default search action
Adi Prananto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j2]Amelia Cahyadi, Adi Prananto:
Reflecting design thinking: a case study of the process of designing dashboards. J. Syst. Inf. Technol. 17(3): 286-306 (2015) - 2012
- [c14]Budiyanto Cucuk Wawan, Adi Prananto, Felix Ter Chian Tan:
Advancing Enterprise-Wide Information Systems Strategy: Exploring Power Differentials In Parent - Subsidiary Relationships. PACIS 2012: 70
2000 – 2009
- 2009
- [c13]Adi Prananto, Emmanuel Arnody Setyawan, Joze Kuzic:
A tale of a web services initiative: What really matters in benefits realization. ITI 2009: 137-144 - 2008
- [c12]Nargiza Bekmamedova, Adi Prananto, Judy McKay, Artem Vorobiev:
Towards Better Understanding of the Relationship between Formal Controls and Trust in IS Outsourcing. ACIS 2008 - [c11]Nargiza Bekmamedova, Adi Prananto, Judy McKay, Artem Vorobiev:
Towards a Conceptualisation of Trust in IS Outsourcing. ICIS 2008: 152 - 2007
- [c10]Adi Prananto, Sue McKemmish:
Critical Success Factors for the Establishment of e-Government: A Critical Analysis of the Indonesian Cabinet Secretariat's Legal Document Retrieval System (LDRS) Project. PACIS 2007: 115 - 2005
- [j1]Peter Marshall, Judy McKay, Adi Prananto:
Business Value Creation from IT Investments: towards a process theory of IT governance. Australas. J. Inf. Syst. 12(2) (2005) - 2004
- [c9]Joze Kuzic, Adi Prananto:
Web Site's Findability and Company's Image. ACIS 2004 - [c8]Peter Marshall, Judy McKay, Adi Prananto:
A Process Model of Business Value Creation from IT investments. ACIS 2004 - [c7]Adi Prananto, Judy McKay, Peter Marshall:
Lessons learned from analysing e-business progression using a stage model in Australian Small Medium Enterprises (SMEs). ACIS 2004 - [c6]Adi Prananto, Judy McKay, Peter Marshall:
Exploring the perceptions of inhibitors and drivers of e-business progression among SMEs at different stages of e-business maturity. ECIS 2004: 1510-1521 - 2003
- [c5]Adi Prananto, Judy McKay, Peter Marshall:
Perceived and Realisation of Business Value as a Facilitator of E-Business Progression in Australian SMEs. ACIS 2003 - [c4]Adi Prananto, Judy McKay, Peter Marshall:
Spectrum of e-business maturity in australian SMEs: a multiple case studies approach on the applicability of the stages of growth for e-business model. ECIS 2003: 1603-1613 - [c3]Adi Prananto, Judith McKay, Peter Marshall:
A Study of the Progression of E-Business Maturity in Australian SMEs: Some Evidence of the Applicability of the Stages of Growth for E-Business Model. PACIS 2003: 5 - 2001
- [c2]Adi Prananto, Judy McKay, Peter Marshall:
Frameworks to Support E-Business Growth Strategy. ECIS 2001: 1254-1263 - 2000
- [c1]Judith McKay, Peter Marshall, Adi Prananto:
Stages of Maturity for E-Business: The SOG-e Model. PACIS 2000: 3
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-23 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint