default search action
Search dblp for Publications
export results for "toc:db/journals/isf/isf10.bht:"
@article{DBLP:journals/isf/AlarantaH08, author = {Maria Alaranta and Stefan Henningsson}, title = {An approach to analyzing and planning post-merger {IS} integration: Insights from two field studies}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {3}, pages = {307--319}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9079-2}, doi = {10.1007/S10796-008-9079-2}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/AlarantaH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/AubertBCR08, author = {Benoit Aubert and Guillaume Beaurivage and Anne{-}Marie Croteau and Suzanne Rivard}, title = {Firm strategic profile and {IT} outsourcing}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {2}, pages = {129--143}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9065-8}, doi = {10.1007/S10796-008-9065-8}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/AubertBCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/AydinB08, author = {Mehmet N. Aydin and Mark E. Bakker}, title = {Analyzing {IT} maintenance outsourcing decision from a knowledge management perspective}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {3}, pages = {293--305}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9084-5}, doi = {10.1007/S10796-008-9084-5}, timestamp = {Mon, 02 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/AydinB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Barclay08, author = {Corlane Barclay}, title = {Towards an integrated measurement of {IS} project performance: The project performance scorecard}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {3}, pages = {331--345}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9083-6}, doi = {10.1007/S10796-008-9083-6}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/Barclay08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/BeckBWK08, author = {Roman Beck and Daniel Beimborn and Tim Weitzel and Wolfgang K{\"{o}}nig}, title = {Network effects as drivers of individual technology adoption: Analyzing adoption and diffusion of mobile communication services}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {4}, pages = {415--429}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9100-9}, doi = {10.1007/S10796-008-9100-9}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/BeckBWK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Brown08, author = {Susan A. Brown}, title = {Household technology adoption, use, and impacts: Past, present, and future}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {4}, pages = {397--402}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9098-z}, doi = {10.1007/S10796-008-9098-Z}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/Brown08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/CarterW08, author = {Lemuria D. Carter and Vishanth Weerakkody}, title = {E-government adoption: {A} cultural comparison}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {4}, pages = {473--482}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9103-6}, doi = {10.1007/S10796-008-9103-6}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/CarterW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ChenZG08, author = {Xiuzhen Chen and Qinghua Zheng and Xiaohong Guan}, title = {An OVAL-based active vulnerability assessment system for enterprise computer networks}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {5}, pages = {573--588}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9111-6}, doi = {10.1007/S10796-008-9111-6}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/ChenZG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/DwivediWV08, author = {Yogesh Kumar Dwivedi and Michael D. Williams and Viswanath Venkatesh}, title = {Guest Editorial: {A} profile of adoption of Information {\&} Communication Technologies {(ICT)} research in the household context}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {4}, pages = {385--390}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9101-8}, doi = {10.1007/S10796-008-9101-8}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/DwivediWV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/FisherHJ08, author = {Julie Fisher and Rudy Hirschheim and Robert Jacobs}, title = {Understanding the outsourcing learning curve: {A} longitudinal analysis of a large Australian company}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {2}, pages = {165--178}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9070-y}, doi = {10.1007/S10796-008-9070-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/FisherHJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/GencerAC08, author = {Cevriye Gencer and Emel Kizilkaya Aydogan and Coskun Celik}, title = {A decision support system for locating {VHF/UHF} radio jammer systems on the terrain}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {1}, pages = {111--124}, year = {2008}, url = {https://doi.org/10.1007/s10796-007-9046-3}, doi = {10.1007/S10796-007-9046-3}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/GencerAC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/GolesHK08, author = {Tim Goles and Stephen Hawk and Kate M. Kaiser}, title = {Information technology workforce skills: The software and {IT} services provider perspective}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {2}, pages = {179--194}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9072-9}, doi = {10.1007/S10796-008-9072-9}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/GolesHK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/GriffithsL08, author = {Marie Griffiths and Ben Light}, title = {Social networking and digital gaming media convergence: Classification and its consequences for appropriation}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {4}, pages = {447--459}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9105-4}, doi = {10.1007/S10796-008-9105-4}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/GriffithsL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/HirschheimDH08, author = {Rudy Hirschheim and Jens Dibbern and Armin Heinzl}, title = {Foreword to the special issue on {IS} sourcing}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {2}, pages = {125--127}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9069-4}, doi = {10.1007/S10796-008-9069-4}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/HirschheimDH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/HolsappleW08, author = {Clyde W. Holsapple and Jiming Wu}, title = {Building effective online game websites with knowledge-based trust}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {1}, pages = {47--60}, year = {2008}, url = {https://doi.org/10.1007/s10796-007-9060-5}, doi = {10.1007/S10796-007-9060-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/HolsappleW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/HongTMT08, author = {Se{-}Joon Hong and James Y. L. Thong and Jae Yun Moon and Kar Yan Tam}, title = {Understanding the behavior of mobile data services consumers}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {4}, pages = {431--445}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9096-1}, doi = {10.1007/S10796-008-9096-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/HongTMT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Jerman-Blazic08, author = {Borka Jerman{-}Blazic}, title = {Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {1}, pages = {103--110}, year = {2008}, url = {https://doi.org/10.1007/s10796-007-9059-y}, doi = {10.1007/S10796-007-9059-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/Jerman-Blazic08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LacityIR08, author = {Mary C. Lacity and Vidya V. Iyer and Prasad S. Rudramuniyaiah}, title = {Turnover intentions of Indian {IS} professionals}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {2}, pages = {225--241}, year = {2008}, url = {https://doi.org/10.1007/s10796-007-9062-3}, doi = {10.1007/S10796-007-9062-3}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/LacityIR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LeeHH08, author = {Jae{-}Nam Lee and Minh Q. Huynh and Rudy Hirschheim}, title = {An integrative model of trust on {IT} outsourcing: Examining a bilateral perspective}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {2}, pages = {145--163}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9066-7}, doi = {10.1007/S10796-008-9066-7}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/LeeHH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LiVW08, author = {Ling Li and Ricardo Valerdi and John N. Warfield}, title = {Advances in enterprise information systems}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {5}, pages = {499--501}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9110-7}, doi = {10.1007/S10796-008-9110-7}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/LiVW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LiXJNAF08, author = {Ling Li and Li Xu and Hueiwang Anna Jeng and Dayanand N. Naik and Thomas Allen and Maria Frontini}, title = {Creation of environmental health information system for public health service: {A} pilot study}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {5}, pages = {531--542}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9108-1}, doi = {10.1007/S10796-008-9108-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/LiXJNAF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/MaO08, author = {Ji Ma and Mehmet A. Orgun}, title = {Formalising theories of trust for authentication protocols}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {1}, pages = {19--32}, year = {2008}, url = {https://doi.org/10.1007/s10796-007-9049-0}, doi = {10.1007/S10796-007-9049-0}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/MaO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/MasudKT08, author = {Mohammad M. Masud and Latifur Khan and Bhavani Thuraisingham}, title = {A scalable multi-level feature extraction technique to detect malicious executables}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {1}, pages = {33--45}, year = {2008}, url = {https://doi.org/10.1007/s10796-007-9054-3}, doi = {10.1007/S10796-007-9054-3}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/MasudKT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/MirchandaniJJ08, author = {Dinesh A. Mirchandani and Julius H. Johnson Jr. and Kailash Joshi}, title = {Perspectives of citizens towards e-government in Thailand and Indonesia: {A} multigroup analysis}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {4}, pages = {483--497}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9102-7}, doi = {10.1007/S10796-008-9102-7}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/MirchandaniJJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/MollerCJ08, author = {Charles M{\o}ller and Sohail S. Chaudhry and Bent J{\o}rgensen}, title = {Complex service design: {A} virtual enterprise architecture for logistics service}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {5}, pages = {503--518}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9106-3}, doi = {10.1007/S10796-008-9106-3}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/MollerCJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Osei-BrysonN08, author = {Kweku{-}Muata Osei{-}Bryson and Ojelanki K. Ngwenyama}, title = {Decision models for information systems management}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {3}, pages = {277--279}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9082-7}, doi = {10.1007/S10796-008-9082-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/Osei-BrysonN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Plaza08, author = {Malgorzata Plaza}, title = {Team performance and information system implementation}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {3}, pages = {347--359}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9080-9}, doi = {10.1007/S10796-008-9080-9}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/Plaza08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/RaghuWMR08, author = {T. S. Raghu and Wonseok Woo and S. B. Mohan and H. Raghav Rao}, title = {Market reaction to patent infringement litigations in the information technology industry}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {1}, pages = {61--75}, year = {2008}, url = {https://doi.org/10.1007/s10796-007-9036-5}, doi = {10.1007/S10796-007-9036-5}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/RaghuWMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/RameshR08, author = {Ram Ramesh and H. Raghav Rao}, title = {Editorial}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {1}, pages = {1--2}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9071-x}, doi = {10.1007/S10796-008-9071-X}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/RameshR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/RaoO08, author = {Lila Rao and Kweku{-}Muata Osei{-}Bryson}, title = {An approach for incorporating quality-based cost-benefit analysis in data warehouse design}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {3}, pages = {361--373}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9077-4}, doi = {10.1007/S10796-008-9077-4}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/RaoO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/RottmanL08, author = {Joseph W. Rottman and Mary C. Lacity}, title = {A {US} Client's learning from outsourcing {IT} work offshore}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {2}, pages = {259--275}, year = {2008}, url = {https://doi.org/10.1007/s10796-007-9061-4}, doi = {10.1007/S10796-007-9061-4}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/RottmanL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Sabat08, author = {Hemant K. Sabat}, title = {Spectrum acquisition strategies adopted by wireless carriers in the {USA}}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {1}, pages = {77--102}, year = {2008}, url = {https://doi.org/10.1007/s10796-007-9056-1}, doi = {10.1007/S10796-007-9056-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/Sabat08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Samoilenko08, author = {Sergey Samoilenko}, title = {Information systems fitness and risk in {IS} development: Insights and implications from chaos and complex systems theories}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {3}, pages = {281--292}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9078-3}, doi = {10.1007/S10796-008-9078-3}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/Samoilenko08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ScheepersS08, author = {Helana Scheepers and Rens Scheepers}, title = {A process-focused decision framework for analyzing the business value potential of {IT} investments}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {3}, pages = {321--330}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9076-5}, doi = {10.1007/S10796-008-9076-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/ScheepersS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ShenCS08, author = {Liping Shen and Victor Callaghan and Ruimin Shen}, title = {Affective e-Learning in residential and pervasive computing environments}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {4}, pages = {461--472}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9104-5}, doi = {10.1007/S10796-008-9104-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/ShenCS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/SipiorW08, author = {Janice C. Sipior and Burke T. Ward}, title = {Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {1}, pages = {3--18}, year = {2008}, url = {https://doi.org/10.1007/s10796-007-9035-6}, doi = {10.1007/S10796-007-9035-6}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/SipiorW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/StraubWS08, author = {Detmar W. Straub and Peter Weill and Kathy S. Schwaig}, title = {Strategic dependence on the {IT} resource and outsourcing: {A} test of the strategic control model}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {2}, pages = {195--210}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9064-9}, doi = {10.1007/S10796-008-9064-9}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/StraubWS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/TanJLL08, author = {WenAn Tan and Chuanqun Jiang and Ling Li and Zhenhong Lv}, title = {Role-oriented process-driven enterprise cooperative work using the combined rule scheduling strategies}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {5}, pages = {519--529}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9107-2}, doi = {10.1007/S10796-008-9107-2}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/TanJLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Turetken08, author = {Ozgur Turetken}, title = {Is your back-up {IT} infrastructure in a safe location?}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {3}, pages = {375--383}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9081-8}, doi = {10.1007/S10796-008-9081-8}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/Turetken08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Venkatesh08, author = {Alladi Venkatesh}, title = {Digital home technologies and transformation of households}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {4}, pages = {391--395}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9097-0}, doi = {10.1007/S10796-008-9097-0}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/Venkatesh08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/WangX08, author = {Chengen Wang and Lida Xu}, title = {Parameter mapping and data transformation for engineering application integration}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {5}, pages = {589--600}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9112-5}, doi = {10.1007/S10796-008-9112-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/WangX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/WangZXLM08, author = {Shan Wang and Shi Zheng and Lida Xu and Dezheng Li and Huan Meng}, title = {A literature review of electronic marketplace research: Themes, theories and an integrative framework}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {5}, pages = {555--571}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9115-2}, doi = {10.1007/S10796-008-9115-2}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/WangZXLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/WinklerDH08, author = {Jessica K. Winkler and Jens Dibbern and Armin Heinzl}, title = {The impact of cultural differences in offshore outsourcing - Case study results from German-Indian application development projects}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {2}, pages = {243--258}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9068-5}, doi = {10.1007/S10796-008-9068-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/WinklerDH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/WullenweberBWK08, author = {Kim W{\"{u}}llenweber and Daniel Beimborn and Tim Weitzel and Wolfgang K{\"{o}}nig}, title = {The impact of process standardization on business process outsourcing success}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {2}, pages = {211--224}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9063-x}, doi = {10.1007/S10796-008-9063-X}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/WullenweberBWK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Xu08, author = {Shoubo Xu}, title = {The concept and theory of material flow}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {5}, pages = {601--609}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9113-4}, doi = {10.1007/S10796-008-9113-4}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/Xu08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/XuTZS08, author = {Lida Xu and WenAn Tan and Hongyuan Zhen and Weiming Shen}, title = {An approach to enterprise process dynamic modeling supporting enterprise process evolution}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {5}, pages = {611--624}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9114-3}, doi = {10.1007/S10796-008-9114-3}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/XuTZS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ZangFL08, author = {Chuanzhen Zang and Yushun Fan and Renjing Liu}, title = {Architecture, implementation and application of complex event processing in enterprise information systems based on {RFID}}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {5}, pages = {543--553}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9109-0}, doi = {10.1007/S10796-008-9109-0}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/ZangFL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ZhangM08, author = {Xiaojun Zhang and Likoebe M. Maruping}, title = {Household technology adoption in a global marketplace: Incorporating the role of espoused cultural values}, journal = {Inf. Syst. Frontiers}, volume = {10}, number = {4}, pages = {403--413}, year = {2008}, url = {https://doi.org/10.1007/s10796-008-9099-y}, doi = {10.1007/S10796-008-9099-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/ZhangM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.