1 - 7 of 7 articles
Purpose – Organizations are becoming increasingly aware of the importance of aligning information systems with organizational processes, goals and strategies. One way of representing and analysing strategic alignment is through the creation of a causal‐loop diagram, a subject which this paper...
Purpose – This paper aims to present a discussion of the critical success factors (CSF) that affect the acquisition process for enterprise resource planning (ERP) software. Design/methodology/approach – The research strategy was a multiple‐case design with three organizations that had recently...
Purpose – This paper sets out to critique the applicability of e‐commerce staged models in explaining the progression of small and medium‐sized businesses (SMEs) in their use of internet technologies. The premise of this study is that examining the evolution of web sites over time gives us...
Purpose – Spyware is a controversial software technology that allows the surreptitious collection of personal information from computers linked to the internet. The purpose of this study was to determine the prevalence of spyware in internet shareware and freeware and to investigate the personal...
Purpose – To present an ongoing research effort based on previous industrial experience in the content management field. Design/methodology/approach – The project began with lessons learned while working in the IT industry. A model was then developed based on these lessons for managing content...
Purpose – This research aims to investigate the extent and pattern of information and communication technology (ICT) usage by women entrepreneurs in Malaysia, as well as the impact of personal traits on usage. Design/methodology/approach – All the members of the National Association of Women...
Purpose – Business process (BP) and information systems (IS) communities support the idea that BP and IS design should be integrated. Although there are a large number of modelling techniques to aid BP and IS design, there is little indication of which techniques can be suitable to model their...
Read and print from thousands of top scholarly journals.
Continue with Facebook
Sign up with Google
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.