Abstract is missing.
- Heinz Zemanek's Almost Forgotten Contributions to the Early Philosophy of InformaticsStefan Gruner. 1 [doi]
- The Data Driven Decision RACE in eRetailingNiklas Eriksson, Mikael Forsström, Carl-Johan Rosenbröijer. 2 [doi]
- Course Design Principles to Support the Learning of Complex Information InfrastructuresCorina Raduescu, Jenny Leonard, Catherine Hardy. 3 [doi]
- The Use of Chinese-language Internet Information about Cancer by Chinese Health ConsumersXinxing Zhang, James R. Warren, Yulong Gu. 4 [doi]
- Cloud Computing Adoption: An Effective Tailoring ApproachMahdi Fahmideh Gholami, Farhad Daneshgar, Fethi Rabhi. 5 [doi]
- Making Sense of Disruption: A Kuhnian AnalysisKai Riemer, Robert Bruce Johnston. 6 [doi]
- ITIL compliance with a Service Perspective: a Review Based on Service-Dominant LogicStefan Cronholm, Hannes Göbel. 7 [doi]
- Mitigating BYOD Information Security RisksDaniel Alejandro Arregui, Sean B. Maynard, Atif Ahmad. 8 [doi]
- Location privacy acceptance: attitudes to transport-based location-aware mobile applications on a university campusPeter W. Eklund, Edward Dou, Ulrike Gretzel. 9 [doi]
- Design in Complex EnvironmentsIgor Hawryszkiewycz. 10 [doi]
- Empirical Evaluation of Action Design ResearchStefan Cronholm, Hannes Göbel, Anders Hjalmarsson. 11 [doi]
- Boundary Spanning Theory: a Case Study of the Professionalisation of ICT Graduates in the Australian Public ServiceDale Mackrell, Craig McDonald, Fiona Buick, Dale Kleeman. 12 [doi]
- Optimising Visual Layout for Training and Learning TechnologiesBruce Hilliard, Jocelyn Armarego, Tanya McGill. 13 [doi]
- Big data in Financial Management a structured literature review and Opportunities for IS researchSophie Cockcroft. 14 [doi]
- Online patient education design features: are there any differences in opinion based on consumer's stage of change?Naffisah Mohd Hassan, Khin Than Win, Harri Oinas-Kukkonen. 15 [doi]
- Inscribing Service into IT Service ManagementHannes Göbel, Stefan Cronholm, Anders Hjalmarsson. 16 [doi]
- Country Selection and Impact IT Sourcing: Relationships Between Business Factors and Social InequalityAllen Higgins, Babak Saadatmandi. 17 [doi]
- ICT and Public Service Value Creation in Africa: Efficiency Assessment Using DEA approachLucas Mimbi, Felix Olu Bankole. 18 [doi]
- Stress-Based IS Security Compliance: Towards a Conceptual ModelHiep Cong Pham 0001, Linda Brennan, Joan Richardson. 19 [doi]
- Facebook Usage During a Flood - a Content Analysis of Two Local Governments' Facebook PagesMonika Magnusson. 20 [doi]
- Compliance Principles for Decision Management Solutions at the Dutch GovernmentKoen Smit, Martijn Zoet, Raymond Slot. 21 [doi]
- Who's in to Win?: Participation Rate in a Primary Personal Information MarketRoss Farrelly, Eng Chew. 22 [doi]
- A Case Study of Stakeholder Perspectives on a Flipped Classroom Initiative Using an Organizational Routines LensMary Tate, Rory Sudfeld, Jennifer Campbell-Meier, Mark McGuire. 23 [doi]
- Adding Dimension to Content: Immersive Virtual Reality for e-CommerceWanxian Zeng, Alex Richardson. 24 [doi]
- Lost in Translation: The Influence of Translated Information Quality on Foreign ShoppersWanxian Zeng, Alex Richardson. 25 [doi]
- Investigating the Impact of Institutional Pressures on Information Security Compliance in OrganizationsAhmed AlKalbani, Hepu Deng, Booi Kam 0001, Julia Zhang. 26 [doi]
- Using Social Media for Business Communication: A Symbolic Interaction PerspectiveRenee Rui Chen, Robert M. Davison, Carol Xiaojuan Ou. 27 [doi]
- Customising Agent Based Analysis Towards Analysis of Disaster Management KnowledgeDedi Iskandar Inan, Ghassan Beydoun, Simon Opper. 28 [doi]
- Attributes, Processes, and Tendencies applied to Government Information Technology OutsourcingRichard Rannard, Lesley Land, Ken Stevens. 29 [doi]
- Who influences information security behaviours of young home computer users in Vietnam? An ego-centric network analysis approachDuy Dang-Pham, Siddhi Pittayachawan, Vince Bruno. 30 [doi]
- Barriers Inhibiting the Development of a Self-Sustaining Virtual Learning Cluster of Schools in New Zealand: The Case of the C-Net ClusterArif Ali, Pak Yoong, Allan Sylvester. 31 [doi]
- An Investigation of How and Why Managers Use Tablets to Support Decision MakingMeng Xiao, Caddie Gao, Rob Meredith. 32 [doi]
- Legitimising Information Security Policy during Policy Crafting: Exploring Legitimising StrategiesElina Niemimaa. 33 [doi]
- Towards a Model for Discourse Ethics-based Digital Business Strategy DevelopmentOliver Degner, Andreas Drechsler. 34 [doi]
- Managing Distribution Logistics Using Enterprise SystemsSanjay Mathrani. 35 [doi]
- Observer's Galvanic Skin Response for Discriminating Real from Fake SmilesMd. Zakir Hossain, Tom Gedeon, Ramesh S. Sankaranarayana. 36 [doi]
- Challenges in Product Lifecycle Management - Evidence from the Automotive Supply IndustryManuel Holler, Falk Uebernickel, Walter Brenner. 37 [doi]
- Governance Policies in IT Service SupportAbhinay Puvvala, Veerendra-Kumar Rai, Rutuja Patil. 38 [doi]
- Understanding the dynamics of Bvit Process: a Complex adaptive Systems ApproachMohammad Fakhrul Alam Onik, Erwin Fielt. 39 [doi]
- Do retailers leverage consumer social media content for innovation? An exploratory studyJoanne F. Patroni, Frederik von Briel, Jan Recker. 40 [doi]
- Design Science Research: Building evaluation into the construction of indigenous cultural artefacts in New ZealandKevin Shedlock, Marta Vos, Sue Chard. 41 [doi]
- The influence of personal knowledge management on individual decision making in health care medical treatmentYi-Mei Huang, David Pauleen, Shane Scahill, Nazim Taskin. 42 [doi]
- Design methodologies for M-health innovations: a content analysisShah Jahan Miah, John G. Gammack, Najmul Hasan, Md. Rakibul Hoque. 43 [doi]
- Do they read your research? An investigation of practitioners' use of IT outsourcing and cloud sourcing researchMohammad Mehdi Rajaeian, Aileen Cater-Steel, Michael Lane. 44 [doi]
- A Model for the Adoption Process of Information System Security Innovations in Organisations: A Theoretical PerspectiveMumtaz Abdul Hameed, Nalin Asanka Gamagedara Arachchilage. 45 [doi]
- A SWOT Analysis of the IS Academic Discipline in AustraliaRobert W. Smyth, Guy Gable, Graham Pervan. 46 [doi]
- Self-Disclosure on Facebook: Comparing two Research OrganisationsKathryn Parsons, Dragana Calic, Carlos Barca. 47 [doi]
- Focusing on non-adopters of broadband: A critical realist perspectivePaul Jackson 0001, Philip Dobson, Denise Gengatharen. 48 [doi]
- Hello Computer: Towards a Research Agenda for Conceptualising "Presence" in Human-Computer EngagementMike Seymour, Ella Hafermalz. 49 [doi]
- Analysing Trust Issues in Cloud Identity EnvironmentsBrian Cusack, Eghbal Ghazizadeh. 50 [doi]
- A Conceptual Model for the Application of Business Analytics in the Horizontal Strategic AllianceJohn Janosko, Tingru Cui, Sim Kim Lau. 51 [doi]
- Motives behind Cyber Security Strategy Development: A Literature Review of National Cyber Security StrategyRiza Azmi, William Tibben, Khin Than Win. 52 [doi]
- Evaluation of Telehealth EquipmentOliver K. Burmeister, David Ritchie, Alison Devitt, Eevon Chia, Gregory Dresser. 53 [doi]
- Measuring Mobile Portal User SatisfactionDaisy Seng, Ly Fie Sugianto, Carla Wilkin. 54 [doi]
- Understanding the Curriculum Gap in Systems Analysis and Design: An Exploratory StudyMali Senapathi. 55 [doi]
- Test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire (HAIS-Q)Agata McCormac, Dragana Calic, Kathryn Parsons, Tara Zwaans, Marcus A. Butavicius, Malcolm Robert Pattinson. 56 [doi]
- Understanding Information System Innovation: Moving beyond adoption and diffusionBadrunnesa Zaman, Erwin Fielt. 57 [doi]
- Understanding Learning Outcome Divide in the Learning Process from a Teachers Perspective: A BYOD Case StudyJanak Adhikari, Anuradha Mathrani, David Parsons 0001, Chris Scogings. 58 [doi]
- How do environmental enterprise systems contribute to sustainability value? A practitioner-oriented frameworkGiang Hoang, Alemayehu Molla, Pak-Lok Poon. 59 [doi]
- The use of social media by adults with chronic illness: analysing the support mechanisms of four social media platformsNwakego Ugochi Isika, Antonette Mendoza, Rachelle Bosua. 60 [doi]
- Enhancing Information Security Risk Management with Security Analytics: A Dynamic Capabilities PerspectiveHumza Naseer, Graeme G. Shanks, Atif Ahmad, Sean B. Maynard. 61 [doi]
- Understanding Learning Outcomes through Member Needs, Motivation and Satisfaction: the Development of a Conceptual ModelMatt Halliwell, Mark Bruce Freeman, Khin Win. 62 [doi]
- Structural and Behavioural Model for Social Computing ApplicationsMarie D. Fernando, Athula Ginige, Ana Hol. 63 [doi]
- Understanding the Internet Pitchfork Mob: Internal Revolutionary Activity in Self-Regulated Online CommunitiesCatherine Olivia McRae, Jean-Grégoire Bernard, Jocelyn Cranefield. 64 [doi]
- The Multidimensionality of IT Outsourcing RisksAnna Zaitsev, Kenneth Stevens. 65 [doi]
- Modelling the underlying behavioural antecedents of the digital divide from the ability, motivation and opportunity frameworkAdedapo Oluwaseyi Ojo, Murali Raman. 66 [doi]
- The link between post-implementation learning motivation and enterprise resource planning system usage: a pilot studyChris Niyi Arasanmi. 67 [doi]
- It's only pixels, badges, and stars: On the economic value of reputation on AirbnbTimm Teubner, Norman Saade, Florian Hawlitschek, Christof Weinhardt. 68 [doi]
- Detecting Slow DDos Attacks on Mobile DevicesBrian Cusack, Raymond Lutui, Reza Khaleghparast. 69 [doi]
- Socially-Constructed Metrics for Agile Quality: An Action Research StudyJoão Barata, Sharon Coyle. 70 [doi]
- Trust-Promoting Seals in Green Information Systems: The Case of Smart Meters and PrivacyKenan Degirmenci. 71 [doi]
- Effective Use of Self-service Technology by Physically Disabled IndividualsMarjan Aslanzadeh, Byron W. Keating. 72 [doi]
- Integrating contextual and online self-reported data for personalized healthcare: a tennis elbow case studyTian Yu Goh, Frada Burstein, Pari Delir Haghighi, Rachelle Buchbinder, Margaret Staples. 73 [doi]
- An Information Systems Perspective on Digital Currencies: A Systematic Literature ReviewOsemwonyemwen Oshodin, Alemayehu Molla, Chin Eang Ong. 74 [doi]
- Measuring IS success of e-government: A case study of the disability sector in AustraliaGary Sterrenberg, Byron W. Keating. 75 [doi]
- Innovation and flexibility within a Bachelor of Information Systems transnational educational (TNE) programErin Roehrer, Leonie Ellis, Dean Steer. 76 [doi]
- The Sharing Economy and the Transformative Roles of IS: An Australian StudySteve Elliot, Ella Hafermalz, Dirk Hovorka, Sebastian K. Boell, Kai Riemer, Olivera Marjanovic. 77 [doi]
- Healthcare Consumers' Voluntary Adoption and Non-Adoption of Electronic Personal Health RecordsK. Niki Kunene, Kamila Zysk. 78 [doi]
- Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices: A Contextual ApproachCarlos Andres Agudelo, Rachelle Bosua, Sean B. Maynard, Atif Ahmad. 79 [doi]
- A M-Service Implementation in Large Government Organisation: A Case Study on an M-app in AustraliaMehdi Hussain, Ahmed Imran. 80 [doi]
- Key Challenges for Establishing CIO Position in the Public Sector of LDCs: A Case of BangladeshBashir Hussain, Ahmed Imran, Tim Turner. 81 [doi]
- Infusion of social innovation in outsourcing for developing countries: A case in NepalSojen Pradhan. 82 [doi]
- An Integrated Perspective on Factors Influencing Online Health-Information Seeking BehavioursAnnette Mills, Nelly Todorova. 83 [doi]
- Design Considerations for a Virtual Community of Practice for Health Practitioners: A Learner Centred Design ApproachAbdulaziz Murad, Reeva Lederman, Rachelle Bosua, Shanton Chang, John D. Wark. 84 [doi]
- Investigating the Nonlinear and Conditional Effects of Trust on Effective Customer Retention -The Role of Institutional ContextsHaiyun Zou, Israr Qureshi, Yulin Fang, Heshan Sun, Kai Lim, Elaine Ramsey, Patrick McCole. 85 [doi]
- Assessing student engagement in cross campus work in learning: a teaching case in corporate network managementWilliam Tibben, Shanmuga Sundram. 86 [doi]
- A Theory on Information SecurityCraig A. Horne, Atif Ahmad, Sean B. Maynard. 87 [doi]
- Managing Inherent Conflicts in Agile Distributed Development: Evidence from Product DevelopmentAshay Saxena, Shankar Venkatagiri, Rajendra K. Bandi. 88 [doi]
- Developing Acquisition IS Integration Capabilities: The Learning Processes of Novice AcquirersPeter Wynne. 89 [doi]
- Enhancing rule-based text classification of neurosurgical notes using filtered feature weight vectorsSedigheh Khademi, Pari Delir Haghighi, Frada Burstein, Christopher Palmer. 90 [doi]
- The Role of Experience of Practice for Perceptions of a new Technology - The Case of Building Information ModellingHenrik C. J. Linderoth, Anders Isaksson. 91 [doi]