default search action
Information Technology and Management, Volume 11
Volume 11, Number 1, March 2010
- Fidan Boylu, Haldun Aytug, Gary J. Koehler:
Data mining with agent gaming. 1-6 - Tridib Bandyopadhyay, Varghese S. Jacob, Srinivasan Raghunathan:
Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest. 7-23 - Thomas Neubauer, Christian Stummer:
Interactive selection of Web services under multiple objectives. 25-41 - Sangjae Lee, Kun Chang Lee:
The relationship among formal EDI controls, knowledge of EDI controls, and EDI performance. 43-59
Volume 11, Number 2, June 2010
- Brian P. Cozzarin, Jennifer Percival:
IT, productivity and organizational practices: large sample, establishment-level evidence. 61-76 - Artur Dubrawski, John Östlund, Lujie Chen, Andrew W. Moore:
Computationally efficient scoring of activity using demographics and connectivity of entities. 77-89 - Yung-Ming Li, Jhih-Hua Jhang-Li, Ding-Yuan Cheng:
Reward mechanisms for P2P VoIP networks. 91-105
Volume 11, Number 3, September 2010
- Kathryn W. Jablokow, Andrei G. Jablokow, C. T. Seasock:
IT leadership from a problem solving perspective. 107-122 - Xiaobo Xu, Weiyong Zhang, Reza Barkhi:
IT infrastructure capabilities and IT project success: a development team perspective. 123-142 - Hee J. Mun, Haejung Yun, Eun A. Kim, Jin Y. Hong, Choong C. Lee:
Research on factors influencing intention to use DMB using extended IS success model. 143-155
Volume 11, Number 4, December 2010
- Robert J. Kauffman, Angsana A. Techatassanasoontorn:
New theoretical perspectives on technology adoption. 157-160 - Jonas Hedman, Gregory Gimpel:
The adoption of hyped technologies: a qualitative study. 161-175 - María Bermúdez-Edo, Nuria Hurtado-Torres, Juan Alberto Aragón-Correa:
The importance of trusting beliefs linked to the corporate website for diffusion of recruiting-related online innovations. 177-189 - Robert J. Kauffman, Hsiangchu Lai, Huang-chi Lin:
Consumer adoption of group-buying auctions: an experimental study. 191-211
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.