Articles
A General, But Readily Adaptable Model of Information System Risk
Steven Alter and Susan A. Sherer
Information Systems Risks and Risk Factors: Are They Mostly About Information Systems?
Susan A. Sherer and Steven Alter
Economics of ITSecurity Management: Four Improvements to Current Security Practices
Hasan Cavusoglu, Huseyin Cavusoglu, and Srinivasan Raghunathan
Developing a Modern Infrastructure for Open Distance Education in China: The Implementation of the NCEC Project
John Gordon, Chongrong Li, Zhangxi Lin, and Dehua Yang
Computational Ontologies and Information Systems I: Foundations
Rajiv Kishore and Raj Sharman
Computational Ontologies and Information Systems II: Formal Specification
Raj Sharman, Rajiv Kishore, and Ram Ramesh
Holistic Compliance with Sarbanes-Oxley
Linda Volonino, Guy H. Gessner, and George F. Kermis
Business Intelligence Software for the Classroom: MicroStrategy Resources on the Teradata University Network
Barbara H. Wixom
Managing Metadata in Data Warehouses: Pitfalls and Possibilities
G. Shankaranarayanan and Adir Even
Intelligent Agents
Ira Rudowsky
Spyware: The Ghost in the Machine
Thomas F. Stafford and Andrew Urbaczewski
Interdisciplinary Research and Publication Opportunites in Information Systems and Health Care
E. Vance Wilson and Nancy K. Lankton
Web and Web Security
Robert J. Boncella
An E-Readiness Assesment Framework and Two Field Studies
J.H. Huang, W. W. Huang, C.J. Zhao, and H. Huang
Media Selection to Meet Communications Contexts: Comparing E-Mail and Instant Messaging in an Undergraduate Population
Kuanchin Chen, David C. Yen, and Albert H. Huang
Knowledge Management: A Primer
Elayne Coakes
Research Methodologies in MIS: An Update
Prashant Palvia, David Leary, En Mao, Vishal Midha, Parveen Pinjani, and A.F. Salam
The Impact of Global Outsourcing on IT Providers
Subramanyan Murthy
M-Commerce Services: Promises and Challenges
John Mathew, Suprateek Sarker, and Upkar Varshney
Storage Area Networks
Manjari Mehta and Blake Ives
Champion Networks in Federated Interorganizational Systems: Case Studies in Telemedicine
Monica Garfield, Arnold A. Kamis, and Cynthia M. Le Rouge
The Design and Three-Year Review of an MS Program in Information Technology for Preparing Systems Integrators
Donald R. Chand
The Impact of CRM on Firm- andRelationship-Level Performance in Distributed Networks
Jae Wook Kim, Jiho Choi, William Qualls, and Jinsoo Park
How Good Is the Professional's Aptitude in the Conceptual Understanding of Change Management?
Guy Paré and Jean-François Jutras
Empirical Test of a Hacking Model: An Exploratory Study
Al Bento and Regina Bento
E-Document Management Based on Web services and XML
Ou Liu, Jian Ma, Ji-Ye Mao, Ron C.W. Kwok, and Dong Li
Column
Developments in Practice XIV: Marketing KM to the Organization
Heather A. Smith and James D. McKeen
IS Pedagogy and Teaching Cases
Netbank: The Conservative Internet Entrepreneurs
Cheryl Rothstein and Richard T. Watson
Panel Reports
The AMCIS 2003 Panels on IS Education-I: Let Us Not Throw Out the Baby with the Bath Water: Information, Technology, and Systems All Matter in the Core IS Course
Wm. David Salisbury, Mark W. Huber, Craig Piercy, and Kevin Lee Elder
The AMCIS 2003 Panels of IS Education-II: The Chicken and the Egg Debate: Positioning Database Content in the Information Systems Curriculum
Chelley Vician, with, Monica Garfield, Jeffrey A. Hoffer, Mary Prescott, Bruce Rollier, Diane Strong, and Kevin Lee Elder