nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A conceptual model and IS framework for the design and adoption of environmental compliance management systems
|
Butler, Tom |
|
2009 |
14 |
2 |
p. 221-235 |
artikel |
2 |
A decision support system for locating weapon and radar positions in stationary point air defence
|
Tanergüçlü, Türker |
|
2010 |
14 |
2 |
p. 423-444 |
artikel |
3 |
A study of mobile internet user’s service quality perceptions from a user’s utilitarian and hedonic value tendency perspectives
|
Kim, Dan J. |
|
2010 |
14 |
2 |
p. 409-421 |
artikel |
4 |
Business process design: Process comparison and integration
|
Xiao, Lan |
|
2010 |
14 |
2 |
p. 363-374 |
artikel |
5 |
Determinants of relationship quality for IS/IT outsourcing success in public sector
|
Swar, Bobby |
|
2010 |
14 |
2 |
p. 457-475 |
artikel |
6 |
Effective information technology (IT) governance mechanisms: An IT outsourcing perspective
|
Ali, Syaiful |
|
2009 |
14 |
2 |
p. 179-193 |
artikel |
7 |
Effects of firm and IT characteristics on the value of e-commerce initiatives: An inductive theoretical framework
|
Andoh-Baidoo, Francis Kofi |
|
2010 |
14 |
2 |
p. 237-259 |
artikel |
8 |
Governance, risk and compliance: Applications in information systems
|
Sadiq, Shazia |
|
2011 |
14 |
2 |
p. 123-124 |
artikel |
9 |
Hidden assumptions and their influence on clinicians’ acceptance of new IT systems in the NHS
|
Fernando, Senaka |
|
2010 |
14 |
2 |
p. 279-299 |
artikel |
10 |
Inter-organisational knowledge transfer in social networks: A definition of intermediate ties
|
Retzer, Silke |
|
2010 |
14 |
2 |
p. 343-361 |
artikel |
11 |
Managing license compliance in free and open source software development
|
Gangadharan, G. R. |
|
2009 |
14 |
2 |
p. 143-154 |
artikel |
12 |
Modeling the growth of complex software function dependency networks
|
Ma, James |
|
2010 |
14 |
2 |
p. 301-315 |
artikel |
13 |
Modeling trade-offs in the design of sensor-based event processing infrastructures
|
Voisard, Agnès |
|
2010 |
14 |
2 |
p. 317-330 |
artikel |
14 |
On compliance checking for clausal constraints in annotated process models
|
Hoffmann, Jörg |
|
2009 |
14 |
2 |
p. 155-177 |
artikel |
15 |
On enabling integrated process compliance with semantic constraints in process management systems
|
Ly, Linh Thao |
|
2009 |
14 |
2 |
p. 195-219 |
artikel |
16 |
Organizational schemata of e-portfolios for fostering higher-order thinking
|
Wang, Shouhong |
|
2010 |
14 |
2 |
p. 395-407 |
artikel |
17 |
Preface
|
Sadiq, Shazia |
|
2012 |
14 |
2 |
p. 119-121 |
artikel |
18 |
The enactment of risk categories: The role of information systems in organizing and re-organizing risk management practices in the energy industry
|
Scott, Susan |
|
2009 |
14 |
2 |
p. 125-141 |
artikel |
19 |
The impact of information and communication technology on skilled labor and organization types
|
Seo, Hwan-Joo |
|
2010 |
14 |
2 |
p. 445-455 |
artikel |
20 |
The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet
|
Lee, MinJae |
|
2010 |
14 |
2 |
p. 375-393 |
artikel |
21 |
Time dynamics of overlapping e-auction mechanisms: Information transfer, strategic user behavior and auction revenue
|
Chang, Seokjoo Andrew |
|
2010 |
14 |
2 |
p. 331-342 |
artikel |
22 |
Use, perceived deterrence and the role of software piracy in video game console adoption
|
Kartas, Anastasiou |
|
2010 |
14 |
2 |
p. 261-277 |
artikel |