default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 23 matches
- 2015
- Md. Shamsul Arefin, Md. Rakibul Hoque, Yukun Bao:
The impact of business intelligence on organization's effectiveness: an empirical study. J. Syst. Inf. Technol. 17(3): 263-285 (2015) - Hyeongi Baek, Mun Koo Kang:
A study on the ontology building methodology for diseases of mind diagnosis. J. Syst. Inf. Technol. 17(2): 102-112 (2015) - Aaron Wolfgang Baur, Julian Bühler, Markus Bick:
How pricing of business intelligence and analytics SaaS applications can catch up with their technology. J. Syst. Inf. Technol. 17(3): 229-246 (2015) - Mikael Blomé:
Visualization and establishment of product design regulations as interactive modules: An interaction design study at IKEA. J. Syst. Inf. Technol. 17(1): 20-34 (2015) - Janelle Boyton, Peter Ayscough, David Kaveri, Raymond Chiong:
Suboptimal business intelligence implementations: understanding and addressing the problems. J. Syst. Inf. Technol. 17(3): 307-320 (2015) - Amelia Cahyadi, Adi Prananto:
Reflecting design thinking: a case study of the process of designing dashboards. J. Syst. Inf. Technol. 17(3): 286-306 (2015) - Robert Hugh Campbell, Mark Grimshaw:
Enochs of the modern workplace: The behaviours by which end users intentionally resist information system implementations. J. Syst. Inf. Technol. 17(1): 35-53 (2015) - Chunmei Gan, Weijun Wang:
Uses and gratifications of social media: a comparison of microblog and WeChat. J. Syst. Inf. Technol. 17(4): 351-363 (2015) - Yiwei Gong, Marijn Janssen:
Demystifying the benefits and risks of Lean service innovation: a banking case study. J. Syst. Inf. Technol. 17(4): 364-380 (2015) - Seokmo Gu, Aria Seo, Yeichang Kim:
A study on distributed transcoding using dynamic allocation of virtual machines in a cloud computing environment. J. Syst. Inf. Technol. 17(2): 113-120 (2015) - Ronda Harrison, Angelique Parker, Gabrielle Brosas, Raymond Chiong, Xuemei Tian:
The role of technology in the management and exploitation of internal business intelligence. J. Syst. Inf. Technol. 17(3): 247-262 (2015) - Eunhwa Jung, Kyungho Hong:
Biometric verification based on facial profile images for mobile security. J. Syst. Inf. Technol. 17(1): 91-100 (2015) - Habib Ullah Khan, Faisal Talib, Mohd. Nishat Faisal:
An analysis of the barriers to the proliferation of M-commerce in Qatar: A relationship modeling approach. J. Syst. Inf. Technol. 17(1): 54-81 (2015) - Tae-Bong Lee, Min-Nyeon Kim:
The analysis of near and far field pattern through mode analysis and FFT in a finite periodic dielectric gratings. J. Syst. Inf. Technol. 17(1): 82-90 (2015) - Heini Sisko Maarit Lipiäinen:
CRM in the digital age: implementation of CRM in three contemporary B2B firms. J. Syst. Inf. Technol. 17(1): 2-19 (2015) - Yong Liu, Shengli Deng, Feng Hu, Xiaoyu Chen:
The impacts of unique service resources and habit on e-service loyalty in a highly competitive market. J. Syst. Inf. Technol. 17(4): 336-350 (2015) - Lakshmanan Ramanathan, Sundaresan Krishnan Iyer:
An empirical investigation into the adoption of open source software in Information Technology outsourcing organizations. J. Syst. Inf. Technol. 17(2): 167-192 (2015) - Palaniappan Shamala, Rabiah Ahmad, Ali Hussein Zolait, Shahrin bin Sahib:
Collective information structure model for Information Security Risk Assessment (ISRA). J. Syst. Inf. Technol. 17(2): 193-219 (2015) - Jaakko Sinisalo, Heikki Karjaluoto, Saila Saraniemi:
Barriers to the use of mobile sales force automation systems: a salesperson's perspective. J. Syst. Inf. Technol. 17(2): 121-140 (2015) - Mark John Taylor, John Haggerty, David Gresty, Natalia Criado Pacheco, Tom Berry, Peter Almond:
Investigating employee harassment via social media. J. Syst. Inf. Technol. 17(4): 322-335 (2015) - Xuemei Tian, Raymond Chiong, Bill Martin, Rosemary Stockdale:
Introduction to the special issue of the Journal of Systems and Information Technology on Business Intelligence. J. Syst. Inf. Technol. 17(3) (2015) - Almamy Touray, Taina Savolainen, Airi Salminen, Erkki Sutinen, Yue Dai:
The role of trust in enhancing Internet use in a high-risk society. J. Syst. Inf. Technol. 17(2): 141-166 (2015) - Ping Wang:
Exploring the influence of electronic word-of-mouth on tourists' visit intention: A dual process approach. J. Syst. Inf. Technol. 17(4): 381-395 (2015)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-28 04:05 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint