Articles
Economic Analysis of Tradeoffs Between Security and Disaster Recovery
Mukul Gupta, Alok Chaturvedi, and Shailendra Mehta
A Two-Step Approach for Transforming Continuous Variables to Normal: Implications and Recommendations for IS Research
Gary F. Templeton
The Effects of Content Presentation Format and User Characteristics on Novice Developers’ Understanding of Process Models
Jan Recker and Alexander Dreiling
Home Internet Access and Usage in the USA: Trends in the Socio-Economic Digital Divide
Debabrata Talukdar and Dinesh K. Gauri
The Relationship Between Information and Communication Technologies and the Delivery of Public Health: A Country-level Study
Wullianallur Raghupathi and Sarah Jinhui Wu
An Empirical Investigation into the Assimilation of Open Source Server Software
Kris Ven and Jan Verelst
How Does Enterprise Architecture Add Value to Organisations?
Toomas Tamm, Peter B. Seddon, Graeme Shanks, and Peter Reynolds
The Relationship Between Information and Communication Technologies and Country Governance: An Exploratory Study
Wullianallur Raghupathi and Sarah Jinhui Wu
Using Latent Growth Modeling to Understand Longitudinal Effects in MIS Theory: A Primer
Mark A. Serva, Hemant Kher, and Jean-Philippe Laurenceau
Toward an IT Agenda
William W. Agresti
Dropping Your Tools: Exploring When and How Theories Can Serve as Blinders in IS Research
Jonny Holmström and Duane Truex
What Determines Actual Use of Mobile Web Browsing Services? A Contextual Study in Korea
Haejung Yun, Choong C. Lee, Byung Geun Kim, and William J. Kettinger
Information Security Risk Management: In Which Security Solutions Is It Worth Investing?
Stefan Fenz, Andreas Ekelhart, and Thomas Neubauer
The Road to Business-IT Alignment: A Case Study of Two Chinese Companies
Nianxin Wang, Yajiong Xue, Huigang Liang, and Shilun Ge
Look Before You Leap into ERP Implementation: An Object-Oriented Approach to Business Process Modeling
Parag Kosalge and Debabroto Chatterjee
Are Student Self-Assessments a Valid Proxy for Direct Assessments in Efforts to Improve Information Systems Courses and Programs? An Empirical Study
T.M. Rajkumar, Paul Anderson, John Benamati, and Jeffrey W. Merhout
How CIOs Overcome the Competing Values Challenge: Irish CIOs’ Perspectives
Harvey G. Enns, Dean B. McFarlin, and Paul D. Sweeney
Predicting Student-Perceived Learning Outcomes and Satisfaction in ERP Courses: An Empirical Investigation
Khaled A. Alshare and Peggy L. Lane
The Role of Habit in Post-Adoption Switching of Personal Information Technologies: An Empirical Investigation
Chen Ye and Richard Potter
Anti-Competitive Behaviors in Managed Competition: The Case of China’s Telecommunications Industry
Zhong Liu and Jason Whalley
Columns
The Identity Management Challenge
Heather A. Smith and James D. McKeen
The Changing Role of the CIO in the World of Outsourcing: Lessons Learned from a CIO Roundtable
David Gefen, Arik Ragowsky, Paul Licker, and Myles Stern
Enabling Collaboration with IT
Heather A. Smith and James D. McKeen
On Contending with Unruly Neighbors in the Global Village: Viewing Information Systems as Both Weapon and Target
Wm. David Salisbury, David W. Miller, and Lt Col Jason M. Turner
IS Pedagogy and Teaching Cases
ERP Implementation Gone Terribly Wrong: The Case of Natural Springs
Vlad Krotov, Serguei Boukhonine, and Blake Ives
Panel Reports
Study Abroad as an Education Experience: Challenges, Realizations, and Lessons Learned
Albert L. Harris, France Belanger, Karen Loch, Meg C. Murray, and Andrew Urbaczewski
Faculty Exchanges as a Way to Increase Globalization in the IS Curriculum
Albert L. Harris, Joey George, Mary Granger, and Geoffrey Dick
IT Services Management in the Curriculum: Challenges, Realizations, and Lessons Learned
Andrew Urbaczewski, Ramesh Venkataraman, and Paul Kontogiorgis
Addressing the Credibility Crisis in IS
David Firth, John King, Hope Koch, Clayton Arlen Looney, Paul Pavlou, and Eileen M. Trauth
Setting Our Research Agendas: Institutional Ecology, Informing Sciences, or Management Fashion Theory?
Michael David Myers, Richard L. Baskerville, Grandon Gill, and Neil Ramiller
ECIS 2010 Panel Report: Humanities-Enriched Information Systems
Jan H. Kroeze, Hugo H. Lotriet, Nehemiah Mavetera, Mark S. Pfaff, Dirk J.v.R. Postma, Kosheek Sewchurran, and Heikki Topi
Current and Future Issues in BPM Research: A European Perspective from the ERCIS Meeting 2010
Jan vom Brocke, Jörg Becker, Alessio Maria Braccini, Rimantas Butleris, Birgit Hofreiter, Kęstutis Kapočius, Marco De Marco, Günter Schmidt, Stefan Seidel, Alexander Simons, Tomáš Skopal, Armin Stein, Stefan Stieglitz, Reima Suomi, Gottfried Vossen, Robert Winter, and Stanislaw Wrycza
Future of Master’s Level Education in Information Systems
Heikki Topi, Markus Helfert, V. Ramesh, and Rolf T. Wigand
ICIS 2010 Panel Report: Technologies that Transform Business and Research: Lessons from the Past as We Look to the Future
Jeff Baker, Michel Avital, Gordon Davis, Frank Land, Howard Morgan, and James C. Wetherbe
Information Security and Privacy—Rethinking Governance Models
Kirstin Gillon, Louis Branz, Mary Culnan, Gurpreet Dhillon, Robert Hodgkinson, and Alastair MacWillson