default search action
Search dblp for Publications
export results for "toc:db/journals/jsit/jsit13.bht:"
@article{DBLP:journals/jsit/AlsabhanL11, author = {Waleed Alsabhan and Steve Love}, title = {Platforms and viability of mobile {GIS} in real-time hydrological models: {A} review and proposed model}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {4}, pages = {425--444}, year = {2011}, url = {https://doi.org/10.1108/13287261111184004}, doi = {10.1108/13287261111184004}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/AlsabhanL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/ApuluLM11, author = {Idisemi Apulu and Ann Latham and Robert Moreton}, title = {Factors affecting the effective utilisation and adoption of sophisticated {ICT} solutions: Case studies of SMEs in Lagos, Nigeria}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {2}, pages = {125--143}, year = {2011}, url = {https://doi.org/10.1108/13287261111135972}, doi = {10.1108/13287261111135972}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/ApuluLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/AwaEUI11, author = {Hart O. Awa and Sunday C. Eze and Joseph E. Urieto and Benjamin J. Inyang}, title = {Upper echelon theory {(UET):} {A} major determinant of information technology {(IT)} adoption by SMEs in Nigeria}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {2}, pages = {144--162}, year = {2011}, url = {https://doi.org/10.1108/13287261111135981}, doi = {10.1108/13287261111135981}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/AwaEUI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/BairiMK11, author = {Jayachandra Bairi and B. Murali Manohar and Goutam Kumar Kundu}, title = {Knowledge retention in the {IT} service industry}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {1}, pages = {43--65}, year = {2011}, url = {https://doi.org/10.1108/13287261111118340}, doi = {10.1108/13287261111118340}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/BairiMK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/BhattacharyaGBS11, author = {Devanjan Bhattacharya and Jayanta Kumar Ghosh and Piero Boccardo and Narendra Kumar Samadhiya}, title = {Wireless hazard communication system}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {4}, pages = {408--424}, year = {2011}, url = {https://doi.org/10.1108/13287261111183997}, doi = {10.1108/13287261111183997}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/BhattacharyaGBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/FourieK11, author = {Ina Fourie and Kirstin Krauss}, title = {Information literacy training for teachers in rural South Africa}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {3}, pages = {303--321}, year = {2011}, url = {https://doi.org/10.1108/13287261111164871}, doi = {10.1108/13287261111164871}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/FourieK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/GhobakhlooSHA11, author = {Morteza Ghobakhloo and Mohammad Sadegh Sabouri and Tang Sai Hong and Khosro Amirizadeh}, title = {Electronic commerce-enabled supply chain process integration and business value}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {4}, pages = {344--368}, year = {2011}, url = {https://doi.org/10.1108/13287261111183960}, doi = {10.1108/13287261111183960}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/GhobakhlooSHA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/JonesPBP11, author = {Paul Jones and Gary P. Packham and Paul Beynon{-}Davies and David Pickernell}, title = {False promises: e-business deployment in Wales' {SME} community}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {2}, pages = {163--178}, year = {2011}, url = {https://doi.org/10.1108/13287261111135990}, doi = {10.1108/13287261111135990}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/JonesPBP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/Kaplan-MorGZ11, author = {Neomi Kaplan{-}Mor and Chanan Glezer and Moshe Zviran}, title = {A comparative analysis of end-user training methods}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {1}, pages = {25--42}, year = {2011}, url = {https://doi.org/10.1108/13287261111118331}, doi = {10.1108/13287261111118331}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsit/Kaplan-MorGZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/KarlsenHP11, author = {Jan Terje Karlsen and Line Hagman and Thomas Pedersen}, title = {Intra-project transfer of knowledge in information systems development firms}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {1}, pages = {66--80}, year = {2011}, url = {https://doi.org/10.1108/13287261111118359}, doi = {10.1108/13287261111118359}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/KarlsenHP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/KuehnhausenF11, author = {Martin Kuehnhausen and Victor S. Frost}, title = {Transportation Security SensorNet: a service-oriented architecture for cargo monitoring}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {4}, pages = {369--388}, year = {2011}, url = {https://doi.org/10.1108/13287261111183979}, doi = {10.1108/13287261111183979}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/KuehnhausenF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/Kyobe11, author = {Michael Kyobe}, title = {Investigating the key factors influencing {ICT} adoption in South Africa}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {3}, pages = {255--267}, year = {2011}, url = {https://doi.org/10.1108/13287261111164844}, doi = {10.1108/13287261111164844}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/Kyobe11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/LevyPY11, author = {Margi Levy and Philip Powell and Philip Yetton}, title = {Contingent dynamics of {IS} strategic alignment in small and medium-sized enterprises}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {2}, pages = {106--124}, year = {2011}, url = {https://doi.org/10.1108/13287261111135963}, doi = {10.1108/13287261111135963}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/LevyPY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/LindsayJC11, author = {Rachael Lindsay and Thomas W. Jackson and Louise Cooke}, title = {Adapted technology acceptance model for mobile policing}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {4}, pages = {389--407}, year = {2011}, url = {https://doi.org/10.1108/13287261111183988}, doi = {10.1108/13287261111183988}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/LindsayJC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/LiuM11, author = {Franklin Liu and Michael D. Myers}, title = {An analysis of the {AIS} basket of top journals}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {1}, pages = {5--24}, year = {2011}, url = {https://doi.org/10.1108/13287261111118322}, doi = {10.1108/13287261111118322}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/LiuM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/MpofuW11, author = {Knowledge Chinyanyu Mpofu and Lorraine Watkins{-}Mathys}, title = {Understanding {ICT} adoption in the small firm sector in Southern Africa}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {2}, pages = {179--199}, year = {2011}, url = {https://doi.org/10.1108/13287261111136007}, doi = {10.1108/13287261111136007}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/MpofuW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/MugwanyaMB11, author = {Raymond Mugwanya and Gary Marsden and Richard Boateng}, title = {A preliminary study of podcasting in developing higher education institutions: {A} South African case}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {3}, pages = {268--285}, year = {2011}, url = {https://doi.org/10.1108/13287261111164853}, doi = {10.1108/13287261111164853}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/MugwanyaMB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/ThinyaneT11, author = {Mamello Thinyane and Alfredo Terzoli}, title = {Dimensioning cultural diversity in eServices architectures}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {3}, pages = {322--339}, year = {2011}, url = {https://doi.org/10.1108/13287261111164880}, doi = {10.1108/13287261111164880}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsit/ThinyaneT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/WangS11, author = {Yi Wang and Xinping Shi}, title = {Thrive, not just survive: enhance dynamic capabilities of SMEs through {IS} competence}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {2}, pages = {200--222}, year = {2011}, url = {https://doi.org/10.1108/13287261111136016}, doi = {10.1108/13287261111136016}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsit/WangS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/WeilbachB11, author = {Lizette Weilbach and Elaine Byrne}, title = {Implementing open source software to conform to national policy}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {3}, pages = {286--302}, year = {2011}, url = {https://doi.org/10.1108/13287261111164862}, doi = {10.1108/13287261111164862}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/WeilbachB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/Zheng11, author = {Vanessa Zheng}, title = {The value proposition of adopting mCRM strategy in {UK} SMEs}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {2}, pages = {223--245}, year = {2011}, url = {https://doi.org/10.1108/13287261111136025}, doi = {10.1108/13287261111136025}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/Zheng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/Ziegenfuss11, author = {James T. Ziegenfuss}, title = {Analyzing changing organizational environments: Methodological approach and the academic health center case}, journal = {J. Syst. Inf. Technol.}, volume = {13}, number = {1}, pages = {81--97}, year = {2011}, url = {https://doi.org/10.1108/13287261111118368}, doi = {10.1108/13287261111118368}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/Ziegenfuss11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.