


default search action
International Journal of Information Management, Volume 34
Volume 34, Number 1, February 2014
- Carolina Martins, Tiago Oliveira

, Ales Popovic
:
Understanding the Internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application. 1-13 - Benjamin Uwadum Ugwoke:

Libraries and information in Nigerian rural development. 14-16 - Benjamin Uwadum Ugwoke, Ifeyinwa Omekwu:

Public libraries and Nigerian cultural development. 17-19
- Neil Foshay, Craig E. Kuziemsky:

Towards an implementation framework for business intelligence in healthcare. 20-27 - Jiunn-Woei Lian, David C. Yen

, Yen-Ting Wang:
An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital. 28-36 - Ali E. Akgün, Gary S. Lynn, Halit Keskin

, Derya Dogan
:
Team learning in IT implementation projects: Antecedents and consequences. 37-47 - Mahmood Hussain Shah

, Hamid Reza Peikari, Norjaya Mohd Yasin:
The determinants of individuals' perceived e-security: Evidence from Malaysia. 48-57
- Neil McBride:

Business intelligence in magazine distribution. 58-62
- Margot Note:

Lifehacker: The Guide to Working Smarter, Faster, and Better, 3rd ed., A. Pash, G. Trapani. Wiley Publishing, Indianapolis (2011), ISBN: 978-1-118-01837-8. 63
Volume 34, Number 2, April 2014
- Jo Royle

, Audrey Laing
:
The digital marketing skills gap: Developing a Digital Marketer Model for the communication industries. 65-73 - Kristine N. Stewart

, Josipa Basic:
Information encountering and management in information literacy instruction of undergraduate, students. 74-79 - Petros A. Kostagiolas

, Nikolaos Korfiatis
, Panos Kourouthanasis
, Georgios Alexias:
Work-related factors influencing doctors search behaviors and trust toward medical information resources. 80-88 - Kem Z. K. Zhang

, Christy M. K. Cheung
, Matthew K. O. Lee
:
Examining the moderating effect of inconsistent reviews and its gender differences on consumers' online shopping decision. 89-98 - Kevin Grant, David Edgar

, Arun Sukumar
, Martin Meyer
:
'Risky business': Perceptions of e-business risk by UK small and medium sized enterprises (SMEs). 99-122 - Mohammad Reza Habibi, Michel Laroche, Marie-Odile Richard:

Brand communities based in social media: How unique are they? Evidence from two exemplary brand communities. 123-132
- Adel M. Aladwani

:
The 6As model of social content management. 133-138
- Martin Aruldoss

, T. Miranda Lakshmi
, V. Prasanna Venkatesan:
An information delivery model for banking business. 139-150 - Francisco J. Liébana-Cabanillas

, Juan Sánchez-Fernández
, Francisco Muñoz-Leiva:
The moderating effect of experience in the adoption of mobile payment tools in Virtual Social Networks: The m-Payment Acceptance Model in Virtual Social Networks (MPAM-VSN). 151-166 - Jaime A. Palma-Mendoza, Kevin Neailey, Rajat Roy:

Business process re-design methodology to support supply chain integration. 167-176 - Nabil Sultan

:
Making use of cloud computing for healthcare provision: Opportunities and challenges. 177-184 - Nisha Sewdass

, Adeline du Toit:
Current state of competitive intelligence in South Africa. 185-190 - Elias Melchor-Ferrer

, Dionisio Buendía-Carrillo
:
Financial information management for university departments, using open-source software. 191-199 - Norman Shaw:

The role of the professional association: A grounded theory study of Electronic Medical Records usage in Ontario, Canada. 200-209 - Matti Mäntymäki

, Kai Riemer
:
Digital natives in social virtual worlds: A multi-method study of gratifications and social influences in Habbo Hotel. 210-220
- Nabil Sultan

:
Discovering the potential of cloud computing in accelerating the search for curing serious illnesses. 221-225
- Khuong Le-Nguyen, G. Harindranath

, Romano Dyerson:
Understanding knowledge management software-organisation misalignments from an institutional perspective: A case study of a global IT-management consultancy firm. 226-247 - Claudio Feijóo

, José Luis Gómez Barroso
, Peter Voigt:
Exploring the economic value of personal information from firms' financial statements. 248-256 - Valentin Gomez-Jauregui

, Cecilia Gomez-Jauregui, Cristina Manchado del Val
, César Otero Gonzalez
:
Information management and improvement of citation indices. 257-271 - Wingyan Chung:

BizPro: Extracting and categorizing business intelligence factors from textual news articles. 272-284 - Ho Lee

, Moon Sun Kim, Kyung Kyu Kim:
Interorganizational information systems visibility and supply chain performance. 285-295 - Marina Trkman, Peter Trkman

:
Actors' misaligned interests to explain the low impact of an information system - A case study. 296-307 - Benjamin Uwadum Ugwoke

:
Reducing the effects of HIV/AIDS in Nigeria: The role of libraries and information centres. 308-310
- Nick Hajli

:
Developing online health communities through digital media. 311-314
- Margot Note:

Library Management 101: A Practical Guide, D.L. Velasquez (Ed.). ALA Editions, Chicago (2013), ISBN: 978-0-8389-1148-8. 315 - Robert Elves

:
Marketing Your Library's Electronic Resources: A How-To-Do-It Manual, M.R. Kennedy, C. LaGuardia. Facet Publishing, London, UK (2013), ISBN: 9781856049429. 316
Volume 34, Number 3, June 2014
- Marek R. Ogiela

:
Innovative Internet services and bio-inspired technologies in information management. 317-318 - Xin Li, Zhuzhong Qian, Ilsun You, Sanglu Lu:

Towards cost efficient mobile service and information management in ubiquitous environment with cloud resource scheduling. 319-328 - Jiun-Hung Ding, Roger Chien, Shih-Hao Hung

, Yi-Lan Lin, Che-Yang Kuo, Ching-Hsien Hsu, Yeh-Ching Chung:
A framework of cloud-based virtual phones for secure intelligent information management. 329-335 - Tomasz Hachaj

:
Real time exploration and management of large medical volumetric datasets on small mobile devices - Evaluation of remote volume rendering approach. 336-343
- Eleonora Pantano:

Innovation drivers in retail industry. 344-350
- Naci Karkin

, Marijn Janssen
:
Evaluating websites from a public value perspective: A review of Turkish local government websites. 351-363 - Hassan Rasheed:

Data and infrastructure security auditing in cloud computing environments. 364-368 - Sun Hee Youn, Ma Ga (Mark) Yang, Jin Hwan Kim

, Paul C. Hong
:
Supply chain information capabilities and performance outcomes: An empirical study of Korean steel suppliers. 369-380 - Dragos Vieru

, Suzanne Rivard:
Organizational identity challenges in a post-merger context: A case study of an information system implementation project. 381-386 - Ohbyung Kwon, Nam Yeon Lee, Bongsik Shin

:
Data quality management, data usage experience and acquisition intention of big data analytics. 387-394 - Hao Li, Jinhu Jiang, Mingjie Wu

:
The effects of trust assurances on consumers' initial online trust: A two-stage decision-making process perspective. 395-405 - Feng-Kwei Wang

, Wu He:
Service strategies of small cloud service providers: A case study of a small cloud service provider and its clients in Taiwan. 406-415
- Toan Nguyen

, Stephen Burgess:
A case analysis of ICT for knowledge transfer in small businesses in Vietnam. 416-421
- Sian Blake:

The Librarian's Nitty-Gritty Guide to Social Media, L. Solomon. American Library Association (2013), ISBN: 9780838911600. 422 - Abel Usoro:

The Transformed Library - E-Books, Expertise, and Evolution, J. Woodward. ALA Editions (2012), ISBN: 978-0838911648. 422-425
Volume 34, Number 4, August 2014
- Michael Curry, Byron Marshall, Peter Kawalek:

IT artifact bias: How exogenous predilections influence organizational information system paradigms. 427-436 - José-Luis Moreno-Cegarra, Juan-Gabriel Cegarra-Navarro, José-Rodrigo Córdoba-Pachón

:
Applying the technology acceptance model to a Spanish City Hall. 437-445 - Chuan Luo, Jing Wu, Yani Shi, Yun Xu:

The effects of individualism-collectivism cultural orientation on eWOM information. 446-456 - Diana Gavilan

, Maria Avello
, Carmen Abril
:
The mediating role of mental imagery in mobile advertising. 457-464 - Yongqiang Sun

, Xiao-Liang Shen
, Nan Wang
:
Understanding the role of consistency during web-mobile service transition: Dimensions and boundary conditions. 465-473 - Pei-Fang Hsu, Soumya Ray

, Yu-Yu Li-Hsieh:
Examining cloud computing adoption intention, pricing mechanism, and deployment model. 474-488 - Han M. Shih:

Migrating product structure bill of materials Excel files to STEP PDM implementation. 489-516 - Kim Piew Lai

, Siong Choy Chong
, Hishamuddin Bin Ismail
, David Yoon Kin Tong:
An explorative study of shopper-based salient e-servicescape attributes: A Means-End Chain approach. 517-532 - Yu Wen Hung, Jack Shih-Chieh Hsu, Zhi-Yuan Su, Hsieh-Hong Huang

:
Countering user risk in information system development projects. 533-545 - Taekyung Kim:

Observation on copying and pasting behavior during the Tohoku earthquake: Retweet pattern changes. 546-555
- Jun-Ing Ker, Yichuan Wang

, Nick Hajli
, Jiahe Song, Cappi W. Ker:
Deploying lean in healthcare: Evaluating information technology effectiveness in U.S. hospital pharmacies. 556-560
- Andrew Nurse:

Designing for Digital Reading, J. Pearson, G. Buchanan, H. Thimbleby, G. Marchiononi (Ed.), in: Part of Synthesis Lectures on Information Concepts, Retrieval, and Services. Morgan and Claypool, San Rafael, CA (2014). 561 - Bob Wiggins:

Transforming Technologies to Manage Our Information. The Future of Personal Information Management: Part 2, W. Jones. Morgan & Claypool, San Rafael (2014), ISBN: 978-1-59829-937-3. 562-564 - Stuart Fitz-Gerald:

Research Data: Practical Strategies for Information Professionals, J.M. Ray. Purdue University Press (2014). 564-565
Volume 34, Number 5, October 2014
- Matti Mäntymäki

, Jani Merikivi, Tibert Verhagen
, Frans Feldberg
, Risto Rajala
:
Does a contextualized theory of planned behavior explain why teenagers stay in virtual worlds? 567-576 - Noam Koriat

, Roy Gelbard
:
Knowledge sharing motivation among IT personnel: Integrated model and implications of employment contracts. 577-591 - Ebru Uzunoglu

, Sema Misci Kip:
Brand communication through digital influencers: Leveraging blogger engagement. 592-602 - Hulya Julie Yazici:

An exploratory analysis of hospital perspectives on real time information requirements and perceived benefits of RFID technology for future adoption. 603-621 - Dinesh A. Mirchandani, Albert L. Lederer:

The impact of core and infrastructure business activities on information systems planning and effectiveness. 622-633 - Jaime A. Palma-Mendoza

:
Analytical hierarchy process and SCOR model to support supply chain re-design. 634-638 - Mohamed Gamal Aboelmaged

:
Predicting e-readiness at firm-level: An analysis of technological, organizational and environmental (TOE) effects on e-maintenance readiness in manufacturing firms. 639-651 - Fang Chen

, Limin Zhang, Joseph Latimer:
How much has my co-worker contributed? The impact of anonymity and feedback on social loafing in asynchronous virtual collaboration. 652-659 - Abdullah Al-Barakati

, Martin White
, Zeeshan Patoli
:
The application of workflow management to digital heritage resources. 660-671 - Vincent Dutot

, François Bergeron, Louis Raymond:
Information management for the internationalization of SMEs: An exploratory study based on a strategic alignment perspective. 672-681 - Gildas Avoine, Luca Calderoni

, Jonathan Delvaux, Dario Maio, Paolo Palmieri
:
Passengers information in public transport and privacy: Can anonymous tickets prevent tracking? 682-688 - Tiago Oliveira

, Miguel Faria
, Manoj A. Thomas
, Ales Popovic
:
Extending the understanding of mobile banking adoption: When UTAUT meets TTF and ITM. 689-703 - Edgar Serna M.

, Alexei Serna A.:
Ontology for knowledge management in software maintenance. 704-710
Volume 34, Number 6, December 2014
- Mohammad Alamgir Hossain

, Yogesh Kumar Dwivedi
:
What improves citizens' privacy perceptions toward RFID technology? A cross-country investigation using mixed method approach. 711-719 - Anneli Silventoinen, Andrea Denger

, Hannele Lampela
, Jorma Papinniemi:
Challenges of information reuse in customer-oriented engineering networks. 720-732 - Maisa Mendonça Silva

, Ana Paula Henriques de Gusmao
, Thiago Poleto
, Lúcio Câmara e Silva, Ana Paula Cabral Seixas Costa
:
A multidimensional approach to information security risk management using FMEA and fuzzy theory. 733-740 - Birsen Donmez

, Zannah Matson
, Beth Savan, Ellie Farahani, David Photiadis, Joanna Dafoe:
Interruption management and office norms: Technology adoption lessons from a product commercialization study. 741-750 - Lidia Ogiela, Marek R. Ogiela

:
Cognitive systems for intelligent business information management in cognitive economy. 751-760 - Özgür Külcü, Türkay Henkoglu

:
Privacy in social networks: An analysis of Facebook. 761-769 - Maria Vaz Almeida, António Lucas Soares:

Knowledge sharing in project-based organizations: Overcoming the informational limbo. 770-779
- Felix Ter Chian Tan

, Shan Ling Pan
, Meiyun Zuo:
The role of organisational interdependencies and asset orchestration in business integration: A case study of M.com. 780-784

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














