Relationships between need-pull/technology-push and information security management and the moderating role of regulatory pressure Sanghyun KimGeuna KimAaron M. French OriginalPaper 27 February 2015 Pages: 173 - 192
Applying social exchange theory in IT service relationships: exploring roles of exchange characteristics in knowledge sharing Jun-Gi ParkHyejung LeeJungwoo Lee OriginalPaper 21 March 2015 Pages: 193 - 206
IT impact on talent management and operational environmental sustainability Jose Benitez-AmadoF. Javier Llorens-MontesVirginia Fernandez-Perez OriginalPaper 23 April 2015 Pages: 207 - 220
Integrating attacker behavior in IT security analysis: a discrete-event simulation approach Andreas EkelhartElmar KieslingChristian Stummer OriginalPaper 11 June 2015 Pages: 221 - 233
Benchmarking software development productivity of CMMI level 5 projects Dinesh R. PaiGirish H. SubramanianParag C. Pendharkar OriginalPaper 17 June 2015 Pages: 235 - 251
A stakeholder analysis of barriers to enterprise system adoption: the case of a transition economy Piotr Soja OriginalPaper 12 July 2015 Pages: 253 - 271