§1542 |
A Conceptual Model of Knowledge Elicitation |
§1543 |
Difficulties in Quantifying IT Projects with Intangible Benefits: A Survey of Local IT Professionals
|
§1544 |
Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity
|
§1545 |
Component-based Software Development: Life Cycles and Design Science-based Recommendations
|
§2115 |
Welcome to CONISAR 2009 Washington D.C.
|
§2332 |
The Ethic and Moral Implications of Affective Computing
|
§2362 |
The Relationship between Information Technology Critical Success Factors and Project Performance
|
§2363 |
Factors that Persuade and Deter Membership in Professional Computing Associations
|
§2364 |
The Impact of Transition Costs on Offshore Systems Development
|
§2365 |
Using A Group Support System in Strategic Academic Planning – A Field Experimental Study on the Influence of Facilitation
|
§2366 |
A Follow-up Study of Detecting Phishing Emails
|
§3124 |
The Impact of Electronic Data Interchange Information Technology on External Auditors
|
§3125 |
An Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model
|
§3142 |
Towards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative
|
§3143 |
Can Management Predict Information Security Threats by Utilizing a Data Warehouse?
|
§3144 |
Spyware: What Influences College Students to Use Anti-Spyware Tools?
|
§3145 |
Workflow Automation and Management Services in Web 2.0: An Object-based Approach to Distributed Workflow Enactment
|
§3155 |
Business Requirements of Knowledge Management Ontology to Support a Software Deployment Process
|
§3362 |
An Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Technology Firm
|
§3363 |
Synchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution
|
§3364 |
E-Commerce Security
|
§3523 |
The Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls
|
§3544 |
Analyzing Community Websites: A Main Street Perspective
|
§3562 |
On Design Science, MCDM, and its Outsourcing Decisions
|
§3563 |
Some Observations on the Occurrences of Data Breaches
|
§3564 |
Knowledge Mapping in a Not-For-Profit Firm: A Case Study
|
§3732 |
A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet
|
§3733 |
Elements of Technology and Success in Virtual Teams
|
§3742 |
Some Observations on the Occurrences of Phishing
|
§3743 |
Object Reuse and Integration in Object-Relational Databases Development
|
§3763 |
An Empirical Study of Text Messaging Behavioral Intention and Usage
|
§4132 |
Women's Technology Acceptance of Mentoring on the Internet
|
§4133 |
Virtual Organizations: A Definitional Framework
|
§4134 |
The Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community
|
§4135 |
Sustainability and Greening through Information Technology Management
|
§4152 |
Spatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results
|
§4153 |
Superfund Site Analysis Using Web 2.0 Technologies
|
§4353 | The Effect of Gender on the Application of Ethics within Information Technology: A Meta-analysis
|