Volume 10, Number 1, March 2008
Janice C. Sipior
, Burke T. Ward
: Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation.
Hemant K. Sabat
: Spectrum acquisition strategies adopted by wireless carriers in the USA.
: Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading.
Volume 10, Number 2, April 2008
Volume 10, Number 3, July 2008
Special Issue on Decision Models for Information Systems Management
: Information systems fitness and risk in IS development: Insights and implications from chaos and complex systems theories.
: Towards an integrated measurement of IS project performance: The project performance scorecard.
: Team performance and information system implementation.
: Is your back-up IT infrastructure in a safe location?
Volume 10, Number 4, September 2008
Special Issue on Adoption and Use of Information & Communication Technologies (ICT) in the Residential/Household Context
: Digital home technologies and transformation of households.
Susan A. Brown
: Household technology adoption, use, and impacts: Past, present, and future.
, Ben Light
: Social networking and digital gaming media convergence: Classification and its consequences for appropriation.
Volume 10, Number 5, November 2008
Special Issue on Enterprise Information Systems (EIS)
, Lida Xu
: Parameter mapping and data transformation for engineering application integration.
: The concept and theory of material flow.