Lior Fink: How do IT capabilities create strategic value? Toward greater integration of insights from reductionistic and holistic approaches.16-33
Jonny Holmström, Steven Sawyer: Requirements engineering blinders: exploring information systems developers' black-boxing of the emergent character of requirements.34-47
Elizabeth J. Davidson: 'Hey professor, why are you teaching this class?' Reflections on the relevance of IS research for undergraduate students.133-138
Christian Schmidt, Peter Buxmann: Outcomes and success factors of enterprise IT architecture management: empirical insight from the international financial services industry.168-185
Luning Liu, Yuqiang Feng, Qing Hu, Xiaojian Huang: From transactional user to VIP: how organizational and cognitive factors affect ERP assimilation at individual level.186-200
David H. Brown, Sheryl Thompson: Priorities, policies and practice of e-government in a developing country context: ICT infrastructure and diffusion in Jamaica.329-342
Dubravka Cecez-Kecmanovic: Doing critical information systems research - arguments for a critical research methodology.440-455
Nik Rushdi Hassan: Is information systems a discipline? Foucauldian and Toulminian insights.456-476
Andrew Basden: Enabling a Kleinian integration of interpretivist and socio-critical IS research: the contribution of Dooyeweerd's philosophy.477-489
Volume 20, Number 5, September 2011
Editorial
Frantz Rowe: Towards a greater diversity in writing styles, argumentative strategies and genre of manuscripts.491-495
Opinion Piece
Kalle Lyytinen, Jan Damsgaard: Inter-organizational information systems adoption - a configuration analysis approach.496-509
Research Articles
Reeva M. Lederman, Robert B. Johnston: Decision support or support for situated choice: lessons for system design from effective manual systems.510-528
Alexander Benlian: Is traditional, open-source, or on-demand first choice? Developing an AHP-based framework for the comparison of different software models in office suites selection.542-559
John D'Arcy, Tejaswini Herath: A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings.643-658
Ricky Y. K. Chan, Jennifer W. M. Lai: Does ethical ideology affect software piracy attitude and behaviour? An empirical investigation of computer users in China.659-673
Mark I. Hwang, Frank L. Schmidt: Assessing moderating effect in meta-analysis: a re-analysis of top management support studies and suggestions for researchers.693-702
Rajeev Sharma, Philip Yetton: Top management support and IS implementation: further support for the moderating role of task interdependence.703-712