Initiation, Experimentation, Implementation of innovations: The case for Radio Frequency Identification Systems Fulltext Access 11 Pages 2012
TreeCovery: Coordinated dual treemap visualization for exploring the Recovery Act Fulltext Access 11 Pages 2012
Exploring user participation approaches in public e-service development Fulltext Access 11 Pages 2012
Whither information security? Examining the complementarities and substitutive effects among IT and information security firms Fulltext Access 11 Pages 2012
The coevolution of IT innovation and copyright institutions: The development of the mobile music business in Japan and Korea Fulltext Access 11 Pages 2012
How does social software change knowledge management? Toward a strategic research agenda Fulltext Access 11 Pages 2012
Answering queries in hybrid Bayesian networks using importance sampling Fulltext Access 11 Pages 2012
A mean–variance model to optimize the fixed versus open appointment percentages in open access scheduling systems Fulltext Access 11 Pages 2012
An experimental comparison of real and artificial deception using a deception generation model Fulltext Access 11 Pages 2012
Security versus convenience? An experimental study of user misperceptions of wireless internet service quality Fulltext Access 11 Pages 2012
A comprehensive study of the relationship between enterprise resource planning selection criteria and enterprise resource planning system success Fulltext Access 11 Pages 2012
Understanding sustained participation in transactional virtual communities Fulltext Access 11 Pages 2012
A consistency and consensus based decision support model for group decision making with multiplicative preference relations Fulltext Access 11 Pages 2012
Process integration, information sharing, and system interoperation in government: A comparative case analysis Fulltext Access 11 Pages 2012
From policy implementation to business process management: Principles for creating flexibility and agility Fulltext Access 11 Pages 2012
Organizational structure and ICT strategies in the Brazilian Judiciary System Fulltext Access 11 Pages 2012
Mining information across multiple domains: A case study of application to patent laws and regulations in biotechnology Fulltext Access 11 Pages 2012
Measuring the quality of governmental websites in a controlled versus an online setting with the ‘Website Evaluation Questionnaire’ Fulltext Access 11 Pages 2012
Digital Europe 2030: Designing scenarios for ICT in future governance and policy making Fulltext Access 11 Pages 2012
Examining a model of vertical accountability: A cross-national study of the influence of information access on the control of corruption Fulltext Access 11 Pages 2012
Towards a multidimensional model for evaluating electronic government: Proposing a more comprehensive and integrative perspective Fulltext Access 11 Pages 2012
Enterprise applications diffusion within organizations: A social learning perspective Fulltext Access 11 Pages 2012
The impact of polices on government social media usage: Issues, challenges, and recommendations Fulltext Access 11 Pages 2012
Channel choice and public service delivery in Canada: Comparing e-government to traditional service delivery Fulltext Access 11 Pages 2012
Benchmarking the digital divide using a multi-level outranking framework: Evidence from EBRD countries of operation Fulltext Access 11 Pages 2012
A comparative study of e-government XBRL implementations: The potential of improving information transparency and efficiency Fulltext Access 11 Pages 2012
Freedom of information legislation and its impact on press freedom: A cross-national study Fulltext Access 11 Pages 2012
Examining the role of learning engagement in technology-mediated learning and its effects on learning effectiveness and satisfaction Fulltext Access 11 Pages 2012
Design of an information volatility measure for health care decision making Fulltext Access 11 Pages 2012
RFID-enabled shelf replenishment with backroom monitoring in retail stores Fulltext Access 11 Pages 2012
Multi-criteria decision techniques for context-aware B2B collaboration in supply chains Fulltext Access 11 Pages 2012
Revisiting the incentive to tolerate illegal distribution of software products Fulltext Access 11 Pages 2012
An inventory model with capacity flexibility in the existence of advance capacity information Fulltext Access 11 Pages 2012
Measuring the relative efficiency of IC design firms using the directional distance function and a meta-frontier approach Fulltext Access 11 Pages 2012
Re-examining the influence of trust on online repeat purchase intention: The moderating role of habit and its antecedents Fulltext Access 11 Pages 2012
The effects of location personalization on individuals' intention to use mobile services Fulltext Access 11 Pages 2012
Manipulation of online reviews: An analysis of ratings, readability, and sentiments Fulltext Access 11 Pages 2012
A graph-based action network framework to identify prestigious members through member's prestige evolution Fulltext Access 11 Pages 2012
The progression of online trust in the multi-channel retailer context and the role of product uncertainty Fulltext Access 11 Pages 2012
A generic ballast water discharge assessment model as a decision supporting tool in ballast water management Fulltext Access 11 Pages 2012
Do green supply chain management initiatives impact stock prices of firms? Fulltext Access 11 Pages 2012
Leadership characteristics and developers’ motivation in open source software development Fulltext Access 11 Pages 2012
An analysis of IT/IS outsourcing provider selection for small- and medium-sized enterprises in Taiwan Fulltext Access 11 Pages 2012
Career anchors and disturbances in job turnover decisions – A case study of IT professionals in Taiwan Fulltext Access 11 Pages 2012
Factors influencing business intelligence (BI) data collection strategies: An empirical investigation Fulltext Access 11 Pages 2012
An exploration of risk information search via a search engine: Queries and clicks in healthcare and information security Fulltext Access 11 Pages 2012
Locking the virtual filing cabinet: A researcher's guide to Internet data security Fulltext Access 12 Pages 2012
Satisfaction and post-purchase intentions with service recovery of online shopping websites: Perspectives on perceived justice and emotions Fulltext Access 12 Pages 2012
Prioritization and management of inter-enterprise collaborative performance Fulltext Access 12 Pages 2012
Factors of process model comprehension-Findings from a series of experiments Fulltext Access 12 Pages 2012
Big TAM in Oman: Exploring the promise of on-line banking, its adoption by customers and the challenges of banking in Oman Fulltext Access 12 Pages 2012
A cost-sensitive technique for positive-example learning supporting content-based product recommendations in B-to-C e-commerce Fulltext Access 12 Pages 2012
Self-organization in an agent network: A mechanism and a potential application Fulltext Access 12 Pages 2012
The role of intelligent agents and data mining in electronic partnership management Fulltext Access 12 Pages 2012
Using Wikipedia concepts and frequency in language to extract key terms from support documents Fulltext Access 12 Pages 2012
Texture descriptor based on partially self-avoiding deterministic walker on networks Fulltext Access 12 Pages 2012
A GMDH polynomial neural network-based method to predict approximate three-dimensional structures of polypeptides Fulltext Access 12 Pages 2012
Development of a web-based decision support system for supporting integrated water resources management in Daegu city, South Korea Fulltext Access 12 Pages 2012
Optimization of Radial Basis Function neural network employed for prediction of surface roughness in hard turning process using Taguchi’s orthogonal arrays Fulltext Access 12 Pages 2012
A knowledge based component/service repository to enhance analysts’ domain knowledge for requirements analysis Fulltext Access 12 Pages 2012
A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem Fulltext Access 12 Pages 2012
Mitigating bankruptcy propagation through contractual incentive schemes Fulltext Access 12 Pages 2012
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea Fulltext Access 12 Pages 2012
Ubiquitous IT: The case of the Boeing 787 and implications for strategic IT research Fulltext Access 12 Pages 2012
Vehicle routing problem with time windows considering overtime and outsourcing vehicles Fulltext Access 12 Pages 2012
Information technology investment announcements and market value in transition economies: Evidence from Warsaw Stock Exchange Fulltext Access 12 Pages 2012
Community Health Map: A geospatial and multivariate data visualization tool for public health datasets Fulltext Access 12 Pages 2012
An Open Government Maturity Model for social media-based public engagement Fulltext Access 12 Pages 2012
e-GovQual: A multiple-item scale for assessing e-government service quality Fulltext Access 12 Pages 2012