default search action
Niv Ahituv
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [c9]Maya Daneva, Niv Ahituv:
What agile ERP consultants think of requirements engineering for inter-organizational ERP Systems: Insights from a Focus Group in BeNeLux. EASE 2012: 284-288 - [c8]Ronit Purian, Niv Ahituv, Adi Ashkenazy:
The richness of barriers to public participation: Multi-layered system of real estate data from multiple sources. MCIS (Short Papers) 2012: 17 - 2011
- [j37]Maya Daneva, Niv Ahituv:
What Practitioners Think of Inter-organizational ERP Requirements Engineering Practices: Focus Group Results. Int. J. Inf. Syst. Model. Des. 2(3): 49-74 (2011) - 2010
- [j36]Elad Segev, Niv Ahituv:
Popular Searches in Google and Yahoo!: A "Digital Divide" in Information Uses? Inf. Soc. 26(1): 17-37 (2010) - [c7]Maya Daneva, Niv Ahituv:
A focus group study on inter-organizational ERP requirements engineering practices. ESEM 2010 - [c6]Ronit Purian, Niv Ahituv, Phillip Ein-Dor:
Evaluating and Ranking Local E-Government Services. MCIS 2010: 68 - [c5]Maya Daneva, Niv Ahituv:
Evaluating cross-organizational ERP requirements engineering practices: a focus group study. RCIS 2010: 279-286
2000 – 2009
- 2009
- [j35]Daphna Shwarts-Asher, Niv Ahituv, Dalia Etzion:
Modelling the characteristics of virtual teams' structure. Int. J. Bus. Intell. Data Min. 4(2): 195-212 (2009) - [c4]Niv Ahituv:
eGovernment for Low Socio-Economic Status. AMCIS 2009: 298 - [c3]Daphna Shwarts-Asher, Niv Ahituv, Dalia Etzion:
Computer-Mediated Group Interaction Processes. CISIS 2009: 255-262 - 2008
- [j34]Nitza Geri, Niv Ahituv:
A Theory of Constraints approach to interorganizational systems implementation. Inf. Syst. E Bus. Manag. 6(4): 341-360 (2008) - 2007
- [j33]Elad Segev, Niv Ahituv, Karine Barzilai-Nahon:
Mapping Diversities and Tracing Trends of Cultural Homogeneity/Heterogeneity in Cyberspace. J. Comput. Mediat. Commun. 12(4): 1269-1297 (2007) - 2005
- [j32]Niv Ahituv, Gil Greenstein:
The impact of accessibility on the value of information and the productivity paradox. Eur. J. Oper. Res. 161(2): 505-524 (2005) - 2003
- [j31]Moshe Zviran, Niv Ahituv, Chanan Glezer:
A conceptual model for increasing utilization of dependable computer networks. Data Knowl. Eng. 46(3): 247-269 (2003) - 2002
- [j30]Niv Ahituv, Seev Neumann, Moshe Zviran:
A System Development Methodology for ERP Systems. J. Comput. Inf. Syst. 42(3): 56-67 (2002) - 2001
- [j29]Niv Ahituv:
The open information society. Commun. ACM 44(6): 48-52 (2001) - [j28]Niv Ahituv, Yuval Elovici:
Performance evaluation of a distributed application. J. Oper. Res. Soc. 52(8): 916-927 (2001) - [j27]Moshe Zviran, Niv Ahituv, Aviad Armoni:
Building outsourcing relationships across the global community: the UPS-Motorola experience. J. Strateg. Inf. Syst. 10(4): 313-333 (2001) - 2000
- [j26]Arik Ragowsky, Niv Ahituv, Seev Neumann:
The benefits of using information systems. Commun. ACM 43(11es): 13 (2000)
1990 – 1999
- 1999
- [j25]Niv Ahituv, Moshe Zviran, Chanan Glezer:
Top Management Toolbox for Managing Corporate IT. Commun. ACM 42(4): 93-99 (1999) - 1998
- [j24]Niv Ahituv, Jehiel Zif, Isaac Machlin:
Environmental scanning and information systems in relation to success in introducing new products. Inf. Manag. 33(4): 201-211 (1998) - [j23]Niv Ahituv, Magid Igbaria, Aviem Sella:
The Effects of Time Pressure and Completeness of Information on Decision Making. J. Manag. Inf. Syst. 15(2): 153-172 (1998) - 1996
- [j22]Arik Ragowsky, Niv Ahituv, Seev Neumann:
Identifying the value and importance of an information system application. Inf. Manag. 31(2): 89-102 (1996) - [c2]Niv Ahituv, Opher Etzion, Seev Neumann, Sheizaf Rafaeli, Peretz Shoval, Dov Te'eni:
Panel: Academia influencing the National IT Policy: IS research and education in Israel. ECIS 1996: 1343-1344 - 1995
- [j21]Ran Giladi, Niv Ahituv:
SPEC as a Performance Evaluation Measure. Computer 28(8): 33-42 (1995) - 1992
- [j20]Seev Neumann, Niv Ahituv, Moshe Zviran:
A measure for determining the strategic relevance of IS to the organization. Inf. Manag. 22(5): 281-299 (1992)
1980 – 1989
- 1989
- [j19]Niv Ahituv, Seev Neumann, Moshe Zviran:
Factors Affecting the Policy for Distributing Computing Resources. MIS Q. 13(4): 389-401 (1989) - [c1]Niv Ahituv:
Assessing the value of information. ICIS 1989: 315-325 - 1988
- [j18]Niv Ahituv, Magid Igbaria:
A Model for Predicting and Evaluating Computer Resource Consumption. Commun. ACM 31(12): 1467-1473 (1988) - [j17]Niv Ahituv, Yeheskel Lapid, Seev Neumann:
Protecting statistical databases against retrieval of private information. Comput. Secur. 7(1): 59-63 (1988) - [j16]Niv Ahituv, Yoav Benjamini, Magid Igbaria:
A compumetrical approach for analysis and clustering of computer system performance variables. Comput. Oper. Res. 15(6): 489-496 (1988) - [j15]Niv Ahituv, Magid Igbaria:
A model to facilitate costing, pricing and budgeting of computer services. Inf. Manag. 14(5): 235-241 (1988) - 1987
- [j14]Niv Ahituv, Yeheskel Lapid, Seev Neumann:
Processing Encrypted Data. Commun. ACM 30(9): 777-780 (1987) - [j13]Niv Ahituv:
A Metamodel of Information Flow: A Tool to Support Information Systems Theory. Commun. ACM 30(9): 781-791 (1987) - [j12]Niv Ahituv, Yeheskel Lapid, Seev Neumann:
Verifying the authentication of an information system user. Comput. Secur. 6(2): 152-157 (1987) - [j11]Nachman Agmon, Niv Ahituv:
Assessing Data Reliability in an Information System. J. Manag. Inf. Syst. 4(2): 34-44 (1987) - [j10]Niv Ahituv, Meir Zelek:
Instant Quality Control of Large Batch Processing Jobs. MIS Q. 11(3): 313-323 (1987) - 1986
- [j9]Yeheskel Lapid, Niv Ahituv, Seev Neumann:
Approaches to handling "Trojan Horse" threats. Comput. Secur. 5(3): 251-256 (1986) - 1985
- [j8]Zvi Adar, Niv Ahituv, Oded Berman:
The value of an information system for service networks. Comput. Oper. Res. 12(1): 71-85 (1985) - 1984
- [j7]Niv Ahituv, Seev Neumann:
A Flexible Approach to Information Systems Developmoent. MIS Q. 8(2): 69-78 (1984) - 1981
- [j6]Niv Ahituv, Malcolm Munro, Yair Wand:
The value of information in information analysis. Inf. Manag. 4(3): 143-150 (1981) - [j5]Niv Ahituv, Jonathan Halpern:
Data and reports: Contents design and users allocation. J. Syst. Softw. 2(3): 193-199 (1981) - 1980
- [j4]Niv Ahituv:
A Systematic Approach Toward Assessing the Value of an Information System. MIS Q. 4(4): 61-75 (1980)
1970 – 1979
- 1978
- [j3]Niv Ahituv, Israel Borovits:
Analysis of the Purchase Option of Computers. Comput. J. 21(2): 105-109 (1978) - [j2]Niv Ahituv, Israel Borovits, Seev Neumann:
Selecting a job mix for running a benchmark by using an integer programming model. Comput. Oper. Res. 5(1): 73-79 (1978) - [j1]Niv Ahituv, Michael Hadass:
Organizational structure of a complex data processing department. Inf. Manag. 1(2): 53-57 (1978)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint