Search dblp for Publications

export results for "toc:db/journals/isj/isj24.bht:"

 download as .bib file

@article{DBLP:journals/isj/Bergvall-KarebornH14,
  author       = {Birgitta Bergvall{-}K{\aa}reborn and
                  Debra Howcroft},
  title        = {Persistent problems and practices in information systems development:
                  a study of mobile applications development and distribution},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {5},
  pages        = {425--444},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12036},
  doi          = {10.1111/ISJ.12036},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/Bergvall-KarebornH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/BodkerGH14,
  author       = {Mads B{\o}dker and
                  Gregory Gimpel and
                  Jonas Hedman},
  title        = {Time-out/time-in: the dynamics of everyday experiential computing
                  devices},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {2},
  pages        = {143--166},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12002},
  doi          = {10.1111/ISJ.12002},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/BodkerGH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/CarloGLR14,
  author       = {Jessica Luo Carlo and
                  James E. Gaskin and
                  Kalle Lyytinen and
                  Gregory M. Rose},
  title        = {Early vs. late adoption of radical information technology innovations
                  across software development organizations: an extension of the disruptive
                  information technology innovation model},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {6},
  pages        = {537--569},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12039},
  doi          = {10.1111/ISJ.12039},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isj/CarloGLR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/ChangLC14,
  author       = {I{-}Cheng Chang and
                  Chuang{-}Chun Liu and
                  Kuanchin Chen},
  title        = {The push, pull and mooring effects in virtual migration for social
                  networking sites},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {4},
  pages        = {323--346},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12030},
  doi          = {10.1111/ISJ.12030},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isj/ChangLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/ChiuWFH14,
  author       = {Chao{-}Min Chiu and
                  Eric T. G. Wang and
                  Yu{-}Hui Fang and
                  Hsin{-}Yi Huang},
  title        = {Understanding customers' repeat purchase intentions in {B2C} e-commerce:
                  the roles of utilitarian value, hedonic value and perceived risk},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {1},
  pages        = {85--114},
  year         = {2014},
  url          = {https://doi.org/10.1111/j.1365-2575.2012.00407.x},
  doi          = {10.1111/J.1365-2575.2012.00407.X},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/ChiuWFH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/Davison14,
  author       = {Robert M. Davison},
  title        = {Editorial},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {3},
  pages        = {203--205},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12035},
  doi          = {10.1111/ISJ.12035},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/Davison14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/Davison14a,
  author       = {Robert M. Davison},
  title        = {Editorial - Cultural Bias in Reviews and Mitigation Options},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {6},
  pages        = {475--477},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12046},
  doi          = {10.1111/ISJ.12046},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/Davison14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/HardinLF14,
  author       = {Andrew M. Hardin and
                  Clayton A. Looney and
                  Mark A. Fuller},
  title        = {Self-efficacy, learning method appropriation and software skills acquisition
                  in learner-controlled {CSSTS} environments},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {1},
  pages        = {3--27},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12016},
  doi          = {10.1111/ISJ.12016},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/HardinLF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/HerathCWBWR14,
  author       = {Tejaswini C. Herath and
                  Rui Chen and
                  Jingguo Wang and
                  Ketan Banjara and
                  Jeff Wilbur and
                  H. Raghav Rao},
  title        = {Security services as coping mechanisms: an investigation into user
                  intention to adopt an email authentication service},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {1},
  pages        = {61--84},
  year         = {2014},
  url          = {https://doi.org/10.1111/j.1365-2575.2012.00420.x},
  doi          = {10.1111/J.1365-2575.2012.00420.X},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isj/HerathCWBWR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/HsuC14,
  author       = {Meng{-}Hsiang Hsu and
                  Chun{-}Ming Chang},
  title        = {Examining interpersonal trust as a facilitator and uncertainty as
                  an inhibitor of intra-organisational knowledge sharing},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {2},
  pages        = {119--142},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12000},
  doi          = {10.1111/ISJ.12000},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/HsuC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/HustadO14,
  author       = {Eli Hustad and
                  Dag H. Olsen},
  title        = {Educating reflective Enterprise Systems practitioners: a design research
                  study of the iterative building of a teaching framework},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {5},
  pages        = {445--473},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12032},
  doi          = {10.1111/ISJ.12032},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/HustadO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/Jung14,
  author       = {Yoonhyuk Jung},
  title        = {What a smartphone is to me: understanding user values in using smartphones},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {4},
  pages        = {299--321},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12031},
  doi          = {10.1111/ISJ.12031},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/Jung14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/JungL14,
  author       = {Yusun Jung and
                  Kalle Lyytinen},
  title        = {Towards an ecological account of media choice: a case study on pluralistic
                  reasoning while choosing email},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {3},
  pages        = {271--293},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12024},
  doi          = {10.1111/ISJ.12024},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/JungL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/LiS0L14,
  author       = {Han Li and
                  Rathindra Sarathy and
                  Jie Zhang and
                  Xin (Robert) Luo},
  title        = {Exploring the effects of organizational justice, personal ethics and
                  sanction on internet use policy compliance},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {6},
  pages        = {479--502},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12037},
  doi          = {10.1111/ISJ.12037},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isj/LiS0L14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/LioliouZWG14,
  author       = {Eleni Lioliou and
                  Angelika Zimmermann and
                  Leslie P. Willcocks and
                  Lan Gao},
  title        = {Formal and relational governance in {IT} outsourcing: substitution,
                  complementarity and the role of the psychological contract},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {6},
  pages        = {503--535},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12038},
  doi          = {10.1111/ISJ.12038},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/LioliouZWG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/MirchandaniL14,
  author       = {Dinesh A. Mirchandani and
                  Albert L. Lederer},
  title        = {Autonomy and procedural justice in strategic systems planning},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {1},
  pages        = {29--59},
  year         = {2014},
  url          = {https://doi.org/10.1111/j.1365-2575.2012.00419.x},
  doi          = {10.1111/J.1365-2575.2012.00419.X},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/MirchandaniL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/Olesen14,
  author       = {Karin Olesen},
  title        = {Implications of dominant technological frames over a longitudinal
                  period},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {3},
  pages        = {207--228},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12006},
  doi          = {10.1111/ISJ.12006},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/Olesen14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/Powell14,
  author       = {Philip Powell},
  title        = {Editorial},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {2},
  pages        = {115--117},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12033},
  doi          = {10.1111/ISJ.12033},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/Powell14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/Powell14a,
  author       = {Philip Powell},
  title        = {Editorial},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {5},
  pages        = {373--374},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12045},
  doi          = {10.1111/ISJ.12045},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/Powell14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/PozzebonMN14,
  author       = {Marlei Pozzebon and
                  Dale Mackrell and
                  Susan H. Nielsen},
  title        = {Structuration bridging diffusion of innovations and gender relations
                  theories: a case of paradigmatic pluralism in {IS} research},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {3},
  pages        = {229--248},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12007},
  doi          = {10.1111/ISJ.12007},
  timestamp    = {Wed, 20 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/PozzebonMN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/ReimersLXG14,
  author       = {Kai Reimers and
                  Mingzhi Li and
                  Bin Xie and
                  Xunhua Guo},
  title        = {How do industry-wide information infrastructures emerge? {A} life
                  cycle approach},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {5},
  pages        = {375--424},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12034},
  doi          = {10.1111/ISJ.12034},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/ReimersLXG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/Trauth14,
  author       = {Eileen M. Trauth},
  title        = {Editorial},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {1},
  pages        = {1--2},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12029},
  doi          = {10.1111/ISJ.12029},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/Trauth14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/TrauthDP14,
  author       = {Eileen M. Trauth and
                  Robert M. Davison and
                  Philip Powell},
  title        = {Editorial},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {4},
  pages        = {295--297},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12040},
  doi          = {10.1111/ISJ.12040},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/TrauthDP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/TrussonDH14,
  author       = {Clive R. Trusson and
                  Neil F. Doherty and
                  Donald Hislop},
  title        = {Knowledge sharing using {IT} service management tools: conflicting
                  discourses and incompatible practices},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {4},
  pages        = {347--371},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12025},
  doi          = {10.1111/ISJ.12025},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isj/TrussonDH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/VenkateshSV14,
  author       = {Viswanath Venkatesh and
                  Tracy Ann Sykes and
                  Srinivasan Venkatraman},
  title        = {Understanding e-Government portal use in rural India: role of demographic
                  and personality characteristics},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {3},
  pages        = {249--269},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12008},
  doi          = {10.1111/ISJ.12008},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/VenkateshSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/ZimmermannR14,
  author       = {Angelika Zimmermann and
                  M. N. Ravishankar},
  title        = {Knowledge transfer in {IT} offshoring relationships: the roles of
                  social capital, efficacy and outcome expectations},
  journal      = {Inf. Syst. J.},
  volume       = {24},
  number       = {2},
  pages        = {167--202},
  year         = {2014},
  url          = {https://doi.org/10.1111/isj.12027},
  doi          = {10.1111/ISJ.12027},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isj/ZimmermannR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics