Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 43 matches
- 2014
- Pär J. Ågerfalk:
Insufficient theoretical contribution: a conclusive rationale for rejection? Eur. J. Inf. Syst. 23(6): 593-599 (2014) - David K. Allen, Stan Karanasios, Alistair Norman:
Information sharing and interoperability: the case of major incident management. Eur. J. Inf. Syst. 23(4): 418-432 (2014) - Anol Bhattacherjee, Sang Cheol Park:
Why end-users move to the cloud: a migration-theoretic analysis. Eur. J. Inf. Syst. 23(3): 357-372 (2014) - Michelle Carter, Ryan T. Wright, Jason Bennett Thatcher, Richard Klein:
Understanding online customers' ties to merchants: the moderating influence of trust on the relationship between switching costs and e-loyalty. Eur. J. Inf. Syst. 23(2): 185-204 (2014) - Yang Chen, Yi Wang, Saggi Nevo, Jiafei Jin, Luning Wang, Wing S. Chow:
IT capability and organizational performance: the roles of business process agility and environmental factors. Eur. J. Inf. Syst. 23(3): 326-342 (2014) - Ioanna D. Constantiou, Christiane Lehrer, Thomas Hess:
Changing information retrieval behaviours: an empirical investigation of users' cognitive processes in the choice of location-based services. Eur. J. Inf. Syst. 23(5): 513-528 (2014) - Kristine Dery, Darl Kolb, Judith MacCormick:
Working with connective flow: how smartphone use is evolving in practice. Eur. J. Inf. Syst. 23(5): 558-570 (2014) - Tamara Dinev:
Why would we care about privacy? Eur. J. Inf. Syst. 23(2): 97-102 (2014) - Jane Elisabeth Frisk, Rikard Lindgren, Lars Mathiassen:
Design matters for decision makers: Discovering IT investment alternatives. Eur. J. Inf. Syst. 23(4): 442-461 (2014) - Shirley Gregor, Ahmed Imran, Tim Turner:
A 'sweet spot' change strategy for a least developed country: leveraging e-Government in Bangladesh. Eur. J. Inf. Syst. 23(6): 655-671 (2014) - Robert Wayne Gregory, Mark Keil:
Blending bureaucratic and collaborative management styles to achieve control ambidexterity in IS projects. Eur. J. Inf. Syst. 23(3): 343-356 (2014) - Andreja Habjan, Constantine Andriopoulos, Manto Gotsi:
The role of GPS-enabled information in transforming operational decision making: an exploratory study. Eur. J. Inf. Syst. 23(4): 481-502 (2014) - Nik Rushdi Hassan:
Paradigm lost ... paradigm gained: a hermeneutical rejoinder to Banville and Landry's 'Can the Field of MIS be Disciplined?'. Eur. J. Inf. Syst. 23(6): 600-615 (2014) - Pei-Ying Huang, Shan Ling Pan, Tao Hua Ouyang:
Developing information processing capability for operational agility: implications from a Chinese manufacturer. Eur. J. Inf. Syst. 23(4): 462-480 (2014) - Stan Karanasios, David K. Allen:
Mobile technology in mobile work: contradictions and congruencies in activity systems. Eur. J. Inf. Syst. 23(5): 529-542 (2014) - Marcus Keutel, Bjoern Michalik, Janek Richter:
Towards mindful case study research in IS: a critical analysis of the past ten years. Eur. J. Inf. Syst. 23(3): 256-272 (2014) - Ram L. Kumar, Antonis C. Stylianou:
A process model for analyzing and managing flexibility in information systems. Eur. J. Inf. Syst. 23(2): 151-184 (2014) - Aurélie Leclercq-Vandelannoitte:
Interrelationships of identity and technology in IT assimilation. Eur. J. Inf. Syst. 23(1): 51-68 (2014) - Aurélie Leclercq-Vandelannoitte, Henri Isaac, Michel Kalika:
Mobile information systems and organisational control: beyond the panopticon metaphor? Eur. J. Inf. Syst. 23(5): 543-557 (2014) - Weizi Li, Kecheng Liu, Hongqiao Yang, Changrui Yu:
Integrated clinical pathway management for medical quality improvement - based on a semiotically inspired systems architecture Open. Eur. J. Inf. Syst. 23(4): 400-417 (2014) - Christos D. Melas, Leonidas A. Zampetakis, Anastasia Dimopoulou, Vassilis Moustakis:
An empirical investigation of Technology Readiness among medical staff based in Greek hospitals. Eur. J. Inf. Syst. 23(6): 672-690 (2014) - Catherine A. Middleton, Rens Scheepers, Virpi Kristiina Tuunainen:
When mobile is the norm: researching mobile information systems and mobility as post-adoption phenomena. Eur. J. Inf. Syst. 23(5): 503-512 (2014) - Caroline Lancelot Miltgen, Dominique Peyrat-Guillard:
Cultural and generational influences on privacy concerns: a qualitative study in seven European countries. Eur. J. Inf. Syst. 23(2): 103-125 (2014) - Ojelanki K. Ngwenyama, Peter Axel Nielsen:
Using organizational influence processes to overcome IS implementation barriers: lessons from a longitudinal case study of SPI implementation. Eur. J. Inf. Syst. 23(2): 205-222 (2014) - Björn Niehaves, Ralf Plattfaut:
Internet adoption by the elderly: employing IS technology acceptance theories for understanding the age-related digital divide Open. Eur. J. Inf. Syst. 23(6): 708-726 (2014) - Marie Caroline Oetzel, Sarah Spiekermann:
A systematic methodology for privacy impact assessments: a design science approach. Eur. J. Inf. Syst. 23(2): 126-150 (2014) - Gabriele Piccoli, Tsz-Wai Lui:
The competitive impact of information technology: can commodity IT contribute to competitive performance? Eur. J. Inf. Syst. 23(6): 616-628 (2014) - Winnie Ng Picoto, France Bélanger, António Palma-dos-Reis:
An organizational perspective on m-business: usage factors and value determination. Eur. J. Inf. Syst. 23(5): 571-592 (2014) - Kai Reimers, Robert B. Johnston, Stefan Klein:
An empirical evaluation of existing IS change theories for the case of IOIS evolution. Eur. J. Inf. Syst. 23(4): 373-399 (2014) - Kai Riemer, Robert Bruce Johnston:
Rethinking the place of the artefact in IS using Heidegger's analysis of equipment. Eur. J. Inf. Syst. 23(3): 273-288 (2014)
skipping 13 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-27 04:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint