•  
  •  
 

Articles

PDF

Economics of ITSecurity Management: Four Improvements to Current Security Practices
Hasan Cavusoglu, Huseyin Cavusoglu, and Srinivasan Raghunathan

PDF

Holistic Compliance with Sarbanes-Oxley
Linda Volonino, Guy H. Gessner, and George F. Kermis

PDF

Intelligent Agents
Ira Rudowsky

PDF

Spyware: The Ghost in the Machine
Thomas F. Stafford and Andrew Urbaczewski

PDF

Web and Web Security
Robert J. Boncella

PDF

An E-Readiness Assesment Framework and Two Field Studies
J.H. Huang, W. W. Huang, C.J. Zhao, and H. Huang

PDF

Research Methodologies in MIS: An Update
Prashant Palvia, David Leary, En Mao, Vishal Midha, Parveen Pinjani, and A.F. Salam

PDF

M-Commerce Services: Promises and Challenges
John Mathew, Suprateek Sarker, and Upkar Varshney

PDF

Storage Area Networks
Manjari Mehta and Blake Ives

PDF

The Impact of CRM on Firm- andRelationship-Level Performance in Distributed Networks
Jae Wook Kim, Jiho Choi, William Qualls, and Jinsoo Park

PDF

E-Document Management Based on Web services and XML
Ou Liu, Jian Ma, Ji-Ye Mao, Ron C.W. Kwok, and Dong Li

Column

Panel Reports

PDF

The AMCIS 2003 Panels of IS Education-II: The Chicken and the Egg Debate: Positioning Database Content in the Information Systems Curriculum
Chelley Vician, with, Monica Garfield, Jeffrey A. Hoffer, Mary Prescott, Bruce Rollier, Diane Strong, and Kevin Lee Elder

Teaching Case

PDF

Netbank: The Conservative Internet Entrepreneurs
Cheryl Rothstein and Richard T. Watson