Submissions from 2008
Evaluating TAM Antecedents in Saudi Arabia, Chad Anderson, Said S. Al-Gahtani, and Geoffrey S. Hubona
The Alignment Between Customer Relationship Management and IT Strategy: A Proposed Research Model, Durand Aurelie and Bouzidi Laïd
Factors Influencing Students’ Intentions of Continued Use of Learning Management Systems, Rakesh Babu
Countering Cyber Terrorism: Investment Models Under Decision and Game Theoretic Frameworks, Tridib Bandyopadhyay and Reda Sebalia
Tutorial: Web Analytics – A Brief Tutorial, Robert J. Boncella
What Makes Agile Development Different?: A Case Study of Agile In Practice, Lewis Chasalow
Expanding Mindshift Learning, Andrew P. Ciganek and Brant Wills
Employee Reactions to Technology Implementations: A Before and Within Implementation Comparison, Regina Cosentino and Richard D. Johnson
Insider Threats to Information Systems, James S. Griffin and Michael R. Grimaila
Does User Participation Lead to System Success?, Mark A. Harris and H. Roland Weistroffer
Information Technology Contingency Planning, Randy Harris and Michael R. Grimaila
The Effect of Brand on the Evaluation of IT System Performance, Bernard J. Jansen, Mimi Zhang, and Carsten D. Schultz
Traditional and Modern Methodologies in ERP Systems Implementation Using Microsoft Dynamics-GP, Anand Jeyaraj and Vikram Sethi
Computer Aided Traumatic Pelvic Injury Decision-making, Soo-Yeon Ji, Kayvan Najarian, Rebecca Smith, and Toan Huynh
The Big Brother and Better Early College Grades, Robert Joyce and Harald Schmidl
Event Differentiation in Service-Oriented Information Systems, Harry Katzan Jr.
Tutorial: IT Services Management , Harry Katzan Jr.
Tutorial: Survey of Service Science , Harry Katzan Jr.
The Role of Negotiation in Privacy-Enhanced E-Commerce Transactions, K. Niki Kunene, Francis Kofi Andoh-Baidoo, and George M. Kasper
A Tool for Identifying Swarm Intelligence on a Free/Open Source Software Mailing List, Lars P. Linden
Web 2.0 Technologies in the Classroom, Richard G. Mathieu, Thomas Case, Carolyn McKinnell Jacobson, and George Schell
Issues with Incorporating Regulatory Compliance into Agile Development: A Critical Analysis, Sushma Mishra and H. Roland Weistroffer
Will Mistrust Be Directed at the System Rather than the Expert When Erroneous Knowledge is Shared? Conclusions from a Literature Review, Rodger Morrison
Workshop: Supporting the Teaching of Database Concepts with Animation Courseware, Meg Murray and Mario Guimaraes
Student Satisfaction: Face-to-Face with Online, Solomon Negash and John Vandegrieft
Electronic Medical Record (EMR) Informatics Security, Byron Nicholson, Michael R. Grimaila, and Dennis Strouble
Improving CIS Enrollments Through Flexible Minors: An Examination of Existing Curricula, Lissa Pollacia, William Lomerson, and Jack Russell
Convergence and Productive Efficiency in the Context of 18 Transition Economies: Empirical Investigation Using DEA, Sergey Samoilenko and LaTrelle Green
A Web Portal Approach to Improving Higher Education Accessibility: CFNC.ORG, Elaine Seeman and Brenda L. Killingsworth
Toward the Understanding of Organizational Flexibility, Joseph B. Skipper and W. Heath Landrum
Cyber Law Workshop: Adding a Course to Your Curriculum, Dennis D. Strouble and Mary C. Carroll
Law and Cyber War, Dennis D. Strouble and Mary C. Carroll
Developing an Instrument for Measuring Electronic Shopping Service Quality: E-SQUAL, Samar I. Swaid
Use of Hirsch Index for Measuring the Impact of IS Academic Research and Journals, Hiro Takeda and Michael J. Cuellar
Disaster Recovery Planning: A PMT-based Conceptual Model, Shalini Wunnava and Selwyn Ellis
An Exploration of the Best Practices for Securing Contractual Helpdesk Services, Joy Young and Meg Murray
Channel Allocation Algorithms for Wireless Local Loops: Past Studies and Future Directions, Xihui Zhang, Tao Hu, and M. Shane Banks