| Alleviating piracy through open source strategy: An exploratory study of business software firms in China |
Fe:160 |
OR/MS / 50 / 1-2 / 143 |
| The future of statistical computing |
Ee:160 |
OR/MS / 49 / 5-6 / 499 |
| Measuring open source software success |
Fd:160 |
OR/MS / 49 / 5-6 / 525 |
| User awareness of security countermeasures and its impact on information systems misuse: A deterrent approach |
Fd:160 |
OR/MS / 49 / 5-6 / 529 |
| From peer production to productization: A study of socially enabled business exchanges in open source service networks |
Fe:160 |
OR/MS / 49 / 5-6 / 537 |
| An empirical analysis of the impact of software development problem factors on software maintainability |
Fe:160 |
OR/MS / 49 / 5-6 / 541 |
| Improving malware detection by applying multi-inducer ensemble |
Fe:160 |
OR/MS / 49 / 5-6 / 545 |
| Risk and risk management in software projects: A reassessment |
Ef:160 |
OR/MS / 49 / 3 / 259 |
| The ostrich effect: Selective attention to information |
Fd:160 |
OR/MS / 49 / 3 / 265 |
| Control, trust, power and the dynamics of information systems outsourcing relationships: A process study of contractual software development |
Fd:160 |
OR/MS / 49 / 3 / 267 |
| Automatic, evolutionary test data generation for dynamic software testing |
Fe:160 |
OR/MS / 49 / 3 / 271 |
| The influence of organizational culture on the adoption of extreme programming |
Fe:160 |
OR/MS / 49 / 3 / 273 |
| A faceted approach to information retrieval |
Fd:160 |
OR/MS / 49 / 1-2 / 135 |
| Perceptions of business students’ feature requirements in educational web sites |
Fc:160 |
OR/MS / 48 / 6 / 603 |
| Common defects in information security management system of Korean companies |
Fd:160 |
OR/MS / 48 / 6 / 607 |
| Experiences using systematic review guidelines |
Fe:160 |
OR/MS / 48 / 6 / 611 |
| Ranking reusability of software components using coupling metrics |
Fe:160 |
OR/MS / 48 / 6 / 613 |
| Adding value to the IT organization with the component business model |
Fd:160 |
OR/MS / 48 / 4-5 / 495 |
| An integration model for organizing IT service management |
Fd:160 |
OR/MS / 48 / 4-5 / 497 |
| Membership herding and network stability in the open source community: The Ising perspective |
Fe:160 |
OR/MS / 48 / 4-5 / 499 |
| Modeling software testing costs and risks using fuzzy logic paradigm |
Fe:160 |
OR/MS / 48 / 4-5 / 503 |
| Process innovativeness in technology services organizations: Roles of differentiation strategy, operational autonomy and risk-taking propensity |
Af:160 |
OR/MS / 48 / 3 / 243 |
| Enterprise resource planning (ERP) – A brief history |
Fa:160 |
OR/MS / 48 / 3 / 323 |
| Evaluating software project portfolio risks |
Fa:160 |
OR/MS / 48 / 3 / 325 |
| An empirical analysis of risk components and performance on software projects |
Fe:160 |
OR/MS / 48 / 3 / 333 |
| Experimental use of code delta, code churn and rate of change to understand software product line evolution |
Fe:160 |
OR/MS / 48 / 3 / 337 |
| Emerging wireless technologies for developing countries |
Ff:160 |
OR/MS / 48 / 3 / 345 |
| Uncovering the to-dos hidden in your in-box |
Fa:160 |
OR/MS / 48 / 2 / 195 |
| Activity management as a web service |
Fa:160 |
OR/MS / 48 / 2 / 199 |
| IT valuation in turbulent times |
Fd:160 |
OR/MS / 48 / 2 / 205 |
| On the information uncertainty risk and the January effect |
Fd:160 |
OR/MS / 48 / 2 / 209 |
| Two-sided competition of proprietary vs. open source technology platforms and the implications for the software industry |
Fe:160 |
OR/MS / 48 / 2 / 215 |
| Competitive advantage with e-business: A survey of large American and Swedish firms |
Fc:160 |
OR/MS / 48 / 1 / 89 |
| Post merger IT integration strategies: An IT alignment perspective |
Fd:160 |
OR/MS / 48 / 1 / 95 |
| Exploring the structure of complex software designs: An empirical Study of open source and proprietary code |
Fe:160 |
OR/MS / 48 / 1 / 97 |
| Innovative IT climates: CIO perspectives |
Fd:160 |
OR/MS / 47 / 6 / 689 |
| Towards human-centered design: Two case studies |
Fe:160 |
OR/MS / 47 / 6 / 695 |
| Dynamic mechanism design for online commerce |
Cb:160 |
OR/MS / 47 / 5 / 529 |
| Data mining in electronic commerce |
Ee:160 |
OR/MS / 47 / 5 / 567 |
| Accessing embedded program in untestable mobile environment: Experience of a trustworthiness approach |
Fe:160 |
OR/MS / 47 / 5 / 581 |
| An adaptive load balancer for multiprocessor routers |
Fe:160 |
OR/MS / 47 / 5 / 585 |
| Inventory control in the presence of an electronic marketplace |
Dd:160 |
OR/MS / 47 / 4 / 429 |
| Promotional chat on the internet |
Fc:160 |
OR/MS / 47 / 4 / 463 |
| RINSE: The Real-Time Immersive Network Simulation Environment for network security exercises (extended version) |
De:160 |
OR/MS / 47 / 3 / 313 |
| Modelling corporate wireless security and privacy |
Fa:160 |
OR/MS / 47 / 3 / 333 |
| Knowledge communities and knowledge collectivities: A typology of knowledge work in groups |
Fa:160 |
OR/MS / 47 / 3 / 337 |
| Personal innovativeness, social influences and adoption of wireless Internet services via mobile technology |
Fc:160 |
OR/MS / 47 / 3 / 341 |
| A theoretical approach to Web design in E-commerce: A belief reinforcement model |
Fc:160 |
OR/MS / 47 / 3 / 343 |
| Benchmarking the IT productivity paradox: Recent evidence from the manufacturing sector |
Fe:160 |
OR/MS / 47 / 3 / 347 |
| Mobile music business in Japan and Korea: Copyright management institutions as a reverse salient |
Fz:160 |
OR/MS / 47 / 3 / 349 |
| Designing a family of development-intensive products |
Af:160 |
OR/MS / 47 / 2 / 133 |
| Management of knowledge intensive systems as supernetworks: modelling, analysis, computations and applications |
Fa:160 |
OR/MS / 47 / 2 / 203 |
| A theoretical approach to web design in e-commerce: A belief reinforcement model |
Fc:160 |
OR/MS / 47 / 2 / 217 |
| Top management team transactive memory, information gathering and perceptual accuracy |
Fd:160 |
OR/MS / 47 / 2 / 223 |
| The idiosyncrasy and dynamism of technological innovation across industries: Patent citation analysis |
Af:160 |
OR/MS / 47 / 1 / 25 |
| Cheap talk and bogus network externalities in the emergency technology market |
Fa:160 |
OR/MS / 47 / 1 / 97 |
| Comparative analysis of technologies used on Fortune 500 and INC 500 corporate websites |
Fc:160 |
OR/MS / 46 / 6 / 679 |
| Management of knowledge intensive systems as supernetworks: Modeling, analysis, computations and applications |
Fd:160 |
OR/MS / 46 / 6 / 683 |
| IT outsourcing configuration: Research into defining and designing outsourcing arrangements |
Fd:160 |
OR/MS / 46 / 6 / 687 |
| Management of the service-oriented-architecture life cycle |
Fe:160 |
OR/MS / 46 / 6 / 689 |
| Comparative analysis of technologies used on Fortune 500 and Inc. 500 corporate websites |
Fc:160 |
OR/MS / 46 / 5 / 583 |
| IT human resource management configurations and IT turnover: Theoretical synthesis and empirical analysis |
Bz:160 |
OR/MS / 46 / 4 / 405 |
| Information technology at IKEA: An “open sesame” solution or just another type of facility? |
Fa:160 |
OR/MS / 46 / 3 / 331 |
| Optimal software development: A control theoretic approach |
Fe:160 |
OR/MS / 46 / 3 / 339 |
| Two controlled experiments concerning the comparison of pair programming to peer review |
Fe:160 |
OR/MS / 46 / 3 / 341 |
| Pay disparities within top management groups: Evidence of harmful effects on performance of high technology firms |
Bd:160 |
OR/MS / 46 / 2 / 147 |
| Designing software architectures to facilitate accessible web applications |
Fb:160 |
OR/MS / 46 / 2 / 193 |
| Market for software vulnerabilities? Think again |
Fd:160 |
OR/MS / 46 / 2 / 209 |
| The value of intrusion detection systems in information technology security architecture |
Fd:160 |
OR/MS / 46 / 2 / 213 |
| Bi-directional safety analysis of product lines |
Fe:160 |
OR/MS / 46 / 2 / 217 |
| Automatic detection and correction of programming faults for software applications |
Fe:160 |
OR/MS / 46 / 2 / 221 |
| The influence of strategic dimensions and the environment on the introduction of internet as innovation into small and medium-sized enterprises |
Af:160 |
OR/MS / 46 / 1 / 25 |
| IT sourcing success: A psychological contract perspective |
Fa:160 |
OR/MS / 45 / 5 / 561 |
| Empowering the business analyst for on demand computing |
Fa:160 |
OR/MS / 45 / 5 / 565 |
| A technical framework for sense-and-respond business management |
Fa:160 |
OR/MS / 45 / 5 / 567 |
| A subjective measure of web search quality |
Fc:160 |
OR/MS / 45 / 5 / 573 |
| Open-source versus proprietary software: Is one more reliable and secure than the other? |
Fe:160 |
OR/MS / 45 / 5 / 577 |
| Building applications for the Linux standard base |
Fe:160 |
OR/MS / 45 / 5 / 581 |
| Managing quality in the e-service system: Development and application of a process model |
Fc:160 |
OR/MS / 45 / 4 / 461 |
| An empirical study of system design instability metric and design evolution in an agile software process |
Fe:160 |
OR/MS / 45 / 4 / 465 |