callback( { "result":{ "query":":facetid:toc:\"db/journals/jitech/jitech24.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"191.20" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"30", "@dc":"30", "@oc":"30", "@id":"43456325", "text":":facetid:toc:db/journals/jitech/jitech24.bht" } }, "hits":{ "@total":"30", "@computed":"30", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"5059850", "info":{"authors":{"author":{"@pid":"78/8290","text":"Dave Aron"}},"title":"Dynamic collaboration: A personal reflection.","venue":"J. Inf. Technol.","volume":"24","number":"3","pages":"214-218","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/Aron09","doi":"10.1057/JIT.2009.4","ee":"https://doi.org/10.1057/jit.2009.4","url":"https://dblp.org/rec/journals/jitech/Aron09"}, "url":"URL#5059850" }, { "@score":"1", "@id":"5059851", "info":{"authors":{"author":{"@pid":"09/8291","text":"João Baptista"}},"title":"Institutionalisation as a process of interplay between technology and its organisational context of use.","venue":"J. Inf. Technol.","volume":"24","number":"4","pages":"305-319","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/Baptista09","doi":"10.1057/JIT.2009.15","ee":"https://doi.org/10.1057/jit.2009.15","url":"https://dblp.org/rec/journals/jitech/Baptista09"}, "url":"URL#5059851" }, { "@score":"1", "@id":"5059852", "info":{"authors":{"author":{"@pid":"50/6218","text":"Rahul C. Basole"}},"title":"Visualization of interfirm relations in a converging mobile ecosystem.","venue":"J. Inf. Technol.","volume":"24","number":"2","pages":"144-159","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/Basole09","doi":"10.1057/JIT.2008.34","ee":"https://doi.org/10.1057/jit.2008.34","url":"https://dblp.org/rec/journals/jitech/Basole09"}, "url":"URL#5059852" }, { "@score":"1", "@id":"5059853", "info":{"authors":{"author":[{"@pid":"11/181","text":"Harry Bouwman"},{"@pid":"39/5609","text":"Lidwien van de Wijngaert"}]},"title":"Coppers context, and conjoints: a reassessment of TAM.","venue":"J. Inf. Technol.","volume":"24","number":"2","pages":"186-201","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/BouwmanW09","doi":"10.1057/JIT.2008.36","ee":"https://doi.org/10.1057/jit.2008.36","url":"https://dblp.org/rec/journals/jitech/BouwmanW09"}, "url":"URL#5059853" }, { "@score":"1", "@id":"5059854", "info":{"authors":{"author":[{"@pid":"c/IoannaDConstantiou","text":"Ioanna D. Constantiou"},{"@pid":"59/5058","text":"Anastasia Papazafeiropoulou"},{"@pid":"69/996","text":"Yogesh Kumar Dwivedi"}]},"title":"The diffusion of IP telephony and vendors' commercialisation strategies.","venue":"J. Inf. Technol.","volume":"24","number":"1","pages":"25-34","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/ConstantiouPD09","doi":"10.1057/JIT.2008.29","ee":"https://doi.org/10.1057/jit.2008.29","url":"https://dblp.org/rec/journals/jitech/ConstantiouPD09"}, "url":"URL#5059854" }, { "@score":"1", "@id":"5059855", "info":{"authors":{"author":[{"@pid":"11/5516","text":"Wendy L. Currie"},{"@pid":"89/3122","text":"E. Burton Swanson"}]},"title":"Special issue on institutional theory in information systems research: contextualizing the IT artefact.","venue":"J. Inf. Technol.","volume":"24","number":"4","pages":"283-285","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/CurrieS09","doi":"10.1057/JIT.2009.17","ee":"https://doi.org/10.1057/jit.2009.17","url":"https://dblp.org/rec/journals/jitech/CurrieS09"}, "url":"URL#5059855" }, { "@score":"1", "@id":"5059856", "info":{"authors":{"author":[{"@pid":"63/4712","text":"Linying Dong"},{"@pid":"22/237","text":"Derrick J. Neufeld"},{"@pid":"53/5364","text":"Chris Higgins"}]},"title":"Top management support of enterprise systems implementations.","venue":"J. Inf. Technol.","volume":"24","number":"1","pages":"55-80","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/DongNH09","doi":"10.1057/JIT.2008.21","ee":"https://doi.org/10.1057/jit.2008.21","url":"https://dblp.org/rec/journals/jitech/DongNH09"}, "url":"URL#5059856" }, { "@score":"1", "@id":"5059857", "info":{"authors":{"author":[{"@pid":"63/5283","text":"Andreas Eckhardt"},{"@pid":"48/846","text":"Sven Laumer"},{"@pid":"92/5886","text":"Tim Weitzel"}]},"title":"Who influences whom? Analyzing workplace referents' social influence on IT adoption and non-adoption.","venue":"J. Inf. Technol.","volume":"24","number":"1","pages":"11-24","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/EckhardtLW09","doi":"10.1057/JIT.2008.31","ee":"https://doi.org/10.1057/jit.2008.31","url":"https://dblp.org/rec/journals/jitech/EckhardtLW09"}, "url":"URL#5059857" }, { "@score":"1", "@id":"5059858", "info":{"authors":{"author":[{"@pid":"43/6679","text":"Sirkka L. Jarvenpaa"},{"@pid":"l/ClaudiaLoebbecke","text":"Claudia Loebbecke"}]},"title":"Strategic management implications of a consumer value perspective on Mobile TV.","venue":"J. Inf. Technol.","volume":"24","number":"2","pages":"202-212","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/JarvenpaaL09","doi":"10.1057/JIT.2008.33","ee":"https://doi.org/10.1057/jit.2008.33","url":"https://dblp.org/rec/journals/jitech/JarvenpaaL09"}, "url":"URL#5059858" }, { "@score":"1", "@id":"5059859", "info":{"authors":{"author":[{"@pid":"26/4671","text":"Tina Blegind Jensen"},{"@pid":"04/5746","text":"Annemette Kjærgaard"},{"@pid":"19/8291","text":"Per Svejvig"}]},"title":"Using institutional theory with sensemaking theory: a case study of information system implementation in healthcare.","venue":"J. Inf. Technol.","volume":"24","number":"4","pages":"343-353","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/JensenKS09","doi":"10.1057/JIT.2009.11","ee":"https://doi.org/10.1057/jit.2009.11","url":"https://dblp.org/rec/journals/jitech/JensenKS09"}, "url":"URL#5059859" }, { "@score":"1", "@id":"5059860", "info":{"authors":{"author":[{"@pid":"69/5889","text":"Anand Jeyaraj"},{"@pid":"81/8290","text":"Deborah B. Balser"},{"@pid":"56/7896","text":"Charles Chowa"},{"@pid":"96/8290","text":"Gary M. Griggs"}]},"title":"Organizational and institutional determinants of B2C adoption under shifting environments.","venue":"J. Inf. Technol.","volume":"24","number":"3","pages":"219-230","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/JeyarajBCG09","doi":"10.1057/JIT.2008.22","ee":"https://doi.org/10.1057/jit.2008.22","url":"https://dblp.org/rec/journals/jitech/JeyarajBCG09"}, "url":"URL#5059860" }, { "@score":"1", "@id":"5059861", "info":{"authors":{"author":[{"@pid":"74/3531","text":"Byoungsoo Kim"},{"@pid":"77/30","text":"Ingoo Han"}]},"title":"What drives the adoption of mobile data services? An approach from a value perspective.","venue":"J. Inf. Technol.","volume":"24","number":"1","pages":"35-45","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/KimH09","doi":"10.1057/JIT.2008.28","ee":"https://doi.org/10.1057/jit.2008.28","url":"https://dblp.org/rec/journals/jitech/KimH09"}, "url":"URL#5059861" }, { "@score":"1", "@id":"5059862", "info":{"authors":{"author":[{"@pid":"76/5614","text":"Tanya Linden"},{"@pid":"51/6268","text":"Jacob L. Cybulski"}]},"title":"Application of hermeneutics to studying an experience mining process.","venue":"J. Inf. Technol.","volume":"24","number":"3","pages":"231-250","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/LindenC09","doi":"10.1057/JIT.2009.3","ee":"https://doi.org/10.1057/jit.2009.3","url":"https://dblp.org/rec/journals/jitech/LindenC09"}, "url":"URL#5059862" }, { "@score":"1", "@id":"5059863", "info":{"authors":{"author":[{"@pid":"33/4528-5","text":"Li Liu 0005"},{"@pid":"55/6964","text":"Philip Yetton"}]},"title":"Sponsorship and IT vendor management of projects.","venue":"J. Inf. Technol.","volume":"24","number":"1","pages":"46-54","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/LiuY09","doi":"10.1057/JIT.2009.2","ee":"https://doi.org/10.1057/jit.2009.2","url":"https://dblp.org/rec/journals/jitech/LiuY09"}, "url":"URL#5059863" }, { "@score":"1", "@id":"5059864", "info":{"authors":{"author":[{"@pid":"l/KLyytinen","text":"Kalle Lyytinen"},{"@pid":"60/1419","text":"Mike Newman"},{"@pid":"58/8290","text":"Abdul-Rahman A. Al-Muharfi"}]},"title":"Institutionalizing enterprise resource planning in the Saudi steel industry: A punctuated socio-technical analysis.","venue":"J. Inf. Technol.","volume":"24","number":"4","pages":"286-304","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/LyytinenNA09","doi":"10.1057/JIT.2009.14","ee":"https://doi.org/10.1057/jit.2009.14","url":"https://dblp.org/rec/journals/jitech/LyytinenNA09"}, "url":"URL#5059864" }, { "@score":"1", "@id":"5059865", "info":{"authors":{"author":[{"@pid":"01/8291","text":"Juan Pablo Maicas"},{"@pid":"27/8291","text":"Yolanda Polo"},{"@pid":"60/8290","text":"Francisco Javier Sese"}]},"title":"The role of (personal) network effects and switching costs in determining mobile users' choice.","venue":"J. Inf. Technol.","volume":"24","number":"2","pages":"160-171","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/MaicasPS09","doi":"10.1057/JIT.2008.35","ee":"https://doi.org/10.1057/jit.2008.35","url":"https://dblp.org/rec/journals/jitech/MaicasPS09"}, "url":"URL#5059865" }, { "@score":"1", "@id":"5059866", "info":{"authors":{"author":[{"@pid":"66/8290","text":"Muriel Mignerat"},{"@pid":"57/6210","text":"Suzanne Rivard"}]},"title":"Positioning the institutional perspective in information systems research.","venue":"J. Inf. Technol.","volume":"24","number":"4","pages":"369-391","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/MigneratR09","doi":"10.1057/JIT.2009.13","ee":"https://doi.org/10.1057/jit.2009.13","url":"https://dblp.org/rec/journals/jitech/MigneratR09"}, "url":"URL#5059866" }, { "@score":"1", "@id":"5059867", "info":{"authors":{"author":[{"@pid":"70/8290","text":"Theodora Ngosi"},{"@pid":"42/6588","text":"Ashley Braganza"}]},"title":"Toward a component-based design framework of the international information technology standardization process.","venue":"J. Inf. Technol.","volume":"24","number":"1","pages":"103-125","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/NgosiB09","doi":"10.1057/JIT.2008.24","ee":"https://doi.org/10.1057/jit.2008.24","url":"https://dblp.org/rec/journals/jitech/NgosiB09"}, "url":"URL#5059867" }, { "@score":"1", "@id":"5059868", "info":{"authors":{"author":[{"@pid":"93/2181","text":"Brian Nicholson"},{"@pid":"s/SundeepSahay","text":"Sundeep Sahay"}]},"title":"Deinstitutionalization in the context of software exports policymaking in Costa Rica.","venue":"J. Inf. Technol.","volume":"24","number":"4","pages":"332-342","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/NicholsonS09","doi":"10.1057/JIT.2009.18","ee":"https://doi.org/10.1057/jit.2009.18","url":"https://dblp.org/rec/journals/jitech/NicholsonS09"}, "url":"URL#5059868" }, { "@score":"1", "@id":"5059869", "info":{"authors":{"author":[{"@pid":"46/3572","text":"Wolfgang Palka"},{"@pid":"p/KPousttchi","text":"Key Pousttchi"},{"@pid":"w/DGWiedemann","text":"Dietmar G. Wiedemann"}]},"title":"Mobile word-of-mouth - A grounded theory of mobile viral marketing.","venue":"J. Inf. Technol.","volume":"24","number":"2","pages":"172-185","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/PalkaPW09","doi":"10.1057/JIT.2008.37","ee":"https://doi.org/10.1057/jit.2008.37","url":"https://dblp.org/rec/journals/jitech/PalkaPW09"}, "url":"URL#5059869" }, { "@score":"1", "@id":"5059870", "info":{"authors":{"author":[{"@pid":"49/830","text":"Katerina Pramatari"},{"@pid":"44/6152","text":"Theodoros Evgeniou"},{"@pid":"86/5810","text":"Georgios I. Doukidis"}]},"title":"Implementation of collaborative e-supply-chain initiatives: an initial challenging and final success case from grocery retailing.","venue":"J. Inf. Technol.","volume":"24","number":"3","pages":"269-281","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/PramatariED09","doi":"10.1057/JIT.2008.11","ee":"https://doi.org/10.1057/jit.2008.11","url":"https://dblp.org/rec/journals/jitech/PramatariED09"}, "url":"URL#5059870" }, { "@score":"1", "@id":"5059871", "info":{"authors":{"author":[{"@pid":"95/8290","text":"Raoni Rajão"},{"@pid":"31/5739","text":"Niall Hayes"}]},"title":"Conceptions of control and IT artefacts: an institutional account of the Amazon rainforest monitoring system.","venue":"J. Inf. Technol.","volume":"24","number":"4","pages":"320-331","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/RajaoH09","doi":"10.1057/JIT.2009.12","ee":"https://doi.org/10.1057/jit.2009.12","url":"https://dblp.org/rec/journals/jitech/RajaoH09"}, "url":"URL#5059871" }, { "@score":"1", "@id":"5059872", "info":{"authors":{"author":[{"@pid":"64/2701","text":"Chris Sauer"},{"@pid":"92/1534","text":"Leslie P. Willcocks"}]},"title":"Editorial.","venue":"J. Inf. Technol.","volume":"24","number":"3","pages":"213","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/SauerW09","doi":"10.1057/JIT.2009.5","ee":"https://doi.org/10.1057/jit.2009.5","url":"https://dblp.org/rec/journals/jitech/SauerW09"}, "url":"URL#5059872" }, { "@score":"1", "@id":"5059873", "info":{"authors":{"author":[{"@pid":"97/8290","text":"Craig Shepherd"},{"@pid":"c/ChrisWClegg","text":"Chris W. Clegg"},{"@pid":"25/8291","text":"Chris Stride"}]},"title":"Opening the black box: A multi-method analysis of an enterprise resource planning implementation.","venue":"J. Inf. Technol.","volume":"24","number":"1","pages":"81-102","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/ShepherdCS09","doi":"10.1057/JIT.2008.32","ee":"https://doi.org/10.1057/jit.2008.32","url":"https://dblp.org/rec/journals/jitech/ShepherdCS09"}, "url":"URL#5059873" }, { "@score":"1", "@id":"5059874", "info":{"authors":{"author":[{"@pid":"96/6730","text":"Shirish C. Srivastava"},{"@pid":"69/8290","text":"Sharat S. Mathur"},{"@pid":"82/6675","text":"Thompson S. H. Teo"}]},"title":"Competing technology options and stakeholder interests for tracking freight railcars in Indian Railways.","venue":"J. Inf. Technol.","volume":"24","number":"4","pages":"392-400","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/SrivastavaMT09","doi":"10.1057/JIT.2009.9","ee":"https://doi.org/10.1057/jit.2009.9","url":"https://dblp.org/rec/journals/jitech/SrivastavaMT09"}, "url":"URL#5059874" }, { "@score":"1", "@id":"5059875", "info":{"authors":{"author":[{"@pid":"98/3898","text":"Sylvestre Uwizeyemungu"},{"@pid":"68/2828","text":"Louis Raymond"}]},"title":"Exploring an alternative method of evaluating the effects of ERP: a multiple case study.","venue":"J. Inf. Technol.","volume":"24","number":"3","pages":"251-268","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/UwizeyemunguR09","doi":"10.1057/JIT.2008.20","ee":"https://doi.org/10.1057/jit.2008.20","url":"https://dblp.org/rec/journals/jitech/UwizeyemunguR09"}, "url":"URL#5059875" }, { "@score":"1", "@id":"5059876", "info":{"authors":{"author":[{"@pid":"60/5989","text":"Jonathan Wareham"},{"@pid":"02/8051","text":"Javier Busquets"},{"@pid":"76/4403","text":"Robert D. Austin"}]},"title":"Creative, convergent, and social: Prospects for mobile computing.","venue":"J. Inf. Technol.","volume":"24","number":"2","pages":"139-143","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/WarehamBA09","doi":"10.1057/JIT.2009.1","ee":"https://doi.org/10.1057/jit.2009.1","url":"https://dblp.org/rec/journals/jitech/WarehamBA09"}, "url":"URL#5059876" }, { "@score":"1", "@id":"5059877", "info":{"authors":{"author":[{"@pid":"37/7484","text":"Brian R. Webb"},{"@pid":"25/1164","text":"Séamus Gallagher"}]},"title":"Action in context and context in action: Modelling complexity in multimedia systems development.","venue":"J. Inf. Technol.","volume":"24","number":"1","pages":"126-138","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/WebbG09","doi":"10.1057/JIT.2008.27","ee":"https://doi.org/10.1057/jit.2008.27","url":"https://dblp.org/rec/journals/jitech/WebbG09"}, "url":"URL#5059877" }, { "@score":"1", "@id":"5059878", "info":{"authors":{"author":[{"@pid":"34/602","text":"Vishanth Weerakkody"},{"@pid":"69/996","text":"Yogesh Kumar Dwivedi"},{"@pid":"94/2816","text":"Zahir Irani"}]},"title":"The diffusion and use of institutional theory: a cross-disciplinary longitudinal literature survey.","venue":"J. Inf. Technol.","volume":"24","number":"4","pages":"354-368","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/WeerakkodyDI09","doi":"10.1057/JIT.2009.16","ee":"https://doi.org/10.1057/jit.2009.16","url":"https://dblp.org/rec/journals/jitech/WeerakkodyDI09"}, "url":"URL#5059878" }, { "@score":"1", "@id":"5059879", "info":{"authors":{"author":[{"@pid":"68/1075","text":"Michael D. Williams"},{"@pid":"69/996","text":"Yogesh Kumar Dwivedi"},{"@pid":"13/796","text":"Banita Lal"},{"@pid":"09/1584","text":"Andrew Schwarz"}]},"title":"Contemporary trends and issues in IT adoption and diffusion research.","venue":"J. Inf. Technol.","volume":"24","number":"1","pages":"1-10","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jitech/WilliamsDLS09","doi":"10.1057/JIT.2008.30","ee":"https://doi.org/10.1057/jit.2008.30","url":"https://dblp.org/rec/journals/jitech/WilliamsDLS09"}, "url":"URL#5059879" } ] } } } )