default search action
Search dblp for Publications
export results for "toc:db/journals/ejis/ejis22.bht:"
@article{DBLP:journals/ejis/AbrahamBJW13, author = {Chon Abraham and Marie{-}Claude Boudreau and Iris A. Junglas and Richard T. Watson}, title = {Enriching our theoretical repertoire: the role of evolutionary psychology in technology acceptance}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {1}, pages = {56--75}, year = {2013}, url = {https://doi.org/10.1057/ejis.2011.25}, doi = {10.1057/EJIS.2011.25}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/AbrahamBJW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/Agerfalk13, author = {P{\"{a}}r J. {\AA}gerfalk}, title = {Embracing diversity through mixed methods research}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {3}, pages = {251--256}, year = {2013}, url = {https://doi.org/10.1057/ejis.2013.6}, doi = {10.1057/EJIS.2013.6}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/Agerfalk13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/AltschullerB13, author = {Shoshana Altschuller and Raquel Benbunan{-}Fich}, title = {The pursuit of trust in \emph{ad hoc} virtual teams: how much electronic portrayal is too much?}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {6}, pages = {619--636}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.39}, doi = {10.1057/EJIS.2012.39}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/AltschullerB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/Bernroider13, author = {Edward Bernroider}, title = {Effective {ERP} adoption processes: the role of project activators and resource investments}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {2}, pages = {235--250}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.51}, doi = {10.1057/EJIS.2012.51}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/Bernroider13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/BirksFLN13, author = {David F. Birks and Walter Fernandez and Natalia Levina and Syed Nasirin}, title = {Grounded theory method in information systems research: its nature, diversity and opportunities}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {1}, pages = {1--8}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.48}, doi = {10.1057/EJIS.2012.48}, timestamp = {Thu, 31 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejis/BirksFLN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/CaoMRS13, author = {Lan Cao and Kannan Mohan and Balasubramaniam Ramesh and Sumantra Sarkar}, title = {Adapting funding processes for agile {IT} projects: an empirical investigation}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {2}, pages = {191--205}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.9}, doi = {10.1057/EJIS.2012.9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejis/CaoMRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/Davis13, author = {Joshua M. Davis}, title = {Leveraging the {IT} competence of non-IS workers: social exchange and the good corporate citizen}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {4}, pages = {403--415}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.36}, doi = {10.1057/EJIS.2012.36}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/Davis13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/DinevXSH13, author = {Tamara Dinev and Heng Xu and H. Jeff Smith and Paul J. Hart}, title = {Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {3}, pages = {295--316}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.23}, doi = {10.1057/EJIS.2012.23}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/DinevXSH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/Elbanna13, author = {Amany R. Elbanna}, title = {Top management support in multiple-project environments: an in-practice view}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {3}, pages = {278--294}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.16}, doi = {10.1057/EJIS.2012.16}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/Elbanna13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/FilbeckSZ13, author = {Greg Filbeck and Matthew Swinarski and Xin Zhao}, title = {Shareholder reaction to firm investments in the capability maturity model: an event study}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {2}, pages = {170--190}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.54}, doi = {10.1057/EJIS.2012.54}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/FilbeckSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/GassonW13, author = {Susan Gasson and Jim Waters}, title = {Using a grounded theory approach to study online collaboration behaviors}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {1}, pages = {95--118}, year = {2013}, url = {https://doi.org/10.1057/ejis.2011.24}, doi = {10.1057/EJIS.2011.24}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/GassonW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/GefenC13, author = {David Gefen and Erran Carmel}, title = {Why the first provider takes it all: the consequences of a low trust culture on pricing and ratings in online sourcing markets}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {6}, pages = {604--618}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.49}, doi = {10.1057/EJIS.2012.49}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/GefenC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/GerowATR13, author = {Jennifer E. Gerow and Ramakrishna Ayyagari and Jason Bennett Thatcher and Philip L. Roth}, title = {Can we have fun @ work? The role of intrinsic motivation for utilitarian systems}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {3}, pages = {360--380}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.25}, doi = {10.1057/EJIS.2012.25}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/GerowATR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/GrantT13, author = {Gerald Grant and Felix B. Tan}, title = {Governing {IT} in inter-organizational relationships: Issues and future research}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {5}, pages = {493--497}, year = {2013}, url = {https://doi.org/10.1057/ejis.2013.21}, doi = {10.1057/EJIS.2013.21}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/GrantT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/GuillouxLL13, author = {V{\'{e}}ronique Guilloux and Joanne Locke and Alan Lowe}, title = {Digital business reporting standards: mapping the battle in France}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {3}, pages = {257--277}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.5}, doi = {10.1057/EJIS.2012.5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejis/GuillouxLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/HekkalaU13, author = {Riitta Hekkala and Cathy Urquhart}, title = {Everyday power struggles: living in an {IOIS} project}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {1}, pages = {76--94}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.43}, doi = {10.1057/EJIS.2012.43}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/HekkalaU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/Karlsson13, author = {Fredrik Karlsson}, title = {Longitudinal use of method rationale in method configuration: an exploratory study}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {6}, pages = {690--710}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.30}, doi = {10.1057/EJIS.2012.30}, timestamp = {Thu, 23 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejis/Karlsson13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/KeilRL13, author = {Mark Keil and Arun Rai and Shan Liu}, title = {How user risk and requirements risk moderate the effects of formal and informal control on the process performance of {IT} projects}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {6}, pages = {650--672}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.42}, doi = {10.1057/EJIS.2012.42}, timestamp = {Mon, 03 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejis/KeilRL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/KhanKK13, author = {Sarah S. Khan and Moutaz J. Khouja and Ram L. Kumar}, title = {Effects of time-inconsistent preferences on information technology infrastructure investments with growth options}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {2}, pages = {206--220}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.4}, doi = {10.1057/EJIS.2012.4}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/KhanKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/KimSL13, author = {Hyung Jin Kim and Bongsik Shin and Ho Geun Lee}, title = {The mediating role of psychological contract breach in {IS} outsourcing: inter-firm governance perspective}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {5}, pages = {529--547}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.41}, doi = {10.1057/EJIS.2012.41}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/KimSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/King13, author = {Nelson E. King}, title = {Exploring the impact of operating model choice on the governance of inter-organizational workflow: the {U.S.} e-prescribing network}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {5}, pages = {548--568}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.47}, doi = {10.1057/EJIS.2012.47}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/King13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/KutschDHL13, author = {Elmar Kutsch and David Denyer and Mark Hall and Elizabeth (Liz) Lee{-}Kelley}, title = {Does risk matter? Disengagement from risk management practices in information systems projects}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {6}, pages = {637--649}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.6}, doi = {10.1057/EJIS.2012.6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejis/KutschDHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/Lycett13, author = {Mark Lycett}, title = {'Datafication': making sense of (big) data in a complex world}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {4}, pages = {381--386}, year = {2013}, url = {https://doi.org/10.1057/ejis.2013.10}, doi = {10.1057/EJIS.2013.10}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/Lycett13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/MatavireB13, author = {Rangarirai Matavire and Irwin Brown}, title = {Profiling grounded theory approaches in information systems research}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {1}, pages = {119--129}, year = {2013}, url = {https://doi.org/10.1057/ejis.2011.35}, doi = {10.1057/EJIS.2011.35}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/MatavireB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/MathiassenS13, author = {Lars Mathiassen and Anna Sandberg}, title = {How a professionally qualified doctoral student bridged the practice-research gap: a confessional account of Collaborative Practice Research}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {4}, pages = {475--492}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.35}, doi = {10.1057/EJIS.2012.35}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/MathiassenS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/MattarelliBM13, author = {Elisa Mattarelli and Fabiola Bertolotti and Diego Maria Macr{\`{\i}}}, title = {The use of ethnography and grounded theory in the development of a management information system}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {1}, pages = {26--44}, year = {2013}, url = {https://doi.org/10.1057/ejis.2011.34}, doi = {10.1057/EJIS.2011.34}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/MattarelliBM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/MorganFF13, author = {Lorraine Morgan and Joseph Feller and Patrick Finnegan}, title = {Exploring value networks: theorising the creation and capture of value with open source software}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {5}, pages = {569--588}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.44}, doi = {10.1057/EJIS.2012.44}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/MorganFF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/NickersonVM13, author = {Robert C. Nickerson and Upkar Varshney and Jan Muntermann}, title = {A method for taxonomy development and its application in information systems}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {3}, pages = {336--359}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.26}, doi = {10.1057/EJIS.2012.26}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/NickersonVM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/OffenbeekBS13, author = {Marjolein van Offenbeek and Albert Boonstra and DongBack Seo}, title = {Towards integrating acceptance and resistance research: evidence from a telecare case study}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {4}, pages = {434--454}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.29}, doi = {10.1057/EJIS.2012.29}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/OffenbeekBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/PeffersS13, author = {Ken Peffers and Brian L. Dos Santos}, title = {Research opportunities in information technology funding and system justification}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {2}, pages = {131--138}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.60}, doi = {10.1057/EJIS.2012.60}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/PeffersS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/RavishankarPM13, author = {M. N. Ravishankar and Shan Ling Pan and Michael D. Myers}, title = {Information technology offshoring in India: a postcolonial perspective}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {4}, pages = {387--402}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.32}, doi = {10.1057/EJIS.2012.32}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/RavishankarPM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/Recker13, author = {Jan Recker}, title = {Empirical investigation of the usefulness of Gateway constructs in process models}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {6}, pages = {673--689}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.50}, doi = {10.1057/EJIS.2012.50}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/Recker13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/SarafLS13, author = {Nilesh Saraf and Christoph Schlueter Langdon and Omar El Sawy}, title = {{IS} integration and knowledge sharing in multi-unit firms: the winner's curse}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {6}, pages = {592--603}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.37}, doi = {10.1057/EJIS.2012.37}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/SarafLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/SchlichterR13, author = {Bjarne Rerup Schlichter and Jeremy Rose}, title = {Trust dynamics in a large system implementation: six theoretical propositions}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {4}, pages = {455--474}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.24}, doi = {10.1057/EJIS.2012.24}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/SchlichterR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/Schryen13, author = {Guido Schryen}, title = {Revisiting {IS} business value research: what we already know, what we still need to know, and how we can get there}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {2}, pages = {139--169}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.45}, doi = {10.1057/EJIS.2012.45}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/Schryen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/Teeni13, author = {Dov Te'eni}, title = {Journals and conferences in discourse}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {6}, pages = {589--591}, year = {2013}, url = {https://doi.org/10.1057/ejis.2013.30}, doi = {10.1057/EJIS.2013.30}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/Teeni13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/TrierM13, author = {Matthias Trier and Judith Molka{-}Danielsen}, title = {Sympathy or strategy: social capital drivers for collaborative contributions to the {IS} community}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {3}, pages = {317--335}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.27}, doi = {10.1057/EJIS.2012.27}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/TrierM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/VaastW13, author = {Emmanuelle Vaast and Geoff Walsham}, title = {Grounded theorizing for electronically mediated social contexts}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {1}, pages = {9--25}, year = {2013}, url = {https://doi.org/10.1057/ejis.2011.26}, doi = {10.1057/EJIS.2011.26}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/VaastW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/WilkinCM13, author = {Carla Wilkin and John Campbell and Stephen Moore}, title = {Creating value through governing {IT} deployment in a public/private-sector inter-organisational context: a human agency perspective}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {5}, pages = {498--511}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.21}, doi = {10.1057/EJIS.2012.21}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/WilkinCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/WolfswinkelFW13, author = {Joost F. Wolfswinkel and Elfi Furtm{\"{u}}ller and Celeste Wilderom}, title = {Using grounded theory as a method for rigorously reviewing literature}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {1}, pages = {45--55}, year = {2013}, url = {https://doi.org/10.1057/ejis.2011.51}, doi = {10.1057/EJIS.2011.51}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/WolfswinkelFW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/WuG13, author = {Jianan Wu and Edgardo Arturo Ayala Gayt{\'{a}}n}, title = {The role of online seller reviews and product price on buyers' willingness-to-pay: a risk perspective}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {4}, pages = {416--433}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.33}, doi = {10.1057/EJIS.2012.33}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/WuG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/XiaoXH13, author = {JingHua Xiao and Kang Xie and Qing Hu}, title = {Inter-firm {IT} governance in power-imbalanced buyer-supplier dyads: exploring how it works and why it lasts}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {5}, pages = {512--528}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.40}, doi = {10.1057/EJIS.2012.40}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/XiaoXH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/ZhengCHZ13, author = {Daqing Zheng and Jin Chen and Lihua Huang and Cheng Zhang}, title = {E-government adoption in public administration organizations: integrating institutional theory perspective and resource-based view}, journal = {Eur. J. Inf. Syst.}, volume = {22}, number = {2}, pages = {221--234}, year = {2013}, url = {https://doi.org/10.1057/ejis.2012.28}, doi = {10.1057/EJIS.2012.28}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejis/ZhengCHZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.