Search dblp for Publications

export results for "toc:db/journals/jcis/jcis53.bht:"

 download as .bib file

@article{DBLP:journals/jcis/BarelkaJW13,
  author       = {Alexander J. Barelka and
                  Anand Jeyaraj and
                  Ryan G. Walinski},
  title        = {Content Acceptance Model and New Media Technologies},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {3},
  pages        = {56--64},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645632},
  doi          = {10.1080/08874417.2013.11645632},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/BarelkaJW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/BrockeRL13,
  author       = {Jan vom Brocke and
                  Ren{\'{e}} Riedl and
                  Pierre{-}Majorique L{\'{e}}ger},
  title        = {Application Strategies for Neuroscience in Information Systems Design
                  Science Research},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {3},
  pages        = {1--13},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645627},
  doi          = {10.1080/08874417.2013.11645627},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/BrockeRL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/Chong13,
  author       = {Alain Yee{-}Loong Chong},
  title        = {Understanding Mobile Commerce Continuance Intentions: An Empirical
                  Analysis of Chinese Consumers},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {4},
  pages        = {22--30},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645647},
  doi          = {10.1080/08874417.2013.11645647},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/Chong13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/DuanL13,
  author       = {Qiang Duan and
                  Yong Lu},
  title        = {Service-Oriented Network Discovery and Selection in Virtualization-Based
                  Mobile Internet},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {3},
  pages        = {38--46},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645630},
  doi          = {10.1080/08874417.2013.11645630},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/DuanL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/DuttaPC13,
  author       = {Amab Dutta and
                  Guo Chao Alex Peng and
                  Alok Choudhary},
  title        = {Risks in Enterprise Cloud Computing: The Perspective of it Experts},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {4},
  pages        = {39--48},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645649},
  doi          = {10.1080/08874417.2013.11645649},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/DuttaPC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/GeH13,
  author       = {Mouzhi Ge and
                  Markus Helfert},
  title        = {Impact of Information Quality on Supply Chain Decisions},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {4},
  pages        = {59--67},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645651},
  doi          = {10.1080/08874417.2013.11645651},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/GeH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/JeongAR13,
  author       = {Soon{-}Ki Jeong and
                  Jong{-}Chang Ahn and
                  Byung{-}Ho Rhee},
  title        = {Knowledge Transfer Activation Analysis: Knowledge Trade Perspective},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {3},
  pages        = {47--55},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645631},
  doi          = {10.1080/08874417.2013.11645631},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/JeongAR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/KappelmanZ13,
  author       = {Leon A. Kappelman and
                  John A. Zachman},
  title        = {The Enterprise and its Architecture: Ontology {\&} Challenges},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {4},
  pages        = {87--95},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645654},
  doi          = {10.1080/08874417.2013.11645654},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/KappelmanZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/KayhanB13,
  author       = {Varol Onur Kayhan and
                  Anol Bhattacherjee},
  title        = {Content Use from Websites: Effects of Governance Mechanisms},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {4},
  pages        = {68--80},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645652},
  doi          = {10.1080/08874417.2013.11645652},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/KayhanB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/KnowlesJ13,
  author       = {Curtis Knowles and
                  Vladan Jovanovic},
  title        = {Extensible Markup Language {(XML)} Schemas for Data Vault Models},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {4},
  pages        = {12--21},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645646},
  doi          = {10.1080/08874417.2013.11645646},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/KnowlesJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/KoohangP13,
  author       = {Alex Koohang and
                  Joanna Paliszkiewicz},
  title        = {Knowledge Construction in e-Learning: An Empirical Validation of an
                  Active Learning Model},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {3},
  pages        = {109--114},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645637},
  doi          = {10.1080/08874417.2013.11645637},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/KoohangP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/Kuthadi13,
  author       = {Venu Madhav Kuthadi},
  title        = {A New Data Stream Mining Algorithm for Interestingness-Rich Association
                  Rules},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {3},
  pages        = {14--27},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645628},
  doi          = {10.1080/08874417.2013.11645628},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/Kuthadi13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/LeePL13,
  author       = {Hyejung Lee and
                  Jun{-}gi Park and
                  Jungwoo Lee},
  title        = {Role of Leadership Competencies and Team Social Capital in it Services},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {4},
  pages        = {1--11},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645645},
  doi          = {10.1080/08874417.2013.11645645},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/LeePL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/LevyRH13,
  author       = {Yair Levy and
                  Michelle M. Ramim and
                  Raymond A. Hackney},
  title        = {Assessing Ethical Severity of e-Learning Systems Security Attacks},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {3},
  pages        = {75--84},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645634},
  doi          = {10.1080/08874417.2013.11645634},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/LevyRH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/LuoWL13,
  author       = {Xin (Robert) Luo and
                  Merrill Warkentin and
                  Han Li},
  title        = {Understanding Technology Adoption Trade-Offs: {A} Conjoint Analysis
                  Approach},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {3},
  pages        = {65--74},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645633},
  doi          = {10.1080/08874417.2013.11645633},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/LuoWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/MellisLB13,
  author       = {Werner Mellis and
                  Claudia Loebbecke and
                  Richard L. Baskerville},
  title        = {Requirements Uncertainty in Contract Software Development Projects},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {3},
  pages        = {97--108},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645636},
  doi          = {10.1080/08874417.2013.11645636},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/MellisLB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/NatekL13,
  author       = {Srecko Natek and
                  Dusan Lesjak},
  title        = {Improving Knowledge Management by Integrating Hei Process and Data
                  Models},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {4},
  pages        = {81--86},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645653},
  doi          = {10.1080/08874417.2013.11645653},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/NatekL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/PaiMS13,
  author       = {Dinesh R. Pai and
                  Kevin Stanley McFall and
                  Girish H. Subramanian},
  title        = {Software Effort Estimation Using a Neural Network Ensemble},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {4},
  pages        = {49--58},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645650},
  doi          = {10.1080/08874417.2013.11645650},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/PaiMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/Yang13,
  author       = {Hongwei "Chris" Yang},
  title        = {Bon App{\'{e}}tit for Apps: Young American Consumers' Acceptance
                  of Mobile Applications},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {3},
  pages        = {85--96},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645635},
  doi          = {10.1080/08874417.2013.11645635},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/Yang13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/YuCKJ13,
  author       = {Chia{-}Ping Yu and
                  Houn{-}Gee Chen and
                  Gary Klein and
                  James J. Jiang},
  title        = {Risk Dynamics Throughout the System Development Life Cycle},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {3},
  pages        = {28--37},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645629},
  doi          = {10.1080/08874417.2013.11645629},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/YuCKJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/ZhangCL13,
  author       = {Ruidong Zhang and
                  Jim Q. Chen and
                  Ca Jaejung Lee},
  title        = {Mobile Commerce and Consumer Privacy Concerns},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {4},
  pages        = {31--38},
  year         = {2013},
  url          = {https://doi.org/10.1080/08874417.2013.11645648},
  doi          = {10.1080/08874417.2013.11645648},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/ZhangCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/AgrifoglioBMF12,
  author       = {Rocco Agrifoglio and
                  Sue Black and
                  Concetta Metallo and
                  Maria Ferrara},
  title        = {Extrinsic versus Intrinsic Motivation in Continued Twitter Usage},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {1},
  pages        = {33--41},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645594},
  doi          = {10.1080/08874417.2012.11645594},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/AgrifoglioBMF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/ArmstrongNRR12,
  author       = {Deborah J. Armstrong and
                  Jason E. Nelms and
                  Cynthia K. Riemenschneider and
                  Margaret F. Reid},
  title        = {Revisiting the Barriers Facing Women in Information Systems},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {2},
  pages        = {65--74},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645615},
  doi          = {10.1080/08874417.2012.11645615},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/ArmstrongNRR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/CronanD12,
  author       = {Timothy Paul Cronan and
                  David E. Douglas},
  title        = {A Student {ERP} Simulation Game: {A} Longitudinal Study},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {1},
  pages        = {3--13},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645591},
  doi          = {10.1080/08874417.2012.11645591},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/CronanD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/DeaneA12,
  author       = {Jason K. Deane and
                  Anurag Agarwal},
  title        = {Scheduling Online Advertisements to Maximize Revenue under Non-Linear
                  Pricing},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {2},
  pages        = {85--92},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645617},
  doi          = {10.1080/08874417.2012.11645617},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/DeaneA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/Grant12,
  author       = {Delvin Grant},
  title        = {Shortening Requirements Engineering: Dual Imperative Action Research
                  Study},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {2},
  pages        = {1--8},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645609},
  doi          = {10.1080/08874417.2012.11645609},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/Grant12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/HahnBKT12,
  author       = {Inae Hahn and
                  Christophe Bredillett and
                  Gyeung{-}Min Kim and
                  Magali Taloc},
  title        = {Agility of Project Manager in Global is Project},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {2},
  pages        = {31--38},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645612},
  doi          = {10.1080/08874417.2012.11645612},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/HahnBKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/HarrisGMC12,
  author       = {Amy H. Harris and
                  Timothy H. Greer and
                  Steven A. Morris and
                  W. Jeff Clark},
  title        = {Information Systems Job Market Late 1970'S-Early 2010'S},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {1},
  pages        = {72--79},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645599},
  doi          = {10.1080/08874417.2012.11645599},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/HarrisGMC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/HsiehY12,
  author       = {Pei{-}Hsuan Hsieh and
                  Kuo{-}Chuan (Martin) Yeh},
  title        = {Cultural Effects on Perceptions of Unauthorized Software Copying},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {1},
  pages        = {42--47},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645595},
  doi          = {10.1080/08874417.2012.11645595},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/HsiehY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/Huang12,
  author       = {Leelien Ken Huang},
  title        = {The Impact of it Management Sophistication on Perceived it Importance
                  in Strategic Alignment},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {2},
  pages        = {50--64},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645614},
  doi          = {10.1080/08874417.2012.11645614},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/Huang12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/HuangH12,
  author       = {Eugenia Y. Huang and
                  Travis K. Huang},
  title        = {Investigating the Antecedents of Users' Knowledge Sharing Intention},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {2},
  pages        = {93--102},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645618},
  doi          = {10.1080/08874417.2012.11645618},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/HuangH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/JonesH12,
  author       = {Beth H. Jones and
                  Lynn R. Heinrichs},
  title        = {Do Business Students Practice Smartphone Security?},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {2},
  pages        = {22--30},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645611},
  doi          = {10.1080/08874417.2012.11645611},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/JonesH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/KhalifaCS12,
  author       = {Mohamed Khalifa and
                  Sammi K. N. Cheng and
                  Kathy Ning Shen},
  title        = {Adoption of Mobile Commerce: {A} Confidence Model},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {1},
  pages        = {14--22},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645592},
  doi          = {10.1080/08874417.2012.11645592},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/KhalifaCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/MorrisonCR12,
  author       = {Rodger Morrison and
                  Casey G. Cegielski and
                  R. Kelly Rainer Jr.},
  title        = {Trust, Avatars, and Electronic Communications: Implications for E-Learning},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {1},
  pages        = {80--89},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645600},
  doi          = {10.1080/08874417.2012.11645600},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/MorrisonCR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/PrattHS12,
  author       = {Jean A. Pratt and
                  Karina Hauser and
                  Cassidy R. Sugimoto},
  title        = {Cross-Disciplinary Communities or Knowledge Islands: Examining Business
                  Disciplines},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {2},
  pages        = {9--21},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645610},
  doi          = {10.1080/08874417.2012.11645610},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/PrattHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/ShareefAD12,
  author       = {Mahmud Akhter Shareef and
                  Norm Archer and
                  Yogesh Kumar Dwivedi},
  title        = {Examining Adoption Behavior of Mobile Government},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {2},
  pages        = {39--49},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645613},
  doi          = {10.1080/08874417.2012.11645613},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/ShareefAD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/SimLK12,
  author       = {Inkook Sim and
                  Divakaran Liginlal and
                  Lara Khansa},
  title        = {Information Privacy Situation Awareness: Construct and Validation},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {1},
  pages        = {57--64},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645597},
  doi          = {10.1080/08874417.2012.11645597},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/SimLK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/TsaiTLL12,
  author       = {Wen{-}Hui Tsai and
                  Ming{-}Hong Tsai and
                  Sheng{-}Tun Li and
                  Chinho Lin},
  title        = {Harmonizing Firms' Knowledge and Strategies with Organizational Capabilities},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {1},
  pages        = {23--32},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645593},
  doi          = {10.1080/08874417.2012.11645593},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/TsaiTLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/VinekarT12,
  author       = {Vishnu Vinekar and
                  James T. C. Teng},
  title        = {It Impacts in Information and Physical Product Industries},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {1},
  pages        = {65--71},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645598},
  doi          = {10.1080/08874417.2012.11645598},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/VinekarT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/WangW12,
  author       = {Hai Wang and
                  Shouhong Wang},
  title        = {Ontology-Based Data Summarization Engine: {A} Design Methodology},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {1},
  pages        = {48--56},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645596},
  doi          = {10.1080/08874417.2012.11645596},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/WangW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/ZhangH12,
  author       = {Lu Zhang and
                  Jinghua Huang},
  title        = {The Moderating Factors in the Relationship between {ERP} Investments
                  and Firm Performance},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {53},
  number       = {2},
  pages        = {75--84},
  year         = {2012},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2012.11645616},
  doi          = {10.1080/08874417.2012.11645616},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/ZhangH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}