Journal articles on the topic 'Inter-organisational Information System (IOS)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Inter-organisational Information System (IOS).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Teryokhin, Sergei, and Gøril Hannås. "Pre-requisites of successful strategic electronic coordination: the moderation effect of the ownership mechanism of inter-organisational information systems." Engineering Management in Production and Services 9, no. 4 (December 20, 2017): 34–47. http://dx.doi.org/10.1515/emj-2017-0029.
Full textBorman, Mark. "Developing, and testing, a theoretical framework for inter-organisational systems (IOS) as infrastructure to aid future IOS design." Information Systems and e-Business Management 4, no. 4 (May 17, 2006): 343–60. http://dx.doi.org/10.1007/s10257-006-0033-x.
Full textTeryokhin, Sergei, and Gøril Hannås. "Impact of supplier-specific investments in inter-organisational information systems on strategic electronic coordination: the moderation effect of buyer dependence." Engineering Management in Production and Services 10, no. 1 (March 1, 2018): 7–21. http://dx.doi.org/10.1515/emj-2018-0001.
Full textBahlmann, Jan, and Achim Spiller. "Inter-organizational information systems in meat chains: the linkage between supply chain organization and system requirements." Journal on Chain and Network Science 9, no. 1 (January 1, 2009): 59–69. http://dx.doi.org/10.3920/jcns2009.x159.
Full textFu, Hsin-Pin, Tien-Hsiang Chang, Cheng-Yuan Ku, Tsung-Sheng Chang, and Cheng-Hsin Huang. "The critical success factors affecting the adoption of inter-organization systems by SMEs." Journal of Business & Industrial Marketing 29, no. 5 (May 27, 2014): 400–416. http://dx.doi.org/10.1108/jbim-04-2012-0070.
Full textAl-Busaidi, Kamla Ali. "Inter-Organizational Knowledge Sharing System in the Health Sector." International Journal of Knowledge Management 11, no. 3 (July 2015): 37–54. http://dx.doi.org/10.4018/ijkm.2015070103.
Full textSholihah, Sita Aniisah, T. M. A. Ari Samadhi, Andi Cakravastia, and Senator Nur Bahagia. "Coordination model in Hinterland chain of hub-and-spoke global logistics." Journal of Industrial Engineering and Management 11, no. 4 (November 23, 2018): 776. http://dx.doi.org/10.3926/jiem.2538.
Full textApridianto, Angga, Kodrat Iman Satoto, and Ike Pertiwi Windasari. "Aplikasi Keliling Nusantara Edisi Sumatera Berbasis Android dan iOS." Jurnal Teknologi dan Sistem Komputer 3, no. 3 (August 20, 2015): 362. http://dx.doi.org/10.14710/jtsiskom.3.3.2015.362-369.
Full textKarlsson, Fredrik, Ella Kolkowska, and Frans Prenkert. "Inter-organisational information security: a systematic literature review." Information & Computer Security 24, no. 5 (November 14, 2016): 418–51. http://dx.doi.org/10.1108/ics-11-2016-091.
Full textHarold, Dolly A., and Thomas A. Horan. "Examining collaboration and information sharing in Inter-Organisational Information System (IOIS) implementation." Electronic Government, an International Journal 9, no. 4 (2012): 333. http://dx.doi.org/10.1504/eg.2012.049723.
Full textHannås, Gøril, and Otto Andersen. "B2B Relationships in Modern Times." International Journal of Information Systems and Supply Chain Management 4, no. 3 (July 2011): 18–37. http://dx.doi.org/10.4018/jisscm.2011070102.
Full textMin, Hokey. "An inter-organisational decision support system for global supply chain management." International Journal of Logistics Systems and Management 38, no. 4 (2021): 475. http://dx.doi.org/10.1504/ijlsm.2021.114760.
Full textDaniel, Elizabeth M., and Andrew White. "The future of inter-organisational system linkages: findings of an international Delphi study." European Journal of Information Systems 14, no. 2 (June 2005): 188–203. http://dx.doi.org/10.1057/palgrave.ejis.3000529.
Full textZaini, Muhamad Khairulnizam, Mohamad Noorman Masrek, and Mad Khir Johari Abdullah Sani. "The impact of information security management practices on organisational agility." Information & Computer Security 28, no. 5 (June 13, 2020): 681–700. http://dx.doi.org/10.1108/ics-02-2020-0020.
Full textAlthoff, Gereon, Alexander Ellebrecht, and Brigitte Petersen. "Chain quality information management: development of a reference model for quality information requirements in pork chains." Journal on Chain and Network Science 5, no. 1 (June 1, 2005): 27–38. http://dx.doi.org/10.3920/jcns2005.x052.
Full textKarlsson, Fredrik, Martin Karlsson, and Joachim Åström. "Measuring employees’ compliance – the importance of value pluralism." Information & Computer Security 25, no. 3 (July 10, 2017): 279–99. http://dx.doi.org/10.1108/ics-11-2016-0084.
Full textYuryna Connolly, Lena, Michael Lang, John Gathegi, and Doug J. Tygar. "Organisational culture, procedural countermeasures, and employee security behaviour." Information & Computer Security 25, no. 2 (June 12, 2017): 118–36. http://dx.doi.org/10.1108/ics-03-2017-0013.
Full textStorer, Christine, Geoffrey Soutar, Michelle Darrington, and M. Fay Rola-Rubzen. "Buyer/seller reflections on inter-organisational information systems: Implications for chain data collection methods." Journal on Chain and Network Science 2, no. 2 (December 1, 2002): 117–33. http://dx.doi.org/10.3920/jcns2002.x023.
Full textFord, Norma J. "The development and evaluation of an information technology support system to facilitate inter‐organisational collaboration in HRD." Journal of European Industrial Training 30, no. 7 (August 2006): 569–88. http://dx.doi.org/10.1108/03090590610704411.
Full textRasit, Zarinah Abdul, and Che Ruhana Isa. "Relative Comprehensiveness of Performance Measurement System: Organisational Ownership Structure and Size." International Journal of Financial Research 10, no. 3 (May 19, 2019): 380. http://dx.doi.org/10.5430/ijfr.v10n3p380.
Full textSoley, Ximena. "The Crucial Role of Human Rights NGOs in the Inter-American System." AJIL Unbound 113 (2019): 355–59. http://dx.doi.org/10.1017/aju.2019.68.
Full textMalatji, Masike, Sune Von Solms, and Annlizé Marnewick. "Socio-technical systems cybersecurity framework." Information & Computer Security 27, no. 2 (June 12, 2019): 233–72. http://dx.doi.org/10.1108/ics-03-2018-0031.
Full textMcCormac, Agata, Dragana Calic, Kathryn Parsons, Marcus Butavicius, Malcolm Pattinson, and Meredith Lillie. "The effect of resilience and job stress on information security awareness." Information & Computer Security 26, no. 3 (July 9, 2018): 277–89. http://dx.doi.org/10.1108/ics-03-2018-0032.
Full textM Aydin, Alperen. "Cognition to Collaboration: User-Centric Approach and Information Behaviour Theories/Models." Informing Science: The International Journal of an Emerging Transdiscipline 20 (2017): 001–20. http://dx.doi.org/10.28945/3615.
Full textGiannakis, Mihalis, and Michalis Louis. "A multi-agent based system with big data processing for enhanced supply chain agility." Journal of Enterprise Information Management 29, no. 5 (September 12, 2016): 706–27. http://dx.doi.org/10.1108/jeim-06-2015-0050.
Full textIchino, Haruhiko, Kazuhiko Terada, Kenji Kawai, Osamu Ishida, Keishi Kishine, Noboru Iwasaki, Tetsuhiro Fukao, Shinji Shibao, Kazuo Kubo, and Harufusa Kondoh. "ENHANCED NETWORK SIGNALING FOR 10 GIGABIT ETHERNET TO ACHIEVE A LAN-WAN SEAMLESS INTERFACE AND ITS IMPLEMENTATION IN THE PHY-LSI/TRANSCEIVER MODULE." International Journal of High Speed Electronics and Systems 15, no. 03 (September 2005): 667–704. http://dx.doi.org/10.1142/s0129156405003387.
Full textBello, Abubakar Garba, David Murray, and Jocelyn Armarego. "A systematic approach to investigating how information security and privacy can be achieved in BYOD environments." Information & Computer Security 25, no. 4 (October 9, 2017): 475–92. http://dx.doi.org/10.1108/ics-03-2016-0025.
Full textP N, Sindhuja, and Anand S. Kunnathur. "Information security in supply chains: a management control perspective." Information & Computer Security 23, no. 5 (November 9, 2015): 476–96. http://dx.doi.org/10.1108/ics-07-2014-0050.
Full textMiao, Xin, David Banister, Yanhong Tang, Min Li, and Bao Xi. "MAINTAINING THE TRANSPORT SYSTEM UNDER EXTREME WEATHER EVENTS: A DUAL-NETWORK PERSPECTIVE." Technological and Economic Development of Economy 19, Supplement_1 (January 28, 2014): S342—S359. http://dx.doi.org/10.3846/20294913.2013.879748.
Full textVidakovic, Milan, Branko Milosavljevic, Zora Konjovic, and Goran Sladic. "Extensible java EE-based agent framework and its application on distributed library catalogues." Computer Science and Information Systems 6, no. 2 (2009): 1–28. http://dx.doi.org/10.2298/csis0902001v.
Full textBergström, Erik, Martin Lundgren, and Åsa Ericson. "Revisiting information security risk management challenges: a practice perspective." Information & Computer Security 27, no. 3 (July 8, 2019): 358–72. http://dx.doi.org/10.1108/ics-09-2018-0106.
Full textSchinagl, Stef, and Abbas Shahim. "What do we know about information security governance?" Information & Computer Security 28, no. 2 (January 25, 2020): 261–92. http://dx.doi.org/10.1108/ics-02-2019-0033.
Full textSmedley, Jo. "Information innovation: it’s all about people." Information and Learning Science 118, no. 11/12 (November 13, 2017): 669–71. http://dx.doi.org/10.1108/ils-08-2017-0087.
Full textShahpasand, Maryam, Mehdi Shajari, Seyed Alireza Hashemi Golpaygani, and Hoda Ghavamipoor. "A comprehensive security control selection model for inter-dependent organizational assets structure." Information & Computer Security 23, no. 2 (June 8, 2015): 218–42. http://dx.doi.org/10.1108/ics-12-2013-0090.
Full textKhedr, Walid I., Mahmoud I. Abdalla, and Asmaa A. Elsheikh. "Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network." IET Information Security 9, no. 6 (November 1, 2015): 334–43. http://dx.doi.org/10.1049/iet-ifs.2013.0170.
Full textOksanych, I. M., V. F. Grechaninov, and A. V. Lopushansky. "Information interaction in disparate information systems of situational centers." Mathematical machines and systems 3 (2020): 60–68. http://dx.doi.org/10.34121/1028-9763-2020-3-60-68.
Full textRajamanickam, Vennila, and Duraisamy Veerappan. "Inter cluster communication and rekeying technique for multicast security in mobile ad hoc networks." IET Information Security 8, no. 4 (July 1, 2014): 234–39. http://dx.doi.org/10.1049/iet-ifs.2013.0217.
Full textHinder, Susan, Kathrin Cresswell, Aziz Sheikh, Bryony Dean Franklin, Marta Krasuska, Hung The Nguyen, Wendy Lane, et al. "Promoting inter-organisational knowledge sharing: A qualitative evaluation of England’s Global Digital Exemplar and Fast Follower Programme." PLOS ONE 16, no. 8 (August 2, 2021): e0255220. http://dx.doi.org/10.1371/journal.pone.0255220.
Full textBorsellino, Valeria, Francesca Varia, Cinzia Zinnanti, and Emanuele Schimmenti. "The Sicilian cooperative system of wine production." International Journal of Wine Business Research 32, no. 3 (March 31, 2020): 391–421. http://dx.doi.org/10.1108/ijwbr-10-2018-0062.
Full textBerndtsson, Joakim, Peter Johansson, and Martin Karlsson. "Value conflicts and non-compliance." Information & Computer Security 26, no. 2 (June 11, 2018): 246–58. http://dx.doi.org/10.1108/ics-08-2017-0057.
Full textJunejo, Naveed Ur Rehman, Hamada Esmaiel, Haixin Sun, Zeyad A. H. Qasem, and Junfeng Wang. "Pilot-Based Adaptive Channel Estimation for Underwater Spatial Modulation Technologies." Symmetry 11, no. 5 (May 24, 2019): 711. http://dx.doi.org/10.3390/sym11050711.
Full textDe La Torre Cruz, Juan, Francisco Jesús Cañadas Quesada, Nicolás Ruiz Reyes, Pedro Vera Candeas, and Julio José Carabias Orti. "Wheezing Sound Separation Based on Informed Inter-Segment Non-Negative Matrix Partial Co-Factorization." Sensors 20, no. 9 (May 8, 2020): 2679. http://dx.doi.org/10.3390/s20092679.
Full textDa Veiga, Adéle. "An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture." Information & Computer Security 26, no. 5 (November 12, 2018): 584–612. http://dx.doi.org/10.1108/ics-08-2017-0056.
Full textLi, Zhen-Song, Bing-Jie Li, and Min Miao. "A Parallel Transmission Scheme Based on the Turbo Product Code for Through Silicon via Array in Three-Dimensional Integrated Circuits." Journal of Nanoelectronics and Optoelectronics 16, no. 3 (March 1, 2021): 494–500. http://dx.doi.org/10.1166/jno.2021.2944.
Full textZhai, Jingjing, Xiaobei Wu, Zihao Li, Shaojie Zhu, Bo Yang, and Haoming Liu. "Day-Ahead and Intra-Day Collaborative Optimized Operation among Multiple Energy Stations." Energies 14, no. 4 (February 10, 2021): 936. http://dx.doi.org/10.3390/en14040936.
Full textCope, Jacqueline, Francois Siewe, Feng Chen, Leandros Maglaras, and Helge Janicke. "On data leakage from non-production systems." Information & Computer Security 25, no. 4 (October 9, 2017): 454–74. http://dx.doi.org/10.1108/ics-02-2017-0004.
Full textAhmad, Zauwiyah, Thian Song Ong, Tze Hui Liew, and Mariati Norhashim. "Security monitoring and information security assurance behaviour among employees." Information & Computer Security 27, no. 2 (June 12, 2019): 165–88. http://dx.doi.org/10.1108/ics-10-2017-0073.
Full textHöhler, J., and R. Kühl. "Organisation of German livestock production from the bottom up: a new institutional economic analysis of dairy cattle breeding." Journal on Chain and Network Science 16, no. 1 (September 14, 2016): 7–18. http://dx.doi.org/10.3920/jcns2014.0005.
Full textNajjar, Mohammad, Michael H. Small, and Mahmoud M. Yasin. "Social Sustainability Strategy across the Supply Chain: A Conceptual Approach from the Organisational Perspective." Sustainability 12, no. 24 (December 14, 2020): 10438. http://dx.doi.org/10.3390/su122410438.
Full textAkinsanya, Opeoluwa Ore, Maria Papadaki, and Lingfen Sun. "Towards a maturity model for health-care cloud security (M2HCS)." Information & Computer Security 28, no. 3 (December 16, 2019): 321–45. http://dx.doi.org/10.1108/ics-05-2019-0060.
Full text