default search action
Matt E. Thatcher
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [j16]Lorna Doucet, Sherry M. B. Thatcher, Matt E. Thatcher:
The effects of positive affect and personal information search on outcomes in call centers: An empirical study. Decis. Support Syst. 52(3): 664-673 (2012) - 2011
- [j15]Alan N. Attaway, Satish Chandra, Brian L. Dos Santos, Matt E. Thatcher, Andrew L. Wright:
An Approach to Meeting AACSB Assurance of Learning Standards in an IS Core Course. J. Inf. Syst. Educ. 22(4): 355-366 (2011) - [c8]Matt E. Thatcher, Hoon S. Cha, Manju K. Ahuja, David E. Pingry:
IT Outsourcing: Assessing the Antecedents and Impacts of Knowledge Integration. HICSS 2011: 1-10 - 2010
- [j14]Matt E. Thatcher, David E. Pingry:
Optimal Policy for Software Patents: Model and Comparative Implications. J. Manag. Inf. Syst. 26(3): 103-134 (2010)
2000 – 2009
- 2009
- [j13]Hoon S. Cha, David E. Pingry, Matt E. Thatcher:
What determines IT spending priorities? Commun. ACM 52(8): 105-110 (2009) - [j12]Hoon S. Cha, David E. Pingry, Matt E. Thatcher:
A Learning Model of Information Technology Outsourcing: Normative Implications. J. Manag. Inf. Syst. 26(2) (2009) - [c7]Hoon S. Cha, David E. Pingry, Matt E. Thatcher:
Determining a Firm's Optimal Outsourcing Rate: A Learning Model Perspective. HICSS 2009: 1-10 - 2008
- [j11]Eric K. Clemons, Matt E. Thatcher:
Capital One Financial and a decade of experience with newly vulnerable markets: Some propositions concerning the competitive advantage of new entrants. J. Strateg. Inf. Syst. 17(3): 179-189 (2008) - 2007
- [j10]Matt E. Thatcher, David E. Pingry:
Modeling the IT value paradox. Commun. ACM 50(8): 41-45 (2007) - [j9]Matt E. Thatcher, David E. Pingry:
[Software patents] The good, the bad, and the messy. Commun. ACM 50(10): 47-52 (2007) - 2006
- [j8]Matt E. Thatcher, Taeha Kim, David E. Pingry:
Welfare analysis of alternative patent policies for software innovations. Decis. Support Syst. 41(4): 803-823 (2006) - [j7]Hoon S. Cha, David E. Pingry, Matt E. Thatcher:
Managing the Knowledge Supply Chain: An Organizational Learning Model of Information Technology Offshore Outsourcing. MIS Q. 32(2): 281-306 (2006) - 2005
- [c6]Cynthia Mathis Beath, Michael J. Gallivan, Paul A. Pavlou, Matt E. Thatcher, Sandeep Purao:
Becoming a Great Reviewer for IS Journals. AMCIS 2005: 406 - 2004
- [j6]Matt E. Thatcher, David E. Pingry:
An Economic Model of Product Quality and IT Value. Inf. Syst. Res. 15(3): 268-286 (2004) - [j5]Matt E. Thatcher, David E. Pingry:
Understanding the Business Value of Information Technology Investments: Theoretical Evidence from Alternative Market and Cost Structures. J. Manag. Inf. Syst. 21(2): 61-85 (2004) - [c5]Matt E. Thatcher:
The Impact of Technology on Product Design, Productivity, and Profits: A Duopoly Model of Price-Quality Competition. HICSS 2004 - 2001
- [j4]Matt E. Thatcher, Jim R. Oliver:
The Impact of Technology Investments on a Firm's Production Efficiency, Product Quality, and Productivity. J. Manag. Inf. Syst. 18(2): 17-46 (2001) - [c4]Matt E. Thatcher, Jim R. Oliver:
The Impact of Information Technology on Quality Improvement, Productivity, and Profits: An Analytical Model of a Monopolist. HICSS 2001 - 2000
- [j3]Matt E. Thatcher, Eric K. Clemons:
Managing the Costs of Informational Privacy: Pure Bundling as a Strategy in the Individual Health Insurance Market. J. Manag. Inf. Syst. 17(2): 29-58 (2000) - [c3]Matt E. Thatcher, Eric K. Clemons:
Managing the Costs of Informational Privacy: Bundling as a Strategy in the Individual Health Insurance Market. HICSS 2000
1990 – 1999
- 1998
- [c2]Eric K. Clemons, Matt E. Thatcher:
CapitalOne: Exploiting an Information-Based Strategy. HICSS (6) 1998: 311-320 - 1997
- [j2]Eric K. Clemons, Matt E. Thatcher:
Evaluating Alternative Information Regimes in the Private Health Insurance Industry: Managing the Social Cost of Private Information. J. Manag. Inf. Syst. 14(2): 9-32 (1997) - 1995
- [j1]Eric K. Clemons, Matt E. Thatcher, Michael C. Row:
Identifying Sources of Reengineering Failures: A Study of the Behavioral Factors Contributing to Reengineering Risks. J. Manag. Inf. Syst. 12(2): 9-36 (1995) - [c1]Eric K. Clemons, Michael C. Row, Matt E. Thatcher:
An integrative framework for identifying and managing risks associated with large scale reengineering efforts. HICSS (4) 1995: 960-969
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint