Browse Papers
From IFORS
Contact Us
English
Remember me
Login
Forgot password?
Keyword: computers: information
Found
919 papers
in total
Date Descending
Date Ascending
Title Descending
Title Ascending
Moving from Access to Use of the Information Infrastructure: A Multilevel Sociotechnical Framework
2013,
Racherla Pradeep
Universal access (UA) to the Internet and the associated information infrastructure...
Research Note–A View from the Top: Integrated Information Delivery and Effective Information Use from the Senior Executive's Perspective
2013,
Zhang Chen
This study frames antecedents of effective information use, outlining a nomological...
Airline firm boundary and ticket distribution in electronic markets
2012,
Lee Zu-Hsu
The electronic markets hypothesis (EMH) predicts that the intense intrusion of...
Buffer dimensioning and control stations positioning with a space partitioning-tabu search approach
2014,
Mhada Fatima
We propose an efficient heuristic method based on Space Partitioning (SP) and Tabu...
The Productivity of Information Technology Investments: New Evidence from IT Labor Data
2012,
Hitt Lorin M
This paper uses newly collected panel data that allow for significant improvements in...
An Empirical Analysis of the Contractual and Information Structures of Business Process Outsourcing Relationships
2012,
Whinston Andrew B
The emergence of information‐intensive business process outsourcing (BPO)...
Electronic Health Records Assimilation and Physician Identity Evolution: An Identity Theory Perspective
2012,
Agarwal Ritu
With the lack of timely and relevant patient information at the point of care...
An integrated data collection and analysis framework for remote monitoring and planning of construction operations
2012,
Akhavian Reza
Recent advances in data collection and operations analysis techniques have facilitated...
An approach to assessing virtual environments for synchronous and remote collaborative design
2012,
Germani Michele
This paper considers applying novel Virtual Environments (VEs) in collaborative...
Contracting Information Security in the Presence of Double Moral Hazard
2013,
Raghunathan Srinivasan
In information security outsourcing, it is the norm that the outsourcing firms and the...
An Investigation of the Appropriation of Technology-Mediated Training Methods Incorporating Enactive and Collaborative Learning
2013,
Bostrom Robert
The growth in the application of information technology to student and employee...
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea
2012,
Hovav Anat
Intentional employee misuse of IS is a global problem. Research suggests that security...
The influence of interfirm codevelopment competency on e‐service innovation
2012,
Chen Ja-Shen
Because of customer demand, rapid product life cycles, and advances in IT, an expanded...
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
2012,
Siponen Mikko
Employees’ failure to comply with IS security procedures is a key concern for...
A simulation analysis of interactions among intended biases in costing systems and their effects on the accuracy of decision‐influencing information
2014,
Leitner Stephan
On the one hand, management accounting systems increase in complexity, and the...
Inventory inaccuracies in the wholesale supply chain
2011,
Rekik Yacine
The inventory level shown in the Information System contrary to popular belief and...
The benefits and dangers of enjoyment with social networking websites
2012,
Turel Ofir
Information Systems enjoyment has been identified as a desirable phenomenon, because...
Mediating the intersections of organizational routines during the introduction of a health IT system
2012,
Novak Laurie
Public interest in the quality and safety of health care has spurred examination of...
Conceptualising improvisation in information systems security
2012,
Njenga Kennedy
Information Systems Security (ISS) has constantly been ranked as a key concern for...
Information technology, the organizational capability of proactive corporate environmental strategy and firm performance: a resource‐based analysis
2012,
Benitez-Amado Jose
The study of the relationships between information technology (IT), environmental...
Media, Aggregators, and the Link Economy: Strategic Hyperlink Formation in Content Networks
2013,
Dellarocas Chrysanthos
A defining property of the World Wide Web is a content site's ability to place...
Information granules for medical infonomics
2013,
Ahmad Sayed Sayeed
The paper highlights the medical diagnostic model using infonomics principles and...
Risk identification and conduction model for financial institution IT outsourcing in China
2012,
Li Xiang
In this paper we study the risks around IT outsourcing in Chinese financial...
Understanding the value proposition of health information exchange: the case of uncompensated care cost recovery
2013,
Feldman Sue S
This case study examined the use of the Nationwide Health Information Network as a...
First Page
7
8
9
10
11
Last Page
Papers per page:
6 Papers
12 Papers
24 Papers
36 Papers
48 Papers