callback( { "result":{ "query":":facetid:toc:\"db/conf/ecis/ecis2015.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"213.61" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"287", "@dc":"287", "@oc":"287", "@id":"43378188", "text":":facetid:toc:db/conf/ecis/ecis2015.bht" } }, "hits":{ "@total":"287", "@computed":"287", "@sent":"287", "@first":"0", "hit":[{ "@score":"1", "@id":"3543706", "info":{"authors":{"author":[{"@pid":"160/5168","text":"Olga Abramova"},{"@pid":"172/7353","text":"Tetiana Shavanova"},{"@pid":"172/7390","text":"Andrea Fuhrer"},{"@pid":"46/4564","text":"Hanna Krasnova"},{"@pid":"65/1278","text":"Peter Buxmann"}]},"title":"Understanding the Sharing Economy: The Role of Response to Negative Reviews in the Peer-to-peer Accommodation Sharing Network.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/AbramovaSFKB15","ee":"http://aisel.aisnet.org/ecis2015_cr/1","url":"https://dblp.org/rec/conf/ecis/AbramovaSFKB15"}, "url":"URL#3543706" }, { "@score":"1", "@id":"3543707", "info":{"authors":{"author":[{"@pid":"28/2182","text":"Pär J. Ågerfalk"},{"@pid":"f/BrianFitzgerald","text":"Brian Fitzgerald 0001"},{"@pid":"08/7091","text":"Klaas-Jan Stol"}]},"title":"Not so Shore Anymore: The New Imperatives When Sourcing in the Age of Open.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/AgerfalkFS15","ee":"http://aisel.aisnet.org/ecis2015_cr/2","url":"https://dblp.org/rec/conf/ecis/AgerfalkFS15"}, "url":"URL#3543707" }, { "@score":"1", "@id":"3543708", "info":{"authors":{"author":[{"@pid":"172/7533","text":"Fahed Al-Duwailah"},{"@pid":"00/3925","text":"Maged Ali"},{"@pid":"79/8293","text":"Mutaz M. Al-Debei"}]},"title":"The Impact of CRM Infrastructural and Cultural Resources and Capabilities on Business Performance: An Application of the Resource-based View in the Mobile Telecommunications Industry.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Al-DuwailahAA15","ee":"http://aisel.aisnet.org/ecis2015_cr/4","url":"https://dblp.org/rec/conf/ecis/Al-DuwailahAA15"}, "url":"URL#3543708" }, { "@score":"1", "@id":"3543709", "info":{"authors":{"author":[{"@pid":"172/7389","text":"Adel Alamin"},{"@pid":"97/4283-2","text":"William Yeoh 0002"},{"@pid":"10/2372","text":"Matthew J. Warren"},{"@pid":"151/5045","text":"Scott Salzman"}]},"title":"An Empirical Study of Factors Influencing Accounting Information Systems Adoption.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/AlaminYWS15","ee":"http://aisel.aisnet.org/ecis2015_cr/3","url":"https://dblp.org/rec/conf/ecis/AlaminYWS15"}, "url":"URL#3543709" }, { "@score":"1", "@id":"3543710", "info":{"authors":{"author":[{"@pid":"172/7437","text":"Simon Jonas Alfano"},{"@pid":"125/0630","text":"Stefan Feuerriegel"},{"@pid":"90/1401","text":"Dirk Neumann 0001"}]},"title":"Is News Sentiment More Than Just Noise?","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/AlfanoFN15","ee":"http://aisel.aisnet.org/ecis2015_cr/5","url":"https://dblp.org/rec/conf/ecis/AlfanoFN15"}, "url":"URL#3543710" }, { "@score":"1", "@id":"3543711", "info":{"authors":{"author":[{"@pid":"118/8833","text":"Ali Alkhalifah"},{"@pid":"23/4325","text":"John D'Ambra"}]},"title":"Identity Management Systems Research: Frameworks, Emergemce, and Future Opportunities.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/AlkhalifahD15","ee":"http://aisel.aisnet.org/ecis2015_cr/6","url":"https://dblp.org/rec/conf/ecis/AlkhalifahD15"}, "url":"URL#3543711" }, { "@score":"1", "@id":"3543712", "info":{"authors":{"author":[{"@pid":"37/9766","text":"Luca Allodi"},{"@pid":"59/6145","text":"Fabio Massacci"}]},"title":"The Work-Averse Attacker Model.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/AllodiM15","ee":"http://aisel.aisnet.org/ecis2015_cr/7","url":"https://dblp.org/rec/conf/ecis/AllodiM15"}, "url":"URL#3543712" }, { "@score":"1", "@id":"3543713", "info":{"authors":{"author":[{"@pid":"147/4670","text":"Miglena Amirpur"},{"@pid":"142/8133","text":"Marvin Fleischmann"},{"@pid":"22/6015","text":"Alexander Benlian"},{"@pid":"34/1059","text":"Thomas Hess"}]},"title":"Keeping Software Users on Board - Increasing Continuance Intention Through Incremental Feature Updates.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/AmirpurFBH15","ee":"http://aisel.aisnet.org/ecis2015_cr/8","url":"https://dblp.org/rec/conf/ecis/AmirpurFBH15"}, "url":"URL#3543713" }, { "@score":"1", "@id":"3543714", "info":{"authors":{"author":[{"@pid":"27/2938","text":"Chintan Amrit"},{"@pid":"51/616","text":"Fons Wijnhoven"},{"@pid":"172/7452","text":"David Beckers"}]},"title":"Information Waste on the World Wide Web and Combating the Clutter.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/AmritWB15","ee":"http://aisel.aisnet.org/ecis2015_cr/9","url":"https://dblp.org/rec/conf/ecis/AmritWB15"}, "url":"URL#3543714" }, { "@score":"1", "@id":"3543715", "info":{"authors":{"author":[{"@pid":"81/4067","text":"Gonçalo Antunes"},{"@pid":"92/6274","text":"José Barateiro"},{"@pid":"30/4231","text":"Artur Caetano"},{"@pid":"27/71","text":"José Borbinha"}]},"title":"Analysis of Federated Enterprise Architecture Models.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/AntunesBCB15","ee":"http://aisel.aisnet.org/ecis2015_cr/10","url":"https://dblp.org/rec/conf/ecis/AntunesBCB15"}, "url":"URL#3543715" }, { "@score":"1", "@id":"3543716", "info":{"authors":{"author":[{"@pid":"68/306","text":"Deborah J. Armstrong"},{"@pid":"83/4092","text":"Cindy K. Riemenschneider"},{"@pid":"172/7468","text":"Yi Jack Liu"}]},"title":"How Managers and Workers See Their World: Perceptions of the Relationship Between Organizational Capabilities and Absorptive Capacity in U.S. State Information Systems Departments.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/ArmstrongRL15","ee":"http://aisel.aisnet.org/ecis2015_cr/11","url":"https://dblp.org/rec/conf/ecis/ArmstrongRL15"}, "url":"URL#3543716" }, { "@score":"1", "@id":"3543717", "info":{"authors":{"author":{"@pid":"142/8036","text":"Aleksandre Asatiani"}},"title":"Why Cloud? - A Review of Cloud Adoption Determinants in Organizations.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Asatiani15","ee":"http://aisel.aisnet.org/ecis2015_cr/13","url":"https://dblp.org/rec/conf/ecis/Asatiani15"}, "url":"URL#3543717" }, { "@score":"1", "@id":"3543718", "info":{"authors":{"author":[{"@pid":"07/3903","text":"Michel Avital"},{"@pid":"10/2172","text":"Jan Damsgaard"},{"@pid":"g/ShirleyGregor","text":"Shirley Gregor"},{"@pid":"57/4937","text":"Dov Te'eni"},{"@pid":"99/6094","text":"Virpi Kristiina Tuunainen"},{"@pid":"92/1534","text":"Leslie P. Willcocks"}]},"title":"Mitigating the Tragedy of the Commons in Scientific Publishing: Creating a Market for Information Systems Articles.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/AvitalDGTTW15","ee":"http://aisel.aisnet.org/ecis2015_panels/3","url":"https://dblp.org/rec/conf/ecis/AvitalDGTTW15"}, "url":"URL#3543718" }, { "@score":"1", "@id":"3543719", "info":{"authors":{"author":[{"@pid":"55/3585","text":"Balbir S. Barn"},{"@pid":"142/7915","text":"Ravinder Barn"}]},"title":"Resilience and Values: Antecedents for Effective Co-design of Information Systems.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/BarnB15","ee":"http://aisel.aisnet.org/ecis2015_cr/14","url":"https://dblp.org/rec/conf/ecis/BarnB15"}, "url":"URL#3543719" }, { "@score":"1", "@id":"3543720", "info":{"authors":{"author":[{"@pid":"96/10684","text":"Annika Baumann"},{"@pid":"07/3592","text":"Stefan Lessmann"},{"@pid":"12/361","text":"Kristof Coussement"},{"@pid":"17/8023","text":"Koen W. De Bock"}]},"title":"Maximize What Matters: Predicting Customer Churn With Decision-Centric Ensemble Selection.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/BaumannLCB15","ee":"http://aisel.aisnet.org/ecis2015_cr/15","url":"https://dblp.org/rec/conf/ecis/BaumannLCB15"}, "url":"URL#3543720" }, { "@score":"1", "@id":"3543721", "info":{"authors":{"author":[{"@pid":"172/7367","text":"Ruth Baumgart"},{"@pid":"134/3163","text":"Markus Hummel"},{"@pid":"77/1048","text":"Roland Holten"}]},"title":"Personality Traits of Scrum Roles in Agile Software Development Teams - A Qualitative Analysis.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/BaumgartHH15","ee":"http://aisel.aisnet.org/ecis2015_cr/16","url":"https://dblp.org/rec/conf/ecis/BaumgartHH15"}, "url":"URL#3543721" }, { "@score":"1", "@id":"3543722", "info":{"authors":{"author":[{"@pid":"135/3086","text":"Janek Benthaus"},{"@pid":"08/6046","text":"Roman Beck"}]},"title":"It's More about the Content than the Users! The Influence of Social Broadcasting on Stock Markets.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/BenthausB15","ee":"http://aisel.aisnet.org/ecis2015_cr/17","url":"https://dblp.org/rec/conf/ecis/BenthausB15"}, "url":"URL#3543722" }, { "@score":"1", "@id":"3543723", "info":{"authors":{"author":[{"@pid":"27/6676","text":"Daniel Beverungen"},{"@pid":"153/1084","text":"Benjamin Klör"},{"@pid":"129/5356","text":"Sebastian Bräuer"},{"@pid":"155/4959","text":"Markus Monhof"}]},"title":"Will They Die Another Day? A Decision Support Perspective on Reusing Electric Vehicle Batteries.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/BeverungenKBM15","ee":"http://aisel.aisnet.org/ecis2015_rip/36","url":"https://dblp.org/rec/conf/ecis/BeverungenKBM15"}, "url":"URL#3543723" }, { "@score":"1", "@id":"3543724", "info":{"authors":{"author":[{"@pid":"131/8318","text":"Prasanta Bhattacharya"},{"@pid":"125/0498","text":"Tuan Quang Phan"},{"@pid":"a/EdoardoAiroldi","text":"Edoardo M. Airoldi"}]},"title":"Analyzing the Co-evolution of Network Structure and Content Generation in Online Social Networks.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/BhattacharyaPA15","ee":"http://aisel.aisnet.org/ecis2015_cr/18","url":"https://dblp.org/rec/conf/ecis/BhattacharyaPA15"}, "url":"URL#3543724" }, { "@score":"1", "@id":"3543725", "info":{"authors":{"author":[{"@pid":"160/4291","text":"Sebastian M. Blanc"},{"@pid":"66/3826","text":"Thomas Setzer"}]},"title":"Improving Forecast Accuracy by Guided Manual Overwrite in Forecast Debiasing.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/BlancS15","ee":"http://aisel.aisnet.org/ecis2015_rip/66","url":"https://dblp.org/rec/conf/ecis/BlancS15"}, "url":"URL#3543725" }, { "@score":"1", "@id":"3543726", "info":{"authors":{"author":[{"@pid":"129/5314","text":"Daniel Braunnagel"},{"@pid":"19/3325","text":"Florian Johannsen"},{"@pid":"78/742","text":"Susanne Leist"}]},"title":"Analysing the Contribution of Coupling Metrics for the Development and Management of Process Architectures.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/BraunnagelJL15","ee":"http://aisel.aisnet.org/ecis2015_cr/19","url":"https://dblp.org/rec/conf/ecis/BraunnagelJL15"}, "url":"URL#3543726" }, { "@score":"1", "@id":"3543727", "info":{"authors":{"author":[{"@pid":"160/9693","text":"Christoph F. Breidbach"},{"@pid":"94/226","text":"Paul P. Maglio"}]},"title":"A Service Science Perspective on the Role of ICT in Service Innovation.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/BreidbachM15","ee":"http://aisel.aisnet.org/ecis2015_rip/33","url":"https://dblp.org/rec/conf/ecis/BreidbachM15"}, "url":"URL#3543727" }, { "@score":"1", "@id":"3543728", "info":{"authors":{"author":[{"@pid":"135/3047","text":"Christian Brenig"},{"@pid":"02/3544","text":"Rafael Accorsi"},{"@pid":"74/5441","text":"Günter Müller"}]},"title":"Economic Analysis of Cryptocurrency Backed Money Laundering.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/BrenigAM15","ee":"http://aisel.aisnet.org/ecis2015_cr/20","url":"https://dblp.org/rec/conf/ecis/BrenigAM15"}, "url":"URL#3543728" }, { "@score":"1", "@id":"3543729", "info":{"authors":{"author":[{"@pid":"133/2212","text":"Tijs A. van den Broek"},{"@pid":"52/5629","text":"Anne Fleur van Veenstra"}]},"title":"Modes of Governance in Inter-Organizational Data Collaborations.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/BroekV15","ee":"http://aisel.aisnet.org/ecis2015_cr/188","url":"https://dblp.org/rec/conf/ecis/BroekV15"}, "url":"URL#3543729" }, { "@score":"1", "@id":"3543730", "info":{"authors":{"author":[{"@pid":"172/7515","text":"Sean Browne"},{"@pid":"00/1679-4","text":"Michael Lang 0001"},{"@pid":"17/236","text":"William Golden"}]},"title":"The Insider Threat - Understanding The Aberrant Thinking Of The Rogue"Trusted Agent".","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/BrowneLG15","ee":"http://aisel.aisnet.org/ecis2015_rip/5","url":"https://dblp.org/rec/conf/ecis/BrowneLG15"}, "url":"URL#3543730" }, { "@score":"1", "@id":"3543731", "info":{"authors":{"author":[{"@pid":"172/7543","text":"Robin Bühler"},{"@pid":"54/2624","text":"Christian Janiesch"}]},"title":"Standards Assessment in Disruptive Innovation: A Software Prototype for Cloud Computing.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/BuhlerJ15","ee":"http://aisel.aisnet.org/ecis2015_rip/26","url":"https://dblp.org/rec/conf/ecis/BuhlerJ15"}, "url":"URL#3543731" }, { "@score":"1", "@id":"3543732", "info":{"authors":{"author":[{"@pid":"172/6881","text":"An Bui"},{"@pid":"97/3958","text":"Daniel Veit"}]},"title":"The Effects of Gamification on Driver Behavior: An Example from a Free Float Carsharing Service.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/BuiV15","ee":"http://aisel.aisnet.org/ecis2015_rip/28","url":"https://dblp.org/rec/conf/ecis/BuiV15"}, "url":"URL#3543732" }, { "@score":"1", "@id":"3543733", "info":{"authors":{"author":[{"@pid":"14/3906","text":"Tom Butler"},{"@pid":"22/914","text":"Ray Hackney"}]},"title":"Understanding Digital Eco-innovation in Municipalities: An Institutional Perspective.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/ButlerH15","ee":"http://aisel.aisnet.org/ecis2015_cr/21","url":"https://dblp.org/rec/conf/ecis/ButlerH15"}, "url":"URL#3543733" }, { "@score":"1", "@id":"3543734", "info":{"authors":{"author":{"@pid":"00/6507","text":"Bendik Bygstad"}},"title":"The Coming of Lightweight IT.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Bygstad15","ee":"http://aisel.aisnet.org/ecis2015_cr/22","url":"https://dblp.org/rec/conf/ecis/Bygstad15"}, "url":"URL#3543734" }, { "@score":"1", "@id":"3543735", "info":{"authors":{"author":[{"@pid":"00/6507","text":"Bendik Bygstad"},{"@pid":"06/6748","text":"Ole Hanseth"},{"@pid":"172/7492","text":"Dan Truong Le"}]},"title":"From IT Silos to Integrated Solutions. A Study in E-Health Complexity.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/BygstadHL15","ee":"http://aisel.aisnet.org/ecis2015_cr/23","url":"https://dblp.org/rec/conf/ecis/BygstadHL15"}, "url":"URL#3543735" }, { "@score":"1", "@id":"3543736", "info":{"authors":{"author":[{"@pid":"30/593","text":"João Álvaro Carvalho"},{"@pid":"57/288","text":"Brian Donnellan"},{"@pid":"27/408","text":"Helena Karsten"}]},"title":"Addressing the Challenges of the Networked Society Through the Next Generation of IS Masters-level Curricula.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/CarvalhoDK15","ee":"http://aisel.aisnet.org/ecis2015_panels/1","url":"https://dblp.org/rec/conf/ecis/CarvalhoDK15"}, "url":"URL#3543736" }, { "@score":"1", "@id":"3543737", "info":{"authors":{"author":[{"@pid":"151/0333","text":"Nico Castelli"},{"@pid":"152/1063","text":"Niko Schönau"},{"@pid":"62/3493","text":"Gunnar Stevens"},{"@pid":"94/7036","text":"Tobias Schwartz 0001"},{"@pid":"134/3003","text":"Timo Jakobi"}]},"title":"Role-based Eco-info Systems: An Organizational Theoretical View of Sustainable HCI at Work.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/CastelliSSSJ15","ee":"http://aisel.aisnet.org/ecis2015_cr/24","url":"https://dblp.org/rec/conf/ecis/CastelliSSSJ15"}, "url":"URL#3543737" }, { "@score":"1", "@id":"3543738", "info":{"authors":{"author":[{"@pid":"142/2619","text":"Alexandra Cetto"},{"@pid":"147/4627","text":"Julia Klier"},{"@pid":"31/3352","text":"Mathias Klier"}]},"title":"Why Should I Do It Myself? Hedonic and Utilitarian Motivations of Customers' Intention to Use Self-service Technologies.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/CettoKK15","ee":"http://aisel.aisnet.org/ecis2015_cr/25","url":"https://dblp.org/rec/conf/ecis/CettoKK15"}, "url":"URL#3543738" }, { "@score":"1", "@id":"3543739", "info":{"authors":{"author":[{"@pid":"172/7327","text":"Akarapat Charoenpanich"},{"@pid":"43/8819","text":"Aleksi Aaltonen"}]},"title":"(How) Does Data-based Music Discovery Work?","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/CharoenpanichA15","ee":"http://aisel.aisnet.org/ecis2015_cr/26","url":"https://dblp.org/rec/conf/ecis/CharoenpanichA15"}, "url":"URL#3543739" }, { "@score":"1", "@id":"3543740", "info":{"authors":{"author":[{"@pid":"135/3087","text":"Friedrich Chasin"},{"@pid":"147/4699","text":"Hendrik Scholta"}]},"title":"Taking Peer-to-Peer Sharing and Collaborative Consumption onto the Next Level - New Opportunities and Challenges for E-Government.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/ChasinS15","ee":"http://aisel.aisnet.org/ecis2015_cr/27","url":"https://dblp.org/rec/conf/ecis/ChasinS15"}, "url":"URL#3543740" }, { "@score":"1", "@id":"3543741", "info":{"authors":{"author":{"@pid":"47/68","text":"Samir Chatterjee"}},"title":"Writing My next Design Science Research Master-piece: But How Do I Make a Theoretical Contribution to DSR?","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Chatterjee15","ee":"http://aisel.aisnet.org/ecis2015_cr/28","url":"https://dblp.org/rec/conf/ecis/Chatterjee15"}, "url":"URL#3543741" }, { "@score":"1", "@id":"3543742", "info":{"authors":{"author":[{"@pid":"141/0733","text":"Yeongbok Choe"},{"@pid":"10/1269","text":"Moonkun Lee"}]},"title":"δ-calculus: Process Algebra to Model Secure Movements of Distributed Mobile Processes in Real-time Business Applications.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/ChoeL15","ee":"http://aisel.aisnet.org/ecis2015_cr/29","url":"https://dblp.org/rec/conf/ecis/ChoeL15"}, "url":"URL#3543742" }, { "@score":"1", "@id":"3543743", "info":{"authors":{"author":[{"@pid":"170/7777","text":"Sang-Kyu Thomas Choi"},{"@pid":"76/8645","text":"Ivonne Kröschel"}]},"title":"Challenges of Governing Interorganizational Value Chains: Insights from a Case Study.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/ChoiK15","ee":"http://aisel.aisnet.org/ecis2015_cr/30","url":"https://dblp.org/rec/conf/ecis/ChoiK15"}, "url":"URL#3543743" }, { "@score":"1", "@id":"3543744", "info":{"authors":{"author":[{"@pid":"172/7573","text":"Katherine Choy"},{"@pid":"36/9156","text":"Daniel Schlagwein"}]},"title":"IT Affordances and Donor Motivations in Charitable Crowdfunding: The "Earthship Kapita" Case.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/ChoyS15","ee":"http://aisel.aisnet.org/ecis2015_cr/31","url":"https://dblp.org/rec/conf/ecis/ChoyS15"}, "url":"URL#3543744" }, { "@score":"1", "@id":"3543745", "info":{"authors":{"author":[{"@pid":"144/1180","text":"Raffaele F. Ciriello"},{"@pid":"88/1699","text":"Alexander Richter"},{"@pid":"s/GerhardSchwabe","text":"Gerhard Schwabe"}]},"title":"PowerPoint Use and Misuse in Digital Innovation.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/CirielloRS15","ee":"http://aisel.aisnet.org/ecis2015_cr/32","url":"https://dblp.org/rec/conf/ecis/CirielloRS15"}, "url":"URL#3543745" }, { "@score":"1", "@id":"3543746", "info":{"authors":{"author":[{"@pid":"17/9105","text":"Jason F. Cohen"},{"@pid":"152/0474","text":"Emma Coleman"},{"@pid":"172/7425","text":"Lucienne Abrahams"}]},"title":"Use and Impacts of E-health Within Community Health Facilities in Developing Countries: A Systematic Literature Review.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/CohenCA15","ee":"http://aisel.aisnet.org/ecis2015_cr/33","url":"https://dblp.org/rec/conf/ecis/CohenCA15"}, "url":"URL#3543746" }, { "@score":"1", "@id":"3543747", "info":{"authors":{"author":[{"@pid":"129/5284","text":"Angelica Cuylen"},{"@pid":"91/11106","text":"Lubov Kosch"},{"@pid":"57/755","text":"Michael H. Breitner"}]},"title":"Why Are Electronic Invoice Processes Risky? - Empirical Analysis and Discussion of Risk Factors.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/CuylenKB15","ee":"http://aisel.aisnet.org/ecis2015_cr/34","url":"https://dblp.org/rec/conf/ecis/CuylenKB15"}, "url":"URL#3543747" }, { "@score":"1", "@id":"3543748", "info":{"authors":{"author":{"@pid":"172/7406","text":"Laila Dahabiyeh"}},"title":"Networks of Cybercrime Prevention: A Process Study of the Credit Card.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Dahabiyeh15","ee":"http://aisel.aisnet.org/ecis2015_rip/6","url":"https://dblp.org/rec/conf/ecis/Dahabiyeh15"}, "url":"URL#3543748" }, { "@score":"1", "@id":"3543749", "info":{"authors":{"author":[{"@pid":"70/6153","text":"Tomi Dahlberg"},{"@pid":"11/181","text":"Harry Bouwman"},{"@pid":"07/366","text":"Narciso Cerpa"},{"@pid":"77/2751-6","text":"Jie Guo 0006"}]},"title":"M-Payment - How Disruptive Technologies Could Change The Payment Ecosystem.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/DahlbergBCG15","ee":"http://aisel.aisnet.org/ecis2015_cr/35","url":"https://dblp.org/rec/conf/ecis/DahlbergBCG15"}, "url":"URL#3543749" }, { "@score":"1", "@id":"3543750", "info":{"authors":{"author":[{"@pid":"139/6872","text":"David Dauer"},{"@pid":"39/10266","text":"Christoph M. Flath"}]},"title":"Simulation-based Evaluation of Battery Switching Stations for Electric Vehicles.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/DauerF15","ee":"http://aisel.aisnet.org/ecis2015_rip/45","url":"https://dblp.org/rec/conf/ecis/DauerF15"}, "url":"URL#3543750" }, { "@score":"1", "@id":"3543751", "info":{"authors":{"author":[{"@pid":"144/1212","text":"Kenan Degirmenci"},{"@pid":"172/7368","text":"Torben M. Katolla"},{"@pid":"57/755","text":"Michael H. Breitner"}]},"title":"How Can Mobile Applications Reduce Energy Consumption? An Experimental Investigation of Electric Vehicles.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/DegirmenciKB15","ee":"http://aisel.aisnet.org/ecis2015_cr/36","url":"https://dblp.org/rec/conf/ecis/DegirmenciKB15"}, "url":"URL#3543751" }, { "@score":"1", "@id":"3543752", "info":{"authors":{"author":[{"@pid":"172/7523","text":"Seyran Ghahramany Dehbokry"},{"@pid":"88/393","text":"Eng Chew"}]},"title":"Toward a Multi-disciplinary Business Architecture Reference Model for SMEs.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/DehbokryC15","ee":"http://aisel.aisnet.org/ecis2015_cr/56","url":"https://dblp.org/rec/conf/ecis/DehbokryC15"}, "url":"URL#3543752" }, { "@score":"1", "@id":"3543753", "info":{"authors":{"author":[{"@pid":"04/9028","text":"Stuart Dillon"},{"@pid":"22/3653","text":"Eric Deakins"},{"@pid":"42/10107","text":"Sara Hofmann"},{"@pid":"56/2963","text":"Michael Räckers"},{"@pid":"01/7527","text":"Thomas Kohlborn"}]},"title":"A Longitudinal Study of Local E-Government Development: The Policy Maker Perspective.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/DillonDHRK15","ee":"http://aisel.aisnet.org/ecis2015_cr/37","url":"https://dblp.org/rec/conf/ecis/DillonDHRK15"}, "url":"URL#3543753" }, { "@score":"1", "@id":"3543754", "info":{"authors":{"author":[{"@pid":"172/7329","text":"Daniel A. Döppner"},{"@pid":"s/DetlefSchoder","text":"Detlef Schoder"},{"@pid":"172/7403","text":"Honorata Siejka"}]},"title":"Big Data and the Data Value Chain: Translating Insights from Business Analytics into Actionable Results - The Case of Unit Load Device (ULD) Management in the Air Cargo Industry.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/DoppnerSS15","ee":"http://aisel.aisnet.org/ecis2015_rip/7","url":"https://dblp.org/rec/conf/ecis/DoppnerSS15"}, "url":"URL#3543754" }, { "@score":"1", "@id":"3543755", "info":{"authors":{"author":[{"@pid":"123/4085","text":"Regine Dörbecker"},{"@pid":"172/7011","text":"Oksana Tokar"},{"@pid":"50/787","text":"Tilo Böhmann"}]},"title":"Deriving Design Principles for Improving Service Modularization Methods - Lessons Learnt from the Complex Integrated Health Care Service System.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/DorbeckerTB15","ee":"http://aisel.aisnet.org/ecis2015_cr/38","url":"https://dblp.org/rec/conf/ecis/DorbeckerTB15"}, "url":"URL#3543755" }, { "@score":"1", "@id":"3543756", "info":{"authors":{"author":[{"@pid":"155/1632","text":"Maria Douneva"},{"@pid":"18/5336","text":"Russell P. Haines"},{"@pid":"79/1475","text":"Meinald T. Thielsch"}]},"title":"Effects Of Interface Aesthetics On Team Performance In A Virtual Task.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/DounevaHT15","ee":"http://aisel.aisnet.org/ecis2015_rip/60","url":"https://dblp.org/rec/conf/ecis/DounevaHT15"}, "url":"URL#3543756" }, { "@score":"1", "@id":"3543757", "info":{"authors":{"author":[{"@pid":"05/11314","text":"Andreas Drechsler"},{"@pid":"11/4916","text":"Frederik Ahlemann"}]},"title":"Toward a General Theory of Agile Project Management - A Research Design.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/DrechslerA15","ee":"http://aisel.aisnet.org/ecis2015_rip/25","url":"https://dblp.org/rec/conf/ecis/DrechslerA15"}, "url":"URL#3543757" }, { "@score":"1", "@id":"3543758", "info":{"authors":{"author":[{"@pid":"06/1631","text":"Paul Drews"},{"@pid":"w/IngridWetzel","text":"Ingrid Schirmer"}]},"title":"The Failed Implementation of the Electronic Prescription in Germany - A Case Study.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/DrewsS15","ee":"http://aisel.aisnet.org/ecis2015_cr/39","url":"https://dblp.org/rec/conf/ecis/DrewsS15"}, "url":"URL#3543758" }, { "@score":"1", "@id":"3543759", "info":{"authors":{"author":[{"@pid":"94/3054","text":"Yanqing Duan"},{"@pid":"74/10372","text":"Guangming Cao"}]},"title":"Understanding the Impact of Business Analytics on Innovation.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/DuanC15","ee":"http://aisel.aisnet.org/ecis2015_cr/40","url":"https://dblp.org/rec/conf/ecis/DuanC15"}, "url":"URL#3543759" }, { "@score":"1", "@id":"3543760", "info":{"authors":{"author":[{"@pid":"06/481","text":"David Edwards"},{"@pid":"36/7526","text":"Keith Horton"}]},"title":"Ideology and Utopia: A Technology Action Frames Perspective on ICT Adoption.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/EdwardsH15","ee":"http://aisel.aisnet.org/ecis2015_cr/41","url":"https://dblp.org/rec/conf/ecis/EdwardsH15"}, "url":"URL#3543760" }, { "@score":"1", "@id":"3543761", "info":{"authors":{"author":[{"@pid":"85/3902","text":"Marc Egger"},{"@pid":"27/3344","text":"André Lang"},{"@pid":"s/DetlefSchoder","text":"Detlef Schoder"}]},"title":"Who Are We Listening to? Detecting User-generated Content (UGC) on the Web.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/EggerLS15","ee":"http://aisel.aisnet.org/ecis2015_cr/42","url":"https://dblp.org/rec/conf/ecis/EggerLS15"}, "url":"URL#3543761" }, { "@score":"1", "@id":"3543762", "info":{"authors":{"author":{"@pid":"172/7372","text":"Kristina S. Egorova"}},"title":"Adoption of Information Security as Decision-making under Uncertainty: A Behavioural Economics Approach.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Egorova15","ee":"http://aisel.aisnet.org/ecis2015_rip/21","url":"https://dblp.org/rec/conf/ecis/Egorova15"}, "url":"URL#3543762" }, { "@score":"1", "@id":"3543763", "info":{"authors":{"author":[{"@pid":"04/10679","text":"Mazen El-Masri"},{"@pid":"123/9915","text":"Ali Tarhini"}]},"title":"A Design Science Approach To Gamify Education: From Games To Platforms.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/El-MasriT15","ee":"http://aisel.aisnet.org/ecis2015_rip/48","url":"https://dblp.org/rec/conf/ecis/El-MasriT15"}, "url":"URL#3543763" }, { "@score":"1", "@id":"3543764", "info":{"authors":{"author":[{"@pid":"147/4632","text":"Tobias H. Engler"},{"@pid":"95/5015","text":"Paul Alpar"},{"@pid":"172/7506","text":"Uljon Fayzimurodova"}]},"title":"Initial and Continued Knowledge Contribution on Enterprise Social Media Platforms.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/EnglerAF15","ee":"http://aisel.aisnet.org/ecis2015_rip/4","url":"https://dblp.org/rec/conf/ecis/EnglerAF15"}, "url":"URL#3543764" }, { "@score":"1", "@id":"3543765", "info":{"authors":{"author":[{"@pid":"68/261","text":"Benjamin Fabian"},{"@pid":"96/10684","text":"Annika Baumann"},{"@pid":"172/7355","text":"Marian Keil"}]},"title":"Privacy on Reddit? Towards Large-scale User Classification.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/FabianBK15","ee":"http://aisel.aisnet.org/ecis2015_cr/43","url":"https://dblp.org/rec/conf/ecis/FabianBK15"}, "url":"URL#3543765" }, { "@score":"1", "@id":"3543766", "info":{"authors":{"author":[{"@pid":"81/6775","text":"Stefan Fenz"},{"@pid":"52/1052","text":"Johannes Heurix"},{"@pid":"96/775","text":"Thomas Neubauer"}]},"title":"How to Increase the Inventory Efficiency in Information Security Risk and Compliance Management.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/FenzHN15","ee":"http://aisel.aisnet.org/ecis2015_cr/44","url":"https://dblp.org/rec/conf/ecis/FenzHN15"}, "url":"URL#3543766" }, { "@score":"1", "@id":"3543767", "info":{"authors":{"author":[{"@pid":"31/725","text":"Julie Fisher"},{"@pid":"55/2540","text":"Catherine Lang"},{"@pid":"48/6056","text":"Annemieke Craig"},{"@pid":"11/8270","text":"Helen Forgasz"}]},"title":"If Girls Aren't Interested in Computers Can We Change Their Minds?","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/FisherLCF15","ee":"http://aisel.aisnet.org/ecis2015_cr/45","url":"https://dblp.org/rec/conf/ecis/FisherLCF15"}, "url":"URL#3543767" }, { "@score":"1", "@id":"3543768", "info":{"authors":{"author":[{"@pid":"117/9728","text":"Florian Fittkau"},{"@pid":"82/4750","text":"Sascha Roth"},{"@pid":"h/WilhelmHasselbring","text":"Wilhelm Hasselbring"}]},"title":"ExplorViz: Visual Runtime Behavior Analysis of Enterprise Application Landscapes.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/FittkauRH15","ee":"http://aisel.aisnet.org/ecis2015_cr/46","url":"https://dblp.org/rec/conf/ecis/FittkauRH15"}, "url":"URL#3543768" }, { "@score":"1", "@id":"3543769", "info":{"authors":{"author":[{"@pid":"172/7568","text":"Chris M. Forman"},{"@pid":"12/2018","text":"Nicolas van Zeebroeck"}]},"title":"Internet Adoption and Knowledge Diffusion.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/FormanZ15","ee":"http://aisel.aisnet.org/ecis2015_cr/47","url":"https://dblp.org/rec/conf/ecis/FormanZ15"}, "url":"URL#3543769" }, { "@score":"1", "@id":"3543770", "info":{"authors":{"author":[{"@pid":"72/5014","text":"Keith Frampton"},{"@pid":"69/3476","text":"Graeme G. Shanks"},{"@pid":"144/1162","text":"Toomas Tamm"},{"@pid":"k/SKurnia","text":"Sherah Kurnia"},{"@pid":"82/1335","text":"Simon K. Milton"}]},"title":"Enterprise Architecture Service Provision: Pathways to Value.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/FramptonSTKM15","ee":"http://aisel.aisnet.org/ecis2015_rip/62","url":"https://dblp.org/rec/conf/ecis/FramptonSTKM15"}, "url":"URL#3543770" }, { "@score":"1", "@id":"3543771", "info":{"authors":{"author":{"@pid":"138/4865","text":"Volker Frehe"}},"title":"Can Target Costing Be Applied in Green Logistics? - Evidence from a Conjoint Analysis.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Frehe15","ee":"http://aisel.aisnet.org/ecis2015_cr/48","url":"https://dblp.org/rec/conf/ecis/Frehe15"}, "url":"URL#3543771" }, { "@score":"1", "@id":"3543772", "info":{"authors":{"author":[{"@pid":"31/10444","text":"Gilbert Fridgen"},{"@pid":"172/6958","text":"Tirazheh Zare Garizy"}]},"title":"Supply Chain Network Risk Analysis - A Privacy Preserving Approach.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/FridgenG15","ee":"http://aisel.aisnet.org/ecis2015_cr/49","url":"https://dblp.org/rec/conf/ecis/FridgenG15"}, "url":"URL#3543772" }, { "@score":"1", "@id":"3543773", "info":{"authors":{"author":[{"@pid":"91/7589-1","text":"Thomas Friedrich 0001"},{"@pid":"o/SOverhage","text":"Sven Overhage"},{"@pid":"99/7904","text":"Sebastian Schlauderer"},{"@pid":"75/2121","text":"Holger Eggs"}]},"title":"Selecting Technologies for Social Commerce: Towards a Systematic Method.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/FriedrichOSE15","ee":"http://aisel.aisnet.org/ecis2015_cr/50","url":"https://dblp.org/rec/conf/ecis/FriedrichOSE15"}, "url":"URL#3543773" }, { "@score":"1", "@id":"3543774", "info":{"authors":{"author":{"@pid":"135/6720","text":"Nora Fteimi"}},"title":"Analyzing the Literature on Knowledge Management Frameworks: Towards a Normative Knowledge Management Classification Schema.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Fteimi15","ee":"http://aisel.aisnet.org/ecis2015_cr/51","url":"https://dblp.org/rec/conf/ecis/Fteimi15"}, "url":"URL#3543774" }, { "@score":"1", "@id":"3543775", "info":{"authors":{"author":[{"@pid":"135/6720","text":"Nora Fteimi"},{"@pid":"11/9321","text":"Dirk Basten"}]},"title":"Impact of Dictionaries on Automated Content Analysis - The Use of Compound Concepts in Analysing Knowledge Management Research.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/FteimiB15","ee":"http://aisel.aisnet.org/ecis2015_cr/52","url":"https://dblp.org/rec/conf/ecis/FteimiB15"}, "url":"URL#3543775" }, { "@score":"1", "@id":"3543776", "info":{"authors":{"author":[{"@pid":"125/0935","text":"Daniel Fuerstenau"},{"@pid":"172/7449","text":"Christian Glaschke"}]},"title":"Weighting of Integration Qualities in IS Architectures: A Production Case.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/FuerstenauG15","ee":"http://aisel.aisnet.org/ecis2015_cr/53","url":"https://dblp.org/rec/conf/ecis/FuerstenauG15"}, "url":"URL#3543776" }, { "@score":"1", "@id":"3543777", "info":{"authors":{"author":[{"@pid":"131/3311","text":"Szymon J. Furtak"},{"@pid":"07/3903","text":"Michel Avital"},{"@pid":"05/8026","text":"Rasmus Ulslev Pedersen"}]},"title":"Sensing the Future: Designing Predictive Analytics with Sensor Technologies.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/FurtakAP15","ee":"http://aisel.aisnet.org/ecis2015_cr/54","url":"https://dblp.org/rec/conf/ecis/FurtakAP15"}, "url":"URL#3543777" }, { "@score":"1", "@id":"3543778", "info":{"authors":{"author":[{"@pid":"51/4677","text":"Michaela Geierhos"},{"@pid":"154/2472","text":"Frederik Simon Bäumer"},{"@pid":"161/9294","text":"Sabine Schulze"},{"@pid":"161/9307","text":"Valentina Stuß"}]},"title":""I grade what I get but write what I think." Inconsistency Analysis in Patients' Reviews.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/GeierhosBSS15","ee":"http://aisel.aisnet.org/ecis2015_cr/55","url":"https://dblp.org/rec/conf/ecis/GeierhosBSS15"}, "url":"URL#3543778" }, { "@score":"1", "@id":"3543779", "info":{"authors":{"author":[{"@pid":"160/5037","text":"Michael Marcin Gierczak"},{"@pid":"172/7476","text":"Oliver Englisch"},{"@pid":"83/2609","text":"Ulrich Bretschneider"}]},"title":"Minding the Gap - An Expectation-Disconfirmation Approach to Reward-Based Crowdfunding.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/GierczakEB15","ee":"http://aisel.aisnet.org/ecis2015_rip/68","url":"https://dblp.org/rec/conf/ecis/GierczakEB15"}, "url":"URL#3543779" }, { "@score":"1", "@id":"3543780", "info":{"authors":{"author":[{"@pid":"160/5037","text":"Michael Marcin Gierczak"},{"@pid":"172/7571","text":"Hans Kristian Nitze"}]},"title":"Shine Bright like a Diamond - Exploring the Effects of Online-Product Presentation on Backing Behavior in Reward-based Crowdfunding.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/GierczakN15","ee":"http://aisel.aisnet.org/ecis2015_rip/59","url":"https://dblp.org/rec/conf/ecis/GierczakN15"}, "url":"URL#3543780" }, { "@score":"1", "@id":"3543781", "info":{"authors":{"author":[{"@pid":"41/4552","text":"Henner Gimpel"},{"@pid":"172/7434","text":"Christian Regal"},{"@pid":"42/7777","text":"Marco Schmidt"}]},"title":"myStress: Unobtrusive Smartphone-Based Stress Detection.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/GimpelRS15","ee":"http://aisel.aisnet.org/ecis2015_rip/16","url":"https://dblp.org/rec/conf/ecis/GimpelRS15"}, "url":"URL#3543781" }, { "@score":"1", "@id":"3543782", "info":{"authors":{"author":[{"@pid":"147/4590","text":"Florian Glaser"},{"@pid":"172/7319","text":"Luis Bezzenberger"}]},"title":"Beyond Cryptocurrencies - A Taxonomy of Decentralized Consensus Systems.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/GlaserB15","ee":"http://aisel.aisnet.org/ecis2015_cr/57","url":"https://dblp.org/rec/conf/ecis/GlaserB15"}, "url":"URL#3543782" }, { "@score":"1", "@id":"3543783", "info":{"authors":{"author":[{"@pid":"140/7874","text":"Marius Goldberg"},{"@pid":"86/6970","text":"Gerhard Satzger"},{"@pid":"02/7977","text":"Axel Kieninger"}]},"title":"A Capability Framework for IT Service Integration and Management in Multi-Sourcing.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/GoldbergSK15","ee":"http://aisel.aisnet.org/ecis2015_cr/58","url":"https://dblp.org/rec/conf/ecis/GoldbergSK15"}, "url":"URL#3543783" }, { "@score":"1", "@id":"3543784", "info":{"authors":{"author":[{"@pid":"172/7451","text":"Philipp Gölzer"},{"@pid":"172/7348","text":"Patrick Cato"},{"@pid":"16/6735","text":"Michael Amberg"}]},"title":"Data Processing Requirements of Industry 4.0 - Use Cases for Big Data Applications.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/GolzerCA15","ee":"http://aisel.aisnet.org/ecis2015_rip/61","url":"https://dblp.org/rec/conf/ecis/GolzerCA15"}, "url":"URL#3543784" }, { "@score":"1", "@id":"3543785", "info":{"authors":{"author":[{"@pid":"07/9480","text":"Elena Gorbacheva"},{"@pid":"43/4353","text":"Armin Stein"},{"@pid":"59/10952","text":"Theresa Schmiedel"},{"@pid":"43/6309-1","text":"Oliver Müller 0001"}]},"title":"A Gender Perspective on Business Process Management Competences Offered on Professional Online Social Networks.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/GorbachevaSSM15","ee":"http://aisel.aisnet.org/ecis2015_cr/59","url":"https://dblp.org/rec/conf/ecis/GorbachevaSSM15"}, "url":"URL#3543785" }, { "@score":"1", "@id":"3543786", "info":{"authors":{"author":[{"@pid":"95/1046","text":"Annemijn F. van Gorp"},{"@pid":"15/10689","text":"Nicolai Pogrebnyakov"},{"@pid":"26/6470","text":"Edgar A. Maldonado"}]},"title":"Just Keep Tweeting: Emergency Responder's Social Media Use Before and During Emergencies.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/GorpPM15","ee":"http://aisel.aisnet.org/ecis2015_cr/191","url":"https://dblp.org/rec/conf/ecis/GorpPM15"}, "url":"URL#3543786" }, { "@score":"1", "@id":"3543787", "info":{"authors":{"author":[{"@pid":"125/0636","text":"Enrico Graupner"},{"@pid":"172/7528","text":"Fabian Melcher"},{"@pid":"172/7395","text":"Daniel Demers"},{"@pid":"34/590","text":"Alexander Maedche"}]},"title":"Customers' Intention to Use Digital Services in Retail Banking - An Information Processing Perspective.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/GraupnerMDM15","ee":"http://aisel.aisnet.org/ecis2015_cr/61","url":"https://dblp.org/rec/conf/ecis/GraupnerMDM15"}, "url":"URL#3543787" }, { "@score":"1", "@id":"3543788", "info":{"authors":{"author":[{"@pid":"125/0636","text":"Enrico Graupner"},{"@pid":"172/7324","text":"Carsten Schewer"},{"@pid":"34/590","text":"Alexander Maedche"}]},"title":"Visibility of Business Processes - An Information Processing Perspective in the Financial Services Industry.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/GraupnerSM15","ee":"http://aisel.aisnet.org/ecis2015_cr/60","url":"https://dblp.org/rec/conf/ecis/GraupnerSM15"}, "url":"URL#3543788" }, { "@score":"1", "@id":"3543789", "info":{"authors":{"author":[{"@pid":"94/3183","text":"Christian Grimme"},{"@pid":"06/4759","text":"Stephan Meisel"},{"@pid":"34/2589","text":"Heike Trautmann"},{"@pid":"r/GunterRudolph","text":"Günter Rudolph"},{"@pid":"164/9083","text":"Martin Wölck"}]},"title":"Multi-objective Analysis of Approaches to Dynamic Routing of a Vehicle.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/GrimmeMTRW15","ee":"http://aisel.aisnet.org/ecis2015_cr/62","url":"https://dblp.org/rec/conf/ecis/GrimmeMTRW15"}, "url":"URL#3543789" }, { "@score":"1", "@id":"3543790", "info":{"authors":{"author":[{"@pid":"92/4174","text":"Miria Grisot"},{"@pid":"33/7619","text":"Polyxeni Vassilakopoulou"}]},"title":"Creating a National E-Health Infrastructure: The Challenge of the Installed Base.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/GrisotV15","ee":"http://aisel.aisnet.org/ecis2015_cr/63","url":"https://dblp.org/rec/conf/ecis/GrisotV15"}, "url":"URL#3543790" }, { "@score":"1", "@id":"3543791", "info":{"authors":{"author":[{"@pid":"172/7503","text":"Robert Maximilian Grüschow"},{"@pid":"172/7199","text":"Jan Kemper"},{"@pid":"20/5256","text":"Malte Brettel"}]},"title":"Do Transaction Costs of Payment Systems Differ Across Customers in E-commerce?","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/GruschowKB15","ee":"http://aisel.aisnet.org/ecis2015_cr/64","url":"https://dblp.org/rec/conf/ecis/GruschowKB15"}, "url":"URL#3543791" }, { "@score":"1", "@id":"3543792", "info":{"authors":{"author":[{"@pid":"172/7422","text":"Dominik Gutt"},{"@pid":"13/8469","text":"Philipp Herrmann"}]},"title":"Sharing Means Caring? Hosts' Price Reaction to Rating Visibility.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/GuttH15","ee":"http://aisel.aisnet.org/ecis2015_rip/54","url":"https://dblp.org/rec/conf/ecis/GuttH15"}, "url":"URL#3543792" }, { "@score":"1", "@id":"3543793", "info":{"authors":{"author":{"@pid":"125/0323","text":"Martin Haferkorn"}},"title":"High-frequency Trading and its Role in Fragmented Markets.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Haferkorn15","ee":"http://aisel.aisnet.org/ecis2015_cr/65","url":"https://dblp.org/rec/conf/ecis/Haferkorn15"}, "url":"URL#3543793" }, { "@score":"1", "@id":"3543794", "info":{"authors":{"author":[{"@pid":"172/7530","text":"Ella Hafermalz"},{"@pid":"22/5384","text":"Kai Riemer"}]},"title":"The Question of Materiality: Mattering in the Network Society.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HafermalzR15","ee":"http://aisel.aisnet.org/ecis2015_cr/66","url":"https://dblp.org/rec/conf/ecis/HafermalzR15"}, "url":"URL#3543794" }, { "@score":"1", "@id":"3543795", "info":{"authors":{"author":[{"@pid":"147/4572","text":"Eveline Hage"},{"@pid":"172/7342","text":"Florian Noseleit"}]},"title":"Changes and Variations in Online- and Offline Communication Patterns: Including Peer Effects.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HageN15","ee":"http://aisel.aisnet.org/ecis2015_cr/68","url":"https://dblp.org/rec/conf/ecis/HageN15"}, "url":"URL#3543795" }, { "@score":"1", "@id":"3543796", "info":{"authors":{"author":[{"@pid":"147/4572","text":"Eveline Hage"},{"@pid":"38/7159","text":"Marjolein van Offenbeek"},{"@pid":"24/7158","text":"Albert Boonstra"}]},"title":"Towards Managed Structuration: Exploring Bridging Mechanisms for IS Enabled Change in Multi-site Implementation Projects.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HageOB15","ee":"http://aisel.aisnet.org/ecis2015_cr/67","url":"https://dblp.org/rec/conf/ecis/HageOB15"}, "url":"URL#3543796" }, { "@score":"1", "@id":"3543797", "info":{"authors":{"author":[{"@pid":"06/1447","text":"Nicole Haggerty"},{"@pid":"81/6382","text":"Deborah Compeau"}]},"title":"Investigating Ruptures in Shared Understanding as Recursive Cycles of Mutual Adaptation During Implementation.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HaggertyC15","ee":"http://aisel.aisnet.org/ecis2015_cr/69","url":"https://dblp.org/rec/conf/ecis/HaggertyC15"}, "url":"URL#3543797" }, { "@score":"1", "@id":"3543798", "info":{"authors":{"author":[{"@pid":"36/3941","text":"Shengnan Han"},{"@pid":"172/7544","text":"Sofia Sörås"},{"@pid":"164/4662","text":"Ole Schjødt-Osmo"}]},"title":"Governance of an Enterprise Social Intranet Implementation: The Statkraft Case.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HanSS15","ee":"http://aisel.aisnet.org/ecis2015_cr/70","url":"https://dblp.org/rec/conf/ecis/HanSS15"}, "url":"URL#3543798" }, { "@score":"1", "@id":"3543799", "info":{"authors":{"author":[{"@pid":"135/3038","text":"Andre Hanelt"},{"@pid":"160/3119","text":"Björn Hildebrandt"},{"@pid":"172/7337","text":"Jan Polier"}]},"title":"Uncovering the Role of IS in Business Model Innovation - A Taxonomy-driven Approach to Structure the Field.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HaneltHP15","ee":"http://aisel.aisnet.org/ecis2015_cr/71","url":"https://dblp.org/rec/conf/ecis/HaneltHP15"}, "url":"URL#3543799" }, { "@score":"1", "@id":"3543800", "info":{"authors":{"author":[{"@pid":"135/3038","text":"Andre Hanelt"},{"@pid":"135/3063","text":"Henning Krüp"}]},"title":"Feed the Machine - An Empirical Investigation of the Impact of Openness in Innovation on IT Entrepreneurship.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HaneltK15","ee":"http://aisel.aisnet.org/ecis2015_cr/72","url":"https://dblp.org/rec/conf/ecis/HaneltK15"}, "url":"URL#3543800" }, { "@score":"1", "@id":"3543801", "info":{"authors":{"author":[{"@pid":"42/2917","text":"G. Harindranath 0001"},{"@pid":"28/4290","text":"Edward Bernroider"},{"@pid":"93/3400","text":"Sherif Kamel"}]},"title":"Social Media and Social Transformation Movements: The Role of Affordances and Platforms.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HarindranathBK15","ee":"http://aisel.aisnet.org/ecis2015_cr/73","url":"https://dblp.org/rec/conf/ecis/HarindranathBK15"}, "url":"URL#3543801" }, { "@score":"1", "@id":"3543802", "info":{"authors":{"author":[{"@pid":"120/0097","text":"Farkhondeh Hassandoust"},{"@pid":"69/2180","text":"Angsana A. Techatassanasoontorn"},{"@pid":"58/4750","text":"Felix B. Tan"}]},"title":"The Impact of Individual's Identities on the Infusion of Information Systems within Organisations.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HassandoustTT15","ee":"http://aisel.aisnet.org/ecis2015_rip/27","url":"https://dblp.org/rec/conf/ecis/HassandoustTT15"}, "url":"URL#3543802" }, { "@score":"1", "@id":"3543803", "info":{"authors":{"author":[{"@pid":"172/7421","text":"Sabrina Hauff"},{"@pid":"97/3958","text":"Daniel Veit"},{"@pid":"99/6094","text":"Virpi Kristiina Tuunainen"}]},"title":"Towards a Taxonomy of Perceived Consequences of Privacy-invasive Practices.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HauffVT15","ee":"http://aisel.aisnet.org/ecis2015_cr/74","url":"https://dblp.org/rec/conf/ecis/HauffVT15"}, "url":"URL#3543803" }, { "@score":"1", "@id":"3543804", "info":{"authors":{"author":{"@pid":"130/7737","text":"Carl Simon Heckmann"}},"title":"The Impact of Business Process IT Ambidexterity on Business Process Performance.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Heckmann15","ee":"http://aisel.aisnet.org/ecis2015_rip/23","url":"https://dblp.org/rec/conf/ecis/Heckmann15"}, "url":"URL#3543804" }, { "@score":"1", "@id":"3543805", "info":{"authors":{"author":[{"@pid":"89/2052","text":"Bernd Heinrich"},{"@pid":"172/7504","text":"Dominik Schön"}]},"title":"Automated Planning of Context-aware Process Models.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HeinrichS15","ee":"http://aisel.aisnet.org/ecis2015_cr/75","url":"https://dblp.org/rec/conf/ecis/HeinrichS15"}, "url":"URL#3543805" }, { "@score":"1", "@id":"3543806", "info":{"authors":{"author":[{"@pid":"07/150","text":"Stefan Henningsson"},{"@pid":"172/7498","text":"Christian Øhrgaard"}]},"title":"Acquisition IT Integration: The Roles of Temporary Agency Workers.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HenningssonO15","ee":"http://aisel.aisnet.org/ecis2015_cr/76","url":"https://dblp.org/rec/conf/ecis/HenningssonO15"}, "url":"URL#3543806" }, { "@score":"1", "@id":"3543807", "info":{"authors":{"author":[{"@pid":"131/3313","text":"Michael Heß"},{"@pid":"68/2242","text":"Monika Kaczmarek"},{"@pid":"f/UlrichFrank","text":"Ulrich Frank"},{"@pid":"156/7282","text":"Lars Podleska"},{"@pid":"156/7235","text":"Georg Täger"}]},"title":"A Domain-specific Modelling Language for Clinical Pathways in the Realm of Multi-perspective Hospital Modelling.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HessKFPT15","ee":"http://aisel.aisnet.org/ecis2015_cr/77","url":"https://dblp.org/rec/conf/ecis/HessKFPT15"}, "url":"URL#3543807" }, { "@score":"1", "@id":"3543808", "info":{"authors":{"author":[{"@pid":"62/6719","text":"Anders Hjalmarsson"},{"@pid":"37/7305","text":"Gustaf Juell-Skielse"},{"@pid":"172/6701","text":"Workneh Y. Ayele"},{"@pid":"24/8112","text":"Daniel Rudmark"},{"@pid":"j/PaulJohannesson","text":"Paul Johannesson"}]},"title":"From Contest to Market Entry: A Longitudinal Survey of Innovation Barriers Constraining Open Data Service Development.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HjalmarssonJARJ15","ee":"http://aisel.aisnet.org/ecis2015_cr/78","url":"https://dblp.org/rec/conf/ecis/HjalmarssonJARJ15"}, "url":"URL#3543808" }, { "@score":"1", "@id":"3543809", "info":{"authors":{"author":[{"@pid":"172/7373","text":"Steffen Hofferbert"},{"@pid":"52/10503","text":"Michael Cahalane"},{"@pid":"f/PatrickFinnegan","text":"Patrick Finnegan"}]},"title":"Gamification as an Architecture of Participation: An Investigation of an Innovation Maker Community.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HofferbertCF15","ee":"http://aisel.aisnet.org/ecis2015_rip/43","url":"https://dblp.org/rec/conf/ecis/HofferbertCF15"}, "url":"URL#3543809" }, { "@score":"1", "@id":"3543810", "info":{"authors":{"author":[{"@pid":"88/8358","text":"Jesper Holgersson"},{"@pid":"83/4149","text":"Beatrice Alenljung"},{"@pid":"02/4462","text":"Eva Söderström"}]},"title":"User Participation at a Discount - Exploring the Use and Reuse of Personas in Public E-service Development.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HolgerssonAS15","ee":"http://aisel.aisnet.org/ecis2015_rip/30","url":"https://dblp.org/rec/conf/ecis/HolgerssonAS15"}, "url":"URL#3543810" }, { "@score":"1", "@id":"3543811", "info":{"authors":{"author":{"@pid":"71/1979","text":"Christopher P. Holland"}},"title":"Internet and Social Media Strategy in Sports Marketing.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Holland15","ee":"http://aisel.aisnet.org/ecis2015_cr/79","url":"https://dblp.org/rec/conf/ecis/Holland15"}, "url":"URL#3543811" }, { "@score":"1", "@id":"3543812", "info":{"authors":{"author":[{"@pid":"71/1979","text":"Christopher P. Holland"},{"@pid":"172/7501","text":"Julia A. Jacobs"}]},"title":"The Influence of the Herfindahl-Hirschman Index and Product Complexity on Search Behaviour: A Cross-sector Study of the U.S., Germany and U.K.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HollandJ15","ee":"http://aisel.aisnet.org/ecis2015_cr/80","url":"https://dblp.org/rec/conf/ecis/HollandJ15"}, "url":"URL#3543812" }, { "@score":"1", "@id":"3543813", "info":{"authors":{"author":[{"@pid":"125/1278","text":"Diana Hristova"},{"@pid":"26/4870","text":"Jian Ma"}]},"title":"A Community-based Approach for Improving the Profile Information Quality in Social Networks.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HristovaM15","ee":"http://aisel.aisnet.org/ecis2015_rip/18","url":"https://dblp.org/rec/conf/ecis/HristovaM15"}, "url":"URL#3543813" }, { "@score":"1", "@id":"3543814", "info":{"authors":{"author":[{"@pid":"10/6275","text":"Sebastian Huber"},{"@pid":"129/9786","text":"Peter Schott"},{"@pid":"129/9803","text":"Matthias Lederer"}]},"title":"IT-enabled Adaptive Open Innovation.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HuberSL15","ee":"http://aisel.aisnet.org/ecis2015_cr/81","url":"https://dblp.org/rec/conf/ecis/HuberSL15"}, "url":"URL#3543814" }, { "@score":"1", "@id":"3543815", "info":{"authors":{"author":[{"@pid":"172/7340","text":"YuWen Hung"},{"@pid":"95/11410","text":"Shih-Chieh Hsu"}]},"title":"Collective Regulatory Focus and Control Mechanisms: The Impact of Regulatory Fit on ISD Project Performance.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HungH15","ee":"http://aisel.aisnet.org/ecis2015_rip/37","url":"https://dblp.org/rec/conf/ecis/HungH15"}, "url":"URL#3543815" }, { "@score":"1", "@id":"3543816", "info":{"authors":{"author":[{"@pid":"75/9189","text":"Jan C. Huntgeburth"},{"@pid":"172/7483","text":"Michael Blaschke"},{"@pid":"172/7421","text":"Sabrina Hauff"}]},"title":"Exploring Value Co-Creation in Cloud Ecosystems - A Revelatory Case Study.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/HuntgeburthBH15","ee":"http://aisel.aisnet.org/ecis2015_cr/82","url":"https://dblp.org/rec/conf/ecis/HuntgeburthBH15"}, "url":"URL#3543816" }, { "@score":"1", "@id":"3543817", "info":{"authors":{"author":[{"@pid":"172/7365","text":"Giuseppina Iacoviello"},{"@pid":"172/7380","text":"Elena Bruno"},{"@pid":"172/7567","text":"Arianna Lazzini"}]},"title":"The Role of Information Systems to Prevent the Impairment of Asset Quality in the Banks Balance Sheet. An Italian Case Study.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/IacovielloBL15","ee":"http://aisel.aisnet.org/ecis2015_cr/83","url":"https://dblp.org/rec/conf/ecis/IacovielloBL15"}, "url":"URL#3543817" }, { "@score":"1", "@id":"3543818", "info":{"authors":{"author":[{"@pid":"133/9844","text":"Claire Ingram"},{"@pid":"82/10685","text":"Marcel Morisse"},{"@pid":"96/6924","text":"Robin Teigland"}]},"title":""A Bad Apple Went Away": Exploring Resilience among Bitcoin Entrepreneurs.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/IngramMT15","ee":"http://aisel.aisnet.org/ecis2015_rip/31","url":"https://dblp.org/rec/conf/ecis/IngramMT15"}, "url":"URL#3543818" }, { "@score":"1", "@id":"3543819", "info":{"authors":{"author":[{"@pid":"172/6895","text":"Stefan Ivens"},{"@pid":"38/9604","text":"Mario Schaarschmidt"}]},"title":"Does Reputable Employee Behaviour in Social Networks Affect Customers' Trust and Word of Mouth? An Experimental Study.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/IvensS15","ee":"http://aisel.aisnet.org/ecis2015_cr/84","url":"https://dblp.org/rec/conf/ecis/IvensS15"}, "url":"URL#3543819" }, { "@score":"1", "@id":"3543820", "info":{"authors":{"author":{"@pid":"92/3422","text":"Paul J. Jackson"}},"title":"Networks in a Digital World: A Cybernetics Perspective.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Jackson15","ee":"http://aisel.aisnet.org/ecis2015_cr/85","url":"https://dblp.org/rec/conf/ecis/Jackson15"}, "url":"URL#3543820" }, { "@score":"1", "@id":"3543821", "info":{"authors":{"author":[{"@pid":"144/1213","text":"Andreas Janson"},{"@pid":"172/7332","text":"Marian Thiel de Gafenco"}]},"title":"Engaging the Appropriation of Technology-mediated Learning Services - A Theory-driven Design Approach.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/JansonG15","ee":"http://aisel.aisnet.org/ecis2015_rip/11","url":"https://dblp.org/rec/conf/ecis/JansonG15"}, "url":"URL#3543821" }, { "@score":"1", "@id":"3543822", "info":{"authors":{"author":{"@pid":"172/7360","text":"Juliane Jarke"}},"title":""Networking" a European Community: The Case of a European Commission Egovernment Initiative.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Jarke15","ee":"http://aisel.aisnet.org/ecis2015_cr/86","url":"https://dblp.org/rec/conf/ecis/Jarke15"}, "url":"URL#3543822" }, { "@score":"1", "@id":"3543823", "info":{"authors":{"author":[{"@pid":"153/1064","text":"Andreas Jede"},{"@pid":"82/3757","text":"Frank Teuteberg"}]},"title":"Looking Behind the Stage: Influence and Effect of Software-as-a-Service on Socio-technical Elements in Companies.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/JedeT15","ee":"http://aisel.aisnet.org/ecis2015_cr/87","url":"https://dblp.org/rec/conf/ecis/JedeT15"}, "url":"URL#3543823" }, { "@score":"1", "@id":"3543824", "info":{"authors":{"author":[{"@pid":"204/7504","text":"Thomas Jensen 0001"},{"@pid":"80/6457","text":"Ravi Vatrapu"}]},"title":"Ships & Roses: A Revelatory Case Study of Affordances in International Trade.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/JensenV15","ee":"http://aisel.aisnet.org/ecis2015_cr/88","url":"https://dblp.org/rec/conf/ecis/JensenV15"}, "url":"URL#3543824" }, { "@score":"1", "@id":"3543825", "info":{"authors":{"author":[{"@pid":"154/5092","text":"Torben Jess"},{"@pid":"41/5293","text":"Philip Woodall"},{"@pid":"172/7509","text":"Vijay Dodwani"},{"@pid":"70/2681","text":"Mark Harrison"},{"@pid":"m/DuncanCMcFarlane","text":"Duncan C. McFarlane"},{"@pid":"154/5050","text":"Eric Nicks"},{"@pid":"128/0941","text":"William E. Krechel"}]},"title":"An Industrial Data Recommender System to Solve the Problem of Data Overload.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/JessWDHMNK15","ee":"http://aisel.aisnet.org/ecis2015_rip/52","url":"https://dblp.org/rec/conf/ecis/JessWDHMNK15"}, "url":"URL#3543825" }, { "@score":"1", "@id":"3543826", "info":{"authors":{"author":[{"@pid":"160/5011","text":"Lianlian Jiang"},{"@pid":"12/2165","text":"Heshan Sun"}]},"title":"Dark Side of Personality and Innovation with IT.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/JiangS15","ee":"http://aisel.aisnet.org/ecis2015_rip/67","url":"https://dblp.org/rec/conf/ecis/JiangS15"}, "url":"URL#3543826" }, { "@score":"1", "@id":"3543827", "info":{"authors":{"author":[{"@pid":"147/4567","text":"Hemin Jiang"},{"@pid":"00/6526","text":"Aggeliki Tsohou"}]},"title":"The Same Antecedents Do Not Fit All Activities: An Activity-specific Model of Personal Internet Use in Workplace.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/JiangT15","ee":"http://aisel.aisnet.org/ecis2015_rip/13","url":"https://dblp.org/rec/conf/ecis/JiangT15"}, "url":"URL#3543827" }, { "@score":"1", "@id":"3543828", "info":{"authors":{"author":[{"@pid":"19/3325","text":"Florian Johannsen"},{"@pid":"09/5958","text":"Gregor Zellner"}]},"title":"Introducing a Professional Complaint Management: The Case of a Fleet Management Company.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/JohannsenZ15","ee":"http://aisel.aisnet.org/ecis2015_cr/89","url":"https://dblp.org/rec/conf/ecis/JohannsenZ15"}, "url":"URL#3543828" }, { "@score":"1", "@id":"3543829", "info":{"authors":{"author":{"@pid":"172/7494","text":"Bradley J. Kalgovas"}},"title":"The Lean Start-Up: An Exploration of the Challenges of Developing a Social Media App Business Model through Prototyping.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Kalgovas15","ee":"http://aisel.aisnet.org/ecis2015_rip/12","url":"https://dblp.org/rec/conf/ecis/Kalgovas15"}, "url":"URL#3543829" }, { "@score":"1", "@id":"3543830", "info":{"authors":{"author":[{"@pid":"00/8291","text":"Hwee-Joo Kam"},{"@pid":"94/2444","text":"Pairin Katerattanakul"},{"@pid":"52/2491","text":"Soongoo Hong"}]},"title":"A Tale of Two Cities: Information Security Policy Compliance of the Banking Industry in the United States and South Korea.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KamKH15","ee":"http://aisel.aisnet.org/ecis2015_cr/90","url":"https://dblp.org/rec/conf/ecis/KamKH15"}, "url":"URL#3543830" }, { "@score":"1", "@id":"3543831", "info":{"authors":{"author":[{"@pid":"24/5989","text":"Paul Karaenke"},{"@pid":"b/MartinBichler","text":"Martin Bichler"},{"@pid":"93/375","text":"Stefan Minner"}]},"title":"Retail Warehouse Loading Dock Coordination by Core-selecting Package Auctions.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KaraenkeBM15","ee":"http://aisel.aisnet.org/ecis2015_cr/91","url":"https://dblp.org/rec/conf/ecis/KaraenkeBM15"}, "url":"URL#3543831" }, { "@score":"1", "@id":"3543832", "info":{"authors":{"author":[{"@pid":"160/9530","text":"Alexandra Kees"},{"@pid":"160/2989","text":"Anna Maria Oberländer"},{"@pid":"69/3326","text":"Maximilian Roeglinger"},{"@pid":"r/MichaelRosemann","text":"Michael Rosemann"}]},"title":"Understanding the Internet of Things: A Conceptualisation of Business-to-Thing (B2T) Interactions.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KeesORR15","ee":"http://aisel.aisnet.org/ecis2015_cr/92","url":"https://dblp.org/rec/conf/ecis/KeesORR15"}, "url":"URL#3543832" }, { "@score":"1", "@id":"3543833", "info":{"authors":{"author":[{"@pid":"87/4657","text":"Hajer Kefi"},{"@pid":"30/9491","text":"Alya Mlaiki"},{"@pid":"84/5899","text":"Michel Kalika"}]},"title":"Social Networking Continuance: When Habit Leads to Information Overload.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KefiMK15","ee":"http://aisel.aisnet.org/ecis2015_cr/93","url":"https://dblp.org/rec/conf/ecis/KefiMK15"}, "url":"URL#3543833" }, { "@score":"1", "@id":"3543834", "info":{"authors":{"author":[{"@pid":"36/10018","text":"Flavius Kehr"},{"@pid":"05/6574","text":"Tobias Kowatsch"}]},"title":"Quantitative Longitudinal Research: A Review of IS Literature, and a Set of Methodological Guidelines.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KehrK15","ee":"http://aisel.aisnet.org/ecis2015_cr/94","url":"https://dblp.org/rec/conf/ecis/KehrK15"}, "url":"URL#3543834" }, { "@score":"1", "@id":"3543835", "info":{"authors":{"author":[{"@pid":"36/10018","text":"Flavius Kehr"},{"@pid":"95/10657","text":"Daniel Wentzel"},{"@pid":"05/6574","text":"Tobias Kowatsch"},{"@pid":"82/5541","text":"Elgar Fleisch"}]},"title":"Rethinking Privacy Decisions: Pre-Existing Attitudes, Pre-Existing Emotional States, and a Situational Privacy Calculus.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KehrWKF15","ee":"http://aisel.aisnet.org/ecis2015_cr/95","url":"https://dblp.org/rec/conf/ecis/KehrWKF15"}, "url":"URL#3543835" }, { "@score":"1", "@id":"3543836", "info":{"authors":{"author":[{"@pid":"172/7553","text":"Atika Ahmad Kemal"},{"@pid":"94/1034","text":"Lin Yan"}]},"title":"Mobile Banking Adoption and Diffusion: Enabling and Constraining Social or Financial Inclusion among Poor Women in Pakistan?","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KemalY15","ee":"http://aisel.aisnet.org/ecis2015_cr/96","url":"https://dblp.org/rec/conf/ecis/KemalY15"}, "url":"URL#3543836" }, { "@score":"1", "@id":"3543837", "info":{"authors":{"author":[{"@pid":"172/7466","text":"Grace Kenny"},{"@pid":"85/912","text":"Regina Connolly"}]},"title":"Citizens' Health Information Privacy Concerns: A Multifaceted Approach.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KennyC15","ee":"http://aisel.aisnet.org/ecis2015_rip/22","url":"https://dblp.org/rec/conf/ecis/KennyC15"}, "url":"URL#3543837" }, { "@score":"1", "@id":"3543838", "info":{"authors":{"author":[{"@pid":"144/1260","text":"Janina Kettenbohrer"},{"@pid":"71/5100","text":"Daniel Beimborn"},{"@pid":"63/5283","text":"Andreas Eckhardt"}]},"title":"Analyzing the Impact of Job Characteristics on Employees' Acceptance of Process Standardization.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KettenbohrerBE15","ee":"http://aisel.aisnet.org/ecis2015_cr/97","url":"https://dblp.org/rec/conf/ecis/KettenbohrerBE15"}, "url":"URL#3543838" }, { "@score":"1", "@id":"3543839", "info":{"authors":{"author":[{"@pid":"172/7347","text":"Rezwanul Huque Khan"},{"@pid":"61/2450","text":"Joe Nandhakumar"},{"@pid":"172/7405","text":"Panayiotis Constantinides"}]},"title":"ICT Driven Transformation of State-owned Enterprises in a Developing Country.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KhanNC15","ee":"http://aisel.aisnet.org/ecis2015_cr/98","url":"https://dblp.org/rec/conf/ecis/KhanNC15"}, "url":"URL#3543839" }, { "@score":"1", "@id":"3543840", "info":{"authors":{"author":[{"@pid":"147/6163","text":"Andreas Kiesow"},{"@pid":"21/281","text":"Novica Zarvic"},{"@pid":"18/3788","text":"Oliver Thomas"}]},"title":"Improving the Success of Continuous Auditing Projects with a Comprehensive Implementation Framework.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KiesowZT15","ee":"http://aisel.aisnet.org/ecis2015_cr/99","url":"https://dblp.org/rec/conf/ecis/KiesowZT15"}, "url":"URL#3543840" }, { "@score":"1", "@id":"3543841", "info":{"authors":{"author":[{"@pid":"125/0952","text":"Thomas Kilian"},{"@pid":"17/4142","text":"Petra Schubert"},{"@pid":"98/3472","text":"Niels Bjørn-Andersen"}]},"title":"Benefits and Barriers of University Industry Collaborations from a Researcher's Perspective - Development of Formative Scales and Cluster Analysis.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KilianSB15","ee":"http://aisel.aisnet.org/ecis2015_cr/101","url":"https://dblp.org/rec/conf/ecis/KilianSB15"}, "url":"URL#3543841" }, { "@score":"1", "@id":"3543842", "info":{"authors":{"author":[{"@pid":"125/0952","text":"Thomas Kilian"},{"@pid":"06/2380","text":"Ansgar Scherp"},{"@pid":"172/7412","text":"Eva Hammes"}]},"title":"Social Media in Journalistic Inquiry - Requirements for a Search System incorporating Journalistic Quality Criteria.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KilianSH15","ee":"http://aisel.aisnet.org/ecis2015_cr/100","url":"https://dblp.org/rec/conf/ecis/KilianSH15"}, "url":"URL#3543842" }, { "@score":"1", "@id":"3543843", "info":{"authors":{"author":[{"@pid":"72/793","text":"Marianne Kinnula"},{"@pid":"172/7432","text":"Sari Laari-Salmela"},{"@pid":"56/2712","text":"Netta Iivari"}]},"title":"Mundane or Magical? Discourses on Technology Adoption in Finnish Schools.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KinnulaLI15","ee":"http://aisel.aisnet.org/ecis2015_cr/102","url":"https://dblp.org/rec/conf/ecis/KinnulaLI15"}, "url":"URL#3543843" }, { "@score":"1", "@id":"3543844", "info":{"authors":{"author":[{"@pid":"172/7331","text":"Dominikus Kleindienst"},{"@pid":"129/8339","text":"Regina Pfleger"},{"@pid":"69/5292","text":"Manfred Schoch"}]},"title":"The Business Alignment of Social Media Analytics.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KleindienstPS15","ee":"http://aisel.aisnet.org/ecis2015_cr/103","url":"https://dblp.org/rec/conf/ecis/KleindienstPS15"}, "url":"URL#3543844" }, { "@score":"1", "@id":"3543845", "info":{"authors":{"author":[{"@pid":"75/1581","text":"Ralf Klischewski"},{"@pid":"32/10199","text":"Ahmed Abdelhameed Elragal"}]},"title":"Business-IT Alignment in the Arab World - Is There a Fast Track to Maturity?","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KlischewskiE15","ee":"http://aisel.aisnet.org/ecis2015_cr/104","url":"https://dblp.org/rec/conf/ecis/KlischewskiE15"}, "url":"URL#3543845" }, { "@score":"1", "@id":"3543846", "info":{"authors":{"author":[{"@pid":"153/1084","text":"Benjamin Klör"},{"@pid":"27/6676","text":"Daniel Beverungen"},{"@pid":"129/5356","text":"Sebastian Bräuer"},{"@pid":"172/7489","text":"Florian Plenter"},{"@pid":"155/4959","text":"Markus Monhof"}]},"title":"A Market for Trading Used Electric Vehicle Batteries - Theoretical Foundations and Information Systems.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KlorBBPM15","ee":"http://aisel.aisnet.org/ecis2015_cr/105","url":"https://dblp.org/rec/conf/ecis/KlorBBPM15"}, "url":"URL#3543846" }, { "@score":"1", "@id":"3543847", "info":{"authors":{"author":{"@pid":"99/41","text":"Oliver Koch"}},"title":"Business Model Development in IT Startups - The Role of Scarcity and Personalization in Generating User Feedback.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Koch15","ee":"http://aisel.aisnet.org/ecis2015_cr/107","url":"https://dblp.org/rec/conf/ecis/Koch15"}, "url":"URL#3543847" }, { "@score":"1", "@id":"3543848", "info":{"authors":{"author":[{"@pid":"172/7500","text":"Jascha-Alexander Koch"},{"@pid":"97/11056","text":"Michael Siering"}]},"title":"Crowdfunding Success Factors: The Characteristics of Successfully Funded Projects on Crowdfunding Platforms.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KochS15","ee":"http://aisel.aisnet.org/ecis2015_cr/106","url":"https://dblp.org/rec/conf/ecis/KochS15"}, "url":"URL#3543848" }, { "@score":"1", "@id":"3543849", "info":{"authors":{"author":[{"@pid":"125/0503","text":"Sebastian Köffer"},{"@pid":"172/7383","text":"Lea Anlauf"},{"@pid":"14/3376","text":"Kevin Ortbach"},{"@pid":"97/6774","text":"Björn Niehaves"}]},"title":"The Intensified Blurring of Boundaries Between Work and Private Life through IT Consumerisation.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KofferAON15","ee":"http://aisel.aisnet.org/ecis2015_cr/108","url":"https://dblp.org/rec/conf/ecis/KofferAON15"}, "url":"URL#3543849" }, { "@score":"1", "@id":"3543850", "info":{"authors":{"author":[{"@pid":"160/9818","text":"Svyatoslav Kotusev"},{"@pid":"09/6541","text":"Mohini Singh"},{"@pid":"160/9610","text":"Ian Storey"}]},"title":"Investigating the Usage of Enterprise Architecture Artifacts.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KotusevSS15","ee":"http://aisel.aisnet.org/ecis2015_rip/15","url":"https://dblp.org/rec/conf/ecis/KotusevSS15"}, "url":"URL#3543850" }, { "@score":"1", "@id":"3543851", "info":{"authors":{"author":[{"@pid":"21/9692","text":"Martin Kowalczyk"},{"@pid":"65/1278","text":"Peter Buxmann"}]},"title":"Perspectives on Collaboration Procedures and Politics During the Support of Decision Processes with Business Intelligence & Analytics.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KowalczykB15","ee":"http://aisel.aisnet.org/ecis2015_cr/109","url":"https://dblp.org/rec/conf/ecis/KowalczykB15"}, "url":"URL#3543851" }, { "@score":"1", "@id":"3543852", "info":{"authors":{"author":[{"@pid":"21/9692","text":"Martin Kowalczyk"},{"@pid":"06/10503","text":"Jin P. Gerlach"}]},"title":"Business Intelligence & Analytics and Decision Quality - Insights on Analytics Specialization and Information Processing Modes.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KowalczykG15","ee":"http://aisel.aisnet.org/ecis2015_cr/110","url":"https://dblp.org/rec/conf/ecis/KowalczykG15"}, "url":"URL#3543852" }, { "@score":"1", "@id":"3543853", "info":{"authors":{"author":[{"@pid":"05/6574","text":"Tobias Kowatsch"},{"@pid":"160/5030","text":"Fabian Wahle"},{"@pid":"24/4451","text":"Andreas Filler"},{"@pid":"36/10018","text":"Flavius Kehr"},{"@pid":"00/10943","text":"Dirk Volland"},{"@pid":"163/4915","text":"Severin Haug"},{"@pid":"147/4672","text":"Gregor J. Jenny"},{"@pid":"14/5255","text":"Georg Bauer"},{"@pid":"82/5541","text":"Elgar Fleisch"}]},"title":"Towards Short-term Detection of Job Strain in Knowledge Workers with a Minimal-invasive Information System Service: Theoretical Foundation and Experimental Design.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KowatschWFKVHJB15","ee":"http://aisel.aisnet.org/ecis2015_rip/24","url":"https://dblp.org/rec/conf/ecis/KowatschWFKVHJB15"}, "url":"URL#3543853" }, { "@score":"1", "@id":"3543854", "info":{"authors":{"author":{"@pid":"147/6208","text":"Martin Kretzer"}},"title":"Linking Report Individualization and Report Standardization: A Configurational Perspective.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Kretzer15","ee":"http://aisel.aisnet.org/ecis2015_cr/111","url":"https://dblp.org/rec/conf/ecis/Kretzer15"}, "url":"URL#3543854" }, { "@score":"1", "@id":"3543855", "info":{"authors":{"author":[{"@pid":"48/10655","text":"Julia Kroenung"},{"@pid":"144/1183","text":"Lennart Jaeger"},{"@pid":"144/1178","text":"Arne Kupetz"}]},"title":"System Characteristic or User Purpose? - A Multi-group Analysis on the Adoption of Online Shopping by Mobility Impaired and Unimpaired Users.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KronungJK15","ee":"http://aisel.aisnet.org/ecis2015_cr/112","url":"https://dblp.org/rec/conf/ecis/KronungJK15"}, "url":"URL#3543855" }, { "@score":"1", "@id":"3543856", "info":{"authors":{"author":[{"@pid":"172/6966","text":"Kathrin Kuehne"},{"@pid":"91/11106","text":"Lubov Kosch"},{"@pid":"129/5284","text":"Angelica Cuylen"}]},"title":"Will XML-based Electronic Invoice Standards Succeed? - An Explorative Study.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/KuehneKC15","ee":"http://aisel.aisnet.org/ecis2015_cr/113","url":"https://dblp.org/rec/conf/ecis/KuehneKC15"}, "url":"URL#3543856" }, { "@score":"1", "@id":"3543857", "info":{"authors":{"author":[{"@pid":"120/3015","text":"Stine Labes"},{"@pid":"153/1296","text":"Nicolai Hanner"},{"@pid":"72/2088","text":"Rüdiger Zarnekow"}]},"title":"Success Factors of Cloud Business Models.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LabesHZ15","ee":"http://aisel.aisnet.org/ecis2015_cr/114","url":"https://dblp.org/rec/conf/ecis/LabesHZ15"}, "url":"URL#3543857" }, { "@score":"1", "@id":"3543858", "info":{"authors":{"author":[{"@pid":"146/6379","text":"Sami Laine"},{"@pid":"24/11257","text":"Carol Lee"},{"@pid":"57/4591","text":"Marko Nieminen"}]},"title":"Transparent Data Supply for Open Information Production Processes.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LaineLN15","ee":"http://aisel.aisnet.org/ecis2015_cr/115","url":"https://dblp.org/rec/conf/ecis/LaineLN15"}, "url":"URL#3543858" }, { "@score":"1", "@id":"3543859", "info":{"authors":{"author":[{"@pid":"96/7189","text":"Arto Lanamäki"},{"@pid":"56/2712","text":"Netta Iivari"},{"@pid":"46/4685","text":"Mikko Rajanen"},{"@pid":"16/4283","text":"Henrik Hedberg"}]},"title":"Battle over Media Choice: Multiplex Tensions in the Online Community of Wikipedia.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LanamakiIRH15","ee":"http://aisel.aisnet.org/ecis2015_cr/116","url":"https://dblp.org/rec/conf/ecis/LanamakiIRH15"}, "url":"URL#3543859" }, { "@score":"1", "@id":"3543860", "info":{"authors":{"author":[{"@pid":"87/6369","text":"Markus Lang"},{"@pid":"172/7487","text":"Benjamin Wehner"},{"@pid":"131/3357","text":"Thomas Falk"},{"@pid":"74/10503","text":"Philipp Griesberger"},{"@pid":"78/742","text":"Susanne Leist"}]},"title":"Evaluating Business Process Improvement Patterns by Simulation.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LangWFGL15","ee":"http://aisel.aisnet.org/ecis2015_cr/117","url":"https://dblp.org/rec/conf/ecis/LangWFGL15"}, "url":"URL#3543860" }, { "@score":"1", "@id":"3543861", "info":{"authors":{"author":[{"@pid":"172/7439","text":"David J. Langley"},{"@pid":"123/7227","text":"Remco Wijn"},{"@pid":"172/7416","text":"Sacha Epskamp"},{"@pid":"172/7431","text":"Riet Van Bork"}]},"title":"Should I Get That Jab? Exploring Influence to Encourage Vaccination via Online Social Media.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LangleyWEB15","ee":"http://aisel.aisnet.org/ecis2015_rip/64","url":"https://dblp.org/rec/conf/ecis/LangleyWEB15"}, "url":"URL#3543861" }, { "@score":"1", "@id":"3543862", "info":{"authors":{"author":[{"@pid":"125/0508","text":"Katja Lehmann"},{"@pid":"74/2619","text":"Jan Marco Leimeister"}]},"title":"Theory-driven Design of an IT-based Peer Assessment to Assess High Cognitive Levels of Educational Objectives in Large-scale Learning Services.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LehmannL15","ee":"http://aisel.aisnet.org/ecis2015_rip/58","url":"https://dblp.org/rec/conf/ecis/LehmannL15"}, "url":"URL#3543862" }, { "@score":"1", "@id":"3543863", "info":{"authors":{"author":[{"@pid":"71/11390","text":"Martin Lehnert"},{"@pid":"69/3326","text":"Maximilian Roeglinger"},{"@pid":"172/7385","text":"Johannes Seyfried"},{"@pid":"172/7555","text":"Maximilian Siegert"}]},"title":"ProcessPageRank - A Network-based Approach to Process Prioritization Decisions.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LehnertRSS15","ee":"http://aisel.aisnet.org/ecis2015_cr/118","url":"https://dblp.org/rec/conf/ecis/LehnertRSS15"}, "url":"URL#3543863" }, { "@score":"1", "@id":"3543864", "info":{"authors":{"author":{"@pid":"41/10503","text":"Christiane Lehrer"}},"title":"Examining Discontinuers' Word-of-Mouth Behaviour in the Context of Mobile Location-based Services.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Lehrer15","ee":"http://aisel.aisnet.org/ecis2015_cr/119","url":"https://dblp.org/rec/conf/ecis/Lehrer15"}, "url":"URL#3543864" }, { "@score":"1", "@id":"3543865", "info":{"authors":{"author":[{"@pid":"06/4872","text":"Tim Lehrig"},{"@pid":"125/0743","text":"Oliver Krancher"},{"@pid":"27/1261","text":"Jens Dibbern"}]},"title":"The Evolution of Routines under Flexible Information Technology.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LehrigKD15","ee":"http://aisel.aisnet.org/ecis2015_rip/14","url":"https://dblp.org/rec/conf/ecis/LehrigKD15"}, "url":"URL#3543865" }, { "@score":"1", "@id":"3543866", "info":{"authors":{"author":[{"@pid":"97/8644","text":"Michael Leyer"},{"@pid":"172/7538","text":"Ann-Kathrin Hirzel"},{"@pid":"75/2101","text":"Jürgen Moormann"}]},"title":"Effectiveness of Role Plays on Process-oriented Behaviour in Daily Work Practices: An Analysis in the Financial Services Sector.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LeyerHM15","ee":"http://aisel.aisnet.org/ecis2015_cr/120","url":"https://dblp.org/rec/conf/ecis/LeyerHM15"}, "url":"URL#3543866" }, { "@score":"1", "@id":"3543867", "info":{"authors":{"author":[{"@pid":"172/7481","text":"Diana Limburg"},{"@pid":"172/7361","text":"Cathy Knowles"},{"@pid":"172/7419","text":"Maureen McCulloch"}]},"title":"Can Charities Use Enterprise Performance Management Systems to Improve Information Provision?","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LimburgKM15","ee":"http://aisel.aisnet.org/ecis2015_cr/121","url":"https://dblp.org/rec/conf/ecis/LimburgKM15"}, "url":"URL#3543867" }, { "@score":"1", "@id":"3543868", "info":{"authors":{"author":{"@pid":"25/1914","text":"Sheng-cheng Lin"}},"title":"Investigate Factors and Moderators of the Quasicollective Behavior in Virtual Communities.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Lin15","ee":"http://aisel.aisnet.org/ecis2015_rip/46","url":"https://dblp.org/rec/conf/ecis/Lin15"}, "url":"URL#3543868" }, { "@score":"1", "@id":"3543869", "info":{"authors":{"author":[{"@pid":"95/3189","text":"Lien-Fa Lin"},{"@pid":"93/2611","text":"Yung-Ming Li"}]},"title":"Social Appraisal Support for Point-of-interest Visiting Decision-making.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LinL15","ee":"http://aisel.aisnet.org/ecis2015_cr/122","url":"https://dblp.org/rec/conf/ecis/LinL15"}, "url":"URL#3543869" }, { "@score":"1", "@id":"3543870", "info":{"authors":{"author":[{"@pid":"36/10009","text":"Tingting Lin"},{"@pid":"120/2132","text":"Giovanni Vaia"}]},"title":"The Concept of Governance in IT Outsourcing: A Literature Review.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LinV15","ee":"http://aisel.aisnet.org/ecis2015_cr/123","url":"https://dblp.org/rec/conf/ecis/LinV15"}, "url":"URL#3543870" }, { "@score":"1", "@id":"3543871", "info":{"authors":{"author":[{"@pid":"172/7418","text":"Rikke Lindekilde"},{"@pid":"96/857","text":"Pernille Bjørn"}]},"title":"Perceptions of Presence: Discursive and Embodied Experiences in Global Collaboration.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LindekildeB15","ee":"http://aisel.aisnet.org/ecis2015_cr/124","url":"https://dblp.org/rec/conf/ecis/LindekildeB15"}, "url":"URL#3543871" }, { "@score":"1", "@id":"3543872", "info":{"authors":{"author":[{"@pid":"150/5440","text":"Alexander Linhart"},{"@pid":"166/7457","text":"Jonas Manderscheid"},{"@pid":"69/3326","text":"Maximilian Roeglinger"}]},"title":"Roadmap to Flexible Service Processes - A Project Portfolio Selection and Scheduling Approach.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LinhartMR15","ee":"http://aisel.aisnet.org/ecis2015_cr/125","url":"https://dblp.org/rec/conf/ecis/LinhartMR15"}, "url":"URL#3543872" }, { "@score":"1", "@id":"3543873", "info":{"authors":{"author":[{"@pid":"92/10654","text":"Marc Linzmajer"},{"@pid":"151/2564","text":"Sandro Schopfer"},{"@pid":"74/9064","text":"Thorben Keller"},{"@pid":"172/7454","text":"Liane Nagengast"},{"@pid":"82/5541","text":"Elgar Fleisch"},{"@pid":"172/7551","text":"Thomas Rudolph"}]},"title":"The Effects of Personalized Recommendations with Popularity Information on Sales - A Field Study in Grocery Retailing.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LinzmajerSKNFR15","ee":"http://aisel.aisnet.org/ecis2015_rip/65","url":"https://dblp.org/rec/conf/ecis/LinzmajerSKNFR15"}, "url":"URL#3543873" }, { "@score":"1", "@id":"3543874", "info":{"authors":{"author":{"@pid":"80/8686","text":"Amy Van Looy"}},"title":"An Experiment for Measuring Business Process Maturity with Different Maturity Models.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Looy15","ee":"http://aisel.aisnet.org/ecis2015_cr/192","url":"https://dblp.org/rec/conf/ecis/Looy15"}, "url":"URL#3543874" }, { "@score":"1", "@id":"3543875", "info":{"authors":{"author":[{"@pid":"46/601","text":"Johan Lundin"},{"@pid":"l/ULundhSnis","text":"Ulrika Lundh Snis"},{"@pid":"63/4675","text":"Lars Svensson"}]},"title":"The Illusion of Structure: About Harmonization and Variation in Competence Management System Practices in a Public Healthcare Organization.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LundinSS15","ee":"http://aisel.aisnet.org/ecis2015_cr/126","url":"https://dblp.org/rec/conf/ecis/LundinSS15"}, "url":"URL#3543875" }, { "@score":"1", "@id":"3543876", "info":{"authors":{"author":[{"@pid":"172/7339","text":"Ewa Lux"},{"@pid":"127/9676","text":"Florian Hawlitschek"},{"@pid":"91/10115","text":"Marc Thomas Philipp Adam"},{"@pid":"32/3391","text":"Jella Pfeiffer"}]},"title":"Using Live Biofeedback for Decision Support: Investigating Influences of Emotion Regulation in Financial Decision Making.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/LuxHAP15","ee":"http://aisel.aisnet.org/ecis2015_rip/50","url":"https://dblp.org/rec/conf/ecis/LuxHAP15"}, "url":"URL#3543876" }, { "@score":"1", "@id":"3543877", "info":{"authors":{"author":[{"@pid":"135/9857","text":"Giovanni Maccani"},{"@pid":"57/288","text":"Brian Donnellan"},{"@pid":"17/2368","text":"Markus Helfert"}]},"title":"Exploring the Factors that Influence the Diffusion of Open Data for New Service Development: An Interpretive Case Study.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/MaccaniDH15","ee":"http://aisel.aisnet.org/ecis2015_cr/127","url":"https://dblp.org/rec/conf/ecis/MaccaniDH15"}, "url":"URL#3543877" }, { "@score":"1", "@id":"3543878", "info":{"authors":{"author":{"@pid":"24/80","text":"Sanna Malinen"}},"title":""Unsociability" as Boundary Regulation on Social Network Sites.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Malinen15","ee":"http://aisel.aisnet.org/ecis2015_cr/128","url":"https://dblp.org/rec/conf/ecis/Malinen15"}, "url":"URL#3543878" }, { "@score":"1", "@id":"3543879", "info":{"authors":{"author":[{"@pid":"147/4410","text":"Markus Manhart"},{"@pid":"19/6007","text":"Stefan Thalmann"},{"@pid":"04/2976","text":"Ronald Maier"}]},"title":"The Ends of Knowledge Sharing in Networks: Using Information Technology to Start Knowledge Protection.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/ManhartTM15","ee":"http://aisel.aisnet.org/ecis2015_cr/129","url":"https://dblp.org/rec/conf/ecis/ManhartTM15"}, "url":"URL#3543879" }, { "@score":"1", "@id":"3543880", "info":{"authors":{"author":[{"@pid":"00/4206","text":"Martin Matzner"},{"@pid":"135/3087","text":"Friedrich Chasin"},{"@pid":"172/7547","text":"Lydia Todenhöfer"}]},"title":"To Share or Not to Share: Towards Understanding the Antecedents of Participation in IT-Enabled Sharing Services.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/MatznerCT15","ee":"http://aisel.aisnet.org/ecis2015_rip/19","url":"https://dblp.org/rec/conf/ecis/MatznerCT15"}, "url":"URL#3543880" }, { "@score":"1", "@id":"3543881", "info":{"authors":{"author":[{"@pid":"00/4206","text":"Martin Matzner"},{"@pid":"145/7879","text":"Moritz von Hoffen"},{"@pid":"83/7946","text":"Tobias Heide"},{"@pid":"172/7489","text":"Florian Plenter"},{"@pid":"135/3087","text":"Friedrich Chasin"}]},"title":"A Method for Measuring User Preferences in Information Systems Design Choices.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/MatznerHHPC15","ee":"http://aisel.aisnet.org/ecis2015_cr/131","url":"https://dblp.org/rec/conf/ecis/MatznerHHPC15"}, "url":"URL#3543881" }, { "@score":"1", "@id":"3543882", "info":{"authors":{"author":[{"@pid":"172/7519","text":"Stephen McCarthy"},{"@pid":"23/10330","text":"Yvonne O'Connor"},{"@pid":"14/6686","text":"Matthew Thompson"},{"@pid":"07/5786","text":"Timothy O'Sullivan"},{"@pid":"43/8648","text":"Deirdre Ryan"},{"@pid":"133/7124-1","text":"Siobhán O'Connor 0001"},{"@pid":"52/11136","text":"Joe Gallagher"},{"@pid":"33/5473","text":"Ciara Heavin"},{"@pid":"01/6793","text":"John O'Donoghue"}]},"title":"Wearable Vital Sign Sensors and Their Potential within Low and Middle Income Countries.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/McCarthyOTOROGH15","ee":"http://aisel.aisnet.org/ecis2015_rip/38","url":"https://dblp.org/rec/conf/ecis/McCarthyOTOROGH15"}, "url":"URL#3543882" }, { "@score":"1", "@id":"3543883", "info":{"authors":{"author":{"@pid":"172/7414","text":"Rosemary A. Van Der Meer"}},"title":"External Influences in Inter-organisational Knowledge Sharing.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Meer15","ee":"http://aisel.aisnet.org/ecis2015_cr/189","url":"https://dblp.org/rec/conf/ecis/Meer15"}, "url":"URL#3543883" }, { "@score":"1", "@id":"3543884", "info":{"authors":{"author":[{"@pid":"06/4759","text":"Stephan Meisel"},{"@pid":"164/9083","text":"Martin Wölck"}]},"title":"Evaluating Idle Time Policies for Real-Time Routing of a Service Vehicle.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/MeiselW15","ee":"http://aisel.aisnet.org/ecis2015_cr/132","url":"https://dblp.org/rec/conf/ecis/MeiselW15"}, "url":"URL#3543884" }, { "@score":"1", "@id":"3543885", "info":{"authors":{"author":[{"@pid":"160/3055","text":"Johannes Merkert"},{"@pid":"143/5134","text":"Marcus Mueller"},{"@pid":"160/3046","text":"Marvin Hubl"}]},"title":"A Survey of the Application of Machine Learning in Decision Support Systems.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/MerkertMH15","ee":"http://aisel.aisnet.org/ecis2015_cr/133","url":"https://dblp.org/rec/conf/ecis/MerkertMH15"}, "url":"URL#3543885" }, { "@score":"1", "@id":"3543886", "info":{"authors":{"author":[{"@pid":"172/6920","text":"Alexander B. Merz"},{"@pid":"17/10019","text":"Isabella Seeber"},{"@pid":"04/2976","text":"Ronald Maier"}]},"title":"Social Meets Structure: Revealing Team Collaboration Activities and Effects in Enterprise Social Networks.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/MerzSM15","ee":"http://aisel.aisnet.org/ecis2015_cr/134","url":"https://dblp.org/rec/conf/ecis/MerzSM15"}, "url":"URL#3543886" }, { "@score":"1", "@id":"3543887", "info":{"authors":{"author":[{"@pid":"131/1148","text":"Michiel C. Meulendijk"},{"@pid":"98/217","text":"Marco R. Spruit"},{"@pid":"17/8017","text":"Paul A. F. Jansen"},{"@pid":"142/4991","text":"Mattijs E. Numans"},{"@pid":"b/SjaakBrinkkemper","text":"Sjaak Brinkkemper"}]},"title":"STRIPA: A Rule-Based Decision Support System for Medication Reviews in Primary Care.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/MeulendijkSJNB15","ee":"http://aisel.aisnet.org/ecis2015_rip/29","url":"https://dblp.org/rec/conf/ecis/MeulendijkSJNB15"}, "url":"URL#3543887" }, { "@score":"1", "@id":"3543888", "info":{"authors":{"author":[{"@pid":"133/2242","text":"Catherine G. Mkude"},{"@pid":"w/MariaWimmer","text":"Maria A. Wimmer"}]},"title":"Studying Interdependencies of E-government Challenges in Tanzania along a Pestel Analysis.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/MkudeW15","ee":"http://aisel.aisnet.org/ecis2015_cr/135","url":"https://dblp.org/rec/conf/ecis/MkudeW15"}, "url":"URL#3543888" }, { "@score":"1", "@id":"3543889", "info":{"authors":{"author":[{"@pid":"135/3023","text":"Anastasia Mochalova"},{"@pid":"n/AlexandrosNanopoulos","text":"Alexandros Nanopoulos"}]},"title":"Non-intrusive Viral Marketing Based on Percolation Centrality.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/MochalovaN15","ee":"http://aisel.aisnet.org/ecis2015_cr/136","url":"https://dblp.org/rec/conf/ecis/MochalovaN15"}, "url":"URL#3543889" }, { "@score":"1", "@id":"3543890", "info":{"authors":{"author":[{"@pid":"172/7532","text":"Amir Mohagheghzadeh"},{"@pid":"01/9053","text":"Fredrik Svahn"}]},"title":"Resource Transformation in Platform Envelopment.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/MohagheghzadehS15","ee":"http://aisel.aisnet.org/ecis2015_rip/44","url":"https://dblp.org/rec/conf/ecis/MohagheghzadehS15"}, "url":"URL#3543890" }, { "@score":"1", "@id":"3543891", "info":{"authors":{"author":[{"@pid":"125/0421","text":"Tobias Mutter"},{"@pid":"26/4979","text":"Dennis Kundisch"}]},"title":"Behavioral Mechanisms Prompted by Virtual Rewards: The Small-area Hypothesis.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/MutterK15","ee":"http://aisel.aisnet.org/ecis2015_cr/137","url":"https://dblp.org/rec/conf/ecis/MutterK15"}, "url":"URL#3543891" }, { "@score":"1", "@id":"3543892", "info":{"authors":{"author":[{"@pid":"68/7359","text":"Cuong D. Nguyen"},{"@pid":"125/0619","text":"Nargess Tahmasbi"},{"@pid":"92/11055","text":"Triparna de Vreede"},{"@pid":"07/5508","text":"Gert-Jan de Vreede"},{"@pid":"78/9371","text":"Onook Oh"},{"@pid":"64/8719","text":"Roni Reiter-Palmon"}]},"title":"Participant Engagement in Community Crowdsourcing.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/NguyenTVVOR15","ee":"http://aisel.aisnet.org/ecis2015_rip/41","url":"https://dblp.org/rec/conf/ecis/NguyenTVVOR15"}, "url":"URL#3543892" }, { "@score":"1", "@id":"3543893", "info":{"authors":{"author":[{"@pid":"04/10439","text":"Indira Nurdiani"},{"@pid":"72/5557","text":"Samuel A. Fricker"},{"@pid":"b/JBorstler","text":"Jürgen Börstler"}]},"title":"An Analysis of Change Scenarios of an IT Organization for Flexibility Building.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/NurdianiFB15","ee":"http://aisel.aisnet.org/ecis2015_cr/138","url":"https://dblp.org/rec/conf/ecis/NurdianiFB15"}, "url":"URL#3543893" }, { "@score":"1", "@id":"3543894", "info":{"authors":{"author":{"@pid":"160/5495","text":"Christian Nuss"}},"title":"Developing an Environmental Management Information System to Foster Sustainable Decision-Making in the Energy Sector.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Nuss15","ee":"http://aisel.aisnet.org/ecis2015_cr/139","url":"https://dblp.org/rec/conf/ecis/Nuss15"}, "url":"URL#3543894" }, { "@score":"1", "@id":"3543895", "info":{"authors":{"author":[{"@pid":"172/6984","text":"Kayode A. Odusanya"},{"@pid":"34/8290","text":"Crispin R. Coombs"},{"@pid":"77/6973","text":"Neil F. Doherty"}]},"title":"Exploiting Benefits from IS/IT Investments: An IT Culture Perspective.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/OdusanyaCD15","ee":"http://aisel.aisnet.org/ecis2015_rip/56","url":"https://dblp.org/rec/conf/ecis/OdusanyaCD15"}, "url":"URL#3543895" }, { "@score":"1", "@id":"3543896", "info":{"authors":{"author":[{"@pid":"91/5954","text":"Sebastian Olbrich"},{"@pid":"f/UlrichFrank","text":"Ulrich Frank"},{"@pid":"19/5565","text":"Dirk Hovorka"},{"@pid":"64/534","text":"Frantz Rowe"}]},"title":"Trust, but Verify! The Value of Replication and Negation in IS Research.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/OlbrichFHR15","ee":"http://aisel.aisnet.org/ecis2015_panels/4","url":"https://dblp.org/rec/conf/ecis/OlbrichFHR15"}, "url":"URL#3543896" }, { "@score":"1", "@id":"3543897", "info":{"authors":{"author":[{"@pid":"172/7455","text":"Jo Orsatti"},{"@pid":"22/5384","text":"Kai Riemer"}]},"title":"Identity-making: A Multimodal Approach for Researching Identity in Social Media.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/OrsattiR15","ee":"http://aisel.aisnet.org/ecis2015_cr/140","url":"https://dblp.org/rec/conf/ecis/OrsattiR15"}, "url":"URL#3543897" }, { "@score":"1", "@id":"3543898", "info":{"authors":{"author":{"@pid":"14/3376","text":"Kevin Ortbach"}},"title":"Unraveling the Effect of Personal Innovativeness on Bring-Your-Own-Device (BYOD) Intention - The Role of Perceptions Towards Enterprise-Provided and Privately-Owned Technologies.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Ortbach15","ee":"http://aisel.aisnet.org/ecis2015_cr/141","url":"https://dblp.org/rec/conf/ecis/Ortbach15"}, "url":"URL#3543898" }, { "@score":"1", "@id":"3543899", "info":{"authors":{"author":[{"@pid":"14/3376","text":"Kevin Ortbach"},{"@pid":"135/3029","text":"Nicolai Walter"},{"@pid":"142/7857","text":"Ayten Öksüz"}]},"title":"Are You Ready to Lose Control? A Theory on the Role of Trust and Risk Perception on Bring-Your-Own-Device Policy and Information System Service Quality.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/OrtbachWO15","ee":"http://aisel.aisnet.org/ecis2015_rip/2","url":"https://dblp.org/rec/conf/ecis/OrtbachWO15"}, "url":"URL#3543899" }, { "@score":"1", "@id":"3543900", "info":{"authors":{"author":[{"@pid":"172/7484","text":"Mark van der Pas"},{"@pid":"69/6239","text":"Brent Furneaux"}]},"title":"Improving the Predictability of IT Investment Business Value.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/PasF15","ee":"http://aisel.aisnet.org/ecis2015_cr/190","url":"https://dblp.org/rec/conf/ecis/PasF15"}, "url":"URL#3543900" }, { "@score":"1", "@id":"3543901", "info":{"authors":{"author":[{"@pid":"172/7417","text":"Joanne F. Patroni"},{"@pid":"82/1141","text":"Jan Recker"},{"@pid":"125/0625","text":"Frederik von Briel"}]},"title":"How Does Enterprise Social Media Help Retail Employees Innovate?","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/PatroniRB15","ee":"http://aisel.aisnet.org/ecis2015_rip/63","url":"https://dblp.org/rec/conf/ecis/PatroniRB15"}, "url":"URL#3543901" }, { "@score":"1", "@id":"3543902", "info":{"authors":{"author":[{"@pid":"172/7485","text":"Debra Paul"},{"@pid":"68/3437","text":"Yin Leng Tan"}]},"title":"An Investigation of the Role of Business Analysts in IS Development.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/PaulT15","ee":"http://aisel.aisnet.org/ecis2015_cr/142","url":"https://dblp.org/rec/conf/ecis/PaulT15"}, "url":"URL#3543902" }, { "@score":"1", "@id":"3543903", "info":{"authors":{"author":[{"@pid":"12/5019","text":"Ferdinando Pennarola"},{"@pid":"13/2065","text":"Jae Kyu Lee"},{"@pid":"k/HelmutKrcmar","text":"Helmut Krcmar"},{"@pid":"35/6102","text":"Henk G. Sol"},{"@pid":"98/3472","text":"Niels Bjørn-Andersen"}]},"title":"AIS Grand Vision Project for Bright ICT.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/PennarolaLKSB15","ee":"http://aisel.aisnet.org/ecis2015_panels/5","url":"https://dblp.org/rec/conf/ecis/PennarolaLKSB15"}, "url":"URL#3543903" }, { "@score":"1", "@id":"3543904", "info":{"authors":{"author":[{"@pid":"127/9879","text":"Gabriela Viale Pereira"},{"@pid":"47/459","text":"Leonardo Rocha de Oliveira"},{"@pid":"39/10832","text":"Maurício Gregianin Testa"}]},"title":"Government's Implementation of Information and Communication Technology in Developing Countries: An Analysis of Human Development Outcomes.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/PereiraOT15","ee":"http://aisel.aisnet.org/ecis2015_rip/42","url":"https://dblp.org/rec/conf/ecis/PereiraOT15"}, "url":"URL#3543904" }, { "@score":"1", "@id":"3543905", "info":{"authors":{"author":{"@pid":"19/1032","text":"Diego Ponte"}},"title":"Enabling an Open Data Ecosystem.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Ponte15","ee":"http://aisel.aisnet.org/ecis2015_rip/55","url":"https://dblp.org/rec/conf/ecis/Ponte15"}, "url":"URL#3543905" }, { "@score":"1", "@id":"3543906", "info":{"authors":{"author":[{"@pid":"172/7379","text":"Callam Porch"},{"@pid":"90/6177","text":"Greg Timbrell"},{"@pid":"r/MichaelRosemann","text":"Michael Rosemann"}]},"title":"Platforms: A Systematic Review Of The Literature Using Algorithmic Historiography.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/PorchTR15","ee":"http://aisel.aisnet.org/ecis2015_cr/143","url":"https://dblp.org/rec/conf/ecis/PorchTR15"}, "url":"URL#3543906" }, { "@score":"1", "@id":"3543907", "info":{"authors":{"author":[{"@pid":"160/9792","text":"Nicolas Pröllochs"},{"@pid":"125/0630","text":"Stefan Feuerriegel"},{"@pid":"90/1401","text":"Dirk Neumann 0001"}]},"title":"Generating Domain-Specific Dictionaries using Bayesian Learning.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/ProllochsFN15","ee":"http://aisel.aisnet.org/ecis2015_cr/144","url":"https://dblp.org/rec/conf/ecis/ProllochsFN15"}, "url":"URL#3543907" }, { "@score":"1", "@id":"3543908", "info":{"authors":{"author":[{"@pid":"168/0900","text":"Abhinay Puvvala"},{"@pid":"168/0933","text":"Ashish Kumar Jha"},{"@pid":"17/796","text":"Veerendra Kumar Rai"},{"@pid":"172/7447","text":"Harrick Mayank Vin"}]},"title":"Inefficiencies in IT Production Support Operations: Detection and Impact Analysis.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/PuvvalaJRV15","ee":"http://aisel.aisnet.org/ecis2015_cr/145","url":"https://dblp.org/rec/conf/ecis/PuvvalaJRV15"}, "url":"URL#3543908" }, { "@score":"1", "@id":"3543909", "info":{"authors":{"author":[{"@pid":"141/1554","text":"Thomas Reschenhofer"},{"@pid":"m/FlorianMatthes","text":"Florian Matthes"}]},"title":"A Framework for the Identification of Spreadsheet Usage Patterns.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/ReschenhoferM15","ee":"http://aisel.aisnet.org/ecis2015_cr/146","url":"https://dblp.org/rec/conf/ecis/ReschenhoferM15"}, "url":"URL#3543909" }, { "@score":"1", "@id":"3543910", "info":{"authors":{"author":[{"@pid":"148/6690","text":"Mathias Riechert"},{"@pid":"q/ChristophQuix","text":"Christoph Quix"},{"@pid":"72/2088","text":"Rüdiger Zarnekow"}]},"title":"Fostering Transparency in Policy Development Processes - A Development Transparency Framework.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/RiechertQZ15","ee":"http://aisel.aisnet.org/ecis2015_rip/39","url":"https://dblp.org/rec/conf/ecis/RiechertQZ15"}, "url":"URL#3543910" }, { "@score":"1", "@id":"3543911", "info":{"authors":{"author":[{"@pid":"142/8188","text":"Marten Risius"},{"@pid":"172/7049","text":"Fabian Akolk"},{"@pid":"08/6046","text":"Roman Beck"}]},"title":"Differential Emotions and the Stock Market - The Case of Company-specific Trading.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/RisiusAB15","ee":"http://aisel.aisnet.org/ecis2015_cr/147","url":"https://dblp.org/rec/conf/ecis/RisiusAB15"}, "url":"URL#3543911" }, { "@score":"1", "@id":"3543912", "info":{"authors":{"author":[{"@pid":"154/4090","text":"Robert Rockmann"},{"@pid":"85/10683","text":"Andy Weeger"},{"@pid":"44/3807","text":"Heiko Gewald"}]},"title":"IT Capabilities and Organizational Utilization of Public Cloud Computing.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/RockmannWG15","ee":"http://aisel.aisnet.org/ecis2015_cr/148","url":"https://dblp.org/rec/conf/ecis/RockmannWG15"}, "url":"URL#3543912" }, { "@score":"1", "@id":"3543913", "info":{"authors":{"author":[{"@pid":"74/4893","text":"Knut H. Rolland"},{"@pid":"g/GeorgeGhinea","text":"Gheorghita Ghinea"},{"@pid":"49/3681","text":"Tor-Morten Grønli"}]},"title":"Ambidextrous Enterprise Architecting: Betting on the Future and Hacking Path-dependencies.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/RollandGG15","ee":"http://aisel.aisnet.org/ecis2015_cr/150","url":"https://dblp.org/rec/conf/ecis/RollandGG15"}, "url":"URL#3543913" }, { "@score":"1", "@id":"3543914", "info":{"authors":{"author":{"@pid":"147/4768","text":"Peter G. Rötzel"}},"title":"The Impact of Creativity and Information Load on Escalation of Commitment.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Rotzel15","ee":"http://aisel.aisnet.org/ecis2015_cr/149","url":"https://dblp.org/rec/conf/ecis/Rotzel15"}, "url":"URL#3543914" }, { "@score":"1", "@id":"3543915", "info":{"authors":{"author":[{"@pid":"172/7445","text":"Arjan Rozendal"},{"@pid":"40/4179","text":"Eric T. K. Lim"},{"@pid":"55/4998","text":"Chee-Wee Tan"}]},"title":"A Change for the Better: Realizing Business-IT Alignment Through Organizational Change.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/RozendalLT15","ee":"http://aisel.aisnet.org/ecis2015_cr/151","url":"https://dblp.org/rec/conf/ecis/RozendalLT15"}, "url":"URL#3543915" }, { "@score":"1", "@id":"3543916", "info":{"authors":{"author":{"@pid":"145/4796","text":"Ted Saarikko"}},"title":"Digital platform development: A service-oriented perspective.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Saarikko15","ee":"http://aisel.aisnet.org/ecis2015_cr/152","url":"https://dblp.org/rec/conf/ecis/Saarikko15"}, "url":"URL#3543916" }, { "@score":"1", "@id":"3543917", "info":{"authors":{"author":{"@pid":"172/7345","text":"Amelie Sach"}},"title":"IT-user-aligned Business Model Innovation (ITUA) in the Sharing Economy: A Dynamic Capabilities Perspective.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Sach15","ee":"http://aisel.aisnet.org/ecis2015_cr/153","url":"https://dblp.org/rec/conf/ecis/Sach15"}, "url":"URL#3543917" }, { "@score":"1", "@id":"3543918", "info":{"authors":{"author":[{"@pid":"63/2288","text":"Hannu Salmela"},{"@pid":"142/7850","text":"Tommi Tapanainen"},{"@pid":"144/4811","text":"Abayomi Baiyere"},{"@pid":"146/9383","text":"Mikko Hallanoro"},{"@pid":"23/2600","text":"Robert D. Galliers"}]},"title":"IS Agility Research: An Assessment and Future Directions.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SalmelaTBHG15","ee":"http://aisel.aisnet.org/ecis2015_cr/155","url":"https://dblp.org/rec/conf/ecis/SalmelaTBHG15"}, "url":"URL#3543918" }, { "@score":"1", "@id":"3543919", "info":{"authors":{"author":[{"@pid":"19/2767","text":"Taru Salmimaa"},{"@pid":"81/3990","text":"Riitta Hekkala"},{"@pid":"28/4591","text":"Samuli Pekkola"}]},"title":"Paradoxes of Change Management in Information System Development.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SalmimaaHP15","ee":"http://aisel.aisnet.org/ecis2015_cr/156","url":"https://dblp.org/rec/conf/ecis/SalmimaaHP15"}, "url":"URL#3543919" }, { "@score":"1", "@id":"3543920", "info":{"authors":{"author":[{"@pid":"74/581","text":"Antti Salovaara"},{"@pid":"82/775","text":"Jani Merikivi"}]},"title":"IS Research Progress Would Benefit from Increased Falsification of Existing Theories.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SalovaaraM15","ee":"http://aisel.aisnet.org/ecis2015_cr/157","url":"https://dblp.org/rec/conf/ecis/SalovaaraM15"}, "url":"URL#3543920" }, { "@score":"1", "@id":"3543921", "info":{"authors":{"author":[{"@pid":"74/581","text":"Antti Salovaara"},{"@pid":"99/6094","text":"Virpi Kristiina Tuunainen"}]},"title":"Mediated Sharing as Software Developers' Strategy to Manage Ephemeral Knowledge.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SalovaaraT15","ee":"http://aisel.aisnet.org/ecis2015_cr/158","url":"https://dblp.org/rec/conf/ecis/SalovaaraT15"}, "url":"URL#3543921" }, { "@score":"1", "@id":"3543922", "info":{"authors":{"author":[{"@pid":"138/1370","text":"Johannes Sänger"},{"@pid":"142/3001","text":"Christian Richthammer"},{"@pid":"121/1571","text":"Michael Kunz"},{"@pid":"59/10434","text":"Stefan Meier"},{"@pid":"p/GPernul","text":"Günther Pernul"}]},"title":"Visualizing Unfair Ratings in Online Reputation Systems.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SangerRKMP15","ee":"http://aisel.aisnet.org/ecis2015_cr/159","url":"https://dblp.org/rec/conf/ecis/SangerRKMP15"}, "url":"URL#3543922" }, { "@score":"1", "@id":"3543923", "info":{"authors":{"author":[{"@pid":"172/7374","text":"Stephan Schäper"},{"@pid":"19/6007","text":"Stefan Thalmann"}]},"title":"Addressing Challenges for Informal Learning in Networks of Organizations.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SchaperT15","ee":"http://aisel.aisnet.org/ecis2015_cr/160","url":"https://dblp.org/rec/conf/ecis/SchaperT15"}, "url":"URL#3543923" }, { "@score":"1", "@id":"3543924", "info":{"authors":{"author":[{"@pid":"172/7508","text":"Christian Schlagenhaufer"},{"@pid":"16/6735","text":"Michael Amberg"}]},"title":"A Descriptive Literature Review and Classification Framework for Gamification in Information Systems.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SchlagenhauferA15","ee":"http://aisel.aisnet.org/ecis2015_cr/161","url":"https://dblp.org/rec/conf/ecis/SchlagenhauferA15"}, "url":"URL#3543924" }, { "@score":"1", "@id":"3543925", "info":{"authors":{"author":[{"@pid":"142/8194","text":"Nikolaus Schmidt"},{"@pid":"95/720","text":"Mario Müller"},{"@pid":"54/432","text":"Christoph Rosenkranz"}]},"title":"Identifying the Giants: A Social Network Analysis of the Literature on Information Technology Outsourcing Relationships.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SchmidtMR15","ee":"http://aisel.aisnet.org/ecis2015_cr/162","url":"https://dblp.org/rec/conf/ecis/SchmidtMR15"}, "url":"URL#3543925" }, { "@score":"1", "@id":"3543926", "info":{"authors":{"author":[{"@pid":"142/8194","text":"Nikolaus Schmidt"},{"@pid":"54/432","text":"Christoph Rosenkranz"}]},"title":"Understanding the Vendors' Needs: A Repertory Grid Study on Client-Vendor Relationship Quality in IT Outsourcing.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SchmidtR15","ee":"http://aisel.aisnet.org/ecis2015_cr/163","url":"https://dblp.org/rec/conf/ecis/SchmidtR15"}, "url":"URL#3543926" }, { "@score":"1", "@id":"3543927", "info":{"authors":{"author":[{"@pid":"74/11337","text":"Michel Schreiner"},{"@pid":"34/1059","text":"Thomas Hess"}]},"title":"Why Are Consumers Willing to Pay for Privacy? An Application of the Privacy-freemium Model to Media Companies.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SchreinerH15","ee":"http://aisel.aisnet.org/ecis2015_cr/164","url":"https://dblp.org/rec/conf/ecis/SchreinerH15"}, "url":"URL#3543927" }, { "@score":"1", "@id":"3543928", "info":{"authors":{"author":{"@pid":"24/6654","text":"Silvia Schwarze"}},"title":"The Multi-commodity Cable Trench Problem.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Schwarze15","ee":"http://aisel.aisnet.org/ecis2015_cr/165","url":"https://dblp.org/rec/conf/ecis/Schwarze15"}, "url":"URL#3543928" }, { "@score":"1", "@id":"3543929", "info":{"authors":{"author":[{"@pid":"119/3527","text":"Alexander Salinas Segura"},{"@pid":"45/2981","text":"Frédéric Thiesse"}]},"title":"Extending UTAUT2 to Explore Pervasive Information Systems.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SeguraT15","ee":"http://aisel.aisnet.org/ecis2015_cr/154","url":"https://dblp.org/rec/conf/ecis/SeguraT15"}, "url":"URL#3543929" }, { "@score":"1", "@id":"3543930", "info":{"authors":{"author":[{"@pid":"172/7470","text":"Abdul Rehman Shahid"},{"@pid":"65/2436","text":"Amany R. Elbanna"}]},"title":"The Impact of Crowdsourcing on Organisational Practices: The Case of Crowdmapping.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/ShahidE15","ee":"http://aisel.aisnet.org/ecis2015_cr/166","url":"https://dblp.org/rec/conf/ecis/ShahidE15"}, "url":"URL#3543930" }, { "@score":"1", "@id":"3543931", "info":{"authors":{"author":[{"@pid":"03/8325","text":"Divya Sharma"},{"@pid":"172/7326","text":"Agam Gupta"},{"@pid":"80/9993","text":"Uttam Kumar Sarkar"}]},"title":"Challenging the Incumbent: The Impact of Product Quality and Network Effects.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SharmaGS15","ee":"http://aisel.aisnet.org/ecis2015_rip/47","url":"https://dblp.org/rec/conf/ecis/SharmaGS15"}, "url":"URL#3543931" }, { "@score":"1", "@id":"3543932", "info":{"authors":{"author":[{"@pid":"20/10680","text":"Anand Sheombar"},{"@pid":"88/1610","text":"Cathy Urquhart"},{"@pid":"172/7502","text":"Tidings Ndhlovu"},{"@pid":"77/2343","text":"Pascal Ravesteijn"}]},"title":"Social Media in the Context of Development: A Case Study of Dutch NGOs.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SheombarUNR15","ee":"http://aisel.aisnet.org/ecis2015_cr/167","url":"https://dblp.org/rec/conf/ecis/SheombarUNR15"}, "url":"URL#3543932" }, { "@score":"1", "@id":"3543933", "info":{"authors":{"author":[{"@pid":"132/5729","text":"Mario Silic"},{"@pid":"09/1019","text":"Andrea Back"},{"@pid":"170/5975","text":"Dario Silic"}]},"title":"Atos - Towards Zero Email Company.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SilicBS15","ee":"http://aisel.aisnet.org/ecis2015_cr/168","url":"https://dblp.org/rec/conf/ecis/SilicBS15"}, "url":"URL#3543933" }, { "@score":"1", "@id":"3543934", "info":{"authors":{"author":{"@pid":"172/7477","text":"Jason R. Simpson"}},"title":"Being Between Worlds: Individual-Societal Openness, Expansion, and Becoming through Meaningful Technologies.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Simpson15","ee":"http://aisel.aisnet.org/ecis2015_cr/169","url":"https://dblp.org/rec/conf/ecis/Simpson15"}, "url":"URL#3543934" }, { "@score":"1", "@id":"3543935", "info":{"authors":{"author":{"@pid":"60/6165","text":"Janice C. Sipior"}},"title":"Meet the Journal Editors.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Sipior15","ee":"http://aisel.aisnet.org/ecis2015_panels/2","url":"https://dblp.org/rec/conf/ecis/Sipior15"}, "url":"URL#3543935" }, { "@score":"1", "@id":"3543936", "info":{"authors":{"author":[{"@pid":"135/3064","text":"Mimmi Sjöklint"},{"@pid":"c/IoannaDConstantiou","text":"Ioanna D. Constantiou"},{"@pid":"27/3146","text":"Matthias Trier"}]},"title":"The Complexities of Self-Tracking - An Inquiry into User Reactions and Goal Attainment.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SjoklintCT15","ee":"http://aisel.aisnet.org/ecis2015_cr/170","url":"https://dblp.org/rec/conf/ecis/SjoklintCT15"}, "url":"URL#3543936" }, { "@score":"1", "@id":"3543937", "info":{"authors":{"author":[{"@pid":"172/7415","text":"Edin Smailhodzic"},{"@pid":"24/7158","text":"Albert Boonstra"},{"@pid":"75/3169","text":"David Langley"}]},"title":"Social Media Enabled Interactions in Healthcare: Towards a Typology.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SmailhodzicBL15","ee":"http://aisel.aisnet.org/ecis2015_cr/171","url":"https://dblp.org/rec/conf/ecis/SmailhodzicBL15"}, "url":"URL#3543937" }, { "@score":"1", "@id":"3543938", "info":{"authors":{"author":[{"@pid":"147/6483","text":"Nikolai Sobotta"},{"@pid":"134/3163","text":"Markus Hummel"},{"@pid":"77/1048","text":"Roland Holten"}]},"title":"A Cognitive Learning Perspective on Encoding and Decoding E-mails.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SobottaHH15","ee":"http://aisel.aisnet.org/ecis2015_cr/172","url":"https://dblp.org/rec/conf/ecis/SobottaHH15"}, "url":"URL#3543938" }, { "@score":"1", "@id":"3543939", "info":{"authors":{"author":[{"@pid":"144/1193","text":"Ida Asadi Someh"},{"@pid":"69/3476","text":"Graeme G. Shanks"}]},"title":"How Business Analytics Systems Provide Benefits and Contribute to Firm Performance?","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SomehS15","ee":"http://aisel.aisnet.org/ecis2015_cr/12","url":"https://dblp.org/rec/conf/ecis/SomehS15"}, "url":"URL#3543939" }, { "@score":"1", "@id":"3543940", "info":{"authors":{"author":[{"@pid":"150/9231","text":"Martin Stange"},{"@pid":"05/527","text":"Burkhardt Funk"}]},"title":"How Much Tracking Is Necessary? - The Learning Curve in Bayesian User Journey Analysis.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/StangeF15","ee":"http://aisel.aisnet.org/ecis2015_cr/173","url":"https://dblp.org/rec/conf/ecis/StangeF15"}, "url":"URL#3543940" }, { "@score":"1", "@id":"3543941", "info":{"authors":{"author":[{"@pid":"160/5777","text":"Kalina Stefanova Staykova"},{"@pid":"10/2172","text":"Jan Damsgaard"}]},"title":"A Typology of Multi-sided Platforms: The Core and the Periphery.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/StaykovaD15","ee":"http://aisel.aisnet.org/ecis2015_cr/174","url":"https://dblp.org/rec/conf/ecis/StaykovaD15"}, "url":"URL#3543941" }, { "@score":"1", "@id":"3543942", "info":{"authors":{"author":{"@pid":"146/9707","text":"Anisa Stefi"}},"title":"Do Developers Make Unbiased Decisions? - The Effect of Mindfulness and Not-Invented-Here Bias on the Adoption of Software Components.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Stefi15","ee":"http://aisel.aisnet.org/ecis2015_cr/175","url":"https://dblp.org/rec/conf/ecis/Stefi15"}, "url":"URL#3543942" }, { "@score":"1", "@id":"3543943", "info":{"authors":{"author":[{"@pid":"63/815","text":"Andrea L. Stern"},{"@pid":"55/5533","text":"Joseph G. Davis"}]},"title":"An Ethnographic Study of SLA Enactment.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SternD15","ee":"http://aisel.aisnet.org/ecis2015_cr/176","url":"https://dblp.org/rec/conf/ecis/SternD15"}, "url":"URL#3543943" }, { "@score":"1", "@id":"3543944", "info":{"authors":{"author":[{"@pid":"147/4649","text":"Benjamin Sturm"},{"@pid":"50/5245-1","text":"Stephan Schneider 0001"},{"@pid":"24/7020","text":"Ali Sunyaev"}]},"title":"Leave No Stone Unturned: Introducing a Revolutionary Meta-search Tool for Rigorous and Efficient Systematic Literature Searches.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/SturmSS15","ee":"http://aisel.aisnet.org/ecis2015_rip/34","url":"https://dblp.org/rec/conf/ecis/SturmSS15"}, "url":"URL#3543944" }, { "@score":"1", "@id":"3543945", "info":{"authors":{"author":[{"@pid":"154/3718","text":"Tianhui Tan"},{"@pid":"131/8318","text":"Prasanta Bhattacharya"},{"@pid":"125/0498","text":"Tuan Quang Phan"}]},"title":"The Hedonic Curse: Investigating the Influence of Hedonic Ads on the Evaluation of Subsequent Ads.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/TanBP15","ee":"http://aisel.aisnet.org/ecis2015_rip/32","url":"https://dblp.org/rec/conf/ecis/TanBP15"}, "url":"URL#3543945" }, { "@score":"1", "@id":"3543946", "info":{"authors":{"author":[{"@pid":"144/1174","text":"Chekfoung Tan"},{"@pid":"88/3240","text":"Lily Sun"},{"@pid":"24/3947","text":"Kecheng Liu"}]},"title":"Big Data Architecture for Pervasive Healthcare: A Literature Review.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/TanSL15","ee":"http://aisel.aisnet.org/ecis2015_cr/177","url":"https://dblp.org/rec/conf/ecis/TanSL15"}, "url":"URL#3543946" }, { "@score":"1", "@id":"3543947", "info":{"authors":{"author":[{"@pid":"37/3493","text":"Ayça Tarhan"},{"@pid":"20/5750","text":"Oktay Türetken"},{"@pid":"54/2034","text":"Hajo A. Reijers"}]},"title":"Do Mature Business Processes Lead to Improved Performance? - A Review of Literature for Empirical Evidence.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/TarhanTR15","ee":"http://aisel.aisnet.org/ecis2015_cr/178","url":"https://dblp.org/rec/conf/ecis/TarhanTR15"}, "url":"URL#3543947" }, { "@score":"1", "@id":"3543948", "info":{"authors":{"author":[{"@pid":"124/2085","text":"Vojkan Tasic"},{"@pid":"124/2084","text":"Verena Tiefenbeck"},{"@pid":"172/7435","text":"Samuel Schöb"},{"@pid":"45/5644","text":"Thorsten Staake"}]},"title":"Short-term Spark or Sustained Impact? Investigating the Long-term Effect of Real-time Feedback.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/TasicTSS15","ee":"http://aisel.aisnet.org/ecis2015_rip/35","url":"https://dblp.org/rec/conf/ecis/TasicTSS15"}, "url":"URL#3543948" }, { "@score":"1", "@id":"3543949", "info":{"authors":{"author":{"@pid":"47/4098","text":"Lars Taxén"}},"title":"Towards Theorising Information Systems from a Neurobiological Perspective.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Taxen15","ee":"http://aisel.aisnet.org/ecis2015_cr/179","url":"https://dblp.org/rec/conf/ecis/Taxen15"}, "url":"URL#3543949" }, { "@score":"1", "@id":"3543950", "info":{"authors":{"author":[{"@pid":"135/2995","text":"Anne Thorseng"},{"@pid":"26/4671","text":"Tina Blegind Jensen"}]},"title":"Building National Infrastructures for Patient-centred Digital Services.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/ThorsengJ15","ee":"http://aisel.aisnet.org/ecis2015_cr/180","url":"https://dblp.org/rec/conf/ecis/ThorsengJ15"}, "url":"URL#3543950" }, { "@score":"1", "@id":"3543951", "info":{"authors":{"author":[{"@pid":"160/9477","text":"Katja Tiefenbacher"},{"@pid":"91/5954","text":"Sebastian Olbrich"}]},"title":"Increasing the Level of Customer Orientation - A Big Data Case Study from Insurance Industry.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/TiefenbacherO15","ee":"http://aisel.aisnet.org/ecis2015_rip/1","url":"https://dblp.org/rec/conf/ecis/TiefenbacherO15"}, "url":"URL#3543951" }, { "@score":"1", "@id":"3543952", "info":{"authors":{"author":{"@pid":"19/10943","text":"Roman Tilly"}},"title":"An Approach to Derive User Preferences from Multiple-Choice Questions in Online Reviews.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Tilly15","ee":"http://aisel.aisnet.org/ecis2015_rip/53","url":"https://dblp.org/rec/conf/ecis/Tilly15"}, "url":"URL#3543952" }, { "@score":"1", "@id":"3543953", "info":{"authors":{"author":{"@pid":"154/4134","text":"Gunjan Tomer"}},"title":"Person-technology Fit and Work Outcomes: A Study among IT Professionals in India.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Tomer15","ee":"http://aisel.aisnet.org/ecis2015_cr/181","url":"https://dblp.org/rec/conf/ecis/Tomer15"}, "url":"URL#3543953" }, { "@score":"1", "@id":"3543954", "info":{"authors":{"author":{"@pid":"147/4545","text":"Gustav Toppenberg"}},"title":"Expanded Understanding of IS/IT Related Challenges in Mergers and Acquisitions: Methods & Research Context.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Toppenberg15","ee":"http://aisel.aisnet.org/ecis2015_cr/182","url":"https://dblp.org/rec/conf/ecis/Toppenberg15"}, "url":"URL#3543954" }, { "@score":"1", "@id":"3543955", "info":{"authors":{"author":[{"@pid":"138/4956","text":"Simon Trang 0001"},{"@pid":"125/0677","text":"Sebastian Busse"},{"@pid":"135/9822","text":"Johannes Schmidt"},{"@pid":"172/7336","text":"Tamara Falk"},{"@pid":"08/9143","text":"Mauricio Marrone"}]},"title":"The Danger of Replacing Human Interaction in IS-driven Collaborative Consumption Services.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/TrangBSFM15","ee":"http://aisel.aisnet.org/ecis2015_cr/183","url":"https://dblp.org/rec/conf/ecis/TrangBSFM15"}, "url":"URL#3543955" }, { "@score":"1", "@id":"3543956", "info":{"authors":{"author":{"@pid":"125/0512","text":"Manuel Trenz"}},"title":"The Blurring Line Between Electronic and Physical Channels: Reconceptualising Multichannel Commerce.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Trenz15","ee":"http://aisel.aisnet.org/ecis2015_cr/184","url":"https://dblp.org/rec/conf/ecis/Trenz15"}, "url":"URL#3543956" }, { "@score":"1", "@id":"3543957", "info":{"authors":{"author":{"@pid":"172/6797","text":"Thao Phuong Trinh"}},"title":"Building Enterprise Systems Infrastructure Flexibility as Enabler of Organisational Agility: Empirical Evidence.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Trinh15","ee":"http://aisel.aisnet.org/ecis2015_cr/185","url":"https://dblp.org/rec/conf/ecis/Trinh15"}, "url":"URL#3543957" }, { "@score":"1", "@id":"3543958", "info":{"authors":{"author":{"@pid":"117/4418","text":"Dimitrios Tsekouras"}},"title":"Variations On A Rating Scale: The Effect On Extreme Response Tendency In Product Ratings.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Tsekouras15","ee":"http://aisel.aisnet.org/ecis2015_cr/186","url":"https://dblp.org/rec/conf/ecis/Tsekouras15"}, "url":"URL#3543958" }, { "@score":"1", "@id":"3543959", "info":{"authors":{"author":[{"@pid":"117/4418","text":"Dimitrios Tsekouras"},{"@pid":"63/1303-22","text":"Ting Li 0022"}]},"title":"The Dual Role of Perceived Effort in Personalized Recommendations.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/TsekourasL15","ee":"http://aisel.aisnet.org/ecis2015_cr/187","url":"https://dblp.org/rec/conf/ecis/TsekourasL15"}, "url":"URL#3543959" }, { "@score":"1", "@id":"3543960", "info":{"authors":{"author":[{"@pid":"33/7619","text":"Polyxeni Vassilakopoulou"},{"@pid":"92/4174","text":"Miria Grisot"},{"@pid":"25/6521","text":"Margunn Aanestad"}]},"title":"A Frugal Approach to Novelty: Patient-oriented Digital Health Initiatives Shaped by Affordable Losses and Alliances.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Vassilakopoulou15","ee":"http://aisel.aisnet.org/ecis2015_cr/193","url":"https://dblp.org/rec/conf/ecis/Vassilakopoulou15"}, "url":"URL#3543960" }, { "@score":"1", "@id":"3543961", "info":{"authors":{"author":[{"@pid":"124/2649","text":"Sebastian Walther"},{"@pid":"41/613","text":"Saonee Sarker"},{"@pid":"52/8244","text":"Nils Urbach"},{"@pid":"29/5589","text":"Darshana Sedera"},{"@pid":"e/TEymann","text":"Torsten Eymann"},{"@pid":"84/2257","text":"Boris Otto"}]},"title":"Exploring Organizational Level Continuance of Cloud-Based Enterprise Systems.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WaltherSUSEO15","ee":"http://aisel.aisnet.org/ecis2015_cr/194","url":"https://dblp.org/rec/conf/ecis/WaltherSUSEO15"}, "url":"URL#3543961" }, { "@score":"1", "@id":"3543962", "info":{"authors":{"author":[{"@pid":"02/4248-13","text":"Michael Weber 0013"},{"@pid":"44/3807","text":"Heiko Gewald"},{"@pid":"85/10683","text":"Andy Weeger"}]},"title":"Disruptions of the Tripartite Structure of System Usage: Exploring Factors Influencing the Effective Usage of Information Systems in German Hospitals.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WeberGW15","ee":"http://aisel.aisnet.org/ecis2015_cr/196","url":"https://dblp.org/rec/conf/ecis/WeberGW15"}, "url":"URL#3543962" }, { "@score":"1", "@id":"3543963", "info":{"authors":{"author":[{"@pid":"24/3418","text":"David Weber"},{"@pid":"49/3208","text":"Karl Presser"},{"@pid":"n/MoiraCNorrie","text":"Moira C. Norrie"}]},"title":"How to give Feedback on Data Quality: A Study in the Food Sciences.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WeberPN15","ee":"http://aisel.aisnet.org/ecis2015_cr/195","url":"https://dblp.org/rec/conf/ecis/WeberPN15"}, "url":"URL#3543963" }, { "@score":"1", "@id":"3543964", "info":{"authors":{"author":[{"@pid":"85/10683","text":"Andy Weeger"},{"@pid":"172/7463","text":"Lea Ohmayer"},{"@pid":"44/3807","text":"Heiko Gewald"}]},"title":"Operational Alignment in Hospitals - The Role of Social Capital between IT and Medical Departments.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WeegerOG15","ee":"http://aisel.aisnet.org/ecis2015_cr/197","url":"https://dblp.org/rec/conf/ecis/WeegerOG15"}, "url":"URL#3543964" }, { "@score":"1", "@id":"3543965", "info":{"authors":{"author":[{"@pid":"53/1814","text":"Lizette Weilbach"},{"@pid":"75/7537","text":"Machdel C. Matthee"}]},"title":"Using the PSIC Model to Understand Change in an Educational Setting: The Case of an E-Textbook Implementation.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WeilbachM15","ee":"http://aisel.aisnet.org/ecis2015_cr/130","url":"https://dblp.org/rec/conf/ecis/WeilbachM15"}, "url":"URL#3543965" }, { "@score":"1", "@id":"3543966", "info":{"authors":{"author":[{"@pid":"125/0826","text":"Christoph Weinert"},{"@pid":"50/8230","text":"Christian Maier"},{"@pid":"48/846","text":"Sven Laumer"}]},"title":"Do We Behave Based on Our Implicit Attitudes? Proposing a Research Model and an Experimental Study to Investigate Their Influence on Behavioral Intentions.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WeinertML15","ee":"http://aisel.aisnet.org/ecis2015_rip/9","url":"https://dblp.org/rec/conf/ecis/WeinertML15"}, "url":"URL#3543966" }, { "@score":"1", "@id":"3543967", "info":{"authors":{"author":[{"@pid":"169/8429","text":"Eva Weishäupl"},{"@pid":"133/0734","text":"Emrah Yasasin"},{"@pid":"97/3584","text":"Guido Schryen"}]},"title":"IT Security Investments Through the Lens of the Resource-Based View: A new Theoretical Model and Literature Review.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WeishauplYS15","ee":"http://aisel.aisnet.org/ecis2015_cr/198","url":"https://dblp.org/rec/conf/ecis/WeishauplYS15"}, "url":"URL#3543967" }, { "@score":"1", "@id":"3543968", "info":{"authors":{"author":[{"@pid":"16/6163","text":"Matthias Wenzel"},{"@pid":"09/6287-1","text":"David Wagner 0001"},{"@pid":"96/6279","text":"Heinz-Theo Wagner"},{"@pid":"160/5154","text":"Jochen Koch"}]},"title":"Digitization and Path Disruption: An Examination in the Funeral Industry.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WenzelWWK15","ee":"http://aisel.aisnet.org/ecis2015_cr/199","url":"https://dblp.org/rec/conf/ecis/WenzelWWK15"}, "url":"URL#3543968" }, { "@score":"1", "@id":"3543969", "info":{"authors":{"author":[{"@pid":"160/3062","text":"Lauri Wessel"},{"@pid":"02/688","text":"Martin Gersch"}]},"title":"From ICT to Integrated Care: The Performative Cohesion of Organizing Visions.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WesselG15","ee":"http://aisel.aisnet.org/ecis2015_cr/202","url":"https://dblp.org/rec/conf/ecis/WesselG15"}, "url":"URL#3543969" }, { "@score":"1", "@id":"3543970", "info":{"authors":{"author":[{"@pid":"86/1925","text":"Michael Wessel"},{"@pid":"147/4722","text":"Ferdinand Thies"}]},"title":"The Effects of Personalization on Purchase Intentions for Online News: An Experimental Study of Different Personalization Increments.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WesselT15","ee":"http://aisel.aisnet.org/ecis2015_cr/200","url":"https://dblp.org/rec/conf/ecis/WesselT15"}, "url":"URL#3543970" }, { "@score":"1", "@id":"3543971", "info":{"authors":{"author":[{"@pid":"86/1925","text":"Michael Wessel"},{"@pid":"147/4722","text":"Ferdinand Thies"},{"@pid":"22/6015","text":"Alexander Benlian"}]},"title":"A Lie Never Lives to be Old: The Effects of Fake Social Information on Consumer Decision-Making in Crowdfunding.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WesselTB15","ee":"http://aisel.aisnet.org/ecis2015_cr/201","url":"https://dblp.org/rec/conf/ecis/WesselTB15"}, "url":"URL#3543971" }, { "@score":"1", "@id":"3543972", "info":{"authors":{"author":[{"@pid":"39/10498-2","text":"David W. Wilson 0002"},{"@pid":"64/3781","text":"Susan A. Brown"},{"@pid":"72/1083","text":"Sherry M. B. Thatcher"}]},"title":"Examining Predictors and Outcomes of Identity Communication in Virtual Teams.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WilsonBT15","ee":"http://aisel.aisnet.org/ecis2015_rip/20","url":"https://dblp.org/rec/conf/ecis/WilsonBT15"}, "url":"URL#3543972" }, { "@score":"1", "@id":"3543973", "info":{"authors":{"author":[{"@pid":"172/7433","text":"Jeanette W. Wing"},{"@pid":"147/9758","text":"Theo N. Andrew"},{"@pid":"13/6087","text":"Doncho Petkov"}]},"title":"A Systemic Framework for Improving Clients' Understanding of Software Requirements.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WingAP15","ee":"http://aisel.aisnet.org/ecis2015_rip/10","url":"https://dblp.org/rec/conf/ecis/WingAP15"}, "url":"URL#3543973" }, { "@score":"1", "@id":"3543974", "info":{"authors":{"author":[{"@pid":"160/5506","text":"Maike A. E. Winkler"},{"@pid":"09/4816","text":"Carol V. Brown"},{"@pid":"94/10353","text":"Thomas L. Huber"}]},"title":"Recurrent Knowledge Boundaries in Outsourced Software Projects: A Longitudinal Study.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WinklerBH15","ee":"http://aisel.aisnet.org/ecis2015_cr/203","url":"https://dblp.org/rec/conf/ecis/WinklerBH15"}, "url":"URL#3543974" }, { "@score":"1", "@id":"3543975", "info":{"authors":{"author":[{"@pid":"62/8362","text":"Till J. Winkler"},{"@pid":"66/7315","text":"Marko Sarstedt"},{"@pid":"172/7355","text":"Marian Keil"},{"@pid":"172/7457","text":"Paul Rost"}]},"title":"selfsurvey.org: A Platform for Prediction-Based Benchmarking and Feedback-Enabled Survey Research.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WinklerSKR15","ee":"http://aisel.aisnet.org/ecis2015_cr/204","url":"https://dblp.org/rec/conf/ecis/WinklerSKR15"}, "url":"URL#3543975" }, { "@score":"1", "@id":"3543976", "info":{"authors":{"author":[{"@pid":"147/4729","text":"Marco Wirth"},{"@pid":"152/1783","text":"Sascha Friesike"},{"@pid":"39/10266","text":"Christoph Flath"},{"@pid":"45/2981","text":"Frédéric Thiesse"}]},"title":"Patterns of Remixes or Where Do Innovations Come from: Evidence from 3D Printing.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WirthFFT15","ee":"http://aisel.aisnet.org/ecis2015_rip/57","url":"https://dblp.org/rec/conf/ecis/WirthFFT15"}, "url":"URL#3543976" }, { "@score":"1", "@id":"3543977", "info":{"authors":{"author":[{"@pid":"172/7495","text":"Maxim Wolf"},{"@pid":"01/10498","text":"Julian Sims"},{"@pid":"81/2820","text":"Huadong Yang"}]},"title":"Look Who's Co-creating: Employer Branding on Social Media.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WolfSY15","ee":"http://aisel.aisnet.org/ecis2015_cr/205","url":"https://dblp.org/rec/conf/ecis/WolfSY15"}, "url":"URL#3543977" }, { "@score":"1", "@id":"3543978", "info":{"authors":{"author":[{"@pid":"78/7524","text":"Weifang Wu"},{"@pid":"40/6068-3","text":"Rong Zheng 0003"}]},"title":"Does CEO's IT Knowledge Matter? An Empirical Analysis of Earnings Conference Calls.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WuZ15","ee":"http://aisel.aisnet.org/ecis2015_cr/206","url":"https://dblp.org/rec/conf/ecis/WuZ15"}, "url":"URL#3543978" }, { "@score":"1", "@id":"3543979", "info":{"authors":{"author":[{"@pid":"12/7217","text":"Jochen Wulf"},{"@pid":"43/8246","text":"Matthias Söllner 0001"},{"@pid":"74/2619","text":"Jan Marco Leimeister"},{"@pid":"05/4977","text":"Walter Brenner"}]},"title":"FC Bayern München Goes Social - The Value of Social Media for Professional Sports Clubs.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/WulfSLB15","ee":"http://aisel.aisnet.org/ecis2015_cr/207","url":"https://dblp.org/rec/conf/ecis/WulfSLB15"}, "url":"URL#3543979" }, { "@score":"1", "@id":"3543980", "info":{"authors":{"author":[{"@pid":"89/6248","text":"Xiao Xiao"},{"@pid":"70/3430","text":"Jonas Hedman"},{"@pid":"169/8849","text":"Emma Runnemark"}]},"title":"Use of Payment Technology: A Perspective Based on Theory of Consumption Value.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/XiaoHR15","ee":"http://aisel.aisnet.org/ecis2015_rip/40","url":"https://dblp.org/rec/conf/ecis/XiaoHR15"}, "url":"URL#3543980" }, { "@score":"1", "@id":"3543981", "info":{"authors":{"author":[{"@pid":"136/6673","text":"Runhua Xu"},{"@pid":"172/6910","text":"Remo M. Frey"},{"@pid":"172/7511","text":"Denis Vuckovac"},{"@pid":"68/4853","text":"Alexander Ilic"}]},"title":"Towards Understanding the Impact of Personality Traits on Mobile App Adoption - A Scalable Approach.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/XuFVI15","ee":"http://aisel.aisnet.org/ecis2015_rip/3","url":"https://dblp.org/rec/conf/ecis/XuFVI15"}, "url":"URL#3543981" }, { "@score":"1", "@id":"3543982", "info":{"authors":{"author":[{"@pid":"172/7378","text":"Jenny Yang"},{"@pid":"48/3571","text":"Christine Van Toorn"},{"@pid":"93/4225","text":"Alan Thorogood"},{"@pid":"04/9106","text":"Anthony Vlasic"}]},"title":"Development of Information Systems Project Portfolio Management Capabilities: A Case Study on an Australian Bank.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/YangTTV15","ee":"http://aisel.aisnet.org/ecis2015_rip/51","url":"https://dblp.org/rec/conf/ecis/YangTTV15"}, "url":"URL#3543982" }, { "@score":"1", "@id":"3543983", "info":{"authors":{"author":[{"@pid":"133/0734","text":"Emrah Yasasin"},{"@pid":"97/3584","text":"Guido Schryen"}]},"title":"Requirements for IT Security Metrics - an Argumentation Theory Based Approach.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/YasasinS15","ee":"http://aisel.aisnet.org/ecis2015_cr/208","url":"https://dblp.org/rec/conf/ecis/YasasinS15"}, "url":"URL#3543983" }, { "@score":"1", "@id":"3543984", "info":{"authors":{"author":[{"@pid":"172/7369","text":"Maedeh Yassaee"},{"@pid":"52/4012","text":"Tobias Mettler"}]},"title":"The Current State of and Possible Future Avenues for IT Value Research: A Review of the past 10 Years.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/YassaeeM15","ee":"http://aisel.aisnet.org/ecis2015_cr/209","url":"https://dblp.org/rec/conf/ecis/YassaeeM15"}, "url":"URL#3543984" }, { "@score":"1", "@id":"3543985", "info":{"authors":{"author":[{"@pid":"y/DavidJYates","text":"David J. Yates"},{"@pid":"09/7905","text":"Girish "Jeff" J. Gulati"},{"@pid":"26/6856","text":"Marco Marabelli"}]},"title":"Determinants of Mobile Broadband Diffusion: A Focus on Developing Countries.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/YatesGM15","ee":"http://aisel.aisnet.org/ecis2015_cr/210","url":"https://dblp.org/rec/conf/ecis/YatesGM15"}, "url":"URL#3543985" }, { "@score":"1", "@id":"3543986", "info":{"authors":{"author":[{"@pid":"172/7413","text":"Guopeng Yu"},{"@pid":"172/7539","text":"Deqiang Zou"}]},"title":"Which User-generated Content Should Be Appreciated More? - A Study on UGC Features, Consumers' Behavioral Intentions and Social Media Engagement.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/YuZ15","ee":"http://aisel.aisnet.org/ecis2015_cr/211","url":"https://dblp.org/rec/conf/ecis/YuZ15"}, "url":"URL#3543986" }, { "@score":"1", "@id":"3543987", "info":{"authors":{"author":[{"@pid":"86/10503","text":"Eleni Zampou"},{"@pid":"49/830","text":"Katerina Pramatari"},{"@pid":"77/2783","text":"Ioannis Mourtos"}]},"title":"Design of Environmental Performance Monitoring Systems in the Supply Chain: The Role of Interoperability.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/ZampouPM15","ee":"http://aisel.aisnet.org/ecis2015_cr/212","url":"https://dblp.org/rec/conf/ecis/ZampouPM15"}, "url":"URL#3543987" }, { "@score":"1", "@id":"3543988", "info":{"authors":{"author":[{"@pid":"154/3890","text":"Shuting Zhu"},{"@pid":"32/9999","text":"Arvind Tripathi"},{"@pid":"20/2589","text":"Weijun Zhong"}]},"title":"How Do B2B Patterns Shape IOS Application Capabilities - The Moderating Effect on IT Capability Building.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/ZhuTZ15","ee":"http://aisel.aisnet.org/ecis2015_rip/17","url":"https://dblp.org/rec/conf/ecis/ZhuTZ15"}, "url":"URL#3543988" }, { "@score":"1", "@id":"3543989", "info":{"authors":{"author":{"@pid":"120/2933","text":"Ewa Ziemba"}},"title":"Examining Critical Success Factors for Sustainable Information Society - Lessons Learned from Poland.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Ziemba15","ee":"http://aisel.aisnet.org/ecis2015_cr/213","url":"https://dblp.org/rec/conf/ecis/Ziemba15"}, "url":"URL#3543989" }, { "@score":"1", "@id":"3543990", "info":{"authors":{"author":[{"@pid":"22/10064","text":"Cinzia Dal Zotto"},{"@pid":"172/7444","text":"Yoann Schenker"},{"@pid":"20/6664","text":"Artur Lugmayr"}]},"title":"Data Journalism in News Media Firms. The Role of Information Technology to Master Challenges and Embrace Opportunities of Data-driven Journalism Projects.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/ZottoSL15","ee":"http://aisel.aisnet.org/ecis2015_rip/49","url":"https://dblp.org/rec/conf/ecis/ZottoSL15"}, "url":"URL#3543990" }, { "@score":"1", "@id":"3543991", "info":{"authors":{"author":{"@pid":"144/1184","text":"Sander Paul Zwanenburg"}},"title":"Valid Construct Measurement Using Multiple Models.","venue":"ECIS","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/Zwanenburg15","ee":"http://aisel.aisnet.org/ecis2015_rip/8","url":"https://dblp.org/rec/conf/ecis/Zwanenburg15"}, "url":"URL#3543991" }, { "@score":"1", "@id":"3667517", "info":{"authors":{"author":[{"@pid":"b/JorgBecker","text":"Jörg Becker 0001"},{"@pid":"b/JvBrocke","text":"Jan vom Brocke"},{"@pid":"74/4864","text":"Marco de Marco"}]},"title":"23rd European Conference on Information Systems, ECIS 2015, Münster, Germany, May 26-29, 2015","venue":"ECIS","year":"2015","type":"Editorship","key":"conf/ecis/2015","ee":"http://aisel.aisnet.org/ecis2015/","url":"https://dblp.org/rec/conf/ecis/2015"}, "url":"URL#3667517" } ] } } } )