Follow

Submissions from 2004

PDF

Who Should Be Blamed For Information System Failure? Integrating Systems Thinking Into IS Education, Vo van Huy and Bongsug Chae

PDF

Using Wireless Networks for Enhanced Monitoring of Patients, Upkar Varshney

PDF

A Standard Methodology for Embedding Security Functionality Within Formal Specifications of Requirements, Chidambaram Velayudham, Dan Shoemaker, and Antonio Drommi

PDF

Accidental Wireless Networks: An Initial Study, Sameer Verma and Paul Beckman

PDF

Understanding the role of anxiety and self-efficacy within a computing-intensive learning environment, Chelley Vician and Larry Davis

PDF

Sarbanes-Oxley Links IT to Corporate Compliance, Linda Volonino, Guy Gessner, and George Kermis

PDF

Distributed, Multiplatform High Fidelity Human Patient Simulation Environment in an Ultra-Long Distance Setting, Dag von Lubitz, Benjamin Carrasco, Francesco Gabbrielli, Howard Levine, Tim McClelland, Frederic Patricelli, Caleb Poirier, and Simon Richir

PDF

A property rights view on the impact of file sharing on music business models - why iTunes is a remedy and MusicNet is not, Benedikt von Walter and Thomas Hess

PDF

User interface integration in corporate travel management: the case of the CWT Connect portal, Andreas Voss and Petra Schubert

PDF

Constructing IT and Professional Identity: Introducing Mobile Informatics in Home Care, Riikka Vuokko

PDF

Communication Media and Interpersonal History: Their Effects on Negotiation, Renee Wachter

PDF

Narrative action-nets: An approach to help theorize IT artifacts during process-oriented field studies, Erica Wagner

PDF

The AIS Expectation Gap, Robin Wakefield

PDF

Creating Strategic Alignment Between Organizations and IT Professionals Through Compensation, Chingning Wang and Michelle Kaarst-Brown

PDF

Evaluating a Clique Partitioning Problem Model for Clustering High-Dimensional Data Mining, Haibo Wang, Bahram Alidaee, and Gary Kochenberger

PDF

AC-Composer: An Access Control System for Web Services Orchestration, Harry Wang; Leon Zhao; Jay Nunamaker, Jr.; and Mohan Tanniru

PDF

The Interaction Effect of Task Experience and New Technology on Cognitive Beliefs, Hui Wang

PDF

KBSVM: KMeans-based SVM for Business Intelligence, Jiaqi Wang and Chengqi Zhang

PDF

Are Antecedents in the Adoption Stage Affecting IS Effectiveness in the Implementation Stage, Wei Wang and Vincent Cho

PDF

Trust and TAM for Online Recommendation Agents, Weiquan Wang and Izak Benbasat

PDF

Novel machine learning techniques for anomaly intrusion detection, Yanxin Wang, Johnny Wang, and Andrew Miner

PDF

A Decision-theoretic Multi-dimensional Model for Meeting Users' Information Filtering Needs, Ye Wang and Guisseppi Forgionne

PDF

Tracking the Mindset of Open Source Participation: a Research in Progress, Yun Wan, Simon Poon, and Nan Hu

PDF

The Taxing Issue of E-Commerce, Burke Ward and Janice Sipior

PDF

The Role of Computer User Aptitude in Technology Acceptance: An Exploratory Study, Janis Warner, Qing Hu, and Xenophon Koufteros

PDF

Realising E-Government in the UK: Local and National Challenges, Vishanth Weerakkody, Jyoti Choudrie, and Wendy Currie

PDF

Outsourcing the Financial Chain: an Empirical Analysis of Sourcing and Partnering Potentials, Tim Weitzel, Daniel Beimborn, and Jochen Franke

PDF

Instructional Technology Software Reuse: A Case Study, Rob Weitz, Viswanathan Kodaganallur, and David Rosenthal

PDF

Experiential Fit: Applying Task-Technology Fit Theory to Experiential Consumer Tasks, John Wells, Jonathan Palmer, and Olga Patterson

PDF

The Emergence of Digital Image Value Property Rights Created by Interactivity between Users and Items in Online Game, Min-Cheol Whang, Hae-Rin Lee, and Y. Park

PDF

When Search Engines "Speak" Your Language: The Role of Communication Accommodation Theory in Personalized Systems, Barbara White, Jamison Posey, and Sumali Conlon

PDF

A Model and Guide for an Introductory Computer Security Forensics Course, Doug White, Alan Rea, W. Brett McKenzie, and Louis Glorfeld

PDF

The Role of Exercises in Training the Nation's Cyber First-Responders, Gregory White and Tim Goles

PDF

Discontinuations of Application Development Outsourcing Contracts, Dwayne Whitten, Charlotte Stephens, Sean Dwyer, and Timothy Ellis

PDF

A Framework For Assessing E-Health Preparedness, Nilmini Wickramasinghe, Adam Fadlalla, Elie Geisler, and Jonathan Schaffer

PDF

The Trichotomy of Knowledge: A Basis for Knowledge Management, George Widmeyer

PDF

Understanding Healthcare Professionals' Adoption and Use of IT, Sonja Wiley-Patton and Alisha Malloy

PDF

How Cats Are Herded: Sequencing CIO Influence Tactics for Various Coordination Mechanisms, Clay Williams and Dennis Calbos

PDF

Implementing E-Government in the UK: An Analysis of Local-Level Strategies, Michael Williams and Paul Beynon-Davies

PDF

A Framework Facilitating Ex-Ante Evaluation of Information Systems, Michael Williams and Janet Williams

PDF

Developing Message Interpersonality Measures in Computer-Mediated Communication, E. Vance Wilson

PDF

Research and Publication Opportunities at the Intersection of IS and Healthcare, E. Vance Wilson and Nancy Lankton

PDF

Business Intelligence Software for the Classroom: MicroStrategy Web and Analytic Applications, Barbara Wixom

PDF

A Study of the Perceptions of IT Professionals on IT Outsourcing, Bernard Wong

PDF

Integrating Tomorrow's Government: An Exploratory Case Study of Resistance to Data Consolidation, John Woosley, Carlos Thomas, and Andy Davis

PDF

Diversity within the Ranks: How Ethnicity Affects Choices in IT, Amy Woszczynski, Martha Myers, Catherine Beise, and Janette Moody

PDF

Knowledge Worker Adoption of Time Management Tools: Satisfaction and Perceived Effectiveness, Dezhi Wu and Marilyn Tremaine

PDF

Identifying e-CRM Entities and Their Keys for Successful Implementation in the U.S. Healthcare Field, Robin Wurl and Michael Bartolacci

PDF

A Secure Key Management Scheme for Sensor Networks, John Wynne, Kristie Kosaka, and Samir Chatterjee

PDF

Ontology and Ontologies in Information Systems Analysis and Design: A Critique, Boris Wyssusek

PDF

A Model of 3G Adoption, Xu Xin

PDF

A Conceptual Model of a Workflow Management System Based on Web Services, Bo Xu, Surya Yadav, and Dahui Li

PDF

Benefiting the Online Multi-brand Retailer: The Impact of Supplier's Direct Channel on Wholesale Market Competition, Ling Xue, Gautam Ray, and Andrew Whinston

PDF

Process Reengineering: China's Public Health Emergency Information System, Yajiong Xue, Huigang Liang, Yusheng He, and William Boulton

PDF

Investigating Factors Influencing Telemedicine Usage in Developing Countries, Yajiong Xue, Huigang Liang, Changxiao Jin, and Yongjun Liu

PDF

Criminal Relation Exploration Tool for Law Enforcement Knowledge Management, Jennifer Xu

PDF

Factors Affecting E-Business Diffusion in Organizations: Differences between Developed and Developing Countries, Sean Xu, Kevin Zhu, and Kenneth Kraemer

PDF

An Exploratory Study on the Assessment Model of E-Government in China, Lie Yang and Jinghua Huang

PDF

Web Hosting Service Model for E-Commerce Education, Yonghe Yan and Anthony Zoko

PDF

Lagged Impact of Information Technology on Organizational Productivity, Ulku Yaylacicegi and Nirup Menon

PDF

Infrastructural Challenges in Developing an Information Economy in Humboldt County, California, Benjamin Yeo, Eileen Trauth, and Perry Wong

PDF

Process change identification using workflow specification matching, M. Yeoh, P. Chung, C. Anumba, A. El-Hamalawi, and I. Motawa

PDF

Beyond Innovation Characteristics: Effects of Adopter Categories on the Acceptance Outcomes of Online Shopping, Mun Yi and Kirk Fiedler

PDF

The Impact of the Web-Based Product Recommendation System from Previous Buyers on Consumers' Purchasing Behavior, Seong-No Yoon and Zoonky Lee

PDF

Natural Language Interface for a Multi Agent System, Victoria Yoon, Bonnie Rubenstein-Montano, Teresa Wilson, and Stuart Lowry

PDF

The Development Process of Virtual Group Identity: A Virtual Educational Community Case, Chia-ping Yu and Mei-Lien Young

PDF

Eliciting Tacit Knowledge from Spoken Discourse, Michele Zappavigna-Lee and Jon Patrick

PDF

Ontological Analysis of the MibML Grammar using the Bunge-Wand-Weber Model, Hong Zhang, Rajiv Kishore, and Ram Ramesh

PDF

Applying Fuzzy Composite Programming to Assess and Compare Organizational Effectiveness of Knowledge Management Strategy, Lei Zhang, Biswadip Ghosh, Michael Mannino, and Judy Scott

PDF

IT Outsourcing and Competitive Advantage: A Competency-based View, Lixuan Zhang

PDF

Integrating Human-Computer Interaction Development into SDLC: A Methodology, Ping Zhang, Jane Carey, Dov Te'eni, and Marilyn Tremaine

PDF

Incidental Information Exchange: A Measure for Assessing the Affect of Mediated Communication on Work Relationships, Suling Zhang and Marilyn Tremaine

PDF

An Exploratory Study of Web Service Adoption, Xiaoni Zhang and Albert Huang

PDF

The Role of Incentives and Information Technologies for Knowledge Transfer in Firms, Zuopeng Zhang and Shankar Sundaresan

PDF

A Fuzzy Set Approach to Assessing E-Commerce Websites, Duanning Zhou and Wayne Huang

PDF

Recovering Punctuations in Instant Messages - Towards the prosody norm in IM, Lina Zhou and Ziming Zhuang

PDF

Analysis of IT Strategic Alignment and Infrastructure Capability in BPR Implementations, Shu Zou and Ravi Patnayakuni