![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 48 matches
- 2008
- Maria Alaranta, Stefan Henningsson:
An approach to analyzing and planning post-merger IS integration: Insights from two field studies. Inf. Syst. Frontiers 10(3): 307-319 (2008) - Benoit Aubert
, Guillaume Beaurivage, Anne-Marie Croteau, Suzanne Rivard:
Firm strategic profile and IT outsourcing. Inf. Syst. Frontiers 10(2): 129-143 (2008) - Mehmet N. Aydin
, Mark E. Bakker:
Analyzing IT maintenance outsourcing decision from a knowledge management perspective. Inf. Syst. Frontiers 10(3): 293-305 (2008) - Corlane Barclay
:
Towards an integrated measurement of IS project performance: The project performance scorecard. Inf. Syst. Frontiers 10(3): 331-345 (2008) - Roman Beck, Daniel Beimborn, Tim Weitzel, Wolfgang König:
Network effects as drivers of individual technology adoption: Analyzing adoption and diffusion of mobile communication services. Inf. Syst. Frontiers 10(4): 415-429 (2008) - Susan A. Brown
:
Household technology adoption, use, and impacts: Past, present, and future. Inf. Syst. Frontiers 10(4): 397-402 (2008) - Lemuria D. Carter
, Vishanth Weerakkody:
E-government adoption: A cultural comparison. Inf. Syst. Frontiers 10(4): 473-482 (2008) - Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan:
An OVAL-based active vulnerability assessment system for enterprise computer networks. Inf. Syst. Frontiers 10(5): 573-588 (2008) - Yogesh Kumar Dwivedi
, Michael D. Williams
, Viswanath Venkatesh:
Guest Editorial: A profile of adoption of Information & Communication Technologies (ICT) research in the household context. Inf. Syst. Frontiers 10(4): 385-390 (2008) - Julie Fisher, Rudy Hirschheim, Robert Jacobs:
Understanding the outsourcing learning curve: A longitudinal analysis of a large Australian company. Inf. Syst. Frontiers 10(2): 165-178 (2008) - Cevriye Gencer, Emel Kizilkaya Aydogan, Coskun Celik:
A decision support system for locating VHF/UHF radio jammer systems on the terrain. Inf. Syst. Frontiers 10(1): 111-124 (2008) - Tim Goles, Stephen Hawk, Kate M. Kaiser:
Information technology workforce skills: The software and IT services provider perspective. Inf. Syst. Frontiers 10(2): 179-194 (2008) - Marie Griffiths, Ben Light
:
Social networking and digital gaming media convergence: Classification and its consequences for appropriation. Inf. Syst. Frontiers 10(4): 447-459 (2008) - Rudy Hirschheim, Jens Dibbern, Armin Heinzl:
Foreword to the special issue on IS sourcing. Inf. Syst. Frontiers 10(2): 125-127 (2008) - Clyde W. Holsapple, Jiming Wu:
Building effective online game websites with knowledge-based trust. Inf. Syst. Frontiers 10(1): 47-60 (2008) - Se-Joon Hong, James Y. L. Thong
, Jae Yun Moon, Kar Yan Tam
:
Understanding the behavior of mobile data services consumers. Inf. Syst. Frontiers 10(4): 431-445 (2008) - Borka Jerman-Blazic:
Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading. Inf. Syst. Frontiers 10(1): 103-110 (2008) - Mary C. Lacity, Vidya V. Iyer, Prasad S. Rudramuniyaiah:
Turnover intentions of Indian IS professionals. Inf. Syst. Frontiers 10(2): 225-241 (2008) - Jae-Nam Lee, Minh Q. Huynh, Rudy Hirschheim:
An integrative model of trust on IT outsourcing: Examining a bilateral perspective. Inf. Syst. Frontiers 10(2): 145-163 (2008) - Ling Li, Ricardo Valerdi
, John N. Warfield:
Advances in enterprise information systems. Inf. Syst. Frontiers 10(5): 499-501 (2008) - Ling Li, Li Xu, Hueiwang Anna Jeng, Dayanand N. Naik, Thomas Allen, Maria Frontini:
Creation of environmental health information system for public health service: A pilot study. Inf. Syst. Frontiers 10(5): 531-542 (2008) - Ji Ma, Mehmet A. Orgun
:
Formalising theories of trust for authentication protocols. Inf. Syst. Frontiers 10(1): 19-32 (2008) - Mohammad M. Masud
, Latifur Khan
, Bhavani Thuraisingham:
A scalable multi-level feature extraction technique to detect malicious executables. Inf. Syst. Frontiers 10(1): 33-45 (2008) - Dinesh A. Mirchandani, Julius H. Johnson Jr., Kailash Joshi:
Perspectives of citizens towards e-government in Thailand and Indonesia: A multigroup analysis. Inf. Syst. Frontiers 10(4): 483-497 (2008) - Charles Møller
, Sohail S. Chaudhry
, Bent Jørgensen:
Complex service design: A virtual enterprise architecture for logistics service. Inf. Syst. Frontiers 10(5): 503-518 (2008) - Kweku-Muata Osei-Bryson, Ojelanki K. Ngwenyama
:
Decision models for information systems management. Inf. Syst. Frontiers 10(3): 277-279 (2008) - Malgorzata Plaza:
Team performance and information system implementation. Inf. Syst. Frontiers 10(3): 347-359 (2008) - T. S. Raghu, Wonseok Woo, S. B. Mohan, H. Raghav Rao:
Market reaction to patent infringement litigations in the information technology industry. Inf. Syst. Frontiers 10(1): 61-75 (2008) - Ram Ramesh, H. Raghav Rao:
Editorial. Inf. Syst. Frontiers 10(1): 1-2 (2008) - Lila Rao, Kweku-Muata Osei-Bryson:
An approach for incorporating quality-based cost-benefit analysis in data warehouse design. Inf. Syst. Frontiers 10(3): 361-373 (2008)
skipping 18 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-27 13:39 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint