default search action
European Journal of Information Systems, Volume 18
Volume 18, Number 1, February 2009
- Richard L. Baskerville:
The EJIS editorial organisation and submissions. 1-3
- Sigi Goode, Shirley Gregor:
Rethinking organisational size in IS research: meaning, measurement and redevelopment. 4-25 - Joshua M. Davis, William J. Kettinger, Dimitar G. Kunev:
When users are IT experts too: the effects of joint IT competence and partnership on satisfaction with enterprise-level systems implementation. 26-37 - Ting Li, Eric van Heck, Peter Vervest:
Information capability and value creation strategy: advancing revenue management through mobile ticketing technologies. 38-51 - Peter Meso, Philip F. Musa, Detmar W. Straub, Victor Wacham A. Mbarika:
Information infrastructure, governance, and socio-economic development in developing countries. 52-65 - Anita Mangan, Séamas Kelly:
Information systems and the allure of organisational integration: a cautionary tale from the Irish financial services sector. 66-78 - Eduardo Redondo, Elizabeth M. Daniel, John M. Ward:
Combining the rational and relational perspectives of electronic trading. 79-97
- Selamawit Molla Mekonnen, Sundeep Sahay:
An institutional analysis on the dynamics of the interaction between standardizing and scaling processes: a case study from Ethiopia. 98
Volume 18, Number 2, April 2009
- Merrill Warkentin, Robert Willison:
Behavioral and policy issues in information systems security: the insider threat. 101-105
- Tejaswini C. Herath, H. Raghav Rao:
Protection motivation and deterrence: a framework for security policy compliance in organisations. 106-125 - Liisa Myyry, Mikko T. Siponen, Seppo Pahnila, Tero Vartiainen, Anthony Vance:
What levels of moral reasoning and values explain adherence to information security rules? An empirical study. 126-139 - Carol W. Hsu:
Frame misalignment: interpreting the implementation of information systems security certification in an organization. 140-150 - Scott R. Boss, Laurie J. Kirsch, Ingo Angermeier, Raymond A. Shingler, R. Wayne Boss:
If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security. 151-164 - Jie Zhang, Xin (Robert) Luo, Somasheker Akkaladevi, Jennifer L. Ziegelmayer:
Improving multiple-password recall: an empirical study. 165-176 - Younghwa Lee, Kai R. T. Larsen:
Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software. 177-187
Volume 18, Number 3, June 2009
- Ray J. Paul:
What is published in our journals cannot change unless we do. 189-191
- Fay Cobb Payton, James Kiwanuka-Tondo:
Contemplating public policy in HIV/AIDS online content, then where is the technology spirit? 192-204 - Israr Qureshi, Yulin Fang, Elaine Ramsey, Patrick McCole, Patrick Ibbotson, Deborah Compeau:
Understanding online customer repurchasing intention and the mediating role of trust - an empirical investigation in two developed countries. 205-222 - Mohammed Ibrahim, Pieter M. A. Ribbers:
The impacts of competence-trust and openness-trust on interorganizational systems. 223-234 - Bjarne Berg, Antonis C. Stylianou:
Factors considered when outsourcing an IS system: an empirical examination of the impacts of organizational size, strategy and the object of a decision. 235-248 - Claudio Vitari, Aurelio Ravarini:
A longitudinal analysis of trajectory changes in the software industry: the case of the content management application segment. 249-263 - Fernando Alonso Mendo, Guy Fitzgerald, Enrique Frías-Martínez:
Understanding web site redesigns in small- and medium-sized enterprises (SMEs): a U.K.-based study on the applicability of e-commerce Stage Models. 264-279
Volume 18, Number 4, August 2009
- Pekka Abrahamsson, Kieran Conboy, Xiaofeng Wang:
'Lots done, more to do': the current state of agile systems development research. 281-284
- Saonee Sarker, Charles L. Munson, Suprateek Sarker, Suranjan Chakraborty:
Assessing the relative contribution of the facets of agility to distributed systems development success: an Analytic Hierarchy Process approach. 285-299 - Fredrik J. Karlsson, Pär J. Ågerfalk:
Exploring agile values in method configuration. 300-316 - Daniel Port, Tung Bui:
Simulating mixed agile and plan-based requirements prioritization strategies: proof-of-concept and practical implications. 317-331 - Lan Cao, Kannan Mohan, Peng Xu, Balasubramaniam Ramesh:
A framework for adapting agile development methodologies. 332-343 - George Mangalaraj, RadhaKanta Mahapatra, Sridhar P. Nerur:
Acceptance of software process innovations - the case of extreme programming. 344-354 - Likoebe M. Maruping, Xiaojun Zhang, Viswanath Venkatesh:
Role of collective ownership and coding standards in coordinating expertise in software project teams. 355-371 - John McAvoy, Tom Butler:
The role of project management in ineffective decision making within Agile software development projects. 372-383
Volume 18, Number 5, October 2009
- Hans van der Heijden:
Progress in information systems research. 385-386
- Boriana Rukanova, Eveline Van Stijn, Helle Zinner Henriksen, Ziv Baida, Yao-Hua Tan:
Understanding the influence of multiple levels of governments on the development of inter-organizational systems. 387-408 - Rajendra Singh, Mark Keil, Vijay Kasi:
Identifying and overcoming the challenges of implementing a project management office. 409-427 - Pernille Bjørn, Sue Burgoyne, Vicky Crompton, Teri MacDonald, Barbe Pickering, Sue Munro:
Boundary factors and contextual contingencies: configuring electronic templates for healthcare professionals. 428-441 - Chaojie Duan, Varun Grover, Nagraj (Raju) Balakrishnan:
Business Process Outsourcing: an event study on the nature of processes and firm valuation. 442-457
- Cynthia K. Riemenschneider, Deborah J. Armstrong, Jo Ellen Moore:
Meeting the demand for IT workers: A call for research. 458-461
- Nathan Heinze, Qing Hu:
Why college undergraduates choose IT: a multi-theoretical perspective. 462-475 - Eileen M. Trauth, Jeria L. Quesenberry, Haiyan Huang:
Retaining women in the U.S. IT workforce: theorizing the influence of organizational factors. 476-497 - Gaëtan Mourmant, Michael J. Gallivan, Michel Kalika:
Another road to IT turnover: the entrepreneurial path. 498-521
Volume 18, Number 6, December 2009
- Richard L. Baskerville:
Preparing for evidence-based management. 523-525
- Gaurav Kapoor, Wei Zhou, Selwyn Piramuthu:
Challenges associated with RFID tag implementations in supply chains. 526-533
- Indranil Bose, Eric W. T. Ngai, Thompson S. H. Teo, Sarah Spiekermann:
Managing RFID projects in organizations. 534-540
- Katerina Pramatari, Aristeidis Theotokis:
Consumer acceptance of RFID-enabled services: a model of multiple attitudes, perceived system characteristics and individual traits. 541-552 - Robert F. Otondo, Allison W. Pearson, Rodney A. Pearson, John C. Shaw, Jung P. Shim:
Managerial problem-solving in the adoption of Radio Frequency Identification Technologies. 553-569 - Wei Zhou, Gaurav Kapoor, Selwyn Piramuthu:
RFID-enabled item-level product information revelation. 570-577 - Henning Baars, Daniel Gille, Jens Strüker:
Evaluation of RFID applications for logistics: a framework for identifying, forecasting and assessing benefits. 578-591 - Frédéric Thiesse, Jasser Al-Kassab, Elgar Fleisch:
Understanding the value of integrated RFID systems: a case study from apparel retail. 592-614 - Samuel Fosso Wamba, Akemi Takeoka Chatfield:
A contingency model for creating value from RFID supply chain network projects in logistics and manufacturing environments. 615-636
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.