default search action
Communications of the Association for Information Systems, Volume 28
Volume 28, 2011
- Mukul Gupta, Alok R. Chaturvedi, Shailendra Raj Mehta:
Economic Analysis of Tradeoffs Between Security and Disaster Recovery. 1
- Albert L. Harris, France Bélanger, Karen Loch, Meg Murray, Andrew Urbaczewski:
Study Abroad as an Education Experience: Challenges, Realizations, and Lessons Learned. 2 - Albert L. Harris, Joey F. George, Mary Granger, Geoffrey N. Dick:
Faculty Exchanges as a Way to Increase Globalization in the IS Curriculum. 3
- Gary F. Templeton:
A Two-Step Approach for Transforming Continuous Variables to Normal: Implications and Recommendations for IS Research. 4
- Andrew Urbaczewski, Ramesh Venkataraman, Paul Kontogiorgis:
IT Services Management in the Curriculum: Challenges, Realizations, and Lessons Learned. 5
- Jan Recker, Alexander Dreiling:
The Effects of Content Presentation Format and User Characteristics on Novice Developers' Understanding of Process Models. 6 - Debabrata Talukdar, Dinesh K. Gauri:
Home Internet Access and Usage in the USA: Trends in the Socio-Economic Digital Divide. 7 - Wullianallur Raghupathi, Sarah Jinhui Wu:
The Relationship Between Information and Communication Technologies and the Delivery of Public Health: A Country-level Study. 8 - Kris Ven, Jan Verelst:
An Empirical Investigation into the Assimilation of Open Source Server Software. 9 - Toomas Tamm, Peter B. Seddon, Graeme G. Shanks, Peter Reynolds:
How Does Enterprise Architecture Add Value to Organisations? 10
- Heather A. Smith, James D. McKeen:
The Identity Management Challenge. 11
- Wullianallur Raghupathi, Sarah Jinhui Wu:
The Relationship Between Information and Communication Technologies and Country Governance: An Exploratory Study. 12
- David Firth, John L. King, Hope Koch, Clayton Arlen Looney, Paul A. Pavlou, Eileen M. Trauth:
Addressing the Credibility Crisis in IS. 13
- Mark A. Serva, Hemant V. Kher, Jean-Philippe Laurenceau:
Using Latent Growth Modeling to Understand Longitudinal Effects in MIS Theory: A Primer. 14
- David Gefen, Arik Ragowsky, Paul Licker, Myles Stern:
The Changing Role of the CIO in the World of Outsourcing: Lessons Learned from a CIO Roundtable. 15 - Heather A. Smith, James D. McKeen:
Enabling Collaboration with IT. 16
- William W. Agresti:
Toward an IT Agenda. 17
- Vlad Krotov, Serguei Boukhonine, Blake Ives:
ERP Implementation Gone Terribly Wrong: The Case of Natural Springs. 18
- Jonny Holmström, Duane Truex:
Dropping Your Tools: Exploring When and How Theories Can Serve as Blinders in IS Research. 19
- Wm. David Salisbury, David W. Miller, Jason M. Turner:
On Contending with Unruly Neighbors in the Global Village: Viewing Information Systems as Both Weapon and Target. 20
- Haejung Yun, Choong C. Lee, Byung Geun Kim, William J. Kettinger:
What Determines Actual Use of Mobile Web Browsing Services? A Contextual Study in Korea. 21 - Stefan Fenz, Andreas Ekelhart, Thomas Neubauer:
Information Security Risk Management: In Which Security Solutions Is It Worth Investing? 22
- Michael David Myers, Richard L. Baskerville, Grandon Gill, Neil C. Ramiller:
Setting Our Research Agendas: Institutional Ecology, Informing Sciences, or Management Fashion Theory? 23 - Jan H. Kroeze, Hugo Lotriet, Nehemiah Mavetera, Mark S. Pfaff, Dirk Postma, Kosheek Sewchurran, Heikki Topi:
ECIS 2010 Panel Report: Humanities-Enriched Information Systems. 24 - Jan vom Brocke, Jörg Becker, Alessio Maria Braccini, Rimantas Butleris, Birgit Hofreiter, Kestutis Kapocius, Marco de Marco, Günter Schmidt, Stefan Seidel, Alexander Simons, Tomás Skopal, Armin Stein, Stefan Stieglitz, Reima Suomi, Gottfried Vossen, Robert Winter, Stanislaw Wrycza:
Current and Future Issues in BPM Research: A European Perspective from the ERCIS Meeting 2010. 25
- Nianxin Wang, Yajiong Xue, Huigang Liang, Shilun Ge:
The Road to Business-IT Alignment: A Case Study of Two Chinese Companies. 26
- Heikki Topi, Markus Helfert, Venkataraman Ramesh, Rolf T. Wigand:
Future of Master's Level Education in Information Systems. 27
- Yuan Li:
Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework. 28
- Jeff Baker, Michel Avital, Gordon B. Davis, Frank Land, Howard Morgan, James C. Wetherbe:
ICIS 2010 Panel Report: Technologies that Transform Business and Research: Lessons from the Past as We Look to the Future. 29
- Parag Kosalge, Debabroto Chatterjee:
Look Before You Leap into ERP Implementation: An Object-Oriented Approach to Business Process Modeling. 30 - T. M. Rajkumar, Paul V. Anderson, John Benamati, Jeffrey W. Merhout:
Are Student Self-Assessments a Valid Proxy for Direct Assessments in Efforts to Improve Information Systems Courses and Programs? An Empirical Study. 31 - Harvey G. Enns, Dean McFarlin, Paul D. Sweeney:
How CIOs Overcome the Competing Values Challenge: Irish CIOs' Perspectives. 32
- Kirstin Gillon, Louis Branz, Mary J. Culnan, Gurpreet Dhillon, Robert Hodgkinson, Alastair MacWillson:
Information Security and Privacy - Rethinking Governance Models. 33
- Chen Ye, Richard Potter:
The Role of Habit in Post-Adoption Switching of Personal Information Technologies: An Empirical Investigation. 35 - Zhong Liu, Jason Whalley:
Anti-Competitive Behaviors in Managed Competition: The Case of China's Telecommunications Industry. 36
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.