default search action
Data Base, Volume 37
Volume 37, Number 1, Winter 2006
- Wynne W. Chin, Dorothy E. Leidner:
From the editors. 4 - Janice C. Sipior, Diane Lending, Donald L. Amoroso, Conrad Shayo, Susan A. Vowels:
From the chair. 5 - Vital Roy, Carmen Bernier, Lucie Léveillé:
The high wire balancing act of the IS project director. 8-39 - Rajiv Kohli, Ellen D. Hoadley:
Towards developing a framework for measuring organizational impact of IT- enabled BPR: case studies of three firms. 40-58 - Hee-Woong Kim, Shan Ling Pan:
Towards a process model of information systems implementation: the case of customer relationship management (CRM). 59-76 - David C. Blair:
The data-document distinction revisited. 77-96 - Alexander Perez-Pons:
Object prefetching using semantic links. 97-109
Volume 37, Numbers 2-3, Spring - Summer 2006
- Wynne W. Chin, Dorothy E. Leidner:
From the editors. 5-6 - Janice C. Sipior, Diane Lending, Donald L. Amoroso, Conrad Shayo, Susan A. Vowels:
From the chair. 7
- Susan A. Brown, Helen Kelley, Andrew Schwarz:
Reflections on the role of theoretical extensions in the IS discipline. 8-14
- En Mao, Prashant Palvia:
Testing an extended model of IT acceptance in the Chinese cultural context. 20-32 - Yulin Fang, Derrick J. Neufeld:
The pendulum swings back: individual acceptance of re-centralized application platforms. 33-41 - Yuan Gao, Marios Koufaris:
Perceptual antecedents of user attitude in electronic commerce. 42-50 - Liping Liu, Qingxiong Ma:
Perceived system performance: a test of an extended technology acceptance model. 51-59 - Younghwa Lee, Jintae Lee, Zoonky Lee:
Social influence on technology acceptance behavior: self-identity theory perspective. 60-75 - Bonnie Glassberg, Varun Grover, James T. C. Teng:
Information systems research with an attitude. 76-85 - Tim Goles, Gregory B. White, Nicole Beebe, Carlos Alberto Dorantes, Barbara Hewitt:
Moral intensity and ethical decision-making: a contextual extension. 86-95 - Diane M. Strong, Mark T. Dishaw, D. Brent Bandy:
Extending task technology fit with computer self-efficacy. 96-107 - Xin Li, Traci J. Hess, Joseph S. Valacich:
Using attitude and social influence to develop an extended trust model for information systems. 108-124 - Trevor T. Moores, Jerry Cha-Jan Chang, Deborah K. Smith:
Clarifying the role of self-efficacy and metacognition as predictors of performance: construct development and test. 125-132 - Jason Bennett Thatcher, Yongmei Liu, Lee P. Stepina, Joseph M. Goodman, Darren C. Treadway:
IT worker turnover: an empirical examination of intrinsic motivation. 133-146 - Wm. David Salisbury, Traci A. Carte, Laku Chidambaram:
Cohesion in virtual teams: validating the perceived cohesion scale in a distributed setting. 147-155 - Moez Limayem:
Human versus automated facilitation in the GSS context. 156-166 - Kevin E. Dow, Gary Hackbarth, Jeffrey A. Wong:
Enhancing customer value through IT investments: a NEBIC perspective. 167-175 - Liming Guan, Steve G. Sutton, C. Janie Chang, Vicky Arnold:
Further evidence on shareholder wealth effects of announcements for newly created CIO positions. 176-191
Volume 37, Number 4, Fall 2006
- Dorothy E. Leidner, Wynne W. Chin:
From the editors. 4-5 - Janice C. Sipior, Diane Lending, Donald L. Amoroso, Conrad Shayo, Susan A. Vowels:
From the chair. 6 - George M. Kasper:
IFIP report: IFIP TC 8 celebrates 30 years! 7
- Eileen M. Trauth, Fred Niederman:
Achieving diversity in the IT workforce: issues & interventions. 8-10
- Lynette Kvasny:
Let the sisters speak: understanding information technology from the standpoint of the 'other'. 13-25 - K. D. Joshi, Nancy L. Schmidt:
Is the information systems profession gendered?: characterization of IS professionals and IS career. 26-41 - Sandra Katz, David Allbritton, John M. Aronis, Christine Wilson, Mary Lou Soffa:
Gender, achievement, and persistence in an undergraduate computer science program. 42-57 - Cynthia K. Riemenschneider, Deborah J. Armstrong, Myria W. Allen, Margaret F. Reid:
Barriers facing women in the IT work force. 58-78 - Andrea Hoplight Tapia:
Hostile work environment.com: increasing participation of underrepresented groups, lessons learned from the dot-com era. 79-98
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.