European Journal of Information Systems
1996 - 2025
Current editor(s): Par Agerfalk From Taylor & Francis Journals Bibliographic data for series maintained by Chris Longhurst (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 18, issue 6, 2009
- Preparing for evidence-based management pp. 523-525

- Richard Baskerville
- Challenges associated with RFID tag implementations in supply chains pp. 526-533

- Gaurav Kapoor, Wei Zhou and Selwyn Piramuthu
- Managing RFID projects in organizations pp. 534-540

- Indranil Bose, Eric W T Ngai, Thompson S H Teo and Sarah Spiekermann
- Consumer acceptance of RFID-enabled services: a model of multiple attitudes, perceived system characteristics and individual traits pp. 541-552

- Katerina Pramatari and Aristeidis Theotokis
- Managerial problem-solving in the adoption of Radio Frequency Identification Technologies pp. 553-569

- Robert F Otondo, Allison W Pearson, Rodney A Pearson, John C Shaw and Jung P Shim
- RFID-enabled item-level product information revelation pp. 570-577

- Wei Zhou, Gaurav Kapoor and Selwyn Piramuthu
- Evaluation of RFID applications for logistics: a framework for identifying, forecasting and assessing benefits pp. 578-591

- Henning Baars, Daniel Gille and Jens Strüker
- Understanding the value of integrated RFID systems: a case study from apparel retail pp. 592-614

- Frédéric Thiesse, Jasser Al-Kassab and Elgar Fleisch
- A contingency model for creating value from RFID supply chain network projects in logistics and manufacturing environments pp. 615-636

- Samuel Fosso Wamba and Akemi Takeoka Chatfield
Volume 18, issue 5, 2009
- Progress in information systems research pp. 385-386

- Hans van der Heijden
- Understanding the influence of multiple levels of governments on the development of inter-organizational systems pp. 387-408

- Boriana Rukanova, Eveline van Stijn, Helle Z Henriksen, Ziv Baida and Yao-Hua Tan
- Identifying and overcoming the challenges of implementing a project management office pp. 409-427

- Rajendra Singh, Mark Keil and Vijay Kasi
- Boundary factors and contextual contingencies: configuring electronic templates for healthcare professionals pp. 428-441

- Pernille Bjørn, Sue Burgoyne, Vicky Crompton, Teri MacDonald, Barbe Pickering and Sue Munro
- Business Process Outsourcing: an event study on the nature of processes and firm valuation pp. 442-457

- Chaojie Duan, Varun Grover and Nagraj (Raju) Balakrishnan
- Meeting the demand for IT workers: A call for research pp. 458-461

- Cynthia K Riemenschneider, Deborah J Armstrong and Jo Ellen Moore
- Why college undergraduates choose IT: a multi-theoretical perspective pp. 462-475

- Nathan Heinze and Qing Hu
- Retaining women in the U.S. IT workforce: theorizing the influence of organizational factors pp. 476-497

- Eileen M Trauth, Jeria L Quesenberry and Haiyan Huang
- Another road to IT turnover: the entrepreneurial path pp. 498-521

- Gaëtan Mourmant, Michael J Gallivan (Mike) and Michel Kalika
Volume 18, issue 4, 2009
- ‘Lots done, more to do’: the current state of agile systems development research pp. 281-284

- Pekka Abrahamsson, Kieran Conboy and Xiaofeng Wang
- Assessing the relative contribution of the facets of agility to distributed systems development success: an Analytic Hierarchy Process approach pp. 285-299

- Saonee Sarker, Charles L Munson, Suprateek Sarker and Suranjan Chakraborty
- Exploring agile values in method configuration pp. 300-316

- Fredrik Karlsson and Pär Ågerfalk
- Simulating mixed agile and plan-based requirements prioritization strategies: proof-of-concept and practical implications pp. 317-331

- Daniel Port and Tung Bui
- A framework for adapting agile development methodologies pp. 332-343

- Lan Cao, Kannan Mohan, Peng Xu and Balasubramaniam Ramesh
- Acceptance of software process innovations – the case of extreme programming pp. 344-354

- George Mangalaraj, RadhaKanta Mahapatra and Sridhar Nerur
- Role of collective ownership and coding standards in coordinating expertise in software project teams pp. 355-371

- Likoebe M Maruping, Xiaojun Zhang and Viswanath Venkatesh
- The role of project management in ineffective decision making within Agile software development projects pp. 372-383

- John McAvoy and Tom Butler
Volume 18, issue 3, 2009
- What is published in our journals cannot change unless we do pp. 189-191

- Ray J Paul
- Contemplating public policy in HIV/AIDS online content, then where is the technology spirit? pp. 192-204

- Fay Cobb Payton and James Kiwanuka-Tondo
- Understanding online customer repurchasing intention and the mediating role of trust – an empirical investigation in two developed countries pp. 205-222

- Israr Qureshi, Yulin Fang, Elaine Ramsey, Patrick McCole, Patrick Ibbotson and Deborah Compeau
- The impacts of competence-trust and openness-trust on interorganizational systems pp. 223-234

- Mohammed Ibrahim and Pieter M Ribbers
- Factors considered when outsourcing an IS system: an empirical examination of the impacts of organizational size, strategy and the object of a decision pp. 235-248

- Bjarne Berg and Antonis C Stylianou
- A longitudinal analysis of trajectory changes in the software industry: the case of the content management application segment pp. 249-263

- Claudio Vitari and Aurelio Ravarini
- Understanding web site redesigns in small- and medium-sized enterprises (SMEs): a U.K.-based study on the applicability of e-commerce Stage Models pp. 264-279

- Fernando Alonso-Mendo, Guy Fitzgerald and Enrique Frias-Martinez
Volume 18, issue 2, 2009
- Behavioral and policy issues in information systems security: the insider threat pp. 101-105

- Merrill Warkentin and Robert Willison
- Protection motivation and deterrence: a framework for security policy compliance in organisations pp. 106-125

- Tejaswini Herath and H Raghav Rao
- What levels of moral reasoning and values explain adherence to information security rules? An empirical study pp. 126-139

- Liisa Myyry, Mikko Siponen, Seppo Pahnila, Tero Vartiainen and Anthony Vance
- Frame misalignment: interpreting the implementation of information systems security certification in an organization pp. 140-150

- Carol W Hsu
- If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security pp. 151-164

- Scott R Boss, Laurie J Kirsch, Ingo Angermeier, Raymond A Shingler and R Wayne Boss
- Improving multiple-password recall: an empirical study pp. 165-176

- Jie Zhang, Xin Luo, Somasheker Akkaladevi and Jennifer Ziegelmayer
- Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software pp. 177-187

- Younghwa Lee and Kai R Larsen
Volume 18, issue 1, 2009
- The EJIS editorial organisation and submissions pp. 1-3

- Richard Baskerville
- Rethinking organisational size in IS research: meaning, measurement and redevelopment pp. 4-25

- Sigi Goode and Shirley Gregor
- When users are IT experts too: the effects of joint IT competence and partnership on satisfaction with enterprise-level systems implementation pp. 26-37

- Joshua M Davis, William J Kettinger and Dimitar G Kunev
- Information capability and value creation strategy: advancing revenue management through mobile ticketing technologies pp. 38-51

- Ting Li, Eric van Heck and Peter Vervest
- Information infrastructure, governance, and socio-economic development in developing countries pp. 52-65

- Peter Meso, Philip Musa, Detmar Straub and Victor Mbarika
- Information systems and the allure of organisational integration: a cautionary tale from the Irish financial services sector pp. 66-78

- Anita Mangan and Séamas Kelly
- Combining the rational and relational perspectives of electronic trading pp. 79-97

- Eduardo Redondo, Elizabeth Daniel and John Ward
- Erratum: An institutional analysis on the dynamics of the interaction between standardizing and scaling processes: a case study from Ethiopia pp. 98-98

- Selamawit Molla Mekonnen and Sundeep Sahay
- Thank you to Reviewers pp. 99-99

- The Editors
Volume 17, issue 6, 2008
- Editorial pp. 555-556

- Hans van der Heijden
- Knowledge portals in Chinese consulting firms: a task–technology fit perspective pp. 557-574

- Thompson S H Teo and Bing Men
- Software architectures: Blueprint, Literature, Language or Decision? pp. 575-588

- Kari Smolander, Matti Rossi and Sandeep Purao
- Explaining information systems change: a punctuated socio-technical change model pp. 589-613

- Kalle Lyytinen and Mike Newman
- Contextual dynamics during health information systems implementation: an event-based actor-network approach pp. 614-630

- Sunyoung Cho, Lars Mathiassen and Agneta Nilsson
- The Influence of workspace awareness on group intellective decision effectiveness pp. 631-648

- Randolph B Cooper and Russell Haines
- User satisfaction with business-to-employee portals: conceptualization and scale development pp. 649-667

- Dewi Rooslani Tojib, Ly-Fie Sugianto and Sen Sendjaya
- Doing the politics of technological decision making: due process and the debate about identity cards in the U.K pp. 668-677

- Edgar A Whitley and Ian R Hosein
- Profile of IS research published in the European Journal of Information Systems pp. 678-693

- Yogesh K Dwivedi and Jasna Kuljis
- Introduction to the Opinion Paper: Bryant's ‘The future of information systems’ pp. 694-694

- Richard Baskerville
- The future of information systems – Thinking Informatically pp. 695-698

- Antony Bryant
Volume 17, issue 5, 2008
- What design science is not pp. 441-443

- Richard Baskerville
- The only duty we owe to history is to rewrite it: reflections on Bob Galliers’ article ‘A discipline for a stage?’ pp. 444-447

- Ray J Paul
- Defining information systems as work systems: implications for the IS field pp. 448-469

- Steven Alter
- Design science research in Europe pp. 470-475

- Robert Winter
- Client as designer in collaborative design science research projects: what does social science design theory tell us? pp. 476-488

- Judith Weedman
- On theory development in design science research: anatomy of a research project pp. 489-504

- Bill Kuechler and Vijay Vaishnavi
- Design of emerging digital services: a taxonomy pp. 505-517

- Kevin Williams, Samir Chatterjee and Matti Rossi
- Designing enterprise integration solutions: effectively pp. 518-527

- Karthikeyan Umapathy, Sandeep Purao and Russell R Barton
- Secure activity resource coordination: empirical evidence of enhanced security awareness in designing secure business processes pp. 528-542

- Fergle D'Aubeterre, Rahul Singh and Lakshmi Iyer
- Essence: facilitating software innovation pp. 543-553

- Ivan Aaen
Volume 17, issue 4, 2008
- Research quality, project failure, and privacy threats: spitting, yelling, and cussing pp. 321-323

- Richard Baskerville
- Measuring research quality: the United Kingdom Government's Research Assessment Exercise pp. 324-329

- Ray J Paul
- A discipline for a stage? A Shakespearean reflection on the research plot and performance of the Information Systems field pp. 330-335

- Robert D Galliers
- Creating social entrepreneurship in local government pp. 336-342

- Zahir Irani and Tony Elliman
- The moderating role of customer–technology contact on attitude towards technology-based services pp. 343-351

- Aristeidis Theotokis, Pavlos A Vlachos and Katerina Pramatari
- Improving the impact of IT development projects: the benefits realization capability model pp. 352-370

- Colin Ashurst, Neil F Doherty and Joe Peppard
- Strategic scanning project failure and abandonment factors: lessons learned pp. 371-386

- Nicolas Lesca and Marie-Laurence Caron-Fasan
- Personality traits and concern for privacy: an empirical study in the context of location-based services pp. 387-402

- Iris A Junglas, Norman A Johnson and Christiane Spitzmüller
- Re-examining the causal structure of information technology impact research pp. 403-416

- Guy Paré, Simon Bourdeau, Josianne Marsan, Hamid Nach and Shadi Shuraida
- The effect of flaming on computer-mediated negotiations pp. 417-434

- Norman A Johnson, Randolph B Cooper and Wynne W Chin
- Erratum: System development activities and inquiring systems: an integrating framework pp. 435-435

- Andrea Carugati
Volume 17, issue 3, 2008
- Strategies, systems, and technologies pp. 179-181

- Richard Baskerville
- IT employment prospects: beyond the dotcom bubble pp. 182-197

- Raymond R Panko
- Rapid business and IT change: drivers for strategic information systems planning? pp. 198-218

- Henry E Newkirk, Albert L Lederer and Alice M Johnson
- Knowledge management orientation: construct development and empirical validation pp. 219-235

- Catherine L Wang, Pervaiz K Ahmed and Mohammed Rafiq
- Measuring information systems success: models, dimensions, measures, and interrelationships pp. 236-263

- Stacie Petter, William DeLone and Ephraim McLean
- Enacting computer workaround practices within a medication dispensing system pp. 264-278

- Bijan Azad and Nelson King
- An institutional analysis on the dynamics of the interaction between standardizing and scaling processes: a case study from Ethiopia pp. 279-289

- Selamawit Molla Mekonnen and Sundeep Sahay
- The dynamics of IT boundary objects, information infrastructures, and organisational identities: the introduction of 3D modelling technologies into the architecture, engineering, and construction industry pp. 290-304

- Uri Gal, Kalle Lyytinen and Youngjin Yoo
- Interactive innovation of technology for mobile work pp. 305-320

- Jan Kietzmann
Volume 17, issue 2, 2008
- Editorial pp. 99-99

- Hans van der Heijden
- Stakeholder management in IOS projects: analysis of an attempt to implement an electronic patient file pp. 100-111

- Albert Boonstra, David Boddy and Sheena Bell
- A multiple narrative approach to information systems failure: a successful system that failed pp. 112-124

- Eszter Bartis and Nathalie Mitev
- Beyond organisational agendas: using boundary critique to facilitate the inclusion of societal concerns in information systems planning pp. 125-142

- José-Rodrigo Córdoba and Gerald Midgley
- Information system development activities and inquiring systems: an integrating framework pp. 143-155

- Andrea Carugati
- For better or worse: how we apply journal ranking lists pp. 156-157

- Richard Baskerville
- The journal list and its use: motivation, perceptions, and reality pp. 158-162

- Dennis Adams and Norman Johnson
- The ranking of top IS journals: a perspective from the London School of Economics pp. 163-168

- Leslie Willcocks, Edgar A Whitley and Chrisanthi Avgerou
- Expert evaluation vs bibliometric evaluation: experiences from Finland pp. 169-173

- Juhani Iivari
- Time to stop researching the important things? pp. 174-178

- Philip Powell and Maria Woerndl
Volume 17, issue 1, 2008
- Changing the challenge: measure what makes you better and be better at what you measure pp. 1-3

- Richard Baskerville
- The role of perceived enjoyment and social norm in the adoption of technology with network externalities pp. 4-11

- Astrid Dickinger, Mitra Arami and David Meyer
- The economics and psychology of consumer trust in intermediaries in electronic markets: the EM-Trust Framework pp. 12-28

- Pratim Datta and Sutirtha Chatterjee
- Resilience of super users’ mental models of enterprise-wide systems pp. 29-46

- Corinne M Karuppan and Muthu Karuppan
- An exploratory study on meta skills in software development teams: antecedent cooperation skills and personality for shared mental models pp. 47-61

- Hee-Dong Yang, Hye-Ryun Kang and Robert M Mason
- The post mortem paradox: a Delphi study of IT specialist perceptions pp. 62-78

- Vijay Kasi, Mark Keil, Lars Mathiassen and Keld Pedersen
- Explaining changes in learning and work practice following the adoption of online learning: a human agency perspective pp. 79-98

- Tsai-Hsin Chu and Daniel Robey
| |