Works matching IS 13873326 AND DT 2010 AND VI 12 AND IP 3
Results: 10
Will mobile video become the killer application for 3G mobile Internet? a model of media convergence acceptance.
- Published in:
- Information Systems Frontiers, 2010, v. 12, n. 3, p. 311, doi. 10.1007/s10796-008-9139-7
- By:
- Publication type:
- Article
An empirical study of IT as a factor of production: The case of Net-enabled IT assets.
- Published in:
- Information Systems Frontiers, 2010, v. 12, n. 3, p. 323, doi. 10.1007/s10796-008-9141-0
- By:
- Publication type:
- Article
Applying an organizational learning perspective to new technology deployment by technological gatekeepers: A theoretical model and key issues for future research.
- Published in:
- Information Systems Frontiers, 2010, v. 12, n. 3, p. 287, doi. 10.1007/s10796-009-9194-8
- By:
- Publication type:
- Article
Guest editorial for the special section on “Technology acceptance, usage, and competitive advantage”.
- Published in:
- 2010
- By:
- Publication type:
- Editorial
The impact of trust, risk and optimism bias on E-file adoption.
- Published in:
- Information Systems Frontiers, 2010, v. 12, n. 3, p. 299, doi. 10.1007/s10796-008-9138-8
- By:
- Publication type:
- Article
An ontological modelling of user requirements for personalised information provision.
- Published in:
- Information Systems Frontiers, 2010, v. 12, n. 3, p. 337, doi. 10.1007/s10796-008-9144-x
- By:
- Publication type:
- Article
Successful and unsuccessful multicommunication episodes: Engaging in dialogue or juggling messages?
- Published in:
- Information Systems Frontiers, 2010, v. 12, n. 3, p. 277, doi. 10.1007/s10796-009-9175-y
- By:
- Publication type:
- Article
ICT infrastructure for innovation: A case study of the enterprise service bus approach.
- Published in:
- Information Systems Frontiers, 2010, v. 12, n. 3, p. 257, doi. 10.1007/s10796-009-9169-9
- By:
- Publication type:
- Article
Knowledge management technology for organized crime risk assessment.
- Published in:
- Information Systems Frontiers, 2010, v. 12, n. 3, p. 267, doi. 10.1007/s10796-009-9178-8
- By:
- Publication type:
- Article
From IT deployment capabilities to competitive advantage: An exploratory study in China.
- Published in:
- Information Systems Frontiers, 2010, v. 12, n. 3, p. 239, doi. 10.1007/s10796-009-9182-z
- By:
- Publication type:
- Article