


default search action
Information Resources Management Journal, Volume 18
Volume 18, Number 1, 2005
- Denise Johnson McManus, Houston H. Carr, Charles A. Snyder:

An Investigation of Telecommunications as a Plan Location Decision Criterion. 1-13 - Laura Lally:

Information Technology as a Target and Shield in the Post 9/11 Environment. 14-28 - Alan R. Peslak:

Internet Privacy Policies: A Review and Survey of the Fortune 50. 29-41 - Tatyana V. Bondarouk, Klaas Sikkel:

Explaining IT Implementation Through Group Learning. 42-60 - Deirdre A. Folkers:

Competing in the Marketspace: Incorporating Online Education into High Education - An Organizational Perspective. 61-77
Volume 18, Number 2, 2005
- Mary C. Jones:

Tacit Knowledge Sharing During ERP Implementation: A Multi-Site Case Study. 1-23 - Craig Van Slyke

, France Bélanger, Varadharajan Sridhar
:
A Comparison of American and Indian Consumers' Perceptions of Electronic Commerce. 24-40 - Ned Kock:

Compensatory Adaptation to Media Obstacles: An Experimental Study of Process Redesign Dyads. 41-67 - Omar E. M. Khalil, Manal M. Elkordy:

EIS Information: Use and Quality Determinants. 68-93 - Victoria Y. Yoon, Barbara D. Broome, Rahul Singh, Tor Guimaraes:

Using Agent Technology for Company Knowledge Management. 94-113
Volume 18, Number 3, 2005
- Sanjay Bapna, Aryya Gangopadhyay:

A Web-Based GIS for Analyzing Commercial Motor Vehicle Crashes. 1-12 - Virginia Ilie, Craig Van Slyke

, Gina Green, Hao Lou:
Gender Differences in Perceptions and Use of Communication Technologies: A Diffusion of Innovation Approach. 13-31 - D. Harrison McKnight, Norman L. Chervany:

What Builds System Troubleshooter Trust the Best: Experiential or Non-Experiential Factors? 32-49 - J. Michael Pearson, Ann M. Pearson, J. P. Shim:

The Relevancy of Information Systems Research: The Practitioner's View. 50-67 - Ronald Dattero, Stuart Diaz Galup, Jim Jing Quan

:
Assessing Gender Differences in Software Developers Using the Human Capital Model. 68-87
Volume 18, Number 4, 2005
- Margi Levy, Philip Powell, Les Worrall:

Strategic Intent and E-Business in SMEs: Enablers and Inhibitors. 1-20 - Neil F. Doherty, Heather Fulford:

Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis. 21-39 - Abhishek Nirjar

, Andrew Tylecote:
Breaking Out of Lock-In: Insights from Case Studies into Ways Up the Value Ladder for Indian Software SMEs. 40-61 - Monideepa Tarafdar

, Jie Jennifer Zhang
:
Analyzing the Influence of Web Site Design Parameters on Web Site Usability. 62-80 - Souren Paul

, Carol Stoak Saunders, William (Dave) Haseman:
A Question of Timing: The Impact of Information Acquisitions on Group Design Making. 81-99

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














