Online Service Quality of Web-Based E-Mail-Services - An Empirical Study for the German MarketMartin Schlegel, Gerrit Tamm. 1-10 [doi]
- Identity Inference as a Privacy Risk in Computer-Mediated CommunicationSara Motahari, Sotirios Ziavras, Richard P. Schuler, Quentin Jones. 1-10 [doi]
- Web Service Composition Based on XML NetsHaiying Che, Yu Li, Andreas Oberweis, Wolffried Stucky. 1-10 [doi]
- Automated Acceptance Testing Using FitGeir Kjetil Hanssen, Børge Haugset. 1-8 [doi]
- A Case Study in Defining Colored Petri Nets Based Model Driven Development of Enterprise Service Oriented ArchitecturesVijay Gehlot, Gayatri Pujari. 1-9 [doi]
- Strategic Behavior in Electricity Capacity MarketsManho Joung, Ross Baldick, Jinho Kim. 1-6 [doi]
- Title Page1-2 [doi]
- Three-Level Customization of Software Products Using a Product Line ApproachRick Rabiser, Reinhard Wolfinger, Paul Grünbacher. 1-10 [doi]
- Semantics-Driven Development for Electronic Government ApplicationsCharles Crichton, Jim Davies, Jeremy Gibbons, Steve Harris, Aadya Shukla, Andrew Tsui. 1-10 [doi]
- Enhancing Learning Experiences in Partially Distributed Teams: Training Students to Work Effectively Across DistancesRosalie J. Ocker, Dana Kracaw, Starr Roxanne Hiltz, Mary Beth Rosson, Linda Plotnick. 1-10 [doi]
- Emerging Standards in Virtual Fashion: An Analysis of Critical Strategies Used in Second Life Fashion BlogsJeffrey Bardzell, Tyler Pace, Laura Brunetti, Qian Huang, Nina Perry, Hyewon Gim. 1-10 [doi]
- Exploring 3D Virtual World Strategies in the Chinese Environment: An Institutional-Based ViewXi Zhang, Doug Vogel, Zhenjiao Chen, Chuanjie Guo. 1-10 [doi]
- Analyzing Chronic Diseases with Latent Growth Models: An Analysis of Multiple SclerosisRonald Freeze, T. S. Raghu, Ajay S. Vinze, Denise Campagnolo, Shahram Partovi, Tuula Tyry. 1-9 [doi]
- Studying Knowledge Management System Success in System AdministrationNicole F. Velasquez, Alexandra Durcikova, Rajiv Sabherwal. 1-7 [doi]
- Application of Protection Motivation Theory to Adoption of Protective TechnologiesTim Chenoweth, Robert Minch, Tom Gattiker. 1-10 [doi]
- Experience as Knowledge in a New Product Development Team: Implications for Knowledge ManagementLynne P. Cooper. 1-10 [doi]
- Effect of Inventor Status on Intra-Organizational Innovation EvolutionSiddharth Kaza, Hsinchun Chen. 1-10 [doi]
- Digital Cross-Organizational and Cross-Border Collaboration: A Scientometric StudyMaria Madlberger, Narcyz Roztocki. 1-10 [doi]
- On The Economic Role of RIS/PACS in Healthcare: An Empirical StudyMoshe Ayal, Abraham Seidmann. 1-10 [doi]
- The Recent Decision of the German Federal Constitutional Court Concerning Data RetentionChristoph Luetge. 1-7 [doi]
- A Method for Emphasizing Signal Detection in Wireless Sensor Network Radio Frequency Array OperationWilliam A. Lintz, John C. McEachen. 1-10 [doi]
- Global Teams: Futuristic Models of Collaborative Work for Today s Software Development IndustryGeorgios A. Dafoulas, Kathleen M. Swigger, Robert P. Brazile, Ferda Nur Alpaslan, Victor Lopez Cabrera, Fatma Cemile Serçe. 1-10 [doi]
- Agents of Diffusion - Insights from a Survey of Facebook UsersRebecca Ermecke, Philip Mayrhofer, Stefan Wagner. 1-10 [doi]
- Benchmarking Technique in E-Business Using the Galileo MethodCheul Rhee, Junghoon Moon, G. Lawrence Sanders, Young Chan Choe. 1-10 [doi]
- The Viable Governance Model - A Theoretical Model for the Governance of ITEdward Lewis, Gary Millar. 1-10 [doi]
- What Is Complex About 273 Applications? Untangling Application Architecture Complexity in a Case of European Investment BankingMartin Mocker. 1-14 [doi]
- Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder MissionFrederick T. Sheldon, Robert K. Abercrombie, Ali Mili. 1-10 [doi]
- The RFID e-Valuation Framework Determining the Business Value from Radio Frequency IdentificationJohn P. Curtin, Robert L. Gaffney, Frederick J. Riggins. 1-10 [doi]
- A Computational Method to Predict DNA Copy Number Alterations from Gene Expression Data in Tumor CasesHuimin Geng, Wing C. Chan, Hesham H. Ali. 1-10 [doi]
- A Multiple-Case Study of The Instructor s Roles in Courseware DevelopmentNa Liu, Cheng Yi, John Lim. 1-10 [doi]
- Issues Related to Development of E/E Product Line Architectures in Heavy VehiclesPeter Wallin, Stefan Johnsson, Jakob Axelsson. 1-10 [doi]
- Determinants of Outsourcing Success in the Financial Industry: The Impact of ImportanceStefan Blumenberg, Daniel Beimborn, Sebastian F. Martin, Branimir Brodnik, Clemens Gunne, Stefan Wendt. 1-10 [doi]
- A Robust Strategy for Managing Congestion at Locks on the Upper Mississippi RiverJames F. Campbell, L. Douglas Smith, Donald C. Sweeney II. 1-10 [doi]
- Intrusion Monitoring in Process Control SystemsAlfonso Valdes, Steven Cheung. 1-7 [doi]
- Virtual Teams and Creative PerformanceLuis L. Martins, Christina E. Shalley, Lucy L. Gilson. 1-10 [doi]
- Open Access to Scientific Literature - Increasing Citations as an Incentive for Authors to Make Their Publications Freely AccessibleSteffen Bernius, Matthias Hanauske. 1-9 [doi]
- Evaluation of the Impacts of a Provider-Focused Telehomecare Intervention: A Pre-Post StudyGuy Paré, Claude Sicotte, Mohamed Chekli, Mirou Jaana, Céline De Blois. 1-10 [doi]
- Conceptualizing Interpersonal Interruption Management: A Theoretical Framework and Research ProgramSukeshini A. Grandhi, Quentin Jones. 1-10 [doi]
- Service Composition in Public Networks: Results from a Quasi-ExperimentRalph Feenstra, Marijn Janssen. 1-10 [doi]
- Sustainability of Grasshopper Management and Support through CARMAJohn D. Hastings, Alexandre V. Latchininsky, Scott P. Schell. 1-10 [doi]
- Bringing Contextual Dimensions into Improvement of Information System Development PracticesUlf Seigerroth, Mikael Lind. 1-10 [doi]
- Offering RSS Feeds: Does It Help to Gain Competitive Advantage?Dan Ma. 1-10 [doi]
- Preface1 [doi]
- Document Cycles: Knowledge Flows in Heterogeneous Healthcare Information System EnvironmentsCarsten S. Østerlund, Richard J. Boland. 1-11 [doi]
- A Model for Understanding the Relationships Between Organizational Trust, KM Initiatives and SuccessesVincent M. Ribiere. 1-10 [doi]
- Business Opportunities with Web Services in the Case of EbayAxel Hochstein, Alexander Schwinn, Walter Brenner. 1-7 [doi]
- Filler Item Strategies for Shilling Attacks against Recommender SystemsSanjog Ray, Ambuj Mahanti. 1-10 [doi]
- Unsocial Networks - Restoring the Social in Social NetworksDonald Steiny. 1-10 [doi]
- TinyOS-Based Quality of Service Management in Wireless Sensor NetworksNina Peterson, Lohith Anusuya-Rangappa, Behrooz Shirazi, Renjie Huang, Wen-Zhan Song, Michael Miceli, Devin McBride, Ali R. Hurson, Richard LaHusen. 1-10 [doi]
- Integrated Electronic Medical Record Systems: Critical Success Factors for ImplementationWilliam MacKinnon, Michael Wasserman. 1-10 [doi]
- Item-Level RFID: Curse or Blessing for Recycling and Waste Management?Lars Thoroe, Adam Melski, Matthias Schumann. 1-10 [doi]
- MultiProcessor Scheduling is PLS-CompleteDominic Dumrauf, Burkhard Monien, Karsten Tiemann. 1-10 [doi]
- A Study of U.S. Battlefield Medical Treatment/Evacuation Compliance with HIPAA RequirementsJohn Chessman, Alan R. Heminger. 1-10 [doi]
- Establishing Trust Management in an Open Source Collaborative Information Repository: An Emergency Response Information System Case StudyEvren Eryilmaz, Mitch Cochran, Sumonta Kasemvilas. 1-10 [doi]
- Online Gaming to Apply for Jobs - The Impact of Self- and E-Assessment on Staff RecruitmentSven Laumer, Alexander von Stetten, Andreas Eckhardt, Tim Weitzel. 1-10 [doi]
- Beyond Microblogging: Conversation and Collaboration via TwitterCourtenay Honeycutt, Susan C. Herring. 1-10 [doi]
- PCCR Study for Italy: Meat Consumption, Preparation, and Meat-Derived Carcinogens on the Risk of Sporadic Pancreatic CancerGleb R. Haynatzki, Vera R. Haynatzka, Paola Ghiorzo, Simon Sherman. 1-9 [doi]
- Towards a Classification of Information Logistics Scenarios - An Exploratory AnalysisGerrit Lahrmann, Florian Stroh. 1-10 [doi]
- Research and the Long Tail: A Large-Scale Citation AnalysisLing-ling Wu, Luesak Luesukprasert, Lynne Lee. 1-10 [doi]
- Making it Hard to Lie: Cultural Determinants of Media Choice for DeceptionChristopher P. Furner, Joey F. George. 1-11 [doi]
- A Systems Approach to Energy Sustainability in Hawai i CountyJeremiah Johnson, Marian Chertow. 1-12 [doi]
- Copyright1 [doi]
- Using Rough Set to Support Investment Strategies of Rule-Based Trading with Real-Time Data in Futures MarketSuk Jun Lee, Jae Joon Ahn, Kyong Joo Oh, Tae-Yoon Kim, Hyoung Yong Lee, Chi Woo Song. 1-10 [doi]
- Using Demographic Migration Theory to Explore Why People Switch Between Online GamesAvus C. Y. Hou, Ching-Chin Chern, Houn-Gee Chen, Yu-Chen Chen. 1-9 [doi]
- FXplorer: Exploration of Computed Software Behavior - A New Approach to Understanding and VerificationLuanne Burns, Timothy Daly. 1-10 [doi]
- Employee Adoption of Corporate Blogs: A Quantitative AnalysisSunil Wattal, Pradeep Racherla, Munir Mandviwalla. 1-10 [doi]
- The Opening Black Box between Conflict and Knowledge Sharing: A Psychological Engagement Theory PerspectiveXi Zhang, Zhenjiao Chen, Chuanjie Guo. 1-10 [doi]
- Ontology Modeling for Goal Driven E-GovernmentPeter Salhofer, Bernd Stadlhofer. 1-9 [doi]
- Managing on Purpose: A Practitioner s Goal for a Recalcitrant BankBryan Frew. 1-10 [doi]
- The Determinants and Effects of Relational Governance on IOS Usage in the Manufacturer-Supplier RelationshipsQunHong Zhang, Zhenyu Liu, Jing Yan. 1-8 [doi]
- Understanding Shared Leadership in Agile Development: A Case StudyNils Brede Moe, Torgeir Dingsøyr, Øyvind Kvangardsnes. 1-10 [doi]
- Decentralized Reactive Power Dispatch for a Time-Varying Multi-TSO SystemYannick Phulpin, Miroslav Begovic, Marc Petit, Damien Ernst. 1-8 [doi]
- Digital Forensics: Defining a Research AgendaKara L. Nance, Brian Hay, Matt Bishop. 1-6 [doi]
- Experience Using Planning Software to Solve Real-Time SystemsCaroline M. Marzinzik, Santiago Grijalva, James D. Weber. 1-7 [doi]
- Knowledge Base Concepts in the KEA System Combined with Social Networking TechniquesSabina Jeschke, Marc Wilke, Nicole Natho, Olivier Pfeiffer. 1-9 [doi]
- A Conceptual Model for Studying the Influence of Charismatic Leadership on ERP Implementation LifecycleZhen Shao, Yuqiang Feng, Qing Hu, Yang Liu. 1-9 [doi]
- Compositional Variability - Concepts and PatternsMark-Oliver Reiser, Ramin Tavakoli Kolagari, Matthias Weber. 1-10 [doi]
- Scenario-Based Approach for Evaluating Service Concepts in the ICT SectorJukka Hallikas, Mikko Pynnönen, Petri Savolainen. 1-9 [doi]
- Predicting Successful Global Online Group Projects from Online DiscussionHyunSeung Koh. 1-10 [doi]
- Information Technology and the Related Services Industry: Evaluating India s Success FactorsArti Mann. 1-10 [doi]
- Idea Generation Techniques among Creative ProfessionalsScarlett R. Herring, Brett R. Jones, Brian P. Bailey. 1-10 [doi]
- GHVR: One-to-One Gradient-Height Vector Routing in Wireless Mesh NetworksJai-Jin Lim, Kang G. Shin, Taejoon Park. 1-10 [doi]
- Information Sharing at National Borders: Extending the Utility of Border TheoryCelene Navarrete, Sehl Mellouli, Theresa A. Pardo, José Ramón Gil-García. 1-10 [doi]
- Documentation in Systems Development: A Significant Criterion for Project SuccessM. Faisal Fariduddin Attar Nasution, H. Roland Weistroffer. 1-9 [doi]
- A Conceptual and Operational Definition of Social Role in Online CommunityEric Gleave, Howard T. Welser, Thomas M. Lento, Marc A. Smith. 1-11 [doi]
- Managing Revenue in GridsRobert Harmon, Haluk Demirkan, Bill Hefley, Nora Auseklis. 1-10 [doi]
- Diversity as a Knowledge Resource in Top Management Teams - A Framework for Agent-Based ModelingVera Stolarski, Meike Tilebein. 1-10 [doi]
- Revising the Panko-Halverson Taxonomy of Spreadsheet RisksRaymond R. Panko. 1-10 [doi]
- A Theory-Driven Design Approach to Collaborative Policy Making ProcessesJosephine Nabukenya, Patrick van Bommel, Henderik Alex Proper. 1-10 [doi]
- SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider AttackYali Liu, Cherita L. Corbett, Ken Chiang, Rennie Archibald, Biswanath Mukherjee, Dipak Ghosal. 1-10 [doi]
- Retrospective Cued Recall: A Method for Accurately Recalling Previous User BehaviorsDaniel M. Russell, Mike Oren. 1-9 [doi]
- All-Out Organizational Scrum as an Innovation Value ChainBrent Barton. 1-6 [doi]
- The Effect of Piracy on Markets for Consumer Transmutation RightsKarl Reiner Lang, Richard D. Shang, Roumen Vragov. 1-10 [doi]
- Health Information Service Adoption: Case of TelemedicineUmit Topacan, Nuri Basoglu, Tugrul U. Daim. 1-10 [doi]
- Unlocking the Integrative Potential of Multiparty Negotiation through the Excluded Player: The Role of Negotiation Support Systems from a Coalition PerspectiveXiaojia Guo, John Lim. 1-10 [doi]
- Towards a Design Theory for Collaborative Technologies: Habermasian Analysis of Comprehensive Urban PlanningJames Sheffield. 1-11 [doi]
- Evaluating the Net Benefits of Investing in New Wind and Transmission Capacity on a NetworkTimothy D. Mount, Alberto Lamadrid, Surin Maneevitjit, Bob Thomas, Ray Zimmerman. 1-10 [doi]
- Application of Logic and Decision Models in Sustainable Ecosystem ManagementMark Jensen, Keith Reynolds, Ute Langner, Melissa Hart. 1-10 [doi]
- The Effects of Culture of Adoption of Telemedicine in Medically Underserved CommunitiesStacie N. Nwabueze, Peter Meso, Victor Wacham A. Mbarika, Mengistu Kifle, Chitu Okoli, Mark Chustz. 1-10 [doi]
- XML Stream Data Reduction by Shared KST SignaturesStefan Böttcher, Rita Hartel, Christian Messinger. 1-10 [doi]
- Supporting the Sense-Making Processes of Web Users by Using a Proxy ServerTeppo Räisänen. 1-10 [doi]
- Dynamic Dispatching and Transport Optimization - Real-World Experience with Perspectives on Pervasive Technology IntegrationDominic A. P. Greenwood, Christian Dannegger, Klaus Dorer, Monique Calisti. 1-9 [doi]
- Towards a Practical Approach for Electronic Government Interoperability Framework (e-GIF)Apitep Saekow, Choompol Boonmee. 1-9 [doi]
- Bundled Mobile Services: The Impact on Consumers Intention to AdoptMarije Teerling, Timber Haaker, Henny de Vos, Mirella Kleijnen. 1-10 [doi]
- Creative Generation of Multiple Perspectives: Application to the Problem of Burmese Pythons in the EvergladesLars P. Linden, James F. Courtney. 1-7 [doi]
- Comparing Capacity Market and Payment Designs for Ensuring Supply AdequacyRobert Stoddard, Seabron Adamson. 1-8 [doi]
- Mechanism Design of Online Multi-Attribute Reverse AuctionGe Zhu, Sunanda Sangwan, Tingjie Lu. 1-7 [doi]
- Linear Analysis of Multiple Outage InteractionCharles Davis, Thomas J. Overbye. 1-8 [doi]
- A Multiple Case Study on Post-Merger IT Integration with IT Culture Conflict PerspectiveRen-der Chao, Fu-ren Lin. 1-10 [doi]
- The Effects of IT Leveraging Competence on Firm Performance in Cross-Firm Relationships: Focusing on Social Capital and CollaborationC. Jeong, I. S. Ko, H. Y. Jang, C. S. Lee. 1-10 [doi]
- 3D-Visualization of Power System Data Using Triangulation and Subdivision TechniquesAbhishek Venkatesh, George J. Cokkinides, A. P. Sakis Meliopoulos. 1-8 [doi]
- Selecting Web Services and Participants for Enforcing Workflow Access ControlSan-Yih Hwang, Chuan Yin, Chien-Hsiang Lee. 1-10 [doi]
- Triangulation of Modeling Methodologies for Strategic Decisions in an Inland Waterway Transportation SystemL. Douglas Smith, Robert M. Nauss, James F. Campbell, Donald C. Sweeney II. 1-10 [doi]
- Implementing Geographic Information Systems (GIS) in Spreadsheet Models: What, Why, and HowJeffrey Keisler, Roger Blake, Janet Wagner. 1-10 [doi]
- Intelligent Alarm Processing: From Data Intensive to Information RichMladen Kezunovic, Yufan Guan. 1-8 [doi]
- Measuring Perceived Quality and Satisfaction of ERP Systems: An Empirical Study with Customers of a Brazilian Software CompanyRamon Silva Leite, Rodrigo Baroni de Carvalho, Cid Gonçalves Filho. 1-8 [doi]
- Adapting the DeLone and McLean Model for the Enterprise Architecture Benefit Realization ProcessEetu Niemi, Samuli Pekkola. 1-10 [doi]
- Unleashing Mobility in the Organization: A Time-Geography PerspectiveDouglas M. Schutz, Yong-Young Kim, Youngjin Yoo. 1-10 [doi]
- What Regulation May be Appropriate to Support Sustainable Energy Inputs for Electric Generation?Hugh F. Schmidt. 1-8 [doi]
- Investigate the Social Actor Model of ICT Use in OrganizationsIpKin Wong, Patricia Steinhoff. 1-8 [doi]
- The Potential of Example Driven Modelling for Decision Support SpreadsheetsS. Thorne, D. Ball. 1-9 [doi]
- Service Migration in an Enterprise System ArchitectureStephen Cohen, William Money, Stephen Kaisler. 1-10 [doi]
- An Ant Colony Optimization Approach for the Multi-Level Unconstrained Lot-Sizing ProblemJörg Homberger, Hermann Gehring. 1-7 [doi]
- Why Mobile Payments Fail? Towards a Dynamic and Multi-Perspective ExplanationJan Ondrus, Kalle Lyytinen, Yves Pigneur. 1-10 [doi]
- Controlling, Integrating, and Engaging Context in Urban Computing ResearchDerek F. Reilly, Kori M. Inkpen, Carolyn R. Watters. 1-10 [doi]
- Instance Data Evaluation for Semantic Web-Based Knowledge Management SystemsJiao Tao, Li Ding, Deborah L. McGuinness. 1-10 [doi]
- Understanding Global Digital Inequality: The Impact of Government, Investment in Business and Technology, and Socioeconomic Factors on Technology UtilizationRasool Azari, James B. Pick. 1-10 [doi]
- Fostering Knowledge Sharing in Project ManagementArkalgud Ramaprasad, A. N. Prakash. 1-10 [doi]
- Use of Colored Petri Nets to Model, Analyze, and Evaluate Service Composition and OrchestrationVijay Gehlot, Kranthima Edupuganti. 1-8 [doi]
- An N-Gram Based Approach to Automatically Identifying Web Page GenreJane E. Mason, Michael A. Shepherd, Jack Duffy. 1-10 [doi]
- Concept Design with a Living Lab ApproachBirgitta Bergvall-Kåreborn, Marita Holst, Anna Ståhlbröst. 1-10 [doi]
- The Relevance of Integration for Knowledge Management Success: Conceptual and Empirical FindingsAlexander Orth, Stefan Smolnik, Murray E. Jennex. 1-10 [doi]
- Easier Said than Done: An Empirical Investigation of Software Design and Quality in Open Source Software DevelopmentCaryn A. Conley, Lee Sproull. 1-10 [doi]
- IT Governance and Process Maturity: A Field StudyRoger Debreceny, Glen L. Gray. 1-10 [doi]
- The Effect of Network Exposure on the Diffusion of Enterprise SystemJean-François Millaire, Pierre-Majorique Léger, Gilbert Babin, Robert Pellerin. 1-10 [doi]
- A Systematic Approach to Improve Communication for Emergency ResponseRaheleh B. Dilmaghani, Ramesh R. Rao. 1-8 [doi]
- Surviving Attacks and Intrusions: What can we Learn from Fault ModelsAxel W. Krings, Zhanshan (Sam) Ma. 1-8 [doi]
- The Effect of Using a Semantic Wiki for Metadata Management: A Controlled ExperimentKai M. Hüner, Boris Otto. 1-9 [doi]
- Effects of Task Types and Communication Support Tools on E-Negotiation Performance: A Task-Technology Fit PerspectiveHer-Sen Doong, Hui-Chih Wang, Chi-Kuang Hsieh. 1-10 [doi]
- The Impact of Social Support of Guild Members and Psychological Factors on Flow and Game Loyalty in MMORPGJuseon Kang, Ilsang Ko, Yunjung Ko. 1-9 [doi]
- Collaborative Modeling Lab to Increase Learning Engagement; Comparing Manual modeling with Interactive WhiteboardsGwendolyn L. Kolfschoten, Niki Frantzeskaki, Alexander de Haan, Gijs P. J. Duivenvoorde, Alexander Verbraeck. 1-8 [doi]
- Efficient Topic-Based File Sharing in Hybrid Wireless NetworksUlf Wehling, Steffen Rothkugel. 1-9 [doi]
- Transmission Tariffs by Use of System and Economic BenefitsDaniel J. Cámac, Raúl C. Bastidas, Wilfredo Sifeuntes, Richard D. Tabors, Hyde M. Merrill. 1-10 [doi]
- Multidimensional Analysis of RFID Data in LogisticsHenning Baars, Xuanpu Sun. 1-10 [doi]
- Quantifying IT Value Latency: The Case of the Financial Services IndustryKim Huat Goh, Robert J. Kauffman. 1-10 [doi]
- Design Heuristics for Computer Supported Collaborative CreativityThomas Herrmann. 1-10 [doi]
- Follow The Sun Software Development: New Perspectives, Conceptual Foundation, and Exploratory Field StudyErran Carmel, Yael Dubinsky, J. Alberto Espinosa. 1-9 [doi]
- Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural ModelsTeodor Sommestad, Mathias Ekstedt, Pontus Johnson. 1-10 [doi]
- Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learnedPaulo Veríssimo, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa. 1-8 [doi]
- Applying Multi-Layered Analysis Framework on the Public Sector ICT Provision: An Illustration from a Municipal Wireless NetworkMyungjae Kwak, Thomas A. Horan, Hana Oh. 1-10 [doi]
- Using Project Wiki History to Reflect on the Project ProcessBirgit R. Krogstie. 1-10 [doi]
- If You Build It, They Will Use: Usage Motivations and Unintended Effects of the Internet Village Motoman Project in Rural CambodiaSophea Chea, Margaret Meiling Luo, Tung X. Bui. 1-8 [doi]
- Applying Agent-Based Modeling to Integrate Bounded Rationality in Organizational Management ResearchSven Meyer, Henrik Simon, Meike Tilebein. 1-10 [doi]
- Understanding Continuance Intention of Knowledge Creation in Online Communities from a Social-Psychological PerspectiveShih-Wei Chou, Ching-Chang Lee, Yu-Chieh Chang, Chun-Tong Lin. 1-10 [doi]
- A Life Cycle Model of Virtual CommunitiesElham Mousavidin, Lakshmi Goel. 1-8 [doi]
- Multiple Social Networks Analysis of FLOSS Projects using SargasSamuel F. de Sousa Jr., Marco A. Balieiro, Jean M. dos R. Costa, Cleidson R. B. de Souza. 1-10 [doi]
- Users Influence on the Success of Online CommunitiesJakob Assmann, Philipp Sandner, Sophie Ahrens. 1-10 [doi]
- The Multi-Knowledge Service-Oriented Architecture: Enabling Collaborative Research for E-HealthMichele Amoretti, Francesco Zanichelli. 1-8 [doi]
- An Information Systems Design Product Theory for Software Project Estimation and Measurement SystemsPekka Forselius, Timo Käkölä. 1-10 [doi]
- The Visual Wiki: A New Metaphor for Knowledge Access and ManagementChristian Hirsch, John G. Hosking, John C. Grundy, Tim Chaffe, David MacDonald, Yuriy Halytskyy. 1-10 [doi]
- A Model of Agile Evolution and Maintenance ProcessMira Kajko-Mattsson, Jaana Nyfjord. 1-10 [doi]
- Teaching SELinux in Introductory Information Assurance ClassesMachon B. Gregory, Angela S. Reninger. 1-8 [doi]
- Perpetual Licensing vs. Subscription of Software: A Theoretical EvaluationJie Zhang, Abraham Seidmann. 1-10 [doi]
- Efficiency, Economic and Environmental Assessment of Ground Source Heat Pumps in Central PennsylvaniaSeth Blumsack, Jeffrey Brownson, Lucas Witmer. 1-7 [doi]
- The Financial Impact of IT Governance Mechanisms Adoption: An Empirical Analysis with Brazilian FirmsGuilherme Lerch Lunardi, João Luiz Becker, Antonio Carlos Gastaud Maçada. 1-10 [doi]
- Vulnerability Black Markets: Empirical Evidence and Scenario SimulationJaziar Radianti, Eliot Rich, Jose J. Gonzalez. 1-10 [doi]
- Enterprise Portal Personalization: Direct and Indirect End-User Effects, and the Moderating Effects of GenderAnders Henriksen, Per E. Pedersen. 1-10 [doi]
- Design of New Business Models for Service Integrators by Creating Information-Driven Value Webs Based on Customers Collective IntelligenceUlrike Baumöl, Sandro Georgi, Henrik Ickler, Reinhard Jung. 1-10 [doi]
- Can National E-Government Standards Find Acceptance?Daniel Veit, Nils P. Parasie. 1-10 [doi]
- Enterprise Systems and Business Process Agility - A Case StudyRavi Seethamraju, Jaya Seethamraju. 1-12 [doi]
- Communication and Leadership Trustworthiness in Virtual Teams: An Empirical Comparison of the US and ChinaJakob J. Assmann, Julia V. Gallenkamp. 1-10 [doi]
- Fundamental Topics of Organizing: A Research AgendaAaron Read, Michiel Renger, Robert O. Briggs, Gert-Jan de Vreede. 1-9 [doi]
- Determining the Contribution of IS Projects: An Approach to Measure PerformanceCorlane Barclay, Kweku-Muata Osei-Bryson. 1-10 [doi]
- Developing User Requirements for Trans-National Government Information SystemsPhilip Seltsikas, Nikolaos Papas. 1-6 [doi]
- Information Personalization in a Two Dimensional Product Differentiation Model: Impact of Market Structure and the Quality-Fit RatioSunil Wattal, Rahul Telang, Tridas Mukhopadhyay. 1-10 [doi]
- GET /dgs HTTP/1.1 Host: www.WebComposition.netMartin Gaedke, Andreas Heil. 1-10 [doi]
- Influencing Individual Perceptions of Deep Level Diversity in Virtual Learning Teams (VLT)Jaime Newell, Lionel Robert, Cynthia K. Riemenschneider, Likoebe M. Maruping. 1-10 [doi]
- Towards an Instrument to Measure Successfulness of Collaborative Effort from a Participant PerspectiveG. P. J. Duivenvoorde, Gwendolyn L. Kolfschoten, Robert O. Briggs, Gert-Jan de Vreede. 1-9 [doi]
- The Importance of Being Useful and Fun: Factors Influencing Intention to Use a Mobile System Motivating for Physical ActivityGunnvald B. Svendsen, Yngvil Søholt, Arne Munch-Ellingsen, Deede Gammon, Anders Schürmann. 1-10 [doi]
- Use of Incomplete Timestamp Records for Hospital Simulation AnalysisSemin Sim, Sunju Park, Seongmoon Kim, Seungjae Han. 1-7 [doi]
- Join the Standard Forces - Examining the Combined Impact of Process and Data Standards on Business Process PerformanceBjoern Muenstermann, Andreas Eckhardt, Tim Weitzel. 1-10 [doi]
- Feedback Models for Collaboration and Trust in Crisis Response NetworksBryan J. Hudgens, Alexander B. Bordetsky. 1-8 [doi]
- Conference Administration1-11 [doi]
- Online Community Response to Major Disaster: A Study of Tianya Forum in the 2008 Sichuan EarthquakeYan Qu, Philip Wu, Xiaoqing Wang. 1-11 [doi]
- A Real World Perspective: Employee Perspectives of Employer Sponsored Personal Health Record (PHR) SystemsJuanita Dawson, Benjamin L. Schooley, Bengisu Tulu. 1-10 [doi]
- Component-Based Distributed Modeling of Collaborative Service Processes - A Methodology for the Identification of Reference Process Building BlocksLars Baacke, Peter Rohner, Robert Winter, René Fitterer. 1-10 [doi]
- A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication InterfacesBogdan Hoanca, Kenrick J. Mock. 1-10 [doi]
- The Role of Process Standardization in Achieving IT Business ValueDaniel Beimborn, Fabian Gleisner, Nils Joachim, Andreas Hackethal. 1-10 [doi]
- Predicting Change: A Study of the Value Frequency Model for Change of PracticeRobert O. Briggs, John D. Murphy, Thomas F. Carlisle, Alanah J. Davis. 1-10 [doi]
- Multi-Agent Modeling to Understand the Impact of Stakeholders Decisions in a Residential Land Development Project in Southern AlbertaMichael Kieser, Danielle J. Marceau. 1-9 [doi]
- Aligning Biomedical Informatics with Clinical and Translational ScienceAriel I. La Paz, Arkalgud Ramaprasad. 1-10 [doi]
- Real-Time Knowledge Discovery and Dissemination for Intelligence AnalysisBhavani M. Thuraisingham, Latifur Khan, Murat Kantarcioglu, Sonia Chib, Jiawei Han, Sang Son. 1-12 [doi]
- Social Loafing in Brainstorming CMC Teams: The Role of Moral DisengagementOmar Alnuaimi, Lionel Robert, Likoebe M. Maruping. 1-9 [doi]
- Towards a Pan European e-ID Interoperability InfrastructureArnold van Overeem, Jos van Oosten. 1-10 [doi]
- Software Product Lines and Configurable Product Bases in Business Applications - A Case from Financial ServicesPaul D. Witman. 1-10 [doi]
- E-File Adoption: A Study of U.S. Taxpayers IntentionsL. Christian Schaupp, Lemuria Carter, Jeff Hobbs. 1-10 [doi]
- Bridging Socio-Technical Capital in an Online Learning EnvironmentDaniel Suthers, Kar-Hai Chu, Samuel Joseph. 1-10 [doi]
- Breaching the Knowledge Transfer Blockade in IT Offshore Outsourcing Projects - A Case from the Financial Services IndustryRobert Gregory, Roman Beck, Michael Prifling. 1-10 [doi]
- Empirical Estimates and Observations of 0Day VulnerabilitiesMiles A. McQueen, Trevor A. McQueen, Wayne F. Boyer, May R. Chaffin. 1-12 [doi]
- Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 PrivacyTamara Dinev, Heng Xu, H. Jeff Smith. 1-10 [doi]
- Social Ties, Literacy, Location and the Perception of Economic Opportunity: Factors Influencing Telecentre Success in a Development ContextArlene Bailey, Ojelanki K. Ngwenyama. 1-11 [doi]
- E-Commerce and E-Government: How Do They Compare? What Can They Learn from Each Other?Hans Jochen Scholl, Karine Barzilai-Nahon, Jin-Hyuk Ahn, Olga H. Popova, Barbara Re. 1-10 [doi]
- An Information Systems Design Theory for Integrated Requirements and Release Management SystemsTimo Käkölä, Mervi Koivulahti-Ojala, Jani Liimatainen. 1-10 [doi]
- Exploration of Cultural Influences on Business and IT AlignmentA. J. Gilbert Silvius, Steven De Haes, Wim Van Grembergen. 1-10 [doi]
- Developing a Community Cyber Security Incident Response CapabilityGregory White, Natalie Granado. 1-9 [doi]
- Legal and Policy Environments: An Institutional Perspective of Global E-Commerce AdoptionLing Zhu. 1-10 [doi]
- Local-Global: Reconciling Mismatched Ontologies in Development Information SystemsJessica Seddon Wallack, Ramesh Srinivasan. 1-10 [doi]
- Automatic Voltage Controllers for South Korean Power SystemXing Liu, Vaithianathan Venkatasubramanian, Tae-Kyun Kim. 1-9 [doi]
- Bounding the Size of k-Tuple CoversWolfgang W. Bein, Shahram Latifi, Linda Morales, Ivan Hal Sudborough. 1-8 [doi]
- Understanding the Nature and Production Model of Hybrid Free and Open Source Systems: The Case of VarnishZegaye Seifu Wubishet. 1-11 [doi]
- Leadership Communication in a Virtual TeamKarianne Skovholt. 1-12 [doi]
- The Efficacy of Knowledge Sharing in Centralized and Self-Organizing Online Communities: Weblog Networks vs. Discussion ForumsJaideep Godara, Philip L. Isenhour, Andrea L. Kavanaugh. 1-10 [doi]
- When Online Communities Become Self-AwareRich Gazan. 1-10 [doi]
- On the Analysis of Contributions from Privileged Users in Virtual Open CommunitiesFelipe Ortega, Daniel Izquierdo-Cortazar, Jesús M. González-Barahona, Gregorio Robles. 1-10 [doi]
- A Ph.D. Curriculum for Digital ForensicsFrederick B. Cohen, Thomas A. Johnson. 1-8 [doi]
- The Role of the Individualism-Collectivism Dimension in Distance Learning Environments: An Empirical StudyAnastasia Gaspay, Leonardo Legorreta, Shana Dardan. 1-9 [doi]
- A Rigorous Methodology for Security Architecture Modeling and VerificationYomna Ali, Sherif El-Kassas, Mohy Mahmoud. 1-10 [doi]
- Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting MachinesSean Peisert, Matt Bishop, Alec Yasinsac. 1-10 [doi]
- Ensuring Cost Efficient and Secure Software through Student Case Studies in Risk and Requirements PrioritizationNancy R. Mead, Daniel Shoemaker, Jeffrey A. Ingalsbe. 1-9 [doi]
- Collaborative Modeling - A Design Science ApproachPeter Rittgen. 1-10 [doi]
- Organizational Assimilation of Information Technology in Korean Local GovernmentsHeungsuk Choi, Cheouljoo Lee. 1-8 [doi]
- Prior Experience and Physicians Intentions to Adopt EMRCarla Wiggins, Kenneth J. Trimmer, John C. Beachboard, Teri Peterson, William Woodhouse. 1-9 [doi]
- Effects of Adaptivity and Other External Variables on Mobile Service AdoptionEbru Polat, Nuri Basoglu, Tugrul U. Daim. 1-10 [doi]
- An Assessment of Venues Providing Public Access to ICT: A Tale of 25 CountriesChristopher Coward, Ricardo Gomez, Rucha Ambikar. 1-9 [doi]
- Conducting Web-Based Surveys of Government Practitioners in Social Sciences: Practical Lessons for E-Government ResearchersJosé Ramón Gil-García, Sara A. Berg, Theresa A. Pardo, G. Brian Burke, Ahmet Guler. 1-10 [doi]
- Using Collaborative Filtering Algorithms as eLearning ToolsFrank Loll, Niels Pinkwart. 1-10 [doi]
- Knowledge and Attitude, the Two Major Barriers to ICT Adoption in LDC are the Opposite Side of a Coin; An Empirical Evidence from BangladeshAhmed Imran. 1-10 [doi]
- Measuring Sense of Community in Groups that Use Social Networking Sites to Promote CollaborationMaria Plummer, Starr Roxanne Hiltz, Nancy Steffen Fluhr, Roberto Muñoz Rosario. 1-10 [doi]
- Security in Health Information Systems: An Exploratory Comparison of U.S. and Swiss HospitalsMartin Luethi, Gerhard Knolmayer. 1-10 [doi]
- An Economic Model for Pricing Digital ProductsGerald V. Post. 1-10 [doi]
- Lazy User Theory: A Dynamic Model to Understand User Selection of Products and ServicesFranck Tétard, Mikael Collan. 1-9 [doi]
- Explaining the Continuous Use of Social Virtual Worlds: An Applied Theory of Planned Behavior ApproachJani Merikivi, Matti Mäntymäki. 1-10 [doi]
- Simulating the Deployment of Battery-Sensing Intrusion Protection SystemsTheresa M. Nelson, Timothy Buennemeyer, Randy C. Marchany, Joseph G. Tront. 1-9 [doi]
- The State of the Art of E-Government Services in Africa: An Analysis of Relevant WebsitesAbebe Rorissa, Dawit Demissie. 1-8 [doi]
- Employing Zachman Enterprise Architecture Framework to Systematically Perform Model-Based System Engineering ActivitiesMara Nikolaidou, Anargyros Tsadimas, Nancy Alexopoulou, Dimosthenis Anagnostopoulos. 1-10 [doi]
- Interconnection in the GCC Grid: The Economics of ChangeRichard D. Tabors. 1-6 [doi]
- Proposing a Theoretical Model for IT Governance and IT Business AlignmentDaniel Beimborn, Frank Schlosser, Tim Weitzel. 1-11 [doi]
- Conjectural Variation-Based Bidding Strategies with Q-Learning in Electricity MarketsJianhui Wang. 1-10 [doi]
- Campaign Management of the Fourth GenerationHajo Hippner, Wolfgang Leusser, Klaus D. Wilde. 1-9 [doi]
- The Past, Present, and Future of Securing Electric Power SystemsJonathan Pollet. 1-7 [doi]
- The State of IT Governance in Organizations from the Public Sector in a Developing CountryEdephonce N. Nfuka, Lazar Rusu, Paul Johannesson, Beda Mutagahywa. 1-12 [doi]
- Understanding Coordination in IT Project-Based Environments: An Examination of Team Cognition and Virtual Team EfficacyMark Keith, Haluk Demirkan, Michael Goul. 1-8 [doi]
- Are De-Facto Standards a Useful Guide for Designing Human-Computer Interaction Processes? The Case of User Interface Design for Web Based B2C Product ConfiguratorsClarissa Streichsbier, Paul Blazek, Fabian Faltin, Wolfgang Frühwirt. 1-7 [doi]
- The Interpretive Flexibility of an E-Government Project: From an Actor-Network Theory PerspectiveWenbo Chen, Cheng Zhang, Yingqin Zheng, Lili Cui. 1-10 [doi]
- Are There Contagion Effects in the Diffusion of IT Outsourcing?Kunsoo Han, Robert J. Kauffman, Arti Mann, Barrie R. Nault. 1-10 [doi]
- New Understanding of RFID Adoption and Infusion in Retail Supply ChainXiaoran Wu, Chandrasekar Subramaniam. 1-10 [doi]
- Linking Utilization of Text Mining Technologies and Academic ProductivityAntonina Durfee, Verne Bacharach. 1-10 [doi]
- Agile Principles and Ethical ConductKen H. Judy. 1-8 [doi]
- Using Wikis to Support Constructivist Learning: A Case Study in University Education SettingsFranck Tétard, Erkki Patokorpi, Kristian Packalén. 1-10 [doi]
- Practitioners vs Facilitators a Comparison of Participant Perceptions on SuccessGwendolyn L. Kolfschoten, G. P. J. Duivenvoorde, Robert O. Briggs, Gert-Jan de Vreede. 1-9 [doi]
- Cyber Migration: An Empirical Investigation on Factors that Affect Users Switch Intentions in Social Networking SitesZengyan Cheng, Yinping Yang, John Lim. 1-11 [doi]
- Analysis of Joint Provision of Public Goods in Online CommunitiesYong-Hong Sun, Kai Lung Hui, Jian Ma, Zhi-Ping Fan. 1-10 [doi]
- Digital Pen: Four Rounds of Ethnographic and Field ResearchChristopher N. Chapman, Michal Lahav, Susan Burgess. 1-10 [doi]
- Methodological Approaches to Measuring the Effects of Implementation of Health Information Technology (HIT)Lance Roberts, Marcia M. Ward, Jane M. Brokel, Douglas S. Wakefield, Donald K. Crandall, Paul Conlon. 1-10 [doi]
- Experimental Evaluation of Wiki Technology and the Shaper Role in Rapid Interdisciplinary Requirements NegotiationDi Wu, Da Yang, Supannika Koolmanojwong, Barry W. Boehm. 1-9 [doi]
- Mobile Data Mining for Intelligent Healthcare SupportPari Delir Haghighi, Arkady B. Zaslavsky, Shonali Krishnaswamy, Mohamed Medhat Gaber. 1-10 [doi]
- The Role of Motivational Systems and Emotions in a Virtual TaskSteven A. Murphy, Michael J. Hine. 1-10 [doi]
- The Continuous Service Usage Intention in the Web Analytics ServicesJaesung Park, Kyung Ho Jung, Yunhee Lee, Geon Cho, Jae Jon Kim, Joon Koh. 1-7 [doi]
- Network Structure of Innovation: Can Brokerage or Closure Predict Patent Quality?Jyun-Cheng Wang, Cheng-Hsin Chiang, Shu-Wei Lin. 1-10 [doi]
- Suppressing the Total Costs of Executing Tasks Using Mobile AgentsTakashi Nagata, Munehiro Takimoto, Yasushi Kambayashi. 1-10 [doi]
- Simply Scoring and Visualizing Portfolio Heterogeneity for Selected ProblemsH. Ric Blacksten. 1-10 [doi]
- A Dissemination Protocol to Guarantee Data Accessibility within N-Hops for Wireless Sensor NetworksMoonseong Kim, Matt W. Mutka, Sang-Hun Cho, Hyunseung Choo. 1-8 [doi]
- IT Capacities Assessment Tool: A Survey of Hospitals in CanadaMirou Jaana, Guy Paré, Claude Sicotte. 1-12 [doi]
- Digital Game Brand Image Information Influence to the Inexperienced Consumer s Product EvaluationJan Storgårds, Virpi Kristiina Tuunainen, Anssi Öörni. 1-10 [doi]
- Reducing I.T. Project Management Failures: A Research ProposalGezinus J. Hidding, John Nicholas. 1-10 [doi]
- Framework for the Analysis of the Adaptability, Extensibility, and Scalability of Semantic Information Integration and the Context Mediation ApproachThomas Gannon, Stuart E. Madnick, Allen Moulton, Michael Siegel, Marwan Sabbouh, Hongwei Zhu 0002. 1-11 [doi]
- Empirical Investigation of the Blog Space: The Case of European PharmaceuticalsEmanuela Todeva, Donka Keskinova. 1-10 [doi]
- A Max-Min Approach to the Output Evaluation of Knowledge InteractionTravis K. Huang, Eugenia Y. Huang. 1-9 [doi]
- Will Abandoning DRM have a Boomerang Effect on Apple? - An Empirical Analysis of Lock-In and Network EffectsJonathan Dörr, Alexander Benlian, Christoph Grau, Thomas Wilde, Thomas Hess. 1-10 [doi]
- GrayWulf: Scalable Software Architecture for Data Intensive ComputingYogesh Simmhan, Roger S. Barga, Catharine van Ingen, María A. Nieto-Santisteban, Laszlo Dobos, Nolan Li, Michael Shipway, Alexander S. Szalay, Sue Werner, Jim Heasley. 1-10 [doi]
- An Integrated Design Approach for Sustainable Community DevelopmentK. Max Zhang, Robert J. Thomas, Martha Bohm, Marc Miller. 1-10 [doi]
- Identifying Organizational Knowledge Paths through Social Network Lens: Synthesis of Multi-Industry Case StudiesYoung-Gul Kim, Sung-Byung Yang, Yong-Sauk Hau, Jeong-Su Seo, Ghi-Hoon Ghim. 1-10 [doi]
- Determining a Firm s Optimal Outsourcing Rate: A Learning Model PerspectiveHoon S. Cha, David E. Pingry, Matt E. Thatcher. 1-10 [doi]
- Cost-Effective Investments in Customer Information PrivacyRobert J. Kauffman, Yong J. Lee, Ryan Sougstad. 1-10 [doi]
- A Discovery Learning Approach to Information Assurance EducationRayford B. Vaughn, David A. Dampier. 1-9 [doi]
- Towards a Procedural Model for Sustainable Information Systems ManagementNils-Holger Schmidt, Koray Erek, Lutz Kolbe, Rüdiger Zarnekow. 1-10 [doi]
- Crowds and Communities: Light and Heavyweight Models of Peer ProductionCaroline Haythornthwaite. 1-10 [doi]
- Spreadsheets in Team X: Preserving Order in an Inherently Chaotic EnvironmentKeith Warfield, Jairus Hihn. 1-8 [doi]
- Exploring Two Enterprise Semantic Integration SystemsMark Ginsburg, Alex Kass, Peter Z. Yeh. 1-10 [doi]
- A Modeling Tool for Multidimensional Data using the ADAPT NotationPeter Gluchowski, Christian Kurze, Christian Schieder. 1-10 [doi]
- Design Rules for User-Oriented IT Service DescriptionsHenrik Brocke, Thorsten Hau, Alexander Vogedes, Bernhard Schindlholzer, Falk Uebernickel, Walter Brenner. 1-10 [doi]
- The Effects of Competition and Time Constraints on Knowledge Transfer: Exploratory Findings from Two ExperimentsC. E. Connelly, D. P. Ford, B. Gallupe, O. Turel, D. Zweig. 1-10 [doi]
- A Pragmatic Framework for Ethical Decision Making: The Limits of Professional CodesRobert M. Mason, Kevin Gallagher. 1-7 [doi]
- Multivariate Patent Similarity DetectionKas Kasravi, Maria Risov. 1-8 [doi]
- Acculturation to the Global Culture as Moderator to Subjective Norm and Internet AdoptionReem Ayouby, Anne-Marie Croteau. 1-10 [doi]
- Revisiting IT Governance in the Light of Institutional TheoryDax D. Jacobson. 1-9 [doi]
- Understanding Music Sharing in RussiaDonald L. Amoroso, Tonia Durfee. 1-9 [doi]
- Applying a ThinkLet- and ThinXel-Based Group Process Modeling Language: A Prototype of a Universal Group Support SystemStefan Werner Knoll, Martin Hörning, Graham Horton. 1-10 [doi]
- Design of a Multi-Robot System Using Mobile Agents with Ant Colony ClusteringYasushi Kambayashi, Yasuhiro Tsujimura, Hidemi Yamachi, Munehiro Takimoto, Hisashi Yamamoto. 1-10 [doi]
- Interdependence between Employee Education and R and D Investment in Impacting IT Firm PerformanceRajiv Banker, Sunil Wattal, Fang-Chun Liu, Chin-Shyh Ou. 1-10 [doi]
- Using Graphics Processors for Parallelizing Hash-Based Data CarvingSylvain Collange, Yoginder S. Dandass, Marc Daumas, David Defour. 1-10 [doi]
- Reviewers1-7 [doi]
- Scalable Social Software Services: Towards a Shopping Community Model Based on Analyses of Established Web Service Components and FunctionsPeter Leitner, Thomas Grechenig. 1-10 [doi]
- A Hybrid Meta-Heuristic for the VRPTW with Cluster-Dependent Tour Starts in the Newspaper IndustryDominik Böhnlein, Christian Gahm, Axel Tuma. 1-10 [doi]
- Impacts of Organizational Learning and Knowledge Transfer on Investment Decisions under UncertaintyXianjun Geng, Lihui Lin, Andrew B. Whinston. 1-10 [doi]
- GrayWulf: Scalable Clustered Architecture for Data Intensive ComputingAlexander S. Szalay, Gordon Bell, Jan vandenBerg, Alainna Wonders, Randal C. Burns, Dan Fay, Jim Heasley, Tony Hey, María A. Nieto-Santisteban, Ani Thakar, Catharine van Ingen, Richard Wilton. 1-10 [doi]
- Society of AgentsSteven Walczak, Toan Ong. 1-8 [doi]
- When Is It Beneficial for a Firm to Pursue a Unified Procurement Strategy for Enterprise Software Solutions?Robert J. Kauffman, Juliana Y. Tsai. 1-10 [doi]
- Configurative Service Engineering - A Rule-Based Configuration Approach for Versatile Service Processes in Corrective MaintenanceJörg Becker, Daniel Beverungen, Ralf Knackstedt, Martin Matzner. 1-10 [doi]
- Towards an Optimal Algorithm for Recognizing Laman GraphsOvidiu Daescu, Anastasia Kurdia. 1-10 [doi]
- Note Taking and Note Sharing While Browsing Campaign InformationScott P. Robertson, Ravi K. Vatrapu, George Abraham. 1-10 [doi]
- Coordination and Governance in Geographically Distributed Enterprise Architecting: An Empirical Research DesignJ. Alberto Espinosa, Wai Fong Boh. 1-10 [doi]
- Influence of Cultural Differences on Multi-National and Multi-Organizational Collaboration in CollaboratoriesAirong Luo, Eileen Luebcke. 1-10 [doi]
- Computational Evaluation of Software Security AttributesGwendolyn H. Walton, Thomas A. Longstaff, Richard C. Linger. 1-10 [doi]
- Table of Contents1-50 [doi]
- A Model Repository for Collaborative Modeling with the Jazz Development PlatformChristian Bartelt, Georg Molter, Tim Schumann. 1-10 [doi]
- An Improved Matching Algorithm for Developing a Consistent Knowledge Model across Enterprises Using SRS and SWRLSaravanan Muthaiyah, Marcel Barbulescu, Larry Kerschberg. 1-9 [doi]
- A Cost-Based Model for Improving Customer Waiting TimesAlfred L. Guiffrida, Michael J. Messina. 1-7 [doi]
- Cultural Diversity, Perception of Work Atmosphere, and Task Conflict in Collaboration Technology Supported Global Virtual Teams: Findings from a Laboratory ExperimentSouren Paul, Sumati Ray. 1-10 [doi]
- Approximate Dynamic Programming in Knowledge Discovery for Rapid ResponsePeter Frazier, Warren B. Powell, Savas Dayanik, Paul B. Kantor. 1-10 [doi]
- Automatic Generation of the Behavior of a User Interface from a High-Level Discourse ModelRoman Popp, Jürgen Falb, Edin Arnautovic, Hermann Kaindl, Sevan Kavaldjian, Dominik Ertl, Helmut Horacek, Cristian Bogdan. 1-10 [doi]
- Agent Based Model for Cardinality Constrained Portfolio Selection Problem: Preliminary ResultsRitesh Kumar, Subir Bhattacharya. 1-10 [doi]
- Groupware for Design: An Interactive System to Facilitate Creative Processes in Team Design WorkArjun Venkataswamy, Rajinder Sodhi, Yerkin Abdildin, Brian P. Bailey. 1-10 [doi]
- A Thin Client Interface to a High Performance Multi-modal Image Analytics SystemJames W. Cooper, Shahram Ebadollahi, Ellen Eide. 1-8 [doi]
- A Simple Model for the Reliability of an Infrastructure System Controlled by AgentsBenjamin A. Carreras, David E. Newman, Ian Dobson, Matthew Zeidenberg. 1-10 [doi]
- Participation 2.0: A Case Study of e-Participation within the New Zealand GovernmentLaura Sommer, Rowena Cullen. 1-10 [doi]
- Information Security: User Precautions, Attacker Efforts, and EnforcementIvan P. L. Png, Qiu-Hong Wang. 1-11 [doi]
- Introduction of a Technology Selection ModelMitchell Cochran. 1-10 [doi]
- Fully Distributed Scrum: Replicating Local Productivity and Quality with Offshore TeamsJeffrey Sutherland, Guido Schoonheim, Mauritz Rijk. 1-8 [doi]
- The Construction of Peers and Artifacts: The Organizing Role of Programming Guidelines Vincenzo D Andrea, Stefano De Paoli, Maurizio Teli. 1-9 [doi]
- Using Association Rule Mining for Behavioral Analysis of School Students: A Case from IndiaRajanish Dass. 1-6 [doi]
- A Privacy Control Theory for Online EnvironmentsMaria Moloney, Frank Bannister. 1-10 [doi]
- Challenging the Mean Time to Failure: Measuring Dependability as a Mean Failure CostAli Mili, Frederick T. Sheldon. 1-10 [doi]
- Discovering Influential Nodes for Viral MarketingYung-Ming Li, Cheng-Yang Lai, Chia-Hao Lin. 1-10 [doi]
- Supporting the Screening of Corporate Acquisition TargetsJani Kinnunen, Mikael Collan. 1-8 [doi]
- Operationalised Business Intelligence: Knowledge Sharing with an Enterprise Ambition at the Amsterdam-Amstelland Police DepartmentStijn Viaene, Luc Lutin, Steven De Hertogh. 1-10 [doi]
- Reexamining Threat Rigidity: Implications for DesignLinda Plotnick, Murray Turoff, Gerd Van Den Eede. 1-10 [doi]
- Touch Me Often but Not Deeply: Understanding the Interpersonal Style of the Petites DigeratiEric K. Clemons, Steve Barnett, Itai Ben-Zaken, Julia C. Clemons, JoAnn Magdoff, Gil Shulman, Josh Wais. 1-10 [doi]
- Retrieval of Single Wikipedia Articles While Reading AbstractsChris Jordan, Carolyn R. Watters. 1-10 [doi]
- Blocking Skype through Deep Packet InspectionPeter Renals, Grant A. Jacoby. 1-5 [doi]
- Justifying the Decisions for EAI Adoption in LGAs: A Validated Proposition of Factors, Adoption Lifecycle Phases, Mapping and Prioritisation of FactorsMuhammad Kamal, Marinos Themistocleous, Vincenzo Morabito. 1-10 [doi]
- An Enhanced Coverage Control Protocol for Wireless Sensor NetworksShuo Zhang, Yuheng Liu, Juhua Pu, Xiao Zeng, Zhang Xiong. 1-7 [doi]
- Mashups as an Architecture for Knowledge Management SystemsStefan Bitzer, Stefan Ramroth, Matthias Schumann. 1-10 [doi]
- Music Collectivities and MySpace: Towards Digital CollectivesCamilla Rossi, Maurizio Teli. 1-11 [doi]
- Agile Deployment: Lean Service Management and Deployment Strategies for the SaaS EnterpriseRobert Benefield. 1-5 [doi]
- A Tale of Two Disasters: Assessing Crisis Management ReadinessTung Bui, Rajib Subba. 1-10 [doi]
- Impact of Variable Transmission Range in All-Wireless NetworksDoina Bein, Ajoy Kumar Datta, Prathima Sajja, Si-Qing Zheng. 1-10 [doi]
- Collaborative Recommender Systems for Building AutomationMichael LeMay, Jason J. Haas, Carl A. Gunter. 1-10 [doi]
- E-Voting System Security OptimizationBarbara Ondrisek. 1-8 [doi]
- Community-Based Recommender Systems: Analyzing Business Models from a Systems Operator s PerspectivePei-yu Chen, Yen-Chun Chou, Robert J. Kauffman. 1-10 [doi]
- Active Learning in the Security ClassroomDino Schweitzer, David Gibson, Mike Collins. 1-8 [doi]