Остановите войну!
for scientists:
default search action
Niv Ahituv
- > Home > Persons > Niv Ahituv
Publications
- 2012
- [c8]Ronit Purian, Niv Ahituv, Adi Ashkenazy:
The richness of barriers to public participation: Multi-layered system of real estate data from multiple sources. MCIS (Short Papers) 2012: 17 - 2010
- [j36]Elad Segev, Niv Ahituv:
Popular Searches in Google and Yahoo!: A "Digital Divide" in Information Uses? Inf. Soc. 26(1): 17-37 (2010) - [c6]Ronit Purian, Niv Ahituv, Phillip Ein-Dor:
Evaluating and Ranking Local E-Government Services. MCIS 2010: 68 - 2008
- [j34]Nitza Geri, Niv Ahituv:
A Theory of Constraints approach to interorganizational systems implementation. Inf. Syst. E Bus. Manag. 6(4): 341-360 (2008) - 2007
- [j33]Elad Segev, Niv Ahituv, Karine Barzilai-Nahon:
Mapping Diversities and Tracing Trends of Cultural Homogeneity/Heterogeneity in Cyberspace. J. Comput. Mediat. Commun. 12(4): 1269-1297 (2007) - 2003
- [j31]Moshe Zviran, Niv Ahituv, Chanan Glezer:
A conceptual model for increasing utilization of dependable computer networks. Data Knowl. Eng. 46(3): 247-269 (2003) - 2002
- [j30]Niv Ahituv, Seev Neumann, Moshe Zviran:
A System Development Methodology for ERP Systems. J. Comput. Inf. Syst. 42(3): 56-67 (2002) - 2001
- [j28]Niv Ahituv, Yuval Elovici:
Performance evaluation of a distributed application. J. Oper. Res. Soc. 52(8): 916-927 (2001) - [j27]Moshe Zviran, Niv Ahituv, Aviad Armoni:
Building outsourcing relationships across the global community: the UPS-Motorola experience. J. Strateg. Inf. Syst. 10(4): 313-333 (2001) - 2000
- [j26]Arik Ragowsky, Niv Ahituv, Seev Neumann:
The benefits of using information systems. Commun. ACM 43(11es): 13 (2000) - 1999
- [j25]Niv Ahituv, Moshe Zviran, Chanan Glezer:
Top Management Toolbox for Managing Corporate IT. Commun. ACM 42(4): 93-99 (1999) - 1998
- [j23]Niv Ahituv, Magid Igbaria, Aviem Sella:
The Effects of Time Pressure and Completeness of Information on Decision Making. J. Manag. Inf. Syst. 15(2): 153-172 (1998) - 1996
- [j22]Arik Ragowsky, Niv Ahituv, Seev Neumann:
Identifying the value and importance of an information system application. Inf. Manag. 31(2): 89-102 (1996) - [c2]Niv Ahituv, Opher Etzion, Seev Neumann, Sheizaf Rafaeli, Peretz Shoval, Dov Te'eni:
Panel: Academia influencing the National IT Policy: IS research and education in Israel. ECIS 1996: 1343-1344 - 1995
- [j21]Ran Giladi, Niv Ahituv:
SPEC as a Performance Evaluation Measure. Computer 28(8): 33-42 (1995) - 1992
- [j20]Seev Neumann, Niv Ahituv, Moshe Zviran:
A measure for determining the strategic relevance of IS to the organization. Inf. Manag. 22(5): 281-299 (1992) - 1989
- [j19]Niv Ahituv, Seev Neumann, Moshe Zviran:
Factors Affecting the Policy for Distributing Computing Resources. MIS Q. 13(4): 389-401 (1989) - 1988
- [j18]Niv Ahituv, Magid Igbaria:
A Model for Predicting and Evaluating Computer Resource Consumption. Commun. ACM 31(12): 1467-1473 (1988) - [j17]Niv Ahituv, Yeheskel Lapid, Seev Neumann:
Protecting statistical databases against retrieval of private information. Comput. Secur. 7(1): 59-63 (1988) - [j16]Niv Ahituv, Yoav Benjamini, Magid Igbaria:
A compumetrical approach for analysis and clustering of computer system performance variables. Comput. Oper. Res. 15(6): 489-496 (1988) - [j15]Niv Ahituv, Magid Igbaria:
A model to facilitate costing, pricing and budgeting of computer services. Inf. Manag. 14(5): 235-241 (1988) - 1987
- [j14]Niv Ahituv, Yeheskel Lapid, Seev Neumann:
Processing Encrypted Data. Commun. ACM 30(9): 777-780 (1987) - [j12]Niv Ahituv, Yeheskel Lapid, Seev Neumann:
Verifying the authentication of an information system user. Comput. Secur. 6(2): 152-157 (1987) - 1986
- [j9]Yeheskel Lapid, Niv Ahituv, Seev Neumann:
Approaches to handling "Trojan Horse" threats. Comput. Secur. 5(3): 251-256 (1986) - 1984
- [j7]Niv Ahituv, Seev Neumann:
A Flexible Approach to Information Systems Developmoent. MIS Q. 8(2): 69-78 (1984) - 1981
- [j6]Niv Ahituv, Malcolm Munro, Yair Wand:
The value of information in information analysis. Inf. Manag. 4(3): 143-150 (1981) - 1978
- [j3]Niv Ahituv, Israel Borovits:
Analysis of the Purchase Option of Computers. Comput. J. 21(2): 105-109 (1978) - [j2]Niv Ahituv, Israel Borovits, Seev Neumann:
Selecting a job mix for running a benchmark by using an integer programming model. Comput. Oper. Res. 5(1): 73-79 (1978)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-10-24 02:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint