| §1542 |
A Conceptual Model of Knowledge Elicitation |
| §1543 |
Difficulties in Quantifying IT Projects with Intangible Benefits: A Survey of Local IT Professionals
|
| §1544 |
Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity
|
| §1545 |
Component-based Software Development: Life Cycles and Design Science-based Recommendations
|
| §2115 |
Welcome to CONISAR 2009 Washington D.C.
|
| §2332 |
The Ethic and Moral Implications of Affective Computing
|
| §2362 |
The Relationship between Information Technology Critical Success Factors and Project Performance
|
| §2363 |
Factors that Persuade and Deter Membership in Professional Computing Associations
|
| §2364 |
The Impact of Transition Costs on Offshore Systems Development
|
| §2365 |
Using A Group Support System in Strategic Academic Planning – A Field Experimental Study on the Influence of Facilitation
|
| §2366 |
A Follow-up Study of Detecting Phishing Emails
|
| §3124 |
The Impact of Electronic Data Interchange Information Technology on External Auditors
|
| §3125 |
An Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model
|
| §3142 |
Towards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative
|
| §3143 |
Can Management Predict Information Security Threats by Utilizing a Data Warehouse?
|
| §3144 |
Spyware: What Influences College Students to Use Anti-Spyware Tools?
|
| §3145 |
Workflow Automation and Management Services in Web 2.0: An Object-based Approach to Distributed Workflow Enactment
|
| §3155 |
Business Requirements of Knowledge Management Ontology to Support a Software Deployment Process
|
| §3362 |
An Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Technology Firm
|
| §3363 |
Synchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution
|
| §3364 |
E-Commerce Security
|
| §3523 |
The Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls
|
| §3544 |
Analyzing Community Websites: A Main Street Perspective
|
| §3562 |
On Design Science, MCDM, and its Outsourcing Decisions
|
| §3563 |
Some Observations on the Occurrences of Data Breaches
|
| §3564 |
Knowledge Mapping in a Not-For-Profit Firm: A Case Study
|
| §3732 |
A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet
|
| §3733 |
Elements of Technology and Success in Virtual Teams
|
| §3742 |
Some Observations on the Occurrences of Phishing
|
| §3743 |
Object Reuse and Integration in Object-Relational Databases Development
|
| §3763 |
An Empirical Study of Text Messaging Behavioral Intention and Usage
|
| §4132 |
Women's Technology Acceptance of Mentoring on the Internet
|
| §4133 |
Virtual Organizations: A Definitional Framework
|
| §4134 |
The Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community
|
| §4135 |
Sustainability and Greening through Information Technology Management
|
| §4152 |
Spatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results
|
| §4153 |
Superfund Site Analysis Using Web 2.0 Technologies
|
| §4353 | The Effect of Gender on the Application of Ethics within Information Technology: A Meta-analysis
|