Abstract is missing.
- An Architecture to Support Web-Based Information Extraction Using Domain OntologiesVijayan Sugumaran, Farid Meziane. 1-9 [doi]
- A Framework for Ontology EvaluationJinie Pak, Lina Zhou. 10-18 [doi]
- An Idealet-Centric Scheme for Large Scale Open Innovation SystemsMatti Hämäläinen, Qing Li, Zhangxi Lin, Alin Tomoiaga, Jia Wang. 19-29 [doi]
- The Effects of Sense of Presence, Sense of Belonging, and Cognitive Absorption on Satisfaction and User Loyalty toward an Immersive 3D Virtual WorldDan J. Kim, Dongsong Zhang. 30-43 [doi]
- Analyzing Market Interactions in a Multi-agent Supply Chain EnvironmentWilliam Groves, John Collins, Wolfgang Ketter, Maria L. Gini. 44-58 [doi]
- Distinct Impact of Information Access Patterns on Supplier's Non-contractible Investments and Adaptation for Supply Chain AgilityJeffrey C. F. Tai, Eric T. G. Wang, Her-Sen Doong, Kai Wang. 59-66 [doi]
- Drivers for RFID ImplementationsFrank G. Goethals, G. Yazgi Tütüncü, Chieh-Yu Lin. 67-79 [doi]
- Managing Supply Uncertainty with an Information MarketZhiling Guo, Fang Fang, Andrew B. Whinston. 80-95 [doi]
- Remanufacturing with RFID Item-Level InformationWei Zhou, Selwyn Piramuthu. 96-104 [doi]
- Producer-Intermediary Relationships in the Long TailRobert J. Kauffman, T. S. Raghu, Matthew Sopha. 105-108 [doi]
- Avoiding Demand Amplification Phenomenon via Hi-tech Application: A What-If Supply Chain AnalysisElena Ciancimino, Salvatore Cannella. 109-121 [doi]
- The Role of SOA for BPO Intention - Proposing a Research ModelDaniel Beimborn, Nils Joachim, Frank Schlosser. 122-136 [doi]
- Analyzing Processes behind Web Service Standards DevelopmentKarthikeyan Umapathy, Sandeep Purao, John W. Bagby. 137-146 [doi]
- A Model-Based Software Architecture to Support Decentral Product Development ProcessesPatrick D. Stiefel, Jörg P. Müller. 147-159 [doi]
- The Value of IT-Enabled Business Process Standardization from the Real Options PerspectiveQizhi Dai, Robert J. Kauffman, Bin Wang. 160-165 [doi]
- Privacy and E-Authentication: The Dangers of Self-disclosure in Social NetworksDivakaran Liginlal, Lara Khansa. 166-176 [doi]
- An Exploration of the Search for Information SecurityJingguo Wang, Nan Xiao, H. Raghav Rao. 177-180 [doi]
- On the Two Factors Affecting Information Systems Success in the Extreme Event ContextInsu Park, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya. 181-185 [doi]
- Mobile Application Market: A Mobile Network Operators' PerspectiveAdrian Holzer, Jan Ondrus. 186-191 [doi]
- The Impact of Gender Differences on Response Strategy in e-NegotiationWan-Jung Lin, Chia-Hua Hu, Hsiangchu Lai. 192-205 [doi]
- Determinants of Customer Loyalty for Social Networking SitesRui Gu, Lih-Bin Oh, Kanliang Wang. 206-212 [doi]
- Experimental Evaluation of Declining Buyout Price Models for Online AuctionsRoumen Vragov, Richard D. Shang, Karl Reiner Lang. 213-225 [doi]
- Electronic Commerce On-Site Search Services: A State of the Art ReviewNan Li, Peter Hitchcock, James Blustein, Michael Bliemel. 226-234 [doi]
- A Framework for CRM E-Services: From Customer Value PerspectiveWei-Lun Chang, Yu-Xin Wu. 235-242 [doi]
- An Integrated Approach to Managing IT PortfolioYu-Ju Tu, Michael J. Shaw. 243-253 [doi]
- The Effect of Positive Quadrant Dependence between Projects on Portfolio ValueJohn C. Burke, Michael J. Shaw. 254-268 [doi]
- Assessing the Effect of External Pressure in Inter-organizational IS Adoption - Case Electronic InvoicingEsko Penttinen, Virpi Kristiina Tuunainen. 269-278 [doi]
- Open Source versus Proprietary Software: A Case of Fully Covered MarketYipeng Liu, Hsing Kenneth Cheng. 279-288 [doi]
- When Is RFID Perceived as a Radical Technology?Aditya Sharma, Dominic Thomas, Benn R. Konsynski. 289-297 [doi]
- My How You've Grown! eProcurement in the Post-Dot-Bomb EraTim S. McLaren, Catherine A. Middleton, Xueying (Ci Ci) Fang. 298-309 [doi]