Newsletter Downloads
Is this a Gender Issue?: Lessons from my Unpublished Manuscript
This editorial's purpose is twofold. First, I urge the authors who submit Gender and IT manuscripts to The DATA BASE for Advances in Information Systems to be mindful of the lessons shared in this editorial. My hope is that these lessons from my ...
A Taxonomy and Archetypes of Business Analytics in Smart Manufacturing
Fueled by increasing data availability and the rise of technological advances for data processing and communication, business analytics is a key driver for smart manufacturing. However, due to the multitude of different local advances as well as its ...
Exploring Teams' Temporal Factors for Determining Process Tailoring that Promotes the Evolution of Agilebased Software Development
In contemporary software development, software process tailoring (SPT) refers to the continual planning and adjustment of the development process, which evolves to better accommodate dynamics and meet customer needs. SPT is a critical teamwork involving ...
Examining the Low- Resolution Electromagnetic Tomography Technique for EEG Brain Mapping: Towards Methodological Advancement for IS Research
NeuroIS presents a new opportunity for information systems research. Often used neuroscience techniques include brain mapping with the functional magnetic resonance imaging (fMRI) device or eventrelated potential time-domain studies with the ...
Limited Effectiveness of IT/IS Investments in an Emerging Economy: Evidence from India and Implications
The business value of investments in information technology/information system (IT/IS) has been the subject of active research over several decades. Even though a plethora of similar studies analyzing the impact of promised IT/IS investments on firm ...
How to Compensate After a Data Breach?: Investigating Compensation Types and Role of Fairness in Customer Repatronage Intentions
Data breach recovery is often likened to service failure recovery. Like service failure recovery, compensation is a major factor toward data breach recovery. However, compensation involves different types, which may have varying effects on data breach ...
Subjects
Currently Not Available