Search dblp for Publications

export results for "toc:db/journals/jisys/jisys14.bht:"

 download as .bib file

@article{DBLP:journals/jisys/ArnoldLMS00,
  author       = {Vicky Arnold and
                  James C. Lampe and
                  John J. Masselli and
                  Steve G. Sutton},
  title        = {An Analysis of the Market for Systems Reliability Assurance Services},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {65--82},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.65},
  doi          = {10.2308/JIS.2000.14.S-1.65},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ArnoldLMS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ArnoldLMS00a,
  author       = {Vicky Arnold and
                  James C. Lampe and
                  John J. Masselli and
                  Steve G. Sutton},
  title        = {Reply to Discussion of An Analysis of the Market for Systems Reliability
                  Assurance Services},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {91--95},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.91},
  doi          = {10.2308/JIS.2000.14.S-1.91},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ArnoldLMS00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Bailey00,
  author       = {Andrew D. Bailey Jr.},
  title        = {Discussion of {AICPA/CICA} SYSTRUST{\texttrademark} Principles and
                  Criteria},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {9--16},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.9},
  doi          = {10.2308/JIS.2000.14.S-1.9},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Bailey00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Bloom00,
  author       = {Leon J. Bloom},
  title        = {Discussion of An Analysis of the Market for Systems Reliability Assurance
                  Services},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {87--89},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.87},
  doi          = {10.2308/JIS.2000.14.S-1.87},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Bloom00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoritzK00,
  author       = {J. Efrim Boritz and
                  J. H. Kearns},
  title        = {1999 Symposium on {IS} Assurance Panel Discussion on SysTrust},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {163--176},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.163},
  doi          = {10.2308/JIS.2000.14.S-1.163},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BoritzK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Borthick00,
  author       = {A. Faye Borthick},
  title        = {Analysis of Design from a Community of Practice Dialogue: Negotiating
                  the Meaning of Auditing Information System Development},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {133--147},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.133},
  doi          = {10.2308/JIS.2000.14.S-1.133},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Borthick00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Burton00,
  author       = {Richard N. Burton},
  title        = {Discussion of Information Technology-Related Activities of Internal
                  Auditors},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {57--60},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.57},
  doi          = {10.2308/JIS.2000.14.S-1.57},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Burton00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Carnaghan00,
  author       = {Carla Carnaghan},
  title        = {Discussion of An Analysis of the Group Dynamics Surrounding Internal
                  Control Assessment in Information Systems Audit and Assurance Domains},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {117--121},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.117},
  doi          = {10.2308/JIS.2000.14.S-1.117},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Carnaghan00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ClementsW00,
  author       = {Curtis E. Clements and
                  Christopher J. Wolfe},
  title        = {Reporting Financial Results with the Video Medium: An Experimental
                  Analysis},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {2},
  pages        = {79--94},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.2.79},
  doi          = {10.2308/JIS.2000.14.2.79},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ClementsW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GeertsM00,
  author       = {Guido L. Geerts and
                  William E. McCarthy},
  title        = {Augmented Intensional Reasoning in Knowledge-Based Accounting Systems},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {2},
  pages        = {127--150},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.2.127},
  doi          = {10.2308/JIS.2000.14.2.127},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GeertsM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GeertsW00,
  author       = {Guido L. Geerts and
                  Barbara A. Waddington},
  title        = {The Belgian Chocolate Company: {A} Dynamic Data Modeling and Database
                  Design Case for the Accounting Information Systems Class},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {1},
  pages        = {53--74},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.1.53},
  doi          = {10.2308/JIS.2000.14.1.53},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GeertsW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HayesHR00,
  author       = {David C. Hayes and
                  James E. Hunton and
                  Jacqueline L. Reck},
  title        = {Information Systems Outsourcing Announcements: Investigating the Impact
                  on the Market Value of Contract-Granting Firms},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {2},
  pages        = {109--125},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.2.109},
  doi          = {10.2308/JIS.2000.14.2.109},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HayesHR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HermansonHI00,
  author       = {Dana R. Hermanson and
                  Mary Callahan Hill and
                  Daniel M. Ivancevich},
  title        = {Information Technology-Related Activities of Internal Auditors},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {39--53},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.39},
  doi          = {10.2308/JIS.2000.14.S-1.39},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HermansonHI00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HermansonHI00a,
  author       = {Dana R. Hermanson and
                  Mary Callahan Hill and
                  Daniel M. Ivancevich},
  title        = {Reply to Discussions of Information Technology-Related Activities
                  of Internal Auditors},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {61--63},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.61},
  doi          = {10.2308/JIS.2000.14.S-1.61},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HermansonHI00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Holstrum00,
  author       = {Gary L. Holstrum},
  title        = {Discussion of Analysis of Design from a Community of Practice Dialogue:
                  Negotiating the Meaning of Auditing Information System Development},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {149--157},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.149},
  doi          = {10.2308/JIS.2000.14.S-1.149},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Holstrum00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Hunton00,
  author       = {James E. Hunton},
  title        = {Discussant's Comments on Presentations by John Lainhart and Gerald
                  Trites},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {33--35},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.33},
  doi          = {10.2308/JIS.2000.14.S-1.33},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Hunton00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Jackson00,
  author       = {Cynthia Jackson},
  title        = {Discussion of Information Technology-Related Activities of Internal
                  Auditors},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {55--56},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.55},
  doi          = {10.2308/JIS.2000.14.S-1.55},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Jackson00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KovarBK00,
  author       = {Stacy E. Kovar and
                  Kimberly Gladden Burke and
                  Brian R. Kovar},
  title        = {Consumer Responses to the {CPA} WEBTRUST{\texttrademark} Assurance},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {1},
  pages        = {17--35},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.1.17},
  doi          = {10.2308/JIS.2000.14.1.17},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KovarBK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KrishnanS00,
  author       = {Gopal V. Krishnan and
                  Ram S. Sriram},
  title        = {An Examination of the Effect of {IT} Investments on Firm Value: The
                  Case of Y2K-Compliance Costs},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {2},
  pages        = {95--108},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.2.95},
  doi          = {10.2308/JIS.2000.14.2.95},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KrishnanS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Lainhart00,
  author       = {John W. Lainhart IV},
  title        = {COBIT{\texttrademark}: {A} Methodology for Managing and Controlling
                  Information and Information Technology Risks and Vulnerabilities},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {21--25},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.21},
  doi          = {10.2308/JIS.2000.14.S-1.21},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Lainhart00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Leader00,
  author       = {Brian Leader},
  title        = {Discussion of Analysis of Design from a Community of Practice Dialogue:
                  Negotiating the Meaning of Auditing Information System Development},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {159--162},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.159},
  doi          = {10.2308/JIS.2000.14.S-1.159},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Leader00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Leech00,
  author       = {Tim J. Leech},
  title        = {Discussion of An Analysis of the Group Dynamics Surrounding Internal
                  Control Assessment in Information Systems Audit and Assurance Domains},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {123--125},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.123},
  doi          = {10.2308/JIS.2000.14.S-1.123},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Leech00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/McCracken00,
  author       = {Susan A. McCracken},
  title        = {Discussion of An Analysis of the Market for Systems Reliability Assurance
                  Services},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {83--85},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.83},
  doi          = {10.2308/JIS.2000.14.S-1.83},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/McCracken00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/McPhie00,
  author       = {Doug McPhie},
  title        = {{AICPA/CICA} SYSTRUST{\texttrademark} Principles and Criteria},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {1--7},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.1},
  doi          = {10.2308/JIS.2000.14.S-1.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/McPhie00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ODonnellAS00,
  author       = {Ed O'Donnell and
                  Vicky Arnold and
                  Steve G. Sutton},
  title        = {An Analysis of the Group Dynamics Surrounding Internal Control Assessment
                  in Information Systems Audit and Assurance Domains},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {97--116},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.97},
  doi          = {10.2308/JIS.2000.14.S-1.97},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ODonnellAS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ODonnellAS00a,
  author       = {Ed O'Donnell and
                  Vicky Arnold and
                  Steve G. Sutton},
  title        = {Reply to Discussion of An Analysis of the Group Dynamics Surrounding
                  Internal Control Assessment in Information Systems Audit and Assurance
                  Domains},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {127--131},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.127},
  doi          = {10.2308/JIS.2000.14.S-1.127},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ODonnellAS00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SriramAI00,
  author       = {Ram S. Sriram and
                  Vairam Arunachalam and
                  Daniel M. Ivancevich},
  title        = {{EDI} Adoption and Implementation: An Examination of Perceived Operational
                  and Strategic Benefits, and Controls},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {1},
  pages        = {37--52},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.1.37},
  doi          = {10.2308/JIS.2000.14.1.37},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SriramAI00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SummersSW00,
  author       = {Scott L. Summers and
                  John T. Sweeney and
                  Carel M. Wolk},
  title        = {Problem-Solving Style and Fit in Consulting and Auditing},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {1},
  pages        = {1--15},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.1.1},
  doi          = {10.2308/JIS.2000.14.1.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SummersSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Trites00,
  author       = {Gerald Trites},
  title        = {Overview of CICA's Information Technology Control Guidelines},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {27--32},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.27},
  doi          = {10.2308/JIS.2000.14.S-1.27},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Trites00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Viator00,
  author       = {Ralph E. Viator},
  title        = {Accounting Information Systems Doctoral Dissertations: 1999},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {2},
  pages        = {151--154},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.2.151},
  doi          = {10.2308/JIS.2000.14.2.151},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Viator00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}