default search action
ACM Transactions on Management Information Systems, Volume 2
Volume 2, Number 1, March 2011
- Hsinchun Chen:
Editorial: Design science, grand challenges, and societal impacts. 1:1-1:10 - Michael Chau:
Visualizing web search results using glyphs: Design and evaluation of a flower metaphor. 2:1-2:27 - Feng-Yang Kuo, Chun-Po Yin:
A linguistic analysis of group support systems interactions for uncovering social realities of organizations. 3:1-3:21 - Gerald C. Kane:
A multimethod study of information quality in wiki collaboration. 4:1-4:16 - Gregory S. Dawson, Richard T. Watson:
Uncovering and testing archetypes of effective public sector CIOs. 5:1-5:19 - Debabrata Dey, Ming Fan, Gang Peng:
Computer use and wage returns: The complementary roles of IT-related human capital and nonroutine tasks. 6:1-6:21
Volume 2, Number 2, June 2011
- Paul Jen-Hwa Hu, Hsinchun Chen:
Analyzing information systems researchers' productivity and impacts: A perspective on the H index. 7:1-7:8 - Sudip Bhattacharjee, Ram D. Gopal, James R. Marsden, Ramesh Sankaranarayanan:
Digital goods and markets: Emerging issues and challenges. 8:1-8:14 - Matthias W. Uhl:
Explaining U.S. consumer behavior with news sentiment. 9:1-9:18 - Anna Ye Du, Sanjukta Das, Ram D. Gopal, Ram Ramesh:
Risk hedging in storage grid markets: Do options add value to forwards? 10:1-10:23 - Jun Liu, Sudha Ram:
Who does what: Collaboration patterns in the wikipedia and their impact on article quality. 11:1-11:23 - D. Harrison McKnight, Michelle Carter, Jason Bennett Thatcher, Paul F. Clay:
Trust in a specific technology: An investigation of its components and measures. 12:1-12:25
Volume 2, Number 3, October 2011
- Alexander Tuzhilin:
Knowledge management revisited: Old Dogs, New tricks. 13:1-13:11 - Juliana Sutanto, Atreyi Kankanhalli, Bernard C. Y. Tan:
Eliciting a sense of virtual community among knowledge contributors. 14:1-14:17 - Jing Peng, Daniel Dajun Zeng, Zan Huang:
Latent subject-centered modeling of collaborative tagging: An application in social search. 15:1-15:23 - Mohammad M. Masud, Tahseen Al-Khateeb, Kevin W. Hamlen, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
Cloud-based malware detection for evolving data streams. 16:1-16:27 - Susanne Schmidt-Rauch, Gerhard Schwabe:
From telesales to tele-advisory in travel agencies: Business problems, generic design goals and requirements. 17:1-17:13 - Ke-Wei Huang, Zhuolun Li:
A multilabel text classification algorithm for labeling risk factors in SEC form 10-K. 18:1-18:19 - Ming-Chih Lin, Anthony J. T. Lee, Rung-Tai Kao, Kuo-Tay Chen:
Stock price movement prediction using representative prototypes of financial reports. 19:1-19:18
Volume 2, Number 4, December 2011
- Jay F. Nunamaker Jr., Robert O. Briggs:
Toward a broader vision for Information Systems. 20:1-20:12 - Balaji Padmanabhan, Alan R. Hevner, Michael Cuenco, Crystal Shi:
From information to operations: Service quality and customer retention. 21:1-21:21 - Huaxia Rui, Andrew B. Whinston:
Designing a social-broadcasting-based business intelligence system. 22:1-22:19 - Hina Arora, T. S. Raghu, Ajay S. Vinze:
Decision support for containing pandemic propagation. 23:1-23:25 - Paulo B. Góes, Noyan Ilk, Wei T. Yue, J. Leon Zhao:
Live-chat agent assignments to heterogeneous e-customers under imperfect classification. 24:1-24:15 - Raymond Y. K. Lau, Stephen Shaoyi Liao, Ron Chi-Wai Kwok, Kaiquan Xu, Yunqing Xia, Yuefeng Li:
Text mining and probabilistic language modeling for online review spam detection. 25:1-25:30 - Frederik Marx, Jörg H. Mayer, Robert Winter:
Six principles for redesigning executive information systems - findings of a survey and evaluation of a prototype. 26:1-26:19
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.