This paper investigates the impact of the characteristics of information security policy (ISP) on an employee's security compliance in the workplace. Two factors were propose...
This paper studies how consumers' online search behavior may trigger pervasive and persistent online price dispersion. We set up a game-theoretic model to examine the oligopo...
Abstract: Software product line engineering is an established methodology for fast and effective development of software-intensive systems and services. To reap maximum benefits fr...
The amount of textual data that is available for researchers and businesses to analyze is increasing at a dramatic rate. This reality has led IS researchers to investigate various...
Sangno Lee, Jeff Baker, Jaeki Song, James C. Wethe...
Realizing business value and identifying the benefits arising from implementations of enterprise systems remains a significant challenge for both research and practice. A review o...
Current approaches to Business Process Management (BPM) and Operational Business Intelligence (BI) integration have been very limited and simply reduced to the problem of technica...
We present a new interface for exploring and navigating large-scale discussions on the internet. Our system, tldr, focuses on three primary user goals: finding, navigating and fil...
Electronic banking (e-banking), facilitated by various Electronic Commerce (EC) technologies, has helped commercial banks to stay competitive through productivity gains, transacti...
Mobile learning exposes learning to the natural environment. If this environment is large, the learners have to navigate to find the learning objects or to explore the environment...
Innovative strategies for effective basin-scale salinity management have been developed in the Hunter River Basin of Australia and more recently in the San Joaquin River Basin of ...