default search action
Information Resources Management Journal, Volume 18
Volume 18, Number 1, 2005
- Denise Johnson McManus, Houston H. Carr, Charles A. Snyder:
An Investigation of Telecommunications as a Plan Location Decision Criterion. 1-13 - Laura Lally:
Information Technology as a Target and Shield in the Post 9/11 Environment. 14-28 - Alan R. Peslak:
Internet Privacy Policies: A Review and Survey of the Fortune 50. 29-41 - Tatyana V. Bondarouk, Klaas Sikkel:
Explaining IT Implementation Through Group Learning. 42-60 - Deirdre A. Folkers:
Competing in the Marketspace: Incorporating Online Education into High Education - An Organizational Perspective. 61-77
Volume 18, Number 2, 2005
- Mary C. Jones:
Tacit Knowledge Sharing During ERP Implementation: A Multi-Site Case Study. 1-23 - Craig Van Slyke, France Bélanger, Varadharajan Sridhar:
A Comparison of American and Indian Consumers' Perceptions of Electronic Commerce. 24-40 - Ned Kock:
Compensatory Adaptation to Media Obstacles: An Experimental Study of Process Redesign Dyads. 41-67 - Omar E. M. Khalil, Manal M. Elkordy:
EIS Information: Use and Quality Determinants. 68-93 - Victoria Y. Yoon, Barbara D. Broome, Rahul Singh, Tor Guimaraes:
Using Agent Technology for Company Knowledge Management. 94-113
Volume 18, Number 3, 2005
- Sanjay Bapna, Aryya Gangopadhyay:
A Web-Based GIS for Analyzing Commercial Motor Vehicle Crashes. 1-12 - Virginia Ilie, Craig Van Slyke, Gina Green, Hao Lou:
Gender Differences in Perceptions and Use of Communication Technologies: A Diffusion of Innovation Approach. 13-31 - D. Harrison McKnight, Norman L. Chervany:
What Builds System Troubleshooter Trust the Best: Experiential or Non-Experiential Factors? 32-49 - J. Michael Pearson, Ann M. Pearson, J. P. Shim:
The Relevancy of Information Systems Research: The Practitioner's View. 50-67 - Ronald Dattero, Stuart Diaz Galup, Jim Jing Quan:
Assessing Gender Differences in Software Developers Using the Human Capital Model. 68-87
Volume 18, Number 4, 2005
- Margi Levy, Philip Powell, Les Worrall:
Strategic Intent and E-Business in SMEs: Enablers and Inhibitors. 1-20 - Neil F. Doherty, Heather Fulford:
Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis. 21-39 - Abhishek Nirjar, Andrew Tylecote:
Breaking Out of Lock-In: Insights from Case Studies into Ways Up the Value Ladder for Indian Software SMEs. 40-61 - Monideepa Tarafdar, Jie Jennifer Zhang:
Analyzing the Influence of Web Site Design Parameters on Web Site Usability. 62-80 - Souren Paul, Carol Stoak Saunders, William (Dave) Haseman:
A Question of Timing: The Impact of Information Acquisitions on Group Design Making. 81-99
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.