


default search action
Journal of Information Technology, Volume 26
Volume 26, Number 1, March 2011
- Jason L. Dedrick, Erran Carmel, Kenneth L. Kraemer:

A dynamic model of offshore software development. 1-15 - Christina Soh, Cecil Chua Eng Huang

, Harminder Singh
:
Managing diverse stakeholders in enterprise systems projects: a control portfolio approach. 16-31 - Bendik Bygstad, Bjørn Erik Munkvold:

Exploring the role of informants in interpretive case study research in IS. 32-45 - Mikko Valorinta:

IT alignment and the boundaries of the IT function. 46-59 - Ali Alper Yayla, Qing Hu:

The impact of information security events on the stock value of firms: the effect of contingency factors. 60-77 - Matthew L. Smith:

Limitations to building institutional trustworthiness through e-government: a comparative study of two e-services in Chile. 78-93
Volume 26, Number 2, June 2011
- Steve Sawyer, Susan J. Winter

:
Special issue on futures for research on information systems: prometheus unbound? 95-98
- Susan J. Winter

, Brian S. Butler
:
Creating bigger problems: grand challenges as boundary objects and the legitimacy of the information systems field. 99-108 - William H. Dutton:

The politics of next generation research: democratizing research-centred computational networks. 109-119 - Erwin P. Gianchandani:

Toward smarter health and well-being: an implicit role for networking and information technology. 120-128 - John Leslie King:

CIO: concept is over. 129-138
- Jennifer Blaskovich, Natalia Mintchik:

Accounting executives and IT outsourcing recommendations: an experimental study of the effect of CIO skills and institutional isomorphism. 139-152
Volume 26, Number 3, September 2011
- Huoy Min Khoo, Daniel Robey, Srinivasan Venkoba Rao:

An exploratory study of the impacts of upgrading packaged software: a stakeholder perspective. 153-169 - Placide Poba-Nzaou, Louis Raymond:

Managing ERP system risk in SMEs: a multiple case study. 170-192 - Jerry N. Luftman, Hossein Seif Zadeh:

Key information technology and management issues 2010-11: an international study. 193-204 - Tim Coltman, Timothy M. Devinney

, David F. Midgley:
Customer relationship management and firm performance. 205-219
Volume 26, Number 4, December 2011
- Mary C. Lacity, Stan Solomon, Aihua Yan

, Leslie P. Willcocks:
Business process outsourcing studies: a critical review and research directions. 221-258
- Helga Drummond:

MIS and illusions of control: an analysis of the risks of risk management. 259-267
- Kalle Lyytinen

:
MIS: the urge to control and the control of illusions - towards a dialectic. 268-270 - Nathalie N. Mitev:

Beyond health warnings: risk, regulation, failure and the paradoxes of risk management. 271-273 - Alexander Budzier

:
The risk of risk registers - managing risk is managing discourse not tools. 274-276 - Li Liu:

Mirage or implementation pitfalls - in defence of risk registers as an effective risk management tool. 277-279 - Henri Barki:

Managing illusions of control. 280-281 - David Wastell:

Risk as 'make-believe': the case of child protection. 282-283 - Helga Drummond:

'Fools with tools', mirrors of imagination, masks of science and electronic metonyms: a response. 284-287
- Robert M. Davison

, Maris G. Martinsons
:
Methodological practice and policy for organisationally and socially relevant IS research: an inclusive-exclusive perspective. 288-293
- Michael D. Myers

:
Is there a methodological crisis? 294-295 - Allen S. Lee

:
IS research methods: inclusive or exclusive? 296-298 - Robert D. Galliers:

In celebration of diversity in information systems research. 299-301 - Joe Nandhakumar, Harry Scarbrough

:
Open sources? A commentary on 'IS research methods: inclusive or exclusive?'. 302-303 - Matt Germonprez:

Pluralism is not about me, it is about us. 304-305 - Rajeev Sharma

:
Research methods and the relevance of the IS discipline: a critical analysis of the role of methodological pluralism. 306-312
- Aaron M. French, Jung P. Shim:

Multinational diversity in IS research: the effects of education on publication outlets. 313-322

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














