Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/db/db47.bht:"
@article{DBLP:journals/db/BeckPV16, author = {Roman Beck and Immanuel Pahlke and Jens Vykoukal}, title = {Colocation as a Hybrid {ICT} Sourcing Strategy to Improve Operational Agility}, journal = {Data Base}, volume = {47}, number = {2}, pages = {9--35}, year = {2016}, url = {https://doi.org/10.1145/2963175.2963177}, doi = {10.1145/2963175.2963177}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/BeckPV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/Cuellar16, author = {Michael J. Cuellar}, title = {Critical Realism as a Sociomaterial Stream of Research}, journal = {Data Base}, volume = {47}, number = {4}, pages = {60--66}, year = {2016}, url = {https://doi.org/10.1145/3025099.3025106}, doi = {10.1145/3025099.3025106}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/Cuellar16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/DibbernCK16, author = {Jens Dibbern and Wynne W. Chin and Thomas Kude}, title = {The Sourcing of Software Services: Knowledge Specificity and the Role of Trust}, journal = {Data Base}, volume = {47}, number = {2}, pages = {36--57}, year = {2016}, url = {https://doi.org/10.1145/2963175.2963178}, doi = {10.1145/2963175.2963178}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/DibbernCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/Elbanna16, author = {Amany R. Elbanna}, title = {Doing Sociomateriality Research in Information Systems}, journal = {Data Base}, volume = {47}, number = {4}, pages = {84--92}, year = {2016}, url = {https://doi.org/10.1145/3025099.3025108}, doi = {10.1145/3025099.3025108}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/Elbanna16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/FanCCH16, author = {Bo Fan and Long Chen and Yih Tng Chong and Zhou He}, title = {Mining for spatio-temporal distribution rules of illegal dumping from large dataset}, journal = {Data Base}, volume = {47}, number = {3}, pages = {41--53}, year = {2016}, url = {https://doi.org/10.1145/2980783.2980786}, doi = {10.1145/2980783.2980786}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/FanCCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/Hassan16, author = {Nik Rushdi Hassan}, title = {Editorial: {A} Brief History of the Material in Sociomateriality}, journal = {Data Base}, volume = {47}, number = {4}, pages = {10--22}, year = {2016}, url = {https://doi.org/10.1145/3025099.3025101}, doi = {10.1145/3025099.3025101}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/Hassan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/KautzP16, author = {Karlheinz Kautz and Melinda Plumb}, title = {Strong versus Weak Sociomateriality: Neither Subordinate nor Privileged- {A} rejoinder to "New Technology and the Post-human self: Rethinking Appropriation and Resistance"}, journal = {Data Base}, volume = {47}, number = {4}, pages = {34--40}, year = {2016}, url = {https://doi.org/10.1145/3025099.3025103}, doi = {10.1145/3025099.3025103}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/KautzP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/LansingS16, author = {Jens Lansing and Ali Sunyaev}, title = {Trust in Cloud Computing: Conceptual Typology and Trust-Building Antecedents}, journal = {Data Base}, volume = {47}, number = {2}, pages = {58--96}, year = {2016}, url = {https://doi.org/10.1145/2963175.2963179}, doi = {10.1145/2963175.2963179}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/LansingS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/MooreHY16, author = {Jo Ellen Moore and Andrea J. Hester and Susan E. Yager}, title = {Paving the Higher Road: The Role of Voice in the Retention of {IT} Workers}, journal = {Data Base}, volume = {47}, number = {1}, pages = {8--28}, year = {2016}, url = {https://doi.org/10.1145/2894216.2894218}, doi = {10.1145/2894216.2894218}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/MooreHY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/MuellerRH16, author = {Benjamin Mueller and Uta Renken and Gijs van den Heuvel}, title = {Get Your Act Together: An Alternative Approach to Understanding the Impact of Technology on Individual and Organizational Behavior}, journal = {Data Base}, volume = {47}, number = {4}, pages = {67--83}, year = {2016}, url = {https://doi.org/10.1145/3025099.3025107}, doi = {10.1145/3025099.3025107}, timestamp = {Fri, 19 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/MuellerRH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/NiedermanFT16, author = {Fred Niederman and Thomas W. Ferratt and Eileen M. Trauth}, title = {On the Co-Evolution of Information Technology and Information Systems Personnel}, journal = {Data Base}, volume = {47}, number = {1}, pages = {29--50}, year = {2016}, url = {https://doi.org/10.1145/2894216.2894219}, doi = {10.1145/2894216.2894219}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/NiedermanFT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/NiemiP16, author = {Eetu I. Niemi and Samuli Pekkola}, title = {Enterprise Architecture Benefit Realization: Review of the Models and a Case Study of a Public Organization}, journal = {Data Base}, volume = {47}, number = {3}, pages = {55--80}, year = {2016}, url = {https://doi.org/10.1145/2980783.2980787}, doi = {10.1145/2980783.2980787}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/NiemiP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/Niemimaa16, author = {Marko Niemimaa}, title = {Sociomateriality and Information Systems Research: Quantum Radicals and Cartesian Conservatives}, journal = {Data Base}, volume = {47}, number = {4}, pages = {45--59}, year = {2016}, url = {https://doi.org/10.1145/3025099.3025105}, doi = {10.1145/3025099.3025105}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/Niemimaa16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/OrsattiHH16, author = {Jo Orsatti and Ella Hafermalz and Dirk S. Hovorka}, title = {Rethinking, "Rethinking: Post-Human Boundaries": Pre-given or Performed?}, journal = {Data Base}, volume = {47}, number = {4}, pages = {41--44}, year = {2016}, url = {https://doi.org/10.1145/3025099.3025104}, doi = {10.1145/3025099.3025104}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/OrsattiHH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/Ramiller16, author = {Neil C. Ramiller}, title = {New Technology and the Post-human Self: Rethinking Appropriation and Resistance}, journal = {Data Base}, volume = {47}, number = {4}, pages = {23--33}, year = {2016}, url = {https://doi.org/10.1145/3025099.3025102}, doi = {10.1145/3025099.3025102}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/Ramiller16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/TrauthCJKB16, author = {Eileen M. Trauth and Curtis C. Cain and K. D. Joshi and Lynette Kvasny and Kayla M. Booth}, title = {The Influence of Gender-Ethnic Intersectionality on Gender Stereotypes about {IT} Skills and Knowledge}, journal = {Data Base}, volume = {47}, number = {3}, pages = {9--39}, year = {2016}, url = {https://doi.org/10.1145/2980783.2980785}, doi = {10.1145/2980783.2980785}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/TrauthCJKB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/UteshevaB16, author = {Anastasia Utesheva and Sebastian K. Boell}, title = {Theorizing Society and Technology in Information Systems Research}, journal = {Data Base}, volume = {47}, number = {4}, pages = {106--110}, year = {2016}, url = {https://doi.org/10.1145/3025099.3025110}, doi = {10.1145/3025099.3025110}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/UteshevaB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/Yang16, author = {Shirley Ou Yang}, title = {Returning to the Philosophical Roots of Sociomateriality: How M. Heidegger and M. McLuhan Questioned Information Communication Technology}, journal = {Data Base}, volume = {47}, number = {4}, pages = {93--105}, year = {2016}, url = {https://doi.org/10.1145/3025099.3025109}, doi = {10.1145/3025099.3025109}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/Yang16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/ZhangYWL16, author = {Sixuan Zhang and Liang Yu and Robin L. Wakefield and Dorothy E. Leidner}, title = {Friend or Foe: Cyberbullying in Social Network Sites}, journal = {Data Base}, volume = {47}, number = {1}, pages = {51--71}, year = {2016}, url = {https://doi.org/10.1145/2894216.2894220}, doi = {10.1145/2894216.2894220}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/ZhangYWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.