[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 20 Dec 2024Bibliometrics
Skip Table Of Content Section
article
"Follow the Sun" Workflow in Global Software Development

Follow the sun (FTS) has interesting appeal-hand off work at the end of every day from one site to the next, many time zones away, in order to speed up product development. Although the potential effect on "time to market" can be profound, at least ...

article
Perpetual Versus Subscription Licensing Under Quality Uncertainty and Network Externality Effects

We discuss the optimal way for a software vendor to license software: a perpetual license at a posted price, a subscription contract that subscribers receive automatic updates for periodic payment, or a hybrid approach that involves both. By addressing ...

article
The Power of Patterns and Pattern Recognition When Developing Information-Based Strategy

Just as scientists in other disciplines use experience and a small set of frequently occurring problems to structure unfamiliar situations, information strategy and economics provides its own patterns to guide and structure the use of experience in ...

article
Models of Collaboration as the Foundation for Collaboration Technologies

Can models of collaboration serve as foundations for development of collaborative technologies in much the same way that engineers use models when developing complex systems? We explore this issue by investigating how eight approaches to understanding ...

article
Bounded Ideation Theory

Organizations often look to their information systems (IS) professionals to work with system stakeholders to generate new ideas to solve complex problems and to provide information technology (IT) artifacts to support ideation processes. Much research ...

article
Network Externalities and Technology Use: A Quantitative Analysis of Intraorganizational Blogs

We examine the role of network externalities on the use of blogs in an organization. Prior research has considered social influences such as peer pressure, but there is little prior work on how the extent of others' actual usage can influence an ...

article
Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment

Decision aids have long been an important source of help in making structured decisions. However, decision support for more complex problems has been much more difficult to create. Decision aids are now being developed for very complex problems, and ...

article
Team Size, Dispersion, and Social Loafing in Technology-Supported Teams: A Perspective on the Theory of Moral Disengagement

Social loafing is the tendency of individuals to withhold contributions to a task in a team setting. Team size and dispersion are two primary drivers of social loafing in technology-supported team settings. However, the mechanisms through which these ...

article
Antecedents and Effects of CIO Supply-Side and Demand-Side Leadership: A Staged Maturity Model

As organizations' information technology (IT) investment goals evolve from improving operational efficiency to enhancing strategic growth, the chief information officer (CIO) is increasingly expected to play not only the traditional supply-side ...

article
The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived

Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U.S. consumers and businesses. Even so, research has yet to ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.