default search action
Bouchaib Bahli
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c18]Marcela Castro, Bouchaib Bahli, Ronnie Figueiredo, Andre Barcaui:
Forecasting Project Success through Project Team Trust: Brazilian Empirical Study. CENTERIS/ProjMAN/HCist 2022: 1696-1704 - 2020
- [c17]Rohit Nishant, Shirish C. Srivastava, Bouchaib Bahli:
Does Virtualization Capability Maturity Influence Information Systems Development Performance? Theorizing The Non-Linear Payoffs. HICSS 2020: 1-10
2010 – 2019
- 2018
- [c16]Helmi Issa, Bouchaib Bahli:
Understanding the Consequences of Technostress: A Non-Linear Perspective. ECIS 2018: 71 - 2017
- [j9]Ramzi Hammami, Yannick Frein, Bouchaib Bahli:
Supply chain design to guarantee quoted lead time and inventory replenishment: model and insights. Int. J. Prod. Res. 55(12): 3431-3450 (2017) - 2016
- [c15]Hans P. Borgman, Hauke Heier, Bouchaib Bahli, Thomas Boekamp:
Dotting the I and Crossing (out) the T in IT Governance: New Challenges for Information Governance. HICSS 2016: 4901-4909 - 2015
- [c14]Yi Liu, Bouchaib Bahli, Hans P. Borgman:
Cross-Cultural Research in IS: An Updated Review Since 2005. HCI (23) 2015: 708-716 - 2014
- [c13]Younes Benslimane, Michel Plaisent, Prosper Bernard, Bouchaib Bahli:
Key Challenges and Opportunities in Cloud Computing and Implications on Service Requirements: Evidence from a Systematic Literature Review. CloudCom 2014: 114-121 - 2013
- [j8]Bouchaib Bahli, Suzanne Rivard:
Cost escalation in information technology outsourcing: A moderated mediation study. Decis. Support Syst. 56: 37-47 (2013) - [c12]Hans P. Borgman, Bouchaib Bahli, Hauke Heier, Fiona Schewski:
Cloudrise: Exploring Cloud Computing Adoption and Governance with the TOE Framework. HICSS 2013: 4425-4435 - [c11]Bouchaib Bahli, Christian Wettenberg, Hans P. Borgman, Hauke Heier:
The Role of Absorptive Capacity in Information Technology Outsourcing and Innovation Performance: A Moderated Mediation Analysis. HICSS 2013: 4635-4644 - 2012
- [c10]Bouchaib Bahli:
Enabling Innovation in Information Technology Outsourcing: An Empirical Study. ACIS 2012 - [c9]Hans P. Borgman, Hauke Heier, Bouchaib Bahli:
Paradise by the Dashboard Light: Designing Governance Metrics in Turbulent Environments. HICSS 2012: 4178-4188 - [c8]Hauke Heier, Hans P. Borgman, Bouchaib Bahli:
Cloudrise: Opportunities and Challenges for IT Governance at the Dawn of Cloud Computing. HICSS 2012: 4982-4991 - 2011
- [c7]Bouchaib Bahli, Svetlana Sidenko, Hans P. Borgman:
Can Project Management Maturity Endure Project Risk? A Strategic Perspective of IS Project Success. ICIS 2011 - [c6]Bouchaib Bahli, Younes Benslimane, Zijiang Yang:
The impact of absorptive capacity on the ex-post adoption of agile methods: The case of Extreme Programming model. IEEM 2011: 1660-1664 - 2010
- [c5]Bouchaib Bahli:
A Capability Maturity Model of Information Technology Outsourcing Relationships: a Vendor Perspective. MCIS 2010: 9
2000 – 2009
- 2007
- [j7]Bouchaib Bahli, Fei Ji:
An assessment of facilitators and inhibitors for the adoption of enterprise application integration technology: An empirical study. Bus. Process. Manag. J. 13(1): 108-120 (2007) - [j6]Younes Benslimane, Luiz Marcio Cysneiros, Bouchaib Bahli:
Assessing critical functional and non-functional requirements for web-based procurement systems: a comprehensive survey. Requir. Eng. 12(3): 191-198 (2007) - 2006
- [c4]Dany Di Tullio, Bouchaib Bahli:
The Impact of Software Process Maturity and Software Development Risk on the Performance of Software Development Projects. ICIS 2006: 90 - 2005
- [j5]Raafat George Saadé, Bouchaib Bahli:
The impact of cognitive absorption on perceived usefulness and perceived ease of use in on-line learning: an extension of the technology acceptance model. Inf. Manag. 42(2): 317-327 (2005) - [j4]Bouchaib Bahli, Meral Demirbag Büyükkurt:
Group Performance in Information Systems Project Groups: An Empirical Study. J. Inf. Technol. Educ. 4: 97-113 (2005) - 2004
- [j3]Bouchaib Bahli, Younes Benslimane:
An exploration of wireless computing risks: Development of a risk taxonomy. Inf. Manag. Comput. Secur. 12(3): 245-254 (2004) - [c3]Bouchaib Bahli:
Toward a capability maturity model for the management of outsourcing information services. AMCIS 2004: 440 - 2003
- [j2]Bouchaib Bahli, Dany Di Tullio:
Web Engineering: An Assessment of Empirical Research. Commun. Assoc. Inf. Syst. 12: 14 (2003) - [j1]Bouchaib Bahli, Suzanne Rivard:
The information technology outsourcing risk: a transaction cost and agency theory-based perspective. J. Inf. Technol. 18(3): 211-221 (2003) - [c2]Bouchaib Bahli, Suzanne Rivard:
A Validation of Measures Associated with the Risk Factors in Information Technology Outsourcing. HICSS 2003: 269 - 2001
- [c1]Bouchaib Bahli, Suzanne Rivard:
An Assessment of Information Technology Outsourcing Risk. ICIS 2001: 575-580
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint