default search action
Information Systems Frontiers, Volume 10
Volume 10, Number 1, March 2008
- Ram Ramesh, H. Raghav Rao:
Editorial. 1-2 - Janice C. Sipior, Burke T. Ward:
Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation. 3-18 - Ji Ma, Mehmet A. Orgun:
Formalising theories of trust for authentication protocols. 19-32 - Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham:
A scalable multi-level feature extraction technique to detect malicious executables. 33-45 - Clyde W. Holsapple, Jiming Wu:
Building effective online game websites with knowledge-based trust. 47-60 - T. S. Raghu, Wonseok Woo, S. B. Mohan, H. Raghav Rao:
Market reaction to patent infringement litigations in the information technology industry. 61-75 - Hemant K. Sabat:
Spectrum acquisition strategies adopted by wireless carriers in the USA. 77-102 - Borka Jerman-Blazic:
Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading. 103-110 - Cevriye Gencer, Emel Kizilkaya Aydogan, Coskun Celik:
A decision support system for locating VHF/UHF radio jammer systems on the terrain. 111-124
Volume 10, Number 2, April 2008
- Rudy Hirschheim, Jens Dibbern, Armin Heinzl:
Foreword to the special issue on IS sourcing. 125-127 - Benoit Aubert, Guillaume Beaurivage, Anne-Marie Croteau, Suzanne Rivard:
Firm strategic profile and IT outsourcing. 129-143 - Jae-Nam Lee, Minh Q. Huynh, Rudy Hirschheim:
An integrative model of trust on IT outsourcing: Examining a bilateral perspective. 145-163 - Julie Fisher, Rudy Hirschheim, Robert Jacobs:
Understanding the outsourcing learning curve: A longitudinal analysis of a large Australian company. 165-178 - Tim Goles, Stephen Hawk, Kate M. Kaiser:
Information technology workforce skills: The software and IT services provider perspective. 179-194 - Detmar W. Straub, Peter Weill, Kathy S. Schwaig:
Strategic dependence on the IT resource and outsourcing: A test of the strategic control model. 195-210 - Kim Wüllenweber, Daniel Beimborn, Tim Weitzel, Wolfgang König:
The impact of process standardization on business process outsourcing success. 211-224 - Mary C. Lacity, Vidya V. Iyer, Prasad S. Rudramuniyaiah:
Turnover intentions of Indian IS professionals. 225-241 - Jessica K. Winkler, Jens Dibbern, Armin Heinzl:
The impact of cultural differences in offshore outsourcing - Case study results from German-Indian application development projects. 243-258 - Joseph W. Rottman, Mary C. Lacity:
A US Client's learning from outsourcing IT work offshore. 259-275
Volume 10, Number 3, July 2008
- Kweku-Muata Osei-Bryson, Ojelanki K. Ngwenyama:
Decision models for information systems management. 277-279 - Sergey Samoilenko:
Information systems fitness and risk in IS development: Insights and implications from chaos and complex systems theories. 281-292 - Mehmet N. Aydin, Mark E. Bakker:
Analyzing IT maintenance outsourcing decision from a knowledge management perspective. 293-305 - Maria Alaranta, Stefan Henningsson:
An approach to analyzing and planning post-merger IS integration: Insights from two field studies. 307-319 - Helana Scheepers, Rens Scheepers:
A process-focused decision framework for analyzing the business value potential of IT investments. 321-330 - Corlane Barclay:
Towards an integrated measurement of IS project performance: The project performance scorecard. 331-345 - Malgorzata Plaza:
Team performance and information system implementation. 347-359 - Lila Rao, Kweku-Muata Osei-Bryson:
An approach for incorporating quality-based cost-benefit analysis in data warehouse design. 361-373 - Ozgur Turetken:
Is your back-up IT infrastructure in a safe location? 375-383
Volume 10, Number 4, September 2008
- Yogesh Kumar Dwivedi, Michael D. Williams, Viswanath Venkatesh:
Guest Editorial: A profile of adoption of Information & Communication Technologies (ICT) research in the household context. 385-390 - Alladi Venkatesh:
Digital home technologies and transformation of households. 391-395 - Susan A. Brown:
Household technology adoption, use, and impacts: Past, present, and future. 397-402 - Xiaojun Zhang, Likoebe M. Maruping:
Household technology adoption in a global marketplace: Incorporating the role of espoused cultural values. 403-413 - Roman Beck, Daniel Beimborn, Tim Weitzel, Wolfgang König:
Network effects as drivers of individual technology adoption: Analyzing adoption and diffusion of mobile communication services. 415-429 - Se-Joon Hong, James Y. L. Thong, Jae Yun Moon, Kar Yan Tam:
Understanding the behavior of mobile data services consumers. 431-445 - Marie Griffiths, Ben Light:
Social networking and digital gaming media convergence: Classification and its consequences for appropriation. 447-459 - Liping Shen, Victor Callaghan, Ruimin Shen:
Affective e-Learning in residential and pervasive computing environments. 461-472 - Lemuria D. Carter, Vishanth Weerakkody:
E-government adoption: A cultural comparison. 473-482 - Dinesh A. Mirchandani, Julius H. Johnson Jr., Kailash Joshi:
Perspectives of citizens towards e-government in Thailand and Indonesia: A multigroup analysis. 483-497
Volume 10, Number 5, November 2008
- Ling Li, Ricardo Valerdi, John N. Warfield:
Advances in enterprise information systems. 499-501 - Charles Møller, Sohail S. Chaudhry, Bent Jørgensen:
Complex service design: A virtual enterprise architecture for logistics service. 503-518 - WenAn Tan, Chuanqun Jiang, Ling Li, Zhenhong Lv:
Role-oriented process-driven enterprise cooperative work using the combined rule scheduling strategies. 519-529 - Ling Li, Li Xu, Hueiwang Anna Jeng, Dayanand N. Naik, Thomas Allen, Maria Frontini:
Creation of environmental health information system for public health service: A pilot study. 531-542 - Chuanzhen Zang, Yushun Fan, Renjing Liu:
Architecture, implementation and application of complex event processing in enterprise information systems based on RFID. 543-553 - Shan Wang, Shi Zheng, Lida Xu, Dezheng Li, Huan Meng:
A literature review of electronic marketplace research: Themes, theories and an integrative framework. 555-571 - Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan:
An OVAL-based active vulnerability assessment system for enterprise computer networks. 573-588 - Chengen Wang, Lida Xu:
Parameter mapping and data transformation for engineering application integration. 589-600 - Shoubo Xu:
The concept and theory of material flow. 601-609 - Lida Xu, WenAn Tan, Hongyuan Zhen, Weiming Shen:
An approach to enterprise process dynamic modeling supporting enterprise process evolution. 611-624
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.