default search action
Search dblp for Publications
export results for "toc:db/journals/jcis/jcis53.bht:"
@article{DBLP:journals/jcis/BarelkaJW13, author = {Alexander J. Barelka and Anand Jeyaraj and Ryan G. Walinski}, title = {Content Acceptance Model and New Media Technologies}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {3}, pages = {56--64}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645632}, doi = {10.1080/08874417.2013.11645632}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/BarelkaJW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/BrockeRL13, author = {Jan vom Brocke and Ren{\'{e}} Riedl and Pierre{-}Majorique L{\'{e}}ger}, title = {Application Strategies for Neuroscience in Information Systems Design Science Research}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {3}, pages = {1--13}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645627}, doi = {10.1080/08874417.2013.11645627}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/BrockeRL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/Chong13, author = {Alain Yee{-}Loong Chong}, title = {Understanding Mobile Commerce Continuance Intentions: An Empirical Analysis of Chinese Consumers}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {4}, pages = {22--30}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645647}, doi = {10.1080/08874417.2013.11645647}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/Chong13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/DuanL13, author = {Qiang Duan and Yong Lu}, title = {Service-Oriented Network Discovery and Selection in Virtualization-Based Mobile Internet}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {3}, pages = {38--46}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645630}, doi = {10.1080/08874417.2013.11645630}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/DuanL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/DuttaPC13, author = {Amab Dutta and Guo Chao Alex Peng and Alok Choudhary}, title = {Risks in Enterprise Cloud Computing: The Perspective of it Experts}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {4}, pages = {39--48}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645649}, doi = {10.1080/08874417.2013.11645649}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/DuttaPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/GeH13, author = {Mouzhi Ge and Markus Helfert}, title = {Impact of Information Quality on Supply Chain Decisions}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {4}, pages = {59--67}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645651}, doi = {10.1080/08874417.2013.11645651}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/GeH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/JeongAR13, author = {Soon{-}Ki Jeong and Jong{-}Chang Ahn and Byung{-}Ho Rhee}, title = {Knowledge Transfer Activation Analysis: Knowledge Trade Perspective}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {3}, pages = {47--55}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645631}, doi = {10.1080/08874417.2013.11645631}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/JeongAR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/KappelmanZ13, author = {Leon A. Kappelman and John A. Zachman}, title = {The Enterprise and its Architecture: Ontology {\&} Challenges}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {4}, pages = {87--95}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645654}, doi = {10.1080/08874417.2013.11645654}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/KappelmanZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/KayhanB13, author = {Varol Onur Kayhan and Anol Bhattacherjee}, title = {Content Use from Websites: Effects of Governance Mechanisms}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {4}, pages = {68--80}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645652}, doi = {10.1080/08874417.2013.11645652}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/KayhanB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/KnowlesJ13, author = {Curtis Knowles and Vladan Jovanovic}, title = {Extensible Markup Language {(XML)} Schemas for Data Vault Models}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {4}, pages = {12--21}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645646}, doi = {10.1080/08874417.2013.11645646}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/KnowlesJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/KoohangP13, author = {Alex Koohang and Joanna Paliszkiewicz}, title = {Knowledge Construction in e-Learning: An Empirical Validation of an Active Learning Model}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {3}, pages = {109--114}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645637}, doi = {10.1080/08874417.2013.11645637}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/KoohangP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/Kuthadi13, author = {Venu Madhav Kuthadi}, title = {A New Data Stream Mining Algorithm for Interestingness-Rich Association Rules}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {3}, pages = {14--27}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645628}, doi = {10.1080/08874417.2013.11645628}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/Kuthadi13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/LeePL13, author = {Hyejung Lee and Jun{-}gi Park and Jungwoo Lee}, title = {Role of Leadership Competencies and Team Social Capital in it Services}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {4}, pages = {1--11}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645645}, doi = {10.1080/08874417.2013.11645645}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/LeePL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/LevyRH13, author = {Yair Levy and Michelle M. Ramim and Raymond A. Hackney}, title = {Assessing Ethical Severity of e-Learning Systems Security Attacks}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {3}, pages = {75--84}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645634}, doi = {10.1080/08874417.2013.11645634}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/LevyRH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/LuoWL13, author = {Xin (Robert) Luo and Merrill Warkentin and Han Li}, title = {Understanding Technology Adoption Trade-Offs: {A} Conjoint Analysis Approach}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {3}, pages = {65--74}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645633}, doi = {10.1080/08874417.2013.11645633}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/LuoWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/MellisLB13, author = {Werner Mellis and Claudia Loebbecke and Richard L. Baskerville}, title = {Requirements Uncertainty in Contract Software Development Projects}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {3}, pages = {97--108}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645636}, doi = {10.1080/08874417.2013.11645636}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/MellisLB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/NatekL13, author = {Srecko Natek and Dusan Lesjak}, title = {Improving Knowledge Management by Integrating Hei Process and Data Models}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {4}, pages = {81--86}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645653}, doi = {10.1080/08874417.2013.11645653}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/NatekL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/PaiMS13, author = {Dinesh R. Pai and Kevin Stanley McFall and Girish H. Subramanian}, title = {Software Effort Estimation Using a Neural Network Ensemble}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {4}, pages = {49--58}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645650}, doi = {10.1080/08874417.2013.11645650}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/PaiMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/Yang13, author = {Hongwei "Chris" Yang}, title = {Bon App{\'{e}}tit for Apps: Young American Consumers' Acceptance of Mobile Applications}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {3}, pages = {85--96}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645635}, doi = {10.1080/08874417.2013.11645635}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/Yang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/YuCKJ13, author = {Chia{-}Ping Yu and Houn{-}Gee Chen and Gary Klein and James J. Jiang}, title = {Risk Dynamics Throughout the System Development Life Cycle}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {3}, pages = {28--37}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645629}, doi = {10.1080/08874417.2013.11645629}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/YuCKJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ZhangCL13, author = {Ruidong Zhang and Jim Q. Chen and Ca Jaejung Lee}, title = {Mobile Commerce and Consumer Privacy Concerns}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {4}, pages = {31--38}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645648}, doi = {10.1080/08874417.2013.11645648}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/ZhangCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/AgrifoglioBMF12, author = {Rocco Agrifoglio and Sue Black and Concetta Metallo and Maria Ferrara}, title = {Extrinsic versus Intrinsic Motivation in Continued Twitter Usage}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {1}, pages = {33--41}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645594}, doi = {10.1080/08874417.2012.11645594}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/AgrifoglioBMF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ArmstrongNRR12, author = {Deborah J. Armstrong and Jason E. Nelms and Cynthia K. Riemenschneider and Margaret F. Reid}, title = {Revisiting the Barriers Facing Women in Information Systems}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {2}, pages = {65--74}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645615}, doi = {10.1080/08874417.2012.11645615}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/ArmstrongNRR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/CronanD12, author = {Timothy Paul Cronan and David E. Douglas}, title = {A Student {ERP} Simulation Game: {A} Longitudinal Study}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {1}, pages = {3--13}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645591}, doi = {10.1080/08874417.2012.11645591}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/CronanD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/DeaneA12, author = {Jason K. Deane and Anurag Agarwal}, title = {Scheduling Online Advertisements to Maximize Revenue under Non-Linear Pricing}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {2}, pages = {85--92}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645617}, doi = {10.1080/08874417.2012.11645617}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/DeaneA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/Grant12, author = {Delvin Grant}, title = {Shortening Requirements Engineering: Dual Imperative Action Research Study}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {2}, pages = {1--8}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645609}, doi = {10.1080/08874417.2012.11645609}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/Grant12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/HahnBKT12, author = {Inae Hahn and Christophe Bredillett and Gyeung{-}Min Kim and Magali Taloc}, title = {Agility of Project Manager in Global is Project}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {2}, pages = {31--38}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645612}, doi = {10.1080/08874417.2012.11645612}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/HahnBKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/HarrisGMC12, author = {Amy H. Harris and Timothy H. Greer and Steven A. Morris and W. Jeff Clark}, title = {Information Systems Job Market Late 1970'S-Early 2010'S}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {1}, pages = {72--79}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645599}, doi = {10.1080/08874417.2012.11645599}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/HarrisGMC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/HsiehY12, author = {Pei{-}Hsuan Hsieh and Kuo{-}Chuan (Martin) Yeh}, title = {Cultural Effects on Perceptions of Unauthorized Software Copying}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {1}, pages = {42--47}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645595}, doi = {10.1080/08874417.2012.11645595}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/HsiehY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/Huang12, author = {Leelien Ken Huang}, title = {The Impact of it Management Sophistication on Perceived it Importance in Strategic Alignment}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {2}, pages = {50--64}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645614}, doi = {10.1080/08874417.2012.11645614}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/Huang12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/HuangH12, author = {Eugenia Y. Huang and Travis K. Huang}, title = {Investigating the Antecedents of Users' Knowledge Sharing Intention}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {2}, pages = {93--102}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645618}, doi = {10.1080/08874417.2012.11645618}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/HuangH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/JonesH12, author = {Beth H. Jones and Lynn R. Heinrichs}, title = {Do Business Students Practice Smartphone Security?}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {2}, pages = {22--30}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645611}, doi = {10.1080/08874417.2012.11645611}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/JonesH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/KhalifaCS12, author = {Mohamed Khalifa and Sammi K. N. Cheng and Kathy Ning Shen}, title = {Adoption of Mobile Commerce: {A} Confidence Model}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {1}, pages = {14--22}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645592}, doi = {10.1080/08874417.2012.11645592}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/KhalifaCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/MorrisonCR12, author = {Rodger Morrison and Casey G. Cegielski and R. Kelly Rainer Jr.}, title = {Trust, Avatars, and Electronic Communications: Implications for E-Learning}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {1}, pages = {80--89}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645600}, doi = {10.1080/08874417.2012.11645600}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/MorrisonCR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/PrattHS12, author = {Jean A. Pratt and Karina Hauser and Cassidy R. Sugimoto}, title = {Cross-Disciplinary Communities or Knowledge Islands: Examining Business Disciplines}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {2}, pages = {9--21}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645610}, doi = {10.1080/08874417.2012.11645610}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/PrattHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ShareefAD12, author = {Mahmud Akhter Shareef and Norm Archer and Yogesh Kumar Dwivedi}, title = {Examining Adoption Behavior of Mobile Government}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {2}, pages = {39--49}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645613}, doi = {10.1080/08874417.2012.11645613}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/ShareefAD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/SimLK12, author = {Inkook Sim and Divakaran Liginlal and Lara Khansa}, title = {Information Privacy Situation Awareness: Construct and Validation}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {1}, pages = {57--64}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645597}, doi = {10.1080/08874417.2012.11645597}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/SimLK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/TsaiTLL12, author = {Wen{-}Hui Tsai and Ming{-}Hong Tsai and Sheng{-}Tun Li and Chinho Lin}, title = {Harmonizing Firms' Knowledge and Strategies with Organizational Capabilities}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {1}, pages = {23--32}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645593}, doi = {10.1080/08874417.2012.11645593}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/TsaiTLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/VinekarT12, author = {Vishnu Vinekar and James T. C. Teng}, title = {It Impacts in Information and Physical Product Industries}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {1}, pages = {65--71}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645598}, doi = {10.1080/08874417.2012.11645598}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/VinekarT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/WangW12, author = {Hai Wang and Shouhong Wang}, title = {Ontology-Based Data Summarization Engine: {A} Design Methodology}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {1}, pages = {48--56}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645596}, doi = {10.1080/08874417.2012.11645596}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/WangW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ZhangH12, author = {Lu Zhang and Jinghua Huang}, title = {The Moderating Factors in the Relationship between {ERP} Investments and Firm Performance}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {2}, pages = {75--84}, year = {2012}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645616}, doi = {10.1080/08874417.2012.11645616}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/ZhangH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.