Abstract is missing.
- Semi-Automatically Generated High-Level Fusion for Multimodal User InterfacesDominik Ertl, Sevan Kavaldjian, Hermann Kaindl, Jürgen Falb. 1-10 [doi]
- Propositional Research Framework for the Conceptual and Technological Adoption of Digital Coupons in the USJennifer Andrews, Anita D. Bhappu. 1-9 [doi]
- Exploring Cultural Impact on Long-Term Utilization of Enterprise SystemsGuo Chao Peng, Miguel Baptista Nunes. 1-10 [doi]
- From Green Computing to Sustainable IT: Developing a Sustainable Service OrientationRobert Harmon, Haluk Demirkan, Nora Auseklis, Marisa Reinoso. 1-10 [doi]
- Assessing Multiple Perspectives in Three Dimensional Virtual Worlds: Eye Tracking and All Views Qualitative Analysis (AVQA)Sean P. Goggins, Matthew Schmidt, Jesus Guajardo, Joi Moore. 1-10 [doi]
- The Values of Computational Modelers and Professional Codes of Ethics: Results from a Field StudyKenneth R. Fleischmann, William A. Wallace, Justin M. Grimes. 1-10 [doi]
- Framework for Evaluating the Version Management Capabilities of a Class of UML Modeling Tools from the Viewpoint of Multi-Site, Multi-Partner Product Line OrganizationsMervi Koivulahti-Ojala, Timo Käkölä. 1-10 [doi]
- Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on TwitterDanah Boyd, Scott Golder, Gilad Lotan. 1-10 [doi]
- Using Personality Factors to Predict Interface Learning PerformanceTera Marie Green, Dong Hyun Jeong, Brian Fisher. 1-10 [doi]
- Privacy Calculus on Social Networking Sites: Explorative Evidence from Germany and USAHanna Krasnova, Natasha F. Veltri. 1-10 [doi]
- Exploring the Relationships among ICTs: A Scalable Computational Approach Using KL Divergence and Hierarchical ClusteringChia-jung Tsui, Ping Wang, Kenneth R. Fleischmann, Douglas W. Oard, Asad B. Sayeed. 1-10 [doi]
- Impact of Knowledge Base on Knowledge Exchange: Commonalities and Differences in the Characteristics of Source and RecipientPrescott C. Ensign, Louis Hébert. 1-10 [doi]
- RFID-Enabled Warehouse Process Optimization in the TPL IndustrySamuel Fosso Wamba, Akemi T. Chatfield. 1-10 [doi]
- A Comparative Analysis of Professional Forums in the United States Army and Hybrid Communities of Practice in the Civilian SectorJon Brickey, Steven Walczak. 1-10 [doi]
- The ERP Auditlab - A Prototypical Framework for Evaluating Enterprise Resource Planning System AssuranceNick Gehrke. 1-9 [doi]
- Digital Entrepreneurship and Its Sociomaterial EnactmentElizabeth Davidson, Emmanuelle Vaast. 1-10 [doi]
- Values of Stakeholders in the Net Neutrality Debate: Applying Content Analysis to Telecommunications PolicyAn-Shou Cheng, Kenneth R. Fleischmann, Ping Wang, Emi Ishita, Douglas W. Oard. 1-10 [doi]
- Towards an Ontology of Multidimensional Data Structures for Analytical PurposesChristian Kurze, Peter Gluchowski, Martin Böhringer. 1-10 [doi]
- SafeFox: A Safe Lightweight Virtual Browsing EnvironmentJiang Wang, Yih Huang, Anup K. Ghosh. 1-10 [doi]
- The Green IT Practices of Nokia, Samsung, Sony, and Sony Ericsson: Content Analysis ApproachYulia Wati, Chulmo Koo. 1-10 [doi]
- Knowledge Transfer in a Multiple Virtual Communities NetworkSeung-Kyoon Shin, Woong Kook. 1-10 [doi]
- The Influence of Cultural Values on Knowledge Sharing across Organizational BoundariesJulia Mueller. 1-10 [doi]
- Implications of e-Service Quality Dimensions for the Information Systems FunctionShaun Pather, Sylvie Usabuwera. 1-10 [doi]
- IT Services Management IT Service InventoryDavid Bernhard Michelsen Graves. 1-9 [doi]
- A Goal Oriented and Knowledge Based E-Government Project Management PlatformDemetrios Sarantis, Yannis Charalabidis, Dimitris Askounis. 1-13 [doi]
- Analysis of Stakeholder/Value Dependency Patterns and Process Implications: A Controlled ExperimentDi Wu, Qi Li, Mei He, Barry Boehm, Ye Yang, Supannika Koolmanojwong. 1-10 [doi]
- Software Development Guidelines Based on Fuzzy Decision-Making for Health Care ApplicationsElisabetta Ronchieri, Valerio Venturi, Maria Cristina Vistoli. 1-10 [doi]
- Attribution of Messages to Sources in Digital Forensics CasesFrederick B. Cohen. 1-10 [doi]
- Business Process Lines to Deal with the VariabilityColette Rolland, Selmin Nurcan. 1-10 [doi]
- The Role of Platforms and Platform Thinking in Open Innovation NetworksAhmad Ghazawneh. 1-10 [doi]
- Does Collaboration among Participants Lead to Better Ideas in IT-Based Idea Competitions? An Empirical InvestigationIvo Blohm, Ulrich Bretschneider, Jan Marco Leimeister, Helmut Krcmar. 1-10 [doi]
- Investigating User Typologies and Their Relevance within a Living Lab-Research Approach for ICT-InnovationDimitri Schuurman, Katrien De Moor, Lieven De Marez, Tom Evens. 1-10 [doi]
- DQ Tags and Decision-MakingRosanne Price, Graeme G. Shanks. 1-10 [doi]
- Competing through Services: Service Migration of Information Technology Product VendorsShu Han, T. Ravichandran, Jason Kuruzovich. 1-10 [doi]
- A Decision and Transparency Support Service for Moderation Management of Virtual Enterprises in Collaborative NetworksHeiko Thimm, Karsten Boye Rasmussen. 1-10 [doi]
- Understanding Requirements Volatility in Software Projects - An Empirical Investigation of Volatility Awareness, Management Approaches and their ApplicabilityRahul Thakurta, Frederik Ahlemann. 1-10 [doi]
- Switching Costs, Satisfaction, Loyalty and Willingness to Pay for Office Productivity SoftwareMark Keith, Raghu Santanam, Rajiv Sinha. 1-9 [doi]
- Vertex-Based Multihop Vehicle-to-Infrastructure Routing for Vehicular Ad Hoc NetworksRaj K. Shrestha, Sangman Moh, Ilyong Chung, Dongmin Choi. 1-7 [doi]
- Design and Evaluation of a Social Visualization Aimed at Encouraging Sustainable BehaviorCatherine Grevet, Jennifer Mankoff, Scott D. Anderson. 1-8 [doi]
- A Tale of Two Continents: Contents of African and Asian E-Government WebsitesAbebe Rorissa, Mohammed A. Gharawi, Dawit Demissie. 1-9 [doi]
- Loadable Hypervisor ModulesThomas Naughton, Geoffroy Vallée, Stephen L. Scott, Ferrol Aderholdt. 1-8 [doi]
- Regulatory Policies for Demand-Driven Innovation by Heterogeneous FirmsMei Lin, Shaojin Li, Andrew B. Whinston. 1-10 [doi]
- Optimal Stock Relocation under Uncertainty in Post-Disaster Humanitarian OperationsAlexander Blecken, Christoph Danne, Wilhelm Dangelmaier, Beate Rottkemper, Bernd Hellingrath. 1-10 [doi]
- Managing the Outsourcing of Two-Level Service Processes: Literature Review and IntegrationEdieal J. Pinker, Robert A. Shumsky, Hsiao-Hui Lee, Sameer Hasija. 1-10 [doi]
- Understanding Organizational Level ERP Assimilation: A Multi-Case StudyLuning Liu, Yuqiang Feng, Qing Hu, Xiaojian Huang. 1-10 [doi]
- A Rigorous Approach to IT ArchitectureDavid W. Enström, D Arcy Walsh. 1-10 [doi]
- Organizational Learning and Organizational Capabilities of Firms that Engage in Onshore and Offshore Business Process OutsourcingJonathan Whitaker, Sunil Mithas, Mayuram S. Krishnan. 1-10 [doi]
- Managing the Current Customization of Process Related IT-ServicesHenrik Brocke, Falk Uebernickel, Walter Brenner. 1-10 [doi]
- Electricity Markets, Reliability and the Environment: Smartening-Up the GridRichard E. Schuler. 1-7 [doi]
- Cloud Computing Architectures for the Underserved: Public Health Cyberinfrastructures through a Network of HealthATMsNathan Botts, Brian Thoms, Aisha Noamani, Thomas A. Horan. 1-10 [doi]
- Discovering Intraday Market Risk Exposures in Unstructured Data Sources: The Case of Corporate DisclosuresSven S. Groth, Jan Muntermann. 1-10 [doi]
- Designing Sensor-Based Event Processing InfrastructuresAgnès Voisard, Holger Ziekow. 1-10 [doi]
- Copyright1 [doi]
- Controversy is Marketing: Mining Sentiments in Social MediaZhu Zhang, Xin Li. 1-10 [doi]
- The Hang-Over Effect in Information-Intensive Service SystemsAtanu Lahiri, Abraham Seidmann. 1-10 [doi]
- Developing Reliable Measures of Privacy Management within Social Networking SitesCatherine Dwyer, Starr Roxanne Hiltz, Marshall Scott Poole, Julia Gussner, Felicitas Hennig, Sebastian Osswald, Sandra Schliesslberger, Birgit Warth. 1-10 [doi]
- The Influences of Transaction and Partnership Characteristics on Interorganization System Integration in Manufacturer-Supplier DyadsFen-Hui Lin, Hsing-Ya Chang. 1-10 [doi]
- Playing a 3-Stringed Violin: Innovation via the Joint Evolution of People, Process, and Knowledge Management SystemLynne P. Cooper. 1-10 [doi]
- Information Infrastructure for Public Health and Health Research: Findings from a Large-Scale HIE Stakeholder StudyAlan F. Dowling, Judah Thornewill, Barbara Cox, Robert J. Esterhay. 1-10 [doi]
- Evaluating Information Prescriptions in Unstructured EnvironmentsSteven Bird, Edwin Boudreaux, Constance Nichols. 1-7 [doi]
- NASPInet Specification - An Important Step toward Its ImplementationY. Hu, M. Donnelly, T. Helmer, H. Tram, Ke. Martin, M. Govindarasu, R. Uluski, M. Cioni. 1-9 [doi]
- Generational Responses to Knowledge Management and Collaboration: Are GenX and GenY as Different As We Think?William K. McHenry, Steven R. Ash. 1-10 [doi]
- Learning Arrangements in Virtual WorldsStefan Stieglitz, Christoph Lattemann, Gabriele Fohr. 1-7 [doi]
- Exploring the Association between Temporal Dispersion and Virtual Team PerformanceJorge A. Colazo. 1-7 [doi]
- Communicator Style and Technology PreferenceJoycelyn L. Streator. 1-7 [doi]
- The Effect of Interactivity between Knowledge Intensive Business service (KIBS) Firms and Customers on Innovations in KIBS FirmsYong Jin Kim, Kichan Nam, Nam Hee Lee, Myung Song Yim. 1-10 [doi]
- Statistical Analysis of Abnormal Electric Power Grid BehaviorThomas A. Ferryman, Brett G. Amidan. 1-8 [doi]
- Increasing Coordination Demands and the Impact on CIO RankEric C. Larson, Carl R. Adams. 1-12 [doi]
- Application of the 3D Multi User Virtual Environment of Second Life to Emergency Evacuation SimulationJudith Molka-Danielsen, Michal Chabada. 1-9 [doi]
- Exploiting Mobile Technologies to Build a Knowledge Mobilization Capability: A Work System-Based MethodChihab BenMoussa. 1-11 [doi]
- GS3: A Knowledge Management Architecture for Collaborative Geologic Sequestration ModelingIan Gorton, Gary D. Black, Karen Schuchardt, Chandrika Sivaramakrishnan, Signe K. Wurstner, Peter Hui. 1-10 [doi]
- Finding Success in Rapid Collaborative Requirements Negotiation Using Wiki and ShaperDi Wu, Da Yang, Barry W. Boehm. 1-10 [doi]
- eGovernment Services Use and Impact through Public Libraries: Preliminary Findings from a National Study of Public Access Computing in Public LibrariesKaren E. Fisher, Samantha Becker, Michael Crandall. 1-10 [doi]
- Best Practices for the Organizational Implementation of Software TestingTim A. Majchrzak. 1-10 [doi]
- Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile DevicesBenjamin R. Moyers, John P. Dunning, Randolph Marchany, Joseph G. Tront. 1-9 [doi]
- Equilibrium Price Dispersion with Online SearchLizhen Xu, Jianqing Chen, Andrew B. Whinston. 1-11 [doi]
- Dynamics of an Economics Model for Generation Coupled to the OPA Power Transmission ModelBenjamin A. Carreras, David E. Newman, Matthew Zeidenberg, Ian Dobson. 1-9 [doi]
- Facilitator in a Box: Computer Assisted Collaboration Engineering and Process Support Systems for Rapid Development of Collaborative Applications for High-Value TasksRobert O. Briggs, Gwendolyn L. Kolfschoten, Gert-Jan de Vreede, Conan C. Albrecht, Stephan G. Lukosch. 1-10 [doi]
- The Disruptive Effect of Open Platforms on Markets for Wireless ServicesAtanu Lahiri, Rajiv M. Dewan, Marshall L. Freimer. 1-10 [doi]
- Modeling Software Piracy in Developed and Emerging EconomiesBruce A. Reinig, Robert K. Plice. 1-8 [doi]
- Internet Crime Reporting: Evaluation of a Crime Reporting and Investigative Interview System by Comparison with a Non-Interactive Reporting AlternativeAlicia Iriberri, Carlos J. Navarrete. 1-9 [doi]
- What Is Trust in E-Government? A Proposed TypologyPanagiota Papadopoulou, Mara Nikolaidou, Drakoulis Martakos. 1-10 [doi]
- Challenges of Mobile Clinical System Design: What do Nurses Think?Yunan Chen, Michael E. Atwood. 1-9 [doi]
- Who are the Players? Finding and Characterizing Stakeholders in Social NetworksCristina Chuva Costa, Paulo Rupino da Cunha. 1-10 [doi]
- Securing Intellectual Assets in a Global EnvironmentDavid T. Croasdell, Nathan O Donoghue. 1-11 [doi]
- Multinational E-Government Collaboration, Information Sharing, and Interoperability: An Integrative ModelCelene Navarrete, José Ramón Gil-GarcÃa, Sehl Mellouli, Theresa A. Pardo, Hans Jochen Scholl. 1-10 [doi]
- Design Principles for Power Grid Cyber-Infrastructure Authentication ProtocolsHimanshu Khurana, Rakeshbabu Bobba, Timothy M. Yardley, Pooja Agarwal, Erich Heine. 1-10 [doi]
- A MultiExpert Approach for Bayesian Network Structural LearningFrancesco Colace, Massimo De Santo, Mario Vento. 1-11 [doi]
- Documents As Mediating Artifacts in Contemporary IS DevelopmentLaurie McLeod, Bill Doolin. 1-10 [doi]
- P-CARD: Policy-Based Contextual Awareness Realization for DisastersAmir Talaei-Khoei, Steven J. Bleistein, Pradeep Kumar Ray, Nandan Parameswaran. 1-10 [doi]
- A Strategy for Evaluating Socio-Economic Outcomes of an ICT4D ProgrammeShaun Pather, Corrie Uys. 1-11 [doi]
- A Virtualization Architecture for In-Depth Kernel IsolationJiang Wang, Sameer Niphadkar, Angelos Stavrou, Anup K. Ghosh. 1-10 [doi]
- Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID TagsYanjun Zuo. 1-10 [doi]
- User Contribution in Innovation Processes - Reflections from a Living Lab PerspectiveJesper Svensson, Carina Ihlström Eriksson, Esbjörn Ebbesson. 1-10 [doi]
- The Importance of Social Network Structure in the Open Source Software Developer CommunityMatthew Van Antwerp, Greg Madey. 1-10 [doi]
- Understanding CybercrimeDerrick J. Neufeld. 1-10 [doi]
- A Group Model Building Approach for Identifying Simulation Scenarios in Critical InfrastructureFinn Olav Sveen, Eliot Rich, José Manuel Torres, Josune Hernantes, Jose J. Gonzalez. 1-10 [doi]
- Can e-Government Adopters Benefit from a Technology-First Approach? The Case of Egypt Embarking on Service-Oriented ArchitectureRalf Klischewski, Ranwa Abubakr. 1-10 [doi]
- A S-D Logic Based Approach to Input-Output Analysis for Technology SpilloverYen-Hao Hsieh, Soe-Tysr Yuan. 1-10 [doi]
- Designing Secure SCADA Systems Using Security PatternsEduardo B. Fernández, MarÃa M. Larrondo-Petrie. 1-8 [doi]
- mHealth for Influenza Pandemic Surveillance in Developing CountriesJunhua Li, Nathan Moore, Shahriar Akter, Steven Bleisten, Pradeep Ray. 1-9 [doi]
- Strategic Alliance via Co-Opetition: Supply Chain Partnership with a CompetitorJie Zhang, Gerg Frazier. 1-10 [doi]
- Interrelated Barriers and Risks Affecting ERP Post-Implementation in ChinaGuo Chao Peng, Miguel Baptista Nunes. 1-10 [doi]
- Strategic Positioning of Information Logistics Service Providers: Guidelines for Selecting Appropriate Organizational ModelsGerrit Lahrmann. 1-10 [doi]
- Rigorous Support for Flexible Planning of Product Releases - A Stakeholder-Centric Approach and Its Initial EvaluationVille Heikkila, Anas Jadallah, Kristian Rautiainen, Günther Ruhe. 1-10 [doi]
- Measuring Similarity for Security VulnerabilitiesJu An Wang, Linfeng Zhou, Minzhe Guo, Hao Wang, Jairo Camargo. 1-10 [doi]
- Strategic Alignment of ICT Projects with Community Values in Local GovernmentMarcus Vogt, Kieth Hales. 1-10 [doi]
- Social Comparison or Social Loafing: A Study of Anonymous Ideation in Virtual TeamsFang Chen, Limin Zhang, Joseph Latimer. 1-10 [doi]
- eGOVSIM: A Model for Calculating the Financial Gains of Governmental Services Transformation, for Administration and CitizensYannis Charalabidis, Dimitris Askounis. 1-10 [doi]
- Efficiency, Trust, and Visual Appeal: Usability Testing through Eye TrackingSoussan Djamasbi, Marisa Siegel, Tom Tullis, Rui Dai. 1-10 [doi]
- RFID-Based Authentication Middleware for Mobile DevicesEwa Syta, Stan Kurkovsky, Bernardo Casano. 1-10 [doi]
- Proposal of an Operations Department Model to Provide IT Governance in Organizations that Don t have IT C-Level ExecutivesMitch Cochran. 1-10 [doi]
- Algorithms for Detection of Static Voltage Instability in Power Systems Using SynchrophasorsXunning Yue, Vaithianathan Venkatasubramanian. 1-7 [doi]
- Towards Proactive Forensic Evidentiary CollectionClay Shields. 1-9 [doi]
- The Impact of e-Book Technology on Book RetailingYabing Jiang, Evangelos Katsamakas. 1-8 [doi]
- On the Role of Partners in a Multi-Disciplinary Business Network: A Knowledge Management PerspectiveJesse Karjalainen, Aku Valtakoski. 1-10 [doi]
- Not Too Long to Read: The tldr Interface for Exploring and Navigating Large-Scale Discussion SpacesSrikanth Narayan, Coye Cheshire. 1-10 [doi]
- An Examination of Computer-Mediated Communication for Engineering-Related TasksJoyce Yi-Hui Lee, Niki Panteli. 1-10 [doi]
- Quality and Fairness of an Information Security Policy As Antecedents of Employees Security Engagement in the Workplace: An Empirical InvestigationBurcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat. 1-7 [doi]
- Experiences Validating the Access Policy Tool in Industrial SettingsDavid M. Nicol, William H. Sanders, Mouna Seri, Sankalp Singh. 1-8 [doi]
- Artifacts as Instant Messaging BuddiesSaul Greenberg, Stephen Voida, Nathan Stehr, Kimberly Tee. 1-10 [doi]
- A Case Study of Communication and Social Interactions in Learning in Second LifeQiping Zhang, Nancy Marksbury, Steven Heim. 1-9 [doi]
- Managing Technology-Intensive Project Teams in the Global EnterpriseHans J. Thamhain. 1-10 [doi]
- The Role of Coreference Resolution in Outbreak Reporting and DetectionScott L. DuVall, Jeffrey P. Ferraro. 1-8 [doi]
- Business Value in Complex IT Service Engagements: Realization is Governed by Patterns of InteractionSusan U. Stucky, Melissa Cefkin, Yolanda A. Rankin, Ben Shaw, Jakita O. Thomas. 1-10 [doi]
- Budget Mapping: Increasing Citizen Understanding of Government via Interactive DesignShawn T. Walker. 1-9 [doi]
- The Monetary Value of Virtual Goods: An Exploratory Study in MMORPGsQiu-Hong Wang, Viktor Mayer-Schönberger. 1-11 [doi]
- Uncovering Four Strategies to Approach Master Data ManagementAnne Cleven, Felix Wortmann. 1-10 [doi]
- Integration of Multi-Criteria Decision Analysis and Negotiation in Order PromisingTung Bui, Hans-Jürgen Sebastian. 1-10 [doi]
- Knowledge Evolution System for Dynamic Emergency Planning and ResponseSaravanan Muthaiyah, Murali Raman, Magiswary Dorasamy. 1-6 [doi]
- Organizational Transformation with Scrum: How a Venture Capital Group Gets Twice as Much Done with Half the WorkJeff Sutherland, Igor Altman. 1-9 [doi]
- Construction of a Complex Adaptive Systems Pattern as an Epistemological Lens for E-Government SystemsAdrian Krolczyk, Christian Senf, Nils Cordes. 1-10 [doi]
- Pricing of Online Advertising: Cost-Per-Click-Through Vs. Cost-Per-ActionYu Hu, Jiwoong Shin, Zhulei Tang. 1-9 [doi]
- Supply-Chain Risk Management: Incorporating Security into Software DevelopmentRobert J. Ellison, Carol Woody. 1-10 [doi]
- Understanding the Adoption of Electronic Banking in ChinaSherah Kurnia, Fei Peng, Yi Ruo Liu. 1-10 [doi]
- Reorganizing Projects through Enterprise System: Emerging Role of Enterprise System in Radical Organizational ChangeMerja Mattila, Joe Nandhakumar, Petri Hallikainen, Matti Rossi. 1-10 [doi]
- Swarm Intelligence for Analyzing Opinions in Online CommunitiesCarolin Kaiser, Johannes Krockel, Freimut Bodendorf. 1-9 [doi]
- Information Policy Meta-Principles: Stewardship and UsefulnessSharon S. Dawes. 1-10 [doi]
- Information Technology and Decision Support Tools for Stakeholder-Driven River Basin Salinity ManagementNigel W. T. Quinn, Daniel B. Cozad, Gene Lee. 1-10 [doi]
- Integrating Non-Storable Renewable Energy into the Australian Electricity IndustryHugh Outhred, Stuart Thorncraft. 1-10 [doi]
- RFID-Enabled Inventory Control Optimization: A Proof of Concept in a Small-to-Medium RetailerDane Hamilton, Katina Michael, Samuel Fosso Wamba. 1-10 [doi]
- Changing IT Providers in Public Sector Outsourcing: Managing the Loss of Experiential KnowledgeMaria Alaranta, Sirkka L. Jarvenpaa. 1-10 [doi]
- Managing Emerging Information Security Risks during Transitions to Integrated OperationsYing Qian, Yulin Fang, Martin Gilje Jaatun, Stig Ole Johnsen, Jose J. Gonzalez. 1-11 [doi]
- Exploring Data Warehouse Appliances for Mesh Analysis ApplicationsCraig Ulmer, Greg Bayer, Yung Ryn Choe, Diana Roe. 1-10 [doi]
- Analyzing Leadership Dynamics in Distributed Group CommunicationKevin Crowston, Andrea Wiggins, James Howison. 1-10 [doi]
- Organic Software Framework for an Adaptive Integrated Knowledge RepositoryDavid J. Lubliner, George R. Widmeyer, Fadi P. Deek. 1-10 [doi]
- Pervasive Integration by Autonomous AgentsAnders Moen Hagalisletto, Steinar Kristoffersen. 1-9 [doi]
- Towards Audit 2.0 - A Web 2.0 Community Platform for AuditorsNick Gehrke, Patrick Wolf. 1-10 [doi]
- Standards Initiatives for Software Product Line Engineering and Management within the International Organization for StandardizationTimo Käkölä. 1-10 [doi]
- Link Depth: Measuring How Far Searchers Explore WebYuka Egusa, Masao Takaku, Hitoshi Terai, Hitomi Saito, Makiko Miwa, Noriko Kando. 1-8 [doi]
- A Methodology for Mining Security Tactics from Security PatternsJungwoo Ryoo, Phillip A. Laplante, Rick Kazman. 1-5 [doi]
- Concurrent Architecture for Automated Malware ClassificationTimothy Daly, Luanne Burns. 1-8 [doi]
- IS Alignment Improved with Co-Evolutionary Principles: An Open Source ApproachNassim Belbaly, Robert Frank. 1-10 [doi]
- Deploying a Telerehabilitation Service Innovation: An Early Stage Business Model Engineering ApproachBjorn Kijl, Bart Nieuwenhuis. 1-10 [doi]
- Preface1 [doi]
- Open Innovation Success or Failure - The Impact of Contextual FactorsUlrika H. Westergren. 1-10 [doi]
- Media Choices and Trust in Partially Distributed Global TeamsLinda Plotnick, Starr Roxanne Hiltz, Rosalie J. Ocker. 1-10 [doi]
- Hippocratic Databases: Extending Current Transaction Processing Approaches to Satisfy the Limited Retention PrincipleMarkus Kirchberg, Sebastian Link. 1-10 [doi]
- Understanding Collaboration Success in Context of Cognitive and Social PresenceAmit V. Deokar, Thomas O. Meservy, Joel H. Helquist, John Kruse. 1-10 [doi]
- Virtual Power Plant As a Bridge between Distributed Energy Resources and Smart GridSlobodan Lukovic, Igor Kaitovic, Marcello Mura, Umberto Bondi. 1-8 [doi]
- A Multi-Level Technical Infrastructure for Diabetes Chronic Care Management in ChinaCynthia LeRouge, Mark Gaynor, Chien-Ching Li, Jiao Ma. 1-10 [doi]
- Changing Roles of Technology Leaders: Strategic Partners or High Level Mechanics?Joseph W. Weiss, Susan M. Adams. 1-8 [doi]
- Kaal - A Real Time Stream Mining AlgorithmRajanish Dass, Varun Kumar. 1-10 [doi]
- Knowledge Sourcing from Repositories: The Role of System Characteristics and AutonomyAlexandra Durcikova, Kelly J. Fadel. 1-10 [doi]
- Value, Participation and Quality of Electronic Health Records in the NetherlandsTon A. M. Spil, Christiaan P. Katsma, Robert A. Stegwee, Ernst F. Albers, Arne Freriks, Edwin Ligt. 1-10 [doi]
- A Pattern Language Approach to the Design of a Facilitation Reporting DatabaseDouglas A. Druckenmiller, Jon Jenkins, Daniel Mittleman, Peter Bootsman. 1-10 [doi]
- Individual Motivations for Using Social Virtual Worlds: An Exploratory Investigation in Second LifeZhongyun Zhou, Xiao-Ling Jin, Doug Vogel, Xitong Guo, Xiaojian Chen. 1-10 [doi]
- Open Innovation and Control: A Case from VolvoJonas Kuschel, Bjorn Remneland, Magnus Holmqvist. 1-10 [doi]
- Mispricing and Exchange Market Systems: The Effect of Infrastructure UpgradesMartin Wagener, Dennis Kundisch, Ryan Riordan, Fethi A. Rabhi, Christof Weinhardt. 1-10 [doi]
- Investigating the Drivers of the Continuous Use of Social Virtual WorldsMatti Mäntymäki, Jani Merikivi. 1-10 [doi]
- A Survey of Game Theory as Applied to Network SecuritySankardas Roy, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Vivek Shandilya, Qishi Wu. 1-10 [doi]
- Fault-Delayed Voltage Recovery Control with Plug-In Hybrid Electric VehiclesCurtis Roe, Yousef M. Al-Abdullah, Dhwanil Desai, George K. Stefopoulos, George J. Cokkinides, A. P. Sakis Meliopoulos. 1-9 [doi]
- The Hidden System Costs of Wind Generation in a Deregulated Electricity MarketTimothy D. Mount, Alberto Lamadrid, Surin Maneevitjit, Bob Thomas, Ray Zimmerman. 1-10 [doi]
- Service Oriented Device Integration - An Analysis of SOA Design PatternsChristian Mauro, Jan Marco Leimeister, Helmut Krcmar. 1-10 [doi]
- Exploring Complexity in Open Source Software: Evolutionary Patterns, Antecedents, and OutcomesDavid P. Darcy, Sherae L. Daniel, Katherine J. Stewart. 1-11 [doi]
- A Cyberinfrastructure Framework for Comparative Effectiveness Research in HealthcareOmar F. El-Gayar, Surendra Sarnikar, Matthew J. Wills. 1-9 [doi]
- A Cybernetic Theory of the Impact of Implementers Actions on User Resistance to Information Technology ImplementationSuzanne Rivard, Liette Lapointe. 1-10 [doi]
- Metadata Effectiveness: A Comparison between User-Created Social Tags and Author-Provided MetadataCaimei Lu, Jung-ran Park, Xiaohua Hu, Il-Yeol Song. 1-10 [doi]
- Explaining the Global Digital Divide: The Impact of Public Policy Initiatives on Digital Opportunity and ICT DevelopmentDavid J. Yates, Girish J. Gulati, Anas Tawileh. 1-10 [doi]
- Using Hybrid Data Mining Techniques for Facilitating Cross-Selling of a Mobile Telecom Market to Develop Customer Classification ModelHyunchul Ahn, Chi Woo Song, Jae Joon Ahn, Hyoung Yong Lee, Tae-Yoon Kim, Kyong Joo Oh. 1-10 [doi]
- What Does Your Online Pharmacy Signal? A Comparative Analysis of Website Trust FeaturesTamilla Mavlanova, Raquel Benbunan-Fich. 1-10 [doi]
- Emergency Communications Using the Web: Matching Media Richness to the SituationWm. Arthur Conklin, Glenn B. Dietrich. 1-9 [doi]
- Monitoring Behavioral Transitions in Cognitive Rehabilitation with Multi-Model, Multi-Window Stream MiningWilliam N. Robinson, Arash Akhlaghi. 1-10 [doi]
- Behavioral Patterns of Fast Flux Service NetworksAlper Caglayan, Mike Toothaker, Dan Drapaeau, Dustin Burke, Gerry Eaton. 1-9 [doi]
- Current Trends in Patients Adoption of Advanced E-Health ServicesE. Vance Wilson, Sule Balkan, Nancy K. Lankton. 1-9 [doi]
- Who Cares about Creative Contributions to Electronic Knowledge Sharing Databases? Effects of Top Management Openness, Affective Commitment, In-Role Behavior, Technological Adequacy and Job SecurityMeredith V. Flowers, Weidong Xia, Garry G. Burnett, Debra L. Shapiro. 1-13 [doi]
- Assessing the Impact of Price Forecast Errors on the Economics of Distributed Storage SystemsKlaus-Henning Ahlert, Carsten Block. 1-10 [doi]
- Effectiveness of Strategic Decision-Making on IT Investment: Antecedents and Its Impacts on IT Investment PerformanceJong-Sung Park, Jung Hoon Lee, Jung-In Yang, Bong-Gyu Lee. 1-13 [doi]
- Engaging the Periphery for Visual Communication on Mobile PhonesLisa Cowan, William G. Griswold, Louise Barkhuus, James D. Hollan. 1-10 [doi]
- A Tool for the Analysis of Social Networks in Collaborative Software DevelopmentMichael Schwind, Andreas Schenk, Michael Schneider. 1-10 [doi]
- The Factors Influencing the OnLine/OffLine Activities of the CoP (Community of Practice) and the Results: Focusing on Perceived Risk of Losing Uniqueness of One s Own Knowledge through CoP ActivityHeehyoung Jang, Ilsang Ko. 1-12 [doi]
- Over the Air Programming on Imote2-Based Sensor NetworksRashmi Parthasarathy, Nina Peterson, Wen-Zhan Song, Ali R. Hurson, Behrooz Shirazi. 1-9 [doi]
- Determinants to the Use of Business Process ModelingTom R. Eikebrokk, Jon Iden, Dag H. Olsen, Andreas L. Opdahl. 1-10 [doi]
- The Market for Services: Economic Criteria, Immaturities, and Critical Success FactorsSven Overhage, Sebastian Schlauderer. 1-10 [doi]
- Economic Integration, IT Intensity and the Aggregate Economic Impacts of IT Services OffshoringYen-Chun Chou, Robert J. Kauffman. 1-10 [doi]
- In Search for the Right Tools to Fix the Right Problem: A Look into the Challenges of Collaborative DesignKalle Piirainen, Gwendolyn L. Kolfschoten, Stephan Lukosch. 1-10 [doi]
- e-Health Rural Consumers Characteristics and ChallengesAnn L. Fruhling. 1-10 [doi]
- Cutting and Pasting Up: Documents and Provenance in a Complex Work EnvironmentHeather Lonsdale, Carlos Jensen, Eleanor Wynn, Nicolas J. Dedual. 1-10 [doi]
- Setting Up and Managing Business Process Standardization: Insights from a Case Study with a Multinational E-Commerce FirmBjoern Muenstermann, Peter Moederer, Tim Weitzel. 1-11 [doi]
- Case Study: Simulated Deployment of a Mesh Network in HonoluluAndrew Wong. 1-9 [doi]
- Hybrid Multiple Channels-Based Recommendations for Mobile CommerceChuen-He Liou, Duen-Ren Liu. 1-8 [doi]
- Coding for Unique Ideas and Ambiguity: Measuring the Effects of a Convergence Intervention on the Artifact of an Ideation ActivityVictoria Badura, Aaron Read, Robert O. Briggs, Gert-Jan de Vreede. 1-10 [doi]
- A Comparison of the Influence of Social Factors and Technological Factors on Adoption and Usage of Knowledge Management SystemsAndrea J. Hester. 1-10 [doi]
- Electronic Tax Filing: The Impact of Reputation and Security on AdoptionLudwig Christian Schaupp, Lemuria Carter, Jeff Hobbs. 1-10 [doi]
- Using Web 2.0 Tools for Qualitative Analysis: An ExplorationSilvana Di Gregorio. 1-10 [doi]
- E-Government Challenge in Disaster Evacuation Response: The Role of RFID Technology in Building Safe and Secure Local CommunitiesAkemi T. Chatfield, Samuel Fosso Wamba, Hirokazu Tatano. 1-10 [doi]
- A Multi-Period Study of the Evolution of Collaboration in TelemedicineDavid L. Paul. 1-10 [doi]
- Initial Case Study on the Good, the Bad and the Ugly Aspects of a New MSc Program in Computer Forensics and E-DiscoveryWilliam Bradley Glisson, Ray Welland. 1-10 [doi]
- Unpacking the Dynamics of IS User Improvisation: A Research FrameworkSean T. McGann, Kalle Lyytinen. 1-10 [doi]
- Designing Hub Networks with Connected and Isolated HubsJames F. Campbell. 1-10 [doi]
- Trust in Government Cross-Boundary Information Sharing Initiatives: Identifying the DeterminantsJosé Ramón Gil-GarcÃa, Ahmet Guler, Theresa A. Pardo, G. Brian Burke. 1-10 [doi]
- Reviewers1-12 [doi]
- An Examination of an Information Systems Flexibility FrameworkTerry Anthony Byrd, Laura Jacome Madariaga, Linda W. Byrd, Victor Mbarika. 1-10 [doi]
- Engineering Dialectical Inquiry: Lessons Learned from Lab ExplorationsDouglas A. Druckenmiller, William Acar. 1-10 [doi]
- Are Pre-Processing and Prioritization Preferable in Service Systems?Gregory Dobson, Arvind Sainathan. 1-10 [doi]
- Suggestions for Measuring Organizational Innovativeness: A ReviewBernhard Moos, Daniel Beimborn, Heinz-Theo Wagner, Tim Weitzel. 1-10 [doi]
- VrtProf: Vertical Profiling for System VirtualizationHussam Mousa, Kshitij Doshi, Timothy Sherwood, ElMoustapha Ould-Ahmed-Vall. 1-10 [doi]
- Standardized Device Services - A Design Pattern for Service Oriented Integration of Medical DevicesChristian Mauro, Ali Sunyaev, Jan Marco Leimeister, Helmut Krcmar. 1-10 [doi]
- Data Aggregation and Analysis for Cancer Statistics - A Visual Analytics ApproachRoss Maciejewski, Travis Drake, Stephen Rudolph, Abish Malik, David S. Ebert. 1-5 [doi]
- Who s Right and Who Writes: People, Profiles, Contacts, and Replies in Online DatingAndrew T. Fiore, Lindsay Shaw Taylor, Xiaomeng Zhong, G. A. Mendelsohn, Coye Cheshire. 1-10 [doi]
- Analysis of Marginal Carbon Intensities in Constrained Power NetworksPablo A. Ruiz, Aleksandr Rudkevich. 1-9 [doi]
- Communication Effectiveness in Global Virtual Teams: A Case Study of Software Outsourcing Industry in ChinaQingfei Min, Zhenhua Liu, Shaobo Ji. 1-8 [doi]
- Embedded Toolkits for User Co-Design: A Technology Acceptance Study of Product Adaptability in the Usage StageFrank Thomas Piller, Christoph Ihl, Frank Steiner. 1-10 [doi]
- A Cross-Disciplinary Study of What Determines the Adoption of MDSCong Kristy Shi, Xiaoming Hao, Ravi S. Sharma. 1-11 [doi]
- Diversity in Distributed Decision Making: An Exploratory StudyAnil K. Aggarwal. 1-11 [doi]
- Situation Vs. Context: Considerations on the Level of Detail in Modelling Method AdaptationChristian Janiesch. 1-10 [doi]
- Self-Guiding Group Support Systems: Can Groups Use GSS without Support?Gwendolyn L. Kolfschoten, Calvin Lee. 1-6 [doi]
- Semantic Interoperability in PracticeAadya Shukla, Steve Harris, Jim Davies. 1-10 [doi]
- Evaluation Framework for Personal Health Records: Microsoft HealthVault Vs. Google HealthAli Sunyaev, Dmitry Chornyi, Christian Mauro, Helmut Krcmar. 1-10 [doi]
- Improving Prediction Accuracy in Trust-Aware Recommender SystemsSanjog Ray, Ambuj Mahanti. 1-9 [doi]
- Causal Network Construction to Support Understanding of NewsHiroshi Ishii, Qiang Ma, Masatoshi Yoshikawa. 1-10 [doi]
- An Exploratory Study of Organizing Structures for Post-Implementation ERPKevin P. Gallagher, Vickie Coleman Gallagher. 1-10 [doi]
- Are Public and Private Health Insurance Companies Going Web 2.0? - A Complete Inventory Count in GermanyNadine Blinn, Mirko Kuhne, Markus Nüttgens. 1-9 [doi]
- A Pheromone-Based Negotiation Mechanism for Lot-Sizing in Supply ChainsJörg Homberger, Hermann Gehring. 1-10 [doi]
- Exploring the Moderating Effect of Information Inconsistency in a Trust-Based Online Shopping ModelKem Z. K. Zhang, Matthew K. O. Lee, Christy M. K. Cheung, Aaron X. L. Shen, Xiaoling Jin, Huaping Chen. 1-9 [doi]
- Manifested Intra-Group Conflict in Collaborative Technology Supported Multi-Cultural Virtual Teams: Findings from a Laboratory ExperimentSouren Paul, Sumati Ray. 1-11 [doi]
- Exploring the Transient Nature of Agile Project Management PracticesLech Krzanik, Pilar Rodriguez, Jouni Similä, Pasi Kuvaja, Anna Rohunen. 1-8 [doi]
- The Impact of Cultural Differences on IT Nearshoring Risks from a German PerspectiveAlexander von Stetten, Daniel Beimborn, Elena Kuznetsova, Bernhard Moos. 1-10 [doi]
- Enterprise Scrum: Scaling Scrum to the Executive LevelDaniel R. Greening. 1-10 [doi]
- Access Governance: Flexibility with Escalation and AuditXia Zhao, M. Eric Johnson. 1-13 [doi]
- Automatic Text Analysis of Values in the Enron Email Dataset: Clustering a Social Network Using the Value Patterns of ActorsYingjie Zhou, Kenneth R. Fleischmann, William A. Wallace. 1-10 [doi]
- Defining the Discipline of Secure Software Assurance: Initial Findings from the National Software Assurance RepositoryDaniel Shoemaker, Jeffrey A. Ingalsbe, Rita Barrios, Nancy R. Mead. 1-8 [doi]
- Knowledge Construction and Risk Induction within a Large High-Tech FirmW. David Holford. 1-11 [doi]
- Online Social Shopping: The Functions and Symbols of Design ArtifactsCamille Grange, Izak Benbasat. 1-10 [doi]
- Seven Dimensions of Agile Maturity in the Global Enterprise: A Case StudyRobert Benefield. 1-7 [doi]
- Software Entropy in Agile Product EvolutionGeir Kjetil Hanssen, Aiko Fallas Yamashita, Reidar Conradi, Leon Moonen. 1-10 [doi]
- Evaluating the Expressiveness of Domain Specific Modeling Languages Using the Bunge-Wand-Weber OntologyJörg Becker, Philipp Bergener, Dominic Breuker, Michael Räckers. 1-10 [doi]
- Desperately Seeking the Infrastructure in IS Research: Conceptualization of Digital Convergence As Co-Evolution of Social and Technical InfrastructuresDavid Tilson, Kalle Lyytinen, Carsten Sørensen. 1-10 [doi]
- Leveraging Social Networks to Embed Trust in Rideshare ProgramsVineeta Chaube, Andrea L. Kavanaugh, Manuel A. Pérez-Quiñones. 1-8 [doi]
- NASPInet - The Internet for SynchrophasorsPaul T. Myrda, Kris Koellner. 1-6 [doi]
- New Efficient RF Fingerprint-Based Security Solution for Bluetooth Secure Simple PairingSanna Pasanen, Keijo Haataja, Niina Paivinen, Pekka Toivanen. 1-8 [doi]
- Sweet Dreams and Rude Awakening - Critical Infrastructure s Focal IT-Related IncidentsHeli Tervo, Timo Wiander. 1-8 [doi]
- The Impact of Local Loop Unbundling on DSL Service DiversityLouis Yi-Shih Lo, Eugenia Y. Huang. 1-10 [doi]
- Antecedents and Consequences of Corporate Weblog Usage in the Intranet: A Process PerspectivePhilip Raeth, Stefan Smolnik. 1-10 [doi]
- A Study on Preference Impartation and Decision Support in E-NegotiationGregory E. Kersten, Eva Chen, Jesus Rios, Stefan Strecker. 1-10 [doi]
- Modelling Creative Team DynamicsKuan Liung Tan, Paul Swatman. 1-10 [doi]
- TellUsWho: Guided Social Network Data CollectionStephen T. Ricken, Richard P. Schuler, Sukeshini A. Grandhi, Quentin Jones. 1-10 [doi]
- The PATH Project: Partnerships for Automated Transformations of Heterogeneous DatasetsKara L. Nance, Uma Bhatt, Brian Hay. 1-8 [doi]
- Simulation Games for Collaborative Development in E-GovernmentBram Klievink, Marijn Janssen. 1-9 [doi]
- Managing Internal Control in Changing Organizations through Business Process Intelligence - A Service Oriented Architecture for the XACML Based Monitoring of Supporting SystemsMatthias Kehlenbeck, Thorben Sandner, Michael H. Breitner. 1-10 [doi]
- Selective Access to Filter Cache for Low-Power Embedded SystemsJong Wook Kwak, Ju Hee Choi. 1-8 [doi]
- Efficient Cryptographic Primitives for Private Data MiningMark Shaneck, Yongdae Kim. 1-9 [doi]
- Message Passing for Integrating and Assessing Renewable Generation in a Redundant Power GridLenka Zdeborová, Scott Backhaus, Michael Chertkov. 1-10 [doi]
- Portfolio Performance Measurement Based on Service-Oriented Grid Computing: Developing a Prototype from a Design Science PerspectiveSven Weber, Roman Beck, Martin Wolf, Jens Vykoukal. 1-10 [doi]
- The Effects of Electronic Collaboration on Interorganizational Learning and Firm PerformanceSujeong Choi, Ilsang Ko. 1-9 [doi]
- The South Florida Ecosystem Portfolio Model: A Web-Enabled Multicriteria Land Use Planning Decision Support SystemWilliam Labiosa, Paul Hearn, David Strong, Richard Bernknopf, Dianna Hogan, Leonard Pearlstine. 1-10 [doi]
- Does Co-Opetition Change the Game? A Bayesian Analysis of Firm Participation Strategy in an Industry Standard-Setting OrganizationRobert J. Kauffman, Benjamin B. M. Shao, Juliana Y. Tsai. 1-10 [doi]
- Swarm-Based Coordination of Business Networks: An Approach for Collaborative Value Creation of Innovative Goods and ServicesHenrik Ickler, Ulrike Baumöl. 1-9 [doi]
- Protection Motivation Theory: Understanding Determinants to Backing Up Personal DataRobert E. Crossler. 1-10 [doi]
- The Role of Internal Business/IT Alignment and IT Governance for Service Quality in IT Outsourcing ArrangementsFrank Schlosser, Heinz-Theo Wagner, Daniel Beimborn, Tim Weitzel. 1-10 [doi]
- Taking Universal Perspective in Design: A Plea for Two Reflective Principles and MechanismsFahri Yetim. 1-10 [doi]
- A Genetic Programming Approach to Network Management RegulationKurt DeMaagd, Johannes Bauer. 1-10 [doi]
- Development of the Smart Grid: Missing Elements in the Policy ProcessRichard D. Tabors, Geoffrey Parker, Michael C. Caramanis. 1-7 [doi]
- A Decade of Globally Distributed Collaborative Learning: Lessons Learned from Cross-National Virtual TeamsDerrick L. Cogburn, Nanette Levinson, Angela Usha Ramnarine-Rieks, Fatima K. Espinoza Vasquez. 1-11 [doi]
- Datacenter Investment Support System (DAISY)Markus Hedwig, Simon Malkowski, Christian Bodenstein, Dirk Neumann. 1-10 [doi]
- The Topological and Electrical Structure of Power GridsPaul Hines, Seth Blumsack, E. Cotilla Sanchez, C. Barrows. 1-10 [doi]
- Usability Evaluation of a Learning Management SystemAlexander Blecken, Daniel Brüggemann, Wiebke Marx. 1-9 [doi]
- Matching Photovoltaic Orientation to Energy LoadsSeth Blumsack, Jeffrey Brownson, Jeff Rayl. 1-6 [doi]
- Attitudinal and Behavioural Determinants Influencing Decision Makers When Adopting Integration Technologies in Local GovernmentMuhammad Kamal, Vishanth Weerakkody, Zahir Irani. 1-12 [doi]
- Information Theory Perspective on Modeling SustainabilityVladislav Todorov, Dora Marinova. 1-10 [doi]
- Developing a Semantic Web-Based Distributed Model Management System: Experiences and Lessons LearnedAmit V. Deokar, Omar F. El-Gayar, Ruba Aljafari. 1-10 [doi]
- Extending Virtual Organizations in the Public Sector: Lessons from CSCW, STS, and Organization ScienceRadaphat Chongthammakun, Steven J. Jackson. 1-10 [doi]
- A Taxonomy for Multi-Perspective Ex Ante Evaluation of the Value of Complementary Health Information Systems - Applying the Unified Theory of Acceptance and Use of TechnologyRené Fitterer, Peter Rohner, Tobias Mettler, Robert Winter. 1-10 [doi]
- Limitations of Signs as Navigation Aids in Virtual WorldsTodd Heino, Daniel C. Cliburn, Stacy Rilea, Joseph Cooper, Victor Tachkov. 1-10 [doi]
- Analysis of the System Costs of Wind Variability Through Monte Carlo SimulationJudith B. Cardell, C. Lindsay Anderson. 1-8 [doi]
- Towards an Understanding of Social Software: The Case of AriniaStuart J. Barnes, Martin Böhringer, Christian Kurze, Jacqueline Stietzel. 1-9 [doi]
- Citation Information1 [doi]
- IT Use and the Interruption of NPD Knowledge WorkShamel Addas, Alain Pinsonneault. 1-10 [doi]
- Secure Planning of Order Picking Systems with the Aid of SimulationAlexander Ulbrich, Stefan Galka, Willibald A. Günthner. 1-7 [doi]
- Dual Identification of IS Offshoring Call Center Employees: Understanding Its Antecedents and ConsequencesYan Li, Xin Wei Wang, Hock-Hai Teo, Richard Watson. 1-10 [doi]
- Towards a Systematic Approach for Capturing Dynamic Transformation in Enterprise ModelsStephan Aier, Bettina Gleichauf. 1-10 [doi]
- Embodied Social Presence TheoryBrian E. Mennecke, Janea L. Triplett, Lesya M. Hassall, Zayira Jordan Conde. 1-10 [doi]
- Securing E-Government Assets through Automating Deployment of Honeynets for IDS SupportChristopher Hecker, Brian Hay. 1-10 [doi]
- Carrying Your Long Tail: Hitting the Sweet Spots, Delighting Your Customers, and Controlling Your CostsEric K. Clemons, Paul F. Nunes. 1-10 [doi]
- Volatile Memory Acquisition via Warm Boot Memory SurvivabilityTimothy Vidas. 1-6 [doi]
- The Continuance of Online Social Networks: How to Keep People Using Facebook?Na Shi, Matthew K. O. Lee, Christy M. K. Cheung, Huaping Chen. 1-10 [doi]
- IT Governance As Organizing: Playing the GameSenem Guney, Anthony M. Cresswell. 1-10 [doi]
- Tacit Knowledge Flows and Institutional Theory: Accelerating AcculturationAlicemary Aspell Adams, June G. Chin Yi Lee, Mark E. Nissen. 1-10 [doi]
- Developing an EMR Simulator to Assess Users Perception of Document QualityEfthimis N. Efthimiadis, Kenric W. Hammond, Ryan Laundry, Stephen M. Thielke. 1-9 [doi]
- Towards a Framework for the Generic Specification of Model-Driven Decision Support Systems: Classification Criteria of Model RelationshipsChristian Schultewolter. 1-10 [doi]
- Exploring Public Recordkeeping Behaviors in Wiki-Supported Public Consultation Activities in the New Zealand Public SectorMiriam Lips, Anita Rapson. 1-10 [doi]
- Pricing Policy Choice by Internet RetailersPhillip J. Lederer. 1-8 [doi]
- Assessment of Micro-Enterprise Development through IT AdoptionMehruz Kamal, Changsoo Song, Sajda Qureshi, Kenneth Kriz. 1-10 [doi]
- An Exploratory Investigation of the Organizational Impacts of Collaborative Information Technology Utilization in Australian OrganizationsDeepinder S. Bajwa, Graham Pervan, L. Floyd Lewis. 1-9 [doi]
- Merging PMU, Operational, and Non-Operational Data for Interpreting Alarms, Locating Faults and Preventing CascadesMladen Kezunovic, Ce Zheng, Chengzong Pang. 1-9 [doi]
- An Adaptive Method for Selecting Items from High Volume StreamsArthur H. Becker, Steven J. Colombo. 1-7 [doi]
- Knowledge Management Systems for Knowledge-Intensive Processes: Design Approach and an Illustrative ExampleSurendra Sarnikar, Amit V. Deokar. 1-10 [doi]
- The Wisdom of Reluctant CrowdsChristian Wagner, Sesia Zhao, Christoph Schneider, Huaping Chen. 1-10 [doi]
- Managing Information Intensive Service Facilities: Executive Contracts, Market Information, and Capacity PlanningYabing Jiang, Abraham Seidmann. 1-8 [doi]
- The Evolution of ERP Closure: Insights from the Social Shaping View of TechnologyPei-Hung Ju, Eric T. G. Wang. 1-10 [doi]
- Application-Layer Intrusion Detection in MANETsKatharine Chang, Kang G. Shin. 1-10 [doi]
- Spatial Variation in Search Engine ResultsDavid Noack. 1-10 [doi]
- The Temporal Development of Representational Practices: Implications for Theory and Analysis of Situated LearningDaniel D. Suthers, Richard Medina. 1-10 [doi]
- VMCAnalytic: Developing a Collaborative Video Analysis Tool for Education Faculty and Practicing EducatorsGrace Agnew, Chad M. Mills, Carolyn A. Maher. 1-10 [doi]
- Combining Phasor Measurements to Monitor Cutset AnglesIan Dobson, Manu Parashar, Chelsea Carter. 1-9 [doi]
- Antecedents to Consumers Acceptance of Mobile Advertisements - A Hierarchical Construct PLS Structural Equation ModelRisto Rajala, Mika Westerlund. 1-10 [doi]
- MarkIt: Community Play and Computation to Generate Rich Location Descriptions through a Mobile Phone GameKetan Patel, Mohamed Ismail, Sara Motahari, David J. Rosenbaum, Stephen T. Ricken, Sukeshini A. Grandhi, Richard P. Schuler, Quentin Jones. 1-10 [doi]
- Selling or Subscribing Software under Quality Uncertainty and Network Externality EffectJie Zhang, Abraham Seidmann. 1-10 [doi]
- Digital Cross-Organizational Collaboration: A Metatriangulation ReviewMaria Madlberger, Narcyz Roztocki. 1-10 [doi]
- On Mapping Business Document Models to Core ComponentsMichael Strommer, Christian Pichler, Philipp Liegl. 1-10 [doi]
- Automatic Diagnosis of Melanoma: A Software System Based on the 7-Point Check-ListGiuseppe Di Leo, Alfredo Paolillo, Paolo Sommella, G. Fabbrocini. 1-10 [doi]
- Cash Flows: Leadership PACs in the U. S. Congress from 1992 - 2008Suzanne M. Robbins. 1-10 [doi]
- Biosensor-Based Intelligent Measurement System for Wine Fermentation MonitoringDonatella Albanese, Massimo De Santo, Consolatina Liguori, Vincenzo Paciello, Antonio Pietrosanto. 1-10 [doi]
- Ranking Attacks Based on Vulnerability AnalysisJu An Wang, Hao Wang, Minzhe Guo, Linfeng Zhou, Jairo Camargo. 1-10 [doi]
- Factors Influencing Business Process Standardization: A Multiple Case StudyMarkus Schäfermeyer, Daniel Grgecic, Christoph Rosenkranz. 1-10 [doi]
- EA As a Tool in Change and Coherency Management - A Case of a Local GovernmentKatariina Valtonen, Ismo Korhonen, Riku Rekonen, Mauri Leppänen. 1-10 [doi]
- Two-Dimensional Traceability Link Rule Mining for Detection of Insider AttacksYi Hu, Brajendra Panda. 1-9 [doi]
- The Effects of Linguistic Features and Evaluation Perspective on Perceived Difficulty of Medical TextGondy Leroy, Stephen Helmreich, James R. Cowie. 1-10 [doi]
- Leaving the Tier: Asymmetry in Pricing Patterns in Online High Tech ShopsCharles A. Wood, Sourav Ray, Paul R. Messinger. 1-10 [doi]
- CARMA: Assessing Usability through a Non-Biased Online Survey TechniqueJohn D. Hastings, Anatole Mirasano, Alexandre V. Latchininsky, Scott P. Schell. 1-10 [doi]
- A Theory of Informedness and Business Network Co-ProductionRobert J. Kauffman, Ting Li, Eric van Heck. 1-10 [doi]
- Digital Forensics: Defining an Education AgendaKara Nance, Helen Armstrong, Colin J. Armstrong. 1-10 [doi]
- Implementing Interoperability Infrastructures: Issues and Challenges from the Citizens Base Registry in GreeceFenareti Lampathaki, Nikos Kroustalias, Sotirios Koussouris, Yannis Charalabidis, John E. Psarras. 1-10 [doi]
- Participatory Democracy and the Value of Online Community Networks: An Exploration of Online and Offline Communities Engaged in Civil Society and Political ActivityRowena Cullen, Laura Sommer. 1-10 [doi]
- Lessons from the Development of SSEUS: A System for Entry and Management of Peer-Reviewed DataSusan Jeffery, Clinton Jeffery, Phillip Thomas. 1-8 [doi]
- Designing Collaborative Systems for Better Knowledge Management and Team PerformanceXiaojun Zhang, Viswanath Venkatesh, Susan A. Brown. 1-10 [doi]
- Ricochet of the Magic Bullet: Revisiting the Role of Change Management Initiatives in IT GovernanceHans P. Borgman, Hauke Heier. 1-11 [doi]
- On the Reliability of Software Piracy StatisticsIvan P. L. Png. 1-9 [doi]
- The Effects of Perceived Visual Aesthetics on Process Satisfaction in GSS UseAlex Ivanov, Christoph Schneider. 1-10 [doi]
- Grounded Theory and Information Systems: Are We Missing the Point?Hans Lehmann. 1-11 [doi]
- Enacting Assemblages of Technology: A Practice Lens AnalysisMagnus Andersson, Rikard Lindgren. 1-10 [doi]
- Learning to Work in Partially Distributed Teams: An Analysis of Emergent Communication Structures and Technology AppropriationRosalie J. Ocker, Heidi C. Webb, Starr Roxanne Hiltz, Ian D. Brown. 1-10 [doi]
- User Involvement, Social Media, and Service Evolution: The Case of HabboMikael Johnson. 1-10 [doi]
- Online and Offline Social Networks: Investigating Culturally-Specific Behavior and SatisfactionDevan Rosen, Michael Stefanone, Derek Lackaff. 1-10 [doi]
- How Does the Valence of Online Consumer Reviews Matter in Consumer Decision Making? Differences between Search Goods and Experience GoodsYuanyuan Hao, Qiang Ye, Yijun Li, Zhuo Cheng. 1-10 [doi]
- A Framework of Survivability Requirement Specification for Critical Information SystemsYanjun Zuo. 1-10 [doi]
- Interaction and Collaboration Modes for Integrating Inspiring Information into Technology-Enhanced Creativity WorkshopsAngela Carell, Thomas Herrmann. 1-10 [doi]
- Coordination in Enterprise Architecting: An Interview StudyJ. Alberto Espinosa, Frank Armour, Wai Fong Boh. 1-10 [doi]
- Conflict, Culture, and Performance in Virtual Teams: Results from a Cross-Cultural StudyJulia V. Gallenkamp, Jakob J. Assmann, Marcus A. Drescher, Arnold Picot, Isabell M. Welpe. 1-10 [doi]
- Title Page1-2 [doi]
- Drive-by-DownloadsJulia Narvaez, Barbara Endicott-Popovsky, Christian Seifert, Chiraag Uday Aval, Deborah A. Frincke. 1-10 [doi]
- Using Last-Minute Sales for Vertical Differentiation on the InternetOri Marom, Abraham Seidmann. 1-8 [doi]
- Sharing e-Health Information through Ontological LayeringPavandeep Kataria, Radmila Juric. 1-10 [doi]
- Could Decision Trees Improve the Classification Accuracy and Interpretability of Loan Granting Decisions?Jozef Zurada. 1-9 [doi]
- Risk-Based Decision Support in Service Value NetworksWibke Michalk, Benjamin Blau, Jochen Stößer, Christof Weinhardt. 1-9 [doi]
- Usability Testing by Older Americans of a Prototype Google Map Web Site To Select Nursing HomesBo Xie, Glenn Pearson. 1-10 [doi]
- Influence of Time Period and Birth Cohort Effects on Age-Specific Incidence Rates of Pancreatic and Kidney CancerTengiz Mdzinarishvili, Michael X. Gleason, Simon Sherman. 1-9 [doi]
- Towards Understanding How and Why Learners Participate in Online SeminarsStefan Hrastinski. 1-10 [doi]
- The Impact of Collaboration Network Structure on Issue Tracking s Process Efficiency at a Large Business Software VendorArne Beckhaus, Lars M. Karg, Dirk Neumann. 1-10 [doi]
- Letting go of Control to Embrace Open Source: Implications for Company and CommunityMaha Shaikh, Tony Cornford. 1-10 [doi]
- Agent Technologies for Control Applications in the Power GridAngel A. Aquino-Lugo, Thomas J. Overbye. 1-10 [doi]
- Does Live Help Service Matter? An Empirical Test of the DeLone and McLean s Extended Model in the E-Service ContextJingjun Xu, Izak Benbasat, Ronald T. Cenfetelli. 1-10 [doi]
- Energy Efficiency of Centralized and Distributed Computation in Unattended Multi-Hop Wireless Sensor Networks for Battlefield MonitoringT. Owens Walker III, Murali Tummala, John C. McEachen. 1-9 [doi]
- Bayesian Networks for the Assessment of the Effect of Urbanization on Stream MacroinvertebratesKenneth H. Reckhow. 1-8 [doi]
- Can a Document be Oral?Deborah Turner. 1-8 [doi]
- Teaching Business Process Concepts Using Enterprise Systems in a Globalized ContextBjørn Jæger, Amit Rudra, Ashley Aitken, Vanessa Chang, Berit Helgheim. 1-10 [doi]
- Strategic Choices of Inter-Organizational Information Systems: A Customer-Supplier Network PerspectiveDaning Hu, Xinlei Zhao, J. Leon Zhao. 1-8 [doi]
- The Role of Anchoring Discussion in Mediating Effective Online Interaction for Collaborative Knowledge ConstructionEvren Eryilmaz, J. van der Pol, Sumonta Kasemvilas, Justin Mary, Lorne Olfman. 1-10 [doi]
- Management of Model Relations Using Semantic WikisMichael Fellmann, Oliver Thomas, Thorsten Dollmann. 1-10 [doi]
- Dutch Electronic Medical Record - Complexity PerspectiveJoseph Barjis. 1-10 [doi]
- How to Establish an Online Innovation Community? the Role of Users and Their Innovative ContentJulia Hautz, Katja Hutter, Johann Füller, Kurt Matzler, Markus Rieger. 1-11 [doi]
- Instability of Relevance-Ranked Results Using Latent Semantic Indexing for Web SearchHoussain Kettani, Gregory B. Newby. 1-6 [doi]
- Uncertainty is the Other Side of the Coin of Information Online SearchTheresa Lauraeus-Niinivaara. 1-10 [doi]
- Technology Use in CSCL: A Content Meta-AnalysisHeisawn Jeong, Cindy E. Hmelo-Silver. 1-10 [doi]
- The Design and Evaluation of a Peer Ratings System for Online Learning CommunitiesBrian Thoms, Nathan Garrett, Terry Ryan. 1-10 [doi]
- Open Source Deployment at the City and County of San Francisco: From Cost Reduction to Rapid InnovationJ. P. Allen. 1-10 [doi]
- Increasing the Quality in IT-Supported Knowledge Repositories: Critical Success Factors for Identifying KnowledgeLena Aggestam, Anne Persson. 1-9 [doi]
- An Empirical Investigation of Gender Wage Differences in Information Systems Occupations: 1991 - 2008George S. Nezlek, Gerald DeHondt. 1-10 [doi]
- DC Optimal Power Flow Proxy LimitsBernard C. Lesieutre, Michael Schlindwein, Edward E. Beglin. 1-6 [doi]
- Expertise and Mistakes, to Share or Not to Share? A Cross Cultural Study of In-Group /Out-Group Relationships on Knowledge SharingVincent M. Ribière, Qiping Zhang. 1-10 [doi]
- An Activity Based Framework for Business Process Evaluation: Case Study of a County s Evaluation of an Integrated Court SystemRobyn L. Raschke, Sagnika Sen, Robert L. Bradford, Kristin M. Howlett. 1-10 [doi]
- Using Knowledge Management to Create Self-Reliant Communities in ThailandChalard Chantarasombat, Boonchom Srisa-ard, Matthew H. S. Kuofie, Murray E. Jennex. 1-8 [doi]
- Are CIO s Any Different? Analyzing the Job Tenures of C-Suite Executives in the Public SectorGregory S. Dawson, Robert J. Kauffman. 1-10 [doi]
- An Aggregating Discovery Service for the EPCglobal NetworkJürgen Mueller, Jan Oberst, Stefan Wehrmeyer, Jonas Witt, Alexander Zeier, Hasso Plattner. 1-9 [doi]
- Services Grid Competence As Driver of Business Agility in Turbulent Environments - A Conceptual Model in the Financial Services IndustryMartin Wolf, Jens Vykoukal, Roman Beck. 1-10 [doi]
- Would You Be My Friend? - Creating a Mobile Friend Network with Hot in the City Juha Häikiö, Tuomo Tuikka, Erkki Siira, Vili Tormanen. 1-10 [doi]
- A Research Agenda for Emerging Roles of Healthcare GPOs and Their Evolution from Group Purchasing to Information Sharing to Strategic ConsultingRajib L. Saha, Abraham Seidmann, Vera Tilson. 1-9 [doi]
- Here Be (No More) Dragons: Pushing the Frontier of Research on Virtual Organizations and TeamsJakob J. Assmann, Marcus A. Drescher, Julia Gallenkamp, Arnold Picot, Isabell M. Welpe. 1-10 [doi]
- Benefits of Enterprise Systems UseSusan P. Williams, Petra Schubert. 1-9 [doi]
- The Relevance of Elderly Technology Users in Healthcare Knowledge Creation and Innovation: A Case StudyScott Paquette, Bo Xie. 1-10 [doi]
- Multi-Layered Process Modeling for Business and IT AlignmentMikael Lind, Ulf Seigerroth. 1-10 [doi]
- Textual Knowledge Representation through the Semantic-Based Graph Structure in Clustering ApplicationsJiangning Wu, Yanzhong Dang, Donghua Pan, Zhaoguo Xuan, Qiaofeng Liu. 1-8 [doi]
- Implementation Intentions Explain How a Behavior Becomes Habitual: The Use of Online NewspapersSeppo Pahnila, Mikko Siponen. 1-11 [doi]
- On Predicting the Times to Failure of Power EquipmentMiroslav Begovic, Petar M. Djuric. 1-6 [doi]
- Knowledge Centers in Globally Acting Development Organizations: Towards a Design BlueprintMichael Hertlein, Stefan Smolnik, Gerold Riempp. 1-10 [doi]
- Climate Conscious Relations in a Digital Urban SettingAnne Ellerup Nielsen, Sophie Esmann Andersen. 1-11 [doi]
- Self-Regulating Public Servant, Profitable Internet Innovator, or Rapacious Monopoly: Assessing Google, Thinking about the Possibility of RegulationEric K. Clemons, Steve Barnett, Rajiv Gokal, Karl Hu, Nehal Madhani. 1-10 [doi]
- Determinants of Consumers E-Loyalty: A Cross-Channel PerspectiveHer-Sen Doong, Chi-Feng Tai, Hui-Chih Wang. 1-10 [doi]
- Scalable Analysis of Massive Graphs on a Parallel Data Flow SystemAndy Yoo. 1-6 [doi]
- Evaluating Human Values in the Adoption of New Technology in School EnvironmentMinna Isomursu, Mari Ervasti, Pekka Isomursu, Marianne Kinnula. 1-10 [doi]
- A Taxonomy of Government Approaches Towards Online Identity ManagementPhilip Seltsikas, Hans van der Heijden. 1-8 [doi]
- New Insights for an Old Problem: Explaining Software Piracy through Neutralization TheoryMikko T. Siponen, Anthony Vance, Robert Willison. 1-10 [doi]
- A Method for Simultaneous Production and Order Planning in a Cooperative Supply Chain Relationship with Flexibility ContractsTobias Rust, Daniel Brüggemann, Wilhelm Dangelmaier, Dominik Picker-Huchzermeyer. 1-10 [doi]
- A Stochastic Model for Simulating the Availability of Electric Vehicles for Services to the Power GridJonas Fluhr, Klaus-Henning Ahlert, Christof Weinhardt. 1-10 [doi]
- Hiding in Plain Sight: Exploiting Broadcast for Practical Host AnonymityCraig A. Shue, Minaxi Gupta. 1-10 [doi]
- The Change Strategy towards an Integrated Health Information Infrastructure: Lessons from Sierra LeoneRomain-Rolland Tohouri, Ime Asangansi, Ola Hodne Titlestad, Jørn Braa. 1-10 [doi]
- Sequencing the Development Order of Architecture Products: An Application to DoDAFAlfred E. Thal Jr., Jeffrey D. Havlicek, Stephen J. Chambal, Justin W. Osgood. 1-10 [doi]
- An Empirical Investigation into the Factors Influencing the Use of E-Banking ServicesSeung Hye Jin, Yong Jin Kim. 1-10 [doi]
- Real-Time Exception Management Decision Model (RTEMDM): Applications in Intelligent Agent-Assisted Decision Support in Logistics and Anti-Money Laundering DomainsShijia Gao, Dongming Xu. 1-10 [doi]
- Avian Influenza Datamining Using Environment, Epidemiology, and Etiology Surveillance and Analysis Toolkit (E3SAT)Madhav Erraguntla, Satheesh Ramachandran, Chang-Nien Wu, Richard J. Mayer. 1-7 [doi]
- Changing the Perspective: Improving Generate thinkLets for IdeationStefan Werner Knoll, Graham Horton. 1-10 [doi]
- Performance Impacts of Medication Management Systems: Process MattersTrent Spaulding, Michael F. Furukawa, T. S. Raghu. 1-9 [doi]
- Navigation Support for Mobile LearningChristoph Göth, Gerhard Schwabe. 1-10 [doi]
- Evolution of Innovations Across Web 2.0 Service Platforms through Mutation, Natural Selection and ReuseKarl Reiner Lang, Reina Y. Arakji. 1-10 [doi]
- Analytical Model of Adoption of Item Level RFID in a Two-Echelon Supply Chain with Shelf-Space and Price-Dependent DemandJoseph G. Szmerekovsky, Vera Tilson, Jiang Zhang. 1-7 [doi]
- Patient Perceptions of Electronic Medical RecordsChristopher Sibona, Jon Brickey, Steven Walczak, Madhavan Parthasarathy. 1-10 [doi]
- Decelerated IT Innovation: Negotiating Global IT Innovation Initiatives in Local SettingsJohan Sandberg, Jonny Holmstrom, Kalle Lyytinen. 1-10 [doi]
- Psychological Ownership and the Individual Appropriation of TechnologyJames Gaskin, Kalle Lyytinen. 1-8 [doi]
- Towards Improved Event Evaluation and Decision Support: A Systems-Based ToolG. Michael McGrath. 1-10 [doi]
- An n-Gram Based Approach to Multi-Labeled Web Page Genre ClassificationJane E. Mason, Michael A. Shepherd, Jack Duffy, Vlado Keselj, Carolyn R. Watters. 1-10 [doi]
- A Service Request Acceptance Model for Revenue Optimization - Evaluating Policies Using a Web Based Resource Management GameTim Püschel, Fabian Lang, Christian Bodenstein, Dirk Neumann. 1-10 [doi]
- Towards an Openness Rating System for Open Source SoftwareWolfgang W. Bein, Clinton Jeffery. 1-8 [doi]
- Under-Representation in SLAs for Global IT-Centric ServicesAndrea Stern, Joseph Davis. 1-8 [doi]
- An Empirical Comparison of Four Text Mining MethodsSangno Lee, Jeff Baker, Jaeki Song, James C. Wetherbe. 1-10 [doi]
- Context Oriented Structuring of eGovernment Services - An Empirical Analysis of the Information Demand of Expatriates in GermanyKathleen Bohm, Petra Wolf, Helmut Krcmar. 1-10 [doi]
- Extracting Principles for Information Management Adaptability during Crisis Response: A Dynamic Capability ViewNitesh Bharosa, Marijn Janssen. 1-10 [doi]
- Trust but Verify Critical Infrastructure Cyber Security SolutionsDennis K. Holstein, Keith Stouffer. 1-8 [doi]
- A Predictive Model of Redemption and Liability in Loyalty Reward Programs IndustryAaron Luntala Nsakanda, Moustapha Diaby, Yuheng Cao. 1-11 [doi]
- The Multidimensional Role of Trust in Enabling Creativity within Virtual Communities of Practice: A Theoretical Model Integrating Swift, Knowledge-Based, Institution-Based, and Organizational TrustDavid A. Askay, April J. Spivack. 1-10 [doi]
- Evaluating IT Services Price Benchmarks under UncertaintyRobert J. Kauffman, Ryan Sougstad. 1-10 [doi]
- Selected Problems of Designing and Using Deterministic and Stochastic Simulators for Military TrainingsRyszard Antkiewicz, Wojciech Kulas, Andrzej Najgebauer, Dariusz Pierzchala, Jaroslaw Rulka, Zbigniew Tarapata, Roman Wantoch-Rekowski. 1-10 [doi]
- Financing Long-Term Generation Capacity in a Reference Price Oriented Capacity MarketYi Sun, Felix F. Wu, Yunhe Hou. 1-7 [doi]
- Two Pilot Tests of IT-Enabled Collaboration in Emergency Healthcare: Evaluating Relational Feasibility and System AcceptanceJanis L. Gogan, Ryan J. Baxter, Monica J. Garfield, Catherine Usoff. 1-10 [doi]
- Tag Clusters as Information Retrieval InterfacesKathrin Knautz, Simone Soubusta, Wolfgang G. Stock. 1-10 [doi]
- Virtual Micro-Politics: Informal Tactics of Influence and Power in Inter-Organizational NetworksMonique Janneck, Henning Staar. 1-10 [doi]
- Trust in E-Government Transactional Services: A Study of Citizens Perceptions in Mexico and the U.S.Celene Navarrete. 1-10 [doi]
- A Collaboration Model for ERP User-System InteractionJay G. Cooprider, Heikki Topi, Jennifer Xu, Martin Dias, Tamara Babaian, Wendy T. Lucas. 1-9 [doi]
- Modeling the Impact of Increasing PHEV Loads on the Distribution InfrastructureChris Farmer, Paul Hines, Jonathan Dowds, Seth Blumsack. 1-10 [doi]
- Development of a Framework to Measure the Financial Performance of the Virtual Community of the Berlin Stock ExchangeChristoph Lattemann, Stefan Stieglitz, Jan vom Brocke, Christian Sonnenberg, Miriam Kallischnigg. 1-12 [doi]
- An Empirical Study on the Effectiveness of Common Security MeasuresKeith Harrison, Gregory White. 1-7 [doi]
- Theory As a Case of Design: Lessons for Design from the Philosophy of ScienceAllen S. Lee, Jeffrey V. Nickerson. 1-8 [doi]
- Multi-Method Virtualization: An Architectural Strategy for Service TuningErik Moore, Daniel M. Likarish. 1-10 [doi]
- An Exploration of Physical-Virtual Convergence Behaviors in Crisis SituationsRajib Subba, Tung Bui. 1-10 [doi]
- Creating Individual Journal Rankings Based on a Community ApproachEetu Luoma, Jan M. Pawlowski, Riikka Ahlgren. 1-10 [doi]
- A Model of the Relationships among Knowledge Management Practices and Task KnowledgeShahnawaz Muhammed, William J. Doll, Xiaodong Deng. 1-10 [doi]
- Intermediaries in E-Inclusion: A Literature ReviewMaddalena Sorrentino, Björn Niehaves. 1-10 [doi]
- Consumer Usage of a Digital Memory Device PrototypeChristopher N. Chapman, Edwin Love, Susan Burgess, Michal Lahav. 1-8 [doi]
- Formality of the Security Specification Process: Benefits Beyond RequirementsJose Romero-Mariona, Hadar Ziv, Debra J. Richardson. 1-6 [doi]
- An Information Foraging Analysis of Note Taking and Note Sharing While Browsing Campaign InformationRavi K. Vatrapu, Scott P. Robertson. 1-10 [doi]
- User Profiles and Personas in Consumer Health TechnologiesCynthia LeRouge, Jiao Ma. 1-10 [doi]
- Research Directions on the Role and Impact of ICT in MicrofinanceRobert J. Kauffman, Frederick J. Riggins. 1-10 [doi]
- Avatar-Based Innovation: Consequences of the Virtual Co-Creation ExperienceThomas Kohler, Johann Fueller, Daniel Stieger, Kurt Matzler. 1-11 [doi]
- Whither Digital Equality?: An Empirical Study of the Democratic DivideTaewoo Nam. 1-10 [doi]
- A Collaboration Case for Learning EmpowermentPei-Hsuan Hsieh. 1-8 [doi]
- Defining Variability in DSS: An Intelligent Method for Knowledge Representation and ValidationAbdelrahman Osman Elfaki, Saravanan Muthaiyah, Ibrahim H. M. Magboul, Somnuk Phon-Amnuaisuk, Chin Kuan Ho. 1-9 [doi]
- Applications of Virtualization to Digital Forensics EducationBrian Hay. 1-7 [doi]
- Business Value Creation through Business Processes Management and Operational Business Intelligence IntegrationOlivera Marjanovic. 1-10 [doi]
- Choices for Smart Grid ImplementationAdrianus G. van Engelen, J. Stephanie Collins. 1-8 [doi]
- Time Dynamics of User Behavior in a Series of Overlapping Electronic MechanismsSeokjoo Andrew Chang. 1-9 [doi]
- Do Online Reviews Reflect a Product s True Perceived Quality? - An Investigation of Online Movie Reviews Across CulturesNoi Sian Koh, Nan Hu, Eric K. Clemons. 1-10 [doi]
- Using Digital Media for Entertainment - The Other Side of the Digital Divide in IndiaSarita Seshagiri, Jan Blom. 1-10 [doi]
- The Cognitive Selection Framework of Knowledge Acquisition Strategy in Virtual CommunitiesJunghwan Kim, Jaeki Song, Donald R. Jones. 1-10 [doi]
- Challenges Facing Enterprise Architects: A South African PerspectiveCheng-Hui Chuang, Johan van Loggerenberg. 1-10 [doi]
- Understanding Individual Level ERP Assimilation: A Multi-Case StudyLuning Liu, Yuqiang Feng, Qing Hu, Xiaojian Huang. 1-10 [doi]
- Challenges in Contemporary Requirements PracticeSean Hansen, Kalle Lyytinen. 1-11 [doi]
- Coordination and Division of Labor in Open Content Communities: The Role of Template Messages in WikipediaAlessandro Rossi, Loris Gaio, Matthijs den Besten, Jean-Michel Dalle. 1-10 [doi]
- Effect of Generator Flow Control Strategies on the Long Term Dynamics of a Model for Power SystemsRonan Fitzmaurice, Andrew Keane, Mark O Malley. 1-8 [doi]
- The Role of Challenge in Information Systems UsePamela J. Schmidt. 1-10 [doi]
- The Value of Distrust in Computer-Based Decision-Making GroupsPaul Benjamin Lowry, Justin Giboney, Ryan Schuetzler, Jacob Richardson, Tom Gregory, John Romney, Bonnie Brinton Anderson. 1-10 [doi]
- A Review of Technologies for Open Innovation: Characteristics and Future TrendsStefan Hrastinski, Niklas Z. Kviselius, Hakan Ozan, Mats Edenius. 1-10 [doi]
- Fine-Grained Inspection for Higher-Assurance Software Security in Open SourceJohn P. McDermott. 1-10 [doi]
- Endpoint Configuration Compliance Monitoring via Virtual Machine IntrospectionDarrell M. Kienzle, Ryan Persaud, Matthew C. Elder. 1-10 [doi]
- Complex Software Systems in Legacy and Modern Environments: A Case Study of the PicklingTools LibraryRichard T. Saunders. 1-10 [doi]
- Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong QuestionGuido Schryen, Eliot Rich. 1-10 [doi]
- A Model of a System for Hierarchical Planning of Structure and Dimension of Internal Global Production NetworksDietrich Dürksen, Wilhelm Dangelmaier. 1-10 [doi]
- Stack and Queue Layouts for Toruses and Extended HypercubesSaïd Bettayeb, Mohammad Hossain Heydari, Linda Morales, Ivan Hal Sudborough. 1-10 [doi]
- The Effects of Organizational Factors on Healthcare IT Adoption Costs: Evidence from New York Nursing HomesAriel Avgar, Lorin M. Hitt, Prasanna Tambe. 1-9 [doi]
- Technology Support for Collaborative Inconsistency Management in Model Driven EngineeringChristian Bartelt, Bjorn Schindler. 1-7 [doi]
- Managing Knowledge in a Changing Scientific Landscape: The Impact of CyberinfrastructureSusan A. Brown, Sherry M. B. Thatcher, Yan Dang. 1-10 [doi]
- Learning Service Experience from the Service Encounter of a Retailing Chain StorefrontFu-ren Lin, Rung-Wei Po, Claudia Valeria Cruz Orellan. 1-10 [doi]
- eGovernment Ontologies: Social Participation in Building and EvolutionAlessia Barbagallo, Antonio De Nicola, Michele Missikoff. 1-10 [doi]
- Research 2.0: A Framework for Qualitative and Quantitative Research in Web 2.0 EnvironmentsDinesh Rathi, Lisa M. Given. 1-10 [doi]
- COD: Iterative Utility Elicitation for Diversified Composite RecommendationsKhalid Alodhaibi, Alexander Brodsky, George A. Mihaila. 1-10 [doi]
- Efficient Inventory Management by Leveraging RFID in Service OrganizationsOzden Engin Cakici, Harry Groenevelt, Abraham Seidmann. 1-11 [doi]
- A Security Review of the Cell Broadband Engine ProcessorJessica Smith, Xiaohui He, Jim Alves-Foss. 1-8 [doi]
- Evaluating Website Quality: Applying Cue Utilization Theory to WebQualPhil Longstreet. 1-7 [doi]
- Bridging the Gap between Enterprise Content Management and Creativity: A Research FrameworkJan vom Brocke, Stefan Seidel, Alexander Simons. 1-10 [doi]