default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 92 matches
- 2016
- Hiep Cong Pham, Linda Brennan, Joan Richardson:
Stress-Based IS Security Compliance: Towards a Conceptual Model. ACIS 2016: 19 - Paul Jackson, Philip Dobson, Denise Gengatharen:
Focusing on non-adopters of broadband: A critical realist perspective. ACIS 2016: 48 - Janak Adhikari, Anuradha Mathrani, David Parsons, Chris Scogings:
Understanding Learning Outcome Divide in the Learning Process from a Teachers Perspective: A BYOD Case Study. ACIS 2016: 58 - Carlos Andres Agudelo, Rachelle Bosua, Sean B. Maynard, Atif Ahmad:
Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices: A Contextual Approach. ACIS 2016: 79 - Ahmed AlKalbani, Hepu Deng, Booi Kam, Julia Zhang:
Investigating the Impact of Institutional Pressures on Information Security Compliance in Organizations. ACIS 2016: 26 - Arif Ali, Pak Yoong, Allan Sylvester:
Barriers Inhibiting the Development of a Self-Sustaining Virtual Learning Cluster of Schools in New Zealand: The Case of the C-Net Cluster. ACIS 2016: 31 - Chris Niyi Arasanmi:
The link between post-implementation learning motivation and enterprise resource planning system usage: a pilot study. ACIS 2016: 67 - Daniel Alejandro Arregui, Sean B. Maynard, Atif Ahmad:
Mitigating BYOD Information Security Risks. ACIS 2016: 8 - Marjan Aslanzadeh, Byron W. Keating:
Effective Use of Self-service Technology by Physically Disabled Individuals. ACIS 2016: 72 - Riza Azmi, William Tibben, Khin Than Win:
Motives behind Cyber Security Strategy Development: A Literature Review of National Cyber Security Strategy. ACIS 2016: 52 - João Barata, Sharon Coyle:
Socially-Constructed Metrics for Agile Quality: An Action Research Study. ACIS 2016: 70 - Oliver K. Burmeister, David Ritchie, Alison Devitt, Eevon Chia, Gregory Dresser:
Evaluation of Telehealth Equipment. ACIS 2016: 53 - Renee Rui Chen, Robert M. Davison, Carol Xiaojuan Ou:
Using Social Media for Business Communication: A Symbolic Interaction Perspective. ACIS 2016: 27 - Sophie Cockcroft:
Big data in Financial Management a structured literature review and Opportunities for IS research. ACIS 2016: 14 - Stefan Cronholm, Hannes Göbel:
ITIL compliance with a Service Perspective: a Review Based on Service-Dominant Logic. ACIS 2016: 7 - Stefan Cronholm, Hannes Göbel, Anders Hjalmarsson:
Empirical Evaluation of Action Design Research. ACIS 2016: 11 - Brian Cusack, Eghbal Ghazizadeh:
Analysing Trust Issues in Cloud Identity Environments. ACIS 2016: 50 - Brian Cusack, Raymond Lutui, Reza Khaleghparast:
Detecting Slow DDos Attacks on Mobile Devices. ACIS 2016: 69 - Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno:
Who influences information security behaviours of young home computer users in Vietnam? An ego-centric network analysis approach. ACIS 2016: 30 - Kenan Degirmenci:
Trust-Promoting Seals in Green Information Systems: The Case of Smart Meters and Privacy. ACIS 2016: 71 - Oliver Degner, Andreas Drechsler:
Towards a Model for Discourse Ethics-based Digital Business Strategy Development. ACIS 2016: 34 - Peter W. Eklund, Edward Dou, Ulrike Gretzel:
Location privacy acceptance: attitudes to transport-based location-aware mobile applications on a university campus. ACIS 2016: 9 - Steve Elliot, Ella Hafermalz, Dirk Hovorka, Sebastian K. Boell, Kai Riemer, Olivera Marjanovic:
The Sharing Economy and the Transformative Roles of IS: An Australian Study. ACIS 2016: 77 - Niklas Eriksson, Mikael Forsström, Carl-Johan Rosenbröijer:
The Data Driven Decision RACE in eRetailing. ACIS 2016: 2 - Ross Farrelly, Eng Chew:
Who's in to Win?: Participation Rate in a Primary Personal Information Market. ACIS 2016: 22 - Marie D. Fernando, Athula Ginige, Ana Hol:
Structural and Behavioural Model for Social Computing Applications. ACIS 2016: 63 - Mahdi Fahmideh Gholami, Farhad Daneshgar, Fethi Rabhi:
Cloud Computing Adoption: An Effective Tailoring Approach. ACIS 2016: 5 - Hannes Göbel, Stefan Cronholm, Anders Hjalmarsson:
Inscribing Service into IT Service Management. ACIS 2016: 16 - Tian Yu Goh, Frada Burstein, Pari Delir Haghighi, Rachelle Buchbinder, Margaret Staples:
Integrating contextual and online self-reported data for personalized healthcare: a tennis elbow case study. ACIS 2016: 73 - Stefan Gruner:
Heinz Zemanek's Almost Forgotten Contributions to the Early Philosophy of Informatics. ACIS 2016: 1
skipping 62 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-21 13:27 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint