Abstract is missing.
- Does Privacy Still Matter in the Era of Web 2.0? A Qualitative Study of User Behavior towards Online Social Networking ActivitiesQing Hu, Shuo Ma. 2 [doi]
- Critical Success Factors for the Transformation Process in Enterprise System ImplementationSanjay Mathrani, Dennis Viehland. 13 [doi]
- Deriving Value from End-To-End (E2E) Solutions in A Developing Country: A Study of Loan Processing in BangladeshAl Nahian Riyadh, Patrick Finnegan. 14 [doi]
- Relationship and Contract Issues of IT Outsourcing - Descriptive Case Studies in China RegionsQi Cong, Patrick Y. K. Chau. 15 [doi]
- An Exploratory Study of the Gap between Client Expectations and Client Perceived Performance of the Delivered Information SystemZhixing Zheng, Benjamin Yen, Minyi Huang. 16 [doi]
- Understanding eGovernment Failure: An Actor-Network Analysis of Thailand's Smart ID Card ProjectPanom Gunawong, Ping Gao. 17 [doi]
- IT Project Portfolio Management - A Matter of Organizational Culture?Michael Prifling. 18 [doi]
- Persistence Influence for IT Outsourcing: Small and Medium Firms Perspectives of Their Application Service ProvidersAleck C. H. Lin, James J. Jiang, Gary Klein. 19 [doi]
- Knowledge Sharing and Management for Better Organisational Outcomes: An Indian StudyRaj Gururajan, Heng-Sheng Tsai, Abdul Hafeez-Baig, Meng-Kuan Lin. 20 [doi]
- Knowledge Asset and Inter-Organizational Relationship in the Performance of Australian Beef Supply ChainMohammad Nasir Uddin, Mohammed Quaddus, Nazrul Islam. 21 [doi]
- Antecedents and Impact of Knowledge Management Capability in Public OrganizationsLoo Geok Pee, Atreyi Kankanhalli, L. L. Ong, M. K. Vu. 22 [doi]
- Use Text Mining Approach to Generate the Draft of Indictment for ProsecutorChuan-hsi Chen, Yan-Ping Jeffery Chi. 23 [doi]
- Applying the Modified Delphi Method to Identify the Taiwanese Electronic Health Record Systems Evaluation Framework and InstrumentYung-Yu Su, Khin Than Win, Tieh-Chi Chung. 24 [doi]
- Manifesto for E-Health SuccessWilfred V. Huang, Juergen Seitz, Nilmini Wickramasinghe. 25 [doi]
- Smokers' Characteristics and Cluster Based Quitting Rule Discovery Model for Enhancement of Government's Tobacco Control SystemsMd. Shamsul Huda, John Yearwood, Ron Borland. 26 [doi]
- A Case Study of Healthcare Information Technology Implementation: Agile-Innovative Capability Development ProcessSayyen Teoh, Shun Cai, Brian J. Corbitt. 27 [doi]
- Integration of WiMAX and WiFi Services: Bandwidth Sharing and Channel CollaborationYung-Ming Li, Jhih-Hua Jhang-Li. 28 [doi]
- Delayed Product IntroductionQiu-Hong Wang, Kai Lung Hui. 29 [doi]
- Predict Market Share with Users' Online Activities Data: An Initial Study on Market Share and Search Index of Mobile PhoneKaiquan Xu, Jin Xu, Long Liu, Jimmy Ren, Wei Wang, Stephen Shaoyi Liao, Yuxia Song. 30 [doi]
- Online Music Ranking Service: Ranking Mechanism Based on Popularity and Slot EffectByungjoon Yoo, Kwansoo Kim. 31 [doi]
- Information System Capabilities as A Driving Force in Enhancing Organizational Performance: An Empirical StudyRui Bi, Kosmas X. Smyrnios, Booi Kam. 32 [doi]
- Effects of Product Learning Aids on Breadth and Depth of Recall: An Empirical InvestigationMeng-Xiang Li, Chuan-Hoo Tan, Kwok Kee Wei, Choon-Ling Sia, Hock-Hai Teo, Chee Wei Phang. 33 [doi]
- Understanding Real-Virtual Dynamics of Human Behavior from the Action Stream PerspectiveMasao Kakihara. 34 [doi]
- An Affective Model for Unauthorized Sharing of SoftwareSamuel Shu Kin Kwan, Kar Yan Tam. 35 [doi]
- Information Systems Research: Aligning to Industry Challenges in Management of Regulatory ComplianceNorris Syed Abdullah, Shazia Wasim Sadiq, Marta Indulska. 36 [doi]
- Measuring the Relative Efficiency of IC Design Firms: A Directional Distance Functions and Meta-Frontier ApproachBo Hsiao, Ching-Chin Chern, Ming-Miin Yu, Ching-Ren Chiu. 37 [doi]
- Re-Conceptualising IS Function's Support Performance: A Preliminary ModelAhmad A. Rabaa'i, Guy G. Gable, Wasana Bandara, Erwin Fielt. 38 [doi]
- A Comparison of Visual Modeling Notations for Web Services ChoreographyW. L. Yeung. 39 [doi]
- Combining Coauthorship Network and Content for Literature RecommendationSan-Yih Hwang, Chih-Ping Wei, Yu-Chin Huang, Yun Tang. 40 [doi]
- Stiff Structures for Loose Folks - A Platform for an Open Innovation CommunityMichael Reinhardt, Jochen Hetzenecker, Marc René Friess, Michael Amberg. 41 [doi]
- An Exploratory Study on the Impact of Trust on Different E-Payment Gateways: Octopus Card Vs. Credit CardKevin K. W. Ho, Eric Wing Kuen See-To. 42 [doi]
- Embedding Information Security Culture Emerging Concerns and ChallengesJoo Soon Lim, Atif Ahmad, Shanton Chang, Sean B. Maynard. 43 [doi]
- Model-Based Management - Design and Experimental EvaluationGunnar Dietz, Martin Juhrisch. 44 [doi]
- Optimal Investment in Information Security: A Business Value ApproachC. Derrick Huang. 45 [doi]
- Seeking the "Green" in "Green IS": A Spirit, Practice and Impact PerspectiveMohamad Taha Ijab, Alemayehu Molla, Asmare Emerie Kassahun, Say Yen Teoh. 46 [doi]
- An Explorative Study for Business Models for SustainabilityKyoung Jun Lee, Federico Casalegno. 47 [doi]
- The Challenge of Energy Management - Status-Quo and Perspectives for Reference ModelsHannes Schlieter, Martin Juhrisch, Stephan Niggemann. 48 [doi]
- Understanding the Role of Knowledge Co-Production between Users and Developers in ISD Project: An Intellectual Capital PerspectiveJack Shih-Chieh Hsu, Chiao-Fang Lo, Tung-Ching Lin, Kuang-Ting Cheng. 49 [doi]
- Why Do They Return Help? Examining the Motives of Reciprocity in Online CommunitiesHua Ye, Atreyi Kankanhalli, Yuanyue Feng. 50 [doi]
- Learners' Perceived Effectiveness of Wikis for Team ProjectsElizabeth Koh, John Lim. 51 [doi]
- Understanding Information Systems Continuance Intention: A Five-Factor Model of Personality PerspectiveMichael Yu-Ching Lin, Chorng-Shyong Ong. 52 [doi]
- CRM Strategies for A Small-Sized Online Shopping Mall Based on Association Rules and Sequential PatternsBeom-Soo Shim, Yong-Moo Suh. 53 [doi]
- An Effective Clustering Approach to Stock Market PredictionAnthony J. T. Lee, Ming-Chih Lin, Rung-Tai Kao, Kuo-Tay Chen. 54 [doi]
- Social-Role Identity Salience and User Participation in Social NetworksXiaoquan (Michael) Zhang, Chong (Alex) Wang. 55 [doi]
- Implementing Citizen-Centric Strategic IS Projects: An Indian Case StudyM. N. Ravishankar. 56 [doi]
- Exploring the Path to ERP Implementation Success: In Retrospect after RolloutHaiqing Bai, Ji-Ye Mao. 57 [doi]
- Why ERP Post-Implementation Fails? Lessons Learned from A Failure Case in ChinaGuo Chao Peng, Miguel Baptista Nunes. 58 [doi]
- Measuring the Performance of Ecommerce WebsitesAhmad Ghandour, George Benwell, Kenneth Deans. 59 [doi]
- The Success Factors for App Store-Like Platform Businesses from the Perspective of Third-Party Developers: An Empirical Study Based on A Dual Model FrameworkHyung Jin Kim, Inchan Kim, Ho Geun Lee. 60 [doi]
- Examining Online Switching Costs over Search Product and Experience Product ContextsHee-Woong Kim, Sujin Choi, Ki-Ho Kim. 61 [doi]
- A Comparative Study of Two Combinatorial Reverse Auction ModelsFu-Shiung Hsieh, Chung-Wei Huang. 62 [doi]
- Exploring Online Repeat Purchase Intentions: The Role of HabitChao-Min Chiu, Meng Hsiang Hsu, Hsiangchu Lai, Chun-Ming Chang. 63 [doi]
- Introducing Health Information Systems to Aged Care in VietnamLeMai Nguyen, The Hue Nguyen. 64 [doi]
- Mobile Application Development for Senior CitizensJing Gao, Andy Koronios. 65 [doi]
- Understanding Hospital Information Systems Adoption in ChinaFei Peng, Sherah Kurnia. 66 [doi]
- E-Healthcare and Knowledge-Intensive Website: An Empirical Study of National Cancer Center (NCC), South KoreaChulmo Koo, Yulia Wati. 67 [doi]
- A Systematic Framework of IT-Enabled Service Research towards Formulating Research Questions in IS RealmYonggui Wang, Dongming Xu, Fiona H. Rohde. 68 [doi]
- Competing in the Business Process Outsourcing Industry: A Call Center Case StudyYiching Liou, Minder Chen. 69 [doi]
- Hawk-Dove Game Based Interactive Design to Manage Customer ExpectationYen-Hao Hsieh, Soe-Tsyr Yuan, Siao-Jhen Liou. 70 [doi]
- Developing and Validating Service Innovation ReadinessWenkai Wang, HsuanYu Sheila Hsu, HsiuJu Rebecca Yen, Hung-Chang Chiu, Chih-Ping Wei. 71 [doi]
- Exploring Leadership Styles in Software Development ProjectsMichael Prifling. 72 [doi]
- Mapping Improvements Achievable through the Adoption of IT GovernanceMauricio Marrone, Lutz M. Kolbe. 73 [doi]
- The Construction of Firm's IT Capability and Its Impact on IT Assimilation: An Empirical Investigation in ChinaGuopeng Yin, Bo Yang. 74 [doi]
- Corporate Governance of IT: A Case Study in An Australian Government DepartmentCarla Wilkin, John Campbell. 75 [doi]
- Examining Gender Effects in Technology Acceptance by Arabian Workers: A Survey StudyHan-fen Hu, Said S. Al-Gahtani, Paul Jen-Hwa Hu. 76 [doi]
- A Study on Taiwan Consumers' Adoption of Online Financial ServicesChih-Chia Chang, Po-Chien Chang. 77 [doi]
- Information Technology Innovation Spirals in Cross-Cultural Collaboration: A Case of Software Localization in AfricaCarl Lawrence, Max Erik Rohde. 78 [doi]
- Executing Management Control through Decision TechnologyAngela Liew, Chris Akroyd. 79 [doi]
- Inter-Organizational Information Systems Visibility in Buyer-Supplier Relationships: Buyer and Supplier PerspectivesKyung-kyu Kim, Sung Yul Ryoo, Na Yeun Ha. 80 [doi]
- Value Creation in Multi-Level Networks: A Development of Business Model TheoryDuncan R. Shaw. 81 [doi]
- Exploring Risks in Smart City Infrastructure Projects: Municipal Broadband InitiativesAngsana A. Techatassanasoontorn, Shuguang Suo. 82 [doi]
- Key Influences of Cyberbullying for University StudentsAngela Ting Zhang, Lesley Pek Wee Land, Geoffrey Dick. 83 [doi]
- IT-Enabled Management Control Systems Transformations: Lessons Learned from SaveComTzu-Chuan Chou, Pu-Dong Weng, Tsung-Cheng Wu. 84 [doi]
- Continuance Intention of Blog Users: The Impact of Perceived Enjoyment and User InvolvementWen-Lung Shiau, Margaret Meiling Luo. 85 [doi]
- An Empirical Analysis of Virtual Goods Pricing Strategies in Virtual WorldsSulin Ba, Dan Ke, Jan Stallaert, Zhongju Zhang. 86 [doi]
- Exploring Consumers' Coping Behaviors in Online Double Deviation Scenarios: From Power PerspectiveYu-Hui Fang, Chao-Min Chiu, Ting-Peng Liang. 87 [doi]
- Evaluating Government Portal Websites in ChinaYuan Liu, Xi Chen, Xiaoyi Wang. 88 [doi]
- Examining Effects of Technology-Assisted Learning on Learning Effectiveness and Satisfaction: A Quasi-Experimental StudyPaul Jen-Hwa Hu, Wendy Hui. 89 [doi]
- Designing for Enjoyment and Informal Learning: A Study in A Museum ContextAleck C. H. Lin, Walter D. Fernández, Shirley Gregor. 90 [doi]
- Designing Effective Decision Support Using Decisional GuidanceAlison Parkes. 91 [doi]
- Understanding Twitter Usage: What Drive People Continue to TweetIvy L. B. Liu, Christy M. K. Cheung, Matthew K. O. Lee. 92 [doi]
- Perceived Interactivity: Exploring Factors Affecting Micro-Blogging Service Satisfaction and Continuance IntentionLing Zhao, Yaobin Lu. 93 [doi]
- Behavior Participation in Virtual Worlds: A Triandis Model PerspectiveHonglei Li, Kun Chang Lee. 94 [doi]
- Patent Classification Using Ontology-Based Patent Network AnalysisMeng-Jung Shih, Duen-Ren Liu. 95 [doi]
- Understanding Collaborations in Virtual WorldShalini Chandra, Yin Leng Theng, May O. Lwin, Schubert Shou-Boon Foo. 96 [doi]
- Adaptive Enterprises: Interweaving People Process and TechnologyGabrielle Peko, David Sundaram. 97 [doi]
- Social Behavior and Network AnalysisLee Hu, Ogan Pekin. 98 [doi]
- Understanding Cross-Sector Collaboration in E-Government Development: Theoretical Consideration Based on Extended Bryson's FrameworkZhikui Lu, Nan Zhang, Qingguo Meng. 99 [doi]
- Moderating Effects of Extroversion and Neuroticism on Sleep Deprivation and CyberloafingSatish Krishnan, Vivien K. G. Lim. 100 [doi]
- Loyalty of Web 2.0 Sites: The Role of Sense of BelongingYi Maggie Guo, Chung-Tzer Liu. 101 [doi]
- Why People Stick to Play Social Network Site Based Entertainment Applications: Design Factors and Flow Theory PerspectiveYi Wu, Zheng Wang, Klarissa Chang, Yunjie Xu. 102 [doi]
- Understanding Satisfaction of Knowledge Contributors in Transactional Virtual Communities from A Cost-Benefit Tradeoff PerspectiveYongqiang Sun, Yulin Fang, Kai H. Lim, Xiaojian Chen. 103 [doi]
- A Knowledge-Based Risk Advisor Model for Chronic Complications of DiabetesMohsen Sangi, Khin Than Win, John Fulcher. 104 [doi]
- Making Sense of Corporate Tour-Guide Bloggers' Networking Behavior: A Social Network PerspectiveYu Shirley Ou Yang, Jia-Li Hsu, Carol W. Hsu. 105 [doi]
- Post-Merger IT Integration: A Comparison of Two Case StudiesPeter B. Seddon, Peter Reynolds, Leslie P. Willcocks. 106 [doi]
- Determinants of Successful ICT Risk Management in Thai OrganisationsSiridech Kumsuprom, Brian J. Corbitt, Siddhi Pittayachawan, Phoommhiphat Mingmalairaks. 107 [doi]
- A Methodology for Evaluating Whether Web Sites Support Their Organizational Critical ActivitiesWei-Hsi Hung, Robert John McQueen, David C. Yen. 108 [doi]
- The Moderating Effect of A Chief Information Officer's Competence on IT Investment and Firm PerformanceZhen Shao, Yuqiang Feng, Jyoti Choudrie, Yang Liu. 109 [doi]
- Multiple Perspectives Technology Appropriation: Analysis of Open Source Software Implementation FailureNor Zairah Ab. Rahim, Rose Alinda Alias, Jennie Carroll. 110 [doi]
- E-Procurement System Adoption under Supply Chain Migration: A Case Study of Taiwanese Notebook CompanyShin-Horng Chen. 111 [doi]
- An Empirical Study of the Impact of Trial Experiences on the Continued Usage of Mobile NewspapersTing Wang, Lih-Bin Oh, Kanliang Wang, Bo Zhang. 112 [doi]
- How Personality Affects Continuance Intention: An Empirical Investigation of Instant MessagingWei Wang. 113 [doi]
- Emotional Trust and Cognitive Distrust: From A Cognitive-Affective Personality System Theory PerspectiveJung Lee, Jae-Nam Lee, Bernard C. Y. Tan. 114 [doi]
- Factors Influencing Negotiation in the Sourcing Process between Partners in E-Procurement: A Focus on ActorsNoraizah Abu Bakar, Konrad J. Peszynski. 115 [doi]
- Understanding the Antecedents of SCM Process Performance: The Perspective of IT-Enabled ResourcesShih-Wei Chou, Pi-Hui Hsieh. 116 [doi]
- Formal Models of Virtual Enterprise Architecture: Motivations and ApproachesAmit Goel, Heinz Schmidt, David R. Gilbert. 117 [doi]
- Cost-Sensitive Learning for Recurrence Prediction of Breast CancerTsang-Hsiang Cheng, Ci-Wei Lan, Chih-Ping Wei, Henry Chang. 118 [doi]
- Supporting Acute Appendicitis Diagnosis: A Pre-Clustering-Based Classification TechniqueYen-Hsien Lee, Paul Jen-Hwa Hu, Wei-Yao Chuang, Tsang-Hsiang Cheng, Yi-Cheng Ku. 119 [doi]
- Business Value of Information Technology in A Network EnvironmentYucong Liu, Andrew N. K. Chen. 120 [doi]
- State of IT Artifacts: An Analysis of ICIS 2009 Research PapersPing Zhang 0002, Michael J. Scialdone. 121 [doi]
- Towards Improving Enterprise Architecture Decision-Making through Service-Dominant LogicCheng-Hui Chuang, Johan van Loggerenberg, Hugo Lotriet. 122 [doi]
- Color Imagery for Destination Recommendation in Regional TourismChun-Ya Yang, Soe-Tsyr Yuan. 123 [doi]
- Service Oriented Architecture (SOA): Implications for Australian University Information Systems CurriculumLeon Kok Yang Teo, David Wee Teh, Brian J. Corbitt. 124 [doi]
- The Impact of the Software-as-a-Service Concept on the Underlying Software and Service Development ProcessesSebastian Stuckenberg, Armin Heinzl. 125 [doi]
- Humanizing E-Mail Processing for Personal Information Management with Semantic Web and Speech Act TheoryCheng-Hao Chen, Frank S. C. Tseng. 126 [doi]
- Managing A Paradox-Design Principles for Executives' IT SupportJörg H. Mayer, Frederik Marx. 127 [doi]
- IT and the Environment: An Application in Supply Chain ManagementLee Hu, Daniel Zeng. 128 [doi]
- Solving the Information Overload Problem: The Role of Unconscious Thought in Enhancing Online Purchasing DecisionsJie Gao, Cheng Zhang, Ke Wang, Sulin Ba. 129 [doi]
- The Effects of Ambiguity Tolerance and User Discretion on Spatial Task Performance and Display ChoicesRussell Grant, Milton Shen, C. Melody Carswell, Radhika Santhanam. 130 [doi]
- The Effects of Location-Based Mobile Personalization on Users' BehaviorShuk Ying Ho. 131 [doi]
- Why Individuals Commit Computer Offences in Organizations: Investigating the Roles of Rational Choice, Self-Control, and DeterrenceQing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling. 132 [doi]
- Ontology-Based Privacy Protection in Location CommerceSeng-cho Timothy Chou, Timon C. Du, Chia-ho Yu. 133 [doi]
- Privacy: An Ontological ProblemShan Chen, Mary-Anne Williams. 134 [doi]
- The Use of Online Social Networking for Higher Education from An Activity Theory PerspectiveSuraya Hamid, Jenny Waycott, Sherah Kurnia, Shanton Chang. 135 [doi]
- Exploiting Emotions in Social Interactions to Detect Online Social CommunitiesXin Li, Hsinchun Chen, Su Li. 136 [doi]
- A Study of Machine Learning Models in Epidemic Surveillance: Using the Query Logs of Search EnginesZe-Han Fang, Jian-Shuin Tzeng, Chien Chin Chen, Tzu-Chuan Chou. 137 [doi]
- A Contingent View of the Internet-Enabled Supply Chain Integration and Firm PerformanceHefu Liu, Weiling Ke, Kwok Kee Wei, Jibao Gu, Huaping Chen. 138 [doi]
- The Social Values of Wireless Technology in the Institutional ContextWenShin Chen, David Bennett. 139 [doi]
- Information Systems Integration Mechanisms within Supply Chain Agility in the Chinese Automotive IndustryYi Wu, Margi Levy, Martin Liu. 140 [doi]
- Financial Inter-Organizational System Diffusion in Taiwan's Fund Management Industry: A Social Shaping of Technology PerspectiveYu-Tzu Lin, Carol Hsu. 141 [doi]
- The Determinants of Knowledge Sharing Intention in Professional Virtual Communities: An Integrative ModelShin-Yuan Hung, Hui-Min Lai, Yu-Che Chou. 142 [doi]
- Delivering Knowledge across Boundaries: A Process Model of Knowledge Delivery in Offshoring ProjectsYuanyue Feng, Hua Ye, Shan L. Pan. 143 [doi]
- A Personalized Researcher Recommendation Approach in Academic Contexts: Combining Social Networks and Semantic Concepts AnalysisYunhong Xu, Jinxing Hao, Raymond Y. K. Lau, Jian Ma, Wei Xu, Dingtao Zhao. 144 [doi]
- Business Intelligence in the Cloud?Henning Baars, Hans-Georg Kemper. 145 [doi]
- The Impact of Two-Factor Authentication Technology on the Adoption of Internet BankingJoo Suk Han, Sherah Kurnia, Fei Peng. 146 [doi]
- Effects of Aggregate Rating on eWOM Acceptance: An Attribution Theory PerspectiveLingyun Qiu, Dong Li. 147 [doi]
- Is Australia Really the Lucky Country? Price Discrimination in Digital DistributionAlex Richardson. 148 [doi]
- Electronic Word-Of-Mouth Contribution Continuance in Online Opinion Platforms: The Role of Multiple CommitmentsXiaoling Jin, Li Xiang, Matthew K. O. Lee, Christy M. K. Cheung, Zhongyun Zhou, Ding-Tao Zhao. 149 [doi]
- Explaining E-Tailers' Source of Competitiveness: An Integrative FrameworkYouwei Wang, Shan Wang, Zhuqing Yang, Hong Ling. 150 [doi]
- The State of Electronic Word-Of-Mouth Research: A Literature AnalysisChristy M. K. Cheung, Dimple R. Thadani. 151 [doi]
- Website Blocking Across Ten Countries: A SnapshotAnuradha Mathrani, Massoud Alipour. 152 [doi]
- The Misalignment between Packaged Enterprise Systems and Chinese Context: A Context Study of Packaged ES Adoption in ChinaLan Cao. 153 [doi]
- Evolution of Offshore Software Outsourcing in East Asian Countries: From Cost to RelationSeungkwon Jang, Heejin Lee, Kyungmin Ko, Dasom Kim. 154 [doi]
- The Effects of Website Personalization on User Intention to Return through Cognitive Beliefs and Affective ReactionsMay Wang, Benjamin Yen. 155 [doi]
- IT/IS as the Secret Scroll of Kung Fu: A Functionalist Explanation of A Technical Structure for Information Systems DesignHsiao-Chi Wu, Yu-Fen Chen, Ching-Cha Hsieh. 156 [doi]
- Retailer Acceptance of Consumer Led Group Buying from A Stakeholder Influence Strategy PerspectiveMinyi Huang, Benjamin Yen. 157 [doi]
- The Literature Review of Technology Acceptance Model: A Study of the Bibliometric DistributionsShu-Hsun Chang, Chien-Hsiang Chou, Jiann-Min Yang. 158 [doi]
- Self-Regulation, Individual Characteristics and CyberloafingSmrithi Prasad, Vivien K. G. Lim, Don J. Q. Chen. 159 [doi]
- A Study of the Effect of Anger on Immoral Judgment of Internet Privacy InvasionFeng-Yang Kuo, Cathy S. Lin, Ho-I. Sun, Ming-Han Lee, Yu-Feng Huang. 160 [doi]
- Exploring An Individual's Intention to Use Blogs: The Roles of Social, Motivational and Individual FactorsChen-Ya Wang, Seng-cho Timothy Chou, Hsia-Ching Chang. 161 [doi]
- Social Goals in Communication Media ChoiceYunjie (Calvin) Xu, Shun Cai. 162 [doi]
- A Empirically Validated Framework for Limiting Free-Riding in P2P Networks through the Use of Social Network InformationFatmawati Zifa Zaukani, Jörn Altmann. 163 [doi]
- Understanding the Bloggers' Continuance Usage: Integrating Flow into the Expectation-Confirmation Theory Information System ModelChia-Hui Shih, Wen-Lung Shiau, Li-Chun Huang. 164 [doi]
- The Impact of Board Structure on Information Security BreachesTawei Wang, Carol Hsu. 165 [doi]
- Pair-Wise Privilege Control for Cross-Domain Private Data SharingJian Zhong, Peter Bertók, Zahir Tari. 166 [doi]
- Near-Optimal Defense Strategies against DDoS Attacks Based upon Packet Filtering and Blocking Enabled by Packet MarkingFrank Yeong-Sung Lin, Pei-yu Chen, Chun-Wei FanChiang. 167 [doi]
- Emerging Trends of ICT Adoption in Innovation Contexts: A Network FrameworkGiselle Rampersad, Indrit Troshani. 168 [doi]
- A Critical Analysis of E-Market Adoption in Australian Small and Medium Sized EnterprisesXiaoxia Duan, Hepu Deng, Brian J. Corbitt. 169 [doi]
- Developing Learning System Continuance with Teachers and Students: Case Study of the Echo360 Lecture Capturing SystemKai-Pan Mark, Douglas R. Vogel, Eva Y. W. Wong. 170 [doi]
- Impact of External Environmental Factors on RFID Adoption in Australian Livestock Industry: An Exploratory StudyMohammad Alamgir Hossain, Mohammed Quaddus. 171 [doi]
- Implementation of the Tourism Area Life Cycle Model as An Advisory Decision Support SystemPutsadee Pornphol, G. Michael McGrath. 172 [doi]
- Modeling Government Credit Information Systems Diffusion in China: A System Dynamics ApproachYinbin Liu, Hongbo Li, Stella Wen Tian. 173 [doi]
- Intelligent Agents for Negotiation and Recommendation in Mass CustomizationJiaqi Yan, Yani Shi, Sherry Xiaoyun Sun, Huaiqing Wang, Zhongsheng Hua. 174 [doi]
- Business Modeling with the Support of Multiple Notations in Requirements EngineeringMoshiur Bhuiyan, Aneesh Krishna. 175 [doi]
- Critical Issues in Assimilation of Healthcare Information SystemsHidayah Sulaiman, Nilmini Wickramasinghe. 176 [doi]
- Efficacy and Feasibility of A Mobile ECG Decision Support System - A Preliminary Conceptual ModelMeng-Kuan Lin, Joseph M. Mula, Raj Gururajan, John W. Leis, Abdul Hafeez-Baig. 177 [doi]
- Implementing Patient Accessible Health Information Site for Diabetes ManagementKhin Than Win. 178 [doi]
- Possibility of the Introduction of Telemedicine in Rural Villages in Vietnam - From the Introduction of Medical Information System to the Vertical Integration-Type Medicine ManagementJitsuzo Katsumata, Tetsuya Toma, Tetsuro Ogi. 179 [doi]
- World-Class IS-Enabled Business Innovation: A Case Study of IS Leadership, Strategy & GovernanceSteve Elliot, Mary-Anne Williams. 180 [doi]
- Information System Development Team Collaboration AntecedentsKuo-Chung Chang, Fu-Cheng Yu. 181 [doi]
- Replacing Project Manager: Reasons of Replacement Interpreted through the Activity TheoryTero Vartiainen, Heli Aramo-Immonen, Kirsi Liikamaa. 182 [doi]
- The Deficiency of IT Capability of A Firm Vis-À-Vis Competition and IT Outsourcing Decisions: A Two Stage DEA and PLS AnalysisJahyun Goo. 183 [doi]
- Data Mining: A Clustering ApplicationLin Chang, Xue Bai. 184 [doi]
- Unraveling the Relationship between Co-Authorship and Research InterestJiejia Lin, Yunhong Xu, Shujin Cao. 185 [doi]
- Views and Constructs for Knowledge Management in India - A Confirmatory Factor AnalysisAbdul Hafeez-Baig, Raj Gururajan, Heng-Sheng Tsai. 186 [doi]
- A Practical Risk Management Framework for Intelligent Information SystemsXun Wang, Mary-Anne Williams. 187 [doi]
- Study on Knowledge Transfer in Knowledge Process Outsourcing (KPO)Weijun Wang, Chunmei Gan. 188 [doi]
- Enhancing the Delivery of Library's Services through the Implementation of An Emerging Information Technology: A Process FrameworkShamshul Bahri. 189 [doi]
- Sourcing Business and Software ServicesErwin Fielt, Axel Korthaus, Thomas Kohlborn, Michael Rosemann. 190 [doi]
- Supporting Service Management with Service Encounters Analysis: A Case on Call Centre Outsourcing OperationsRong-Rong Chen, Yung-Hsiu Lin, Ta-Wei Shih, Her-Kun Chang. 191 [doi]
- The Role of Organizational Motivations in Information Systems ImplementationMd. Mahbubur Rahim, Graeme G. Shanks, Ilona Jagielska. 192 [doi]
- Does Distance Matter? An IT ApplicationSherry Sun, Lei Chen. 193 [doi]
- The Influence of Organisational Culture across the Stages of Enterprise System ImplementationsLindsay H. Stuart, Annette M. Mills, Ulrich Remus. 194 [doi]
- Assessing Government to Business Services Performance: The Role of Human and Organizational FactorsHusnayati Hussin, Erne Suzila Kassim. 195 [doi]
- Towards A Scale Free Network Approach to Study Organizational Communication NetworkMohammed Shahadat Uddin, Shahriar Tanvir Hasan Murshed, Liaquat Hossain. 196 [doi]
- Drift and Good-Enough Control in A Complex Information Systems InfrastructureJenny Leonard, Jennie Carroll. 197 [doi]
- The Study of Patent Prior Art Retrieval Using Claim Structure and Link AnalysisFu-ren Lin, Feng-mei Huang. 198 [doi]
- The Effects of News Sentiment and Coverage on Credit Rating AnalysisFeng-Tse Tsai, Hsin-Min Lu, Mao-Wei Hung. 199 [doi]
- Discrepancy between Actual Self and Virtual Self: Theoretical Extensions, Measurement and Relation to Contribution in Virtual CommunitiesAyoung Suh, Kyung-shik Shin. 200 [doi]
- Automatic Learning of A Supervised Classifier for Patent Prior Art RetrievalHung-Chen Chen, Yu-Kai Lin, Chih-Ping Wei, Chin-Sheng Yang. 201 [doi]
- "Betting on the House": Value Creation by Insourcing at Crown LimitedPeter Reynolds, Peter B. Seddon. 202 [doi]