| How enterprise architecture improves the quality of IT investment decisions |
Fe:160 |
OR/MS / 62 / 5-6 / 443 |
| Swarm debugging: The collective intelligence on interactive debugging |
Fe:160 |
OR/MS / 62 / 5-6 / 447 |
| Evaluating large-scale IT investment decisions |
Fd:160 |
OR/MS / 61 / 1-2 / 125 |
| On buyer selection of service providers in online outsourcing platforms for IT services |
Fc:160 |
OR/MS / 59 / 3-4 / 325 |
| Logic pluralism in mobile platform ecosystems: A study of indie app developers on the ios app store |
Fe:160 |
OR/MS / 59 / 3-4 / 331 |
| Continued voluntary participation intention in firm-participating open source software projects |
Fe:160 |
OR/MS / 59 / 3-4 / 333 |
| Approaches to strategic alignment of software process
improvement: A systematic literature review |
Fe:160 |
OR/MS / 58 / 5-6 / 557 |
| A dynamic network measure of
technological change |
Fe:160 |
OR/MS / 58 / 3 / 271 |
| A roadmap for scalable agent organizations in the internet of
everything |
Fc:160 |
OR/MS / 58 / 1-2 / 137 |
| On the design of a maintainable software development kit
to implement integration solutions |
Fe:160 |
OR/MS / 58 / 1-2 / 147 |
| Malware detection using nonparametric Bayesian clustering
and classification techniques |
Fe:160 |
OR/MS / 57 / 5-6 / 563 |
| Versioning in the software industry:
Heterogeneous disutility from underprovisioning of functionality |
Fe:160 |
OR/MS / 57 / 4 / 391 |
| Is a Cambrian Explosion coming for robotics? |
Fa:160 |
OR/MS / 56 / 5-6 / 549 |
| Optimal policies for security patch management |
Fc:160 |
OR/MS / 56 / 5-6 / 561 |
| Bringing test-driven development to web service choreographies |
Fc:160 |
OR/MS / 56 / 1-2 / 143 |
| Glamorizing rampage online:
School shooting fan communities on YouTube |
Bc:160 |
OR/MS / 55 / 5-6 / 459 |
| A dynamic code coverage approach to maximize fault localization efficiency |
Fe:160 |
OR/MS / 55 / 5-6 / 565 |
| Combining mutation and fault location for automated program debugging |
Fe:160 |
OR/MS / 55 / 5-6 / 567 |
| Product life-cycle management of packaged software |
Fe:160 |
OR/MS / 55 / 5-6 / 569 |
| A reliability model for service component architectures |
Fe:160 |
OR/MS / 55 / 4 / 397 |
| Power aware scheduling algorithm for sporadic tasks in real-time systems |
Cc:160 |
OR/MS / 55 / 3 / 235 |
| Assessing the reliability, validity and acceptance of a classification scheme of usability problems (CUP) |
Fe:160 |
OR/MS / 55 / 3 / 277 |
| Networks, social influence, and the choice among competing innovations: Insights from open source software licenses |
Af:160 |
OR/MS / 55 / 1-2 / 27 |
| Status locality on the Web: Implications for building focused collections |
Fc:160 |
OR/MS / 55 / 1-2 / 149 |
| Class-restricted clustering and micro-perturbation for data privacy |
Fc:160 |
OR/MS / 54 / 5-6 / 553 |
| IT service climate, antecedents and IT service quality outcomes: Some initial evidence |
Ff:160 |
OR/MS / 54 / 5-6 / 557 |
| Staffing and control of instant messaging contact centers |
Cc:160 |
OR/MS / 54 / 3 / 225 |
| Software ecosystems – A systematic literature review |
Fc:160 |
OR/MS / 54 / 3 / 269 |
| Human capital investments and employee performance: An analysis of IT services industry |
Bd:160 |
OR/MS / 54 / 1-2 / 57 |
| Chaos-based detection of LDoS attacks |
Fc:160 |
OR/MS / 54 / 1-2 / 137 |
| A mathematical framework for data quality management in enterprise systems |
Fa:160 |
OR/MS / 53 / 5-6 / 545 |
| Information systems strategy: Past, present, future? |
Fd:160 |
OR/MS / 53 / 5-6 / 565 |
| Elephant and Samurai: Differences between Indian and Japanese supply chain management |
Fa:160 |
OR/MS / 53 / 4 / 389 |
| The economics of spam |
Fc:160 |
OR/MS / 53 / 4 / 393 |
| Malware characteristics and threats on the internet ecosystem |
Fe:160 |
OR/MS / 53 / 4 / 397 |
| Technology adoption with uncertain future costs and quality |
Ef:160 |
OR/MS / 53 / 3 / 251 |
| Informing strategic IS change: Towards a ‘meta-learning’ framework |
Fe:160 |
OR/MS / 53 / 3 / 265 |
| A longitudinal study of an emerging software ecosystem:
Implications for practice and theory |
Fe:160 |
OR/MS / 53 / 3 / 269 |
| Client strategies in vendor transition: A threat balancing perspective |
Af:160 |
OR/MS / 53 / 1-2 / 21 |
| Drivers, barriers and critical success factors for ERPII implementation in supply chains: A critical analysis |
Ah:160 |
OR/MS / 53 / 1-2 / 51 |
| An assessment of the use of transaction cost theory in information technology outsourcing |
Db:160 |
OR/MS / 53 / 1-2 / 85 |
| Building nation-wide information infrastructures in
healthcare through modular implementation strategies |
Fa:160 |
OR/MS / 53 / 1-2 / 115 |
| Duality of weakly disposable technology |
Fa:160 |
OR/MS / 53 / 1-2 / 117 |
| A modeling and simulation-based methodology to support dynamic negotiation for web service applications |
Fc:160 |
OR/MS / 53 / 1-2 / 125 |
| On the estimation of adequate test set size using fault failure rates |
Fe:160 |
OR/MS / 53 / 1-2 / 129 |
| Controlling software architecture erosion: A survey |
Fe:160 |
OR/MS / 53 / 1-2 / 131 |
| An empirical investigation on the reusability of design patterns and software packages |
Fe:160 |
OR/MS / 53 / 1-2 / 133 |
| FeGC: An efficient garbage collection scheme for flash
memory based storage systems |
Fe:160 |
OR/MS / 53 / 1-2 / 135 |
| Dominant design or multiple designs: The flash memory card case |
Af:160 |
OR/MS / 52 / 5-6 / 441 |
| Efficiency and evaluation analysis of a network of technology transfer brokers |
Fa:160 |
OR/MS / 52 / 5-6 / 541 |
| Managing versions of a software product under variable and endogenous demand |
Fe:160 |
OR/MS / 52 / 5-6 / 553 |
| Open platform strategies and innovation: Granting access vs. devolving control |
Fa:160 |
OR/MS / 52 / 4 / 385 |
| Technology transfer across organizational boundaries: Absorptive capacity and desorptive capacity |
Fa:160 |
OR/MS / 52 / 4 / 389 |
| Optimal bundling of technological products with network externality |
Cc:160 |
OR/MS / 52 / 3 / 231 |
| Target age and the acquisition of innovation in high-technology industries |
Fa:160 |
OR/MS / 52 / 3 / 263 |
| Framework for building a low-cost, scalable, and secured platform for web-delivered business services |
Fc:160 |
OR/MS / 52 / 3 / 277 |
| Balancing IT with the human touch: Optimal investment in IT-based customer service |
Fd:160 |
OR/MS / 52 / 1-2 / 147 |
| Work-domain knowledge in usability evaluation: Experiences with cooperative usability testing |
Fe:160 |
OR/MS / 52 / 1-2 / 149 |
| The effects of technological turbulence and breadth on supply chain technology acceptance and adoption |
Ah:160 |
OR/MS / 51 / 5-6 / 457 |
| The effect of perceived novelty on the adoption of information technology innovations: A risk/reward perspective |
Ef:160 |
OR/MS / 51 / 5-6 / 511 |
| Quality of search engines: How good is Google pagerank? |
Fc:160 |
OR/MS / 51 / 5-6 / 563 |
| Get the most out of green IT solutions |
Fd:160 |
OR/MS / 51 / 5-6 / 565 |
| IT service value creation in a global environment |
Fd:160 |
OR/MS / 51 / 5-6 / 567 |
| Survey of data management and analysis in disaster situations |
Fd:160 |
OR/MS / 51 / 5-6 / 571 |
| Strategic product/service innovations of an online firm |
Af:160 |
OR/MS / 51 / 4 / 325 |
| Configuration of the interaction between information security technologies: The case of firewalls and intrusion detection systems |
Fd:160 |
OR/MS / 51 / 4 / 393 |
| Willingness to pay in an open source software environment |
Fd:160 |
OR/MS / 51 / 4 / 395 |
| Adaptive random testing based on distribution metrics |
Fe:160 |
OR/MS / 51 / 4 / 397 |
| The role of contracts on quality and returns to quality in offshore software development outsourcing |
Fe:160 |
OR/MS / 51 / 4 / 399 |
| Assessing socially disruptive technological change |
Fc:160 |
OR/MS / 51 / 3 / 269 |
| Bandit cellphones: A blue ocean strategy |
Fa:160 |
OR/MS / 51 / 1-2 / 135 |
| The reliability of user authentication through keystroke dynamics |
Fa:160 |
OR/MS / 51 / 1-2 / 139 |
| An overview of social engineering malware: Trends, tactics, and implications |
Fc:160 |
OR/MS / 51 / 1-2 / 141 |
| String theory, French horns, and the infrastructure of cyberspace |
Fc:160 |
OR/MS / 51 / 1-2 / 145 |
| Capability, quality, and performance of offshore IS vendors: A theoretical framework and empirical investigation |
Af:160 |
OR/MS / 50 / 5-6 / 441 |
| Defence and attack of systems with variable attacker system structure detection probability |
Fd:160 |
OR/MS / 50 / 5-6 / 575 |
| Detecting artifact anomalies in business process specifications with a formal model |
Fe:160 |
OR/MS / 50 / 4 / 403 |
| A modified fuzzy clustering for documents retrieval: Application to document categorization |
Ec:160 |
OR/MS / 50 / 1-2 / 117 |
| Uncertainty, information acquisition, and technology adoption |
Ef:160 |
OR/MS / 50 / 1-2 / 127 |
| Predicating of defects in software developing process |
Fe:160 |
OR/MS / 50 / 1-2 / 139 |