default search action
Journal of Systems and Information Technology, Volume 17
Volume 17, Number 1, 2015
- Heini Sisko Maarit Lipiäinen:
CRM in the digital age: implementation of CRM in three contemporary B2B firms. 2-19 - Mikael Blomé:
Visualization and establishment of product design regulations as interactive modules: An interaction design study at IKEA. 20-34 - Robert Hugh Campbell, Mark Grimshaw:
Enochs of the modern workplace: The behaviours by which end users intentionally resist information system implementations. 35-53 - Habib Ullah Khan, Faisal Talib, Mohd. Nishat Faisal:
An analysis of the barriers to the proliferation of M-commerce in Qatar: A relationship modeling approach. 54-81 - Tae-Bong Lee, Min-Nyeon Kim:
The analysis of near and far field pattern through mode analysis and FFT in a finite periodic dielectric gratings. 82-90 - Eunhwa Jung, Kyungho Hong:
Biometric verification based on facial profile images for mobile security. 91-100
Volume 17, Number 2, 2015
- Hyeongi Baek, Mun Koo Kang:
A study on the ontology building methodology for diseases of mind diagnosis. 102-112 - Seokmo Gu, Aria Seo, Yeichang Kim:
A study on distributed transcoding using dynamic allocation of virtual machines in a cloud computing environment. 113-120 - Jaakko Sinisalo, Heikki Karjaluoto, Saila Saraniemi:
Barriers to the use of mobile sales force automation systems: a salesperson's perspective. 121-140 - Almamy Touray, Taina Savolainen, Airi Salminen, Erkki Sutinen, Yue Dai:
The role of trust in enhancing Internet use in a high-risk society. 141-166 - Lakshmanan Ramanathan, Sundaresan Krishnan Iyer:
An empirical investigation into the adoption of open source software in Information Technology outsourcing organizations. 167-192 - Palaniappan Shamala, Rabiah Ahmad, Ali Hussein Zolait, Shahrin bin Sahib:
Collective information structure model for Information Security Risk Assessment (ISRA). 193-219
Volume 17, Number 3, 2015
- Aaron Wolfgang Baur, Julian Bühler, Markus Bick:
How pricing of business intelligence and analytics SaaS applications can catch up with their technology. 229-246 - Ronda Harrison, Angelique Parker, Gabrielle Brosas, Raymond Chiong, Xuemei Tian:
The role of technology in the management and exploitation of internal business intelligence. 247-262 - Md. Shamsul Arefin, Md. Rakibul Hoque, Yukun Bao:
The impact of business intelligence on organization's effectiveness: an empirical study. 263-285 - Amelia Cahyadi, Adi Prananto:
Reflecting design thinking: a case study of the process of designing dashboards. 286-306 - Janelle Boyton, Peter Ayscough, David Kaveri, Raymond Chiong:
Suboptimal business intelligence implementations: understanding and addressing the problems. 307-320 - Xuemei Tian, Raymond Chiong, Bill Martin, Rosemary Stockdale:
Introduction to the special issue of the Journal of Systems and Information Technology on Business Intelligence.
Volume 17, Number 4, 2015
- Mark John Taylor, John Haggerty, David Gresty, Natalia Criado Pacheco, Tom Berry, Peter Almond:
Investigating employee harassment via social media. 322-335 - Yong Liu, Shengli Deng, Feng Hu, Xiaoyu Chen:
The impacts of unique service resources and habit on e-service loyalty in a highly competitive market. 336-350 - Chunmei Gan, Weijun Wang:
Uses and gratifications of social media: a comparison of microblog and WeChat. 351-363 - Yiwei Gong, Marijn Janssen:
Demystifying the benefits and risks of Lean service innovation: a banking case study. 364-380 - Ping Wang:
Exploring the influence of electronic word-of-mouth on tourists' visit intention: A dual process approach. 381-395
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.