


default search action
Journal of Information Technology, Volume 26
Volume 26, Number 1, March 2011
- Jason L. Dedrick, Erran Carmel, Kenneth L. Kraemer:
A dynamic model of offshore software development. 1-15 - Christina Soh, Cecil Chua Eng Huang
, Harminder Singh:
Managing diverse stakeholders in enterprise systems projects: a control portfolio approach. 16-31 - Bendik Bygstad, Bjørn Erik Munkvold:
Exploring the role of informants in interpretive case study research in IS. 32-45 - Mikko Valorinta:
IT alignment and the boundaries of the IT function. 46-59 - Ali Alper Yayla, Qing Hu:
The impact of information security events on the stock value of firms: the effect of contingency factors. 60-77 - Matthew L. Smith:
Limitations to building institutional trustworthiness through e-government: a comparative study of two e-services in Chile. 78-93
Volume 26, Number 2, June 2011
- Steve Sawyer, Susan J. Winter
:
Special issue on futures for research on information systems: prometheus unbound? 95-98
- Susan J. Winter
, Brian S. Butler
:
Creating bigger problems: grand challenges as boundary objects and the legitimacy of the information systems field. 99-108 - William H. Dutton:
The politics of next generation research: democratizing research-centred computational networks. 109-119 - Erwin P. Gianchandani:
Toward smarter health and well-being: an implicit role for networking and information technology. 120-128 - John Leslie King:
CIO: concept is over. 129-138
- Jennifer Blaskovich, Natalia Mintchik:
Accounting executives and IT outsourcing recommendations: an experimental study of the effect of CIO skills and institutional isomorphism. 139-152
Volume 26, Number 3, September 2011
- Huoy Min Khoo, Daniel Robey, Srinivasan Venkoba Rao:
An exploratory study of the impacts of upgrading packaged software: a stakeholder perspective. 153-169 - Placide Poba-Nzaou, Louis Raymond:
Managing ERP system risk in SMEs: a multiple case study. 170-192 - Jerry N. Luftman, Hossein Seif Zadeh:
Key information technology and management issues 2010-11: an international study. 193-204 - Tim Coltman, Timothy M. Devinney
, David F. Midgley:
Customer relationship management and firm performance. 205-219
Volume 26, Number 4, December 2011
- Mary C. Lacity, Stan Solomon, Aihua Yan
, Leslie P. Willcocks:
Business process outsourcing studies: a critical review and research directions. 221-258
- Helga Drummond:
MIS and illusions of control: an analysis of the risks of risk management. 259-267
- Kalle Lyytinen
:
MIS: the urge to control and the control of illusions - towards a dialectic. 268-270 - Nathalie N. Mitev:
Beyond health warnings: risk, regulation, failure and the paradoxes of risk management. 271-273 - Alexander Budzier
:
The risk of risk registers - managing risk is managing discourse not tools. 274-276 - Li Liu:
Mirage or implementation pitfalls - in defence of risk registers as an effective risk management tool. 277-279 - Henri Barki:
Managing illusions of control. 280-281 - David Wastell:
Risk as 'make-believe': the case of child protection. 282-283 - Helga Drummond:
'Fools with tools', mirrors of imagination, masks of science and electronic metonyms: a response. 284-287
- Robert M. Davison
, Maris G. Martinsons
:
Methodological practice and policy for organisationally and socially relevant IS research: an inclusive-exclusive perspective. 288-293
- Michael D. Myers
:
Is there a methodological crisis? 294-295 - Allen S. Lee
:
IS research methods: inclusive or exclusive? 296-298 - Robert D. Galliers:
In celebration of diversity in information systems research. 299-301 - Joe Nandhakumar, Harry Scarbrough
:
Open sources? A commentary on 'IS research methods: inclusive or exclusive?'. 302-303 - Matt Germonprez:
Pluralism is not about me, it is about us. 304-305 - Rajeev Sharma
:
Research methods and the relevance of the IS discipline: a critical analysis of the role of methodological pluralism. 306-312
- Aaron M. French, Jung P. Shim:
Multinational diversity in IS research: the effects of education on publication outlets. 313-322

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.