Journal of Information Systems Applied Research
| 3(1) | Impact of Transition Costs on Offshore Systems Development | DeHondt and Leidig |
| 3(2) | Benefits of Knowledge Discovery Process for Biomedical Population Study | McClelland |
| 3(3) | Empirical Study of Text Messaging Behavioral Intention and Usage, An. | Peslak, Ceccucci, and Sendall |
| 3(4) | Spyware: What Influences College Students to Use Anti-Spyware Tools? | Ward and Hunsinger |
| 3(5) | Towards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative. | Mhlanga, Vardiman, and Reames |
| 3(6) | Superfund Site Analysis Using Web 2.0 Technologies | Anderson, Jafar, and Rogers |
| 3(7) | Teaching Knowledge Management (KM) in Criminal Justice Education: The Influence of Information Systems | Conn and Thies |
| 3(8) | Creating the Pilot AJAX Enabled Query Tool | Ford and Dollinger |
| 3(9) | Incorporation of Information Technology into Assisted Health Care: An Empirical Study | Delmonico and White |
| 3(10) | Network Growing Pains | Yaylacicegi, Mahar, and Moussawi |
| 3(11) | Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity | Omar, Udeh, and Mantha |
| 3(12) | Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet, A. | Lawler and Molluzzo |
| 3(13) | Women's Technology Acceptance of Mentoring on the Internet | Gibson and Gibson |
| 3(14) | Factors that Persuade and Deter Membership in Professional Computing Associations | Umapathy, Jamba, and Ritzhaupt |
| 3(15) | Can Management Predict Information Security Threats by Utilizing a Data Warehouse? | Kim and Steen |
| 3(16) | Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls, The. | Kim and Nelson |
| 3(17) | Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Technology Firm, An. | Totterdale |
| 3(18) | Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory, An. | Peslak, Ceccucci, and Sendall (15 Jun 2010). |
| 3(19) | System Development Methodology Usage in Industry: A Review and Analysis | Griffin and Brandyberry |
| 3(20) | On Design Science, MCDM, and Outsourcing Decision Making | Petkov and Petkov |