default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 112 matches
- 2008
- John Campbell, Jon Heales:
Factor Analysis of Individual Outcomes for Teleworkers. ACIS 2008 - David Parsons, Hokyoung Ryu, Ramesh Lal:
Better, Not More Expensive, Faster? The Perceived Effects of Pair Programming in Survey Data. ACIS 2008 - David Parsons, Rosemary Stockdale, James Bowles, Veena Kamble:
If We Build It Will They Come? Creating a Virtual Classroom in Second Life. ACIS 2008 - Bruce Campbell:
The Intractable Nature of Alignment. ACIS 2008 - Ahmad Abareshi, Bill Martin:
A Meta-Analysis of Survey-Based Research in MIS Field from 1992-2006. ACIS 2008 - Ahmad Abareshi, Bill Martin, Alemayehu Molla:
Determinants of Organisational Transformation: An IT-Business Alignment Perspective. ACIS 2008 - Sultana Lubna Alam:
To Wiki or to Blog: Piloting Social Software Technologies for Assessment in a Large First Year Information Systems Class. ACIS 2008 - Mazen Ali, Sherah Kurnia, Graeme G. Shanks:
Interorganizational Systems (IOS) Adoption over Time: Empirical Evaluation in the Australian Grocery Industry. ACIS 2008 - Raja Haslinda Raja Mohd Ali, Alexei Tretiakov, Barbara J. Crump:
Understanding the Impact of National Culture on Strategic IS Planning. ACIS 2008 - Basil Alzougool, Sherah Kurnia:
Electronic Commerce Technologies Adoption by SMEs: A Conceptual Study. ACIS 2008 - David Arnott:
Success Factors for Data Warehouse and Business Intelligence Systems. ACIS 2008 - Colin G. Ash, Sanjeet Sharma:
An Enterprise Architecture Framework for Information Management Improvement: Transforming Research into Practice. ACIS 2008 - George Baltatzis, David G. A. Ormrod, Nicholas Grainger:
Social Networking Tools for Internal Communication in Large Organizations: Benefits and Barriers. ACIS 2008 - Jenine P. Beekhuyzen, Liisa von Hellens:
How does Technology Influence Online Music Access and Use? A Taxonomy of Empirical Studies. ACIS 2008 - Nargiza Bekmamedova, Adi Prananto, Judy McKay, Artem Vorobiev:
Towards Better Understanding of the Relationship between Formal Controls and Trust in IS Outsourcing. ACIS 2008 - Alexander Benlian, Thomas Hess:
The Adoption of and Satisfaction with Web2.0 Based Collaboration and Knowledge Management Technologies in Global Software Development - Insights from an Empirical Study. ACIS 2008 - Glenn Robert Bewsell:
Mechanisms that Impact Online Auction Trust. ACIS 2008 - Peter Blakey, Clare Atkins, Barbara J. Crump:
Using Design Research to Improve Data Modelling Performance among Novice End Users. ACIS 2008 - Matthias Born, Agata Filipowska, Monika Kaczmarek, Ivan Markovic, Monika Starzecka, Adam Walczak:
Business Functions Ontology and its Application in Semantic Business Process Modelling. ACIS 2008 - Rachelle Bosua, Antonette Mendoza:
The Role of Social Networks in Technology Appropriation over time. ACIS 2008 - Outi Brennan:
Client and IT Engagement in Software Development: A Disconnect of Mindsets. ACIS 2008 - Jan vom Brocke, Alexander Simons, Bernd Schenk:
Transforming Design Science Research into Practical Application: Experiences from Two ECM Teaching Cases. ACIS 2008 - Christer Carlsson, Pirkko Walden:
Mobile Network Operator Strategy: An Obstacle for Mobile Value Services? ACIS 2008 - Dubravka Cecez-Kecmanovic, Fouad Nagm:
Understanding IS Projects Evaluation in Practice through an ANT Inquiry. ACIS 2008 - Kyung Jin Cha, Shirley Gregor, Walter D. Fernández:
Towards a Deeper Understanding of IT-Enabled Transformation. ACIS 2008 - Po-Chien Chang:
2Drivers and Moderators of Consumer Behaviour in the Multiple Use of Mobile Phone. ACIS 2008 - Delroy A. Chevers, Stanford E. Moore, Evan W. Duggan, Annette M. Mills:
Identifying Key Software Development Practices in the English-Speaking Caribbean Using the Nominal Group Technique. ACIS 2008 - Fletcher T. H. Cole:
Taking "Data" (as a Topic): The Working Policies of Indifference, Purification and Differentiation. ACIS 2008 - Merete R. Crofts, Bardo Fraunholz, Matthew J. Warren:
Using the Sociotechnical Approach in Global Software Developments: Is the Theory Relevant today? ACIS 2008 - Gemma Dodson, David Arnott, Graham Pervan:
The Use of Business Intelligence Systems in Australia. ACIS 2008
skipping 82 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-21 13:31 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint