default search action
Journal of Management Information Systems, Volume 34
Volume 34, Number 1, 2017
- Vladimir Zwass:
Editorial Introduction. 1-10 - Lu Lucy Yan, Yong Tan:
The Consensus Effect in Online Health-Care Communities. 11-39 - Jungwon Kuem, Soumya Ray, Mikko T. Siponen, Sung S. Kim:
What Leads to Prosocial Behaviors on Social Networking Services: A Tripartite Model. 40-70 - Zhao Pan, Yaobin Lu, Bin Wang, Patrick Y. K. Chau:
Who Do You Think You Are? Common and Differential Effects of Social Self-Identity on Social Media Usage. 71-101 - Xin Xu, James Y. L. Thong, Kar Yan Tam:
Winning Back Technology Disadopters: Testing a Technology Readoption Model in the Context of Mobile Internet Services. 102-140 - Lara Khansa, Jungwon Kuem, Mikko T. Siponen, Sung S. Kim:
To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls. 141-176 - Shengli Li, Hsing Kenneth Cheng, Yang Duan, Yu-Chen Yang:
A Study of Enterprise Software Licensing Models. 177-205 - Münir Tolga Akçura, Zafer D. Ozdemir:
A Strategic Analysis of Multi-Channel Expert Services. 206-231 - Young Bong Chang, Wooje Cho:
The Risk Implications of Mergers and Acquisitions with Information Technology Firms. 232-267 - Ayoung Suh, Christy M. K. Cheung, Manju Ahuja, Christian Wagner:
Gamification in the Workplace: The Central Role of the Aesthetic Experience. 268-305
Volume 34, Number 2, 2017
- Vladimir Zwass:
Editorial Introduction. 307-309
- Eric K. Clemons, Rajiv M. Dewan, Robert J. Kauffman, Thomas A. Weber:
Special Section: Technological Innovations for Communication and Collaboration in Social Spaces. 310-313 - Priyanga Gunarathne, Huaxia Rui, Abraham Seidmann:
Whose and What Social Media Complaints Have Happier Resolutions? Evidence from Twitter. 314-340 - Thomas A. Weber:
Smart Products for Sharing. 341-368 - Sabrina Karwatzki, Olga Dytynko, Manuel Trenz, Daniel Veit:
Beyond the Personalization-Privacy Paradox: Privacy Valuation, Transparency Features, and Service Personalization. 369-400 - Ruyi Ge, Juan Feng, Bin Gu, Pengzhu Zhang:
Predicting and Deterring Default with Social Media Information in Peer-to-Peer Lending. 401-424 - Eric K. Clemons, Rajiv M. Dewan, Robert J. Kauffman, Thomas A. Weber:
Understanding the Information-Based Transformation of Strategy and Society. 425-456
- Alain Pinsonneault, Shamel Addas, Christina J. Qian, Vijay Dakshinamoorthy, Robyn Tamblyn:
Integrated Health Information Technology and the Quality of Patient Care: A Natural Experiment. 457-486 - Shanshan Guo, Xitong Guo, Yulin Fang, Doug Vogel:
How Doctors Gain Social and Economic Returns in Online Health-Care Communities: A Professional Capital Perspective. 487-519 - Hillol Bala, Anne P. Massey, Mitzi M. Montoya:
The Effects of Process Orientations on Collaboration Technology Use and Outcomes in Product Development. 520-559 - Tabitha L. James, Paul Benjamin Lowry, Linda G. Wallace, Merrill Warkentin:
The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks. 560-596 - Matthew L. Jensen, Michael Dinger, Ryan T. Wright, Jason Bennett Thatcher:
Training to Mitigate Phishing Attacks Using Mindfulness Techniques. 597-626
Volume 34, Number 3, 2017
- Vladimir Zwass:
Editorial Introduction. 627-629
- David E. Avison, Ned Kock, Julien Malaurent:
Special Issue: Action Research in Information Systems. 630-632 - Corey Baham, Rudy Hirschheim, Andres Calderon, Victoria Kisekka:
An Agile Methodology for the Disaster Recovery of Information Systems Under Catastrophic Scenarios. 633-663 - Aaron Baird, Elizabeth J. Davidson, Lars Mathiassen:
Reflective Technology Assimilation: Facilitating Electronic Health Record Assimilation in Small Physician Practices. 664-694 - Rajendra Singh, Vitali Mindel, Lars Mathiassen:
IT-Enabled Revenue Cycle Transformation in Resource-Constrained Hospitals: A Collaborative Digital Options Inquiry. 695-726 - Shirley Ou Yang, Carol Hsu, Suprateek Sarker, Allen S. Lee:
Enabling Effective Operational Risk Management in a Financial Institution: An Action Research Study. 727-753 - Ned Kock, David E. Avison, Julien Malaurent:
Positivist Information Systems Action Research: Methodological Issues. 754-767
- Hyeokkoo Eric Kwon, Wonseok Oh, Taekyung Kim:
Platform Structures, Homing Preferences, and Homophilous Propensities in Online Social Networks. 768-802 - Carol Saunders, Martin Wiener, Sabrina Klett, Sebastian Sprenger:
The Impact of Mental Representations on ICT-Related Overload in the Use of Mobile Phones. 803-825 - David Jingjun Xu, Izak Benbasat, Ronald T. Cenfetelli:
A Two-Stage Model of Generating Product Advice: Proposing and Testing the Complementarity Principle. 826-862 - Paul Benjamin Lowry, Gregory D. Moody, Sutirtha Chatterjee:
Using IT Design to Prevent Cyberbullying. 863-901 - Brent Furneaux, Michael R. Wade:
Impediments to Information Systems Replacement: A Calculus of Discontinuance. 902-932
Volume 34, Number 4, 2017
- Vladimir Zwass:
Editorial Introduction. 933-934
- Justin Scott Giboney, Robert O. Briggs, Jay F. Nunamaker Jr.:
Special Issue: Creating Social Value with Information. 935-938 - Isabella Seeber, Gert-Jan de Vreede, Ronald Maier, Barbara Weber:
Beyond Brainstorming: Exploring Convergence in Teams. 939-969 - Steven J. Pentland, Nathan W. Twyman, Judee K. Burgoon, Jay F. Nunamaker Jr., Christopher B. R. Diller:
A Video-Based Screening System for Automated Risk Assessment Using Nuanced Facial Features. 970-993 - Jan-Hendrik Piel, Julian F. H. Hamann, André Koukal, Michael H. Breitner:
Promoting the System Integration of Renewable Energies: Toward a Decision Support System for Incentivizing Spatially Diversified Deployment. 994-1022 - Sagar Samtani, Ryan Chinn, Hsinchun Chen, Jay F. Nunamaker Jr.:
Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence. 1023-1053 - Donghui Shi, Jian Guan, Jozef M. Zurada, Andrew S. Manikas:
A Data-Mining Approach to Identification of Risk Factors in Safety Management Systems. 1054-1081 - Chad Anderson, Richard L. Baskerville, Mala Kaul:
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information. 1082-1112
- Chaitanya Sambhara, Arun Rai, Mark Keil, Vijay Kasi:
Risks and Controls in Internet-Enabled Reverse Auctions: Perspectives from Buyers and Suppliers. 1113-1142 - Andrew M. Hardin, Clayton A. Looney, Gregory D. Moody:
Assessing the Credibility of Decisional Guidance Delivered by Information Systems. 1143-1168 - Jianxiong Huang, Wai Fong Boh, Kim Huat Goh:
A Temporal Study of the Effects of Online Opinions: Information Sources Matter. 1169-1202 - Philip Menard, Gregory Bott, Robert E. Crossler:
User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory. 1203-1230
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.