default search action
Information Systems Management, Volume 24
Volume 24, Number 1, 2007
- Carol V. Brown:
From the Editors. 1-2 - E. Vance Wilson, Elliot B. Sloane:
From the Guest Editors. 3-4 - Anol Bhattacherjee, Neset Hikmet, Nir Menachemi, Varol O. Kayhan, Robert G. Brooks:
The Differential Performance Effects of Healthcare Information Technology Adoption. 5-14 - Elizabeth J. Davidson, Dan Heslinga:
Bridging the IT Adoption Gap for Small Physician Practices: An Action Research Study on Electronic Health Records. 15-28 - Tina Blegind Jensen, Margunn Aanestad:
How Healthcare Professionals "Make Sense" of an Electronic Patient Record Adoption. 29-42 - Bill Sallas, Sean Lane, Robert C. Mathews, Thomas Watkins, Sonja Wiley-Patton:
An Iterative Assessment Approach to Improve Technology Adoption and Implementation Decisions by Healthcare Managers. 43-57 - Robin S. Poston, Rebecca B. Reynolds, Mark Lee Gillenson:
Technology Solutions for Improving Accuracy and Availability of Healthcare Records. 59-71 - Biswadip Ghosh, Judy E. Scott:
Effective Knowledge Management Systems for a Clinical Nursing Setting. 73-84 - Alice M. Johnson, Albert L. Lederer:
The Impact of Communication between CEOs and CIOs on their Shared Views of the Current and Future Role of IT. 85-90 - William R. King:
IT STRATEGY AND INNOVATION: Recent Innovations in Knowledge Management. 91-93 - Paul Gray:
BOOKISMS: Minding the Business. 95-100
Volume 24, Number 2, 2007
- Carol V. Brown:
From the Editor. 101-102 - Anthony B. Gerth, Steve Rothman:
The Future IS Organization in a Flat World. 103-111 - Paul Gray, Anat Hovav:
The IS Organization of the Future: Four Scenarios for 2020. 113-120 - William R. King:
The IS Organization of the Future: Impacts of Global Sourcing. 121-127 - Jerry N. Luftman, Rajkumar M. Kempaiah:
The IS Organization of the Future: The IT Talent Challenge. 129-138 - Judy E. Scott:
Mobility, Business Process Management, Software Sourcing, and Maturity Model Trends: Propositions for the IS Organization of the Future. 139-145 - Ray Hoving:
Information Technology Leadership Challenges - Past, Present, and Future. 147-153 - Carolin Fuß, Ralf Gmeiner, Dirk Schiereck, Susanne Strahringer:
ERP Usage in Banking: An Exploratory Survey of the World's Largest Banks. 155-171 - C. Derrick Huang, Qing Hu:
Achieving IT-Business Strategic Alignment via Enterprise-Wide Implementation of Balanced Scorecards. 173-184 - H. Joseph Wen, Dana Schwieger, Pam Gershuny:
Internet Usage Monitoring in the Workplace: Its Legal Challenges and Implementation Strategies. 185-196 - William R. King:
The "IT Deniers" Versus a Portfolio of IT Roles. 197-199 - Paul Gray:
Strategy & Alignment, Analytics & Risk Reduction: Looking to the Future. 201-207
Volume 24, Number 3, 2007
- Janice C. Sipior:
From the Editor. 209-210 - Linda Volonino:
From the Guest Editor. 211-212 - Guy H. Gessner, Linda Volonino, Lynn A. Fish:
One-Up, One-Back ERM in the Food Supply Chain. 213-222 - James L. Parrish Jr., James F. Courtney:
Electronic Records Management in Local Government Agencies: The Case of the Clerk of Courts Office in Lake County Florida. 223-229 - Linda Volonino, Janice C. Sipior, Burke T. Ward:
Managing the Lifecycle of Electronically Stored Information. 231-238 - Ian J. Redpath Esq, Eric M. Redpath, Kathleen Ryan:
Sales and Use Taxation in E-Commerce: Where We Are and What Needs to be Done. 239-245 - George Philip:
IS Strategic Planning for Operational Efficiency. 247-264 - William R. King:
IT Strategy and Innovation: Productivity and IS. 265-266 - Robert L. Glass:
Through a Glass, Darkly : . 267-269 - Paul Gray:
Bookisms: . 271-276
Volume 24, Number 4, 2007
- Janice C. Sipior:
From the Editor. 277-278 - Houston H. Carr:
From the Guest Editor. 279-280 - Randall Young, Lixuan Zhang, Victor R. Prybutok:
Hacking into the Minds of Hackers. 281-287 - Biju Issac, Lawan A. Mohammed:
War Driving and WLAN Security Issues - Attacks, Security Design and Remedies. 289-298 - Houston H. Carr:
Safe Wireless Practices. 299-304 - Robert Gehling, C. Ryan Ashley, Thomas Griffin:
Electronic Emissions Security: Danger in the Air. 305-310 - S. Srividya, V. Vijayaraghavan, R. S. D. Wahida Banu:
Effective Key Management Protocol for Extremely Self-Motivated Environment. 311-318 - Virginia Franke Kleist:
Building Technologically Based Online Trust: Can the Biometrics Industry Deliver the Online Trust Silver Bullet? 319-329 - Rodger Morrison:
Commentary: Multi-Factor Identification and Authentication. 331-332 - Godwin Thomas, Reinhardt A. Botha:
Secure Mobile Device Use in Healthcare Guidance from HIPAA and ISO17799. 333-342 - Radcliff Stewart:
Commentary: Legal Effect of Revealing Private Information in the US and Abroad. 343-344 - Judith C. Simon, Kate M. Kaiser, Cynthia Mathis Beath, Timothy Goles, Kevin P. Gallagher:
Information Technology Workforce Skills: Does Size Matter? 345-359 - Adéle da Veiga, Jan H. P. Eloff:
An Information Security Governance Framework. 361-372 - Abraham Asher:
Developing a B2B E-Commerce Implementation Framework: A Study of EDI Implementation for Procurement. 373-390 - William R. King:
IT Strategy and Innovation: The US and China: A Business and IS Perspective. 391-392 - Robert L. Glass:
Through a Glass, Darkly : IS: Doom and Gloom Forecasts? 393-394
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.