


default search action
Communications of the Association for Information Systems, Volume 12
Volume 12, 2003
- Minna Elina Sarkar, Omar A. El Sawy:
The Four Tigers of Global E-Business Infrastructure: Strategies and Implications for Emerging Economies. 1 - David Gefen:
Assessing Unidimensionality Through LISREL: An Explanation and an Example. 2 - Minh Q. Huynh, U. N. Umesh, Joseph S. Valacich:
E-Learning as an Emerging Entrepreneurial Enterprise in Universities and Firms. 3
- Heather A. Smith, James D. McKeen:
Developments in Practice IX: The Evolution of the KM Function. 4
- Moshe Zviran, Zippy Erlich:
Measuring IS User Satisfaction: Review and Implications. 5 - Michael S. H. Heng:
Understanding Electronic Commerce from a Historical Perspective. 6 - Richard T. Watson, Emmanuel Monod:
AIS Council White Paper: Tools and Techniques for AIS Strategic Planning. 7 - Phillip Ein-Dor:
AIS President's Report: 2002-2003. 8 - Hugh J. Watson, Jeffrey A. Hoffer:
Teradata University Network: A New Resource for Teaching Large Data Bases and Their Applications. 9 - Steven Alter:
Customer Service, Responsibility, and Systems in International E-Commerce: Should a Major Airline Reissue a Stolen Ticket? 10 - Upkar Varshney:
Mobile and Wireless Information Systems: Applications, Networks, and Research Problems. 11 - Manish Agrawal, Kaushal Chari, Ravi Sankar:
Demystifying Wireless Technologies: Navigating Through The Wireless Technology Maze. 12 - Dongsong Zhang:
Delivery of Personalized and Adaptive Content to Mobile Devices: A Framework and Enabling Technology. 13 - Bouchaib Bahli, Dany Di Tullio:
Web Engineering: An Assessment of Empirical Research. 14 - Sergio de Cesare, Mark Lycett, Ray J. Paul:
Actor Perception in Business Use Case Modeling. 15 - Michael Lang:
Hypermedia Systems Development: A Comparative Study of Software Engineers and Graphic Designers. 16 - Brian Whitworth, Michael Zaic:
The WOSP Model: Balanced Information System Design and Evaluation. 17 - Christopher J. Atkinson, David Wilson:
Images of Information Systems Development in the Practice of Architecture. 18
- Benn R. Konsynski, Heather A. Smith:
Developments in Practice X: Radio Frequency Identification (RFID) - An Internet for Physical Objects. 19
- Heather A. Smith, James D. McKeen:
Developments in Practice XI: Developing IT Professionalism. 20 - Robert J. Boncella:
Competitive Intelligence and the Web. 21
- Robert M. Davison
, Roger Clarke
, Duncan Langford, Feng-Yuan Kuo, H. Jeff Smith:
Information Privacy in a Globally Networked Society: Implications for IS Research. 22
- Steven Alter:
18 Reasons Why IT-Reliant Work Systems Should Replace "The IT Artifact" as the Core Subject Matter of the IS Field. 23 - David T. Croasdell, Lee A. Freeman, Andrew Urbaczewski
:
Concept Maps for Teaching and Assessment. 24 - Sucheta Nadkarni, Fiona Fui-Hoon Nah:
Aggregated Causal Maps: An Approach To Elicit And Aggregate The Knowledge Of Multiple Experts. 25 - Marianne Bradford, B. S. Vijayaraman, Akhilesh Chandra:
The Status of ERP Integration in Business School Curricula: Results of a Survey of Business Schools. 26 - Linda Volonino:
Electronic Evidence and Computer Forensics. 27
- Craig Van Slyke, Robert P. Bostrom, James F. Courtney, Ephraim R. McLean, Charles A. Snyder, Richard T. Watson:
Experts' Advice to Information Systems Doctoral Students. 28
- Gerald L. Hershey:
A Different Focus and Content for the Core Information Systems Course for Business School Majors. 29 - Steven Alter:
Sidestepping the IT Artifact, Scrapping the IS Silo, and Laying Claim to "Systems in Organizations". 30 - Donna Dufner:
The IS Core-I: Economic and Systems Engineering Approaches to IS Identity. 31 - Daniel J. Power:
The IS Core-II: The Maturing IS Discipline: Institutionalizing our Domain of Inquiry. 32 - The IS Core - III: The Core Domain Debate and the International Business Discipline: A Comparison. 33
- Donald J. McCubbrey:
The IS Core-IV: IS Research: A Third Way. 34 - Ruth A. Guthrie:
The IS Core - V: Defining the IS Core. 35 - Carol Saunders, Yu Andy Wu:
The IS Core - VI: Further Along the Road to the IT Artifact. 36 - Juhani Iivari:
The IS Core - VII: Towards Information Systems as a Science of Meta-Artifacts. 37 - Michael D. Myers:
The IS Core - VIII: Defining the Core Properties of the IS Disciplines: Not Yet, Not Now. 38 - Omar A. El Sawy:
The IS Core IX: The 3 Faces of IS Identity: Connection, Immersion, and Fusion. 39 - Christopher P. Holland:
The IS Core - X: Information Systems Research and Practice: IT Artifact or a Multidisciplinary Subject? 40 - Steven Alter:
The IS Core - XI: Sorting Out the Issues About the Core, Scope, and Identity of the IS Field. 41 - Paul Gray:
Introduction to the Debate on the Core of the Information Systems Field. 42 - Fay Cobb Payton, Robert B. Handfield:
Data Warehousing Implementation and Outsourcing Challenges: An Action Research Project with Solectron. 43 - Suzanne Iacono, John L. King, Kenneth L. Kraemer:
Rob Kling: A Remembrance. 44 - John W. Satzinger, Robert B. Jackson:
Making the Transition from OO Analysis to OO Design with the Unified Process. 45 - Kallol Kumar Bagchi, Godwin J. Udo:
An Analysis of the Growth of Computer and Internet Security Breaches. 46 - Kenneth J. Knapp, R. Franklin Morris Jr., R. Kelly Rainer Jr., Terry Anthony Byrd:
Defense Mechanisms of Biological Cells: A Framework for Network Security Thinking. 47 - David A. Bradbard, Bruce R. Lewis:
Technical Note: Desktop Management in Practice. 48 - Ken Abernethy, Han Reichgelt:
Global Diffusion of the Internet - II: National Differences in Web Site Connectivity. 49 - Younghwa Lee, Kenneth A. Kozar, Kai R. T. Larsen:
The Technology Acceptance Model: Past, Present, and Future. 50
- Paul Gray:
Editorial: CAIS, The First Five Years. 51

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.