Search dblp for Publications

export results for "toc:db/journals/isf/isf10.bht:"

 download as .bib file

@article{DBLP:journals/isf/AlarantaH08,
  author       = {Maria Alaranta and
                  Stefan Henningsson},
  title        = {An approach to analyzing and planning post-merger {IS} integration:
                  Insights from two field studies},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {3},
  pages        = {307--319},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9079-2},
  doi          = {10.1007/S10796-008-9079-2},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/AlarantaH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/AubertBCR08,
  author       = {Benoit Aubert and
                  Guillaume Beaurivage and
                  Anne{-}Marie Croteau and
                  Suzanne Rivard},
  title        = {Firm strategic profile and {IT} outsourcing},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {2},
  pages        = {129--143},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9065-8},
  doi          = {10.1007/S10796-008-9065-8},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/AubertBCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/AydinB08,
  author       = {Mehmet N. Aydin and
                  Mark E. Bakker},
  title        = {Analyzing {IT} maintenance outsourcing decision from a knowledge management
                  perspective},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {3},
  pages        = {293--305},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9084-5},
  doi          = {10.1007/S10796-008-9084-5},
  timestamp    = {Mon, 02 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/AydinB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/Barclay08,
  author       = {Corlane Barclay},
  title        = {Towards an integrated measurement of {IS} project performance: The
                  project performance scorecard},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {3},
  pages        = {331--345},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9083-6},
  doi          = {10.1007/S10796-008-9083-6},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/Barclay08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/BeckBWK08,
  author       = {Roman Beck and
                  Daniel Beimborn and
                  Tim Weitzel and
                  Wolfgang K{\"{o}}nig},
  title        = {Network effects as drivers of individual technology adoption: Analyzing
                  adoption and diffusion of mobile communication services},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {4},
  pages        = {415--429},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9100-9},
  doi          = {10.1007/S10796-008-9100-9},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/BeckBWK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/Brown08,
  author       = {Susan A. Brown},
  title        = {Household technology adoption, use, and impacts: Past, present, and
                  future},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {4},
  pages        = {397--402},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9098-z},
  doi          = {10.1007/S10796-008-9098-Z},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/Brown08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/CarterW08,
  author       = {Lemuria D. Carter and
                  Vishanth Weerakkody},
  title        = {E-government adoption: {A} cultural comparison},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {4},
  pages        = {473--482},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9103-6},
  doi          = {10.1007/S10796-008-9103-6},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/CarterW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/ChenZG08,
  author       = {Xiuzhen Chen and
                  Qinghua Zheng and
                  Xiaohong Guan},
  title        = {An OVAL-based active vulnerability assessment system for enterprise
                  computer networks},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {5},
  pages        = {573--588},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9111-6},
  doi          = {10.1007/S10796-008-9111-6},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/ChenZG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/DwivediWV08,
  author       = {Yogesh Kumar Dwivedi and
                  Michael D. Williams and
                  Viswanath Venkatesh},
  title        = {Guest Editorial: {A} profile of adoption of Information {\&} Communication
                  Technologies {(ICT)} research in the household context},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {4},
  pages        = {385--390},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9101-8},
  doi          = {10.1007/S10796-008-9101-8},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/DwivediWV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/FisherHJ08,
  author       = {Julie Fisher and
                  Rudy Hirschheim and
                  Robert Jacobs},
  title        = {Understanding the outsourcing learning curve: {A} longitudinal analysis
                  of a large Australian company},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {2},
  pages        = {165--178},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9070-y},
  doi          = {10.1007/S10796-008-9070-Y},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/FisherHJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/GencerAC08,
  author       = {Cevriye Gencer and
                  Emel Kizilkaya Aydogan and
                  Coskun Celik},
  title        = {A decision support system for locating {VHF/UHF} radio jammer systems
                  on the terrain},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {1},
  pages        = {111--124},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-007-9046-3},
  doi          = {10.1007/S10796-007-9046-3},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/GencerAC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/GolesHK08,
  author       = {Tim Goles and
                  Stephen Hawk and
                  Kate M. Kaiser},
  title        = {Information technology workforce skills: The software and {IT} services
                  provider perspective},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {2},
  pages        = {179--194},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9072-9},
  doi          = {10.1007/S10796-008-9072-9},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/GolesHK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/GriffithsL08,
  author       = {Marie Griffiths and
                  Ben Light},
  title        = {Social networking and digital gaming media convergence: Classification
                  and its consequences for appropriation},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {4},
  pages        = {447--459},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9105-4},
  doi          = {10.1007/S10796-008-9105-4},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/GriffithsL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/HirschheimDH08,
  author       = {Rudy Hirschheim and
                  Jens Dibbern and
                  Armin Heinzl},
  title        = {Foreword to the special issue on {IS} sourcing},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {2},
  pages        = {125--127},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9069-4},
  doi          = {10.1007/S10796-008-9069-4},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/HirschheimDH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/HolsappleW08,
  author       = {Clyde W. Holsapple and
                  Jiming Wu},
  title        = {Building effective online game websites with knowledge-based trust},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {1},
  pages        = {47--60},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-007-9060-5},
  doi          = {10.1007/S10796-007-9060-5},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/HolsappleW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/HongTMT08,
  author       = {Se{-}Joon Hong and
                  James Y. L. Thong and
                  Jae Yun Moon and
                  Kar Yan Tam},
  title        = {Understanding the behavior of mobile data services consumers},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {4},
  pages        = {431--445},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9096-1},
  doi          = {10.1007/S10796-008-9096-1},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/HongTMT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/Jerman-Blazic08,
  author       = {Borka Jerman{-}Blazic},
  title        = {Techno-economic analysis and empirical study of network broadband
                  investment: The case of backbone upgrading},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {1},
  pages        = {103--110},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-007-9059-y},
  doi          = {10.1007/S10796-007-9059-Y},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/Jerman-Blazic08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/LacityIR08,
  author       = {Mary C. Lacity and
                  Vidya V. Iyer and
                  Prasad S. Rudramuniyaiah},
  title        = {Turnover intentions of Indian {IS} professionals},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {2},
  pages        = {225--241},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-007-9062-3},
  doi          = {10.1007/S10796-007-9062-3},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/LacityIR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/LeeHH08,
  author       = {Jae{-}Nam Lee and
                  Minh Q. Huynh and
                  Rudy Hirschheim},
  title        = {An integrative model of trust on {IT} outsourcing: Examining a bilateral
                  perspective},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {2},
  pages        = {145--163},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9066-7},
  doi          = {10.1007/S10796-008-9066-7},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/LeeHH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/LiVW08,
  author       = {Ling Li and
                  Ricardo Valerdi and
                  John N. Warfield},
  title        = {Advances in enterprise information systems},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {5},
  pages        = {499--501},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9110-7},
  doi          = {10.1007/S10796-008-9110-7},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/LiVW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/LiXJNAF08,
  author       = {Ling Li and
                  Li Xu and
                  Hueiwang Anna Jeng and
                  Dayanand N. Naik and
                  Thomas Allen and
                  Maria Frontini},
  title        = {Creation of environmental health information system for public health
                  service: {A} pilot study},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {5},
  pages        = {531--542},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9108-1},
  doi          = {10.1007/S10796-008-9108-1},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/LiXJNAF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/MaO08,
  author       = {Ji Ma and
                  Mehmet A. Orgun},
  title        = {Formalising theories of trust for authentication protocols},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {1},
  pages        = {19--32},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-007-9049-0},
  doi          = {10.1007/S10796-007-9049-0},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/MaO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/MasudKT08,
  author       = {Mohammad M. Masud and
                  Latifur Khan and
                  Bhavani Thuraisingham},
  title        = {A scalable multi-level feature extraction technique to detect malicious
                  executables},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {1},
  pages        = {33--45},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-007-9054-3},
  doi          = {10.1007/S10796-007-9054-3},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/MasudKT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/MirchandaniJJ08,
  author       = {Dinesh A. Mirchandani and
                  Julius H. Johnson Jr. and
                  Kailash Joshi},
  title        = {Perspectives of citizens towards e-government in Thailand and Indonesia:
                  {A} multigroup analysis},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {4},
  pages        = {483--497},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9102-7},
  doi          = {10.1007/S10796-008-9102-7},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/MirchandaniJJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/MollerCJ08,
  author       = {Charles M{\o}ller and
                  Sohail S. Chaudhry and
                  Bent J{\o}rgensen},
  title        = {Complex service design: {A} virtual enterprise architecture for logistics
                  service},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {5},
  pages        = {503--518},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9106-3},
  doi          = {10.1007/S10796-008-9106-3},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/MollerCJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/Osei-BrysonN08,
  author       = {Kweku{-}Muata Osei{-}Bryson and
                  Ojelanki K. Ngwenyama},
  title        = {Decision models for information systems management},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {3},
  pages        = {277--279},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9082-7},
  doi          = {10.1007/S10796-008-9082-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/Osei-BrysonN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/Plaza08,
  author       = {Malgorzata Plaza},
  title        = {Team performance and information system implementation},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {3},
  pages        = {347--359},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9080-9},
  doi          = {10.1007/S10796-008-9080-9},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/Plaza08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/RaghuWMR08,
  author       = {T. S. Raghu and
                  Wonseok Woo and
                  S. B. Mohan and
                  H. Raghav Rao},
  title        = {Market reaction to patent infringement litigations in the information
                  technology industry},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {1},
  pages        = {61--75},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-007-9036-5},
  doi          = {10.1007/S10796-007-9036-5},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/RaghuWMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/RameshR08,
  author       = {Ram Ramesh and
                  H. Raghav Rao},
  title        = {Editorial},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {1},
  pages        = {1--2},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9071-x},
  doi          = {10.1007/S10796-008-9071-X},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/RameshR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/RaoO08,
  author       = {Lila Rao and
                  Kweku{-}Muata Osei{-}Bryson},
  title        = {An approach for incorporating quality-based cost-benefit analysis
                  in data warehouse design},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {3},
  pages        = {361--373},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9077-4},
  doi          = {10.1007/S10796-008-9077-4},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/RaoO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/RottmanL08,
  author       = {Joseph W. Rottman and
                  Mary C. Lacity},
  title        = {A {US} Client's learning from outsourcing {IT} work offshore},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {2},
  pages        = {259--275},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-007-9061-4},
  doi          = {10.1007/S10796-007-9061-4},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/RottmanL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/Sabat08,
  author       = {Hemant K. Sabat},
  title        = {Spectrum acquisition strategies adopted by wireless carriers in the
                  {USA}},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {1},
  pages        = {77--102},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-007-9056-1},
  doi          = {10.1007/S10796-007-9056-1},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/Sabat08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/Samoilenko08,
  author       = {Sergey Samoilenko},
  title        = {Information systems fitness and risk in {IS} development: Insights
                  and implications from chaos and complex systems theories},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {3},
  pages        = {281--292},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9078-3},
  doi          = {10.1007/S10796-008-9078-3},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/Samoilenko08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/ScheepersS08,
  author       = {Helana Scheepers and
                  Rens Scheepers},
  title        = {A process-focused decision framework for analyzing the business value
                  potential of {IT} investments},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {3},
  pages        = {321--330},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9076-5},
  doi          = {10.1007/S10796-008-9076-5},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/ScheepersS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/ShenCS08,
  author       = {Liping Shen and
                  Victor Callaghan and
                  Ruimin Shen},
  title        = {Affective e-Learning in residential and pervasive computing environments},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {4},
  pages        = {461--472},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9104-5},
  doi          = {10.1007/S10796-008-9104-5},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/ShenCS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/SipiorW08,
  author       = {Janice C. Sipior and
                  Burke T. Ward},
  title        = {Trust, privacy, and legal protection in the use of software with surreptitiously
                  installed operations: An empirical evaluation},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {1},
  pages        = {3--18},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-007-9035-6},
  doi          = {10.1007/S10796-007-9035-6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/SipiorW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/StraubWS08,
  author       = {Detmar W. Straub and
                  Peter Weill and
                  Kathy S. Schwaig},
  title        = {Strategic dependence on the {IT} resource and outsourcing: {A} test
                  of the strategic control model},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {2},
  pages        = {195--210},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9064-9},
  doi          = {10.1007/S10796-008-9064-9},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/StraubWS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/TanJLL08,
  author       = {WenAn Tan and
                  Chuanqun Jiang and
                  Ling Li and
                  Zhenhong Lv},
  title        = {Role-oriented process-driven enterprise cooperative work using the
                  combined rule scheduling strategies},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {5},
  pages        = {519--529},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9107-2},
  doi          = {10.1007/S10796-008-9107-2},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/TanJLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/Turetken08,
  author       = {Ozgur Turetken},
  title        = {Is your back-up {IT} infrastructure in a safe location?},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {3},
  pages        = {375--383},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9081-8},
  doi          = {10.1007/S10796-008-9081-8},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/Turetken08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/Venkatesh08,
  author       = {Alladi Venkatesh},
  title        = {Digital home technologies and transformation of households},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {4},
  pages        = {391--395},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9097-0},
  doi          = {10.1007/S10796-008-9097-0},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/Venkatesh08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/WangX08,
  author       = {Chengen Wang and
                  Lida Xu},
  title        = {Parameter mapping and data transformation for engineering application
                  integration},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {5},
  pages        = {589--600},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9112-5},
  doi          = {10.1007/S10796-008-9112-5},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/WangX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/WangZXLM08,
  author       = {Shan Wang and
                  Shi Zheng and
                  Lida Xu and
                  Dezheng Li and
                  Huan Meng},
  title        = {A literature review of electronic marketplace research: Themes, theories
                  and an integrative framework},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {5},
  pages        = {555--571},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9115-2},
  doi          = {10.1007/S10796-008-9115-2},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/WangZXLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/WinklerDH08,
  author       = {Jessica K. Winkler and
                  Jens Dibbern and
                  Armin Heinzl},
  title        = {The impact of cultural differences in offshore outsourcing - Case
                  study results from German-Indian application development projects},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {2},
  pages        = {243--258},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9068-5},
  doi          = {10.1007/S10796-008-9068-5},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/WinklerDH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/WullenweberBWK08,
  author       = {Kim W{\"{u}}llenweber and
                  Daniel Beimborn and
                  Tim Weitzel and
                  Wolfgang K{\"{o}}nig},
  title        = {The impact of process standardization on business process outsourcing
                  success},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {2},
  pages        = {211--224},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9063-x},
  doi          = {10.1007/S10796-008-9063-X},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/WullenweberBWK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/Xu08,
  author       = {Shoubo Xu},
  title        = {The concept and theory of material flow},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {5},
  pages        = {601--609},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9113-4},
  doi          = {10.1007/S10796-008-9113-4},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/Xu08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/XuTZS08,
  author       = {Lida Xu and
                  WenAn Tan and
                  Hongyuan Zhen and
                  Weiming Shen},
  title        = {An approach to enterprise process dynamic modeling supporting enterprise
                  process evolution},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {5},
  pages        = {611--624},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9114-3},
  doi          = {10.1007/S10796-008-9114-3},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/XuTZS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/ZangFL08,
  author       = {Chuanzhen Zang and
                  Yushun Fan and
                  Renjing Liu},
  title        = {Architecture, implementation and application of complex event processing
                  in enterprise information systems based on {RFID}},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {5},
  pages        = {543--553},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9109-0},
  doi          = {10.1007/S10796-008-9109-0},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/ZangFL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/ZhangM08,
  author       = {Xiaojun Zhang and
                  Likoebe M. Maruping},
  title        = {Household technology adoption in a global marketplace: Incorporating
                  the role of espoused cultural values},
  journal      = {Inf. Syst. Frontiers},
  volume       = {10},
  number       = {4},
  pages        = {403--413},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10796-008-9099-y},
  doi          = {10.1007/S10796-008-9099-Y},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/ZhangM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}