The Ripple Effect Of An Information Security Breach Event: A Stakeholder Analysis | 1 | 0.35 | 2014 |
The Current State Of Business Intelligence In Academia | 14 | 1.69 | 2011 |
Journal Self-Citation I: Overview Of The Journal Self-Citation Papers - The Wisdom Of The Is Crowd | 6 | 0.44 | 2009 |
From Hindsight To Foresight: Applying Futures Research Techniques In Information Systems | 9 | 0.52 | 2008 |
Teradata University Network: A No Cost Web-Portal for Teaching Database, Data Warehousing, and Data-Related Subjects | 2 | 0.47 | 2008 |
MSIS 2006: model curriculum and guidelines for graduate degree programs in information systems | 41 | 2.69 | 2006 |
MSIS 2006 Curriculum Preview | 3 | 0.51 | 2005 |
Joint AIS-ACM MSIS 2006 Curriculum Draft Report. | 0 | 0.34 | 2005 |
Introduction to the Debate on the Core of the Information Systems Field | 12 | 0.61 | 2003 |
Editorial: CAIS, The First Five Years | 0 | 0.34 | 2003 |
What Every Business Student Needs to Know About Information Systems | 36 | 4.92 | 2002 |
Graduate IS Curriculum for the Millennium: Background, Process, and Recommendation | 0 | 0.34 | 1999 |
Graduate IS Curriculum for the 21st Century | 0 | 0.34 | 1999 |
Knowledge base clustering for KBS maintenance | 1 | 0.40 | 1998 |
Junk Computing: Is it Bad for an Organization? | 6 | 0.50 | 1996 |