Submissions from 2004
Satisfaction and Coordination in Virtual Communities, Pauline Chin and Donna Cooke
An empirical investigation into the influence of predictable and timely communication on cognition-based trust, Irene Chong and Geoffrey Dick
Broadband Adoption: A UK Residential Consumers Perspective, Jyoti Choudrie and Yogesh Dwivedi
Investigating the Socio-economic Characteristics of Residential Consumers of Broadband in the UK, Jyoti Choudrie and Yogesh Dwivedi
E-Government Policies for Broadband Adoption: The Case of the UK Government, Jyoti Choudrie, Anastasia Papazafeiropoulou, and Ben Light
Enabling Tacit Knowledge Diffusion through Meta-abilities for Organizational Learning, Jyoti Choudrie and Mohamad Selamat
The Role of National Culture and Gender on Information Elements in E-commerce: A Pilot Study on Trust, Andrew Ciganek, S. Jarupathirun, and Hangjung Zo
Radical! The Influence of Perceived Radicalness on Technology Acceptance, Andrew Ciganek and Fatemeh Zahedi
Information Security: An Organizational Change Perspective, Melinda Cline and Bradley Jensen
Increasing Customer Intimacy through Customer Relationship Management, Justin Cochran
Organization Strategy and Products Based on Technical Standards, Justin Cochran
Critical Success Factors of Enterprise Resource Planning Systems Implementation in Venezuela, Leopoldo Colmenares
A Methodology for Implementing Ontology-Driven Information Systems Using Higher Order Semantic Database Models, Samuel Conn
Implementing a Strategic, Sequential, and Iterative Pedagogical Flow to Online IS Distance Education Learning, Samuel Conn
Interpreting Scenario-Based Design from an Information Systems Perspective, Gregorio Convertino and Umer Farooq
Impacts of User Interface Complexity on User Acceptance in Safety-Critical Systems, Erman Coskun and Martha Grabowski
A Local Government CRM Maturity Model: a component in the transformational change of UK councils, Ian Cottam, Peter Kawalek, and Duncan Shaw
Modeling participant flows as a basis for decision support in human service programs, Derek Coursen and William Ferns
Practicing What We Preach: Understanding Why Project Management Methodologies Are Often Ignored, Jeff Crawford
Task analysis and human-computer interaction: approaches, techniques, and levels of analysis, Abe Crystal and Beth Ellington
Women in Information Technology Initiatives in Canada: Towards Fact-based Evaluations, Wendy Cukier and Carole Chauncey
Objectives Alignment: Reworking IS Security for eBusiness Enterprises, Brian Cusack
Software Stability: Recovering General Patterns of Business, Aseem Daga, Sergio de Cesare, Mark Lycett, and Chris Partridge
Strategic Corporate Market Signaling Behavior in Different Technological Innovation Phases, Viet Dao
The Role of Individual Characteristics on the Effectiveness of IS Security Countermeasures, John D'Arcy and Anat Hovav
Information Technology Enabled Process Outsourcing and Reengineering: Case Study of a Mortgage Bank, N. Dayasindhu
Learning through Telemedicine Networks: The Case Study of a Wound Care Network, Liqiong Deng, Marshall Poole, Cynthia Scheideman-Miller, and Houghton Brown
A Structured Approach to Designing Interleaved Workflow and Groupware Tasks, Amit Deokar; Therani Madhusudan; Robert Briggs; and Jay Nunamaker, Jr.
A Framework for Online Internal Controls, Ashutosh Deshmukh
Leveraging E-government Infrastructure for Crisis Management: Lessons from Managing SARS Outbreak in Singapore, Paul Devadoss and Shan Pan
A DSS Based on Simulation to Make Decisions for the Cuban Cruise Industry, Jose Diaz and Ileana Perez
A Dynamic Feedback Framework for Studying Growth Policies in Open Online Collaboration Communities, Vedat Diker
The Role of ES Implementation in IJV Development: Exploring the Relationship, James Ding
The Impact of Task-Technology Fit in Technology Acceptance and Utilization Models, Mark Dishaw, Diane Strong, and D. Brent Bandy
A Manager's Critical Role as IS Change Agent: A Case of Packaged Software Implementation in China, Dorothy Dologite, Robert Mockler, Qinghua Bai, and Peter Viszhanyo
An Experiment in Collaborative Programming: How Distributed Cognition Impacts Performance Outcomes, Madeline Domino, Tim Klaus, and Rosann Collins
The Downside Risk Implications of Investments in Information Technology, Kevin Dow and Jeff Wong
Agent Based Modeling and Simulation of Causal Maps, Douglas Druckenmiller, William Acar, and Marvin Troutt
The Role of Organizational Climate in the Use of Knowledge Management Systems to Support Problem Solving, Alexandra Durcikova, Dennis Galletta, and Brian Butler
Using Web Analytics to Measure the Activity in a Research-Oriented Online Community, Catherine Dwyer, Yi Zhang, and Starr Roxanne Hiltz
What Intro Students Know About Computer Concepts, John Dyer, Ronald MacKinnon, and Thomas Case
Addressing End-User Privacy Concerns, Julia Earp and Annie Anton
A Strategic Framework for E-government Adoption in Public Sector Organisations, Zakareya Ebrahim, Zahir Irani, and Sarmad Al Shawi
The Effect of National Culture on the Definition of Process Ownership as a Requirement for Effective Business Process Reengineering, Ralf Eder-Lange and Guillermo Rodriguez-Abitia
A Framework for Decision Support in Information Systems Security, Omar El-Gayar and Brian Fritz
Enhancing 911 Systems A Usability Test Plan, Beth Ellington
Information Technology and the Arab World: A Question of Culture, Mohamed El Louadi and Andrea Everard
Theoretical and Practical Complexity of UML, John Erickson and Keng Siau
Extending The SEI Risk Management Approach With Organizational Factors: An Action-Research Project, Jose Esteves, Nuria Rodriguez, Joan Pastor-Collado, and Ramon Roy
An Empirical Study of Dual-Modal Information Presentation, Xiao Fang, Jacek Brzezinski, Kimberly Watson, Shuang Xu, and Susy Chan
E-Government, E-Procurement, and E-Payments: Data Sharing Issues Associated with an Appreciating Database, Jane Fedorowicz, Ulric Gelinas, Janis Gogan, and Christine Williams
Learning Agents for Dynamic Supply Network Management, Gavin Finnie and Jeffrey Barker
A Presentation of the Prerequisite Topics and a Module for a Quantum Encryption (QE) Topic in an IS Course, Ronald Frank
A Case Study of ERP Implementation in Two Public Universities: Why Was One a Success and the Other a Failure?, Kimberly Furumo and John Pearson
Alternate Adaptive Agent Architectures and Behavioral Consequences, Dave Gaines and Ramakrishnan Pakath
Investigating Deception in Cyberspace, Holtjona Galanxhi-Janaqi and Fiona Nah
A Model for Examining Standards Competition in Two-Sided Markets Subject to Network Externalities:The Case of the Console Video Game Industry, John Gallaugher
Analyzing the UK NHS Care Records Service (NCRS): a Stakeholder/Actor Network Theory Perspective, Reshma Gandecha, Christopher Atkinson, Anastasia Papazafeiropoulou, and Athanasia Pouloudi
An Empirical Examination of the Determinants of Successful Transition Management in Offshore Business Process Outsourcing, Jai Ganesh and Deependra Moitra
Development of a Web-service-agents-based Family Wealth Management System, Shijia Gao, Dongming Xu, Yingfeng Wang, and Huaiqing Wang
Wireless Sensor Network Applications, Mark Gaynor, Mark Gaynor, Matt Welsh, Austin Rowan, Edward LaCombe, and John Wynne
Usage and Impact of Mobile Business Applications - An Assessment Based on the Concepts of Task/Technology Fit, Judith Gebauer, Michael Shaw, and Michele Gribbins
Application of the Petri Net to Simulate and Validate Complex, Multi-Vendor, Heterogeneous Networks of Wireless Medical Device Systems, Vijay Gehlot and Elliot Sloane
Inside Peer-to-Peer - Some Theory and an Empirical Analysis of a File Sharing Network, Nick Gehrke and Lutz Seidenfaden
Collaborative Customer Management in Financial Services Alliances, Malte Geib, Lutz Kolbe, and Walter Brenner
Effectively Integrating Technology in the Audit Course: An Application of the Technology Acceptance Model, Ulric Gelinas, Elliott Levy, Jay Thibodeau, and Catherine Usoff
Global Sourcing of IT-enabled Business Processes: The Rationale of Unbundling and locating, Ling Ge and Prabhudev Konana
Information and Communication Technology diffusion, collective rationality and form selection in the Australian stockbroking industry, Hosein Gharavi, Peter Love, Roger Sor, and Zahir Irani
The Measurement of Perceived Social Usefulness, Bonnie Glassberg, Varun Grover, and James Teng
The Work of Intrusion Detection: Rethinking the Role of Security Analysts, John Goodall, Wayne Lutters, and Anita Komlodi
Managing IT Outsourcing Relationships Using Service Level Agreements (SLAs): A Multi-Dimensional Fit Approach, Jahyun Goo, Rajiv Kishore, and Raghav Rao
Preparing for Information Systems Program Accreditation, John Gorgone
A Method for Mining XML Data Describing Open-Source and Proprietary Software Vulnerabilities, J. Art Gowan, Richard Mathieu, and Jie Chen
P3-System Designs: A classification of systems that connect People-To-People-To-Geographical-Places, Sukeshini Grandhi and Quentin Jones
Factors that Differentiate between Adopters and Non-adopters of E-Commerce: An Empirical Study of Small and Medium Sized Businesses, Elizabeth Grandon and John Pearson
Developing a GSS Appropriation Model, David Green
Deconstructing the Text: the human/ machine paradox in technical documentation, Anita Greenhill
A Spreadsheet Solution to Black Box Accounting, Richard Grenci and Anthony Grenci
The Unified Modeling Language: An inquiry into current practices and user perceptions, Martin Grossman, Richard McCarthy, and Jay Aronson
Collaborative e-learning: Information Systems Research Directions, Saurabh Gupta and Robert Bostrom
Virtual Community: Concepts, Implications, and Future Research Directions; tables fit onto one page, Sumeet Gupta and Hee-Woong Kim
Waking the Dead: Using interactive technology to engage passive listeners in the classroom, Rand Guthrie and Anna Carlin
Culture Clash! The Adverse Effects of IT Occupational Subculture on Formative Work Experiences of IT Students, Indira Guzman and Jeffrey Stanton
Marketing Strategies through Customer Attention: beyond technology-enabled customer relationship management, Raymond Hackney, Ashok Ranchhod, and Marilyn Hackney
Factors Influencing and Impeding Faculty Adoption and Satisfaction with Internet-based (Online) Course Development and Delivery - An Exploratory Study, Rassule Hadidi, Chung-Hsien Sung, and Miles Woken
Physicians' Behavior Intentions Regarding a Mobile Medical Information System: An Exploratory Study, Shengnan Han, Pekka Mustonen, Matti Seppanen, and Markku Kallio
The Next Phase of IT Outsourcing - Utility Computing: Understanding Utility Computing Acceptance, Peter Haried and Fatemeh Zahedi
Predicting IT Adaptation versus Non-Adaptation: A Study of Competing Factors, Michael Harris and Anol Bhattacherjee
Early Indicators of Troubled IS Development Projects, Douglas Havelka, T. Rajkumar, and Patrick Serve
Telecommunications Curricula in MIS Programs, Stephen Hawk and Thomas Witt
National Culture, Infrastructure, and Costs: Factors that Lead to the Use of Wireless Technologies, Jon Heales
The Role of Management Incentives in Successful Information Systems Development and Implementation, Jon Heales and Corina Raduescu
Modeling Intention to Use an Application Service Provider, Tsipi Heart, Nava Pliskin, and Noam Tractinsky
The Evolution of Corporate Web Presence: A Longitudinal Study of Large American Companies, Nathan Heinze and Qing Hu
Assessing the Effectiveness of User Participation: Users' Knowledge Participation, Jun He
Innovation in Demolition: A Case Study from the Cleanup of Ground Zero, Arthur Hendela and David Mendonça
The ADAPT toolkit-supported Engineering process for agent based applications, Rainer Herrler and Christian Heine
Sponsorship Models for Data Warehousing: Two Case Studies, Clemens Herrmann and Florian Melchert
Health Care Executives: The Association between External Factors, Use, and Their Perceptions of Health Information Technology, Neset Hikmet and Mary Burns
Envisioning Next-Generation Online Discussion: Immersive Layered Rich Media for e-Learning and Knowledge Management, Timothy Hill