![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
ACIS 2003: Perth, Australia
- Australasian Conference on Information Systems, ACIS 2003, Perth, Australia, November 26-28, 2003. 2003
- Tas Adam, Arthur Tatnall:
Using Information and Communication Technologies to Enhance the Learning Outcomes of a Virtual Community of Students with Learning Disabilities. - Oshadi Alahakoon, Seng W. Loke, Arkady B. Zaslavsky:
Modular and Hierarchical User Profile Instantiation for E-Commerce Applications Using Mobile Software Agents. - Fayez Ahmed Albadri, Ernest Jordan:
The Role of Controls to Minimize Risks of Information Technology Project Failures. - Bruce Armstrong, Tim Comber, Don Dingsdag, Gerry Fogarty:
Internet and Computer Usage: Comparisons among Metropolitan Centres, Coastal Regional Centres and Inland Regional Centres. - Colin G. Ash, Janice M. Burn:
Composite Case Study Method To Build e-Business Transformation Theory. - John Atkinson:
Tools and Techniques to assist in the analysis of requirements for Decision Support Systems. - Ramesh Babu, Jim McGovern:
Integrating Reputation Services into emerging Web Services Architecture. - David Baccarini, Geoff Salm, Peter E. D. Love:
Identification and Management of Risks in Information Technology Projects. - Andrew Barnden:
A Comparison of Anticipated and Realised Benefits from ERP Package Implementation. - Richard Braithwaite:
The 'pubstro' phenomenon: Robin Hoods of the Internet. - Angela Brungs, Rodger Jamieson:
Legal Issues for Computer Forensics. - Frada Burstein, Suzanne Zyngier, Gerry McCullough, Gillian C. Oliver, Judith Symonds, Martyn Brown:
Leading knowledge management strategies in Australia and New Zealand: a comparative study of public and private sector organisations. - Matthew Butler, Kathy Blashki:
"Amazon.edu": Creating Interactive Distance Education. - John Campbell, Dubravka Cecez-Kecmanovic:
An Exploratory Study of Communicative Ethics within a Virtual Community. - Jamie Carlson, Sukunesan Sinnappan:
A Framework for Modelling the Determinants of e-Loyalty in Business-to-Consumer Internet Commerce. - Jayne L. Clarke, Paul Turner:
Commercial Sensitivity in the IS discipline: a practical approach and consideration for researchers entering the field. - Jacob L. Cybulski, Pradipta S. Sarkar, Tanya Linden:
Sharing and Reuse of Web Developers Experience. - Philip J. Dobson:
Judging Interpretive, Critical and Realist Approaches in IS Case Research. - Andrew Dowse:
The Benefits, Limitations and Governance Implications of Federated Public Sector Systems. - Patricia Everitt, Arthur Tatnall:
Investigating the Adoption and Use of Information Technology by General Practitioners in Rural Australia and Why This is Less Than it Might Be. - Rami Farhat, Srini Utpala:
The Universal Description, Discovery and Integration (UDDI) Standard as a Catalyst for Service Oriented Architectures. - Greg Fisher, Janet Lee, Alex Richardson:
Transparency, Culture, and Internet Communication Techniques: A multi-country study of Internet business reporting in the Asia-Pacific. - Gerard Fogarty, Bruce Armstrong, Julian Dimbleby, Don Dingsdag:
Exploring User Satisfaction with Information Systems in a Regional Samll Business Context. - Mark Freeman:
The Current State of Online Supermarket Usability in Australia. - Ben Galloway, Rodger Jamieson:
An Investigation of E-Procurements Risks. - Denise Gengatharen, Craig Standing:
A Conceptual Framework to Support the Development of Government Sponsored Community-Portal Regional Electronic Marketplaces for SMEs: A Stage Approach. - Petter Gottschalk, Vijay K. Khandelwal:
Stages of Growth for Knowledge Management Technology in Australian Law Firms. - James Griffith, Owen Hanson, Lena Hall, Norman Revell:
Using Information Technology to give Competitive Advantage: an unusual Case Study. - Pat Halloran:
There is Knowledge Management in Process Improvement. - Helen Hasan, Kathryn Crawford:
Socio-Technical Systems for Knowledge Mobilisation in Communities. - Byron Hill, Ross Smith:
An investigation of the development of navigation design guidelines for online educational applications delivery to a primary school audience. - Valerie Hobbs, Diarmuid Pigott, Daniel P. Toohey:
Situation Abstraction Modelling: a pattern language for databases. - Gerald Ho, Greg Stephens, Rodger Jamieson:
Biometric Authentication Adoption Issues. - Ana Hol, Robyn Lawson:
Evaluation of Videoconferencing as a Potential Communication Channel for E-Business. - Beverley G. Hope, Barbara Chamberlain:
International students from non-English Speaking Backgrounds in the tertiary computing classroom: Some teaching strategies. - Beverley G. Hope, Zhiru Li:
Online Newspaper Quality Factors: The impact of Gender, Age, and Skill Level. - Stuart Irvine, Rodger Jamieson:
The Impact of Legal and Social Issues on the Acceptance of Biometrics. - Rodger Jamieson, David Loeng:
An Exploratory Study of Risks and Issues in Knowledge Management. - Marius A. Janson, Dubravka Cecez-Kecmanovic, Joze Zupancic:
Prospering in a Global Market: Organizational Learning in an Economy in Transition. - Adam Jenkins, Bevan Jarvis:
BDI Agents: A Soft Model for Organisations? - Cate Jerram, Lesley Treleaven, Dubravka Cecez-Kecmanovic:
Knowledge Sharing as a KM Strategy: Panacea or Tyranny. - Tony Jewels, Jason Baker, Alan Underwood:
Post Implementation Reviews - A Means of Applying Knowledge: Lessons from a failed project. - Tony Jewels, Wendy Jones, Marilyn Ford:
A Study of Cases: Evaluating Requirements. - Michael N. Johnstone, Donald C. McDermid, John R. Venable:
Extending the Business Rules Diagram Method to Web Based System Design. - Ernest Jordan:
Paragraph Performance Measures in Business Continuity. - Roland H. Kaschek, Claire Matthews, Klaus-Dieter Schewe, Catherine Wallace:
Analysing Web Information Systems with the Abstraction Layer Model and Sitelang. - Jason Kennelly, Robert W. Smyth, Guy Gable:
Management Consulting Issues in Australia - A Context Case Study. - Meera Kesari, Shanton Chang, Peter B. Seddon:
A content-analytic study of the advantages and disadvantages of process modelling. - Georgia King-Siem, Iain Morrison:
Global Information Privacy Protection and its impact on Business: Some initial findings. - Joze Kuzic, Geoffrey A. Sandy:
Electronic Business Success Factors: Seven Large Companies. - John W. Lamp, Graeme Altmann, Timothy J. Hetherington:
Functional Group Conflict in Information Systems Development. - John W. Lamp, Simon K. Milton:
An Exploratory Study of Information Systems Subject Indexing. - Michael S. Lane, Glen Litton Van der Vyver, Andy Koronios:
Is XP agile enough for the development of Web information systems? - Patrick Chang Boon Lee:
A Preliminary Study on the Factors Related to Students' Occupational and Academic Pursuits in Computing. - Nick Letch:
Network as Structure and Process in Information Systems Research: Contributions from Two Perspectives. - Nick Lethbridge:
Adaptive Structuration Theory: An Impact Scale for Adaptations in Response to Website Development. - Nick Lethbridge:
Adaptive Structuration Theory: Relevant Structures for Web Technologies. - Chunlu Liu, David Picken, Mary Rice:
Developing and Teaching Information Systems for Construction Management Students: A Perspective in Deakin University. - Ashley D. Lloyd, Arabella Cranmore:
Building competitive advantage through knowledge management: Pattern languages and their relationship to innovation, risk and technology transfer. - Peter E. D. Love, Zahir Irani:
A Prototype Project Management Quality Cost Information System. - Christopher Lueg:
Context-Aware Artefacts: Current State and Open Questions from an IS Perspective. - Robert C. MacGregor, Lejla Vrazalic, Deborah Bunker, Sten Carlsson, Monika Magnusson:
The Role of Enterprise Wide Business Systems in the Adoption and Use of E-Commerce in SMEs: A Study of Swedish SMEs. - Hilangwa Maimbo, Graham Pervan:
A Credit Union Case Study on the Business Value of Information Systems/Information Technology. - Pooja Malhotra, Frada Burstein, Julie Fisher, Sue McKemmish, June Anderson, Rosetta Manaszewicz:
Breast Cancer Knowledge On Line Portal: an Intelligent Decision Support System Perspective. - Sky Marsen, Robert Biddle, James Noble:
Use Case Analysis with Narrative Semiotics. - Neville Meyers:
Employee Privacy in the Electronic Workplace: Current Issues for IT Professionals. - Neville Meyers, Melanie Fleming:
Assessing University Students' Coping Behaviours While Learning to Program: Report on a First-Step Analysis. - Michael Milloy, Dieter Fink:
The Role of "Information" in Wine Consumers' Online Purchasing Intent. - Daniel L. Moody:
Real World Testing of a Method for "Modularising" Large Data Models: An Action Research Programme. - Daniel L. Moody, Mark A. R. Kortink:
From ER Models to Star Schemas: Mapping From Operational Databases to Data Warehouse Designs. - Daniel L. Moody, Guttorm Sindre:
Managing Complexity in Object Oriented Analysis: Adapting UML for Modelling Large Scale Information Systems. - Felicity Murphy, Peter B. Seddon:
An Initial Model of the Motivations of Packaged Software Developers and their Customers to Establish Close Relationships. - Dina Neiger, Leonid Churilov:
Goal-Oriented Decomposition of Event-Driven Process Chains with Value Focused Thinking. - John Page, Arkady B. Zaslavsky, Maria Indrawan:
Security Aspects of Software Agents in Pervasive Information Systems. - Martin Pirotta, Arkady B. Zaslavsky:
Resource Billing in Mobile Agent Based Heterogeneous Distributed Information Systems. - Simon K. Poon, Joseph G. Davis:
Estimating the Impact of Information Technology Investments on Australian Productivity. - Adi Prananto, Judy McKay, Peter Marshall:
Perceived and Realisation of Business Value as a Facilitator of E-Business Progression in Australian SMEs. - Vasant Rao, Rodger Jamieson:
An Approach to Implementing Maturity Models in IT Security. - Silke Retzer, Julie Fisher, John W. Lamp:
Information Systems and Business Informatics: An Australian German Comparison. - Bruce Ricardo, Mark Toleman:
Outsourcing IT: Views from the Vendor's Side. - Helen Richardson:
An Organisation on the Edge of Knowledge Management. - Kai Riemer, Stefan Klein:
Challenges of ICT-enabled Virtual Organisations - a Social Capital perspective. - Barbara Roberts, Edmond P. Fitzgerald:
An investigation of e-business use by Australian wineries. - Judith Ross:
The Importance of Political Influence in Explaining Project Management Success Factors. - Anne C. Rouse, Brian J. Corbitt:
Revisiting IT outsourcing risks: Analysis of a survey of Australia's Top 1000 organizations. - Pradipta K. Sarkar, Jacob L. Cybulski:
Applying Domain Analysis to the Investigation of Web-Enabled Human Resource Projects. - Jarmo Sarkkinen:
Classifying with Forms in Negotiation. - Peter Shackleton, Julie Fisher, Linda L. Dawson:
Town hall eGovernment: a study of local government electronic service delivery. - Shari S. C. Shang, Peter B. Seddon:
Managing the Risks of Changed Processes with Enterprise Systems. - Tae-Hwan Shon, Craig M. Parker, Paula M. C. Swatman:
Classifying Australian B2B iMarketplaces: An Australian Survey. - Simeon J. Simoff:
Discovering Business Networks in Virtual Marketplaces. - Supriya Singh, John Burke, Paul Turner, Maurice Castro:
The Discovery Phase of User Centred Design: Putting Users First in the Design of Smart Internet Technologies. - Sid Sirisukha, Brian Cusack:
Integrative Approaches To Securing eBusiness Networks. - Stephen Smith, Rodger Jamieson:
Key Drivers and Inhibitors for Information System Security within E-Government. - Lorraine Staehr, Graeme G. Shanks, Peter B. Seddon:
Explaining Different Patterns of Business Benefits from Two ERP Systems. - Andrew Stein, Paul Hawking, Susan Foster:
ERP Post Implementation: A new journey. - Glenn Stewart:
Developing a New Curriculum for 1st Year Students of Information Technology. - Glenn Stewart:
Distributions of Myers-Briggs Type Indicator for IT Students Enrolled in a First Year Unit. - Sue Stoney:
Intranet Usability and Design. - Christina Tan, Nick Letch, Regit Young, Cherry Randolph:
Mapping the Knowledge Environment - Processes, Social Networks and Knowledge. - Mary Tate, Mark Wilson-Munro, Marco Zhang, Beverley G. Hope, Eusebio Scornavacca:
Discount Multimedia: Action research in the development, use, and evaluation of mixed mode teaching resources. - Chris Taylor, Wasana Sedera:
Defining the Quality Business Process Reference Models. - Julian Terry, Craig Standing:
The Impact Of User Participation In E-Commerce Developments On System Success: A Project Manager's Perspective. - Roseanne Thomas, Wally Smith, Paul Jackson:
The Relationship between Process and Practice: The Case of a Sales Order Office. - Patricia Thomson, John R. Venable:
Job Satisfaction, Psychological Contracts, and the Transition to Job Commitment in Outsourced Technology Staff. - Greg Timbrell, Taizan Chan:
Investigating Enterprise Systems Issues using a Modified Delphi Method and Exploratory Factor Analysis. - Amanda Toshack, William Tibben:
What Does the Future Hold for Biometric Technology? A Study into Changing User Perceptions. - Shae-Leigh Vella, Peter Caputi, Rohan Jayasuriya:
Testing the relationship between personality, computer self-efficacy and computer anxiety. - Lejla Vrazalic, Danielle Stern, Robert C. MacGregor, Sten Carlsson, Monika Magnusson:
Barriers to E-Commerce Adoption in SMEs: Underlying Factors from a Swedish Study. - David Warrell, Kenneth J. Stevens:
Towards an Understanding of Risk Management in Legacy Information Systems Modernisations. - Ray Webster, Philip Dobson:
Philosophical Frameworks and Cognitive Profiles: Tools for the IS Student and Practitioner? - Regit Young, Nick Letch:
Theorising Organisational Learning and the Impact of Information Systems: Talcott Parsons, Anthony Giddens and Niklas Luhmann.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.