Application: 160 (Management information systems)

Title Cat:App Page
Software failure prediction based on a Markov Bayesian network model Fe:160 OR/MS / 45 / 4 / 467
Dynamical networks for information processing Cc:160 OR/MS / 45 / 3 / 293
Recursive self-organizing network models Fb:160 OR/MS / 45 / 3 / 345
The effect of piracy on the market penetration of subscription software Fz:160 OR/MS / 45 / 2 / 223
Economics of information in the web economy toward a new theory? Fc:160 OR/MS / 45 / 1 / 105
A review of studies on expert estimation of software development effort Fe:160 OR/MS / 45 / 1 / 107
Software project control centers: Concepts and approaches Fe:160 OR/MS / 45 / 1 / 109
Web page feature selection and classification using neural networks Fc:160 OR/MS / 44 / 6 / 695
Investors’ resource commitments and information reporting systems: Control in international joint ventures Fd:160 OR/MS / 44 / 6 / 697
The researcher’s challenge: Building a credible literature review using electronic databases Fe:160 OR/MS / 44 / 6 / 701
Small business internet commerce: A case study Fc:160 OR/MS / 44 / 5 / 577
Vendor related risks in IT development: A chronology of an outsourced project failure Fd:160 OR/MS / 44 / 5 / 579
Perceptions on IS risks and failure types: A comparison of designers from the United States, Japan and Korea Fd:160 OR/MS / 44 / 5 / 581
The influence of business managers’ IT competence on championing IT Fd:160 OR/MS / 44 / 5 / 583
Beyond normal failures: Dynamic management of software projects Fe:160 OR/MS / 44 / 5 / 585
The dawning of the automatic computing era Fz:160 OR/MS / 44 / 5 / 587
The security of confidential numerical data in databases Fz:160 OR/MS / 44 / 5 / 589
A new algorithm for applying fuzzy set theory to evaluate the rate of aggregative risk in software development Ec:160 OR/MS / 44 / 4 / 447
Statistical fraud detection: A review Ec:160 OR/MS / 44 / 4 / 449
How to build a WebFountain: An architecture for very large-scale text analytics Fa:160 OR/MS / 44 / 4 / 459
Database aggregation of imprecise and uncertain evidence Fd:160 OR/MS / 44 / 4 / 465
Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction Fd:160 OR/MS / 44 / 4 / 469
Supply chain information technology metrics Ah:160 OR/MS / 44 / 3 / 255
Demand chain management in manufacturing and services: Web-based integration, drivers and performance Ah:160 OR/MS / 44 / 3 / 257
A multi-objective, multi-criteria approach for evaluating IT investments: Results from two case studies Cb:160 OR/MS / 44 / 3 / 267
Rules and fuzzy rules in text: Concept, extraction and usage Ec:160 OR/MS / 44 / 3 / 309
Success factors in the implementation of a collaborative technology and resulting productivity improvements in a small business: An explorative study Fa:160 OR/MS / 44 / 3 / 319
Managing online auctions: Current business and research issues Fc:160 OR/MS / 44 / 3 / 325
Dawn of the e-bomb Fc:160 OR/MS / 44 / 3 / 329
Soft approaches to distributed information retrieval Fd:160 OR/MS / 44 / 3 / 331
How not to measure the efficiency of public services (and how one might) Fd:160 OR/MS / 44 / 3 / 333
Motivators of software process improvement: An analysis of practitioners’ views Fe:160 OR/MS / 44 / 3 / 335
Key success factors for implementing software process improvement: A maturity-based analysis Fe:160 OR/MS / 44 / 3 / 339
Technology and organizations: Where’s the off button? Fa:160 OR/MS / 44 / 2 / 189
Hijacking the web Fc:160 OR/MS / 44 / 2 / 201
Software evaluation problem situations Fe:160 OR/MS / 44 / 2 / 205
A comparison of methods for locating features in legacy software Fe:160 OR/MS / 44 / 2 / 207
Combining techniques to optimize effort predictions in software project management Fe:160 OR/MS / 44 / 2 / 209
The evolution of storage systems Fz:160 OR/MS / 44 / 2 / 211
e-integration in the supply chain: Barriers and performance Ah:160 OR/MS / 44 / 1 / 31
The internet and the price-value-loyalty chain Fc:160 OR/MS / 44 / 1 / 89
Perceptions and attitudes about e-commerce development in China: An exploratory study Fc:160 OR/MS / 44 / 1 / 91
Enterprise resource planning: Implementation procedures and critical success factors Fd:160 OR/MS / 44 / 1 / 97
Understanding the hidden dissatisfaction of users toward end-user computing Fd:160 OR/MS / 44 / 1 / 101
A longitudinal study of software process management in Taiwan’s top companies Fe:160 OR/MS / 44 / 1 / 107
e-business and supply chain management Ah:160 OR/MS / 43 / 6 / 619
Virtual team trust: Instrument development and validation in an IS educational environment Bc:160 OR/MS / 43 / 6 / 623
When subordinates become IT contractors: Persistent managerial expectations in IT outsourcing Fa:160 OR/MS / 43 / 6 / 687
Trust transfer on the World Wide Web Fc:160 OR/MS / 43 / 6 / 695
A rule-based video database system architecture Fd:160 OR/MS / 43 / 6 / 697
Privacy protection of binary confidential data against deterministic, stochastic and insider threat Fd:160 OR/MS / 43 / 6 / 699
Online trust: A stakeholder perspective, concepts, implications and future directions Fc:160 OR/MS / 43 / 5 / 587
Online analytical mining of path traversal patterns for web measurement Fc:160 OR/MS / 43 / 5 / 589
Issues in implementing ERP: A case study Fd:160 OR/MS / 43 / 5 / 591
A two phase optimization technique for XML queries with multiple regular path expressions Cd:160 OR/MS / 43 / 4 / 401
Businesses as buildings: Metrics for the architectural quality of internet businesses Fc:160 OR/MS / 43 / 4 / 461
IT alignment and firm performance in small manufacturing firms Fd:160 OR/MS / 43 / 4 / 463
A testing approach for large system portfolios in industrial environments Fd:160 OR/MS / 43 / 4 / 465
A decision-tree-based symbolic rule induction system for text categorization Fd:160 OR/MS / 43 / 4 / 467
Library website user testing Fc:160 OR/MS / 43 / 3 / 343
Knowledge management: Philosophy, processes and pitfalls Fd:160 OR/MS / 43 / 3 / 345
Software process management of top companies in Taiwan: A comparative study Fe:160 OR/MS / 43 / 3 / 347
Global comparison of stages of growth based on critical success factors Fd:160 OR/MS / 43 / 2 / 219
Representation and storage of motion data Fd:160 OR/MS / 43 / 2 / 221
An intelligent coherent approach to cooperation between TCP and ATM congestion and control algorithms – modeling and simulation analysis Fd:160 OR/MS / 43 / 2 / 225
Regression testing of database applications Fe:160 OR/MS / 43 / 2 / 229
Challenges of component-based development Fe:160 OR/MS / 43 / 2 / 231
An integrated architecture for tightly coupled design and evaluation of educational multimedia Bf:160 OR/MS / 43 / 1 / 35
Intelligent assessment of distance learning Bf:160 OR/MS / 43 / 1 / 37
Data mining for network intrusion detection: A comparison of alternative methods Ee:160 OR/MS / 43 / 1 / 81
Benchmarking data mining algorithms Fd:160 OR/MS / 43 / 1 / 99
A simplified model of software project dynamics Fe:160 OR/MS / 43 / 1 / 105
Software requirements validation via task analysis Fe:160 OR/MS / 43 / 1 / 107
A platform-neutral live IP/TV presentation system Bf:160 OR/MS / 42 / 6 / 627
Chaos theory as a framework for studying information systems Da:160 OR/MS / 42 / 6 / 653
Maintaining security and timeliness in real-time database system Fd:160 OR/MS / 42 / 6 / 683
Deciding how long to test software Fe:160 OR/MS / 42 / 6 / 685
Automated prototyping tool-kit (APT) Fe:160 OR/MS / 42 / 6 / 691
Producing reliable software: An experiment Fe:160 OR/MS / 42 / 6 / 693
Software engineering technology watch Fe:160 OR/MS / 42 / 6 / 695