default search action
- Oliver Marschollek:
"Nobody wins, but nobody loses either" - understanding different institutional logics in IT public-private partnerships.
- Boris Otto:
A morphology of the organisation of data governance.
- Fahri Yetim:
A set of critical heuristics for value sensitive designers and users of persuasive systems.
- Maurits Kaptein:
Adaptive persuasive messages in an e-commerce setting: the use of persuasion profiles.
- Loo Geok Pee:
Attenuating perceived privacy risk of location-based mobile services.
- Maria Madlberger:
Can data quality help overcome the penguin effect? the case of item master data pools.
- Ali Alper Yayla:
Controlling insider threats with information security policies.
- Christopher Bull:
Disclosive ethics and embryonic developments in e-gambling commerce.
- Ali Alper Yayla:
Enforcing information security policies through cultural boundaries: a multinational company approach.
- Briony J. Oates:
Evidence-based information systems: a decade later.
- Navonil Mustafee:
Evolution of IS research based on literature published in two leading IS journals - EJIS and MISQ.
- Ondrej Zach:
Exploring erp system outcomes in SMEs: a multiple case study.
- Anne Cleven:
Exploring patterns of business-IT alignment for the purpose of process performance measurement.
- Michael Chlistalla:
From minutes to seconds and beyond: measuring order-book resiliency in fragmented electronic securities markets.
- Nadine Blinn:
Improving information processing capacities in service value chains: design concept, prototype and evaluation.
- Angelika Zimmermann:
Offshoring attitudes, relational behaviours, and departmental culture.
- Dubravka Cecez-Kecmanovic:
On methods, methodologies and how they matter.
- Dick Stenmark:
Path creation in the railroad industry: dimensions of design in it-enabled innovation.
- Wolfgang A. Molnar:
reflections on the reflexive activities of embedded system development: a case study.
- Wibke Michalk:
Risk-aware sla establishment in agreement networks - an evaluation.
- Ella Kolkowska:
Security subcultures in an organization - exploring value conflicts.
- Guido Schryen:
Seeking the "value" in IS business value research - an agenda for investigating synergies between socio-organizational change, IS capabilities change, and IS innovation.
- Florian Johannsen:
State of the art concerning the integration of methods and techniques in quality management - literature review and an agenda for research.
- Christian Malus:
The application of ARDR in IT project management as a basis for the process model 'REFPM'.
- Paul Beynon-Davies:
The enactment of personal identity.
- Magda David Hercheui:
The institutionalization of virtual communities: how institutional carriers influence online governance structures.
- Espen Skorve:
The right information in the right place at the right time: precision and multiplicity in medical practices.
- Nandish V. Patel:
There is no longer one truth!: corporate communications and social media management through deferred systems.
- Martin Böhringer:
Towards a design theory for applying web 2.0 patterns to organisations.
- Tom Butler:
Towards a practice-oriented green IS framework.
- Valeri Wiegel:
Tracing innovation: an activity theoretical approach.
- Mihail Cocosila:
User acceptance of cell phone support for smoking cessation: a UK - Canada comparative empirical investigation.
- Ping Zhang:
What consumers think, feel, and do toward digital ads: a multi-phase study.
- Sven Laumer:
Why do people reject technologies - a literature-based discussion of the phenomena "resistance to change" in information systems and managerial psychology research.