default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2000
- Wil M. P. van der Aalst:
Loosely coupled interorganizational workflows: : modeling and analyzing workflows crossing organizational boundaries. Inf. Manag. 37(2): 67-75 (2000) - Milam W. Aiken, Joseph Paolillo:
An abductive model of group support systems. Inf. Manag. 37(2): 87-94 (2000) - Milam W. Aiken, Bennie Waller:
Flaming among first-time group support system users. Inf. Manag. 37(2): 95-100 (2000) - Kimmo Alajoutsijärvi, Kari Mannermaa, Henrikki Tikkanen:
Customer relationships and the small software firm: A framework for understanding challenges faced in marketing. Inf. Manag. 37(3): 153-159 (2000) - Rebecca Angeles, Ravinder Nath:
An empirical study of EDI trading partner selection criteria in customer-supplier relationships. Inf. Manag. 37(5): 241-255 (2000) - Janice M. Burn, Colonel Szeto:
A comparison of the views of business and IT management on success factors for strategic alignment. Inf. Manag. 37(4): 197-216 (2000) - Patrick Y. K. Chau, Kar Yan Tam:
Organizational adoption of open systems: a 'technology-push, need-pull' perspective. Inf. Manag. 37(5): 229-239 (2000) - Lei-da Chen, Khalid S. Soliman, En Mao, Mark N. Frolick:
Measuring user satisfaction with data warehouses: an exploratory study. Inf. Manag. 37(3): 103-110 (2000) - Enrique Claver, Reyes Gonzalez, Juan Llopis:
An analysis of research in information systems (1981-1997). Inf. Manag. 37(4): 181-195 (2000) - A. J. Feelders, Hennie A. M. Daniels, Marcel Holsheimer:
Methodological and practical aspects of data mining. Inf. Manag. 37(5): 271-281 (2000) - Stanley E. Gambill, W. Jeff Clark, Ronald B. Wilkes:
Toward a holistic model of task design for IS professionals. Inf. Manag. 37(5): 217-228 (2000) - Chittibabu Govindarajulu, Brian J. Reithel, Vikram Sethi:
A model of end user attitudes and intentions toward alternative sources of support. Inf. Manag. 37(2): 77-86 (2000) - Eelko K. R. E. Huizingh:
The content and design of web sites: an empirical study. Inf. Manag. 37(3): 123-134 (2000) - Bharat A. Jain, Janet Stern Solomon:
The effect of task complexity and conflict handling styles on computer-supported negotiations. Inf. Manag. 37(4): 161-168 (2000) - Diane Janvrin, Joline Morrison:
Using a structured design approach to reduce risks in end user spreadsheet development. Inf. Manag. 37(1): 1-12 (2000) - James J. Jiang, Waleed A. Muhanna, Gary Klein:
User resistance and strategies for promoting acceptance across system types. Inf. Manag. 37(1): 25-36 (2000) - William R. King, Yogesh Malhotra:
Developing a framework for analyzing IS sourcing. Inf. Manag. 37(6): 323-334 (2000) - Sangjae Lee, Ingoo Han:
Fuzzy cognitive map for the design of EDI controls. Inf. Manag. 37(1): 37-50 (2000) - Winston T. Lin, Benjamin B. M. Shao:
The relationship between user participation and system success: a simultaneous contingency approach. Inf. Manag. 37(6): 283-295 (2000) - Roger McHaney, Timothy Paul Cronan:
Toward an empirical understanding of computer simulation implementation success. Inf. Manag. 37(3): 135-151 (2000) - Fay Cobb Payton:
Lessons learned from three interorganizational health care information systems. Inf. Manag. 37(6): 311-321 (2000) - Gerald V. Post, Albert Kagan:
Management tradeoffs in anti-virus strategies. Inf. Manag. 37(1): 13-24 (2000) - Arun Rai, Hindi Al-Hindi:
The effects of development process modeling and task uncertainty on development quality performance. Inf. Manag. 37(6): 335-346 (2000) - Cynthia K. Riemenschneider, Peter P. Mykytyn Jr.:
What small business executives have learned about managing information technology. Inf. Manag. 37(5): 257-269 (2000) - Judy E. Scott, Lisa Kaindl:
Enhancing functionality in an enterprise software package. Inf. Manag. 37(3): 111-122 (2000) - Afzaal H. Seyal, Md. Mahbubur Rahim, Mohd. Noah Abd. Rahman:
Computer attitudes of non-computing academics: a study of technical colleges in Brunei Darussalam. Inf. Manag. 37(4): 169-180 (2000) - Padmal Vitharana, Hemant K. Jain:
Research issues in testing business components. Inf. Manag. 37(6): 297-309 (2000) - Kam-Fai Wong, Chun Hung Cheng, Jaideep Motwani:
SWAM - a structured WWW access model. Inf. Manag. 37(2): 51-65 (2000)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-15 12:51 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint