-------- Original-Nachricht -------- Betreff: [AISWorld] Journal of Computer Information Systems V50 N3, 2010: Table of Contents Datum: Tue, 11 May 2010 17:15:11 -0500 Von: Lin, Binshan Binshan.Lin@lsus.edu An: aisworld@lists.aisnet.org, aisworld-request@lists.aisnet.org
Journal of Computer Information Systems, Vol. 50, No. 3 Spring 2010 Table of Contents http://iacis.org/jcis/archives/vol50_iss3.html
DEVELOPING METRICS FOR WEB SITES HORST TREIBLMAIER and ANDREAS PINTERITS Keywords: Web Site Analysis, Web Site Design, Web Metrics, Method Triangulation pp. 1-10 Full Text PDF
AN ECOLOGICAL MODEL FOR ORGANIZATIONAL KNOWLEDGE MANAGEMENT DENG-NENG CHEN, TING-PENG LIANG and BINSHAN LIN Keywords: Knowledge Management, Knowledge Ecology, The DICE Model pp. 11-22 Full Text PDF
CRITICAL SUCCESS FACTORS FOR BUSINESS INTELLIGENCE SYSTEMS WILLIAM YEOH and ANDY KORONIOS Keywords: Business Intelligence System, Critical Success Factors, Delphi Method, Case Study pp. 23-32 Full Text PDF
READY FOR BATTLE? A PHENOMENOLOGICAL STUDY OF MILITARY SIMULATIONS SYSTEMS SHEILA CANE, RICHARD McCARTHY and LEILA HALAWI Keywords: Task-Technology Fit, Qualitative Research, Military Simulation pp. 33-40
COMPUTER INFORMATION SYSTEMS IN FINANCIAL CRIME INVESTIGATIONS PETTER GOTTSCHALK and HANS SOLLI-SAETHER Keywords: Data Mining, Business Intelligence, Stages Of Growth, Knowledge Management Systems pp. 41-49
EXPLORING THE IMPACTS OF INTERDEPENDENT RELATIONSHIPS ON IOS USE: THE ROLESOF GOVERNANCE MECHANISMS ZHENGZHONG SHI, A. S. KUNNATHUR and T. S. RAGU-NATHAN Keywords: Inter-organizational Information Systems Use, Interdependent Relationship, Survey Study, Governance, Empirical Test pp. 50-62
CRITICAL MASS, DIFFUSION CHANNELS, AND DIGITAL DIVIDE GANG PENG Keywords: Digital Divide, Computer Applications, Technology Adoption, Critical Mass, Diffusion Channels pp. 63-71
SUBCULTURE, CRITICALMASS, AND TECHNOLOGY USE CANCHU LIN and LOUISA HA Keywords: Critical Mass, Task Interdependence, Social Influence, Subcultures, Technology Use pp. 72-80
IMPROVING OPEN SOURCE SOFTWARE MAINTENANCE VISHAL MIDHA, PRASHANT PALVIA, RAHUL SINGH and NIR KSHETRI Keywords: OSS, Complexity, Software Maintenance pp. 81-90
WILL NEGATIVE EXPERIENCES IMPACT FUTURE IT OUTSOURCING? NARASIMHAIAH GORLA and MEI BIK LAU Keywords: Information Systems, Outsourcing Risk, Negative Outcomes, Re-Outsourcing Decisions, Service Quality, Agency Theory, Transaction Cost Economics pp. 91-101
TECHNOLOGY-ENABLED RETAIL SERVICES AND ONLINE SALES PERFORMANCE ANTENEH AYANSO, KAVEEPAN LERTWACHARA and NARONGSAK THONGPAPANL Keywords: Web Retailing, E-Services, IT-Enabled Services, E-Commerce Services, Web Functionalities, E-Tailing Best Practices pp. 102-111
POWER OF BRANDING ON INTERNET SERVICE PROVIDERS KEVIN KUAN-SHUN CHIU, RU-JEN LIN, MAXWELL K. HSU and LI-HUA HUAN Keywords: Internet Service Provider, Brand Image, Brand Awareness, Brand Trust, Brand Preference, Customer Perceived Value pp. 112-120
BEAUTIFUL BEYOND USEFUL? THEROLEOFWEBAESTHETICS YONG J. WANG, SOONKWAN HONG and HAO LOU Keywords: Web Aesthetics, Web Usability, Web Design, Information Processing, Online Shopping pp. 121-129
USER PERCEPTION DIFFERENCES IN ENTERPRISE RESOURCE PLANNING IMPLEMENTATIONS GIRISH H. SUBRAMANIAN and ALAN R. PESLAK Keywords: Enterprise Resource Planning, IT Adoption, IT Implementation, User Perceptions pp. 130-138
FACTOR STRATEGY MODEL: PROOFS OF PROTOTYPE CONCEPT FOR SOFTWARE QUALITY EVALUATION NATHAN DARMAWAN, ALAIN YEE-LOONG CHONG, KENG-BOON OOI and BOON IN TAN Keywords: Factor Strategy Model, Software Quality, Java, Software Evaluation, Algorithm Analyzer pp. 139-149
WHY EMPLOYEES DO NON-WORK-RELATED COMPUTING IN THE WORKPLACE GEE-WOO BOCK, SANG CHEOL PARK and YANCHUN ZHANZ Keywords: NWRC (Non-Work-Related Computing) Behavior, Cost-Benefit Paradigm, Habit, Control Mechanism pp. 150-163
Dr. Binshan Lin BellSouth Corporation Professor Editor-in-Chief, Journal of Computer Information Systems http://iacis.org/jcis Louisiana State University in Shreveport, Shreveport, LA 71115 Phone: 318.797.5025, Email: Binshan.Lin@LSUS.edu
This message is intended only for the use of the Addressee(s) and may contain information that is PRIVILEGED, CONFIDENTIAL, and/or EXEMPT FROM DISCLOSURE under applicable law. If you are not the intended recipient, you are hereby notified that any disclosure, copying, distribution, or use of the information contained herein is STRICTLY PROHIBITED. If you received this communication in error, please destroy all copies of the message, whether in electronic or hard copy format, as well as attachments and immediately contact the sender by replying to this email.
_______________________________________________ AISWorld mailing list AISWorld@lists.aisnet.org