- Page 1 and 2: Proceedings of the 2nd Internationa
- Page 3 and 4: Contents Paper Title Author(s) Page
- Page 5 and 6: Paper Title Author(s) Page No. The
- Page 7 and 8: Preface Following on from the conti
- Page 9 and 10: Idisemi Apulu is currently a PhD st
- Page 11 and 12: Waldo Rocha Flores received his B.S
- Page 13: Ari Riabacke, Ph.D. in Risk- and De
- Page 17 and 18: Kwesi Korsa Aggrey Phenomenology co
- Page 19 and 20: Kwesi Korsa Aggrey control, which d
- Page 21 and 22: Kwesi Korsa Aggrey chronotopes of v
- Page 23 and 24: The Acceptance and use of Education
- Page 25 and 26: Jaflah Al-Ammary toward systems use
- Page 27 and 28: 3.3.4 Computer anxiety Jaflah Al-Am
- Page 29 and 30: Table 3: Explanation of variance Ja
- Page 31 and 32: Jaflah Al-Ammary Compeau, D.R. and
- Page 33 and 34: Suzan Arslanturk et al. valued data
- Page 35 and 36: Suzan Arslanturk et al. Knowledge A
- Page 37 and 38: 6. Conclusions and future work Suza
- Page 39 and 40: Tridip Bardhan et al. 2005).Thus, t
- Page 41 and 42: Tridip Bardhan et al. More discussi
- Page 43 and 44: Table 1: Evaluation criteria for EI
- Page 45 and 46: Tridip Bardhan et al. Step 6: Gathe
- Page 47 and 48: Tridip Bardhan et al. Figure 6: Com
- Page 49 and 50: Tridip Bardhan et al. 11, and by ho
- Page 51 and 52: Tridip Bardhan et al. Although the
- Page 53 and 54: Imran Batada and Asmita Rahman On t
- Page 55 and 56: Imran Batada and Asmita Rahman Figu
- Page 57 and 58: Imran Batada and Asmita Rahman thei
- Page 59 and 60: Evolution of eProcurement Model in
- Page 61 and 62: Clara Benevolo and Renata Paola Dam
- Page 63 and 64: Clara Benevolo and Renata Paola Dam
- Page 65 and 66:
Clara Benevolo and Renata Paola Dam
- Page 67 and 68:
Clara Benevolo and Renata Paola Dam
- Page 69 and 70:
Kofi Agyenim Boateng To what exten
- Page 71 and 72:
Kofi Agyenim Boateng 3. Findings -i
- Page 73 and 74:
Kofi Agyenim Boateng The study for
- Page 75 and 76:
Kofi Agyenim Boateng Short, J., Wil
- Page 77 and 78:
Gino Bougaardt and Michael Kyobe 2.
- Page 79 and 80:
Gino Bougaardt and Michael Kyobe au
- Page 81 and 82:
Gino Bougaardt and Michael Kyobe us
- Page 83 and 84:
Gino Bougaardt and Michael Kyobe su
- Page 85 and 86:
Gino Bougaardt and Michael Kyobe Fo
- Page 87 and 88:
Sheryl Buckley and Apostolos Gianna
- Page 89 and 90:
Sheryl Buckley and Apostolos Gianna
- Page 91 and 92:
Sheryl Buckley and Apostolos Gianna
- Page 93 and 94:
If existing CoP Management Academic
- Page 95 and 96:
Sheryl Buckley and Apostolos Gianna
- Page 97 and 98:
Nuntarat Bunditwongrat et al. RQ1:
- Page 99 and 100:
Nuntarat Bunditwongrat et al. inves
- Page 101 and 102:
Nuntarat Bunditwongrat et al. with
- Page 103 and 104:
Nuntarat Bunditwongrat et al. surpr
- Page 105 and 106:
Assessing Information Management Co
- Page 107 and 108:
2.3 The issue of alignment Andy Byt
- Page 109 and 110:
Andy Bytheway (Edwards & Peppard, 1
- Page 111 and 112:
Andy Bytheway A representative sam
- Page 113 and 114:
Andy Bytheway ability of government
- Page 115 and 116:
5. Conclusions Andy Bytheway This p
- Page 117 and 118:
A Semiotic Approach to Analyse the
- Page 119 and 120:
Supaporn Chai-Arayalert and Keiichi
- Page 121 and 122:
Supaporn Chai-Arayalert and Keiichi
- Page 123 and 124:
Supaporn Chai-Arayalert and Keiichi
- Page 125 and 126:
Supaporn Chai-Arayalert and Keiichi
- Page 127 and 128:
Cheng-Yi Chiang et al. Emotional la
- Page 129 and 130:
Cheng-Yi Chiang et al. usefulness o
- Page 131 and 132:
Cheng-Yi Chiang et al. Table 1: Ind
- Page 133 and 134:
Cheng-Yi Chiang et al. Igbaria, M.,
- Page 135 and 136:
Wen-Chou Chi et al. type, is a kind
- Page 137 and 138:
Wen-Chou Chi et al. correspondingly
- Page 139 and 140:
Wen-Chou Chi et al. preliminary eva
- Page 141 and 142:
Factors Determining the Adoption of
- Page 143 and 144:
Taurai Chikotie et al. The Preside
- Page 145 and 146:
Taurai Chikotie et al. Regulatory a
- Page 147 and 148:
Taurai Chikotie et al. NTIA (Nation
- Page 149 and 150:
Mitchell Cochran The importance is
- Page 151 and 152:
Mitchell Cochran Customer: Please
- Page 153 and 154:
Mitchell Cochran Many organizations
- Page 155 and 156:
Motivations for IT Outsourcing in P
- Page 157 and 158:
Michael Cox et al. contrast, has mo
- Page 159 and 160:
Michael Cox et al. Table 3: Intervi
- Page 161 and 162:
4.2.3 Recruitment issues Michael Co
- Page 163 and 164:
Michael Cox et al. Hart, M. (2008).
- Page 165 and 166:
Stefano De Falco Systems used to c
- Page 167 and 168:
Stefano De Falco The information p
- Page 169 and 170:
Stefano De Falco The main applicati
- Page 171 and 172:
Stefano De Falco the product, but a
- Page 173 and 174:
3. An application Stefano De Falco
- Page 175 and 176:
Legal, Privacy, Security, Access an
- Page 177 and 178:
Nomusa Dlodlo promises to their cli
- Page 179 and 180:
Nomusa Dlodlo is likely to be encod
- Page 181 and 182:
8. Discussion and way forward Nomus
- Page 183 and 184:
Interoperability Monitoring for eGo
- Page 185 and 186:
Badr Elmir et al. Many levels of i
- Page 187 and 188:
Badr Elmir et al. GIMM (Government
- Page 189 and 190:
Badr Elmir et al. By noting the ele
- Page 191 and 192:
Badr Elmir et al. In addition to it
- Page 193 and 194:
5.1 Discussion Badr Elmir et al. Th
- Page 195 and 196:
Enterprise Resource Planning Implem
- Page 197 and 198:
Develop users' project ownership I
- Page 199 and 200:
Turan Erman Erkan blueprint, realiz
- Page 201 and 202:
A Meta-Analysis of how the Adoption
- Page 203 and 204:
Francesc Estanyol Favoured by the d
- Page 205 and 206:
Francesc Estanyol 4.1 Mapping ecolo
- Page 207 and 208:
Francesc Estanyol Number of new pr
- Page 209 and 210:
Francesc Estanyol OPALS. (2007) Ope
- Page 211 and 212:
Albrecht Fritzsche The idea to desc
- Page 213 and 214:
Albrecht Fritzsche improved; the no
- Page 215 and 216:
Albrecht Fritzsche to one another a
- Page 217 and 218:
Albrecht Fritzsche accounting and t
- Page 219 and 220:
Hiroatsu Fukuda et al. aggregation
- Page 221 and 222:
Hiroatsu Fukuda et al. facilities w
- Page 223 and 224:
Hiroatsu Fukuda et al. Figures 7 to
- Page 225 and 226:
Figure 12: Restriction of plot rati
- Page 227 and 228:
Hiroatsu Fukuda et al. Therefore, i
- Page 229 and 230:
2. Secondary watermark addition att
- Page 231 and 232:
Figure 1: Watermark construction pr
- Page 233 and 234:
Sajid Iqbal et al. As the watermark
- Page 235 and 236:
Sajid Iqbal et al. of attack, as we
- Page 237 and 238:
Tiko Iyamu EA is therefore inevitab
- Page 239 and 240:
Tiko Iyamu providing a more accurat
- Page 241 and 242:
Tiko Iyamu the organizations. Chang
- Page 243 and 244:
Tiko Iyamu The discussion that foll
- Page 245 and 246:
Evaluating Interoperability Artifac
- Page 247 and 248:
Veit Jahns 3. Elaboration of the co
- Page 249 and 250:
Veit Jahns administration participa
- Page 251 and 252:
Characteristics Interoperabilityen
- Page 253 and 254:
Free and Open Source Software for P
- Page 255 and 256:
2. Background Srimal Jayawardena an
- Page 257 and 258:
Figure 3: The enterprise success mo
- Page 259 and 260:
3.1 Scope of the research Srimal Ja
- Page 261 and 262:
Srimal Jayawardena and Gihan Dias C
- Page 263 and 264:
5. Conclusions Srimal Jayawardena a
- Page 265 and 266:
Table 2: Investigated IS projects A
- Page 267 and 268:
Evaluating the Success of Customer
- Page 269 and 270:
3. Research framework Farnoosh Khod
- Page 271 and 272:
Farnoosh Khodakarami and Yolande Ch
- Page 273 and 274:
Farnoosh Khodakarami and Yolande Ch
- Page 275 and 276:
6. Conclusion Farnoosh Khodakarami
- Page 277 and 278:
Toward a Novel Methodology for IT S
- Page 279 and 280:
Mouhsine Lakhdissi and Bouchaib Bou
- Page 281 and 282:
Mouhsine Lakhdissi and Bouchaib Bou
- Page 283 and 284:
Mouhsine Lakhdissi and Bouchaib Bou
- Page 285 and 286:
Mouhsine Lakhdissi and Bouchaib Bou
- Page 287 and 288:
Mouhsine Lakhdissi and Bouchaib Bou
- Page 289 and 290:
2. Community health promotion Chih-
- Page 291 and 292:
Chih-Yu Lin et al. A total of 165 q
- Page 293 and 294:
Chih-Yu Lin et al. 4.2 The results
- Page 295 and 296:
Information Security Practices in Z
- Page 297 and 298:
Chishala Lukwesa and Christopher Up
- Page 299 and 300:
Chishala Lukwesa and Christopher Up
- Page 301 and 302:
Chishala Lukwesa and Christopher Up
- Page 303 and 304:
Chishala Lukwesa and Christopher Up
- Page 305 and 306:
Proposing an Optimized Change Manag
- Page 307 and 308:
Negar Madani et al. approach to MOF
- Page 309 and 310:
Negar Madani et al. MOF 4 does not
- Page 311 and 312:
Table 3: Change management RACI mat
- Page 313 and 314:
Negar Madani et al. Therefore an op
- Page 315 and 316:
Sizakele Mathaba et al. Figure 1 is
- Page 317 and 318:
Sizakele Mathaba et al. the tag. Th
- Page 319 and 320:
Sizakele Mathaba et al. Organizatio
- Page 321 and 322:
8. Acknowledgments Sizakele Mathaba
- Page 323 and 324:
Fatemeh Mohammadi et al. totality.
- Page 325 and 326:
Fatemeh Mohammadi et al. obtain the
- Page 327 and 328:
Figure 1: Two types of memory Fatem
- Page 329 and 330:
Fatemeh Mohammadi et al. 12. Experi
- Page 331 and 332:
Copyright Protection for GIS Vector
- Page 333 and 334:
Amer Sedeeq Mustafa Figure 2: Block
- Page 335 and 336:
Amer Sedeeq Mustafa Generate an 8
- Page 337 and 338:
Amer Sedeeq Mustafa Sung. K. Je, Ch
- Page 339 and 340:
Shirin Nasher et al. The main goal
- Page 341 and 342:
Shirin Nasher et al. Table 2: Diffe
- Page 343 and 344:
Shirin Nasher et al. Figure1: The m
- Page 345 and 346:
Figure 2: Analytic hierarchy decisi
- Page 347 and 348:
Critical Factors in the use of Mobi
- Page 349 and 350:
Mário Carrilho Negas and Paulo Ram
- Page 351 and 352:
Mário Carrilho Negas and Paulo Ram
- Page 353 and 354:
Mário Carrilho Negas and Paulo Ram
- Page 355 and 356:
A Framework for Information Systems
- Page 357 and 358:
Phathutshedzo Nemutanzhela and Tiko
- Page 359 and 360:
Phathutshedzo Nemutanzhela and Tiko
- Page 361 and 362:
Phathutshedzo Nemutanzhela and Tiko
- Page 363 and 364:
Phathutshedzo Nemutanzhela and Tiko
- Page 365 and 366:
RFID: A Review of its Relevance and
- Page 367 and 368:
Jonathan Oni et al. author(s) follo
- Page 369 and 370:
Jonathan Oni et al. description of
- Page 371 and 372:
4.5 Improved delivery and reliabili
- Page 373 and 374:
Jonathan Oni et al. Leicester Unive
- Page 375 and 376:
Caroline Pade-Khene and Dave Sewry
- Page 377 and 378:
Caroline Pade-Khene and Dave Sewry
- Page 379 and 380:
Caroline Pade-Khene and Dave Sewry
- Page 381 and 382:
Caroline Pade-Khene and Dave Sewry
- Page 383 and 384:
Caroline Pade-Khene and Dave Sewry
- Page 385 and 386:
Bahlol Rahimi information system (P
- Page 387 and 388:
Bahlol Rahimi support systems in he
- Page 389 and 390:
Bahlol Rahimi completeness of the s
- Page 391 and 392:
Bahlol Rahimi Anderson, J. G. (1997
- Page 393 and 394:
Farnaz Rahimi and Gholamabas Arabsh
- Page 395 and 396:
Farnaz Rahimi and Gholamabas Arabsh
- Page 397 and 398:
Farnaz Rahimi and Gholamabas Arabsh
- Page 399 and 400:
Ari Riabacke et al. can be viewed a
- Page 401 and 402:
3. Results Ari Riabacke et al. The
- Page 403 and 404:
4. Analysis Ari Riabacke et al. The
- Page 405 and 406:
7.1.2 Categories 3-4 Ari Riabacke e
- Page 407 and 408:
Assessing Future Value of Investmen
- Page 409 and 410:
Waldo Rocha Flores et al. control o
- Page 411 and 412:
Waldo Rocha Flores et al. For each
- Page 413 and 414:
5.1 Domains Waldo Rocha Flores et a
- Page 415 and 416:
Waldo Rocha Flores et al. Responden
- Page 417 and 418:
Evaluation Information Extraction f
- Page 419 and 420:
Klaokanlaya Silachan and Panjai Tan
- Page 421 and 422:
Klaokanlaya Silachan and Panjai Tan
- Page 423 and 424:
4.2 Classification Klaokanlaya Sila
- Page 425 and 426:
Klaokanlaya Silachan and Panjai Tan
- Page 427 and 428:
Ali Suzangar et al. There are four
- Page 429 and 430:
2.3 ITIL financial management proce
- Page 431 and 432:
Figure2: RMMG framework 4.1 Value R
- Page 433 and 434:
Ali Suzangar et al. investment deci
- Page 435 and 436:
Hsiao-Ting Tseng et al. electronic
- Page 437 and 438:
Hsiao-Ting Tseng et al. The main re
- Page 439 and 440:
Hsiao-Ting Tseng et al. The OEMRS i
- Page 441 and 442:
5. Conclusion and discussion Hsiao-
- Page 443 and 444:
Ngozi Blessing Ukachi It is in ligh
- Page 445 and 446:
Ngozi Blessing Ukachi 6 MIT 7 SSRN
- Page 447 and 448:
Ngozi Blessing Ukachi On the other
- Page 449 and 450:
Cloud Computing-Based IT Solutions
- Page 451 and 452:
Branch Office A Branch Office C Fig
- Page 453 and 454:
This all depends on the relationshi
- Page 455 and 456:
Case Study on Information Evaluatio
- Page 457 and 458:
Yupeng Wang et al. To express the s
- Page 459 and 460:
Yupeng Wang et al. Figure 6: Constr
- Page 461 and 462:
Figure 10: Ratio of population olde
- Page 463 and 464:
Yupeng Wang et al. Gao W. and Ojima
- Page 465 and 466:
2. Literature review 2.1 Definition
- Page 467 and 468:
Grafton Whyte and Donovan Lindsay M
- Page 469 and 470:
Figure 3: Distribution of industrie
- Page 471 and 472:
Grafton Whyte and Donovan Lindsay M
- Page 473 and 474:
Grafton Whyte and Donovan Lindsay M
- Page 475 and 476:
Strategic Considerations for Effect
- Page 477 and 478:
Some examples of benefits of the us
- Page 479 and 480:
3.2 Industry use of information and
- Page 481 and 482:
allocate small budgets for the tria
- Page 483 and 484:
Hossein Zadeh et al. Dearstyne B W
- Page 485 and 486:
PhD Research Papers 471
- Page 487 and 488:
Evaluating the Performance of ERP S
- Page 489 and 490:
Mona Althonayan and Anastasia Papaz
- Page 491 and 492:
Information quality System quality
- Page 493 and 494:
Mona Althonayan and Anastasia Papaz
- Page 495 and 496:
Mona Althonayan and Anastasia Papaz
- Page 497 and 498:
The Benefits of ICT Adoption: An Em
- Page 499 and 500:
Idisemi Apulu and Ann Latham Semi s
- Page 501 and 502:
5.7 Customer satisfaction Idisemi A
- Page 503 and 504:
Idisemi Apulu and Ann Latham Easy a
- Page 505 and 506:
Idisemi Apulu and Ann Latham Parida
- Page 507 and 508:
2. Literature review Johnson Dehinb
- Page 509 and 510:
Cecchet et al (2003) Johnson Dehinb
- Page 511 and 512:
Johnson Dehinbo How to install “
- Page 513 and 514:
Johnson Dehinbo Facilities for ide
- Page 515 and 516:
Johnson Dehinbo Deitel, H.M., Deite
- Page 517 and 518:
Swathi Duppada and Rama Chandra Ary
- Page 519 and 520:
3.3 Offshore delivery model Swathi
- Page 521 and 522:
% of Revenue 70.00% 60.00% 50.00% 4
- Page 523 and 524:
Full Productivity 8 7 6 5 4 3 2 1 0
- Page 525 and 526:
The Diffusion of Mobile Phones for
- Page 527 and 528:
Wakari Gikenye countries provide ex
- Page 529 and 530:
Wakari Gikenye high percentage of o
- Page 531 and 532:
Wakari Gikenye traveling and increa
- Page 533 and 534:
Wakari Gikenye 20. Does your busine
- Page 535 and 536:
Querying DTI Analysis Results Withi
- Page 537 and 538:
Sarmad Istephan and Mohammad Siadat
- Page 539 and 540:
No No No Execute Query Get Next Pat
- Page 541 and 542:
Sarmad Istephan and Mohammad Siadat
- Page 543 and 544:
Towards an Evaluation Method for In
- Page 545 and 546:
Siti Asma Mohammed and Maryati Mohd
- Page 547 and 548:
3.1 Evaluation criteria 3.1.1 Human
- Page 549 and 550:
Siti Asma Mohammed and Maryati Mohd
- Page 551 and 552:
References Siti Asma Mohammed and M
- Page 553 and 554:
Developing a Change Management Mode
- Page 555 and 556:
Maryam Nakhoda and Sirous Alidousti
- Page 557 and 558:
Maryam Nakhoda and Sirous Alidousti
- Page 559 and 560:
Maryam Nakhoda and Sirous Alidousti
- Page 561 and 562:
Huan Vo-Tran LaRosa (1991) … A sy
- Page 563 and 564:
Huan Vo-Tran Identify Analyse Accou
- Page 565 and 566:
Huan Vo-Tran Figure 1: Henczel’s
- Page 567 and 568:
Huan Vo-Tran to the sixth stage (im
- Page 569 and 570:
Huan Vo-Tran Recording decisions.
- Page 571 and 572:
2. Business Intelligence Joseph Woo
- Page 573 and 574:
Joseph Woodside management. Resourc
- Page 575 and 576:
Table 2: Measurement model quality
- Page 577 and 578:
Work in Progress Papers 563
- Page 579 and 580:
The Evolution of IT Governance in M
- Page 581 and 582:
Ganeshprasad Chandrasekaran et al.
- Page 583 and 584:
Amir Honarpour and Ahmad Jusoh reli
- Page 585 and 586:
Amir Honarpour and Ahmad Jusoh Prop
- Page 587 and 588:
Hesbon Nyagowa et al. Traditionally
- Page 589 and 590:
Hesbon Nyagowa et al. The populatio
- Page 591:
4.2 Recommendation Hesbon Nyagowa e