Alleviating piracy through open source strategy: An exploratory study of business software firms in China |
Fe:160 |
OR/MS / 50 / 1-2 / 143 |
The future of statistical computing |
Ee:160 |
OR/MS / 49 / 5-6 / 499 |
Measuring open source software success |
Fd:160 |
OR/MS / 49 / 5-6 / 525 |
User awareness of security countermeasures and its impact on information systems misuse: A deterrent approach |
Fd:160 |
OR/MS / 49 / 5-6 / 529 |
From peer production to productization: A study of socially enabled business exchanges in open source service networks |
Fe:160 |
OR/MS / 49 / 5-6 / 537 |
An empirical analysis of the impact of software development problem factors on software maintainability |
Fe:160 |
OR/MS / 49 / 5-6 / 541 |
Improving malware detection by applying multi-inducer ensemble |
Fe:160 |
OR/MS / 49 / 5-6 / 545 |
Risk and risk management in software projects: A reassessment |
Ef:160 |
OR/MS / 49 / 3 / 259 |
The ostrich effect: Selective attention to information |
Fd:160 |
OR/MS / 49 / 3 / 265 |
Control, trust, power and the dynamics of information systems outsourcing relationships: A process study of contractual software development |
Fd:160 |
OR/MS / 49 / 3 / 267 |
Automatic, evolutionary test data generation for dynamic software testing |
Fe:160 |
OR/MS / 49 / 3 / 271 |
The influence of organizational culture on the adoption of extreme programming |
Fe:160 |
OR/MS / 49 / 3 / 273 |
A faceted approach to information retrieval |
Fd:160 |
OR/MS / 49 / 1-2 / 135 |
Perceptions of business students’ feature requirements in educational web sites |
Fc:160 |
OR/MS / 48 / 6 / 603 |
Common defects in information security management system of Korean companies |
Fd:160 |
OR/MS / 48 / 6 / 607 |
Experiences using systematic review guidelines |
Fe:160 |
OR/MS / 48 / 6 / 611 |
Ranking reusability of software components using coupling metrics |
Fe:160 |
OR/MS / 48 / 6 / 613 |
Adding value to the IT organization with the component business model |
Fd:160 |
OR/MS / 48 / 4-5 / 495 |
An integration model for organizing IT service management |
Fd:160 |
OR/MS / 48 / 4-5 / 497 |
Membership herding and network stability in the open source community: The Ising perspective |
Fe:160 |
OR/MS / 48 / 4-5 / 499 |
Modeling software testing costs and risks using fuzzy logic paradigm |
Fe:160 |
OR/MS / 48 / 4-5 / 503 |
Process innovativeness in technology services organizations: Roles of differentiation strategy, operational autonomy and risk-taking propensity |
Af:160 |
OR/MS / 48 / 3 / 243 |
Enterprise resource planning (ERP) – A brief history |
Fa:160 |
OR/MS / 48 / 3 / 323 |
Evaluating software project portfolio risks |
Fa:160 |
OR/MS / 48 / 3 / 325 |
An empirical analysis of risk components and performance on software projects |
Fe:160 |
OR/MS / 48 / 3 / 333 |
Experimental use of code delta, code churn and rate of change to understand software product line evolution |
Fe:160 |
OR/MS / 48 / 3 / 337 |
Emerging wireless technologies for developing countries |
Ff:160 |
OR/MS / 48 / 3 / 345 |
Uncovering the to-dos hidden in your in-box |
Fa:160 |
OR/MS / 48 / 2 / 195 |
Activity management as a web service |
Fa:160 |
OR/MS / 48 / 2 / 199 |
IT valuation in turbulent times |
Fd:160 |
OR/MS / 48 / 2 / 205 |
On the information uncertainty risk and the January effect |
Fd:160 |
OR/MS / 48 / 2 / 209 |
Two-sided competition of proprietary vs. open source technology platforms and the implications for the software industry |
Fe:160 |
OR/MS / 48 / 2 / 215 |
Competitive advantage with e-business: A survey of large American and Swedish firms |
Fc:160 |
OR/MS / 48 / 1 / 89 |
Post merger IT integration strategies: An IT alignment perspective |
Fd:160 |
OR/MS / 48 / 1 / 95 |
Exploring the structure of complex software designs: An empirical Study of open source and proprietary code |
Fe:160 |
OR/MS / 48 / 1 / 97 |
Innovative IT climates: CIO perspectives |
Fd:160 |
OR/MS / 47 / 6 / 689 |
Towards human-centered design: Two case studies |
Fe:160 |
OR/MS / 47 / 6 / 695 |
Dynamic mechanism design for online commerce |
Cb:160 |
OR/MS / 47 / 5 / 529 |
Data mining in electronic commerce |
Ee:160 |
OR/MS / 47 / 5 / 567 |
Accessing embedded program in untestable mobile environment: Experience of a trustworthiness approach |
Fe:160 |
OR/MS / 47 / 5 / 581 |
An adaptive load balancer for multiprocessor routers |
Fe:160 |
OR/MS / 47 / 5 / 585 |
Inventory control in the presence of an electronic marketplace |
Dd:160 |
OR/MS / 47 / 4 / 429 |
Promotional chat on the internet |
Fc:160 |
OR/MS / 47 / 4 / 463 |
RINSE: The Real-Time Immersive Network Simulation Environment for network security exercises (extended version) |
De:160 |
OR/MS / 47 / 3 / 313 |
Modelling corporate wireless security and privacy |
Fa:160 |
OR/MS / 47 / 3 / 333 |
Knowledge communities and knowledge collectivities: A typology of knowledge work in groups |
Fa:160 |
OR/MS / 47 / 3 / 337 |
Personal innovativeness, social influences and adoption of wireless Internet services via mobile technology |
Fc:160 |
OR/MS / 47 / 3 / 341 |
A theoretical approach to Web design in E-commerce: A belief reinforcement model |
Fc:160 |
OR/MS / 47 / 3 / 343 |
Benchmarking the IT productivity paradox: Recent evidence from the manufacturing sector |
Fe:160 |
OR/MS / 47 / 3 / 347 |
Mobile music business in Japan and Korea: Copyright management institutions as a reverse salient |
Fz:160 |
OR/MS / 47 / 3 / 349 |
Designing a family of development-intensive products |
Af:160 |
OR/MS / 47 / 2 / 133 |
Management of knowledge intensive systems as supernetworks: modelling, analysis, computations and applications |
Fa:160 |
OR/MS / 47 / 2 / 203 |
A theoretical approach to web design in e-commerce: A belief reinforcement model |
Fc:160 |
OR/MS / 47 / 2 / 217 |
Top management team transactive memory, information gathering and perceptual accuracy |
Fd:160 |
OR/MS / 47 / 2 / 223 |
The idiosyncrasy and dynamism of technological innovation across industries: Patent citation analysis |
Af:160 |
OR/MS / 47 / 1 / 25 |
Cheap talk and bogus network externalities in the emergency technology market |
Fa:160 |
OR/MS / 47 / 1 / 97 |
Comparative analysis of technologies used on Fortune 500 and INC 500 corporate websites |
Fc:160 |
OR/MS / 46 / 6 / 679 |
Management of knowledge intensive systems as supernetworks: Modeling, analysis, computations and applications |
Fd:160 |
OR/MS / 46 / 6 / 683 |
IT outsourcing configuration: Research into defining and designing outsourcing arrangements |
Fd:160 |
OR/MS / 46 / 6 / 687 |
Management of the service-oriented-architecture life cycle |
Fe:160 |
OR/MS / 46 / 6 / 689 |
Comparative analysis of technologies used on Fortune 500 and Inc. 500 corporate websites |
Fc:160 |
OR/MS / 46 / 5 / 583 |
IT human resource management configurations and IT turnover: Theoretical synthesis and empirical analysis |
Bz:160 |
OR/MS / 46 / 4 / 405 |
Information technology at IKEA: An “open sesame” solution or just another type of facility? |
Fa:160 |
OR/MS / 46 / 3 / 331 |
Optimal software development: A control theoretic approach |
Fe:160 |
OR/MS / 46 / 3 / 339 |
Two controlled experiments concerning the comparison of pair programming to peer review |
Fe:160 |
OR/MS / 46 / 3 / 341 |
Pay disparities within top management groups: Evidence of harmful effects on performance of high technology firms |
Bd:160 |
OR/MS / 46 / 2 / 147 |
Designing software architectures to facilitate accessible web applications |
Fb:160 |
OR/MS / 46 / 2 / 193 |
Market for software vulnerabilities? Think again |
Fd:160 |
OR/MS / 46 / 2 / 209 |
The value of intrusion detection systems in information technology security architecture |
Fd:160 |
OR/MS / 46 / 2 / 213 |
Bi-directional safety analysis of product lines |
Fe:160 |
OR/MS / 46 / 2 / 217 |
Automatic detection and correction of programming faults for software applications |
Fe:160 |
OR/MS / 46 / 2 / 221 |
The influence of strategic dimensions and the environment on the introduction of internet as innovation into small and medium-sized enterprises |
Af:160 |
OR/MS / 46 / 1 / 25 |
IT sourcing success: A psychological contract perspective |
Fa:160 |
OR/MS / 45 / 5 / 561 |
Empowering the business analyst for on demand computing |
Fa:160 |
OR/MS / 45 / 5 / 565 |
A technical framework for sense-and-respond business management |
Fa:160 |
OR/MS / 45 / 5 / 567 |
A subjective measure of web search quality |
Fc:160 |
OR/MS / 45 / 5 / 573 |
Open-source versus proprietary software: Is one more reliable and secure than the other? |
Fe:160 |
OR/MS / 45 / 5 / 577 |
Building applications for the Linux standard base |
Fe:160 |
OR/MS / 45 / 5 / 581 |
Managing quality in the e-service system: Development and application of a process model |
Fc:160 |
OR/MS / 45 / 4 / 461 |
An empirical study of system design instability metric and design evolution in an agile software process |
Fe:160 |
OR/MS / 45 / 4 / 465 |