![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 75 matches
- 1994
- Steven Alter, Sue A. Conger, Carolyn Green:
Systems Analysis Techniques for Business People: How Should These Techniques Differ from Techniques for IS Professionals. ICIS 1994: 484 - Benoit Aubert, Suzanne Rivard, Michel Patry:
Development of Measures to Assess Dimensions of IS Operation Transactions. ICIS 1994: 13-26 - Rajiv D. Banker, Sandra Slaughter:
Project Size and Software Maintenance Productivity: Empirical Evidence on Economies of Scale in Software Maintenance. ICIS 1994: 279-289 - Rajiv D. Banker, Sandra Slaughter:
In Search of Software Maintenance Productivity and Quality: Does Software Complexity Matter? ICIS 1994: 455-456 - Barbara J. Bashein, M. Lynne Markus:
Business Process Reengineering: How Can Information Systems Managers Increase Their Chances of Success? ICIS 1994: 459 - Richard L. Baskerville, Brian T. Pentland, Geoff Walsham:
Two Techniques for Qualitative Data Analysis: Descriptive Narrative and Generalization. ICIS 1994: 503-504 - Cynthia Mathis Beath, Dale Goodhue, Jeanne W. Ross:
Partnering for Business Value: The Shared Management of the IS Infrastructure. ICIS 1994: 458 - Mary Brabston, Omar El Sawy, Sirkka L. Jarvenpaa, Neil C. Ramiller:
A Strategic Vision for Information Technololgy: What, Why, Who, Where, When and How? ICIS 1994: 471 - Tung Bui, Ting-Peng Liang, T. Matsuzaki, Margaret Tan:
The Diffusion of IT in the Year 2000: The Asia Pacific Context. ICIS 1994: 497-498 - Janice M. Burn:
An "R"evolutionary Staged Growth Model of Information Systems Planning. ICIS 1994: 395-406 - Taizan Chan, Siu Leung Chung, Teck-Hua Ho:
Timing of Software Replacement. ICIS 1994: 291-307 - Hock Chuan Chan, Bernard C. Y. Tan, Kwok Kee Wei:
The Query Cube: A Framework for Assessing User Productivity with Database Information Retrieval. ICIS 1994: 61-71 - Laku Chidambaram, Robert P. Bostrom, Gerardine DeSanctis, Douglas R. Vogel:
As Time Goes By: How Do Groups Change? ICIS 1994: 485 - Wynne W. Chin, Barbara L. Marcolin:
The Partial Least Squares Approach for Causal Modeling in IS Research. ICIS 1994: 505 - J. Daniel Couger, David L. Feinstein, John T. Gorgone, Herbert E. Longenecker Jr., David Miller:
Trying to Hit a Moving Target: Report on Proposed Joint ACM/DPMA/AIS/ICIS Undergraduate IS Curriculum Update. ICIS 1994: 469-470 - J. Michael Cummins, Peter G. W. Keen:
Telecommunications in the IS Curriculum. ICIS 1994: 509 - Gordon B. Davis, Guy G. Gable, John A. Sharp:
Evolving an Information Systems Research Strategy. ICIS 1994: 474-475 - Phillip Ein-Dor, Michael D. Myers, K. S. Raman:
IT Industry Success in Small Developed Countries. ICIS 1994: 461 - Greg Elofson:
IT Alternatives to Social Control in Organizations. ICIS 1994: 141-158 - Guy Fitzgerald, Leslie P. Willcocks:
Contracts and Partnerships in the Outsourcing of IT. ICIS 1994: 91-98 - Jane M. Fritz, Ian D. Benest:
A New File Access Paradigm for Extending a User's Information Base. ICIS 1994: 51-60 - Dennis F. Galletta, Manju Ahuja, Amir Hartman, A. Graham Peace, Thompson S. H. Teo:
An Empirical Study of Peer Influence on User Attitudes, Behavior, and Performance. ICIS 1994: 229-242 - Robert D. Galliers, David E. Avison, Robert M. MacGregor, Peter Neilssen, Jon Turner:
International Information Systems Journals: How Do They Differ from Their North American Counterparts? ICIS 1994: 472 - Michael Gallivan, J. Debra Hofman, Wanda J. Orlikowski:
Implementing Radical Change: Gradual Versus Rapid Pace. ICIS 1994: 325-339 - Rebecca A. Grant, David Flaherty, Michel Globensky:
Information Privacy: What is Our Responsibility? ICIS 1994: 481 - Kenneth Griggs, Jackson He:
Hyper Analysis Toolkit (HAT): A Case Study in Faculty Developed Software. ICIS 1994: 507 - Robert L. Heckman, William R. King:
Behavioral Indicators of Customer Satisfaction with Vendor-Provided Information Services. ICIS 1994: 429-444 - Lorin M. Hitt, Erik Brynjolfsson:
The Three Faces of IT Value: Theory and Evidence. ICIS 1994: 263-277 - Tawfik Jelassi, Niels Bjørn-Andersen, F. Warren McFarlan, Norbert Szyperski:
National IT Policies: European and United States Perspectives. ICIS 1994: 482 - Mark Keil, Gopal K. Kapur, M. Lynne Markus, James A. Willbern:
Managing IT Projects for Success: Reengineering or Better Project Management? ICIS 1994: 486
skipping 45 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-12 00:34 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint