default search action
Dwayne Whitten
Person information
- affiliation: Texas A&M University, College Station, TX, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2014
- [j21]Dwayne Whitten, Ross Hightower, Lutfus Sayeed:
Mobile Device Adaptation Efforts: The Impact of Hedonic and Utilitarian Value. J. Comput. Inf. Syst. 55(1): 48-58 (2014) - 2011
- [j20]Subrata Chakrabarty, Dwayne Whitten:
The Sidelining of Top IT Executives in the Governance of Outsourcing: Antecedents, Power Struggles, and Consequences. IEEE Trans. Engineering Management 58(4): 799-814 (2011) - 2010
- [j19]Dwayne Whitten, Subrata Chakrabarty, Robin L. Wakefield:
The strategic choice to continue outsourcing, switch vendors, or backsource: Do switching costs matter? Inf. Manag. 47(3): 167-175 (2010) - [j18]Timothy R. Kayworth, Dwayne Whitten:
Effective Information Security Requires a Balance of Social and Technology Factors. MIS Q. Executive 9(3): 5 (2010) - 2008
- [j17]Subrata Chakrabarty, Dwayne Whitten, Kenneth W. Green Jr.:
Understanding Service Quality and Relationship Quality in is Outsourcing: Client Orientation & Promotion, Project Management Effectiveness, and the Task-Technology-Structure Fit. J. Comput. Inf. Syst. 48(2): 1-15 (2008) - [j16]Dwayne Whitten:
The Chief Information Security Officer: An Analysis of the Skills Required for Success. J. Comput. Inf. Syst. 48(3): 15-19 (2008) - 2007
- [j15]Kenneth W. Green Jr., Subrata Chakrabarty, Dwayne Whitten:
Organisational culture of customer care: market orientation and service quality. Int. J. Serv. Stand. 3(2): 137-153 (2007) - 2006
- [j14]Dwayne Whitten, Dorothy E. Leidner:
Bringing IT Back: An Analysis of the Decision to Backsource or Switch Vendors. Decis. Sci. 37(4): 605-621 (2006) - [j13]Robin L. Wakefield, Dwayne Whitten:
Mobile computing: a user study on hedonic/utilitarian mobile device usage. Eur. J. Inf. Syst. 15(3): 292-300 (2006) - [j12]Kara Borgmeyer, Dwayne Whitten, Timothy R. Kayworth:
Telemedicine: developing a framework to classify technology strategies. Int. J. Electron. Heal. 2(2): 105-116 (2006) - [j11]Ha-Kion Daniel Wong, Dwayne Whitten:
Diffusion of pervasive technologies: a preliminary investigation. Int. J. Serv. Stand. 2(3): 215-227 (2006) - [j10]Robin L. Wakefield, Dwayne Whitten:
Examining User Perceptions of Third-Party Organizations Credibility and Trust in an E-Retailer. J. Organ. End User Comput. 18(2): 1-19 (2006) - [j9]Dwayne Whitten, Robin L. Wakefield:
Measuring switching costs in IT outsourcing services. J. Strateg. Inf. Syst. 15(3): 219-248 (2006) - 2005
- [j8]Timothy R. Kayworth, Leslie Brocato, Dwayne Whitten:
What is a Chief Privacy Officer? An Analysis Based on Mintzberg's Taxonomy of Managerial Roles. Commun. Assoc. Inf. Syst. 16: 6 (2005) - [j7]Dwayne Whitten, Kenneth W. Green Jr.:
The effect of switching costs on intent to switch: an application in IS service provision markets. Int. J. Mob. Commun. 3(4): 428-444 (2005) - [j6]Kenneth W. Green Jr., Dwayne Whitten, Bobby Medlin:
Impact of relational differences on supervisor/subordinate dyad. Ind. Manag. Data Syst. 105(3): 369-383 (2005) - [j5]Dwayne Whitten:
User Information Satisfaction Scale Reduction: Application in an it Outsourcing Environment. J. Comput. Inf. Syst. 45(2): 17-26 (2005) - 2004
- [j4]Kenneth W. Green Jr., Bobby Medlin, Dwayne Whitten:
Developing optimism to improve performance: an approach for the manufacturing sector. Ind. Manag. Data Syst. 104(2): 106-114 (2004) - [j3]Kent S. Faught, Dwayne Whitten, Kenneth W. Green Jr.:
Doing Survey Research on the Internet: Yes, Timing Does Matter. J. Comput. Inf. Syst. 44(3): 26-34 (2004) - 2002
- [j2]Dwayne Whitten, Charlotte Stephens:
A Meta-Analysis of Emerging Infomediary Knowledge Management Systems: An Expert Systems Application in the E-Tailing Environment. J. Comput. Inf. Syst. 43(1): 48-54 (2002) - 2000
- [j1]G. Dwayne Whitten, K. Michael Casey, T. Selwyn Ellis:
Electronic Economies of Scope: Investigating Synergies from Procuring and Selling on the Web. J. Comput. Inf. Syst. 41(1): 61-65 (2000)
Conference and Workshop Papers
- 2020
- [c5]Jordana J. George, G. Dwayne Whitten:
Blockchain in the Role of Emancipatory Technology. AMCIS 2020 - 2010
- [c4]Dwayne Whitten:
Adaptability in IT Sourcing: The Impact of Switching Costs. Global Sourcing Workshop 2010: 202-216 - 2009
- [c3]Dwayne Whitten:
Adaptability in IT Sourcing: The Impact of Switching Costs. AMCIS 2009: 799 - 2004
- [c2]Dwayne Whitten, Charlotte Stephens, Sean Dwyer, Timothy Ellis:
Discontinuations of Application Development Outsourcing Contracts. AMCIS 2004: 443 - 2003
- [c1]Dwayne Whitten:
An Examination of Information Systems Service Quality Measurement: The Contribution of the SERVQUAL Instrument from the Marketing Literature. AMCIS 2003: 369
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint