Submissions from 2015
IT Security Governance: A Framework based on ISO 38500, Suchit Ahuja and Yolande E. Chan
An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT routing, David Airehrour and Jairo Gutierrez
A Pilot Study of IOKSS in the Health Sector, Kamla Ali Al-Busaidi
A Policy-Based Network Management Approach for Greening the Cloud Infrastructure, Fadi Alhaddadin, William Liu, and Jairo Gutierrez
Adapting Communication To Create Common Ground in a Virtual World, Kathryn Aten, Luciara Nardon, and Taryn Stanko
Consumer Attitudes and the Challenging Prospects of Ecommerce: The Ghanaian Experience, Kofi A. Boateng and Enoch Bulley
Criação de Conhecimento Organizacional e Análise de Sinais Fracos: Convergências, Luciana Bortoli, Raquel Janissek Muniz, and Natália Borges
Real World Awareness (RWA) Systems: A Pharmaceutical Industry Application, Carsten Brockmann, Eldar Sultanow, and Alina M. Chircu
AuthorRank: A New Scheme for Identifying Field-Specific Key Researchers, Ya-Chen Chang and Zeyar Aung
Trust Transference from Online to Mobile Shopping – Academic and Practical Consideration, Chiang-Yu Cheng and Wesley Shu
Gender Difference in the Knowledge and Adoption of Educational Technology by Faculty: The Case of a Business School in Jamaica, Delroy A. Chevers and Chevonnese Chevers Whyte
Big Data Efficiency, Information Waste and Lean Big Data Management: Lessons from the Smart Grid Implementation, Jacqueline Corbett and Chialin Chen
Ciclo de Vida das Capacidades de Tecnologia da Informação na Trajetória dos Sistemas Integrados de uma Universidade Brasileira, Josué Vitor de Medeiros Júnior, Manoel Veras de Sousa Neto, and Miguel Moreno Añez Eduardo
Why Organizations Adopt Green IT: A Comprehensive Review, Qi Deng, Yun Wang, and Shaobo Ji
Serviços de Governo Eletrônico: um estudo sobre o uso por indivíduos no Brasil, Ernani Marques dos Santos and Nicolau Reinhard
The Moderating Effects of Age and Computer Knowledge on Nurses’ Acceptance of Information Systems: A Canadian Study, Princely I finedo
Measuring the Impact of Nursing Informatics Competencies on Decision Satisfaction: Theoretical Model and Direction for New Research, Marlene Green, Timothy Hardie, Michael Dohan, and Joseph Tan
Social Networking Behaviors: Role of personality, perceived risk, and social influences, Tejaswini Herath and John D’Arcy
Understanding the Business Value: Towards a Taxonomy of Industrial Use Scenarios enabled by Cyber-Physical Systems in the Equipment Manufacturing Industry, Matthias M. Herterich, Manuel Holler, Falk Uebernickel, and Walter Brenner
The role of information and communication technology in the transformation of consolidated business model: A study of taxi cooperatives in Brazil, Marcia Cassitas Hino, Luiz Fernando Albertin, Maria Alexandra Cunha, and Fernando Meirelles
The role of information and communication technology in the transformation of consolidated business model: A study of taxi cooperatives in Brazil, Marcia Cassitas Hino, Luiz Fernando Albertin, Maria Alexandra Cunha, and Fernando Meirelles
Institutional pressures for the adoption of Organizational Virtual Social Networks, Norberto Hoppen and Debora Bobsin
Interactive Digital Artifacts Embedded in Information Systems: a case study applied to Teledentistry, Leila Lage Humes and Nicolau Reinhard
Electronic Commerce Challenges and Opportunities for Emerging Economies: Case of Egypt, Sherif Kamel
Change Management Strategies in ERP Implementations: A Case Study, Richard Kapupu and Muriel Mignerat
Considering Corporate Strategies with Self-Organizing Patent Maps and Decision Making with AHP, Kazuhiro Kohara and Yuuki Maeda
Cyber Defense Capability Model: A Foundation Taxonomy, Farzan Kolini and Lech Janczewski
Compound Attitudes, Customer Engagement and eWOM: An Empirical Study on WeChat, Yide Liu and Yu Zhao
What is in or out of a particular field of knowledge? Reflections on IT Governance Studies, Edimara Mezzomo Luciano, Guilherme Costa Wiedenhöft, and Marie Anne Macadar Moron
Green IT: an Empirical Study regarding Organizational Actions and Impacts on Environmental Performance, Guilherme Lerch Lunardi, Décio Bittencourt Dolci, Ana Carolina Salles, and Ana Paula Ferreira Alves
Environment Scanning Strategies of Private Education Centers in Singapore, Shaheen Majid and Le Thi Que Lam
Maturidade da Governança de Tecnologia da Informação: Diferenças Entre Organizações Públicas Brasileiras, Bruno Campelo Medeiros, Manoel Veras de Sousa Neto, Miler Franco D´anjour, and Anderson Luiz Rezende Mól
Understanding the role of equity in leveraging privacy concerns of consumers in ecommerce, Zareef A. Mohammed and Gurvirender P. Tejay
User Preference Analysis of Internet Social Media Services, Vik Pant, G. Harindranath, and William P. Wagner
Big Data and Privacy: Control and Awareness Aspects, Lucille Perreault
Elaboração de um modelo para as Capacidades do Desempenho do CIO como Agente de Transformação na era da Economia Industrial Digital, Luis Hernan Contreras Pinochet and Cesar Alexandre de Souza
Digital Divide in Small and Medium Business: an Analysis of Sector Differences in Brazilian Companies based on Data from a Nationwide Survey, Érica Souza Siqueira, Cesar Alexandre de Souza, and Nicolau Reinhard
The Use of Cloud Computing by Small Service Business in Canada: An Exploratory Study, Cleveland A. Stanberry and G. Harindranath
Understanding organisational changes in the post-adoption of CRM implementation: A socio-technical perspective, Wallayaporn Techakriengkrai, Angsana A. Techatassanasoontorn, and Felix B. Tan
Les compétences fondamentales vertes nécessaires à l'implantation efficace des SI verts, Salma Trid
Expert views on stimulating mobile apps in Africa as a creative industry, Hossana Twinomurinzi
Fatores que influenciam o indivíduo na utilização da Computação em Nuvem, Claudia S. Vieira, Fernando de Souza Mereilles, and Maria Alexandra Cunha
Definition of a Model for Measuring the Effectiveness of Information Technology Governance: a Study of the Moderator Effect of Organizational Culture Variables, Guilherme Costa Wiedenhöft, Edimara Mezzomo Luciano, and Mauricio Gregianin Testa
Profiling Behavior of Intruders on Enterprise Honeynet: Deployment and Analysis, Ling Xue and Wei Lu