


default search action
Information Technology and Management, Volume 15
Volume 15, Number 1, March 2014
- N. R. Mukundan, L. Prakash Sai

:
Perceived information security of internal users in Indian IT services industry. 1-8 - Binu Thomas

, G. Raju
:
A novel unsupervised fuzzy clustering method for preprocessing of quantitative attributes in association rule mining. 9-17 - Tim Jacks, Prashant Palvia:

Measuring value dimensions of IT occupational culture: an exploratory analysis. 19-35 - Jiabao Lin, Bin Wang

, Na Wang, Yaobin Lu:
Understanding the evolution of consumer trust in mobile commerce: a longitudinal study. 37-49 - Amin Omidvar, Mehdi Garakani, Hamid R. Safarpour:

Context based user ranking in forums for expert finding using WordNet dictionary and social network analysis. 51-63 
Volume 15, Number 2, June 2014
- Li Da Xu:

Advances in e-business engineering management. 65-67 - Ling Li, Li Zhang, Marzena Wilamowska-Korsak:

The effects of collaboration on build-to-order supply chains: with a comparison of BTO, MTO, and MTS. 69-79 - Xiaoyu Yu

, Yi Chen
, Bang Nguyen
, Wenhong Zhang:
Ties with government, strategic capability, and organizational ambidexterity: evidence from China's information communication technology industry. 81-98 - Biaoan Shan

, Li Cai, Donald E. Hatfield, Shuqin Tang:
The relationship between resources and capabilities of new ventures in emerging economies. 99-108 - Yuexiang Yang, Li Wang, Yiyang Wang, Zhuming Bi, Yingcheng Xu, Shouhui Pan:

Modeling and optimization of two-stage procurement in dual-channel supply chain. 109-118 - Shukuan Zhao, Haiqing Yu, Yancheng Xu, Zhuming Bi:

Relationship-specific investment, value creation, and value appropriation in cooperative innovation. 119-130 - Jingjuan Guo, Shoubo Xu, Zhuming Bi:

An integrated cost-based approach for real estate appraisals. 131-139 - Kefan Xie, Jia Liu, Yun Chen

, Yong Chen:
Escape behavior in factory workshop fire emergencies: a multi-agent simulation. 141-149 
Volume 15, Number 3, September 2014
- Ravi Seethamraju

:
Enterprise systems and demand chain management: a cross-sectional field study. 151-161 - Rajendra K. Bandi, Ravi Anand Rao, Laxmi Gunupudi:

State of the academic field of IS in India. 163-175 - Alan S. Abrahams

, Reza Barkhi, Eloise Coupey, Cliff T. Ragsdale, Linda G. Wallace:
Converting browsers into recurring customers: an analysis of the determinants of sponsored search success for monthly subscription services. 177-197 - Hemant K. Bhargava:

Platform technologies and network goods: insights on product launch and management. 199-209 - Li Wang, Chao Lei, Yingcheng Xu, Yuexiang Yang, Siqing Shan, Xiaobo Xu:

An information dissemination model of product quality and safety based on scale-free networks. 211-221 
Volume 15, Number 4, December 2014
- Sujeong Choi:

Developing relationship-specific memory and absorptive capacity in interorganizational relationships. 223-238 - Dongyu Chen, Fujun Lai, Zhangxi Lin:

A trust model for online peer-to-peer lending: a lender's perspective. 239-254 - Haixin Liu, Jing Zhang, Renjing Liu, Guiquan Li:

A model for consumer knowledge contribution behavior: the roles of host firm management practices, technology effectiveness, and social capital. 255-270 - Sury Ravindran, Govind S. Iyer:

Organizational and knowledge management related antecedents of knowledge use: the moderating effect of ambiguity tolerance. 271-290 - Dong-Hee Shin, Min Jae Choi:

Ambidextrous information search: linking personal and impersonal search routines with individual performance. 291-304 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














