default search action
Search dblp for Publications
export results for "toc:db/journals/tmis/tmis1.bht:"
@article{DBLP:journals/tmis/ArazyC10, author = {Ofer Arazy and Arie Croitoru}, title = {The sustainability of corporate wikis: {A} time-series analysis of activity patterns}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {1}, number = {1}, pages = {6:1--6:24}, year = {2010}, url = {https://doi.org/10.1145/1877725.1877731}, doi = {10.1145/1877725.1877731}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/ArazyC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/BaKSZ10, author = {Sulin Ba and Dan Ke and Jan Stallaert and Zhongju Zhang}, title = {Why give away something for nothing? Investigating virtual goods pricing and permission strategies}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {1}, number = {1}, pages = {4:1--4:22}, year = {2010}, url = {https://doi.org/10.1145/1877725.1877729}, doi = {10.1145/1877725.1877729}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/BaKSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/CaoRA10, author = {Lan Cao and Balasubramaniam Ramesh and Tarek K. Abdel{-}Hamid}, title = {Modeling dynamics in agile software development}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {1}, number = {1}, pages = {5:1--5:26}, year = {2010}, url = {https://doi.org/10.1145/1877725.1877730}, doi = {10.1145/1877725.1877730}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmis/CaoRA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/Chen10, author = {Hsinchun Chen}, title = {Editorial: Welcome to the first issue of \emph{ACM TMIS}}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {1}, number = {1}, pages = {1:1--1:5}, year = {2010}, url = {https://doi.org/10.1145/1877725.1877726}, doi = {10.1145/1877725.1877726}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/Chen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/DavisGMNSW10, author = {Gordon B. Davis and Paul Gray and Stuart E. Madnick and Jay F. Nunamaker Jr. and Ralph H. Sprague Jr. and Andrew B. Whinston}, title = {Ideas for the future of the {IS} field}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {1}, number = {1}, pages = {2:1--2:15}, year = {2010}, url = {https://doi.org/10.1145/1877725.1877727}, doi = {10.1145/1877725.1877727}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/DavisGMNSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/FuCKG10, author = {Yu Fu and Zhiyuan Chen and G{\"{u}}nes Koru and Aryya Gangopadhyay}, title = {A privacy protection technique for publishing data mining models and research data}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {1}, number = {1}, pages = {7:1--7:20}, year = {2010}, url = {https://doi.org/10.1145/1877725.1877732}, doi = {10.1145/1877725.1877732}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/FuCKG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/WangXR10, author = {Jingguo Wang and Nan Xiao and H. Raghav Rao}, title = {Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {1}, number = {1}, pages = {3:1--3:23}, year = {2010}, url = {https://doi.org/10.1145/1877725.1877728}, doi = {10.1145/1877725.1877728}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmis/WangXR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.