


default search action
European Journal of Information Systems, Volume 18
Volume 18, Number 1, February 2009
- Richard L. Baskerville

:
The EJIS editorial organisation and submissions. 1-3
- Sigi Goode

, Shirley Gregor
:
Rethinking organisational size in IS research: meaning, measurement and redevelopment. 4-25 - Joshua M. Davis

, William J. Kettinger, Dimitar G. Kunev:
When users are IT experts too: the effects of joint IT competence and partnership on satisfaction with enterprise-level systems implementation. 26-37 - Ting Li, Eric van Heck, Peter Vervest

:
Information capability and value creation strategy: advancing revenue management through mobile ticketing technologies. 38-51 - Peter Meso

, Philip F. Musa, Detmar W. Straub, Victor Wacham A. Mbarika:
Information infrastructure, governance, and socio-economic development in developing countries. 52-65 - Anita Mangan, Séamas Kelly:

Information systems and the allure of organisational integration: a cautionary tale from the Irish financial services sector. 66-78 - Eduardo Redondo

, Elizabeth M. Daniel
, John M. Ward:
Combining the rational and relational perspectives of electronic trading. 79-97
- Selamawit Molla Mekonnen, Sundeep Sahay:

An institutional analysis on the dynamics of the interaction between standardizing and scaling processes: a case study from Ethiopia. 98
Volume 18, Number 2, April 2009
- Merrill Warkentin

, Robert Willison:
Behavioral and policy issues in information systems security: the insider threat. 101-105
- Tejaswini C. Herath, H. Raghav Rao:

Protection motivation and deterrence: a framework for security policy compliance in organisations. 106-125 - Liisa Myyry

, Mikko T. Siponen, Seppo Pahnila, Tero Vartiainen, Anthony Vance
:
What levels of moral reasoning and values explain adherence to information security rules? An empirical study. 126-139 - Carol W. Hsu:

Frame misalignment: interpreting the implementation of information systems security certification in an organization. 140-150 - Scott R. Boss, Laurie J. Kirsch, Ingo Angermeier, Raymond A. Shingler, R. Wayne Boss:

If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security. 151-164 - Jie Zhang

, Xin (Robert) Luo, Somasheker Akkaladevi, Jennifer L. Ziegelmayer
:
Improving multiple-password recall: an empirical study. 165-176 - Younghwa Lee, Kai R. T. Larsen:

Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software. 177-187
Volume 18, Number 3, June 2009
- Ray J. Paul:

What is published in our journals cannot change unless we do. 189-191
- Fay Cobb Payton, James Kiwanuka-Tondo

:
Contemplating public policy in HIV/AIDS online content, then where is the technology spirit? 192-204 - Israr Qureshi

, Yulin Fang
, Elaine Ramsey
, Patrick McCole, Patrick Ibbotson
, Deborah Compeau:
Understanding online customer repurchasing intention and the mediating role of trust - an empirical investigation in two developed countries. 205-222 - Mohammed Ibrahim, Pieter M. A. Ribbers:

The impacts of competence-trust and openness-trust on interorganizational systems. 223-234 - Bjarne Berg, Antonis C. Stylianou:

Factors considered when outsourcing an IS system: an empirical examination of the impacts of organizational size, strategy and the object of a decision. 235-248 - Claudio Vitari

, Aurelio Ravarini
:
A longitudinal analysis of trajectory changes in the software industry: the case of the content management application segment. 249-263 - Fernando Alonso Mendo, Guy Fitzgerald, Enrique Frías-Martínez

:
Understanding web site redesigns in small- and medium-sized enterprises (SMEs): a U.K.-based study on the applicability of e-commerce Stage Models. 264-279
Volume 18, Number 4, August 2009
- Pekka Abrahamsson

, Kieran Conboy
, Xiaofeng Wang
:
'Lots done, more to do': the current state of agile systems development research. 281-284
- Saonee Sarker, Charles L. Munson

, Suprateek Sarker, Suranjan Chakraborty:
Assessing the relative contribution of the facets of agility to distributed systems development success: an Analytic Hierarchy Process approach. 285-299 - Fredrik J. Karlsson

, Pär J. Ågerfalk:
Exploring agile values in method configuration. 300-316 - Daniel Port, Tung Bui:

Simulating mixed agile and plan-based requirements prioritization strategies: proof-of-concept and practical implications. 317-331 - Lan Cao, Kannan Mohan, Peng Xu, Balasubramaniam Ramesh

:
A framework for adapting agile development methodologies. 332-343 - George Mangalaraj, RadhaKanta Mahapatra, Sridhar P. Nerur:

Acceptance of software process innovations - the case of extreme programming. 344-354 - Likoebe M. Maruping

, Xiaojun Zhang, Viswanath Venkatesh:
Role of collective ownership and coding standards in coordinating expertise in software project teams. 355-371 - John McAvoy

, Tom Butler:
The role of project management in ineffective decision making within Agile software development projects. 372-383
Volume 18, Number 5, October 2009
- Hans van der Heijden

:
Progress in information systems research. 385-386
- Boriana Rukanova, Eveline Van Stijn, Helle Zinner Henriksen, Ziv Baida, Yao-Hua Tan:

Understanding the influence of multiple levels of governments on the development of inter-organizational systems. 387-408 - Rajendra Singh

, Mark Keil, Vijay Kasi:
Identifying and overcoming the challenges of implementing a project management office. 409-427 - Pernille Bjørn, Sue Burgoyne, Vicky Crompton, Teri MacDonald, Barbe Pickering, Sue Munro:

Boundary factors and contextual contingencies: configuring electronic templates for healthcare professionals. 428-441 - Chaojie Duan, Varun Grover

, Nagraj (Raju) Balakrishnan:
Business Process Outsourcing: an event study on the nature of processes and firm valuation. 442-457
- Cynthia K. Riemenschneider

, Deborah J. Armstrong, Jo Ellen Moore:
Meeting the demand for IT workers: A call for research. 458-461
- Nathan Heinze, Qing Hu:

Why college undergraduates choose IT: a multi-theoretical perspective. 462-475 - Eileen M. Trauth, Jeria L. Quesenberry, Haiyan Huang:

Retaining women in the U.S. IT workforce: theorizing the influence of organizational factors. 476-497 - Gaëtan Mourmant, Michael J. Gallivan, Michel Kalika:

Another road to IT turnover: the entrepreneurial path. 498-521
Volume 18, Number 6, December 2009
- Richard L. Baskerville

:
Preparing for evidence-based management. 523-525
- Gaurav Kapoor, Wei Zhou

, Selwyn Piramuthu:
Challenges associated with RFID tag implementations in supply chains. 526-533
- Indranil Bose, Eric W. T. Ngai

, Thompson S. H. Teo, Sarah Spiekermann:
Managing RFID projects in organizations. 534-540
- Katerina Pramatari, Aristeidis Theotokis

:
Consumer acceptance of RFID-enabled services: a model of multiple attitudes, perceived system characteristics and individual traits. 541-552 - Robert F. Otondo

, Allison W. Pearson, Rodney A. Pearson, John C. Shaw, Jung P. Shim:
Managerial problem-solving in the adoption of Radio Frequency Identification Technologies. 553-569 - Wei Zhou

, Gaurav Kapoor, Selwyn Piramuthu:
RFID-enabled item-level product information revelation. 570-577 - Henning Baars, Daniel Gille, Jens Strüker

:
Evaluation of RFID applications for logistics: a framework for identifying, forecasting and assessing benefits. 578-591 - Frédéric Thiesse, Jasser Al-Kassab, Elgar Fleisch:

Understanding the value of integrated RFID systems: a case study from apparel retail. 592-614 - Samuel Fosso Wamba

, Akemi Takeoka Chatfield
:
A contingency model for creating value from RFID supply chain network projects in logistics and manufacturing environments. 615-636

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














