default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 41 matches
- 2013
- Alexander J. Barelka, Anand Jeyaraj, Ryan G. Walinski:
Content Acceptance Model and New Media Technologies. J. Comput. Inf. Syst. 53(3): 56-64 (2013) - Jan vom Brocke, René Riedl, Pierre-Majorique Léger:
Application Strategies for Neuroscience in Information Systems Design Science Research. J. Comput. Inf. Syst. 53(3): 1-13 (2013) - Alain Yee-Loong Chong:
Understanding Mobile Commerce Continuance Intentions: An Empirical Analysis of Chinese Consumers. J. Comput. Inf. Syst. 53(4): 22-30 (2013) - Qiang Duan, Yong Lu:
Service-Oriented Network Discovery and Selection in Virtualization-Based Mobile Internet. J. Comput. Inf. Syst. 53(3): 38-46 (2013) - Amab Dutta, Guo Chao Alex Peng, Alok Choudhary:
Risks in Enterprise Cloud Computing: The Perspective of it Experts. J. Comput. Inf. Syst. 53(4): 39-48 (2013) - Mouzhi Ge, Markus Helfert:
Impact of Information Quality on Supply Chain Decisions. J. Comput. Inf. Syst. 53(4): 59-67 (2013) - Soon-Ki Jeong, Jong-Chang Ahn, Byung-Ho Rhee:
Knowledge Transfer Activation Analysis: Knowledge Trade Perspective. J. Comput. Inf. Syst. 53(3): 47-55 (2013) - Leon A. Kappelman, John A. Zachman:
The Enterprise and its Architecture: Ontology & Challenges. J. Comput. Inf. Syst. 53(4): 87-95 (2013) - Varol Onur Kayhan, Anol Bhattacherjee:
Content Use from Websites: Effects of Governance Mechanisms. J. Comput. Inf. Syst. 53(4): 68-80 (2013) - Curtis Knowles, Vladan Jovanovic:
Extensible Markup Language (XML) Schemas for Data Vault Models. J. Comput. Inf. Syst. 53(4): 12-21 (2013) - Alex Koohang, Joanna Paliszkiewicz:
Knowledge Construction in e-Learning: An Empirical Validation of an Active Learning Model. J. Comput. Inf. Syst. 53(3): 109-114 (2013) - Venu Madhav Kuthadi:
A New Data Stream Mining Algorithm for Interestingness-Rich Association Rules. J. Comput. Inf. Syst. 53(3): 14-27 (2013) - Hyejung Lee, Jun-gi Park, Jungwoo Lee:
Role of Leadership Competencies and Team Social Capital in it Services. J. Comput. Inf. Syst. 53(4): 1-11 (2013) - Yair Levy, Michelle M. Ramim, Raymond A. Hackney:
Assessing Ethical Severity of e-Learning Systems Security Attacks. J. Comput. Inf. Syst. 53(3): 75-84 (2013) - Xin (Robert) Luo, Merrill Warkentin, Han Li:
Understanding Technology Adoption Trade-Offs: A Conjoint Analysis Approach. J. Comput. Inf. Syst. 53(3): 65-74 (2013) - Werner Mellis, Claudia Loebbecke, Richard L. Baskerville:
Requirements Uncertainty in Contract Software Development Projects. J. Comput. Inf. Syst. 53(3): 97-108 (2013) - Srecko Natek, Dusan Lesjak:
Improving Knowledge Management by Integrating Hei Process and Data Models. J. Comput. Inf. Syst. 53(4): 81-86 (2013) - Dinesh R. Pai, Kevin Stanley McFall, Girish H. Subramanian:
Software Effort Estimation Using a Neural Network Ensemble. J. Comput. Inf. Syst. 53(4): 49-58 (2013) - Hongwei "Chris" Yang:
Bon Appétit for Apps: Young American Consumers' Acceptance of Mobile Applications. J. Comput. Inf. Syst. 53(3): 85-96 (2013) - Chia-Ping Yu, Houn-Gee Chen, Gary Klein, James J. Jiang:
Risk Dynamics Throughout the System Development Life Cycle. J. Comput. Inf. Syst. 53(3): 28-37 (2013) - Ruidong Zhang, Jim Q. Chen, Ca Jaejung Lee:
Mobile Commerce and Consumer Privacy Concerns. J. Comput. Inf. Syst. 53(4): 31-38 (2013) - 2012
- Rocco Agrifoglio, Sue Black, Concetta Metallo, Maria Ferrara:
Extrinsic versus Intrinsic Motivation in Continued Twitter Usage. J. Comput. Inf. Syst. 53(1): 33-41 (2012) - Deborah J. Armstrong, Jason E. Nelms, Cynthia K. Riemenschneider, Margaret F. Reid:
Revisiting the Barriers Facing Women in Information Systems. J. Comput. Inf. Syst. 53(2): 65-74 (2012) - Timothy Paul Cronan, David E. Douglas:
A Student ERP Simulation Game: A Longitudinal Study. J. Comput. Inf. Syst. 53(1): 3-13 (2012) - Jason K. Deane, Anurag Agarwal:
Scheduling Online Advertisements to Maximize Revenue under Non-Linear Pricing. J. Comput. Inf. Syst. 53(2): 85-92 (2012) - Delvin Grant:
Shortening Requirements Engineering: Dual Imperative Action Research Study. J. Comput. Inf. Syst. 53(2): 1-8 (2012) - Inae Hahn, Christophe Bredillett, Gyeung-Min Kim, Magali Taloc:
Agility of Project Manager in Global is Project. J. Comput. Inf. Syst. 53(2): 31-38 (2012) - Amy H. Harris, Timothy H. Greer, Steven A. Morris, W. Jeff Clark:
Information Systems Job Market Late 1970'S-Early 2010'S. J. Comput. Inf. Syst. 53(1): 72-79 (2012) - Pei-Hsuan Hsieh, Kuo-Chuan (Martin) Yeh:
Cultural Effects on Perceptions of Unauthorized Software Copying. J. Comput. Inf. Syst. 53(1): 42-47 (2012) - Leelien Ken Huang:
The Impact of it Management Sophistication on Perceived it Importance in Strategic Alignment. J. Comput. Inf. Syst. 53(2): 50-64 (2012)
skipping 11 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-12 08:07 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint