Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 550 matches
- 2006
- Abdelnasser Abdelaal, Hesham H. Ali:
Ubiquitous Connectivity: A Framework for Business Models for Wireless Community Networks. AMCIS 2006: 229 - Abdelnasser Abdelaal, Hesham H. Ali:
On Incorporating QoS Parameters in M-commerce Applications. AMCIS 2006: 243 - Sue Abdinnour-Helm, Khawaja Asjad Saeed:
Examining Post Adoption Usage: Conceptual Development and Empirical Assessment. AMCIS 2006: 148 - Tarun Abhichandani, Thomas A. Horan:
Toward A New Evaluation Model of E-Government Satisfaction: Results of Structural Equation Modeling. AMCIS 2006: 35 - Chon Abraham, Iris A. Junglas:
Theory Meets Practice: A Proposal Concerning Information Systems Research in Nursing Informatics. AMCIS 2006: 334 - Lascelles Adams, Ouafaa Elgarah, Sandra M. Richardson, James F. Courtney:
The DAGS Model: Relevance to Environmental Decision Support Systems. AMCIS 2006: 193 - Johan Aderud:
Measuring Flow While Playing Computer Mediated Games: A Pilot Study. AMCIS 2006: 79 - Boonlit Adipat, Dongsong Zhang:
Personalized and Tree-Navigation Interfaces for Mobile Web Applications. AMCIS 2006: 349 - Miguel I. Aguirre-Urreta, George M. Marakas, Virginia Ilie:
A Deeper Look at Technology Adoption: Moderation and Technology Selection. AMCIS 2006: 146 - Altaf Ahmad, Ronnie Jia:
Enterprise Systems and Intraorganizational Interdependence: A Task-Technology Fit Perspective. AMCIS 2006: 302 - Asli Yagmur Akbulut, Clayton Arlen Looney, Jaideep Motwani:
Majoring In Information Systems: Examining the Factors Affecting Student Choice. AMCIS 2006: 254 - Andrew Aken:
Towards a Functional GDSS: A New Framework. AMCIS 2006: 199 - Ghada Alaa, Jaco Appelman, Guy Fitzgerald:
Process Support for Agile Requirements Modeling and Maintenance of E-Projects. AMCIS 2006: 14 - Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul B. Fox:
Negotiation and Power in the Cybercrime Framework. AMCIS 2006: 8 - Christine Alexander, Lola Smith, Darla Hunt:
Inhibitors and Influencers of Rural Students' Technology-Related Career Choices. AMCIS 2006: 281 - Maged Ali, Laurence D. Brooks, Sarmad Alshawi, Anastasia Papazafeiropoulou:
Cultural Dimensions and CRM Systems Implementation: A Preliminary Framework. AMCIS 2006: 174 - Eileen Ang, Janice Kwan, Jascelyn Teo, Cecil Chua:
Why Do People Pay for Information Goods? A Study of the Online Porn Industry. AMCIS 2006: 9 - Hina Arora, Paul John Steinbart, Benjamin B. M. Shao:
Looking at Information Security through a Prospect Theory Lens. AMCIS 2006: 167 - Shimelis G. Assefa, Victor R. Prybutok:
Towards a comprehensive model to predict perceived performance impact of wireless/mobile computing in a mandatory environment. AMCIS 2006: 324 - Kregg Aytes, Steve Byers, Mukunthan Santhanakrishnan:
The Economic Impact of Information Security Breaches: Firm Value and Intra-industry Effects. AMCIS 2006: 399 - Ramakrishna Ayyagari, Raymond M. Henry, Russell L. Purvis:
A Conceptual Framework of the Alignment of the Project Management Office (PMO) with the Organizational Structure. AMCIS 2006: 449 - Seong Bae, Soongoo Hong, Kye Doo, Sang Hee:
Suppliers' Internal Capabilities and Participation in the Electronic Market. AMCIS 2006: 232 - Kallol Kumar Bagchi, Mo Adam Mahmood:
A Longitudinal Study of a Business Model of On-line Shopping Behavior Using a Latent Growth Curve Approach. AMCIS 2006: 240 - Arlene Bailey, Gerald Grant:
IT Governance in Virtual Communities: An exploration of the issues in the Caribbean context. AMCIS 2006: 530 - Akhilesh Bajaj:
Inferring the User Interface from an EER Data Schema. AMCIS 2006: 471 - Probir Banerjee, Kwok Kee Wei, Louis C. K. Ma, One-Ki Daniel Lee:
From BPO to BPM: An Assessment of the BPO Vendor's Ability to Make a Successful Transition. AMCIS 2006: 382 - Gaurav Bansal, Fatemeh Zahedi:
Exploring Cultural Contents of Website Images. AMCIS 2006: 170 - Joseph Barjis:
A Speech-Act Based Methodology for System Analysis. AMCIS 2006: 466 - Dinesh Batra, Thant Sin, Sheng Ying:
Modified Agile Practices for Outsourced Software Projects. AMCIS 2006: 465 - Matthias Baume, Oliver Knut, Helmut Krcmar:
Learn to Decide and Communicate like an IT Manager: Designing a Business Game for IS Education. AMCIS 2006: 267
skipping 520 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 12:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint