Articles
Automating the Public Sector and Organizing Accountabilities
Matthew L. Smith, Merel E. Noorman, and Aaron K. Martin
Gender-Based Differences in Consumer E-Commerce Adoption
Craig Van Slyke, France Bélanger, Richard D. Johnson, and Ross Hightower
Application Portfolio Management—An Integrated Framework and a Software Tool Evaluation Approach
Daniel Simon, Kai Fischbach, and Detlef Schoder
A Dynamic Capabilities Approach to Understanding the Impact of IT-Enabled Businesses Processes and IT-Business Alignment on the Strategic and Operational Performance of the Firm
Andrew Schwarz, Michel Kalika, Hajer Kefi, and Colleen Schwarz
A Comparative Study of Individual Acceptance of Instant Messaging in the US and China: A Structural Equation Modeling Approach
Dahui Li, Patrick Y.K. Chau, and Craig Van Slyke
Information Systems Appraisal and Coping: The Role of User Perceptions
Kelly J. Fadel and Susan A. Brown
Information Systems and Healthcare XXXIII: An Institutional Theory Perspective on Physician Adoption of Electronic Health Records
Susan A. Sherer
An Empirical Examination of IT-Enabled Emergency Response: The Cases of Hurricane Katrina and Hurricane Rita
Rui Chen, H Raghav Rao, Raj Sharman, Shambhu J. Upadhyaya, and Jinki Kim
Designing an Information Systems Development Course to Incorporate Agility, Flexibility, and Adaptability
Chuan-Hoo Tan, Wee-Kek Tan, and Hock-Hai Teo
Understanding the Formation of General Computer Self-Efficacy
Jun He and Lee A. Freeman
Empirical Evaluation of Information Security Planning and Integration
Randall F. Young and John Windsor
E-Government, E-Business, and National Economic Performance
Shirish C. Srivastava and Thompson S.H. Teo
An Examination of IS Conference Reviewing Practices
Michael Rosemann, Jan Recker, and Iris Vessey
Supporting Better Communication in Academic Communities of Practice: An Empirical Study of AIS/ISWORLD
Martin Yuecheng Yu, Karl R. Lang, and Nanda Kumar
Improving Organizational Information Security Strategy via Meso-Level Application of Situational Crime Prevention to the Risk Management Process
Nicole L. Beebe and V. Srinivasan Rao
IS 2010: Curriculum Guidelines for Undergraduate Degree Programs in Information Systems
Heikki Topi; Joseph S. Valacich; Ryan T. Wright; Kate Kaiser; Jay F. Nunamaker, Jr.; Janice C. Sipior; and Gert Jan de Vreede
Acceptance of Educational Technology: Field Studies of Asynchronous Participatory Examinations
Dezhi Wu, Starr Roxanne Hiltz, and Michael Bieber
Internet Banking and Customers’ Acceptance in Jordan: The Unified Model’s Perspective
Emad AbuShanab, J. Michael Pearson, and Andrew J. Setterstrom
Integrated Curriculum for a Bachelor of Science in Business Information Systems Design (BISD 2010)
Sven A. Carlsson, Jonas Hedman, and Odd Steen
Social Software in Higher Education: The Diversity of Applications and Their Contributions to Students’ Learning Experiences
Andreas Schroeder, Shailey Minocha, and Christoph Schneider
Information Systems and Healthcare XXXIV: Clinical Knowledge Management Systems—Literature Review and Research Issues for Information Systems
Matthew J. Wills, Surendra Sarnikar, Omar F. El-Gayar, and Amit V. Deokar
Focus Groups for Artifact Refinement and Evaluation in Design Research
Monica Chiarini Tremblay, Alan R. Hevner, and Donald J. Berndt
Columns
Developments in Practice XXXIV: Application Portfolio Management
James D. McKeen and Heather A. Smith
Developments in Practice XXXV: Building a Strong Relationship with the Business
Heather A. Smith and James D. McKeen
Tutorials
Panel Reports
What Do We Like About the IS Field?
John Leslie King, Michael David Myers, Suzanne Rivard, Carol Saunders, and Ron Weber
Best Practices for Increasing IS Enrollment: A Program Perspective
Hope Koch, Craig Van Slyke, Rick Watson, John Wells, and Rick Wilson