


default search action
International Journal of Information Management, Volume 35
Volume 35, Number 1, February 2015
- Hung-Tai Tsou, Sheila Hsuan-Yu Hsu:
Performance effects of technology-organization-environment openness, service co-production, and digital-resource readiness: The case of the IT industry. 1-14 - Adel M. Aladwani
:
Facilitators, characteristics, and impacts of Twitter use: Theoretical analysis and empirical illustration. 15-25 - Pheladi T. Lefika, Martie A. Mearns
:
Adding knowledge cafés to the repertoire of knowledge sharing techniques. 26-32 - Eric W. T. Ngai
, Spencer S. C. Tao, Karen Ka-Leung Moon:
Social media research: Theories, constructs, and conceptual frameworks. 33-44 - Meng-Hsiang Hsu, Chun-Ming Chang, Li-Wen Chuang:
Understanding the determinants of online repeat purchase intention and moderating role of habit: The case of online group-buying in Taiwan. 45-56 - Andrew Thatcher, Ana Cristina Vasconcelos, David Ellis:
An investigation into the impact of information behaviour on information failure: The Fukushima Daiichi nuclear power disaster. 57-63 - Chulmo Koo, Namho Chung
, Kichan Nam
:
Assessing the impact of intrinsic and extrinsic motivators on smart green IT device use: Reference group perspectives. 64-79 - Shan Liu, Zhaohua Deng:
How environment risks moderate the effect of control on performance in information technology projects: Perspectives of project managers and user liaisons. 80-97 - Jiunn-Woei Lian
:
Critical factors for cloud based e-invoice service adoption in Taiwan: An empirical study. 98-109 - Arnaud Paagman, Mary Tate
, Elfi Furtmueller, Jessica de Bloom
:
An integrative literature review and empirical validation of motives for introducing shared services in government organizations. 110-123 - Matti Mäntymäki
, Jari Salo
:
Why do teens spend real money in virtual worlds? A consumption values and developmental psychology perspective on virtual consumption. 124-134
- Bob Wiggins:
Copyright Questions and Answers, L.N. Gasaway. Purdue University Press, West Lafayette (2013), ISBN: 978-1-55753-639-6. 135-136
Volume 35, Number 2, April 2015
- Amir Gandomi
, Murtaza Haider:
Beyond the hype: Big data concepts, methods, and analytics. 137-144 - Kamarul Faizal Hashim
, Felix B. Tan
:
The mediating role of trust and commitment on members' continuous knowledge sharing intention: A commitment-trust theory perspective. 145-151
- Alireza Isfandyari-Moghaddam:
Managing Information in Organizations: A Practical Guide to Implementing Management Strategy, S.A. Cox. Palgrave Macmillan, Hampshire, UK (2014), ISBN: 978-0-23029-884-2. 152-153
- Lidia Ogiela:
Advanced techniques for knowledge management and access to strategic information. 154-159 - Yi Wang
, Yang Chen, Jose Benitez-Amado:
How information technology influences environmental performance: Empirical evidence from China. 160-170
- Bob Wiggins, Stuart James Fitz-Gerald:
Information Governance and Assurance, A. MacLennan. Facet Publishing, London (2014), ISBN: 978-1-85604-940-5. 171-175
- Umi Asma' Mokhtar
, Zawiyah Mohammad Yusof:
Classification: The understudied concept. 176-182 - Nick Hajli
:
Social commerce constructs and consumer's intention to buy. 183-191 - Torsten J. Gerpott, Nima Ahmadi:
Determinants of willingness to look for separate international roaming services - An empirical study of mobile communication customers in Germany. 192-203 - Satish K. Tyagi, Xianming Cai, Kai Yang
, Terrence Chambers
:
Lean tools and methods to support efficient knowledge creation. 204-214 - Tung-Ching Lin, Shiu-Li Huang, Chieh-Ju Hsu:
A dual-factor model of loyalty to IT product - The case of smartphones. 215-228 - Manning Li, Jiye Mao:
Hedonic or utilitarian? Exploring the impact of communication style alignment on user's perception of virtual health advisory services. 229-243 - Hilary J. Grierson
, Jonathan R. Corney, G. D. Hatcher:
Using visual representations for the searching and browsing of large, complex, multimedia data sets. 244-252
- Uros Bole, Ales Popovic
, Jure Zabkar, Gregor Papa
, Jurij Jaklic:
A case analysis of embryonic data mining success. 253-259
- Shiva Hullavarad
, Russell O'Hare, Ashok K. Roy:
Enterprise Content Management solutions - Roadmap strategy and implementation challenges. 260-265
Volume 35, Number 3, June 2015
- Yongqiang Sun
, Nan Wang
, Chunxiao Yin, Jacky Xi Zhang
:
Understanding the relationships between motivators and effort in crowdsourcing marketplaces: A nonlinear analysis. 267-276 - Shu-Hui Chuang, Hong-Nan Lin:
Co-creating e-service innovations: Theory, practice, and impact on firm performance. 277-291 - Thais Elaine Vick, Marcelo Seido Nagano, Silvio Popadiuk
:
Information culture and its influences in knowledge creation: Evidence from university teams engaged in collaborative innovation projects. 292-298 - Juho Hamari
:
Why do people buy virtual goods? Attitude toward virtual good purchases versus game enjoyment. 299-308 - Paul Beynon-Davies:
Securing significant patterns: The enigma of forma. 309-321 - Ilyoo B. Hong
:
Understanding the consumer's online merchant selection process: The roles of product involvement, perceived risk, and trust expectation. 322-336 - Patti Brooks, Omar F. El-Gayar
, Surendra Sarnikar:
A framework for developing a domain specific business intelligence maturity model: Application to healthcare. 337-345 - Rania Fakhoury
, Benoit Aubert:
Citizenship, trust, and behavioural intentions to use public e-services: The case of Lebanon. 346-351 - Hyun Shik Yoon, Luis G. Occeña:
Influencing factors of trust in consumer-to-consumer electronic commerce with gender and age. 352-363 - Chien-Hsiang Chou, Yi-Shun Wang
, Tzung-I Tang:
Exploring the determinants of knowledge adoption in virtual communities: A social influence perspective. 364-376
- Marek R. Ogiela, Fang-Yie Leu:
Innovations in security and knowledge management. 377-378 - Meixia Miao, Tao Jiang, Ilsun You:
Payment-based incentive mechanism for secure cloud deduplication. 379-386 - Junsheng Zhang
, Yunchuan Sun, Antonio J. Jara
:
Towards semantically linked multilingual corpus. 387-395 - Tomasz Hachaj
, Danuta Baraniewicz:
Knowledge Bricks - Educational immersive reality environment. 396-406
Volume 35, Number 4, August 2015
- Gary Garrison, Robin L. Wakefield, Sanghyun Kim:
The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processes and operations. 377-393 - Panos Panagiotopoulos
, Liran Christine Shan, Julie Barnett
, Áine Regan
, Áine McConnon:
A framework of social media engagement: Case studies with food and consumer organisations in the UK and Ireland. 394-402 - Umi Asma' Mokhtar, Zawiyah Mohammad Yusof:
The requirement for developing functional records classification. 403-407 - Youngseek Kim, Melissa A. Adler
:
Social scientists' data sharing behaviors: Investigating the roles of individual motivations, institutional pressures, and data repositories. 408-418 - Juho Hamari
, Jonna Koivisto
:
Why do people use gamification services? 419-431 - Waqar Nadeem, Daniela Andreini
, Jari Salo
, Tommi Laukkanen
:
Engaging consumers online through websites and social media: A gender study of Italian Generation Y clothing consumers. 432-442 - Jessica Braojos-Gomez
, Jose Benitez-Amado, Francisco Javier Lloréns Montes
:
How do small firms learn to develop a social media competence? 443-458 - Sehee Han, Jinyoung Min
, Heeseok Lee:
Antecedents of social presence and gratification of social connection needs in SNS: A study of Twitter users and their mobile and non-mobile usage. 459-471 - Andrew Georgiou, Stephann Makri:
How local government policy workers use information: An interview study and design recommendations. 472-489 - Carlo Lipizzi, Luca Iandoli, Jose Emmanuel Ramirez-Marquez:
Extracting and evaluating conversational patterns in social media: A socio-semantic analysis of customers' reactions to the launch of new products using Twitter streams. 490-503 - Chao-Min Chiu, Hsin-Yi Huang
, Hsiang-Lan Cheng, Pei-Chen Sun:
Understanding online community citizenship behaviors through social support and social identity. 504-519
- Xiubao Yu
, Jie Yan, Dimitris G. Assimakopoulos
:
Case analysis of imitative innovation in Chinese manufacturing SMEs: Products, features, barriers and competences for transition. 520-525
- Abel Usoro:
Benson, Vladlena and Morgan, Stephanie (eds) (2014) Cutting-Edge Technologies and Social Media Use in Higher Education Hershey: IGI, ISBN-13: 978-1466651746. 526-528 - Andrew Nurse:
B. Wiggins, Information Governance - Beyond ISO 30301, Cura Viewpoint No 1 (2014, May). 529-530
Volume 35, Number 5, October 2015
- Nabil Sultan
:
Reflective thoughts on the potential and challenges of wearable technology for healthcare provision and medical education. 521-526
- Agneta Ranerup
, Lars Norén:
How are citizens' public service choices supported in quasi-markets? 527-537 - Yan Bai, Zhong Yao, Yi-Fan Dou:
Effect of social commerce factors on user purchase behavior: An empirical investigation from renren.com. 538-550 - Polona Vilar, Alenka Sauperl:
Archives, Quo Vadis et Cum Quibus?: Archivists' self-perceptions and perceptions of users of contemporary archives. 551-560 - Beth H. Jones, Amita Goyal Chin:
On the efficacy of smartphone security: A critical analysis of modifications in business students' practices over time. 561-571 - Mario Pérez-Montoro
, Jaume Nualart:
Visual articulation of navigation and search systems for digital libraries. 572-579 - Yi Wang
, Si Shi
, Saggi Nevo, Shaorui Li, Yang Chen:
The interaction effect of IT assets and IT management on firm performance: A systems perspective. 580-593 - John N. Walsh
:
Developing new categories of knowledge acquisition, translation and dissemination by technological gatekeepers. 594-605
- Bob Wiggins:
The Digital Renaissance of Work. P. Miller, E. Marsh. Gower Publishing, Farnham. 216p., price £20.00. 606-608 - Tomer Simon
, Avishay Goldberg, Bruria Adini:
Socializing in emergencies - A review of the use of social media in emergency situations. 609-619
- Jaime A. Palma-Mendoza
, Kevin Neailey:
A business process re-design methodology to support supply chain integration: Application in an Airline MRO supply chain. 620-631 - Delin Zeng, Tao Hua Ouyang, Ning Zhou, Jingbo Hu:
The role of embeddedness in achieving IT-enabled organizational transformation: A case of Xi'an Aero-Engine PLC (XAEP), China. 632-635 - Marie-Pierre Gagnon, Julie Payne-Gagnon, Jean-Paul Fortin, Guy Paré, José Côté, François Courcy:
A learning organization in the service of knowledge management among nurses: A case study. 636-642 - Julien Malaurent, David E. Avison:
From an apparent failure to a success story: ERP in China - Post implementation. 643-646
Volume 35, Number 6, December 2015
- Edgar Serna M.
:
Maturity model of transdisciplinary knowledge management. 647-654 - Michal Biron
, Hagar Hanuka:
Comparing normative influences as determinants of knowledge continuity. 655-661 - Michael Schulz, Patrick Winter, Sang-Kyu Thomas Choi:
On the relevance of reports - Integrating an automated archiving component into a business intelligence system. 662-671 - Remco M. Dijkman
, Bram Sprenkels, Thijs Peeters, Alexandre Janssen
:
Business models for the Internet of Things. 672-678 - Loo Geok Pee
, Jung Lee
:
Intrinsically motivating employees' online knowledge sharing: Understanding the effects of job design. 679-690 - Ju-Young M. Kang
, Kim K. P. Johnson:
F-Commerce platform for apparel online social shopping: Testing a Mowen's 3M model. 691-701 - Bo Wu, Haiying Shen:
Analyzing and predicting news popularity on Twitter. 702-711
- Steve Jones:
Cloud computing procurement and implementation: Lessons learnt from a United Kingdom case study. 712-716 - Atif Ahmad, Sean B. Maynard
, Graeme G. Shanks
:
A case analysis of information systems and security incident responses. 717-723

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.