![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 36 matches
- 2019
- Pär J. Ågerfalk:
Stimulating academic discourse: a call for response. Eur. J. Inf. Syst. 28(1): 1-5 (2019) - Raquel Benbunan-Fich
:
An affordance lens for wearable information systems. Eur. J. Inf. Syst. 28(3): 256-271 (2019) - Palash Bera, Geert Poels
:
How quickly do we learn conceptual models? Eur. J. Inf. Syst. 28(6): 663-680 (2019) - Claire Ingram Bogusz
, Robin Teigland
, Emmanuelle Vaast:
Designed entrepreneurial legitimacy: the case of a Swedish crowdfunding platform. Eur. J. Inf. Syst. 28(3): 318-335 (2019) - Federica Ceci
, Andrea Masini
, Andrea Prencipe
:
Impact of IT offerings strategies and IT integration capability on IT vendor value creation. Eur. J. Inf. Syst. 28(6): 591-611 (2019) - Raffaele Fabio Ciriello
, Alexander Richter
, Gerhard Schwabe:
The paradoxical effects of digital artefacts on innovation practices. Eur. J. Inf. Syst. 28(2): 149-172 (2019) - Kieran Conboy:
Being Promethean. Eur. J. Inf. Syst. 28(2): 119-125 (2019) - John Qi Dong
, Chia-Han Yang:
Information technology and innovation outcomes: is knowledge recombination the missing link? Eur. J. Inf. Syst. 28(6): 612-626 (2019) - Owen Eriksson, Paul Johannesson
, Maria Bergholtz:
The case for classes and instances - a response to representing instances: the case for reengineering conceptual modelling grammars. Eur. J. Inf. Syst. 28(6): 681-693 (2019) - Mahdi Fahmideh
, Farhad Daneshgar, Fethi A. Rabhi, Ghassan Beydoun
:
A generic cloud migration process model. Eur. J. Inf. Syst. 28(3): 233-255 (2019) - David Gefen, Ofir Ben-Assuli
, Mark Stehr, Bruce Rosen
, Yaron Denekamp:
Governmental intervention in Hospital Information Exchange (HIE) diffusion: a quasi-experimental ARIMA interrupted time series analysis of monthly HIE patient penetration rates. Eur. J. Inf. Syst. 28(6): 627-645 (2019) - Elena Gorbacheva, Jenine P. Beekhuyzen, Jan vom Brocke, Jörg Becker:
Directions for research on gender imbalance in the IT profession. Eur. J. Inf. Syst. 28(1): 43-67 (2019) - Audrey Grace, Rob Gleasure
, Patrick Finnegan, Tom Butler
:
Enabling service co-production: a theory-building case study. Eur. J. Inf. Syst. 28(4): 413-438 (2019) - Hartmut Hoehle
, John A. Aloysius, Soheil Goodarzi, Viswanath Venkatesh
:
A nomological network of customers' privacy perceptions: linking artifact design to shopping efficiency. Eur. J. Inf. Syst. 28(1): 91-113 (2019) - Inkyoung Hur
, Karlene C. Cousins
, Bernd Carsten Stahl:
A critical perspective of engagement in online health communities. Eur. J. Inf. Syst. 28(5): 523-548 (2019) - Leon A. Kappelman, Vess Johnson
, Russell Torres, Chris Maurer, Ephraim R. McLean:
A study of information systems issues, practices, and leadership in Europe. Eur. J. Inf. Syst. 28(1): 26-42 (2019) - Gohar Feroz Khan
, Matthias Trier:
Assessing the long-term fragmentation of information systems research with a longitudinal multi-network analysis. Eur. J. Inf. Syst. 28(4): 370-393 (2019) - Jongwoo Kim
, Sunyoung Cho
, Balasubramaniam Ramesh
:
IT-leveraged network value cocreation: a case study of the value cocreation process and value capture in the South Korean broadcast advertising industry. Eur. J. Inf. Syst. 28(6): 646-662 (2019) - Carmen Leong
, Shan L. Pan, Shamshul Bahri, Ali Fauzi
:
Social media empowerment in social movements: power activation and power accrual in digital activism. Eur. J. Inf. Syst. 28(2): 173-204 (2019) - Roman Lukyanenko, Jeffrey Parsons
, Binny M. Samuel
:
Representing instances: the case for reengineering conceptual modelling grammars. Eur. J. Inf. Syst. 28(1): 68-90 (2019) - Christian Maier
, Sven Laumer
, Jakob Wirth
, Tim Weitzel
:
Technostress and the hierarchical levels of personality: a two-wave study with multiple data samples. Eur. J. Inf. Syst. 28(5): 496-522 (2019) - Earl H. McKinney Jr., Charles J. Yoos II:
Information as a difference: toward a subjective theory of information. Eur. J. Inf. Syst. 28(4): 355-369 (2019) - Mostafa Mesgari
, Chitu Okoli
:
Critical review of organisation-technology sensemaking: towards technology materiality, discovery, and action. Eur. J. Inf. Syst. 28(2): 205-232 (2019) - Matthew T. Mullarkey, Alan R. Hevner, Pär J. Ågerfalk:
An elaborated action design research process model. Eur. J. Inf. Syst. 28(1): 6-20 (2019) - Marko Niemimaa, Elina Niemimaa:
Abductive innovations in information security policy development: an ethnographic study. Eur. J. Inf. Syst. 28(5): 566-589 (2019) - Robert F. Otondo
:
How long can this party last? What the rise and fall of OR/MS can teach us about the future of business analytics. Eur. J. Inf. Syst. 28(5): 473-495 (2019) - Zeyu Peng, Xitong Guo
:
A multilevel investigation on antecedents for employees' exploration of enterprise systems. Eur. J. Inf. Syst. 28(4): 439-456 (2019) - Christian Peukert
:
Determinants and heterogeneity of switching costs in IT outsourcing: estimates from firm-level data. Eur. J. Inf. Syst. 28(3): 291-317 (2019) - Jie Ren, Jeffrey V. Nickerson
:
Arousal, valence, and volume: how the influence of online review characteristics differs with respect to utilitarian and hedonic products. Eur. J. Inf. Syst. 28(3): 272-290 (2019) - Björn Ross
, Laura Pilz, Benjamin Cabrera, Florian Brachten
, German Neubaum, Stefan Stieglitz
:
Are social bots a real threat? An agent-based model of the spiral of silence to analyse the impact of manipulative actors in social networks. Eur. J. Inf. Syst. 28(4): 394-412 (2019)
skipping 6 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-02-17 18:48 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint