Nome |
# |
Digital Platforms as Sources for Organizational and Strategic Transformation: A Case Study of the Midblue Project, file e163de41-3af4-19c7-e053-6605fe0a8397
|
524
|
A Design Theory for Digital Platforms Supporting Online Communities: A Multiple Case Study, file e163de41-3b95-19c7-e053-6605fe0a8397
|
340
|
A Design Theory for IT supporting Online Communities, file e163de41-39e6-19c7-e053-6605fe0a8397
|
304
|
Supporting policy definition in the e-health domain: a QCA based method, file e163de41-39e2-19c7-e053-6605fe0a8397
|
273
|
Information Technology and Innovation Trends in Organizations, file e163de41-38b6-19c7-e053-6605fe0a8397
|
238
|
Piattaforme organizzanti, aperte ma non troppo, file e163de41-e6cf-19c7-e053-6605fe0a8397
|
235
|
Decision making in supply chains and value networks: the beer game evolution., file e163de41-3af3-19c7-e053-6605fe0a8397
|
226
|
Defining cooperative business models for inter-organizational cooperation, file e163de41-3a26-19c7-e053-6605fe0a8397
|
212
|
To Cloud or not to Cloud. Strategic choices and IT governance in the digital transformation of a University, file e163de42-624a-19c7-e053-6605fe0a8397
|
183
|
SECURING VIRTUAL ENTERPRISES: REQUIREMENTS AND ARCHITECTURAL CHOICES, file e163de41-3af2-19c7-e053-6605fe0a8397
|
169
|
Designing Organizational Systems, file e163de41-3abf-19c7-e053-6605fe0a8397
|
157
|
An Empirical Study of Offshore Software Development: the Case of a Ticketing Application, file e163de41-ee9c-19c7-e053-6605fe0a8397
|
142
|
Relazioni collaterali: il governo dei social media nelle organizzazioni, file e163de41-edf5-19c7-e053-6605fe0a8397
|
116
|
La potenza delle tecnologie nelle mani fragili dell’organizzazione: gli strumenti ICT abilitati dalle competenze di disegno organizzativo, file e163de41-386b-19c7-e053-6605fe0a8397
|
113
|
Design Science in Information Systems Research: foundational and evolutionary aspects, file e163de41-36d5-19c7-e053-6605fe0a8397
|
89
|
A Design Theory for Digital Platforms Supporting Online Communities: A Multiple Case Study, file e163de42-ae36-19c7-e053-6605fe0a8397
|
84
|
Fostering informal learning in the workplace through digital platforms and information infrastructures, file e163de41-3af9-19c7-e053-6605fe0a8397
|
55
|
Scudi digitali. Quali sono le nuove strategie per la cybersecurity (e perché la pubblica amministrazione deve adottarle al più presto), file e163de42-d07d-19c7-e053-6605fe0a8397
|
54
|
A path for infrastructural ambidexterity: balancing reliability and flexibility in digital ecosystems, file e163de41-c6f0-19c7-e053-6605fe0a8397
|
52
|
The role of social support network in e-health services for elderly persons, file e163de41-36d4-19c7-e053-6605fe0a8397
|
47
|
The persistence of Online Black-Markets: an investigation on the generativity of digital infrastructures operating under adverse conditions, file e163de42-d2e8-19c7-e053-6605fe0a8397
|
47
|
Absorptive Capacity In Service Innovation: the Role of IT Capabilities, file e163de41-e759-19c7-e053-6605fe0a8397
|
38
|
La nuova sfida del cloud per la Pubblica Amministrazione, file e163de42-cde4-19c7-e053-6605fe0a8397
|
27
|
Nella pubblica amministrazione è a rischio la privacy degli utenti. La perdita di controllo sui dati è un pericolo reale, file e163de42-d07c-19c7-e053-6605fe0a8397
|
19
|
Agile Practices and Organizational Agility in Software Ecosystems, file e163de42-de00-19c7-e053-6605fe0a8397
|
15
|
Online Black-Markets: An Investigation of a Digital Infrastructure in the Dark, file 41d68e00-ff42-4c4e-8ed6-2ae4e12483b4
|
11
|
Relazione sulla Qualità della Formazione progetto In.Te.S.A., file e163de41-9dbc-19c7-e053-6605fe0a8397
|
11
|
Beyond Scattered Applications: A Taxonomy of Blockchain Outcomes in the Public Domain, file 0a9edc63-3819-4350-9940-87f216f80c53
|
9
|
Big Data Process in the Age of Digitalization, file e163de41-f76f-19c7-e053-6605fe0a8397
|
6
|
IT Investment Decisions in Industry 4.0: Evidences from SMEs, file e163de42-8da4-19c7-e053-6605fe0a8397
|
6
|
Exploring IT investment decisions of SME in the Fourth Industrial Revolution, file e163de42-3409-19c7-e053-6605fe0a8397
|
5
|
In search of mechanisms for organizing digitalization, file e163de41-c755-19c7-e053-6605fe0a8397
|
4
|
An Ecological Model for Digital Platforms Maintenance and Evolution, file e163de41-e919-19c7-e053-6605fe0a8397
|
4
|
Fundraising across digital divide: evidences from charity crowdfunding, file e163de41-feee-19c7-e053-6605fe0a8397
|
4
|
Cloud Sourcing and Paradigm Shift in IT Governance: Evidence from the Financial Sector, file e163de42-8d3c-19c7-e053-6605fe0a8397
|
4
|
Digital Enabled Mission Command and Control Systems in Military Operations, file e9e97412-5124-4184-b7b0-34805c44948e
|
4
|
Organizing Cybersecurity in Action: A Pragmatic Ethical Reasoning Approach, file 7b23244d-6ee8-4eff-9ef3-6ff48014ed23
|
3
|
Exploring Innovation in a Digital World: An Introduction, file ccb26a4d-18b2-4b86-a502-ea3e3e520678
|
3
|
Reframing health care through social media, file e163de41-c74b-19c7-e053-6605fe0a8397
|
3
|
Exploring Foundations for Using Simulations in IS Research, file e163de42-2683-19c7-e053-6605fe0a8397
|
3
|
Cyber-resilience of Critical Cyber Infrastructures: integrating digital twins in the electric power ecosystem, file e163de42-e08b-19c7-e053-6605fe0a8397
|
3
|
Digital Resilience to Normal Accidents in High-Reliability Organizations, file e163de42-e26c-19c7-e053-6605fe0a8397
|
3
|
Exploring Innovation in a Digital World: Cultural and Organizational Challenges, file 468da6a9-f7bd-4708-8400-a293a296fc92
|
2
|
Tra indicatori di convivenza e sistema informativo: un possibile ruolo dei processi di auditing nella “misura” del cambiamento organizzativo, file e163de41-3851-19c7-e053-6605fe0a8397
|
2
|
GSM and GPRS performance of IPSEC data communication, file e163de41-3853-19c7-e053-6605fe0a8397
|
2
|
Organisational learning as an emerging process: the generative role of digital tools in informal learning practices, file e163de41-3b1f-19c7-e053-6605fe0a8397
|
2
|
Design for social media engagement: Insights from elderly care assistance, file e163de41-4b74-19c7-e053-6605fe0a8397
|
2
|
Securing national e-ID infrastructures: Tor networks as a source of threats, file e163de41-feec-19c7-e053-6605fe0a8397
|
2
|
Securing national e-ID infrastructures: Tor networks as a source of threats, file e163de42-b674-19c7-e053-6605fe0a8397
|
2
|
An Orchestration Framework for Digital Innovation: Lessons from the Healthcare Industry, file 81802f9d-b670-4d33-96f0-126a23cae74f
|
1
|
Data control coordination in cloud-based ecosystems: the GAIA-X ecosystem, file 8faa38d2-23fe-4e76-a47c-d6569c1c3008
|
1
|
Successful UCD practices under IT project constraints, file e163de41-36f8-19c7-e053-6605fe0a8397
|
1
|
The duality of Information Security Management: fighting against predictable and unpredictable threats, file e163de41-384d-19c7-e053-6605fe0a8397
|
1
|
Improving the information security model by using TFI, file e163de41-3852-19c7-e053-6605fe0a8397
|
1
|
Exploring FLOSS implementation in the Public Sector: an empirically grounded framework, file e163de41-386c-19c7-e053-6605fe0a8397
|
1
|
Il positivismo organizzativo come terreno di coltura della trasposizione dei fini, file e163de41-38ae-19c7-e053-6605fe0a8397
|
1
|
A Business aware Information Security Risk Analysis Method, file e163de41-38b7-19c7-e053-6605fe0a8397
|
1
|
A Design Theory for e-Service environments: the interoperability challenge, file e163de41-3926-19c7-e053-6605fe0a8397
|
1
|
Simon, la sua scuola, le decisioni, file e163de41-3927-19c7-e053-6605fe0a8397
|
1
|
Modeling dependence networks for agent based simulation of online and offline communities, file e163de41-3a9a-19c7-e053-6605fe0a8397
|
1
|
Knowledge Creation Processes in Information Systems and Management: Lessons from Simulation Studies, file e163de41-3a9b-19c7-e053-6605fe0a8397
|
1
|
Can Design Science Research Bridge Computer Human Interaction and Information Systems?, file e163de41-3a9c-19c7-e053-6605fe0a8397
|
1
|
Introduction, file e163de41-3a9d-19c7-e053-6605fe0a8397
|
1
|
Applying Media Synchronicity Theory to distance learning in Virtual Worlds: a Design Science approach., file e163de41-3abc-19c7-e053-6605fe0a8397
|
1
|
User Centered Systems Design: the Bridging Role of Justificatory Knowledge, file e163de41-3abd-19c7-e053-6605fe0a8397
|
1
|
The Contributions of Alessandro D’Atri to Organization and Information Systems Studies, file e163de41-3abe-19c7-e053-6605fe0a8397
|
1
|
Managing information security through policy definition: organizational implications, file e163de41-3acd-19c7-e053-6605fe0a8397
|
1
|
Incident-Centered Information Security: Managing a Strategic Balance between Prevention and Response, file e163de41-3af0-19c7-e053-6605fe0a8397
|
1
|
Living IT Infrastructures - An Ontology based Approach to Align IT Infrastructure Capacity and Business Needs, file e163de41-3af1-19c7-e053-6605fe0a8397
|
1
|
Exploring Foundations for Using Simulations in IS Research, file e163de41-3afa-19c7-e053-6605fe0a8397
|
1
|
Business Development Through Digital Transformation: The Evolution of Amazon.Com, file e163de41-3b20-19c7-e053-6605fe0a8397
|
1
|
Totale |
3.881 |