Application: 160 (Management information systems)

Title Cat:App Page
Evaluating large-scale IT investment decisions Fd:160 OR/MS / 61 / 1-2 / 125
On buyer selection of service providers in online outsourcing platforms for IT services Fc:160 OR/MS / 59 / 3-4 / 325
Logic pluralism in mobile platform ecosystems: A study of indie app developers on the ios app store Fe:160 OR/MS / 59 / 3-4 / 331
Continued voluntary participation intention in firm-participating open source software projects Fe:160 OR/MS / 59 / 3-4 / 333
Approaches to strategic alignment of software process improvement: A systematic literature review Fe:160 OR/MS / 58 / 5-6 / 557
A dynamic network measure of technological change Fe:160 OR/MS / 58 / 3 / 271
A roadmap for scalable agent organizations in the internet of everything Fc:160 OR/MS / 58 / 1-2 / 137
On the design of a maintainable software development kit to implement integration solutions Fe:160 OR/MS / 58 / 1-2 / 147
Malware detection using nonparametric Bayesian clustering and classification techniques Fe:160 OR/MS / 57 / 5-6 / 563
Versioning in the software industry: Heterogeneous disutility from underprovisioning of functionality Fe:160 OR/MS / 57 / 4 / 391
Is a Cambrian Explosion coming for robotics? Fa:160 OR/MS / 56 / 5-6 / 549
Optimal policies for security patch management Fc:160 OR/MS / 56 / 5-6 / 561
Bringing test-driven development to web service choreographies Fc:160 OR/MS / 56 / 1-2 / 143
Glamorizing rampage online: School shooting fan communities on YouTube Bc:160 OR/MS / 55 / 5-6 / 459
A dynamic code coverage approach to maximize fault localization efficiency Fe:160 OR/MS / 55 / 5-6 / 565
Combining mutation and fault location for automated program debugging Fe:160 OR/MS / 55 / 5-6 / 567
Product life-cycle management of packaged software Fe:160 OR/MS / 55 / 5-6 / 569
A reliability model for service component architectures Fe:160 OR/MS / 55 / 4 / 397
Power aware scheduling algorithm for sporadic tasks in real-time systems Cc:160 OR/MS / 55 / 3 / 235
Assessing the reliability, validity and acceptance of a classification scheme of usability problems (CUP) Fe:160 OR/MS / 55 / 3 / 277
Networks, social influence, and the choice among competing innovations: Insights from open source software licenses Af:160 OR/MS / 55 / 1-2 / 27
Status locality on the Web: Implications for building focused collections Fc:160 OR/MS / 55 / 1-2 / 149
Class-restricted clustering and micro-perturbation for data privacy Fc:160 OR/MS / 54 / 5-6 / 553
IT service climate, antecedents and IT service quality outcomes: Some initial evidence Ff:160 OR/MS / 54 / 5-6 / 557
Staffing and control of instant messaging contact centers Cc:160 OR/MS / 54 / 3 / 225
Software ecosystems – A systematic literature review Fc:160 OR/MS / 54 / 3 / 269
Human capital investments and employee performance: An analysis of IT services industry Bd:160 OR/MS / 54 / 1-2 / 57
Chaos-based detection of LDoS attacks Fc:160 OR/MS / 54 / 1-2 / 137
A mathematical framework for data quality management in enterprise systems Fa:160 OR/MS / 53 / 5-6 / 545
Information systems strategy: Past, present, future? Fd:160 OR/MS / 53 / 5-6 / 565
Elephant and Samurai: Differences between Indian and Japanese supply chain management Fa:160 OR/MS / 53 / 4 / 389
The economics of spam Fc:160 OR/MS / 53 / 4 / 393
Malware characteristics and threats on the internet ecosystem Fe:160 OR/MS / 53 / 4 / 397
Technology adoption with uncertain future costs and quality Ef:160 OR/MS / 53 / 3 / 251
Informing strategic IS change: Towards a ‘meta-learning’ framework Fe:160 OR/MS / 53 / 3 / 265
A longitudinal study of an emerging software ecosystem: Implications for practice and theory Fe:160 OR/MS / 53 / 3 / 269
Client strategies in vendor transition: A threat balancing perspective Af:160 OR/MS / 53 / 1-2 / 21
Drivers, barriers and critical success factors for ERPII implementation in supply chains: A critical analysis Ah:160 OR/MS / 53 / 1-2 / 51
An assessment of the use of transaction cost theory in information technology outsourcing Db:160 OR/MS / 53 / 1-2 / 85
Building nation-wide information infrastructures in healthcare through modular implementation strategies Fa:160 OR/MS / 53 / 1-2 / 115
Duality of weakly disposable technology Fa:160 OR/MS / 53 / 1-2 / 117
A modeling and simulation-based methodology to support dynamic negotiation for web service applications Fc:160 OR/MS / 53 / 1-2 / 125
On the estimation of adequate test set size using fault failure rates Fe:160 OR/MS / 53 / 1-2 / 129
Controlling software architecture erosion: A survey Fe:160 OR/MS / 53 / 1-2 / 131
An empirical investigation on the reusability of design patterns and software packages Fe:160 OR/MS / 53 / 1-2 / 133
FeGC: An efficient garbage collection scheme for flash memory based storage systems Fe:160 OR/MS / 53 / 1-2 / 135
Dominant design or multiple designs: The flash memory card case Af:160 OR/MS / 52 / 5-6 / 441
Efficiency and evaluation analysis of a network of technology transfer brokers Fa:160 OR/MS / 52 / 5-6 / 541
Managing versions of a software product under variable and endogenous demand Fe:160 OR/MS / 52 / 5-6 / 553
Open platform strategies and innovation: Granting access vs. devolving control Fa:160 OR/MS / 52 / 4 / 385
Technology transfer across organizational boundaries: Absorptive capacity and desorptive capacity Fa:160 OR/MS / 52 / 4 / 389
Optimal bundling of technological products with network externality Cc:160 OR/MS / 52 / 3 / 231
Target age and the acquisition of innovation in high-technology industries Fa:160 OR/MS / 52 / 3 / 263
Framework for building a low-cost, scalable, and secured platform for web-delivered business services Fc:160 OR/MS / 52 / 3 / 277
Balancing IT with the human touch: Optimal investment in IT-based customer service Fd:160 OR/MS / 52 / 1-2 / 147
Work-domain knowledge in usability evaluation: Experiences with cooperative usability testing Fe:160 OR/MS / 52 / 1-2 / 149
The effects of technological turbulence and breadth on supply chain technology acceptance and adoption Ah:160 OR/MS / 51 / 5-6 / 457
The effect of perceived novelty on the adoption of information technology innovations: A risk/reward perspective Ef:160 OR/MS / 51 / 5-6 / 511
Quality of search engines: How good is Google pagerank? Fc:160 OR/MS / 51 / 5-6 / 563
Get the most out of green IT solutions Fd:160 OR/MS / 51 / 5-6 / 565
IT service value creation in a global environment Fd:160 OR/MS / 51 / 5-6 / 567
Survey of data management and analysis in disaster situations Fd:160 OR/MS / 51 / 5-6 / 571
Strategic product/service innovations of an online firm Af:160 OR/MS / 51 / 4 / 325
Configuration of the interaction between information security technologies: The case of firewalls and intrusion detection systems Fd:160 OR/MS / 51 / 4 / 393
Willingness to pay in an open source software environment Fd:160 OR/MS / 51 / 4 / 395
Adaptive random testing based on distribution metrics Fe:160 OR/MS / 51 / 4 / 397
The role of contracts on quality and returns to quality in offshore software development outsourcing Fe:160 OR/MS / 51 / 4 / 399
Assessing socially disruptive technological change Fc:160 OR/MS / 51 / 3 / 269
Bandit cellphones: A blue ocean strategy Fa:160 OR/MS / 51 / 1-2 / 135
The reliability of user authentication through keystroke dynamics Fa:160 OR/MS / 51 / 1-2 / 139
An overview of social engineering malware: Trends, tactics, and implications Fc:160 OR/MS / 51 / 1-2 / 141
String theory, French horns, and the infrastructure of cyberspace Fc:160 OR/MS / 51 / 1-2 / 145
Capability, quality, and performance of offshore IS vendors: A theoretical framework and empirical investigation Af:160 OR/MS / 50 / 5-6 / 441
Defence and attack of systems with variable attacker system structure detection probability Fd:160 OR/MS / 50 / 5-6 / 575
Detecting artifact anomalies in business process specifications with a formal model Fe:160 OR/MS / 50 / 4 / 403
A modified fuzzy clustering for documents retrieval: Application to document categorization Ec:160 OR/MS / 50 / 1-2 / 117
Uncertainty, information acquisition, and technology adoption Ef:160 OR/MS / 50 / 1-2 / 127
Predicating of defects in software developing process Fe:160 OR/MS / 50 / 1-2 / 139
Alleviating piracy through open source strategy: An exploratory study of business software firms in China Fe:160 OR/MS / 50 / 1-2 / 143
The future of statistical computing Ee:160 OR/MS / 49 / 5-6 / 499