Submissions from 2004
Who Should Be Blamed For Information System Failure? Integrating Systems Thinking Into IS Education, Vo van Huy and Bongsug Chae
Using Wireless Networks for Enhanced Monitoring of Patients, Upkar Varshney
A Standard Methodology for Embedding Security Functionality Within Formal Specifications of Requirements, Chidambaram Velayudham, Dan Shoemaker, and Antonio Drommi
Accidental Wireless Networks: An Initial Study, Sameer Verma and Paul Beckman
Understanding the role of anxiety and self-efficacy within a computing-intensive learning environment, Chelley Vician and Larry Davis
Sarbanes-Oxley Links IT to Corporate Compliance, Linda Volonino, Guy Gessner, and George Kermis
Distributed, Multiplatform High Fidelity Human Patient Simulation Environment in an Ultra-Long Distance Setting, Dag von Lubitz, Benjamin Carrasco, Francesco Gabbrielli, Howard Levine, Tim McClelland, Frederic Patricelli, Caleb Poirier, and Simon Richir
A property rights view on the impact of file sharing on music business models - why iTunes is a remedy and MusicNet is not, Benedikt von Walter and Thomas Hess
User interface integration in corporate travel management: the case of the CWT Connect portal, Andreas Voss and Petra Schubert
Constructing IT and Professional Identity: Introducing Mobile Informatics in Home Care, Riikka Vuokko
Communication Media and Interpersonal History: Their Effects on Negotiation, Renee Wachter
Narrative action-nets: An approach to help theorize IT artifacts during process-oriented field studies, Erica Wagner
The AIS Expectation Gap, Robin Wakefield
Creating Strategic Alignment Between Organizations and IT Professionals Through Compensation, Chingning Wang and Michelle Kaarst-Brown
Evaluating a Clique Partitioning Problem Model for Clustering High-Dimensional Data Mining, Haibo Wang, Bahram Alidaee, and Gary Kochenberger
AC-Composer: An Access Control System for Web Services Orchestration, Harry Wang; Leon Zhao; Jay Nunamaker, Jr.; and Mohan Tanniru
The Interaction Effect of Task Experience and New Technology on Cognitive Beliefs, Hui Wang
KBSVM: KMeans-based SVM for Business Intelligence, Jiaqi Wang and Chengqi Zhang
Are Antecedents in the Adoption Stage Affecting IS Effectiveness in the Implementation Stage, Wei Wang and Vincent Cho
Trust and TAM for Online Recommendation Agents, Weiquan Wang and Izak Benbasat
Novel machine learning techniques for anomaly intrusion detection, Yanxin Wang, Johnny Wang, and Andrew Miner
A Decision-theoretic Multi-dimensional Model for Meeting Users' Information Filtering Needs, Ye Wang and Guisseppi Forgionne
Tracking the Mindset of Open Source Participation: a Research in Progress, Yun Wan, Simon Poon, and Nan Hu
The Taxing Issue of E-Commerce, Burke Ward and Janice Sipior
The Role of Computer User Aptitude in Technology Acceptance: An Exploratory Study, Janis Warner, Qing Hu, and Xenophon Koufteros
Realising E-Government in the UK: Local and National Challenges, Vishanth Weerakkody, Jyoti Choudrie, and Wendy Currie
Outsourcing the Financial Chain: an Empirical Analysis of Sourcing and Partnering Potentials, Tim Weitzel, Daniel Beimborn, and Jochen Franke
Instructional Technology Software Reuse: A Case Study, Rob Weitz, Viswanathan Kodaganallur, and David Rosenthal
Experiential Fit: Applying Task-Technology Fit Theory to Experiential Consumer Tasks, John Wells, Jonathan Palmer, and Olga Patterson
The Emergence of Digital Image Value Property Rights Created by Interactivity between Users and Items in Online Game, Min-Cheol Whang, Hae-Rin Lee, and Y. Park
When Search Engines "Speak" Your Language: The Role of Communication Accommodation Theory in Personalized Systems, Barbara White, Jamison Posey, and Sumali Conlon
A Model and Guide for an Introductory Computer Security Forensics Course, Doug White, Alan Rea, W. Brett McKenzie, and Louis Glorfeld
The Role of Exercises in Training the Nation's Cyber First-Responders, Gregory White and Tim Goles
Discontinuations of Application Development Outsourcing Contracts, Dwayne Whitten, Charlotte Stephens, Sean Dwyer, and Timothy Ellis
A Framework For Assessing E-Health Preparedness, Nilmini Wickramasinghe, Adam Fadlalla, Elie Geisler, and Jonathan Schaffer
The Trichotomy of Knowledge: A Basis for Knowledge Management, George Widmeyer
Understanding Healthcare Professionals' Adoption and Use of IT, Sonja Wiley-Patton and Alisha Malloy
How Cats Are Herded: Sequencing CIO Influence Tactics for Various Coordination Mechanisms, Clay Williams and Dennis Calbos
Implementing E-Government in the UK: An Analysis of Local-Level Strategies, Michael Williams and Paul Beynon-Davies
A Framework Facilitating Ex-Ante Evaluation of Information Systems, Michael Williams and Janet Williams
Developing Message Interpersonality Measures in Computer-Mediated Communication, E. Vance Wilson
Research and Publication Opportunities at the Intersection of IS and Healthcare, E. Vance Wilson and Nancy Lankton
Business Intelligence Software for the Classroom: MicroStrategy Web and Analytic Applications, Barbara Wixom
A Study of the Perceptions of IT Professionals on IT Outsourcing, Bernard Wong
Integrating Tomorrow's Government: An Exploratory Case Study of Resistance to Data Consolidation, John Woosley, Carlos Thomas, and Andy Davis
Diversity within the Ranks: How Ethnicity Affects Choices in IT, Amy Woszczynski, Martha Myers, Catherine Beise, and Janette Moody
Knowledge Worker Adoption of Time Management Tools: Satisfaction and Perceived Effectiveness, Dezhi Wu and Marilyn Tremaine
Identifying e-CRM Entities and Their Keys for Successful Implementation in the U.S. Healthcare Field, Robin Wurl and Michael Bartolacci
A Secure Key Management Scheme for Sensor Networks, John Wynne, Kristie Kosaka, and Samir Chatterjee
Ontology and Ontologies in Information Systems Analysis and Design: A Critique, Boris Wyssusek
A Model of 3G Adoption, Xu Xin
A Conceptual Model of a Workflow Management System Based on Web Services, Bo Xu, Surya Yadav, and Dahui Li
Benefiting the Online Multi-brand Retailer: The Impact of Supplier's Direct Channel on Wholesale Market Competition, Ling Xue, Gautam Ray, and Andrew Whinston
Process Reengineering: China's Public Health Emergency Information System, Yajiong Xue, Huigang Liang, Yusheng He, and William Boulton
Investigating Factors Influencing Telemedicine Usage in Developing Countries, Yajiong Xue, Huigang Liang, Changxiao Jin, and Yongjun Liu
Criminal Relation Exploration Tool for Law Enforcement Knowledge Management, Jennifer Xu
Factors Affecting E-Business Diffusion in Organizations: Differences between Developed and Developing Countries, Sean Xu, Kevin Zhu, and Kenneth Kraemer
An Exploratory Study on the Assessment Model of E-Government in China, Lie Yang and Jinghua Huang
Web Hosting Service Model for E-Commerce Education, Yonghe Yan and Anthony Zoko
Lagged Impact of Information Technology on Organizational Productivity, Ulku Yaylacicegi and Nirup Menon
Infrastructural Challenges in Developing an Information Economy in Humboldt County, California, Benjamin Yeo, Eileen Trauth, and Perry Wong
Process change identification using workflow specification matching, M. Yeoh, P. Chung, C. Anumba, A. El-Hamalawi, and I. Motawa
Beyond Innovation Characteristics: Effects of Adopter Categories on the Acceptance Outcomes of Online Shopping, Mun Yi and Kirk Fiedler
The Impact of the Web-Based Product Recommendation System from Previous Buyers on Consumers' Purchasing Behavior, Seong-No Yoon and Zoonky Lee
Natural Language Interface for a Multi Agent System, Victoria Yoon, Bonnie Rubenstein-Montano, Teresa Wilson, and Stuart Lowry
The Development Process of Virtual Group Identity: A Virtual Educational Community Case, Chia-ping Yu and Mei-Lien Young
Eliciting Tacit Knowledge from Spoken Discourse, Michele Zappavigna-Lee and Jon Patrick
Ontological Analysis of the MibML Grammar using the Bunge-Wand-Weber Model, Hong Zhang, Rajiv Kishore, and Ram Ramesh
Applying Fuzzy Composite Programming to Assess and Compare Organizational Effectiveness of Knowledge Management Strategy, Lei Zhang, Biswadip Ghosh, Michael Mannino, and Judy Scott
IT Outsourcing and Competitive Advantage: A Competency-based View, Lixuan Zhang
Integrating Human-Computer Interaction Development into SDLC: A Methodology, Ping Zhang, Jane Carey, Dov Te'eni, and Marilyn Tremaine
Incidental Information Exchange: A Measure for Assessing the Affect of Mediated Communication on Work Relationships, Suling Zhang and Marilyn Tremaine
An Exploratory Study of Web Service Adoption, Xiaoni Zhang and Albert Huang
The Role of Incentives and Information Technologies for Knowledge Transfer in Firms, Zuopeng Zhang and Shankar Sundaresan
A Fuzzy Set Approach to Assessing E-Commerce Websites, Duanning Zhou and Wayne Huang
Recovering Punctuations in Instant Messages - Towards the prosody norm in IM, Lina Zhou and Ziming Zhuang
Analysis of IT Strategic Alignment and Infrastructure Capability in BPR Implementations, Shu Zou and Ravi Patnayakuni