-
2
-
-
84905740530
-
BlackBerry outage frustrates investment bankers
-
Bansal, P. (2011). BlackBerry outage frustrates investment bankers. Reuters, 1.
-
(2011)
Reuters
, vol.1
-
-
Bansal, P.1
-
3
-
-
58849132056
-
Shadow systems: The good, the bad and the ugly
-
Behrens, S. (2009). Shadow Systems: The Good, The Bad and the Ugly. Communications of the ACM, 52, 124-129.
-
(2009)
Communications of the ACM
, vol.52
, pp. 124-129
-
-
Behrens, S.1
-
4
-
-
84905740529
-
Why Do shadow systems exist after an ERP implementation? Lessons from a case study
-
Behrens, S. and Sedera, W. (2004). Why Do Shadow Systems Exist after an ERP Implementation? Lessons from a Case Study. In Pacific Asia Conference on Information Systems, 1713-1726.
-
(2004)
Pacific Asia Conference on Information Systems
, pp. 1713-1726
-
-
Behrens, S.1
Sedera, W.2
-
5
-
-
33846021950
-
Real options in information technology risk management: An empirical validation of risk-option relationships
-
Benaroch, M., Lichtenstein, Y. and Robinson, K. (2006). Real Options in Information Technology Risk Management: An Empirical Validation of Risk-Option Relationships. MIS Quarterly, 30
-
(2006)
MIS Quarterly
, vol.30
-
-
Benaroch, M.1
Lichtenstein, Y.2
Robinson, K.3
-
6
-
-
55249084997
-
The case research strategy in studies of information systems
-
Benbasat, I., Goldstein, D. K. and Mead, M. (1987). The Case Research Strategy in Studies of Information Systems. MIS Quarterly, 11, 369-386.
-
(1987)
MIS Quarterly
, vol.11
, pp. 369-386
-
-
Benbasat, I.1
Goldstein, D.K.2
Mead, M.3
-
7
-
-
0002624070
-
Empirical research in information systems: The practice of relevance
-
Benbasat, I. and Zmud, R. W. (1999). Empirical Research in Information Systems: The Practice of Relevance. MIS Quarterly, 23, 3-16.
-
(1999)
MIS Quarterly
, vol.23
, pp. 3-16
-
-
Benbasat, I.1
Zmud, R.W.2
-
9
-
-
67650100804
-
If someone is watching, I'll do what I'm asked : Mandatoriness, control, and information security
-
Boss, S. R., Kirsch, L. J., Angermeier, I., Shingler, R. A. and Boss, R. W. (2009). If someone is watching, I'll do what I'm asked : mandatoriness, control, and information security. European Journal of Information Systems, 18, 151-164.
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 151-164
-
-
Boss, S.R.1
Kirsch, L.J.2
Angermeier, I.3
Shingler, R.A.4
Boss, R.W.5
-
10
-
-
0000409290
-
Alignment of the IS functions with the enterprise: Toward a model of antecedents
-
Brown, C. V. and Magill, S. L. (1994). Alignment of the IS Functions with the Enterprise: Toward a Model of Antecedents. MIS Quarterly, 18, 371.
-
(1994)
MIS Quarterly
, Issue.18
, pp. 371
-
-
Brown, C.V.1
Magill, S.L.2
-
15
-
-
84870635275
-
Exploring patterns of business-IT alignment for the purpose of process performance measurement
-
Cleven, A. (2011). Exploring Patterns of Business-IT Alignment for the Purpose of Process Performance Measurement. In European Conference On Information Systems, 1-12.
-
(2011)
European Conference on Information Systems
, pp. 1-12
-
-
Cleven, A.1
-
16
-
-
3242808612
-
-
Computer Security Institute. Computer Security Institute, New York
-
Computer Security Institute (2011). CSI Computer Crime and Security Survey 2010/2011. Computer Security Institute, New York, 1-42.
-
(2011)
CSI Computer Crime and Security Survey 2010/2011
, pp. 1-42
-
-
-
17
-
-
0003140320
-
Organizing knowledge syntheses: A taxonomy of literature reviews
-
Cooper, H. M. (1988). Organizing Knowledge Syntheses: A Taxonomy of Literature Reviews. Knowledge in Society, 1, 104-126.
-
(1988)
Knowledge in Society
, vol.1
, pp. 104-126
-
-
Cooper, H.M.1
-
20
-
-
70449727980
-
An exploratory study into IT governance implementations and its impact on business/IT alignment
-
De Haes, S. and Van Grembergen, W. (2009). An Exploratory Study into IT Governance Implementations and its Impact on Business/IT Alignment. Information Systems Management, 26, 123-137.
-
(2009)
Information Systems Management
, vol.26
, pp. 123-137
-
-
De Haes, S.1
Van Grembergen, W.2
-
21
-
-
0003530977
-
The research act: A theoretical introduction to sociological methods
-
New Brunswick, NJ
-
Denzin, N. K. (2009). The research act: a theoretical introduction to sociological methods. Aldine Transaction, New Brunswick, NJ.
-
(2009)
Aldine Transaction
-
-
Denzin, N.K.1
-
25
-
-
84905740517
-
-
Good Technology, Good Technology
-
Good Technology (2011). Case Study of Napa Country. Good Technology, 1-3.
-
(2011)
Case Study of Napa Country
, pp. 1-3
-
-
-
26
-
-
0027813283
-
Strategic alignment: Leveraging information technology for transforming organizations
-
Henderson, J. C. and Venkatraman, N. (1993). Strategic alignment: Leveraging information technology for transforming organizations. IBM Systems Journal, 32, 4-16.
-
(1993)
IBM Systems Journal
, vol.32
, pp. 4-16
-
-
Henderson, J.C.1
Venkatraman, N.2
-
28
-
-
77954238840
-
Mixing qualitative and quantitative methods : Triangulation in action
-
Jick, T. D. (2011). Mixing Qualitative and Quantitative Methods : Triangulation in Action. Administrative Science Quaterly, 24, 602-611.
-
(2011)
Administrative Science Quaterly
, vol.24
, pp. 602-611
-
-
Jick, T.D.1
-
29
-
-
84893330775
-
The rise and fall of a shadow system: Lessons for enterprise system implementation
-
Jones, D., Behrens, S., Jamieson, K. and Tansley, E. (2004). The Rise and Fall of a Shadow System: Lessons for Enterprise System Implementation. In ACIS'04, 1-12.
-
(2004)
ACIS'04
, pp. 1-12
-
-
Jones, D.1
Behrens, S.2
Jamieson, K.3
Tansley, E.4
-
30
-
-
84905740506
-
Strategic misalignment - How organizations can survive information security
-
Krull, A. R. (1994). Strategic Misalignment - How organizations can survive information security. Computer Fraud & Security Bulletin, 11-19.
-
(1994)
Computer Fraud & Security Bulletin
, pp. 11-19
-
-
Krull, A.R.1
-
31
-
-
33845367600
-
A systems approach to conduct an effective literature review in support of information systems research
-
Levy, Y. and Ellis, T. J. (2006). A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research. Informing Science Journal, 9, 181-212.
-
(2006)
Informing Science Journal
, vol.9
, pp. 181-212
-
-
Levy, Y.1
Ellis, T.J.2
-
32
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch, K. D., Carr, H. H. and Warkentin, M. E. (1992). Threats to Information Systems: Today's Reality, Yesterday's Understanding. Management Information Systems, 16, 173-186.
-
(1992)
Management Information Systems
, vol.16
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
34
-
-
57149141605
-
An update on business-IT alignment: "A line" has been drawn
-
Luftman, J. and Kempaiah, R. (2007). An Update on Business-IT Alignment: "A Line" Has Been Drawn. MIS Quarterly Executive, 6, 165-177.
-
(2007)
MIS Quarterly Executive
, vol.6
, pp. 165-177
-
-
Luftman, J.1
Kempaiah, R.2
-
36
-
-
0038032339
-
Issues and challenges in ubiquitous computing
-
Lyytinen, K. and Yoo, Y. (2002). Issues and Challenges in Ubiquitous Computing. Communications of the ACM, 45, 63-65.
-
(2002)
Communications of the ACM
, vol.45
, pp. 63-65
-
-
Lyytinen, K.1
Yoo, Y.2
-
37
-
-
67650143327
-
What levels of moral reasoning and values explain adherence to information security rules? An empirical study
-
Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T. and Vance, A. (2009). What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18, 126-139.
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 126-139
-
-
Myyry, L.1
Siponen, M.2
Pahnila, S.3
Vartiainen, T.4
Vance, A.5
-
38
-
-
33845886135
-
Research methodologies in MIS: An update
-
Palvia, P., Mao, E. and Midha, V. (2004). Research Methodologies in MIS: An Update. Communications of the Association for Information Systems, 14, 526-542.
-
(2004)
Communications of the Association for Information Systems
, vol.14
, pp. 526-542
-
-
Palvia, P.1
Mao, E.2
Midha, V.3
-
39
-
-
38549154685
-
Spreadsheets and sarbanes-oxley: Regulations, risks, and control frameworks
-
Panko, R. R. (2006). Spreadsheets and Sarbanes-Oxley: Regulations, Risks, and Control Frameworks. Communications of the Association for Information Systems, 17, 1-50.
-
(2006)
Communications of the Association for Information Systems
, vol.17
, pp. 1-50
-
-
Panko, R.R.1
-
41
-
-
84993110618
-
Digital natives, digital immigrants
-
Prensky, M. (2001). Digital Natives, Digital Immigrants. On the Horizon, 9, 1-6.
-
(2001)
On the Horizon
, vol.9
, pp. 1-6
-
-
Prensky, M.1
-
42
-
-
78650770842
-
Improving employees' compliance through information systems security training: An action research study
-
Puhakainen, P. and Siponen, M. (2010). Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study. MIS Quarterly, 34, 757-778.
-
(2010)
MIS Quarterly
, vol.34
, pp. 757-778
-
-
Puhakainen, P.1
Siponen, M.2
-
43
-
-
55249118032
-
Linking the MIS plan with corporate strategy: An exploratory study
-
Pyburn, P. J. (1983). Linking the MIS plan with corporate strategy: an exploratory study. MIS Quarterly, 7, 1-14.
-
(1983)
MIS Quarterly
, vol.7
, pp. 1-14
-
-
Pyburn, P.J.1
-
44
-
-
51449091631
-
Information security cultures of four professions: A comparative study
-
Ramachandran, S., Rao, S. V. and Goles, T. (2008). Information Security Cultures of Four Professions: A Comparative Study. In HICSS 08, 1-10.
-
(2008)
HICSS
, vol.8
, pp. 1-10
-
-
Ramachandran, S.1
Rao, S.V.2
Goles, T.3
-
45
-
-
0001940135
-
Factors that influence the social dimension of alignment between business and information technology objectives
-
Reich, B. H. and Benbasat, I. (2000). Factors That Influence the Social Dimension of Alignment between Business and Information Technology Objectives. MIS Quarterly, 24, 81-113.
-
(2000)
MIS Quarterly
, vol.24
, pp. 81-113
-
-
Reich, B.H.1
Benbasat, I.2
-
46
-
-
85001817266
-
Beyond rigor and relevance: Producing consumable research about information systems
-
Idea Group Inc
-
Robey, D. and Markus, M. L. (1998). Beyond rigor and relevance: producing consumable research about information systems. Information Resources Management Journal. Idea Group Inc.
-
(1998)
Information Resources Management Journal
-
-
Robey, D.1
Markus, M.L.2
-
48
-
-
84905740507
-
Wall street's 'crackberry' withdrawal
-
Rusli, E. M. (2011). Wall Street's 'CrackBerry' Withdrawal. The New York Times, 1.
-
(2011)
The New York Times
, vol.1
-
-
Rusli, E.M.1
-
49
-
-
2942738445
-
Arrangements for information technology governance: A theory of multiple contingencies
-
Sambamurthy, V. and Zmud, R. W. (1999). Arrangements for Information Technology Governance: A Theory of Multiple Contingencies. MIS Quarterly, 23, 261-290.
-
(1999)
MIS Quarterly
, vol.23
, pp. 261-290
-
-
Sambamurthy, V.1
Zmud, R.W.2
-
50
-
-
33845254950
-
An introductory overview and survey of business-driven IT management
-
IEEE
-
Sauvé, J., Moura, A., Sampaio, M., João, J. and Radziuk, E. (2006). An Introductory Overview and Survey of Business-Driven IT Management. In Business-Driven IT Management, 1-10, IEEE.
-
(2006)
Business-Driven IT Management
, pp. 1-10
-
-
Sauvé, J.1
Moura, A.2
Sampaio, M.3
João, J.4
Radziuk, E.5
-
52
-
-
0033115568
-
Critical success factors in the alignment of IS plans with business plans
-
Teo, T. S. H. and Ang, J. S. K. (1999). Critical success factors in the alignment of IS plans with business plans. International Journal of Information Management, 19, 173-185.
-
(1999)
International Journal of Information Management
, vol.19
, pp. 173-185
-
-
Teo, T.S.H.1
Ang, J.S.K.2
-
53
-
-
1442306469
-
Management research based on the paradigm of the design sciences: The quest for field-tested and grounded technological rules
-
van Aken, J. E. (2004). Management Research Based on the Paradigm of the Design Sciences: The Quest for Field-Tested and Grounded Technological Rules. Journal of Management Studies, 41, 219-246.
-
(2004)
Journal of Management Studies
, vol.41
, pp. 219-246
-
-
Van Aken, J.E.1
-
54
-
-
0033277396
-
Alignment is not enough: Integrating business and information technology management with the balanced business scorecard
-
Van der Zee, J. T. M. and Jong, B. d. (1999). Alignment is not enough: Integrating business and information technology management with the balanced business scorecard. Journal of Management Information Systems, 16, 137-156.
-
(1999)
Journal of Management Information Systems
, vol.16
, pp. 137-156
-
-
Van Der Zee, J.T.M.1
Jong, B.D.2
-
56
-
-
67650170305
-
Behavioral and policy issues in information systems security: The insider threat
-
Warkentin, M. and Willison, R. (2009). Behavioral and policy issues in information systems security: the insider threat. European Journal of Information Systems, 18, 101-105.
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 101-105
-
-
Warkentin, M.1
Willison, R.2
-
57
-
-
84905713906
-
Informations systems security and privacy
-
(Hanson, J. and Liebowitz, J., Eds), Ablex Pub. Corp., Norwood, N.J
-
Warkentin, M. E. (1995). Informations Systems Security and Privacy. In: Advances in Telematics. Volume 3 (Hanson, J. and Liebowitz, J., Eds), 57-79, Ablex Pub. Corp., Norwood, N.J.
-
(1995)
Advances in Telematics
, vol.3
, pp. 57-79
-
-
Warkentin, M.E.1
-
58
-
-
84905753194
-
County of napa, state of California
-
Watt, N. and Schulze, T. A. (2011). County of Napa, State of California. Adopted Budget, Fiscal Year 2011/2012. County Executive Office, 1-862.
-
(2011)
Adopted Budget, Fiscal Year 2011/2012. County Executive Office
, pp. 1-862
-
-
Watt, N.1
Schulze, T.A.2
-
60
-
-
0012903874
-
Analyzing the past to prepare for the future: Writing a literature review
-
Webster, J. and Watson, R. T. (2002). Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly, 26, xiii-xxiii.
-
(2002)
MIS Quarterly
, vol.26
-
-
Webster, J.1
Watson, R.T.2
-
62
-
-
84905740509
-
-
Wikipedia. Wikipedia
-
Wikipedia (2011). Napa County, California. Wikipedia, 1-15.
-
(2011)
Napa County, California
, pp. 1-15
-
-
-
63
-
-
0003673547
-
-
Third Edit. Sage Publications, Thousand Oaks, London, New Delhi
-
Yin, R. K. (2003). Case Study Research. Design and Methods. Third Edit. Sage Publications, Thousand Oaks, London, New Delhi.
-
(2003)
Case Study Research. Design and Methods
-
-
Yin, R.K.1
-
64
-
-
70349309259
-
Current state of information security research in IS
-
Zafar, H. and Clark, J. G. (2009). Current State of Information Security Research In IS. Communications of the AIS, 24, 557-596.
-
(2009)
Communications of the AIS
, vol.24
, pp. 557-596
-
-
Zafar, H.1
Clark, J.G.2
|