Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Information Technology, Volume 29
Volume 29, Number 1, March 2014
- Dianne Cyr:
Return visits: a review of how Web site design can engender visitor loyalty. 1-26 - Ola Henfridsson, Lars Mathiassen, Fredrik Svahn:
Managing technological change in the digital age: the role of architectural frames. 27-43 - Daniel Gozman, Wendy L. Currie:
The role of Investment Management Systems in regulatory compliance: a Post-Financial Crisis study of displacement mechanisms. 44-58 - Carol Hsu, James Backhouse, Leiser Silva:
Institutionalizing operational risk management: an empirical study. 59-72 - Andrew Schwarz, Wynne W. Chin, Rudy Hirschheim, Colleen Schwarz:
Toward a process-based view of information technology acceptance. 73-96 - Aleksi Aaltonen, Niccoló Tempini:
Everything counts in large amounts: a critical realist case study on data-based production. 97-110
Volume 29, Number 2, June 2014
- Gwanhoo Lee, William H. DeLone, Margaret Tan, Martha Corrales:
Special issue on leveraging the IS organization for business value creation. 111-113
- Anne Quaadgras, Peter Weill, Jeanne W. Ross:
Management commitments that maximize business impact from IT. 114-127 - Arne Buchwald, Nils Urbach, Frederik Ahlemann:
Business value through controlled IT: toward an integrated model of IT governance success and its impact. 128-147 - Katja Zolper, Daniel Beimborn, Tim Weitzel:
The effect of social network structures at the business/IT interface on IT application change effectiveness. 148-169 - Heikki Lempinen, Risto Rajala:
Exploring multi-actor value creation in IT service processes. 170-185
Volume 29, Number 3, September 2014
- Min-Seok Pang, Gwanhoo Lee, William H. DeLone:
IT resources, organizational capabilities, and value creation in public-sector organizations: a public-value management perspective. 187-205
- Ping Gao, Heejin Lee, Kalle Lyytinen, Kanliang Wang:
Editorial: Special issue on information technology in China. 206-207 - Liang Li, Ping Gao, Ji-Ye Mao:
Research on IT in China: a call for greater contextualization. 208-222 - Xunhua Guo, Kai Reimers, Bin Xie, Mingzhi Li:
Network relations and boundary spanning: understanding the evolution of e-ordering in the Chinese drug distribution industry. 223-236 - Aihui Chen, Yaobin Lu, Sumeet Gupta, Qi Xiaolin:
Can customer satisfaction and dissatisfaction coexist? An issue of telecommunication service in China. 237-252 - Fang Su, Ji-Ye Mao, Sirkka L. Jarvenpaa:
How do IT outsourcing vendors respond to shocks in client demand? A resource dependence perspective. 253-267
Volume 29, Number 4, December 2014
- David Arnott, Graham Pervan:
A critical analysis of decision support systems research revisited: the rise of design science. 269-293 - Federico Iannacci:
Routines, artefacts and technological change: investigating the transformation of criminal justice in England and Wales. 294-311 - Alan R. Dennis, Binny M. Samuel, Kelly McNamara:
Design for maintenance: how KMS document linking decisions affect maintenance effort and use. 312-326
- David E. Avison, Julien Malaurent:
Is theory king?: questioning the theory fetish in information systems. 327-336
- Shirley Gregor:
Theory - still king but needing a revolution! 337-340 - M. Lynne Markus:
Maybe not the king, but an invaluable subordinate: a commentary on Avison and Malaurent's advocacy of 'theory light' IS research. 341-345 - Deborah Compeau, Fernando Olivera:
From 'theory light' to theorizing: a reaction to Avison and Malaurent. 346-349 - Allen S. Lee:
Theory is king? But first, what is theory? 350-352 - David Silverman:
Taking theory too far? A commentary on Avison and Malaurent. 353-355 - Ola Henfridsson:
The power of an intellectual account: developing stories of the digital age. 356-357
- David E. Avison, Julien Malaurent:
Is theory king?: a rejoinder. 358-361
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.