-------- Original-Nachricht --------
Journal of Computer Information Systems, Vol. 50, No. 3 Spring 2010
Table of Contents http://iacis.org/jcis/archives/vol50_iss3.html
DEVELOPING METRICS FOR WEB SITES
HORST TREIBLMAIER and ANDREAS PINTERITS
Keywords: Web Site Analysis, Web Site Design, Web Metrics, Method Triangulation
pp. 1-10
Full Text PDF
AN ECOLOGICAL MODEL FOR ORGANIZATIONAL KNOWLEDGE MANAGEMENT
DENG-NENG CHEN, TING-PENG LIANG and BINSHAN LIN
Keywords: Knowledge Management, Knowledge Ecology, The DICE Model
pp. 11-22
Full Text PDF
CRITICAL SUCCESS FACTORS FOR BUSINESS INTELLIGENCE SYSTEMS
WILLIAM YEOH and ANDY KORONIOS
Keywords: Business Intelligence System, Critical Success Factors, Delphi Method, Case Study
pp. 23-32
Full Text PDF
READY FOR BATTLE? A PHENOMENOLOGICAL STUDY OF MILITARY SIMULATIONS SYSTEMS
SHEILA CANE, RICHARD McCARTHY and LEILA HALAWI
Keywords: Task-Technology Fit, Qualitative Research, Military Simulation
pp. 33-40
COMPUTER INFORMATION SYSTEMS IN FINANCIAL CRIME INVESTIGATIONS
PETTER GOTTSCHALK and HANS SOLLI-SAETHER
Keywords: Data Mining, Business Intelligence, Stages Of Growth, Knowledge Management Systems
pp. 41-49
EXPLORING THE IMPACTS OF INTERDEPENDENT RELATIONSHIPS ON IOS USE: THE ROLESOF GOVERNANCE MECHANISMS
ZHENGZHONG SHI, A. S. KUNNATHUR and T. S. RAGU-NATHAN
Keywords: Inter-organizational Information Systems Use, Interdependent Relationship, Survey Study, Governance, Empirical Test
pp. 50-62
CRITICAL MASS, DIFFUSION CHANNELS, AND DIGITAL DIVIDE
GANG PENG
Keywords: Digital Divide, Computer Applications, Technology Adoption, Critical Mass, Diffusion Channels
pp. 63-71
SUBCULTURE, CRITICALMASS, AND TECHNOLOGY USE
CANCHU LIN and LOUISA HA
Keywords: Critical Mass, Task Interdependence, Social Influence, Subcultures, Technology Use
pp. 72-80
IMPROVING OPEN SOURCE SOFTWARE MAINTENANCE
VISHAL MIDHA, PRASHANT PALVIA, RAHUL SINGH and NIR KSHETRI
Keywords: OSS, Complexity, Software Maintenance
pp. 81-90
WILL NEGATIVE EXPERIENCES IMPACT FUTURE IT OUTSOURCING?
NARASIMHAIAH GORLA and MEI BIK LAU
Keywords: Information Systems, Outsourcing Risk, Negative Outcomes, Re-Outsourcing Decisions, Service Quality, Agency Theory, Transaction Cost Economics
pp. 91-101
TECHNOLOGY-ENABLED RETAIL SERVICES AND ONLINE SALES PERFORMANCE
ANTENEH AYANSO, KAVEEPAN LERTWACHARA and NARONGSAK THONGPAPANL
Keywords: Web Retailing, E-Services, IT-Enabled Services, E-Commerce Services, Web Functionalities, E-Tailing Best Practices
pp. 102-111
POWER OF BRANDING ON INTERNET SERVICE PROVIDERS
KEVIN KUAN-SHUN CHIU, RU-JEN LIN, MAXWELL K. HSU and LI-HUA HUAN
Keywords: Internet Service Provider, Brand Image, Brand Awareness, Brand Trust, Brand Preference, Customer Perceived Value
pp. 112-120
BEAUTIFUL BEYOND USEFUL? THEROLEOFWEBAESTHETICS
YONG J. WANG, SOONKWAN HONG and HAO LOU
Keywords: Web Aesthetics, Web Usability, Web Design, Information Processing, Online Shopping
pp. 121-129
USER PERCEPTION DIFFERENCES IN ENTERPRISE RESOURCE PLANNING IMPLEMENTATIONS
GIRISH H. SUBRAMANIAN and ALAN R. PESLAK
Keywords: Enterprise Resource Planning, IT Adoption, IT Implementation, User Perceptions
pp. 130-138
FACTOR STRATEGY MODEL: PROOFS OF PROTOTYPE CONCEPT FOR SOFTWARE QUALITY EVALUATION
NATHAN DARMAWAN, ALAIN YEE-LOONG CHONG, KENG-BOON OOI and BOON IN TAN
Keywords: Factor Strategy Model, Software Quality, Java, Software Evaluation, Algorithm Analyzer
pp. 139-149
WHY EMPLOYEES DO NON-WORK-RELATED COMPUTING IN THE WORKPLACE
GEE-WOO BOCK, SANG CHEOL PARK and YANCHUN ZHANZ
Keywords: NWRC (Non-Work-Related Computing) Behavior, Cost-Benefit Paradigm, Habit, Control Mechanism
pp. 150-163
Dr. Binshan Lin
BellSouth Corporation Professor
Editor-in-Chief, Journal of Computer Information Systems http://iacis.org/jcis
Louisiana State University in Shreveport, Shreveport, LA 71115
Phone: 318.797.5025, Email: Binshan.Lin@LSUS.edu
This message is intended only for the use of the Addressee(s) and may contain information that is PRIVILEGED, CONFIDENTIAL, and/or EXEMPT FROM DISCLOSURE under applicable law. If you are not the intended recipient, you are hereby notified that any disclosure, copying, distribution, or use of the information contained herein is STRICTLY PROHIBITED. If you received this communication in error, please destroy all copies of the message, whether in electronic or hard copy format, as well as attachments and immediately contact the sender by replying to this email.
_______________________________________________
AISWorld mailing list
AISWorld@lists.aisnet.org