default search action
Journal of Computer Information Systems, Volume 53
Volume 53, Number 1, 2012
- Timothy Paul Cronan, David E. Douglas:
A Student ERP Simulation Game: A Longitudinal Study. 3-13 - Mohamed Khalifa, Sammi K. N. Cheng, Kathy Ning Shen:
Adoption of Mobile Commerce: A Confidence Model. 14-22 - Wen-Hui Tsai, Ming-Hong Tsai, Sheng-Tun Li, Chinho Lin:
Harmonizing Firms' Knowledge and Strategies with Organizational Capabilities. 23-32 - Rocco Agrifoglio, Sue Black, Concetta Metallo, Maria Ferrara:
Extrinsic versus Intrinsic Motivation in Continued Twitter Usage. 33-41 - Pei-Hsuan Hsieh, Kuo-Chuan (Martin) Yeh:
Cultural Effects on Perceptions of Unauthorized Software Copying. 42-47 - Hai Wang, Shouhong Wang:
Ontology-Based Data Summarization Engine: A Design Methodology. 48-56 - Inkook Sim, Divakaran Liginlal, Lara Khansa:
Information Privacy Situation Awareness: Construct and Validation. 57-64 - Vishnu Vinekar, James T. C. Teng:
It Impacts in Information and Physical Product Industries. 65-71 - Amy H. Harris, Timothy H. Greer, Steven A. Morris, W. Jeff Clark:
Information Systems Job Market Late 1970'S-Early 2010'S. 72-79 - Rodger Morrison, Casey G. Cegielski, R. Kelly Rainer Jr.:
Trust, Avatars, and Electronic Communications: Implications for E-Learning. 80-89
Volume 53, Number 2, 2012
- Delvin Grant:
Shortening Requirements Engineering: Dual Imperative Action Research Study. 1-8 - Jean A. Pratt, Karina Hauser, Cassidy R. Sugimoto:
Cross-Disciplinary Communities or Knowledge Islands: Examining Business Disciplines. 9-21 - Beth H. Jones, Lynn R. Heinrichs:
Do Business Students Practice Smartphone Security? 22-30 - Inae Hahn, Christophe Bredillett, Gyeung-Min Kim, Magali Taloc:
Agility of Project Manager in Global is Project. 31-38 - Leelien Ken Huang:
The Impact of it Management Sophistication on Perceived it Importance in Strategic Alignment. 50-64 - Deborah J. Armstrong, Jason E. Nelms, Cynthia K. Riemenschneider, Margaret F. Reid:
Revisiting the Barriers Facing Women in Information Systems. 65-74 - Lu Zhang, Jinghua Huang:
The Moderating Factors in the Relationship between ERP Investments and Firm Performance. 75-84 - Jason K. Deane, Anurag Agarwal:
Scheduling Online Advertisements to Maximize Revenue under Non-Linear Pricing. 85-92 - Eugenia Y. Huang, Travis K. Huang:
Investigating the Antecedents of Users' Knowledge Sharing Intention. 93-102
Volume 53, Number 3, 2013
- Jan vom Brocke, René Riedl, Pierre-Majorique Léger:
Application Strategies for Neuroscience in Information Systems Design Science Research. 1-13 - Venu Madhav Kuthadi:
A New Data Stream Mining Algorithm for Interestingness-Rich Association Rules. 14-27 - Chia-Ping Yu, Houn-Gee Chen, Gary Klein, James J. Jiang:
Risk Dynamics Throughout the System Development Life Cycle. 28-37 - Qiang Duan, Yong Lu:
Service-Oriented Network Discovery and Selection in Virtualization-Based Mobile Internet. 38-46 - Soon-Ki Jeong, Jong-Chang Ahn, Byung-Ho Rhee:
Knowledge Transfer Activation Analysis: Knowledge Trade Perspective. 47-55 - Alexander J. Barelka, Anand Jeyaraj, Ryan G. Walinski:
Content Acceptance Model and New Media Technologies. 56-64 - Xin (Robert) Luo, Merrill Warkentin, Han Li:
Understanding Technology Adoption Trade-Offs: A Conjoint Analysis Approach. 65-74 - Yair Levy, Michelle M. Ramim, Raymond A. Hackney:
Assessing Ethical Severity of e-Learning Systems Security Attacks. 75-84 - Hongwei "Chris" Yang:
Bon Appétit for Apps: Young American Consumers' Acceptance of Mobile Applications. 85-96 - Werner Mellis, Claudia Loebbecke, Richard L. Baskerville:
Requirements Uncertainty in Contract Software Development Projects. 97-108 - Alex Koohang, Joanna Paliszkiewicz:
Knowledge Construction in e-Learning: An Empirical Validation of an Active Learning Model. 109-114
Volume 53, Number 4, 2013
- Hyejung Lee, Jun-gi Park, Jungwoo Lee:
Role of Leadership Competencies and Team Social Capital in it Services. 1-11 - Curtis Knowles, Vladan Jovanovic:
Extensible Markup Language (XML) Schemas for Data Vault Models. 12-21 - Alain Yee-Loong Chong:
Understanding Mobile Commerce Continuance Intentions: An Empirical Analysis of Chinese Consumers. 22-30 - Ruidong Zhang, Jim Q. Chen, Ca Jaejung Lee:
Mobile Commerce and Consumer Privacy Concerns. 31-38 - Amab Dutta, Guo Chao Alex Peng, Alok Choudhary:
Risks in Enterprise Cloud Computing: The Perspective of it Experts. 39-48 - Dinesh R. Pai, Kevin Stanley McFall, Girish H. Subramanian:
Software Effort Estimation Using a Neural Network Ensemble. 49-58 - Mouzhi Ge, Markus Helfert:
Impact of Information Quality on Supply Chain Decisions. 59-67 - Varol Onur Kayhan, Anol Bhattacherjee:
Content Use from Websites: Effects of Governance Mechanisms. 68-80 - Srecko Natek, Dusan Lesjak:
Improving Knowledge Management by Integrating Hei Process and Data Models. 81-86 - Leon A. Kappelman, John A. Zachman:
The Enterprise and its Architecture: Ontology & Challenges. 87-95
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.