How enterprise architecture improves the quality of IT investment decisions |
Fe:160 |
OR/MS / 62 / 5-6 / 443 |
Swarm debugging: The collective intelligence on interactive debugging |
Fe:160 |
OR/MS / 62 / 5-6 / 447 |
Evaluating large-scale IT investment decisions |
Fd:160 |
OR/MS / 61 / 1-2 / 125 |
On buyer selection of service providers in online outsourcing platforms for IT services |
Fc:160 |
OR/MS / 59 / 3-4 / 325 |
Logic pluralism in mobile platform ecosystems: A study of indie app developers on the ios app store |
Fe:160 |
OR/MS / 59 / 3-4 / 331 |
Continued voluntary participation intention in firm-participating open source software projects |
Fe:160 |
OR/MS / 59 / 3-4 / 333 |
Approaches to strategic alignment of software process
improvement: A systematic literature review |
Fe:160 |
OR/MS / 58 / 5-6 / 557 |
A dynamic network measure of
technological change |
Fe:160 |
OR/MS / 58 / 3 / 271 |
A roadmap for scalable agent organizations in the internet of
everything |
Fc:160 |
OR/MS / 58 / 1-2 / 137 |
On the design of a maintainable software development kit
to implement integration solutions |
Fe:160 |
OR/MS / 58 / 1-2 / 147 |
Malware detection using nonparametric Bayesian clustering
and classification techniques |
Fe:160 |
OR/MS / 57 / 5-6 / 563 |
Versioning in the software industry:
Heterogeneous disutility from underprovisioning of functionality |
Fe:160 |
OR/MS / 57 / 4 / 391 |
Is a Cambrian Explosion coming for robotics? |
Fa:160 |
OR/MS / 56 / 5-6 / 549 |
Optimal policies for security patch management |
Fc:160 |
OR/MS / 56 / 5-6 / 561 |
Bringing test-driven development to web service choreographies |
Fc:160 |
OR/MS / 56 / 1-2 / 143 |
Glamorizing rampage online:
School shooting fan communities on YouTube |
Bc:160 |
OR/MS / 55 / 5-6 / 459 |
A dynamic code coverage approach to maximize fault localization efficiency |
Fe:160 |
OR/MS / 55 / 5-6 / 565 |
Combining mutation and fault location for automated program debugging |
Fe:160 |
OR/MS / 55 / 5-6 / 567 |
Product life-cycle management of packaged software |
Fe:160 |
OR/MS / 55 / 5-6 / 569 |
A reliability model for service component architectures |
Fe:160 |
OR/MS / 55 / 4 / 397 |
Power aware scheduling algorithm for sporadic tasks in real-time systems |
Cc:160 |
OR/MS / 55 / 3 / 235 |
Assessing the reliability, validity and acceptance of a classification scheme of usability problems (CUP) |
Fe:160 |
OR/MS / 55 / 3 / 277 |
Networks, social influence, and the choice among competing innovations: Insights from open source software licenses |
Af:160 |
OR/MS / 55 / 1-2 / 27 |
Status locality on the Web: Implications for building focused collections |
Fc:160 |
OR/MS / 55 / 1-2 / 149 |
Class-restricted clustering and micro-perturbation for data privacy |
Fc:160 |
OR/MS / 54 / 5-6 / 553 |
IT service climate, antecedents and IT service quality outcomes: Some initial evidence |
Ff:160 |
OR/MS / 54 / 5-6 / 557 |
Staffing and control of instant messaging contact centers |
Cc:160 |
OR/MS / 54 / 3 / 225 |
Software ecosystems – A systematic literature review |
Fc:160 |
OR/MS / 54 / 3 / 269 |
Human capital investments and employee performance: An analysis of IT services industry |
Bd:160 |
OR/MS / 54 / 1-2 / 57 |
Chaos-based detection of LDoS attacks |
Fc:160 |
OR/MS / 54 / 1-2 / 137 |
A mathematical framework for data quality management in enterprise systems |
Fa:160 |
OR/MS / 53 / 5-6 / 545 |
Information systems strategy: Past, present, future? |
Fd:160 |
OR/MS / 53 / 5-6 / 565 |
Elephant and Samurai: Differences between Indian and Japanese supply chain management |
Fa:160 |
OR/MS / 53 / 4 / 389 |
The economics of spam |
Fc:160 |
OR/MS / 53 / 4 / 393 |
Malware characteristics and threats on the internet ecosystem |
Fe:160 |
OR/MS / 53 / 4 / 397 |
Technology adoption with uncertain future costs and quality |
Ef:160 |
OR/MS / 53 / 3 / 251 |
Informing strategic IS change: Towards a ‘meta-learning’ framework |
Fe:160 |
OR/MS / 53 / 3 / 265 |
A longitudinal study of an emerging software ecosystem:
Implications for practice and theory |
Fe:160 |
OR/MS / 53 / 3 / 269 |
Client strategies in vendor transition: A threat balancing perspective |
Af:160 |
OR/MS / 53 / 1-2 / 21 |
Drivers, barriers and critical success factors for ERPII implementation in supply chains: A critical analysis |
Ah:160 |
OR/MS / 53 / 1-2 / 51 |
An assessment of the use of transaction cost theory in information technology outsourcing |
Db:160 |
OR/MS / 53 / 1-2 / 85 |
Building nation-wide information infrastructures in
healthcare through modular implementation strategies |
Fa:160 |
OR/MS / 53 / 1-2 / 115 |
Duality of weakly disposable technology |
Fa:160 |
OR/MS / 53 / 1-2 / 117 |
A modeling and simulation-based methodology to support dynamic negotiation for web service applications |
Fc:160 |
OR/MS / 53 / 1-2 / 125 |
On the estimation of adequate test set size using fault failure rates |
Fe:160 |
OR/MS / 53 / 1-2 / 129 |
Controlling software architecture erosion: A survey |
Fe:160 |
OR/MS / 53 / 1-2 / 131 |
An empirical investigation on the reusability of design patterns and software packages |
Fe:160 |
OR/MS / 53 / 1-2 / 133 |
FeGC: An efficient garbage collection scheme for flash
memory based storage systems |
Fe:160 |
OR/MS / 53 / 1-2 / 135 |
Dominant design or multiple designs: The flash memory card case |
Af:160 |
OR/MS / 52 / 5-6 / 441 |
Efficiency and evaluation analysis of a network of technology transfer brokers |
Fa:160 |
OR/MS / 52 / 5-6 / 541 |
Managing versions of a software product under variable and endogenous demand |
Fe:160 |
OR/MS / 52 / 5-6 / 553 |
Open platform strategies and innovation: Granting access vs. devolving control |
Fa:160 |
OR/MS / 52 / 4 / 385 |
Technology transfer across organizational boundaries: Absorptive capacity and desorptive capacity |
Fa:160 |
OR/MS / 52 / 4 / 389 |
Optimal bundling of technological products with network externality |
Cc:160 |
OR/MS / 52 / 3 / 231 |
Target age and the acquisition of innovation in high-technology industries |
Fa:160 |
OR/MS / 52 / 3 / 263 |
Framework for building a low-cost, scalable, and secured platform for web-delivered business services |
Fc:160 |
OR/MS / 52 / 3 / 277 |
Balancing IT with the human touch: Optimal investment in IT-based customer service |
Fd:160 |
OR/MS / 52 / 1-2 / 147 |
Work-domain knowledge in usability evaluation: Experiences with cooperative usability testing |
Fe:160 |
OR/MS / 52 / 1-2 / 149 |
The effects of technological turbulence and breadth on supply chain technology acceptance and adoption |
Ah:160 |
OR/MS / 51 / 5-6 / 457 |
The effect of perceived novelty on the adoption of information technology innovations: A risk/reward perspective |
Ef:160 |
OR/MS / 51 / 5-6 / 511 |
Quality of search engines: How good is Google pagerank? |
Fc:160 |
OR/MS / 51 / 5-6 / 563 |
Get the most out of green IT solutions |
Fd:160 |
OR/MS / 51 / 5-6 / 565 |
IT service value creation in a global environment |
Fd:160 |
OR/MS / 51 / 5-6 / 567 |
Survey of data management and analysis in disaster situations |
Fd:160 |
OR/MS / 51 / 5-6 / 571 |
Strategic product/service innovations of an online firm |
Af:160 |
OR/MS / 51 / 4 / 325 |
Configuration of the interaction between information security technologies: The case of firewalls and intrusion detection systems |
Fd:160 |
OR/MS / 51 / 4 / 393 |
Willingness to pay in an open source software environment |
Fd:160 |
OR/MS / 51 / 4 / 395 |
Adaptive random testing based on distribution metrics |
Fe:160 |
OR/MS / 51 / 4 / 397 |
The role of contracts on quality and returns to quality in offshore software development outsourcing |
Fe:160 |
OR/MS / 51 / 4 / 399 |
Assessing socially disruptive technological change |
Fc:160 |
OR/MS / 51 / 3 / 269 |
Bandit cellphones: A blue ocean strategy |
Fa:160 |
OR/MS / 51 / 1-2 / 135 |
The reliability of user authentication through keystroke dynamics |
Fa:160 |
OR/MS / 51 / 1-2 / 139 |
An overview of social engineering malware: Trends, tactics, and implications |
Fc:160 |
OR/MS / 51 / 1-2 / 141 |
String theory, French horns, and the infrastructure of cyberspace |
Fc:160 |
OR/MS / 51 / 1-2 / 145 |
Capability, quality, and performance of offshore IS vendors: A theoretical framework and empirical investigation |
Af:160 |
OR/MS / 50 / 5-6 / 441 |
Defence and attack of systems with variable attacker system structure detection probability |
Fd:160 |
OR/MS / 50 / 5-6 / 575 |
Detecting artifact anomalies in business process specifications with a formal model |
Fe:160 |
OR/MS / 50 / 4 / 403 |
A modified fuzzy clustering for documents retrieval: Application to document categorization |
Ec:160 |
OR/MS / 50 / 1-2 / 117 |
Uncertainty, information acquisition, and technology adoption |
Ef:160 |
OR/MS / 50 / 1-2 / 127 |
Predicating of defects in software developing process |
Fe:160 |
OR/MS / 50 / 1-2 / 139 |