• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Management Information Systems Journas Latest Articles

Management Information Systems Research Articles

Creating a general collaborative dialogue agent with lounge strategy feature
Fulltext Access 19 Pages 2012
A review of dashboards in performance management: Implications for design and research
Fulltext Access 19 Pages 2012
A state-of the-art survey of TOPSIS applications
Fulltext Access 19 Pages 2012
The impact of tagging qualitative financial information on investor decision making: Implications for XBRL
Fulltext Access 19 Pages 2012
The design of FFML: A rule-based policy modelling language for proactive fraud management in financial data streams
Fulltext Access 20 Pages 2012
Service design of consumer data intermediary for competitive individual targeting
Fulltext Access 20 Pages 2012
PBFilter: A flash-based indexing scheme for embedded systems
Fulltext Access 20 Pages 2012
People, practice, and technology: Restoring Giddens' broader philosophy to the study of information systems
Fulltext Access 20 Pages 2012
Vague continuous K-nearest neighbor queries over moving objects with uncertain velocity in road networks
Fulltext Access 20 Pages 2012
Structured data clouding across multiple webs
Fulltext Access 20 Pages 2012
Role of IT executives in the firm's ability to achieve competitive advantage through IT capability
Fulltext Access 20 Pages 2012
Predictive student model supported by fuzzy-causal knowledge and inference
Fulltext Access 20 Pages 2012
An analysis of attributes that impact information technology audit quality: A study of IT and financial audit practitioners
Fulltext Access 20 Pages 2012
An intelligent XML-based multidimensional data cube exchange
Fulltext Access 20 Pages 2012
Fuzzy linear regression based on Polynomial Neural Networks
Fulltext Access 20 Pages 2012
Organizational strategy development in distribution channel management using fuzzy AHP and hierarchical fuzzy TOPSIS
Fulltext Access 20 Pages 2012
Disclosure of outsourcing in the annual report: Causes and market returns effects
Fulltext Access 21 Pages 2012
Strategies for software-based hybrid business models
Fulltext Access 21 Pages 2012
Institutional effects in the adoption of e-business-technology: Evidence from the German automotive supplier industry
Fulltext Access 21 Pages 2012
Dual materiality and knowing in petroleum production
Fulltext Access 21 Pages 2012
A decision support model for tax revenue collection in Greece
Fulltext Access 21 Pages 2012
A statistical method for detecting on-disk wiped areas
Fulltext Access 21 Pages 2012
An iterative requirements engineering framework based on Formal Concept Analysis and C–K theory
Fulltext Access 21 Pages 2012
Mining anomalous events against frequent sequences in surveillance videos from commercial environments
Fulltext Access 21 Pages 2012
Structuring acyclic process models
Fulltext Access 21 Pages 2012
Creating a specific domain ontology for supporting R&D in the science-based sector – The case of biosensors
Fulltext Access 22 Pages 2012
Fuzzy parametric programming model for multi-objective integrated solid waste management under uncertainty
Fulltext Access 22 Pages 2012
A framework for building web mining applications in the world of blogs: A case study in product sentiment analysis
Fulltext Access 22 Pages 2012
On IT governance structures and their effectiveness in collaborative organizational structures
Fulltext Access 22 Pages 2012
A narrative networks approach to understanding coordination practices in emergency response
Fulltext Access 22 Pages 2012
XBRL and open data for global financial ecosystems: A linked data approach
Fulltext Access 22 Pages 2012
Strategizing information systems-enabled organizational transformation: A transdisciplinary review and new directions
Fulltext Access 22 Pages 2012
Unpacking ostensive and performative aspects of organisational routines in the context of monitoring systems: A critical realist approach
Fulltext Access 22 Pages 2012
Why computer-mediated communication improves the effectiveness of fraud brainstorming
Fulltext Access 23 Pages 2012
A multi-dimensional quality assessment of state-of-the-art process discovery algorithms using real-life event logs
Fulltext Access 23 Pages 2012
Continuous distance-based skyline queries in road networks
Fulltext Access 23 Pages 2012
An iterative approach to synthesize business process templates from compliance rules
Fulltext Access 23 Pages 2012
Knowledge management technology as a stage for strategic self-presentation: Implications for knowledge sharing in organizations
Fulltext Access 23 Pages 2012
Robustness for a single railway line: Analytical and simulation methods
Fulltext Access 23 Pages 2012
New perspectives in ontological analysis: Guidelines and rules for incorporating modelling languages into UEML
Fulltext Access 24 Pages 2012
Model-based auditing using REA
Fulltext Access 24 Pages 2012
Analysis of preprocessing vs. cost-sensitive learning for imbalanced classification. Open problems on intrinsic data characteristics
Fulltext Access 24 Pages 2012
A unified framework for heterogeneous patterns
Fulltext Access 24 Pages 2012
An internal control perspective on the market value consequences of IT operational risk events
Fulltext Access 25 Pages 2012
From disruptions to struggles: Theorizing power in ERP implementation projects
Fulltext Access 25 Pages 2012
Witty invention or dubious fad? Using argument mapping to examine the contours of management fashion
Fulltext Access 25 Pages 2012
Constructing a nutrition diagnosis expert system
Fulltext Access 25 Pages 2012
Process diagnostics using trace alignment: Opportunities, issues, and challenges
Fulltext Access 25 Pages 2012
Discovery and analysis of e-mail-driven business processes
Fulltext Access 27 Pages 2012
A practical application of our MDD approach for modeling secure XML data warehouses
Fulltext Access 27 Pages 2012
Factors of stickiness in transfers of know-how between MNC units
Fulltext Access 27 Pages 2012
A formal model of the Semantic Web Service Ontology (WSMO)
Fulltext Access 28 Pages 2012
How does PLM technology support knowledge transfer and translation in new product development? Transparency and boundary spanners in an international context
Fulltext Access 28 Pages 2012
Information systems strategy: Past, present, future?
Fulltext Access 29 Pages 2012
The institutionalization of information system project management practices
Fulltext Access 29 Pages 2012
The determinants of inter-organizational and internal in-house adoption of XBRL: A structural equation model
Fulltext Access 32 Pages 2012
Core schema mappings: Scalable core computations in data exchange
Fulltext Access 35 Pages 2012
The Truth About DLP
Fulltext Access 4 Pages 2011
Local Ternary Patterns from Three Orthogonal Planes for human action classification
Fulltext Access 4 Pages 2011
What Is Critical to Your Infrastructure?
Fulltext Access 4 Pages 2011
Standards, regulation & quality in digital investigations: The state we are in
Fulltext Access 4 Pages 2011
Exploring the risk factors of preterm birth using data mining
Fulltext Access 4 Pages 2011
Rotting Apple
Fulltext Access 4 Pages 2011
The Spy Who Hacked Me
Fulltext Access 4 Pages 2011
Biometrics: How and Now?
Fulltext Access 4 Pages 2011
AV: Life in the Old Dog?
Fulltext Access 4 Pages 2011
Patricia Titus
Fulltext Access 4 Pages 2011
Edward Amoroso
Fulltext Access 4 Pages 2011
Determination of weights for ultimate cross efficiency using Shannon entropy
Fulltext Access 4 Pages 2011
Fuzzy beans in classification
Fulltext Access 4 Pages 2011
The State of Smartphone Security
Fulltext Access 4 Pages 2011
Security Vendors: Trend-Setters, or Trend Followers?
Fulltext Access 4 Pages 2011
Crossing Borders: The Right Side of Wrong?
Fulltext Access 4 Pages 2011
Improving sale performance prediction using support vector machines
Fulltext Access 4 Pages 2011
Mob Mentalities
Fulltext Access 4 Pages 2011
The CISO Pilgrimage
Fulltext Access 4 Pages 2011
Seven Crucial Infosec Career Steps
Fulltext Access 4 Pages 2011
A Day in the Life of a CISO
Fulltext Access 4 Pages 2011
Life After Breach
Fulltext Access 4 Pages 2011
All Eyes on CSI: Cyberspace
Fulltext Access 4 Pages 2011
Does it Matter if It's Black or White?
Fulltext Access 4 Pages 2011
Gil Shwed
Fulltext Access 4 Pages 2011
WikiLeaks ‘Cablegate’ Dominates Year-End Headlines
Fulltext Access 4 Pages 2011
Michael Higgins
Fulltext Access 4 Pages 2011
Security Risks in the Cloud - Reality, or A Broken Record?
Fulltext Access 4 Pages 2011
The Great Data Center Debate
Fulltext Access 4 Pages 2011
Look Back and Move Forward
Fulltext Access 4 Pages 2011
Data Breach Spring
Fulltext Access 4 Pages 2011
Chinese State of Denial
Fulltext Access 4 Pages 2011
Hord Tipton
Fulltext Access 4 Pages 2011
Compliance Strategies – A.K.A. Alphabet Soup
Fulltext Access 4 Pages 2011
Infosecurity: Do You Eat Your Own Dog Food?
Fulltext Access 4 Pages 2011
Phone Hacking Scandal: Who's Getting the Message?
Fulltext Access 4 Pages 2011
A Superior Education
Fulltext Access 4 Pages 2011
Time to Avoid the Droid?
Fulltext Access 4 Pages 2011
John Colley
Fulltext Access 4 Pages 2011
The World's Dumbest Hackers
Fulltext Access 4 Pages 2011
Persistent and Evasive Attacks Uncovered
Fulltext Access 4 Pages 2011
Breaking the Online Bank
Fulltext Access 4 Pages 2011
Security Education: A Lesson Learned?
Fulltext Access 4 Pages 2011
<< < 95 96 97 98 99 > >>
Related Topics
Innovation Articles
3444 Papers
Risk management Articles
1991 Papers
ERP Articles
1909 Papers
Recruitment Articles
1412 Papers
Corporate governance Articles
1367 Papers
Resource allocation Articles
1241 Papers
Risk analysis Articles
1107 Papers
information technology Articles
1089 Papers
Targeting Articles
1014 Papers
Economic evaluation Articles
887 Papers
Job satisfaction Articles
828 Papers
Trade Articles
826 Papers
Economic development Articles
768 Papers
Empowerment Articles
537 Papers
Accounting Articles
Business and International Management Articles
Business, Management and Accounting (General) Articles
Management Information Systems Articles
Management of Technology and Innovation Articles
Marketing Articles
Organizational Behavior and Human Resource Management Articles
Strategy and Management Articles
Tourism, Leisure and Hospitality Management Articles
All Topics
Related Journals
Accounting Journals
Business and International Management Journals
Business, Management and Accounting (General) Journals
Management Information Systems Journals
Management of Technology and Innovation Journals
Marketing Journals
Organizational Behavior and Human Resource Management Journals
Strategy and Management Journals
Tourism, Leisure and Hospitality Management Journals
Studies in Communication Sciences Journal
Expert Systems with Applications Journal
Information Systems Journal
Digital Investigation Journal
Infosecurity Journal
Infosecurity Today Journal
Decision Support Systems Journal
Information & Management Journal
Information and Organization Journal
Journal of Industrial Information Integration Journal
The Journal of Strategic Information Systems Journal
Contaduría y Administración Journal
International Journal of Accounting Information Systems Journal
Government Information Quarterly Journal
Future Business Journal Journal
International Journal of Information Management Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities