Chan and Kathleen E. The Organization of Software Development: Theories of ICT Design: Fomin and Francois-Xavier de Vaujany. Theories that Explain Contradiction: Theorizing in information systems research: Theorizing the IT Artifact for Mobility: Chon Abraham and Iris Junglas.

Fuller and Christopher J. The Paradox of the Mobile Internet: The Perils of Ignoring "Systems ": The Personalization Privacy Paradox: The play of tropes in the discourse of knowledge workers: The Politics of IS Evaluation: The Potential for Spatial Data Integration: The Price of Convenience: The Problem of Embeddedness: The Process of Creative Destruction: The Province of Diffusion of Innovations: The Provision of Online Public Goods: The Question Concerning Empowerment: Subjects of the Enterprise or Enterprising Subjects?

Ellis, and George Marakas. The Realm of Sociality: There are always two sides to a story: Lessons from Vertical Differentiation , Eli Snir. The Recovery of Government Reputation: Srivastava and Thompson S. The Relationship between Information Technology and Diversification: The Relative Advantage of Electronic Channels: The Repertory Grid Technique: The Research Methodology Cybrarium: The Rise and Fall of a Shadow System: Shaft and Iris Vessey.

The Role of Dealers in Electronic Markets: Exploring the Relationship , James Ding. Potter and Pierre Balthazard. Jarupathirun, and Hangjung Zo. Wareham, and Daniel Robey. Art Gowan and Richard Mathieu. The Role of Proximity in Willingness to Transact: Nath, and Lakshmi Iyer. Chan, and Hee W. Too Little, Too Late? The Sciences of Design: The Semantics of Folksonomies: Galletta, Al Harris, and Fred Niederman. A Model for Synergy , Richard Peterson. The social constitution of Information Technology policies in developing countries , M.

The social construction of trust in e-business: An empirical investigation , Margaret Swan and Howard Rosenbaum. Annapoornima and Pek-Hooi Soh. The Social Identity of IS: The Society we want: The Socio-technical Balanced Scorecard: The Software Continuum Concept: The Spatial Nature of Thought: The state of G2G development: Maturity levels and current challenges , Leif Skiftenes.

Methodological Learnings , Guy G. Gable and Robert W.


  1. The Isherus Goblet.
  2. Devil at Midnight (Novel of the Upyr)!
  3. Post navigation.
  4. ?
  5. Disabling America: The Unintended Consequences of the Governments Protection of the Handicapped.

Vijayaraman, and Akhilesh Chandra. Kathryn Brohman and Wing-Keung Wong. The Technology Acceptance Model: Kozar, and Kai R. The Theoretical Core and Academic Legitimacy: Surviving a Technology Revolution with Robert X. Cringely , Henry C. Lucas and Varun Grover. The Trichotomy of Knowledge: The Trichotomy of Processes: The Unified Modeling Language: The Usefulness of Interpersonal Communication Media: The Use of Information in Decision Making: Aguirre-Urreta and George M.

The Value of E-Business: The Value of Local eGovernment: The Value of Privacy Assurance: Teo, and Sang-Yong T. The Value of Scientometric Studies: The Virtual Interactive Project: The Work of Intrusion Detection: Bateman, and Saral J. The Year Problem: Reinig, and Gert-Jan de Vreede.

Ihr persönliches Job Abo

Thinking Strategically About Community Informatics: Threat Modeling the Enterprise , Jeffrey A. Ingalsbe, Dan Shoemaker, Nancy R. Mead, and Antonio Drommi. Threats Classification with Ishikawa's diagram , Elena Ivankina. Threats to ERP Success: A Case Study , Robert Smyth. Threats to Information Systems: Implementation and Performance Issues , Mark Pendergast.

Epistemology, Audience, and Method , Duane P. Weiss, Alan Thorogood, and Kevin D. Through the Eyes of Experts: Davis and Ellen M. Time for a Change: Conway and Moez Limayem. Time, Times, and Timing: Proell, Werner Retschitzegger, and R. To Animate or Not to Animate? Tokyo Institute of Technology , Nasrin Rahmati.

To Make or to Buy? Topics of Interest in IS: To Share or Not to Share: Total Customer Relationship , W. Total Quality Management Vs. To Trust or Not to Trust? A Comparative Case Study , J. Blanton and Janette Moody.

Toward a capability maturity model for the management of outsourcing information services , Bouchaib Bahli. Toward a Contingency View of Infrastructure and Knowledge: Toward a Multi-Agent Security System: Munoz Rosario, George R. Widmeyer, and Starr Roxanne Hiltz. A Framework and Application , James Tien. Toward Automatic Analysis of Financial Reports: Toward Intelligent Decision Support Systems: A New Framework , Andrew Aken. Towards a holistic undertanding of business and an applied understanding of information systems: Bali, and Nilmini Wickamasinghe.

Towards a Malaysian Information -Rich Society in Towards an autopoietic perspective on knowledge management , Robert Kay and Dubravka Cecez-Kecmanovic. Towards an Intelligent Property Valuation Model: Hale, and David P. Magal, Parag Koslage, and Nancy M. Towards a Unified Framework on Knowledge Sharing: Towards a Unified Framework on Outsourcing: Towards Ethical Information Systems: Towards Social Equity and Prosperity: Towards the Semantic E-Learning: Precursors, Diagnostics, and Prescriptions , Philip F.

Musa, Peter Meso, and Victor W. Tracking Freight Railcars in Indian Railways: Mathur, and Thompson S. Tracking the Mindset of Open Source Participation: Traditional In-class Examination vs. Train to Work Effectively in Virtual Environments: Alex Tung, and Andrew Whinston. Rausch-Schott, and Werner Retschitzegger. Transaktionsautomatisierung im E-Learning , Markus Schmees.

Leonardi and Diane E.

Publications

Transformation towards the Knowledge Economy: Trends in Data Administration , Mark Gillenson. Trends in Information Systems Curricula: A Processual Perspective , S. Trust Building in Electronic Commerce: Trust-building on the Internet: Trusted Third Parties in the Electronic Marketplace: Trust Generation through Extralegal Mechanisms: Trust in B2B Commerce: Trust in E-Commerce Vendors: A Two-Stage Model , D.

Trust in Internet Shopping: Trust in Online Auctions: Trust, Risk and Benefit in Electronic Commerce: What Are the Relationships? Truth-telling Problems in Virtual Society: Higher Order Hypergame , Kyoichi Kijima. Trying to Hit a Moving Target: Turning Runaway Software Projects Around: Templeton and Cheon-Pyo Lee.

Agerfalk, and Brian Fitzgerald. Two Techniques for Qualitative Data Analysis: Uncertainty in the Information Supply Chain: Valacich, and Thiagarajan Ramakrishnan. Understanding and Managing Website Information Content: Hasley and Dawn G. Pavlou, Huigang Liang, and Yajiong Xue.

Recent Posts

Understanding and Predicting Electronic Commerce Adoption: Pavlou and Mendel Fygenson. Understanding Continued IT Usage: Understanding Cultural Influence on Media Choice: Understanding Data and Information Sharing in Organizations: Kendall, and Kin C. Wixom, and Robert J. Shifting the Focus from Technology to Interaction , Abhijit and.

How the NSA betrayed the world's trust -- time to act - Mikko Hypponen

Paradigmatic Rigidities or Different Ends of a Spectrum? Understanding Individual Adoption of Instant Messaging: Chau, and Dahui Li. Understanding Information System Outsourcing Failure: Lessons from a Case Study , R. Chandrasekaran, Ahmed Tayeh, and Vaishali Nagoore. Understanding Information Systems Continuance: Understanding Information Systems Outsourcing: Understanding Internet Advertising , Claudia Loebbecke.

Understanding IT and Social Transformation: Understanding Knowledge Sharing in Virtual Communities: Cooper, Sharman Lichtenstein, and Ross Smith. Understanding Music Sharing Behavior in China: Understanding Network Effects in Software Markets: Gallaugher and Yu-Ming Wang. Understanding Online Community Effectiveness: Understanding Open Source Software: Understanding Problem Solving in Requirements Engineering: Jeffrey Parsons and Linda Cole. Understanding Self-Disclosure in Electronic Communities: Understanding Software Operations Support Expertise: Understanding the Cosourcing Decision: Understanding the Effects of a Paradigm Shift: Understanding the IT Selection Decision: Shek and Choon-Ling Sla.

Understanding the New Economy: A Systemic View , Sunghyun Juhn. King and Jun He. Understanding the role of anxiety and self-efficacy within a computing-intensive learning environment , Chelley Vician and Larry Davis. Understanding the Standardization Process: Raghu, and Ajay Vinze. Understanding User Responses to Information Technology: Understanding Users' Continuance of Facebook: Understanding Virtuality in a Global Organization: Understanding Virtual Team Development: Understanding Workplace Instant Messaging Adoption: A Technology Commitment Perspective , Y.

Ken Wang and Pratim Datta. King, and Ramayya Krishnan. Universal or Conditional Measures of System Use? Unraveling the Temporal Fabric of Knowledge Conversion: Massey and Mitzi M. Unveiling the Mask of Phishing: Unweaving the Phisher's Net: Kamis, and Heikki Topi. Usage and Perceived Impact of Data Warehousing: Bureau of Land Management: An Exploratory Study , Makoto Nakayama.

Publications

Use of Electronic Commerce on the Internet: Use of Genetic Algorithms in Information Retrieval: Adapting Matching Function , Praveen Pathak. An Exploratory Study , Subhasish Dasgupta. User Acceptance of Hedonic Information Technologies: User Acceptance of Information Technology: Davis, and Fred D.

An Empirical Analysis , Amir M. Sharif and Zahir Irani. User Detection of Errors in Data: User Interaction with Healthcare Information Systems: User interface integration in corporate travel management: User Oriented Interface Metaphors: A Comparative Analysis , John Wells. An Inductive Approach , Alexander Serenko. User Profiles for Mobile Technology Applications: User Reactions to Information Technology: Davis, Neset Hikmet, and Varol Kayhan. User Response to an Online Information System: User Satisfaction with Virtual Social Community: O Lee, and Hua Ping Chen.

Uses and Consequences of Electronic Markets: Salam, and Lakshmi Iyer. Produktionsplanung und -steuerung 1. Produktionsplanung und -steuerung 2. Produktionsplanung und -steuerung 3. Integrationsgegenstand — Prozessintegration Beispiele. PPS — Produktionsplanungs- und -steuerungssysteme. Anwendungssysteme im Gesundheitswesen 1. Anwendungssysteme im Gesundheitswesen 2.

Funktionen eines ERP Systems. Charakteristik der SAP Systeme. Technologische Entwicklung innerhalb SAP. Szenarien Fertighaus versus Lego-Prinzip. How much Re-Engineering and when? Markttrends ERP insbesondere Mittelstand. Markttrends ERP insbesondere Mittelstand 2. E-Business und E-Commerce I. Die vier Dimensionen des E-Business. Beziehungen zwischen verschiedenen Akteuren. Plattformen im E-Business 2. Motivation am Beispiel der Umsatzentwicklung im.

Prozesse beim Online-Kauf 2.

New PDF release: Sleeping With Thy Enemy - Ev Book Archive

Problem bei der Umsetzung von E-Commerce. Systeme zur operativen Beschaffung. Systeme zur operativen Beschaffung 2. Systeme zur operativen Beschaffung 3. Verbesserungen durch den Einsatz von E-Procurement. Verbesserungen durch den Einsatz von E-Procurement 2. Intershop Enfinity Suite 6. Enfinity Consumer Channel E-Shop. Business Rules und Enactment. Definition Enterprise Application Integration.

Wer nutzt Services, wer stellt diese bereit? Simple Object Access Protocoll. Simple Object Access Protocoll 2.