Learn More
While many studies have assessed IS researcher-production, most have focused on either ranking IS journals or assessing prolific researchers using a restricted time frame and a small " basket " of journals (i.e., those journals selected for sampling). We found no research that has assessed the IS specificity of journals (i.e., the suitability of journals(More)
The IT project control literature has documented that clan control is often essential in complex multi-stakeholder projects for project success. However, instituting clan control in such conditions is challenging as people come to a project with diverse skills and backgrounds. There is often insufficient time for clan control to develop naturally. This(More)
Online auctions constitute one of the most successful Internet business models. However, auction fraud has become far and away the largest component of all Internet fraud, posing a threat to the model's future. Traditional government organizations such as the Federal Trade Commission and the Secret Service in the US, as well as new agencies such as Internet(More)
Most research on attribute identification in database integration has focused on integrating attributes using schema and summary information derived from the attribute values. No research has attempted to fully explore the use of attribute values to perform attribute identification. We propose an attribute identification method that employs schema and(More)
Most research on Internet auction fraud focuses exclusively on the relationship between the con-artist and victim. However, the con-artist and victim are situated in an ecology comprising the auction house, police, and auction community. This paper employs the 'parasite' metaphor as a way of building theory about Internet auction fraud. We begin by(More)