Journal of Information Systems Applied Research
3(1) | Impact of Transition Costs on Offshore Systems Development | DeHondt and Leidig |
3(2) | Benefits of Knowledge Discovery Process for Biomedical Population Study | McClelland |
3(3) | Empirical Study of Text Messaging Behavioral Intention and Usage, An. | Peslak, Ceccucci, and Sendall |
3(4) | Spyware: What Influences College Students to Use Anti-Spyware Tools? | Ward and Hunsinger |
3(5) | Towards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative. | Mhlanga, Vardiman, and Reames |
3(6) | Superfund Site Analysis Using Web 2.0 Technologies | Anderson, Jafar, and Rogers |
3(7) | Teaching Knowledge Management (KM) in Criminal Justice Education: The Influence of Information Systems | Conn and Thies |
3(8) | Creating the Pilot AJAX Enabled Query Tool | Ford and Dollinger |
3(9) | Incorporation of Information Technology into Assisted Health Care: An Empirical Study | Delmonico and White |
3(10) | Network Growing Pains | Yaylacicegi, Mahar, and Moussawi |
3(11) | Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity | Omar, Udeh, and Mantha |
3(12) | Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet, A. | Lawler and Molluzzo |
3(13) | Women's Technology Acceptance of Mentoring on the Internet | Gibson and Gibson |
3(14) | Factors that Persuade and Deter Membership in Professional Computing Associations | Umapathy, Jamba, and Ritzhaupt |
3(15) | Can Management Predict Information Security Threats by Utilizing a Data Warehouse? | Kim and Steen |
3(16) | Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls, The. | Kim and Nelson |
3(17) | Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Technology Firm, An. | Totterdale |
3(18) | Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory, An. | Peslak, Ceccucci, and Sendall (15 Jun 2010). |
3(19) | System Development Methodology Usage in Industry: A Review and Analysis | Griffin and Brandyberry |
3(20) | On Design Science, MCDM, and Outsourcing Decision Making | Petkov and Petkov |