callback( { "result":{ "query":":facetid:toc:\"db/journals/ejis/ejis22.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"184.89" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"43", "@dc":"43", "@oc":"43", "@id":"43449054", "text":":facetid:toc:db/journals/ejis/ejis22.bht" } }, "hits":{ "@total":"43", "@computed":"43", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"4015402", "info":{"authors":{"author":[{"@pid":"48/1390","text":"Chon Abraham"},{"@pid":"72/6694","text":"Marie-Claude Boudreau"},{"@pid":"74/2150","text":"Iris A. Junglas"},{"@pid":"06/5438","text":"Richard T. Watson"}]},"title":"Enriching our theoretical repertoire: the role of evolutionary psychology in technology acceptance.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"1","pages":"56-75","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/AbrahamBJW13","doi":"10.1057/EJIS.2011.25","ee":"https://doi.org/10.1057/ejis.2011.25","url":"https://dblp.org/rec/journals/ejis/AbrahamBJW13"}, "url":"URL#4015402" }, { "@score":"1", "@id":"4015403", "info":{"authors":{"author":{"@pid":"28/2182","text":"Pär J. Ågerfalk"}},"title":"Embracing diversity through mixed methods research.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"3","pages":"251-256","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/Agerfalk13","doi":"10.1057/EJIS.2013.6","ee":"https://doi.org/10.1057/ejis.2013.6","url":"https://dblp.org/rec/journals/ejis/Agerfalk13"}, "url":"URL#4015403" }, { "@score":"1", "@id":"4015404", "info":{"authors":{"author":[{"@pid":"77/8831","text":"Shoshana Altschuller"},{"@pid":"87/6114","text":"Raquel Benbunan-Fich"}]},"title":"The pursuit of trust in ad hoc virtual teams: how much electronic portrayal is too much?","venue":"Eur. J. Inf. Syst.","volume":"22","number":"6","pages":"619-636","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/AltschullerB13","doi":"10.1057/EJIS.2012.39","ee":"https://doi.org/10.1057/ejis.2012.39","url":"https://dblp.org/rec/journals/ejis/AltschullerB13"}, "url":"URL#4015404" }, { "@score":"1", "@id":"4015405", "info":{"authors":{"author":{"@pid":"28/4290","text":"Edward Bernroider"}},"title":"Effective ERP adoption processes: the role of project activators and resource investments.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"2","pages":"235-250","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/Bernroider13","doi":"10.1057/EJIS.2012.51","ee":"https://doi.org/10.1057/ejis.2012.51","url":"https://dblp.org/rec/journals/ejis/Bernroider13"}, "url":"URL#4015405" }, { "@score":"1", "@id":"4015406", "info":{"authors":{"author":[{"@pid":"87/6178","text":"David F. Birks"},{"@pid":"12/9100","text":"Walter Fernandez"},{"@pid":"37/5783","text":"Natalia Levina"},{"@pid":"92/6793","text":"Syed Nasirin 0001"}]},"title":"Grounded theory method in information systems research: its nature, diversity and opportunities.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"1","pages":"1-8","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/BirksFLN13","doi":"10.1057/EJIS.2012.48","ee":"https://doi.org/10.1057/ejis.2012.48","url":"https://dblp.org/rec/journals/ejis/BirksFLN13"}, "url":"URL#4015406" }, { "@score":"1", "@id":"4015407", "info":{"authors":{"author":[{"@pid":"05/5109","text":"Lan Cao"},{"@pid":"05/4823","text":"Kannan Mohan"},{"@pid":"08/3239","text":"Balasubramaniam Ramesh"},{"@pid":"122/1620","text":"Sumantra Sarkar"}]},"title":"Adapting funding processes for agile IT projects: an empirical investigation.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"2","pages":"191-205","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/CaoMRS13","doi":"10.1057/EJIS.2012.9","ee":"https://doi.org/10.1057/ejis.2012.9","url":"https://dblp.org/rec/journals/ejis/CaoMRS13"}, "url":"URL#4015407" }, { "@score":"1", "@id":"4015408", "info":{"authors":{"author":{"@pid":"46/8287","text":"Joshua M. Davis"}},"title":"Leveraging the IT competence of non-IS workers: social exchange and the good corporate citizen.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"4","pages":"403-415","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/Davis13","doi":"10.1057/EJIS.2012.36","ee":"https://doi.org/10.1057/ejis.2012.36","url":"https://dblp.org/rec/journals/ejis/Davis13"}, "url":"URL#4015408" }, { "@score":"1", "@id":"4015409", "info":{"authors":{"author":[{"@pid":"61/2165","text":"Tamara Dinev"},{"@pid":"19/6726","text":"Heng Xu"},{"@pid":"89/595","text":"H. Jeff Smith"},{"@pid":"36/1757","text":"Paul J. Hart"}]},"title":"Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"3","pages":"295-316","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/DinevXSH13","doi":"10.1057/EJIS.2012.23","ee":"https://doi.org/10.1057/ejis.2012.23","url":"https://dblp.org/rec/journals/ejis/DinevXSH13"}, "url":"URL#4015409" }, { "@score":"1", "@id":"4015410", "info":{"authors":{"author":{"@pid":"65/2436","text":"Amany R. Elbanna"}},"title":"Top management support in multiple-project environments: an in-practice view.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"3","pages":"278-294","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/Elbanna13","doi":"10.1057/EJIS.2012.16","ee":"https://doi.org/10.1057/ejis.2012.16","url":"https://dblp.org/rec/journals/ejis/Elbanna13"}, "url":"URL#4015410" }, { "@score":"1", "@id":"4015411", "info":{"authors":{"author":[{"@pid":"128/4901","text":"Greg Filbeck"},{"@pid":"55/6868","text":"Matthew Swinarski"},{"@pid":"68/2766","text":"Xin Zhao"}]},"title":"Shareholder reaction to firm investments in the capability maturity model: an event study.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"2","pages":"170-190","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/FilbeckSZ13","doi":"10.1057/EJIS.2012.54","ee":"https://doi.org/10.1057/ejis.2012.54","url":"https://dblp.org/rec/journals/ejis/FilbeckSZ13"}, "url":"URL#4015411" }, { "@score":"1", "@id":"4015412", "info":{"authors":{"author":[{"@pid":"07/6695","text":"Susan Gasson"},{"@pid":"49/3497","text":"Jim Waters"}]},"title":"Using a grounded theory approach to study online collaboration behaviors.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"1","pages":"95-118","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/GassonW13","doi":"10.1057/EJIS.2011.24","ee":"https://doi.org/10.1057/ejis.2011.24","url":"https://dblp.org/rec/journals/ejis/GassonW13"}, "url":"URL#4015412" }, { "@score":"1", "@id":"4015413", "info":{"authors":{"author":[{"@pid":"49/559","text":"David Gefen"},{"@pid":"68/4950","text":"Erran Carmel"}]},"title":"Why the first provider takes it all: the consequences of a low trust culture on pricing and ratings in online sourcing markets.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"6","pages":"604-618","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/GefenC13","doi":"10.1057/EJIS.2012.49","ee":"https://doi.org/10.1057/ejis.2012.49","url":"https://dblp.org/rec/journals/ejis/GefenC13"}, "url":"URL#4015413" }, { "@score":"1", "@id":"4015414", "info":{"authors":{"author":[{"@pid":"15/10680","text":"Jennifer E. Gerow"},{"@pid":"91/9107","text":"Ramakrishna Ayyagari"},{"@pid":"03/2516","text":"Jason Bennett Thatcher"},{"@pid":"46/10680","text":"Philip L. Roth"}]},"title":"Can we have fun @ work? The role of intrinsic motivation for utilitarian systems.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"3","pages":"360-380","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/GerowATR13","doi":"10.1057/EJIS.2012.25","ee":"https://doi.org/10.1057/ejis.2012.25","url":"https://dblp.org/rec/journals/ejis/GerowATR13"}, "url":"URL#4015414" }, { "@score":"1", "@id":"4015415", "info":{"authors":{"author":[{"@pid":"90/6586","text":"Gerald Grant"},{"@pid":"58/4750","text":"Felix B. Tan"}]},"title":"Governing IT in inter-organizational relationships: Issues and future research.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"5","pages":"493-497","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/GrantT13","doi":"10.1057/EJIS.2013.21","ee":"https://doi.org/10.1057/ejis.2013.21","url":"https://dblp.org/rec/journals/ejis/GrantT13"}, "url":"URL#4015415" }, { "@score":"1", "@id":"4015416", "info":{"authors":{"author":[{"@pid":"98/9032","text":"Véronique Guilloux"},{"@pid":"76/7459","text":"Joanne Locke"},{"@pid":"16/7460","text":"Alan Lowe"}]},"title":"Digital business reporting standards: mapping the battle in France.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"3","pages":"257-277","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/GuillouxLL13","doi":"10.1057/EJIS.2012.5","ee":"https://doi.org/10.1057/ejis.2012.5","url":"https://dblp.org/rec/journals/ejis/GuillouxLL13"}, "url":"URL#4015416" }, { "@score":"1", "@id":"4015417", "info":{"authors":{"author":[{"@pid":"81/3990","text":"Riitta Hekkala"},{"@pid":"88/1610","text":"Cathy Urquhart"}]},"title":"Everyday power struggles: living in an IOIS project.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"1","pages":"76-94","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/HekkalaU13","doi":"10.1057/EJIS.2012.43","ee":"https://doi.org/10.1057/ejis.2012.43","url":"https://dblp.org/rec/journals/ejis/HekkalaU13"}, "url":"URL#4015417" }, { "@score":"1", "@id":"4015418", "info":{"authors":{"author":{"@pid":"54/4340","text":"Fredrik Karlsson 0001"}},"title":"Longitudinal use of method rationale in method configuration: an exploratory study.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"6","pages":"690-710","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/Karlsson13","doi":"10.1057/EJIS.2012.30","ee":"https://doi.org/10.1057/ejis.2012.30","url":"https://dblp.org/rec/journals/ejis/Karlsson13"}, "url":"URL#4015418" }, { "@score":"1", "@id":"4015419", "info":{"authors":{"author":[{"@pid":"k/MarkKeil","text":"Mark Keil 0001"},{"@pid":"04/215","text":"Arun Rai"},{"@pid":"49/4215","text":"Shan Liu"}]},"title":"How user risk and requirements risk moderate the effects of formal and informal control on the process performance of IT projects.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"6","pages":"650-672","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/KeilRL13","doi":"10.1057/EJIS.2012.42","ee":"https://doi.org/10.1057/ejis.2012.42","url":"https://dblp.org/rec/journals/ejis/KeilRL13"}, "url":"URL#4015419" }, { "@score":"1", "@id":"4015420", "info":{"authors":{"author":[{"@pid":"01/10658","text":"Sarah S. Khan"},{"@pid":"89/1339","text":"Moutaz J. Khouja"},{"@pid":"95/2408","text":"Ram L. Kumar"}]},"title":"Effects of time-inconsistent preferences on information technology infrastructure investments with growth options.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"2","pages":"206-220","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/KhanKK13","doi":"10.1057/EJIS.2012.4","ee":"https://doi.org/10.1057/ejis.2012.4","url":"https://dblp.org/rec/journals/ejis/KhanKK13"}, "url":"URL#4015420" }, { "@score":"1", "@id":"4015421", "info":{"authors":{"author":[{"@pid":"09/5998","text":"Hyung Jin Kim"},{"@pid":"74/1245","text":"Bongsik Shin"},{"@pid":"74/2007","text":"Ho Geun Lee"}]},"title":"The mediating role of psychological contract breach in IS outsourcing: inter-firm governance perspective.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"5","pages":"529-547","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/KimSL13","doi":"10.1057/EJIS.2012.41","ee":"https://doi.org/10.1057/ejis.2012.41","url":"https://dblp.org/rec/journals/ejis/KimSL13"}, "url":"URL#4015421" }, { "@score":"1", "@id":"4015422", "info":{"authors":{"author":{"@pid":"31/3736","text":"Nelson E. King"}},"title":"Exploring the impact of operating model choice on the governance of inter-organizational workflow: the U.S. e-prescribing network.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"5","pages":"548-568","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/King13","doi":"10.1057/EJIS.2012.47","ee":"https://doi.org/10.1057/ejis.2012.47","url":"https://dblp.org/rec/journals/ejis/King13"}, "url":"URL#4015422" }, { "@score":"1", "@id":"4015423", "info":{"authors":{"author":[{"@pid":"79/1116","text":"Elmar Kutsch"},{"@pid":"138/6698","text":"David Denyer"},{"@pid":"150/5085","text":"Mark Hall"},{"@pid":"138/6634","text":"Elizabeth (Liz) Lee-Kelley"}]},"title":"Does risk matter? Disengagement from risk management practices in information systems projects.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"6","pages":"637-649","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/KutschDHL13","doi":"10.1057/EJIS.2012.6","ee":"https://doi.org/10.1057/ejis.2012.6","url":"https://dblp.org/rec/journals/ejis/KutschDHL13"}, "url":"URL#4015423" }, { "@score":"1", "@id":"4015424", "info":{"authors":{"author":{"@pid":"62/1001","text":"Mark Lycett"}},"title":"'Datafication': making sense of (big) data in a complex world.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"4","pages":"381-386","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/Lycett13","doi":"10.1057/EJIS.2013.10","ee":"https://doi.org/10.1057/ejis.2013.10","url":"https://dblp.org/rec/journals/ejis/Lycett13"}, "url":"URL#4015424" }, { "@score":"1", "@id":"4015425", "info":{"authors":{"author":[{"@pid":"24/3901","text":"Rangarirai Matavire"},{"@pid":"73/4065","text":"Irwin Brown"}]},"title":"Profiling grounded theory approaches in information systems research.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"1","pages":"119-129","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/MatavireB13","doi":"10.1057/EJIS.2011.35","ee":"https://doi.org/10.1057/ejis.2011.35","url":"https://dblp.org/rec/journals/ejis/MatavireB13"}, "url":"URL#4015425" }, { "@score":"1", "@id":"4015426", "info":{"authors":{"author":[{"@pid":"88/4849","text":"Lars Mathiassen"},{"@pid":"23/6091","text":"Anna Sandberg"}]},"title":"How a professionally qualified doctoral student bridged the practice-research gap: a confessional account of Collaborative Practice Research.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"4","pages":"475-492","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/MathiassenS13","doi":"10.1057/EJIS.2012.35","ee":"https://doi.org/10.1057/ejis.2012.35","url":"https://dblp.org/rec/journals/ejis/MathiassenS13"}, "url":"URL#4015426" }, { "@score":"1", "@id":"4015427", "info":{"authors":{"author":[{"@pid":"17/5681","text":"Elisa Mattarelli"},{"@pid":"125/0217","text":"Fabiola Bertolotti"},{"@pid":"125/0240","text":"Diego Maria Macrì"}]},"title":"The use of ethnography and grounded theory in the development of a management information system.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"1","pages":"26-44","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/MattarelliBM13","doi":"10.1057/EJIS.2011.34","ee":"https://doi.org/10.1057/ejis.2011.34","url":"https://dblp.org/rec/journals/ejis/MattarelliBM13"}, "url":"URL#4015427" }, { "@score":"1", "@id":"4015428", "info":{"authors":{"author":[{"@pid":"36/1290","text":"Lorraine Morgan"},{"@pid":"f/JosephFeller","text":"Joseph Feller"},{"@pid":"f/PatrickFinnegan","text":"Patrick Finnegan"}]},"title":"Exploring value networks: theorising the creation and capture of value with open source software.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"5","pages":"569-588","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/MorganFF13","doi":"10.1057/EJIS.2012.44","ee":"https://doi.org/10.1057/ejis.2012.44","url":"https://dblp.org/rec/journals/ejis/MorganFF13"}, "url":"URL#4015428" }, { "@score":"1", "@id":"4015429", "info":{"authors":{"author":[{"@pid":"27/5573","text":"Robert C. Nickerson"},{"@pid":"84/5714","text":"Upkar Varshney"},{"@pid":"67/397","text":"Jan Muntermann"}]},"title":"A method for taxonomy development and its application in information systems.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"3","pages":"336-359","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/NickersonVM13","doi":"10.1057/EJIS.2012.26","ee":"https://doi.org/10.1057/ejis.2012.26","url":"https://dblp.org/rec/journals/ejis/NickersonVM13"}, "url":"URL#4015429" }, { "@score":"1", "@id":"4015430", "info":{"authors":{"author":[{"@pid":"38/7159","text":"Marjolein van Offenbeek"},{"@pid":"24/7158","text":"Albert Boonstra"},{"@pid":"73/1567","text":"DongBack Seo"}]},"title":"Towards integrating acceptance and resistance research: evidence from a telecare case study.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"4","pages":"434-454","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/OffenbeekBS13","doi":"10.1057/EJIS.2012.29","ee":"https://doi.org/10.1057/ejis.2012.29","url":"https://dblp.org/rec/journals/ejis/OffenbeekBS13"}, "url":"URL#4015430" }, { "@score":"1", "@id":"4015431", "info":{"authors":{"author":[{"@pid":"07/4174","text":"Ken Peffers"},{"@pid":"04/1944","text":"Brian L. Dos Santos"}]},"title":"Research opportunities in information technology funding and system justification.","venue":"Eur. J. Inf. Syst.","volume":"22","number":"2","pages":"131-138","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ejis/PeffersS13","doi":"10.1057/EJIS.2012.60","ee":"https://doi.org/10.1057/ejis.2012.60","url":"https://dblp.org/rec/journals/ejis/PeffersS13"}, "url":"URL#4015431" } ] } } } )