Editorial Introduction

Zwass, Vladimir

Special Issue: Crossing Boundaries in Information Systems Research

Briggs, Robert O, Nunamaker Jr, Jay F, and Sprague Jr, Ralph H

Turning a Community into a Market: A Practice Perspective on Information Technology Use in Boundary Spanning

Levina, Natalia and Vaast, Emmanuelle

Field Experiences with eXtreme Programming: Developing an Emergency Response System

Fruhling, Ann and De Vreede, Gert-Jan

Evaluating the Adoption of Enterprise Application Integration in Health-Care Organizations

Khoumbati, Khalil, Themistocleous, Marinos, and Irani, Zahir

An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions

Lili, Sun, Srivastava, Rajendra P, and Mock, Theodore J

Collaborative Activities in Virtual Settings: A Knowledge Management Perspective of Telemedicine

Paul, David L

Digital Inclusiveness--Longitudinal Study of Internet Adoption by Older Adults

Lam, Jolie C Y and Lee, Matthew K O

Interactions Between System Evaluation and Theory Testing: A Demonstration of the Power of a Multifaceted Approach to Information Systems Research

Jinwei, Cao, Crews, Janna M, Ming, Lin, Deokar, Amit, Burgoon, Judee K, and Nunamaker Jr, Jay F

Discovering Cues to Error Detection in Speech Recognition Output: A User-Centered Approach

Lina, Zhou, Yongmei, Shi, Dongsong, Zhang, and Sears, Andrew

The Market's Perception of the Transactional Risks of Information Technology Outsourcing Announcements

Wonseok, Oh, Gallivan, Michael J, and Kim, Joung W

Exploring Attribute Correspondences Across Heterogeneous Databases by Mutual Information

Huimin, Zhao and Soofi, Ehsan S

The Use of Cognitive Maps and Case-Based Reasoning for B2B Negotiation

Kun-Chang, Lee and Soon-Jae, Kwon

Send comments regarding this page to David Eargle.