| §1542 |
A Conceptual Model of Knowledge Elicitation |
| §1543 | Difficulties in Quantifying IT Projects with Intangible Benefits: A Survey of Local IT Professionals
|
| §1544 | Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity
|
| §1545 | Component-based Software Development: Life Cycles and Design Science-based Recommendations
|
| §2115 | Welcome to CONISAR 2009 Washington D.C.
|
| §2332 | The Ethic and Moral Implications of Affective Computing
|
| §2362 | The Relationship between Information Technology Critical Success Factors and Project Performance
|
| §2363 | Factors that Persuade and Deter Membership in Professional Computing Associations
|
| §2364 | The Impact of Transition Costs on Offshore Systems Development
|
| §2365 | Using A Group Support System in Strategic Academic Planning – A Field Experimental Study on the Influence of Facilitation
|
| §2366 | A Follow-up Study of Detecting Phishing Emails
|
| §3124 | The Impact of Electronic Data Interchange Information Technology on External Auditors
|
| §3125 | An Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model
|
| §3142 | Towards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative
|
| §3143 | Can Management Predict Information Security Threats by Utilizing a Data Warehouse?
|
| §3144 | Spyware: What Influences College Students to Use Anti-Spyware Tools?
|
| §3145 | Workflow Automation and Management Services in Web 2.0: An Object-based Approach to Distributed Workflow Enactment
|
| §3155 | Business Requirements of Knowledge Management Ontology to Support a Software Deployment Process
|
| §3362 | An Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Technology Firm
|
| §3363 | Synchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution
|
| §3364 | E-Commerce Security
|
| §3523 | The Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls
|
| §3544 | Analyzing Community Websites: A Main Street Perspective
|
| §3562 | On Design Science, MCDM, and its Outsourcing Decisions
|
| §3563 | Some Observations on the Occurrences of Data Breaches
|
| §3564 | Knowledge Mapping in a Not-For-Profit Firm: A Case Study
|
| §3732 | A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet
|
| §3733 | Elements of Technology and Success in Virtual Teams
|
| §3742 | Some Observations on the Occurrences of Phishing
|
| §3743 | Object Reuse and Integration in Object-Relational Databases Development
|
| §3763 | An Empirical Study of Text Messaging Behavioral Intention and Usage
|
| §4132 | Women’s Technology Acceptance of Mentoring on the Internet
|
| §4133 | Virtual Organizations: A Definitional Framework
|
| §4134 | The Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community
|
| §4135 | Sustainability and Greening through Information Technology Management
|
| §4152 | Spatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results
|
| §4153 | Superfund Site Analysis Using Web 2.0 Technologies
|
| §4353 | The Effect of Gender on the Application of Ethics within Information Technology: A Meta-analysis
|