Beyond utilitarian factors: User experience and travel company website successes M Wani, V Raghavan, D Abraham, V Kleist Information Systems Frontiers 19 (4), 769-785, 2017 | 72 | 2017 |
An approach to evaluating e-business information systems projects VF Kleist Information Systems Frontiers 5, 249-263, 2003 | 69 | 2003 |
Curriculum and course design: A new approach using quality function deployment JW Denton, V Franke, KN Surendra Journal of Education for Business 81 (2), 111-117, 2005 | 60 | 2005 |
A transaction cost model of electronic trust: Transactional return, incentives for network security and optimal risk in the digital economy VF Kleist Electronic Commerce Research 4, 41-57, 2004 | 43 | 2004 |
A performance evaluation framework for a public university knowledge management system VF Kleist, L Williams, AG Peace Journal of Computer Information Systems 44 (3), 9-16, 2004 | 32 | 2004 |
Building technologically based online trust: Can the biometrics industry deliver the online trust silver bullet? VF Kleist Information Systems Management 24 (4), 319-329, 2007 | 25 | 2007 |
Secure information market: A model to support information sharing, data fusion, privacy, and decisions BW Morris, VF Kleist, RB Dull, CD Tanner Journal of Information Systems 28 (1), 269-285, 2014 | 21 | 2014 |
The biometric technologies business case: a systematic approach RA Riley Jr, V Franke Kleist Information management & computer security 13 (2), 89-105, 2005 | 20 | 2005 |
Women in STEM Careers: What is Working Well: Women in STEM Careers: International Perspectives on Increasing Workforce Participation, Advancement and Leadership. Edited by … VF Kleist Sex Roles 73 (5), 276-278, 2015 | 11 | 2015 |
Social Networking Ties and Low Interest, Underrepresentation and Low Status for Women in Information Technology Field: Gender Stratification in the IT Industry: Sex, Status and … VF Kleist Sex Roles 66 (3), 253-255, 2012 | 11 | 2012 |
Evaluating biometrics as internal control solutions to organizational risk VF Kleist, RA Riley, TA Pearson Journal of American Academy of Business 6 (2), 339-343, 2005 | 11 | 2005 |
The Russian and Ukrainian information technology outsourcing market: Potential, barriers and management considerations VF Kleist, AB Woszcynski, H Zafar, P Dembla Journal of Global Information Technology Management 18 (1), 6-28, 2015 | 9 | 2015 |
Stolen Focus: Why You Can’t Pay Attention: by Hari, Johann, London, Bloomsbury Publishing, 2022, 340 pp.,£ 20.00 (hardcover), ISBN 978-1-5266-2022-4 VF Kleist Journal of Global Information Technology Management 25 (3), 254-256, 2022 | 2 | 2022 |
The elusive technology ROI VF Kleist IT Professional 14 (5), 56-59, 2012 | 2 | 2012 |
The code book: the science of secrecy from ancient egypt to quantum cryptography [Book Review] VF Kleist IEEE Annals of the History of Computing 24 (2), 97-98, 2002 | 2 | 2002 |
Information technology and information goods as predictors of organizational expansion activity VF Kleist, I Frieze, W King Information Technology 12, 31-2000, 2000 | 2 | 2000 |
Global multinational organizations: unintended threats from nation-state cyberwarfare VF Kleist Journal of Global Information Technology Management 24 (4), 229-234, 2021 | 1 | 2021 |
An interview with maria vello: Chief executive officer of the cyber defence alliance (CDA) VF Kleist Journal of Global Information Technology Management 21 (4), 301-305, 2018 | 1 | 2018 |
Information technology and information goods intensity as predictors of organizational expansion activity VF Kleist University of Pittsburgh, 2000 | 1 | 2000 |
Information technology and information goods producing firms: Vertical and horizontal boundary change V Franke Kleist, I Frieze, W King | 1 | 1999 |