Search dblp for Publications

export results for "toc:db/journals/tmis/tmis1.bht:"

 download as .bib file

@article{DBLP:journals/tmis/ArazyC10,
  author       = {Ofer Arazy and
                  Arie Croitoru},
  title        = {The sustainability of corporate wikis: {A} time-series analysis of
                  activity patterns},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {1},
  number       = {1},
  pages        = {6:1--6:24},
  year         = {2010},
  url          = {https://doi.org/10.1145/1877725.1877731},
  doi          = {10.1145/1877725.1877731},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/ArazyC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/BaKSZ10,
  author       = {Sulin Ba and
                  Dan Ke and
                  Jan Stallaert and
                  Zhongju Zhang},
  title        = {Why give away something for nothing? Investigating virtual goods pricing
                  and permission strategies},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {1},
  number       = {1},
  pages        = {4:1--4:22},
  year         = {2010},
  url          = {https://doi.org/10.1145/1877725.1877729},
  doi          = {10.1145/1877725.1877729},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/BaKSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/CaoRA10,
  author       = {Lan Cao and
                  Balasubramaniam Ramesh and
                  Tarek K. Abdel{-}Hamid},
  title        = {Modeling dynamics in agile software development},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {1},
  number       = {1},
  pages        = {5:1--5:26},
  year         = {2010},
  url          = {https://doi.org/10.1145/1877725.1877730},
  doi          = {10.1145/1877725.1877730},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmis/CaoRA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/Chen10,
  author       = {Hsinchun Chen},
  title        = {Editorial: Welcome to the first issue of \emph{ACM TMIS}},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {1},
  number       = {1},
  pages        = {1:1--1:5},
  year         = {2010},
  url          = {https://doi.org/10.1145/1877725.1877726},
  doi          = {10.1145/1877725.1877726},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/Chen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/DavisGMNSW10,
  author       = {Gordon B. Davis and
                  Paul Gray and
                  Stuart E. Madnick and
                  Jay F. Nunamaker Jr. and
                  Ralph H. Sprague Jr. and
                  Andrew B. Whinston},
  title        = {Ideas for the future of the {IS} field},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {1},
  number       = {1},
  pages        = {2:1--2:15},
  year         = {2010},
  url          = {https://doi.org/10.1145/1877725.1877727},
  doi          = {10.1145/1877725.1877727},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/DavisGMNSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/FuCKG10,
  author       = {Yu Fu and
                  Zhiyuan Chen and
                  G{\"{u}}nes Koru and
                  Aryya Gangopadhyay},
  title        = {A privacy protection technique for publishing data mining models and
                  research data},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {1},
  number       = {1},
  pages        = {7:1--7:20},
  year         = {2010},
  url          = {https://doi.org/10.1145/1877725.1877732},
  doi          = {10.1145/1877725.1877732},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/FuCKG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/WangXR10,
  author       = {Jingguo Wang and
                  Nan Xiao and
                  H. Raghav Rao},
  title        = {Drivers of information security search behavior: An investigation
                  of network attacks and vulnerability disclosures},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {1},
  number       = {1},
  pages        = {3:1--3:23},
  year         = {2010},
  url          = {https://doi.org/10.1145/1877725.1877728},
  doi          = {10.1145/1877725.1877728},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmis/WangXR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics