Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 52 matches
- 2018
- Niek Althuizen:
Using structural technology acceptance models to segment intended users of a new technology: Propositions and an empirical illustration. Inf. Syst. J. 28(5): 879-904 (2018) - Hala Annabi, Sarah Lebovitz:
Improving the retention of women in the IT workforce: An investigation of gender diversity interventions in the USA. Inf. Syst. J. 28(6): 1049-1081 (2018) - Deborah J. Armstrong, Cynthia K. Riemenschneider, Laurie Giddens:
The advancement and persistence of women in the information technology profession: An extension of Ahuja's gendered theory of IT career stages. Inf. Syst. J. 28(6): 1082-1124 (2018) - Hillol Bala, Akshay Bhagwatwar:
Employee dispositions to job and organization as antecedents and consequences of information systems use. Inf. Syst. J. 28(4): 650-683 (2018) - Paul Beynon-Davies:
Declarations of significance: Exploring the pragmatic nature of information models. Inf. Syst. J. 28(4): 612-633 (2018) - Claire Ingram Bogusz, Marcel Morisse:
How infrastructures anchor open entrepreneurship: The case of Bitcoin and stigma. Inf. Syst. J. 28(6): 1176-1212 (2018) - Albert Boonstra, Marjolein van Offenbeek:
Shaping a buyer's software selection process through tendering legislation. Inf. Syst. J. 28(5): 905-928 (2018) - Andrea Carugati, Walter Fernandez, Lapo Mola, Cecilia Rossignoli:
My choice, your problem? Mandating IT use in large organisational networks. Inf. Syst. J. 28(1): 6-47 (2018) - Robert M. Davison:
Editorial: Researchers and the stakeholder's perspective. Inf. Syst. J. 28(1): 1-5 (2018) - Robert M. Davison:
The ethics of extended revisions. Inf. Syst. J. 28(2): 263-265 (2018) - Robert M. Davison, Antonio Díaz-Andrade:
Promoting indigenous theory. Inf. Syst. J. 28(5): 759-764 (2018) - Robert M. Davison, Monideepa Tarafdar:
Shifting baselines in information systems research threaten our future relevance. Inf. Syst. J. 28(4): 587-591 (2018) - Wenyu Derek Du, Shan L. Pan, Ning Zhou, Tao Hua Ouyang:
From a marketplace of electronics to a digital entrepreneurial ecosystem (DEE): The emergence of a meta-organization in Zhongguancun, China. Inf. Syst. J. 28(6): 1158-1175 (2018) - Emma Forsgren, Katriina Byström:
Multiple social media in the workplace: Contradictions and congruencies. Inf. Syst. J. 28(3): 442-464 (2018) - Grace Fox, Regina Connolly:
Mobile health technology adoption across generations: Narrowing the digital divide. Inf. Syst. J. 28(6): 995-1019 (2018) - James E. Gaskin, Nicholas Berente, Kalle Lyytinen, Gregory M. Rose:
Innovation among different classes of software development organizations. Inf. Syst. J. 28(5): 849-878 (2018) - Rob Gleasure, Lorraine Morgan:
The pastoral crowd: Exploring self-hosted crowdfunding using activity theory and social capital. Inf. Syst. J. 28(3): 489-515 (2018) - Yue Guo, Yongchuan Bao, Stuart J. Barnes, Khuong Le-Nguyen:
To sell or not to sell: Exploring sellers' trust and risk of chargeback fraud in cross-border electronic commerce. Inf. Syst. J. 28(2): 359-383 (2018) - Nik Rushdi Hassan, Lars Mathiassen:
Distilling a body of knowledge for information systems development. Inf. Syst. J. 28(1): 175-226 (2018) - Taha Havakhor, Amr A. Soror, Rajiv Sabherwal:
Diffusion of knowledge in social media networks: effects of reputation mechanisms and distribution of knowledge roles. Inf. Syst. J. 28(1): 104-141 (2018) - Riitta Hekkala, Mari-Klara Stein, Matti Rossi:
Metaphors in managerial and employee sensemaking in an information systems project. Inf. Syst. J. 28(1): 142-174 (2018) - Federico Iannacci, Tony Cornford:
Unravelling causal and temporal influences underpinning monitoring systems success: A typological approach. Inf. Syst. J. 28(2): 384-407 (2018) - Netta Iivari, Marianne Kinnula, Tonja Molin-Juustila, Leena Kuure:
Exclusions in social inclusion projects: Struggles in involving children in digital technology development. Inf. Syst. J. 28(6): 1020-1048 (2018) - Thomas Jensen, Ravi Vatrapu, Niels Bjørn-Andersen:
Avocados crossing borders: The problem of runaway objects and the solution of a shipping information pipeline for improving international trade. Inf. Syst. J. 28(2): 408-438 (2018) - Stan Karanasios, David K. Allen:
Activity theory in Information Systems Research. Inf. Syst. J. 28(3): 439-441 (2018) - Mark Keil, Eun Hee Park, Balasubramaniam Ramesh:
Violations of health information privacy: The role of attributions and anticipated regret in shaping whistle-blowing intentions. Inf. Syst. J. 28(5): 818-848 (2018) - Paul Richard Kelly:
An activity theory study of data, knowledge, and power in the design of an international development NGO impact evaluation. Inf. Syst. J. 28(3): 465-488 (2018) - Shaji Khan, Mary C. Lacity, Erran Carmel:
Entrepreneurial impact sourcing: a conceptual framework of social and commercial institutional logics. Inf. Syst. J. 28(3): 538-562 (2018) - Ned Kock, Pierre Hadaya:
Minimum sample size estimation in PLS-SEM: The inverse square root and gamma-exponential methods. Inf. Syst. J. 28(1): 227-261 (2018) - Thomas Kude, Miroslav Lazic, Armin Heinzl, Alexander Neff:
Achieving IT-based synergies through regulation-oriented and consensus-oriented IT governance capabilities. Inf. Syst. J. 28(5): 765-795 (2018)
skipping 22 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-20 11:50 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint