default search action
Search dblp for Publications
export results for "toc:db/journals/jisys/jisys14.bht:"
@article{DBLP:journals/jisys/ArnoldLMS00, author = {Vicky Arnold and James C. Lampe and John J. Masselli and Steve G. Sutton}, title = {An Analysis of the Market for Systems Reliability Assurance Services}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {65--82}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.65}, doi = {10.2308/JIS.2000.14.S-1.65}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ArnoldLMS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ArnoldLMS00a, author = {Vicky Arnold and James C. Lampe and John J. Masselli and Steve G. Sutton}, title = {Reply to Discussion of An Analysis of the Market for Systems Reliability Assurance Services}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {91--95}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.91}, doi = {10.2308/JIS.2000.14.S-1.91}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ArnoldLMS00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Bailey00, author = {Andrew D. Bailey Jr.}, title = {Discussion of {AICPA/CICA} SYSTRUST{\texttrademark} Principles and Criteria}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {9--16}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.9}, doi = {10.2308/JIS.2000.14.S-1.9}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Bailey00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Bloom00, author = {Leon J. Bloom}, title = {Discussion of An Analysis of the Market for Systems Reliability Assurance Services}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {87--89}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.87}, doi = {10.2308/JIS.2000.14.S-1.87}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Bloom00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoritzK00, author = {J. Efrim Boritz and J. H. Kearns}, title = {1999 Symposium on {IS} Assurance Panel Discussion on SysTrust}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {163--176}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.163}, doi = {10.2308/JIS.2000.14.S-1.163}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BoritzK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Borthick00, author = {A. Faye Borthick}, title = {Analysis of Design from a Community of Practice Dialogue: Negotiating the Meaning of Auditing Information System Development}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {133--147}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.133}, doi = {10.2308/JIS.2000.14.S-1.133}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Borthick00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Burton00, author = {Richard N. Burton}, title = {Discussion of Information Technology-Related Activities of Internal Auditors}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {57--60}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.57}, doi = {10.2308/JIS.2000.14.S-1.57}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Burton00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Carnaghan00, author = {Carla Carnaghan}, title = {Discussion of An Analysis of the Group Dynamics Surrounding Internal Control Assessment in Information Systems Audit and Assurance Domains}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {117--121}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.117}, doi = {10.2308/JIS.2000.14.S-1.117}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Carnaghan00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ClementsW00, author = {Curtis E. Clements and Christopher J. Wolfe}, title = {Reporting Financial Results with the Video Medium: An Experimental Analysis}, journal = {J. Inf. Syst.}, volume = {14}, number = {2}, pages = {79--94}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.2.79}, doi = {10.2308/JIS.2000.14.2.79}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ClementsW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GeertsM00, author = {Guido L. Geerts and William E. McCarthy}, title = {Augmented Intensional Reasoning in Knowledge-Based Accounting Systems}, journal = {J. Inf. Syst.}, volume = {14}, number = {2}, pages = {127--150}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.2.127}, doi = {10.2308/JIS.2000.14.2.127}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GeertsM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GeertsW00, author = {Guido L. Geerts and Barbara A. Waddington}, title = {The Belgian Chocolate Company: {A} Dynamic Data Modeling and Database Design Case for the Accounting Information Systems Class}, journal = {J. Inf. Syst.}, volume = {14}, number = {1}, pages = {53--74}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.1.53}, doi = {10.2308/JIS.2000.14.1.53}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GeertsW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HayesHR00, author = {David C. Hayes and James E. Hunton and Jacqueline L. Reck}, title = {Information Systems Outsourcing Announcements: Investigating the Impact on the Market Value of Contract-Granting Firms}, journal = {J. Inf. Syst.}, volume = {14}, number = {2}, pages = {109--125}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.2.109}, doi = {10.2308/JIS.2000.14.2.109}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HayesHR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HermansonHI00, author = {Dana R. Hermanson and Mary Callahan Hill and Daniel M. Ivancevich}, title = {Information Technology-Related Activities of Internal Auditors}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {39--53}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.39}, doi = {10.2308/JIS.2000.14.S-1.39}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HermansonHI00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HermansonHI00a, author = {Dana R. Hermanson and Mary Callahan Hill and Daniel M. Ivancevich}, title = {Reply to Discussions of Information Technology-Related Activities of Internal Auditors}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {61--63}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.61}, doi = {10.2308/JIS.2000.14.S-1.61}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HermansonHI00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Holstrum00, author = {Gary L. Holstrum}, title = {Discussion of Analysis of Design from a Community of Practice Dialogue: Negotiating the Meaning of Auditing Information System Development}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {149--157}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.149}, doi = {10.2308/JIS.2000.14.S-1.149}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Holstrum00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Hunton00, author = {James E. Hunton}, title = {Discussant's Comments on Presentations by John Lainhart and Gerald Trites}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {33--35}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.33}, doi = {10.2308/JIS.2000.14.S-1.33}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Hunton00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Jackson00, author = {Cynthia Jackson}, title = {Discussion of Information Technology-Related Activities of Internal Auditors}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {55--56}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.55}, doi = {10.2308/JIS.2000.14.S-1.55}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Jackson00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KovarBK00, author = {Stacy E. Kovar and Kimberly Gladden Burke and Brian R. Kovar}, title = {Consumer Responses to the {CPA} WEBTRUST{\texttrademark} Assurance}, journal = {J. Inf. Syst.}, volume = {14}, number = {1}, pages = {17--35}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.1.17}, doi = {10.2308/JIS.2000.14.1.17}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KovarBK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KrishnanS00, author = {Gopal V. Krishnan and Ram S. Sriram}, title = {An Examination of the Effect of {IT} Investments on Firm Value: The Case of Y2K-Compliance Costs}, journal = {J. Inf. Syst.}, volume = {14}, number = {2}, pages = {95--108}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.2.95}, doi = {10.2308/JIS.2000.14.2.95}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KrishnanS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Lainhart00, author = {John W. Lainhart IV}, title = {COBIT{\texttrademark}: {A} Methodology for Managing and Controlling Information and Information Technology Risks and Vulnerabilities}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {21--25}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.21}, doi = {10.2308/JIS.2000.14.S-1.21}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Lainhart00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Leader00, author = {Brian Leader}, title = {Discussion of Analysis of Design from a Community of Practice Dialogue: Negotiating the Meaning of Auditing Information System Development}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {159--162}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.159}, doi = {10.2308/JIS.2000.14.S-1.159}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Leader00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Leech00, author = {Tim J. Leech}, title = {Discussion of An Analysis of the Group Dynamics Surrounding Internal Control Assessment in Information Systems Audit and Assurance Domains}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {123--125}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.123}, doi = {10.2308/JIS.2000.14.S-1.123}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Leech00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/McCracken00, author = {Susan A. McCracken}, title = {Discussion of An Analysis of the Market for Systems Reliability Assurance Services}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {83--85}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.83}, doi = {10.2308/JIS.2000.14.S-1.83}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/McCracken00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/McPhie00, author = {Doug McPhie}, title = {{AICPA/CICA} SYSTRUST{\texttrademark} Principles and Criteria}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {1--7}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.1}, doi = {10.2308/JIS.2000.14.S-1.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/McPhie00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ODonnellAS00, author = {Ed O'Donnell and Vicky Arnold and Steve G. Sutton}, title = {An Analysis of the Group Dynamics Surrounding Internal Control Assessment in Information Systems Audit and Assurance Domains}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {97--116}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.97}, doi = {10.2308/JIS.2000.14.S-1.97}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ODonnellAS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ODonnellAS00a, author = {Ed O'Donnell and Vicky Arnold and Steve G. Sutton}, title = {Reply to Discussion of An Analysis of the Group Dynamics Surrounding Internal Control Assessment in Information Systems Audit and Assurance Domains}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {127--131}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.127}, doi = {10.2308/JIS.2000.14.S-1.127}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ODonnellAS00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SriramAI00, author = {Ram S. Sriram and Vairam Arunachalam and Daniel M. Ivancevich}, title = {{EDI} Adoption and Implementation: An Examination of Perceived Operational and Strategic Benefits, and Controls}, journal = {J. Inf. Syst.}, volume = {14}, number = {1}, pages = {37--52}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.1.37}, doi = {10.2308/JIS.2000.14.1.37}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SriramAI00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SummersSW00, author = {Scott L. Summers and John T. Sweeney and Carel M. Wolk}, title = {Problem-Solving Style and Fit in Consulting and Auditing}, journal = {J. Inf. Syst.}, volume = {14}, number = {1}, pages = {1--15}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.1.1}, doi = {10.2308/JIS.2000.14.1.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SummersSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Trites00, author = {Gerald Trites}, title = {Overview of CICA's Information Technology Control Guidelines}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {27--32}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.27}, doi = {10.2308/JIS.2000.14.S-1.27}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Trites00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Viator00, author = {Ralph E. Viator}, title = {Accounting Information Systems Doctoral Dissertations: 1999}, journal = {J. Inf. Syst.}, volume = {14}, number = {2}, pages = {151--154}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.2.151}, doi = {10.2308/JIS.2000.14.2.151}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Viator00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.