


default search action
Information Systems Management, Volume 24
Volume 24, Number 1, 2007
- Carol V. Brown:

From the Editors. 1-2 - E. Vance Wilson

, Elliot B. Sloane
:
From the Guest Editors. 3-4 - Anol Bhattacherjee, Neset Hikmet

, Nir Menachemi, Varol O. Kayhan, Robert G. Brooks:
The Differential Performance Effects of Healthcare Information Technology Adoption. 5-14 - Elizabeth J. Davidson, Dan Heslinga:

Bridging the IT Adoption Gap for Small Physician Practices: An Action Research Study on Electronic Health Records. 15-28 - Tina Blegind Jensen

, Margunn Aanestad:
How Healthcare Professionals "Make Sense" of an Electronic Patient Record Adoption. 29-42 - Bill Sallas, Sean Lane, Robert C. Mathews, Thomas Watkins, Sonja Wiley-Patton:

An Iterative Assessment Approach to Improve Technology Adoption and Implementation Decisions by Healthcare Managers. 43-57 - Robin S. Poston, Rebecca B. Reynolds, Mark Lee Gillenson:

Technology Solutions for Improving Accuracy and Availability of Healthcare Records. 59-71 - Biswadip Ghosh, Judy E. Scott:

Effective Knowledge Management Systems for a Clinical Nursing Setting. 73-84 - Alice M. Johnson, Albert L. Lederer:

The Impact of Communication between CEOs and CIOs on their Shared Views of the Current and Future Role of IT. 85-90 - William R. King:

IT STRATEGY AND INNOVATION: Recent Innovations in Knowledge Management. 91-93 - Paul Gray:

BOOKISMS: Minding the Business. 95-100
Volume 24, Number 2, 2007
- Carol V. Brown:

From the Editor. 101-102 - Anthony B. Gerth, Steve Rothman:

The Future IS Organization in a Flat World. 103-111 - Paul Gray, Anat Hovav:

The IS Organization of the Future: Four Scenarios for 2020. 113-120 - William R. King:

The IS Organization of the Future: Impacts of Global Sourcing. 121-127 - Jerry N. Luftman, Rajkumar M. Kempaiah:

The IS Organization of the Future: The IT Talent Challenge. 129-138 - Judy E. Scott:

Mobility, Business Process Management, Software Sourcing, and Maturity Model Trends: Propositions for the IS Organization of the Future. 139-145 - Ray Hoving:

Information Technology Leadership Challenges - Past, Present, and Future. 147-153 - Carolin Fuß, Ralf Gmeiner, Dirk Schiereck, Susanne Strahringer

:
ERP Usage in Banking: An Exploratory Survey of the World's Largest Banks. 155-171 - C. Derrick Huang, Qing Hu:

Achieving IT-Business Strategic Alignment via Enterprise-Wide Implementation of Balanced Scorecards. 173-184 - H. Joseph Wen, Dana Schwieger, Pam Gershuny:

Internet Usage Monitoring in the Workplace: Its Legal Challenges and Implementation Strategies. 185-196 - William R. King:

The "IT Deniers" Versus a Portfolio of IT Roles. 197-199 - Paul Gray:

Strategy & Alignment, Analytics & Risk Reduction: Looking to the Future. 201-207
Volume 24, Number 3, 2007
- Janice C. Sipior:

From the Editor. 209-210 - Linda Volonino:

From the Guest Editor. 211-212 - Guy H. Gessner, Linda Volonino, Lynn A. Fish

:
One-Up, One-Back ERM in the Food Supply Chain. 213-222 - James L. Parrish Jr.

, James F. Courtney:
Electronic Records Management in Local Government Agencies: The Case of the Clerk of Courts Office in Lake County Florida. 223-229 - Linda Volonino, Janice C. Sipior, Burke T. Ward:

Managing the Lifecycle of Electronically Stored Information. 231-238 - Ian J. Redpath Esq, Eric M. Redpath, Kathleen Ryan:

Sales and Use Taxation in E-Commerce: Where We Are and What Needs to be Done. 239-245 - George Philip:

IS Strategic Planning for Operational Efficiency. 247-264 - William R. King:

IT Strategy and Innovation: Productivity and IS. 265-266 - Robert L. Glass:

Through a Glass, Darkly : . 267-269 - Paul Gray:

Bookisms: . 271-276
Volume 24, Number 4, 2007
- Janice C. Sipior:

From the Editor. 277-278 - Houston H. Carr:

From the Guest Editor. 279-280 - Randall Young, Lixuan Zhang, Victor R. Prybutok

:
Hacking into the Minds of Hackers. 281-287 - Biju Issac

, Lawan A. Mohammed:
War Driving and WLAN Security Issues - Attacks, Security Design and Remedies. 289-298 - Houston H. Carr:

Safe Wireless Practices. 299-304 - Robert Gehling, C. Ryan Ashley, Thomas Griffin:

Electronic Emissions Security: Danger in the Air. 305-310 - S. Srividya, V. Vijayaraghavan, R. S. D. Wahida Banu:

Effective Key Management Protocol for Extremely Self-Motivated Environment. 311-318 - Virginia Franke Kleist:

Building Technologically Based Online Trust: Can the Biometrics Industry Deliver the Online Trust Silver Bullet? 319-329 - Rodger Morrison

:
Commentary: Multi-Factor Identification and Authentication. 331-332 - Godwin Thomas, Reinhardt A. Botha

:
Secure Mobile Device Use in Healthcare Guidance from HIPAA and ISO17799. 333-342 - Radcliff Stewart:

Commentary: Legal Effect of Revealing Private Information in the US and Abroad. 343-344 - Judith C. Simon, Kate M. Kaiser, Cynthia Mathis Beath, Timothy Goles, Kevin P. Gallagher:

Information Technology Workforce Skills: Does Size Matter? 345-359 - Adéle da Veiga

, Jan H. P. Eloff:
An Information Security Governance Framework. 361-372 - Abraham Asher:

Developing a B2B E-Commerce Implementation Framework: A Study of EDI Implementation for Procurement. 373-390 - William R. King:

IT Strategy and Innovation: The US and China: A Business and IS Perspective. 391-392 - Robert L. Glass:

Through a Glass, Darkly : IS: Doom and Gloom Forecasts? 393-394

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














