


default search action
Journal of Systems and Information Technology, Volume 17
Volume 17, Number 1, 2015
- Heini Sisko Maarit Lipiäinen:

CRM in the digital age: implementation of CRM in three contemporary B2B firms. 2-19 - Mikael Blomé

:
Visualization and establishment of product design regulations as interactive modules: An interaction design study at IKEA. 20-34 - Robert Hugh Campbell, Mark Grimshaw

:
Enochs of the modern workplace: The behaviours by which end users intentionally resist information system implementations. 35-53 - Habib Ullah Khan

, Faisal Talib
, Mohd. Nishat Faisal
:
An analysis of the barriers to the proliferation of M-commerce in Qatar: A relationship modeling approach. 54-81 - Tae-Bong Lee, Min-Nyeon Kim:

The analysis of near and far field pattern through mode analysis and FFT in a finite periodic dielectric gratings. 82-90 - Eunhwa Jung, Kyungho Hong:

Biometric verification based on facial profile images for mobile security. 91-100
Volume 17, Number 2, 2015
- Hyeongi Baek, Mun Koo Kang:

A study on the ontology building methodology for diseases of mind diagnosis. 102-112 - Seokmo Gu, Aria Seo, Yeichang Kim:

A study on distributed transcoding using dynamic allocation of virtual machines in a cloud computing environment. 113-120 - Jaakko Sinisalo, Heikki Karjaluoto

, Saila Saraniemi
:
Barriers to the use of mobile sales force automation systems: a salesperson's perspective. 121-140 - Almamy Touray, Taina Savolainen, Airi Salminen, Erkki Sutinen

, Yue Dai:
The role of trust in enhancing Internet use in a high-risk society. 141-166 - Lakshmanan Ramanathan, Sundaresan Krishnan Iyer:

An empirical investigation into the adoption of open source software in Information Technology outsourcing organizations. 167-192 - Palaniappan Shamala

, Rabiah Ahmad, Ali Hussein Zolait
, Shahrin bin Sahib:
Collective information structure model for Information Security Risk Assessment (ISRA). 193-219
Volume 17, Number 3, 2015
- Aaron Wolfgang Baur, Julian Bühler, Markus Bick:

How pricing of business intelligence and analytics SaaS applications can catch up with their technology. 229-246 - Ronda Harrison, Angelique Parker, Gabrielle Brosas, Raymond Chiong

, Xuemei Tian:
The role of technology in the management and exploitation of internal business intelligence. 247-262 - Md. Shamsul Arefin

, Md. Rakibul Hoque, Yukun Bao:
The impact of business intelligence on organization's effectiveness: an empirical study. 263-285 - Amelia Cahyadi, Adi Prananto:

Reflecting design thinking: a case study of the process of designing dashboards. 286-306 - Janelle Boyton, Peter Ayscough, David Kaveri, Raymond Chiong

:
Suboptimal business intelligence implementations: understanding and addressing the problems. 307-320 - Xuemei Tian, Raymond Chiong, Bill Martin, Rosemary Stockdale:

Introduction to the special issue of the Journal of Systems and Information Technology on Business Intelligence.
Volume 17, Number 4, 2015
- Mark John Taylor, John Haggerty, David Gresty, Natalia Criado Pacheco

, Tom Berry, Peter Almond:
Investigating employee harassment via social media. 322-335 - Yong Liu

, Shengli Deng, Feng Hu, Xiaoyu Chen
:
The impacts of unique service resources and habit on e-service loyalty in a highly competitive market. 336-350 - Chunmei Gan, Weijun Wang:

Uses and gratifications of social media: a comparison of microblog and WeChat. 351-363 - Yiwei Gong

, Marijn Janssen
:
Demystifying the benefits and risks of Lean service innovation: a banking case study. 364-380 - Ping Wang:

Exploring the influence of electronic word-of-mouth on tourists' visit intention: A dual process approach. 381-395

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














