Search dblp for Publications

export results for "stream:streams/journals/ijsita:"

 download as .bib file

@article{DBLP:journals/ijsita/AlabbasiS19,
  author    = {Yousef Alabbasi and
               Kamaljeet Sandhu},
  title     = {Blockchain Innovation and Information Technology at {GCC:} Literature
               Review and Methodology},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {10},
  number    = {3},
  pages     = {22--37},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJSITA.2019070102},
  doi       = {10.4018/IJSITA.2019070102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/AlabbasiS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/BabaghayouLA19,
  author    = {Messaoud Babaghayou and
               Nabila Labraoui and
               Ado Adamou Abba Ari},
  title     = {Location-Privacy Evaluation Within the Extreme Points Privacy {(EPP)}
               Scheme for {VANET} Users},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {10},
  number    = {2},
  pages     = {44--58},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJSITA.2019040103},
  doi       = {10.4018/IJSITA.2019040103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/BabaghayouLA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/BabaghayouLAG19,
  author    = {Messaoud Babaghayou and
               Nabila Labraoui and
               Ado Adamou Abba Ari and
               Abdelhak Mourad Gu{\'{e}}roui},
  title     = {Transmission Range Changing Effects on Location Privacy-Preserving
               Schemes in the Internet of Vehicles},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {10},
  number    = {4},
  pages     = {33--54},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJSITA.2019100103},
  doi       = {10.4018/IJSITA.2019100103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/BabaghayouLAG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/BalmakhtarM19,
  author    = {Marouane Balmakhtar and
               Scott E. Mensch},
  title     = {Big Data Analytics Adoption Factors in Improving Information Systems
               Security},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {10},
  number    = {3},
  pages     = {1--21},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJSITA.2019070101},
  doi       = {10.4018/IJSITA.2019070101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/BalmakhtarM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/HammoudiHA19,
  author    = {Sarra Hammoudi and
               Saad Harous and
               Zibouda Aliouat},
  title     = {A Robust IOT-Cloud IaaS for Data Availability within Minimum Latency},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {10},
  number    = {4},
  pages     = {16--32},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJSITA.2019100102},
  doi       = {10.4018/IJSITA.2019100102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/HammoudiHA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/HamrounLNA19,
  author    = {Mohamed Hamroun and
               Sonia Lajmi and
               Henri Nicolas and
               Ikram Amous},
  title     = {Descriptor Optimization for Semantic Concept Detection Using Visual
               Content},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {10},
  number    = {1},
  pages     = {40--59},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJSITA.2019010103},
  doi       = {10.4018/IJSITA.2019010103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/HamrounLNA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/KatsamakasS19,
  author    = {Evangelos Katsamakas and
               Aditya N. Saharia},
  title     = {Digital Innovation to Transform the Customer Experience},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {10},
  number    = {3},
  pages     = {38--52},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJSITA.2019070103},
  doi       = {10.4018/IJSITA.2019070103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/KatsamakasS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/LazebMB19,
  author    = {Abdenour Lazeb and
               Riad Mokadem and
               Ghalem Belalem},
  title     = {Towards a New Data Replication Management in Cloud Systems},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {10},
  number    = {2},
  pages     = {1--20},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJSITA.2019040101},
  doi       = {10.4018/IJSITA.2019040101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/LazebMB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Mensah19,
  author    = {Isaac Kofi Mensah},
  title     = {Factors Influencing International Students Behavioral Intention to
               Order Online Food Delivery Services},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {10},
  number    = {1},
  pages     = {23--39},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJSITA.2019010102},
  doi       = {10.4018/IJSITA.2019010102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Mensah19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/NebiliFS19,
  author    = {Wafa Nebili and
               Brahim Farou and
               Hamid Seridi},
  title     = {Using Resources Competition and Memory Cell Development to Select
               the Best {GMM} for Background Subtraction},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {10},
  number    = {2},
  pages     = {21--43},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJSITA.2019040102},
  doi       = {10.4018/IJSITA.2019040102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/NebiliFS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Puaschunder19,
  author    = {Julia Puaschunder},
  title     = {Towards a Utility Theory of Privacy and Information Sharing: The Introduction
               of Hyper-Hyperbolic Discounting},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {10},
  number    = {1},
  pages     = {1--22},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJSITA.2019010101},
  doi       = {10.4018/IJSITA.2019010101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Puaschunder19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/SoualmiAL19,
  author    = {Abdallah Soualmi and
               Adel Alti and
               Lamri Laouamer},
  title     = {A Fast and Effective Watermarking Method for Medical Data security},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {10},
  number    = {4},
  pages     = {1--15},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJSITA.2019100101},
  doi       = {10.4018/IJSITA.2019100101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/SoualmiAL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/ZerhouniB19,
  author    = {Mourad Zerhouni and
               Sidi Mohamed Benslimane},
  title     = {Large-Scale Ontology Alignment- An Extraction Based Method to Support
               Information System Interoperability},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {10},
  number    = {2},
  pages     = {59--84},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJSITA.2019040104},
  doi       = {10.4018/IJSITA.2019040104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/ZerhouniB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/AbdelatifMM18,
  author    = {Sahraoui Abdelatif and
               Derdour Makhlouf and
               Bouchra Marzak},
  title     = {A Multi-Objective {ACO} to Solve the Daily Carpool Problem},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {9},
  number    = {2},
  pages     = {50--60},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJSITA.2018040104},
  doi       = {10.4018/IJSITA.2018040104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/AbdelatifMM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Baporikar18,
  author    = {Neeta Baporikar},
  title     = {Corporate Social Responsibility for Sustainable Strategy},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {9},
  number    = {3},
  pages     = {1--14},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJSITA.2018070101},
  doi       = {10.4018/IJSITA.2018070101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Baporikar18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/DazaH18,
  author    = {Ricardo Daza and
               Kathleen M. Hargiss},
  title     = {Factors Comprising Effective Risk Communication, Decision-Making,
               and Measurement of {IT} and {IA} Risk},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {9},
  number    = {1},
  pages     = {23--40},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJSITA.2018010102},
  doi       = {10.4018/IJSITA.2018010102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/DazaH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/DifE18,
  author    = {Nassima Dif and
               Zakaria Elberrichi},
  title     = {A Multi-Verse Optimizer Approach for Instance Selection and Optimizing
               1-NN Algorithm},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {9},
  number    = {2},
  pages     = {35--49},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJSITA.2018040103},
  doi       = {10.4018/IJSITA.2018040103},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/DifE18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/EtemeN18,
  author    = {Adolphe Ayissi Et{\'{e}}m{\'{e}} and
               Justin Moskolai Ngossaha},
  title     = {The Contribution of ICTs to Sustainable Urbanization and Health in
               Urban Areas in Cameroon},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {9},
  number    = {3},
  pages     = {59--75},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJSITA.2018070104},
  doi       = {10.4018/IJSITA.2018070104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/EtemeN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/GanesanMSA18,
  author    = {Sangeetha Ganesan and
               Vijayalakshmi Muthuswamy and
               Ganapathy Sannasi and
               Kannan Arputharaj},
  title     = {A Comprehensive Analysis of Congestion Control Models in Wireless
               Sensor Networks},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {9},
  number    = {4},
  pages     = {15--37},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJSITA.2018100102},
  doi       = {10.4018/IJSITA.2018100102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/GanesanMSA18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/HassenTG18,
  author    = {Mariam Ben Hassen and
               Mohamed Turki and
               Fa{\"{\i}}ez Gargouri},
  title     = {Sensitive Business Processes: Characteristics, Representation, and
               Evaluation of Modeling Approaches},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {9},
  number    = {1},
  pages     = {41--77},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJSITA.2018010103},
  doi       = {10.4018/IJSITA.2018010103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/HassenTG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/JallouliLA18,
  author    = {Maryam Jallouli and
               Sonia Lajmi and
               Ikram Amous},
  title     = {A New Contextual Influencer User Measure to Improve the Accuracy of
               Recommender System},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {9},
  number    = {4},
  pages     = {38--51},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJSITA.2018100103},
  doi       = {10.4018/IJSITA.2018100103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/JallouliLA18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/JoshiSKP18,
  author    = {Sudhanshu Joshi and
               Manu Sharma and
               Satinder Kumar and
               Manoj Kumar Pant},
  title     = {Co-Creation Among Small Scale Tourism Firm: Role of Information Communication
               and Technology in Productivity and Sustainability},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {9},
  number    = {4},
  pages     = {1--14},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJSITA.2018100101},
  doi       = {10.4018/IJSITA.2018100101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/JoshiSKP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/MenschW18,
  author    = {Scott E. Mensch and
               LeAnn Wilkie},
  title     = {Cell Phone Security: User Awareness of Security Issues and Mobile
               Device Management},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {9},
  number    = {3},
  pages     = {15--31},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJSITA.2018070102},
  doi       = {10.4018/IJSITA.2018070102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/MenschW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Quispe18,
  author    = {Azucena Quispe},
  title     = {Impact of Excessive Access Permissions and Insider Threat Opportunity
               in the Financial Industry: {A} Qualitative Study},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {9},
  number    = {3},
  pages     = {32--58},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJSITA.2018070103},
  doi       = {10.4018/IJSITA.2018070103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Quispe18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Rahman18,
  author    = {Nayem Rahman},
  title     = {Data Mining Techniques and Applications: {A} Ten-Year Update},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {9},
  number    = {1},
  pages     = {78--97},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJSITA.2018010104},
  doi       = {10.4018/IJSITA.2018010104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Rahman18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Rath18,
  author    = {Mamata Rath},
  title     = {Big Data and IoT-Allied Challenges Associated With Healthcare Applications
               in Smart and Automated Systems},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {9},
  number    = {2},
  pages     = {18--34},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJSITA.2018040102},
  doi       = {10.4018/IJSITA.2018040102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Rath18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Ray18,
  author    = {Loye Lynn Ray},
  title     = {Enterprise Resource Planning Deployment and Business Process Reengineering
               at a Major University: {A} Case Study},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {9},
  number    = {1},
  pages     = {98--109},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJSITA.2018010105},
  doi       = {10.4018/IJSITA.2018010105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Ray18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/StockhamL18,
  author    = {Melia K. Stockham and
               Mary Lind},
  title     = {Digital Natives, Work Values, and Computer Self Efficacy},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {9},
  number    = {1},
  pages     = {1--22},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJSITA.2018010101},
  doi       = {10.4018/IJSITA.2018010101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/StockhamL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/YachbaBB18,
  author    = {Khadidja Yachba and
               Zakaria Bendaoud and
               Karim Bouamrane},
  title     = {Toward a Decision Support System for Regulation in an Urban Transport
               Network},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {9},
  number    = {2},
  pages     = {1--17},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJSITA.2018040101},
  doi       = {10.4018/IJSITA.2018040101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/YachbaBB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Ayed17,
  author    = {Ahmed Ben Ayed},
  title     = {Permission Request Pattern Recognition in Android Malware Applications},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {1},
  pages     = {37--49},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017010103},
  doi       = {10.4018/IJSITA.2017010103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Ayed17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/AzabouKFSV17,
  author    = {Maha Azabou and
               Ka{\"{\i}}s Khrouf and
               Jamel Feki and
               Chantal Soul{\'{e}}{-}Dupuy and
               Nathalie Vall{\`{e}}s},
  title     = {Yet Another Multidimensional Model for {XML} Documents},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {3},
  pages     = {73--90},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017070105},
  doi       = {10.4018/IJSITA.2017070105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/AzabouKFSV17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/BendaoudY17,
  author    = {Zakaria Bendaoud and
               Khadidja Yachba},
  title     = {Towards {A} Decision Support System for Optimization of Container
               Placement in a Container Terminal},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {3},
  pages     = {59--72},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017070104},
  doi       = {10.4018/IJSITA.2017070104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/BendaoudY17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/BouougadaBBM17,
  author    = {Benamar Bouougada and
               Djelloul Bouchiha and
               Abdelghani Bouziane and
               Mimoun Malki},
  title     = {Ontology Authoring and Linked Data Generation from Web Applications},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {4},
  pages     = {52--66},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017100105},
  doi       = {10.4018/IJSITA.2017100105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/BouougadaBBM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/DomdouzisAAD17,
  author    = {Konstantinos Domdouzis and
               Babak Akhgar and
               Simon Andrews and
               Tony Day},
  title     = {Identification of Critical Factors in Large Crisis Decision Making
               Processes Using Computational Tools: The Case of {ATHENA}},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {2},
  pages     = {11--28},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017040102},
  doi       = {10.4018/IJSITA.2017040102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/DomdouzisAAD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Heard17,
  author    = {Irvin Renzell Heard},
  title     = {An Empirical Analysis of Mobile Learning Acceptance in Puerto Rico's
               Higher Learning Institutions},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {2},
  pages     = {1--10},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017040101},
  doi       = {10.4018/IJSITA.2017040101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Heard17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Hernandez17,
  author    = {Michael Kevin Hernandez},
  title     = {Survey of the Different Type of Data Analytics Algorithms},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {1},
  pages     = {50--64},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017010104},
  doi       = {10.4018/IJSITA.2017010104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Hernandez17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/KouidriY17,
  author    = {Siham Kouidri and
               Belabbas Yagoubi},
  title     = {Dynamic Data Replication Based on Tasks scheduling for Cloud Computing
               Environment},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {4},
  pages     = {40--51},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017100104},
  doi       = {10.4018/IJSITA.2017100104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/KouidriY17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Lokbani17,
  author    = {Ahmed Chaouki Lokbani},
  title     = {A New Metric of Validation for Automatic Text Summarization by Extraction},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {3},
  pages     = {20--40},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017070102},
  doi       = {10.4018/IJSITA.2017070102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Lokbani17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Mensah17,
  author    = {Isaac Kofi Mensah},
  title     = {Tackling the {ICT} Infrastructure Gap for the Successful Implementation
               of E-Government Projects},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {2},
  pages     = {40--56},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017040104},
  doi       = {10.4018/IJSITA.2017040104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Mensah17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/MensahM17,
  author    = {Isaac Kofi Mensah and
               Jianing Mi},
  title     = {Citizens' Trust and E-government Services Adoption: The Role of Demographic
               Factors},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {1},
  pages     = {21--36},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017010102},
  doi       = {10.4018/IJSITA.2017010102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/MensahM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/NaikLM17,
  author    = {Ramesh Ram Naik and
               Maheshkumar B. Landge and
               C. Namrata Mahender},
  title     = {Plagiarism Detection in Marathi Language Using Semantic Analysis},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {4},
  pages     = {30--39},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017100103},
  doi       = {10.4018/IJSITA.2017100103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/NaikLM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/NairC17,
  author    = {Jessy Nair and
               Aarthy Chellasamy},
  title     = {Technological Change Perspective for {ERP} Implementation in Small
               and Medium Enterprises},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {2},
  pages     = {29--39},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017040103},
  doi       = {10.4018/IJSITA.2017040103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/NairC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/NesrineMLH17,
  author    = {Lehireche Nesrine and
               Malki Mimoun and
               Ahmed Lehireche and
               Reda Mohamed Hamou},
  title     = {On Demand {ETL} of {RDB} to {RDF} Mapping for Linked Enterprise Data},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {3},
  pages     = {91--100},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017070106},
  doi       = {10.4018/IJSITA.2017070106},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/NesrineMLH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/OuhabMBB17,
  author    = {Abdelkrim Ouhab and
               Mimoun Malki and
               Djamel Berrabah and
               Faouzi Boufar{\`{e}}s},
  title     = {An Unsupervised Entity Resolution Framework for English and Arabic
               Datasets},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {4},
  pages     = {16--29},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017100102},
  doi       = {10.4018/IJSITA.2017100102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/OuhabMBB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Reddi17,
  author    = {Sivaranjani Reddi},
  title     = {Privacy Preserving Data Mining Using Time Series Data Aggregation},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {4},
  pages     = {1--15},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017100101},
  doi       = {10.4018/IJSITA.2017100101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Reddi17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/SadekDB17,
  author    = {Menaceur Sadek and
               Makhlouf Derdour and
               Abdelkrim Bouramoul},
  title     = {Personalized Online Analytical Processing in Big Data Context Using
               User Profile and Search Context},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {4},
  pages     = {67--80},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017100106},
  doi       = {10.4018/IJSITA.2017100106},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/SadekDB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Tiwari17,
  author    = {Shamik Tiwari},
  title     = {A Blind Restoration Approach for Defocused Barcode Images},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {3},
  pages     = {41--58},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017070103},
  doi       = {10.4018/IJSITA.2017070103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Tiwari17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/WilliamsM17,
  author    = {Le Shanda Michelle Williams and
               Michael H. McGivern},
  title     = {Women in the Military Who Have Shattered the Glass Ceiling: {A} Phenomenological
               Study},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {1},
  pages     = {1--20},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017010101},
  doi       = {10.4018/IJSITA.2017010101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/WilliamsM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Yahlali17,
  author    = {Mebarka Yahlali},
  title     = {A Survey on Bio-Inspired Method for Detection of Spamming},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {8},
  number    = {3},
  pages     = {1--19},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSITA.2017070101},
  doi       = {10.4018/IJSITA.2017070101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Yahlali17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Adeboye16,
  author    = {Adewale Adeboye},
  title     = {Perceived Use and Acceptance of Cloud Enterprise Resource Planning
               {(ERP)} Implementation in the Manufacturing Industries},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {7},
  number    = {3},
  pages     = {24--40},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSITA.2016070102},
  doi       = {10.4018/IJSITA.2016070102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Adeboye16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/AlnoukariRH16,
  author    = {Mouhib Alnoukari and
               Rakan Razouk and
               Abdullatif Hanano},
  title     = {BSC-SI, {A} Framework for Integrating Strategic Intelligence in Corporate
               Strategic Management},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {7},
  number    = {1},
  pages     = {32--44},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSITA.2016010103},
  doi       = {10.4018/IJSITA.2016010103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/AlnoukariRH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/ArmentaHH16,
  author    = {Barbara J. A. M. G. Armenta and
               Kathleen M. Hargiss and
               Caroline Howard},
  title     = {Exploring Variables that Affect Moral Development of Working Professionals},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {7},
  number    = {1},
  pages     = {1--15},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSITA.2016010101},
  doi       = {10.4018/IJSITA.2016010101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/ArmentaHH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/BaldOH16,
  author    = {Lisa{-}Marie Bald and
               Judith Orth and
               Kathleen M. Hargiss},
  title     = {Moving from Theory to Practice: Integrating Mobile Devices in Elementary
               Reading Instruction},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {7},
  number    = {2},
  pages     = {28--43},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSITA.2016040103},
  doi       = {10.4018/IJSITA.2016040103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/BaldOH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Baporikar16,
  author    = {Neeta Baporikar},
  title     = {Entrepreneurship Culture of SMEs in India's Tourism Sector},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {7},
  number    = {2},
  pages     = {14--27},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSITA.2016040102},
  doi       = {10.4018/IJSITA.2016040102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Baporikar16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Baporikar16a,
  author    = {Neeta Baporikar},
  title     = {Information and Communication Technology for SMEs' Competitiveness},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {7},
  number    = {3},
  pages     = {41--55},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSITA.2016070103},
  doi       = {10.4018/IJSITA.2016070103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Baporikar16a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Ciulin16,
  author    = {Dan Ciulin},
  title     = {New Interpretation of Some Forgotten Problems},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {7},
  number    = {4},
  pages     = {1--63},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSITA.2016100101},
  doi       = {10.4018/IJSITA.2016100101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Ciulin16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/DisselerA16,
  author    = {Shirley A. Disseler and
               Tawannah G. Allen},
  title     = {Using Online Gaming as a Teacher Test Prep Model for Mathematics},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {7},
  number    = {3},
  pages     = {56--68},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSITA.2016070104},
  doi       = {10.4018/IJSITA.2016070104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/DisselerA16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Maravilhas16,
  author    = {S{\'{e}}rgio Maravilhas},
  title     = {Information Strategy Management: {A} Portuguese Approach},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {7},
  number    = {2},
  pages     = {59--81},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSITA.2016040105},
  doi       = {10.4018/IJSITA.2016040105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Maravilhas16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Nulkar16,
  author    = {Gurudas Nulkar},
  title     = {Fostering Environmental Performance Management within Indian SMEs},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {7},
  number    = {2},
  pages     = {1--13},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSITA.2016040101},
  doi       = {10.4018/IJSITA.2016040101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Nulkar16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/PaladinoHH16,
  author    = {Armando E. Paladino and
               Kathleen M. Hargiss and
               Caroline Howard},
  title     = {The Power of Unstructured Data: {A} Study of the Impact of Tacit Knowledge
               on Business Performance},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {7},
  number    = {4},
  pages     = {64--93},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSITA.2016100102},
  doi       = {10.4018/IJSITA.2016100102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/PaladinoHH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Pradhan16,
  author    = {Padma Lochan Pradhan},
  title     = {Proposed Anti-Symmetric Preventive Control Optimizing the Risk on
               {RTOS}},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {7},
  number    = {1},
  pages     = {16--31},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSITA.2016010102},
  doi       = {10.4018/IJSITA.2016010102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Pradhan16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Samara16,
  author    = {Tarek Samara},
  title     = {Impact of the Modularity of ERPs on the Information Systems Disintegration},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {7},
  number    = {1},
  pages     = {45--61},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSITA.2016010104},
  doi       = {10.4018/IJSITA.2016010104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Samara16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Samara16a,
  author    = {Tarek Samara},
  title     = {Impact of the Interoperability of ERPs on Information Systems Disintegration},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {7},
  number    = {4},
  pages     = {94--109},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSITA.2016100103},
  doi       = {10.4018/IJSITA.2016100103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Samara16a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/SambhanthanP16,
  author    = {Arunasalam Sambhanthan and
               Vidyasagar M. Potdar},
  title     = {Organisations' Responsibilities towards Corporate Sustinability: {A}
               Content Analysis of Literature},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {7},
  number    = {2},
  pages     = {44--58},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSITA.2016040104},
  doi       = {10.4018/IJSITA.2016040104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/SambhanthanP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Volz16,
  author    = {Stephen W. Volz},
  title     = {Project Management Education in Online Environments: {A} Study of
               Accredited Programs in the {USA}},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {7},
  number    = {4},
  pages     = {110--119},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSITA.2016100104},
  doi       = {10.4018/IJSITA.2016100104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Volz16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Baporikar15,
  author    = {Neeta Baporikar},
  title     = {Distinctiveness of Techno-Entrepreneurship},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {1},
  pages     = {15--25},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015010102},
  doi       = {10.4018/IJSITA.2015010102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Baporikar15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Baporikar15a,
  author    = {Neeta Baporikar},
  title     = {Adopting Balance Score Card in Higher Education},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {2},
  pages     = {1--11},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015040101},
  doi       = {10.4018/IJSITA.2015040101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Baporikar15a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Baporikar15b,
  author    = {Neeta Baporikar},
  title     = {Holistic Framework for Evolving Effective Information Systems Strategy},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {4},
  pages     = {30--43},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015100103},
  doi       = {10.4018/IJSITA.2015100103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Baporikar15b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Barrons15,
  author    = {Kevin Paul Barrons},
  title     = {Flipped Instructional Technology: Developing {MIS} Competencies Applying
               Enterprise Resource Planning},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {3},
  pages     = {50--60},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015070104},
  doi       = {10.4018/IJSITA.2015070104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Barrons15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Huang15,
  author    = {Leelien Ken Huang},
  title     = {Constructing Green {IT} Alignment Framework: Car Manufacturer Case},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {3},
  pages     = {1--22},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015070101},
  doi       = {10.4018/IJSITA.2015070101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Huang15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/HungHT15,
  author    = {Rose Hung and
               Pi{-}Fang Hsu and
               Chia{-}Wen Tsai},
  title     = {An Investigation of the Application of New Media and Its Impact on
               Taiwan Health Communication},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {1},
  pages     = {1--14},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015010101},
  doi       = {10.4018/IJSITA.2015010101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/HungHT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/HurstM15,
  author    = {Bruce E. Hurst and
               Michael H. McGivern},
  title     = {The Effect of Organizational Commitment on Project Outcomes under
               Common Agency},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {2},
  pages     = {50--71},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015040104},
  doi       = {10.4018/IJSITA.2015040104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/HurstM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/KarlOHH15,
  author    = {Laura Karl and
               Judith Orth and
               Kathleen M. Hargiss and
               Caroline Howard},
  title     = {Elementary Teachers' Perceptions of Technology Proficiencies and Motivation
               to Integrate Technology in School Curricula},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {4},
  pages     = {1--19},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015100101},
  doi       = {10.4018/IJSITA.2015100101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/KarlOHH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/KumarSKB15,
  author    = {Abha Kumar and
               Aditya N. Saharia and
               Evangelos Katsamakas and
               Glenn A. Bixby III},
  title     = {Enterprise 2.0 Implementation at Vanguard: Enabling Collaboration
               and Mobility},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {3},
  pages     = {23--34},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015070102},
  doi       = {10.4018/IJSITA.2015070102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/KumarSKB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/LarteyHH15,
  author    = {Franklin M. Lartey and
               Kathleen M. Hargiss and
               Caroline Howard},
  title     = {Antecedents of Customer Satisfaction Affecting Broadband Loyalty:
               An Implementation of Servqual and NPS{\textregistered}},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {1},
  pages     = {26--41},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015010103},
  doi       = {10.4018/IJSITA.2015010103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/LarteyHH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/MohassesiK15,
  author    = {Ahmad Ali Mohassesi and
               Rozita Shahbaz Keshvari},
  title     = {Using Strategic Planning to Improve Performance Management and Its
               Impact on Organizational Success: {A} Study of Private Sector in Iran},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {4},
  pages     = {44--63},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015100104},
  doi       = {10.4018/IJSITA.2015100104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/MohassesiK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/NsohHH15,
  author    = {Michael Warah Nsoh and
               Kathleen M. Hargiss and
               Caroline Howard},
  title     = {Information Systems Security Policy Compliance: An Analysis of Management
               Employee Interpersonal Relationship and the Impact on Deterrence},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {2},
  pages     = {12--39},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015040102},
  doi       = {10.4018/IJSITA.2015040102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/NsohHH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Ray15,
  author    = {Loye Lynn Ray},
  title     = {Countering Cross-Site Scripting in Web-based Applications},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {1},
  pages     = {57--68},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015010105},
  doi       = {10.4018/IJSITA.2015010105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Ray15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/RoyleH15,
  author    = {Colleen Royle and
               Kathleen M. Hargiss},
  title     = {Comparison of Baccalaureate Nursing Students' Experience of Video-Assisted
               Debriefing versus Oral Debriefing following High-Fidelity Human Simulation},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {2},
  pages     = {40--49},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015040103},
  doi       = {10.4018/IJSITA.2015040103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/RoyleH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Sareen15,
  author    = {Mamta Sareen},
  title     = {Perceived Security as Trust Indicator in Adoption of Internet Banking
               in a Developing Country: An Empirical Study},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {3},
  pages     = {35--49},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015070103},
  doi       = {10.4018/IJSITA.2015070103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Sareen15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/SoteloL15,
  author    = {Benjamin Sotelo and
               Richard Alan Livingood},
  title     = {A Qualitative Case Study for Technology Acceptance Using {TAM} and
               the K{\"{u}}bler-Ross Models},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {4},
  pages     = {20--29},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015100102},
  doi       = {10.4018/IJSITA.2015100102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/SoteloL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/VillegasM15,
  author    = {Marta Villegas and
               Michael H. McGivern},
  title     = {Codes of Ethics, Ethical Behavior, and Organizational Culture from
               the Managerial Approach: {A} Case Study in the Colombian Banking Industry},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {6},
  number    = {1},
  pages     = {42--56},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSITA.2015010104},
  doi       = {10.4018/IJSITA.2015010104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/VillegasM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Al-Maliki14,
  author    = {Saeed Q. Al{-}Khalidi Al{-}Maliki},
  title     = {Analysis and Implementation of Factors Affecting e-Governance Adoption
               in the Kingdom of Saudi Arabia},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {1},
  pages     = {20--29},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014010102},
  doi       = {10.4018/ijsita.2014010102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Al-Maliki14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Baporikar14,
  author    = {Neeta Baporikar},
  title     = {Information Strategy as Enabler of Competitive Advantage},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {1},
  pages     = {30--41},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014010103},
  doi       = {10.4018/ijsita.2014010103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Baporikar14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Baporikar14a,
  author    = {Neeta Baporikar},
  title     = {eBusiness: Critical Success Factors},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {4},
  pages     = {9--19},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014100102},
  doi       = {10.4018/ijsita.2014100102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Baporikar14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/BhartiD14,
  author    = {Ajay Kumar Bharti and
               Sanjay K. Dwivedi},
  title     = {A {BPR} Approach for e-Governance in Public Transportation},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {2},
  pages     = {64--75},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014040105},
  doi       = {10.4018/ijsita.2014040105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/BhartiD14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/BranchM14,
  author    = {NaShawn Branch and
               Michael H. McGivern},
  title     = {Telecommunications Entrepreneurial Orientation {(TELEO):} An Empirical
               Study Measuring the Significance of Entrepreneurial Orientation on
               Business Performance of Small-to-Medium Enterprises {(SME)} in the
               Telecommunications Industry},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {2},
  pages     = {13--26},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014040102},
  doi       = {10.4018/ijsita.2014040102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/BranchM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/ChuK14,
  author    = {Mei{-}Tai Chu and
               Rajiv Khosla},
  title     = {Alignment of Knowledge Sharing Mechanism and Knowledge Node Positioning},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {1},
  pages     = {1--19},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014010101},
  doi       = {10.4018/ijsita.2014010101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/ChuK14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Ciulin14,
  author    = {Dan Ciulin},
  title     = {Physics Based on Energy Transfer Postulate},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {4},
  pages     = {35--77},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014100104},
  doi       = {10.4018/ijsita.2014100104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Ciulin14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/El-KenawyES14,
  author    = {El{-}Sayed M. Towfek El{-}Kenawy and
               Ali Ibraheem El{-}Desoky and
               Amany M. Sarhan},
  title     = {A Bidder Strategy System for Online Auctions Trust Measurement},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {3},
  pages     = {37--47},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014070103},
  doi       = {10.4018/ijsita.2014070103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/El-KenawyES14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/GraySL14,
  author    = {Patrick A. Gray and
               Bo Ingvar Sand{\'{e}}n and
               Phillip A. Laplante},
  title     = {Structural Epochs in Software},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {2},
  pages     = {1--12},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014040101},
  doi       = {10.4018/ijsita.2014040101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/GraySL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/HoustonS14,
  author    = {Clemith J. Houston Jr. and
               Douglas C. Sicker},
  title     = {Maturity and Process Capability Models and Their Use in Measuring
               Resilience in Critical Infrastructure Protection Sectors},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {2},
  pages     = {44--63},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014040104},
  doi       = {10.4018/ijsita.2014040104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/HoustonS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Igun14,
  author    = {Stella E. Igun},
  title     = {Strategic Impact of {ICT} on Modern Day Banking in Nigeria},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {4},
  pages     = {78--93},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014100105},
  doi       = {10.4018/ijsita.2014100105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Igun14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/MoudaniZM14,
  author    = {Walid El Moudani and
               Grace Zaarour and
               F{\'{e}}lix Mora{-}Camino},
  title     = {Fuzzy Prediction of Insolvent Customers in Mobile Telecommunication},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {3},
  pages     = {1--23},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014070101},
  doi       = {10.4018/ijsita.2014070101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/MoudaniZM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/MursiAEE14,
  author    = {Mona F. M. Mursi and
               Hossam El{-}din Hussien Ahmed and
               Fathi E. Abd El{-}Samie and
               Ayman H. Abd El{-}Aziem},
  title     = {Image Encryption Based on Development of H{\'{e}}non Chaotic
               Maps using Fractional Fourier Transform},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {3},
  pages     = {62--77},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014070105},
  doi       = {10.4018/ijsita.2014070105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/MursiAEE14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Najmaei14,
  author    = {Arash Najmaei},
  title     = {Logic of Growth: Business Model versus Strategy},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {4},
  pages     = {20--34},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014100103},
  doi       = {10.4018/ijsita.2014100103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Najmaei14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/PatraP14,
  author    = {Prashant Kumar Patra and
               Padma Lochan Pradhan},
  title     = {An Integrated {RFOS} Model for Risk Assessment on Real Time Operating
               System},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {2},
  pages     = {27--43},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014040103},
  doi       = {10.4018/ijsita.2014040103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/PatraP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/PatraP14a,
  author    = {Prashant Kumar Patra and
               Padma Lochan Pradhan},
  title     = {Dynamic Semi-Group Model for Reliability Engineering Optimizing the
               Risk on {RTOS}},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {3},
  pages     = {48--61},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014070104},
  doi       = {10.4018/ijsita.2014070104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/PatraP14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/RayF14,
  author    = {Loye Lynn Ray and
               Henry Felch},
  title     = {Methodology for Detecting Advanced Persistent Threats in Oracle Databases},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {1},
  pages     = {42--53},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014010104},
  doi       = {10.4018/ijsita.2014010104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/RayF14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/RayF14a,
  author    = {Loye Lynn Ray and
               Henry Felch},
  title     = {Improving Performance and Convergence Rates in Multi-Layer Feed Forward
               Neural Network Intrusion Detection Systems: {A} Review of the Literature},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {3},
  pages     = {24--36},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014070102},
  doi       = {10.4018/ijsita.2014070102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/RayF14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Tirado-CorderoH14,
  author    = {Iv{\'{a}}n Tirado{-}Cordero and
               Kathleen M. Hargiss and
               Caroline Howard},
  title     = {Exploring Self-Efficacy Beliefs as Entry Behaviors for Participation
               in an Online Peer Tutoring Learning Environment},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {1},
  pages     = {54--82},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014010105},
  doi       = {10.4018/ijsita.2014010105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Tirado-CorderoH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/ZamaniVM14,
  author    = {Mahmoud Zamani and
               Changiz Valmohammadi and
               Mona Moshiri},
  title     = {Market Factors, Training Programs, Strategic Management and Performance:
               An Empirical Study of the Iranian Insurance Companies},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {5},
  number    = {4},
  pages     = {1--8},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsita.2014100101},
  doi       = {10.4018/ijsita.2014100101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/ZamaniVM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/AchaHH13,
  author    = {Vera Acha and
               Kathleen M. Hargiss and
               Caroline Howard},
  title     = {The Relationship between Emotional Intelligence of a Leader and Employee
               Motivation to Job Performance},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {4},
  pages     = {80--103},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijsita.2013100105},
  doi       = {10.4018/ijsita.2013100105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/AchaHH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Baporikar13,
  author    = {Neeta Baporikar},
  title     = {{ICT} Challenge for eBusiness in SMEs},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {1},
  pages     = {15--26},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsita.2013010102},
  doi       = {10.4018/jsita.2013010102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Baporikar13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Baporikar13a,
  author    = {Neeta Baporikar},
  title     = {{CSF} Approach for {IT} Strategic Planning},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {2},
  pages     = {35--47},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsita.2013040103},
  doi       = {10.4018/jsita.2013040103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Baporikar13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/BiswasTV13,
  author    = {Aniruddha Guha Biswas and
               Raveesh Tandon and
               Anurika Vaish},
  title     = {A {CASE} Tool Evaluation and Selection Methodology},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {2},
  pages     = {48--60},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsita.2013040104},
  doi       = {10.4018/jsita.2013040104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/BiswasTV13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Cherif13,
  author    = {Emna Cherif},
  title     = {On-Demand Online Real Estate Information System},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {3},
  pages     = {42--67},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijsita.2013070102},
  doi       = {10.4018/ijsita.2013070102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Cherif13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Ciulin13,
  author    = {Dan Ciulin},
  title     = {Contributions to a Future Inertial Motor and More},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {1},
  pages     = {63--97},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsita.2013010105},
  doi       = {10.4018/jsita.2013010105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Ciulin13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Ciulin13a,
  author    = {Dan Ciulin},
  title     = {About Space-Time and More},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {3},
  pages     = {1--41},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijsita.2013070101},
  doi       = {10.4018/ijsita.2013070101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Ciulin13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/CortinaRP13,
  author    = {St{\'{e}}phane Cortina and
               Alain Renault and
               Michel Picard},
  title     = {{TIPA} Process Assessments: {A} Means to Improve Business Value of
               {IT} Services},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {4},
  pages     = {1--18},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijsita.2013100101},
  doi       = {10.4018/ijsita.2013100101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/CortinaRP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Daidj13,
  author    = {Nabyla Daidj},
  title     = {Different Perspectives on {KM} 2.0 New Practices and Web 2.0 Tools
               at Renault-Nissan Alliance Since 2000},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {2},
  pages     = {1--20},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsita.2013040101},
  doi       = {10.4018/jsita.2013040101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Daidj13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/DietrichLS13,
  author    = {Michael Dietrich and
               Jens Lemcke and
               Gunther Stuhec},
  title     = {Iterative Effort Reduction in {B2B} Schema Integration via a Canonical
               Data Model},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {4},
  pages     = {19--43},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijsita.2013100102},
  doi       = {10.4018/ijsita.2013100102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/DietrichLS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/HaqHH13,
  author    = {Hammad Haq and
               Caroline Howard and
               Kathleen M. Hargiss},
  title     = {Looking at {IT} and Business Alignment from the Stone Age of Information
               Technology},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {3},
  pages     = {89--102},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijsita.2013070104},
  doi       = {10.4018/ijsita.2013070104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/HaqHH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/HoS13,
  author    = {Kevin K. W. Ho and
               Eric Wing Kuen See{-}To},
  title     = {Customer Relationship Management and Interface Redesign: {A} Study
               on the Website Design on the eBay Websites on Cultural Perspectives},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {3},
  pages     = {68--88},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijsita.2013070103},
  doi       = {10.4018/ijsita.2013070103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/HoS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/IromuanyaHH13,
  author    = {Chi Iromuanya and
               Kathleen M. Hargiss and
               Caroline Howard},
  title     = {Evidence versus Pragmatism: Unresolved Conflict between Two Construction
               Management Paradigms for Contingency Project Environments},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {1},
  pages     = {27--48},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsita.2013010103},
  doi       = {10.4018/jsita.2013010103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/IromuanyaHH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/IromuanyaHH13a,
  author    = {Chi Iromuanya and
               Kathleen M. Hargiss and
               Caroline Howard},
  title     = {Critical Risk Path Method: {A} Risk and Contingency-Driven Model for
               Construction Procurement in Complex and Dynamic Projects},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {2},
  pages     = {61--73},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsita.2013040105},
  doi       = {10.4018/jsita.2013040105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/IromuanyaHH13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Johnsond13,
  author    = {Neil H. Johnson and
               Jonathan deHaan},
  title     = {Strategic Interaction 2.0: Instructed Intercultural Pragmatics in
               an {EFL} Context},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {1},
  pages     = {49--62},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsita.2013010104},
  doi       = {10.4018/jsita.2013010104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Johnsond13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/KorkpoeN13,
  author    = {Carl Hope Korkpoe and
               Kwamena Minta Nyarku},
  title     = {Building an Organizational Culture that Promotes Innovation in {IT}
               Firms: {A} Conceptual Framework},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {1},
  pages     = {1--14},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsita.2013010101},
  doi       = {10.4018/jsita.2013010101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/KorkpoeN13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Samanta13,
  author    = {Irene Samanta},
  title     = {The Effect of Corporate Social Responsibility on Employees' Behaviour},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {3},
  pages     = {103--112},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijsita.2013070105},
  doi       = {10.4018/ijsita.2013070105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Samanta13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/ShawSFT13,
  author    = {Ruey{-}Shiang Shaw and
               Sheng{-}Pao Shih and
               Ta{-}Yu Fu and
               Chia{-}Wen Tsai},
  title     = {From Entrepreneur to Big Player: {A} Case Study of a Software Company
               in Taiwan},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {2},
  pages     = {21--34},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsita.2013040102},
  doi       = {10.4018/jsita.2013040102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/ShawSFT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/SilvaMCMG13,
  author    = {Catarina Ferreira da Silva and
               Paulo E. Melo and
               Paulo Rupino da Cunha and
               Pedro Milheiro and
               Parisa Ghodous},
  title     = {Using Semantics to Discover Web Services Based on Partial Data: An
               Update of Previous Research},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {4},
  pages     = {44--59},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijsita.2013100103},
  doi       = {10.4018/ijsita.2013100103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/SilvaMCMG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Vragov13,
  author    = {Roumen Vragov},
  title     = {Detecting Behavioral Biases in Mixed Human-Proxy Online Auction Markets},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {4},
  number    = {4},
  pages     = {60--79},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijsita.2013100104},
  doi       = {10.4018/ijsita.2013100104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Vragov13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Baporikar12,
  author    = {Neeta Baporikar},
  title     = {Academic Strategies for Distance Education},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {3},
  pages     = {32--44},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012070103},
  doi       = {10.4018/jsita.2012070103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Baporikar12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/BraggeK12,
  author    = {Johanna Bragge and
               Hannu Kivij{\"{a}}rvi},
  title     = {A Systemic Framework for Accelerating Collaboration-Centered Knowledge
               Management Strategy},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {1},
  pages     = {15--37},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012010102},
  doi       = {10.4018/jsita.2012010102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/BraggeK12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/BurckhardtHH12,
  author    = {Oliver H. Burckhardt and
               Kathleen M. Hargiss and
               Caroline Howard},
  title     = {The Role of Leadership and Technology in Successful and Sustainable
               Airline Management: {A} Case of Two Carriers},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {4},
  pages     = {16--30},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012100102},
  doi       = {10.4018/jsita.2012100102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/BurckhardtHH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/ChenLZA12,
  author    = {Ye{-}Sho Chen and
               Chuanlan Liu and
               Qingfeng Zeng and
               Renato F. L. Azevedo},
  title     = {E-Business Strategy in Franchise Relationship Management},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {1},
  pages     = {54--65},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012010104},
  doi       = {10.4018/jsita.2012010104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/ChenLZA12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/DonateGC12,
  author    = {Mario Javier Donate and
               F{\'{a}}tima Guadamillas and
               Jes{\'{u}}s David S{\'{a}}nchez de Pablo Gonz{\'{a}}lez del Campo},
  title     = {Knowledge Management for Strategic Alliances: {A} Case Study},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {3},
  pages     = {1--19},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012070101},
  doi       = {10.4018/jsita.2012070101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/DonateGC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/FlowersG12,
  author    = {Arhlene A. Flowers and
               Kimberly Gregson},
  title     = {Theoretical and Practical Aspects of Conducting Meetings and Events
               in Virtual Worlds},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {4},
  pages     = {48--64},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012100104},
  doi       = {10.4018/jsita.2012100104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/FlowersG12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/GuptaGSK12,
  author    = {Amar Gupta and
               David A. Gantz and
               Devin Sreecharana and
               Jeremy Kreyling},
  title     = {The Interplay of Offshoring of Professional Services, Law, Intellectual
               Property, and International Organizations},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {2},
  pages     = {47--71},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012040104},
  doi       = {10.4018/jsita.2012040104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/GuptaGSK12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Kasten12,
  author    = {Joseph Kasten},
  title     = {Knowledge Strategy: Its Mitigating Effects on the Organization},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {1},
  pages     = {1--14},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012010101},
  doi       = {10.4018/jsita.2012010101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Kasten12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Kasten12a,
  author    = {Joseph Kasten},
  title     = {Do What They Say, Not What {I} Teach: {A} Strategic Look at the Information
               Systems Skills Gap},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {4},
  pages     = {65--77},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012100105},
  doi       = {10.4018/jsita.2012100105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Kasten12a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/KhaniNSH12,
  author    = {Naser Khani and
               Khalil Md Nor and
               Mojgan Bahrami Samani and
               Hossein Hakimpoor},
  title     = {An Empirical Investigation of Capability Factors Affecting Strategic
               Information System Planning Success},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {2},
  pages     = {1--17},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012040101},
  doi       = {10.4018/jsita.2012040101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/KhaniNSH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/LampHH12,
  author    = {Sandy A. Lamp and
               Kathleen M. Hargiss and
               Caroline Howard},
  title     = {Information Technology Process Improvement Decision-Making: An Exploratory
               Study from the Perspective of Process Owners and Process Manager},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {2},
  pages     = {18--35},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012040102},
  doi       = {10.4018/jsita.2012040102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/LampHH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Mendoza12,
  author    = {Rub{\'{e}}n A. Mendoza},
  title     = {An Exploratory Study of Infrastructure Barriers and the Role of Semantic
               Data Exchange Technologies in the Provisioning of Business Intelligence
               Services},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {3},
  pages     = {45--59},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012070104},
  doi       = {10.4018/jsita.2012070104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Mendoza12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/PetersonH12,
  author    = {Derek Peterson and
               Caroline Howard},
  title     = {Electronic Payment Systems Evaluation: {A} Case Study to Examine System
               Selection Criteria and Impacts},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {1},
  pages     = {66--80},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012010105},
  doi       = {10.4018/jsita.2012010105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/PetersonH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/RizkK12,
  author    = {Nagla Rizk and
               Sherif Kamel},
  title     = {{ICT} Strategy4Development: Public-Private Partnerships - The Case
               of Egypt},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {2},
  pages     = {72--90},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012040105},
  doi       = {10.4018/jsita.2012040105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/RizkK12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Saban12,
  author    = {Kenneth Saban},
  title     = {The Competitive Advantages of a Holistic Approach to Supply Chain
               Management},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {3},
  pages     = {20--31},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012070102},
  doi       = {10.4018/jsita.2012070102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Saban12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Samanta12,
  author    = {Irene Samanta},
  title     = {Exploring the Factors of Customer Retention in Mobile Sector},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {2},
  pages     = {36--46},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012040103},
  doi       = {10.4018/jsita.2012040103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Samanta12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/ShebanowPH12,
  author    = {Annie Shebanow and
               Richard Perez and
               Caroline Howard},
  title     = {The Effect of Firewall Testing Types on Cloud Security Policies},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {3},
  pages     = {60--68},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012070105},
  doi       = {10.4018/jsita.2012070105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/ShebanowPH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/SmithNEM12,
  author    = {L. Douglas Smith and
               Robert M. Nauss and
               Jan Fabian Ehmke and
               Dirk Christian Mattfeld},
  title     = {Analytical Modeling for the Strategic Design of Service Systems},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {4},
  pages     = {1--15},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012100101},
  doi       = {10.4018/jsita.2012100101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/SmithNEM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/SpruitA12,
  author    = {Marco R. Spruit and
               Nizar Abdat},
  title     = {The Pricing Strategy Guideline Framework for SaaS Vendors},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {1},
  pages     = {38--53},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012010103},
  doi       = {10.4018/jsita.2012010103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/SpruitA12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Valcik12,
  author    = {Nicolas A. Valcik},
  title     = {Using Geospatial Information Systems for Strategic Planning and Institutional
               Research for Higher Education Institutions},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {3},
  number    = {4},
  pages     = {31--47},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsita.2012100103},
  doi       = {10.4018/jsita.2012100103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Valcik12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/AborisadeHBL11,
  author    = {Olubunmi P. Aborisade and
               Caroline Howard and
               Debra Beazley and
               Richard Livingood},
  title     = {Citizen Journalism: How Technology Transforms Journalism Business
               through Citizen-Reporters in Nigeria},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {2},
  pages     = {1--11},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011040101},
  doi       = {10.4018/jsita.2011040101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/AborisadeHBL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/AhmadL11,
  author    = {Norita B. Ahmad and
               Phillip A. Laplante},
  title     = {A Systematic Approach to Evaluating Open Source Software},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {1},
  pages     = {48--67},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011010104},
  doi       = {10.4018/jsita.2011010104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/AhmadL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/AlkibsiL11,
  author    = {Sharaf Alkibsi and
               Mary Lind},
  title     = {Service Quality Dimensions Within Technology-Based Banking Services},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {3},
  pages     = {36--83},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011070104},
  doi       = {10.4018/jsita.2011070104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/AlkibsiL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Ciulin11,
  author    = {Dan Ciulin},
  title     = {A Nearly One-to-One Method to Convert Analog Signals into a Small
               Volume of Data: Second Part},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {4},
  pages     = {55--90},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011100105},
  doi       = {10.4018/jsita.2011100105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Ciulin11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Datta11,
  author    = {Avimanyu Datta},
  title     = {Information Technology Capability, Knowledge Assets and Firm Innovation:
               {A} Theoretical Framework for Conceptualizing the Role of Information
               Technology in Firm Innovation},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {3},
  pages     = {9--26},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011070102},
  doi       = {10.4018/jsita.2011070102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Datta11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/DillCHB11,
  author    = {Sharon F. Dill and
               Cynthia Calongne and
               Caroline Howard and
               Debra Beazley},
  title     = {Social Media Intelligence in the Exploration of National Cultural
               Dimensions for Online Social Communities},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {1},
  pages     = {68--79},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011010105},
  doi       = {10.4018/jsita.2011010105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/DillCHB11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/DrnevichBL11,
  author    = {Paul Louis Drnevich and
               Thomas H. Brush and
               Gregory T. Luckock},
  title     = {Process and Structural Implications for IT-Enabled Outsourcing},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {4},
  pages     = {30--43},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011100103},
  doi       = {10.4018/jsita.2011100103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/DrnevichBL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Ho11,
  author    = {Kevin Kai{-}wing Ho},
  title     = {Impact of Prior Usage Experience on the Intention to Adopt 3G Mobile
               Service for the Youth in Hong Kong},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {4},
  pages     = {1--19},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011100101},
  doi       = {10.4018/jsita.2011100101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Ho11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Hunter11,
  author    = {M. Gordon Hunter},
  title     = {The Duality of Information Technology Roles: {A} Case Study},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {1},
  pages     = {37--47},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011010103},
  doi       = {10.4018/jsita.2011010103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Hunter11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/JacksonHL11,
  author    = {Barcus Jackson and
               Caroline Howard and
               Phillip A. Laplante},
  title     = {Use of Technology in the Household: An Exploratory Study},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {4},
  pages     = {20--29},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011100102},
  doi       = {10.4018/jsita.2011100102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/JacksonHL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Kock11,
  author    = {Ned Kock},
  title     = {Representation Type Preferences in Operational Business Process Redesign:
               {A} Quasi-Experimental Field Investigation},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {2},
  pages     = {44--66},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011040104},
  doi       = {10.4018/jsita.2011040104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Kock11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/LeeE11,
  author    = {Cheon{-}Pyo Lee and
               Hee{-}Kwan Eun},
  title     = {Finding the Role of Time Lags in Radio Frequency Identification Investment},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {3},
  pages     = {27--35},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011070103},
  doi       = {10.4018/jsita.2011070103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/LeeE11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/LiuHQH11,
  author    = {Xun Liu and
               Changyu Huang and
               Wei{-}Liang Qian and
               Yong{-}Chang Huang},
  title     = {Studies on Utilizing the Three Famous International Index Systems
               to Evaluate Scientific Research Level of Higher Learning Institutions},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {2},
  pages     = {67--77},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011040105},
  doi       = {10.4018/jsita.2011040105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/LiuHQH11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/McNairHGW11,
  author    = {Monty McNair and
               Caroline Howard and
               Indira R. Guzman and
               Paul Watkin},
  title     = {Creativity Enhancement: Use of a Simple Creativity Tutorial in Information
               Systems Education},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {3},
  pages     = {1--8},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011070101},
  doi       = {10.4018/jsita.2011070101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/McNairHGW11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/SealeH11,
  author    = {Robert O. Seale and
               Kathleen M. Hargiss},
  title     = {A Proposed Architecture for Autonomous Mobile Agent Intrusion Prevention
               and Malware Defense in Heterogeneous Networks},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {4},
  pages     = {44--54},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011100104},
  doi       = {10.4018/jsita.2011100104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/SealeH11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/SharmaMS11,
  author    = {Vinay Sharma and
               Pankaj Madan and
               Piyush Seth},
  title     = {Capability Development of Customers: {A} Globally Viable Business
               Strategy for the Coming Age},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {2},
  pages     = {12--22},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011040102},
  doi       = {10.4018/jsita.2011040102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/SharmaMS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Shawyun11,
  author    = {Teay Shawyun},
  title     = {Strategic Market and Customer Driven {IS/IT} Planning Model},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {1},
  pages     = {11--36},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011010102},
  doi       = {10.4018/jsita.2011010102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Shawyun11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/SinghM11,
  author    = {N. P. Singh and
               Mohammad Jaffer Nayeem M},
  title     = {Critical Analysis of Expansion Strategies of SAP, IBM, Oracle and
               Microsoft in the area of Business Intelligence},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {2},
  pages     = {23--43},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011040103},
  doi       = {10.4018/jsita.2011040103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/SinghM11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/XingWP11,
  author    = {Ruben Xing and
               Zhongxian Wang and
               Richard L. Peterson},
  title     = {Redefining the Information Technology in the 21st Century},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {2},
  number    = {1},
  pages     = {1--10},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsita.2011010101},
  doi       = {10.4018/jsita.2011010101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/XingWP11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Ciulin10,
  author    = {Dan Ciulin},
  title     = {A Nearly One-to-One Method to Convert Analog Signals into a Small
               Volume of Data: First Part: 1-D Signals},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {4},
  pages     = {74--97},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010100105},
  doi       = {10.4018/jsita.2010100105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Ciulin10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/ConfinoL10,
  author    = {Joel P. Confino and
               Phillip A. Laplante},
  title     = {An Open Source Software Evaluation Model},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {1},
  pages     = {60--77},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010101505},
  doi       = {10.4018/jsita.2010101505},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/ConfinoL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/DrnevichM10,
  author    = {Paul Louis Drnevich and
               David P. McIntyre},
  title     = {Information Technology and Strategy: Two Camps, Four Perspectives,
               One Elusive Goal},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {2},
  pages     = {1--18},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010040101},
  doi       = {10.4018/jsita.2010040101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/DrnevichM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/DuhanLP10,
  author    = {Stephen Duhan and
               Margi Levy and
               Philip Powell},
  title     = {Exploring the Role of {IS} in Dynamic Capabilities},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {2},
  pages     = {19--37},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010040102},
  doi       = {10.4018/jsita.2010040102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/DuhanLP10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Gottschalk10,
  author    = {Petter Gottschalk},
  title     = {When {I} Seem More Important than {T} in {IT:} The Case of Police
               Intelligence},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {1},
  pages     = {8--22},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010101502},
  doi       = {10.4018/jsita.2010101502},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Gottschalk10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Hawking10,
  author    = {Paul Hawking},
  title     = {Implementing {ERP} Systems Globally: {A} Case Study},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {3},
  pages     = {26--35},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010070103},
  doi       = {10.4018/jsita.2010070103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Hawking10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Huang10,
  author    = {Leelien Ken Huang},
  title     = {Innovation Managed and {IT} Infrastructure Capability},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {4},
  pages     = {19--41},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010100102},
  doi       = {10.4018/jsita.2010100102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Huang10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Hunter10,
  author    = {M. Gordon Hunter},
  title     = {Leadership and Processes: {A} Review of Strategic Initiatives in the
               Use of Information Technology},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {2},
  pages     = {82--92},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010040105},
  doi       = {10.4018/jsita.2010040105},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Hunter10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/LoukisS10,
  author    = {Euripidis N. Loukis and
               Ioakim A. Sapounas},
  title     = {Innovation, Information Systems Strategic Alignment and Business Value},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {2},
  pages     = {38--54},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010040103},
  doi       = {10.4018/jsita.2010040103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/LoukisS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/MartzRZC10,
  author    = {Ben Martz and
               Vijay V. Raghavan and
               Xiaoni Zhang and
               Gail Corbitt},
  title     = {Concepts Underlying an Academic {ERP} Curriculum},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {3},
  pages     = {1--9},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010070101},
  doi       = {10.4018/jsita.2010070101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/MartzRZC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/MartzS10,
  author    = {Wm. Benjamin Martz Jr. and
               Toru Sakaguchi},
  title     = {Group Support Systems and Action Research: An Empirical-Action Research
               Cycle},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {1},
  pages     = {42--59},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010101504},
  doi       = {10.4018/jsita.2010101504},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/MartzS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Over10,
  author    = {David Van Over},
  title     = {A Framework Using {ITIM} to Guide {IT} Investments by State Governments},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {3},
  pages     = {57--79},
  year      = {2010},
  url       = {http://www.igi-global.com/gateway/article/45769},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Over10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/PaisittanandDL10,
  author    = {Sineenad Paisittanand and
               L. A. Digman and
               Sang M. Lee},
  title     = {Strategic Implementation Effectiveness: The Role of Knowledge Process
               and Infrastructure Capabilities},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {2},
  pages     = {55--81},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010040104},
  doi       = {10.4018/jsita.2010040104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/PaisittanandDL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Peszynski10,
  author    = {Konrad Janusz Peszynski},
  title     = {Understanding Human Factors in Systems Selection and Implementation:
               Exploring the Role of Power and Politics},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {3},
  pages     = {10--25},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010070102},
  doi       = {10.4018/jsita.2010070102},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Peszynski10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/RahmanBH10,
  author    = {Nayem Rahman and
               Peter W. Burkhardt and
               Kevin W. Hibray},
  title     = {Object Migration Tool for Data Warehouses},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {4},
  pages     = {55--73},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010100104},
  doi       = {10.4018/jsita.2010100104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/RahmanBH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/ReimersJK10,
  author    = {Kai Reimers and
               Robert B. Johnston and
               Stefan Klein},
  title     = {Toward a Theory of {IOIS} Variance: {A} New Framework for Studying
               Inter-organisational Information Systems},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {3},
  pages     = {36--56},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010070104},
  doi       = {10.4018/jsita.2010070104},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/ReimersJK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/SpilBS10,
  author    = {Ton A. M. Spil and
               Tijs A. van den Broek and
               Hannu Salmela},
  title     = {It Takes Two to Tango: The Fit Between Network Context and Inter-Organizational
               Strategic Information Systems Planning},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {1},
  pages     = {23--41},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010101503},
  doi       = {10.4018/jsita.2010101503},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/SpilBS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/TsouK10,
  author    = {Ming{-}Hsiang Tsou and
               Ick Hoi Kim},
  title     = {Increasing Spatial Awareness by Integrating Internet Geographic Information
               Services (GIServices) with Real Time Wireless Mobile {GIS} Applications},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {4},
  pages     = {42--54},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010100103},
  doi       = {10.4018/jsita.2010100103},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/TsouK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Turoff10,
  author    = {Murray Turoff},
  title     = {Strategic Considerations for Emergency Preparedness and Management:
               An Editorial Essay},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {1},
  pages     = {1--7},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010101501},
  doi       = {10.4018/jsita.2010101501},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/Turoff10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/XuK10,
  author    = {Mark Xu and
               G. Roland Kaye},
  title     = {An Integrative Framework for Strategic Intelligence},
  journal   = {Int. J. Strateg. Inf. Technol. Appl.},
  volume    = {1},
  number    = {4},
  pages     = {1--18},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsita.2010100101},
  doi       = {10.4018/jsita.2010100101},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsita/XuK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics