default search action
European Journal of Information Systems, Volume 22
Volume 22, Number 1, January 2013
- David F. Birks, Walter Fernandez, Natalia Levina, Syed Nasirin:
Grounded theory method in information systems research: its nature, diversity and opportunities. 1-8
- Emmanuelle Vaast, Geoff Walsham:
Grounded theorizing for electronically mediated social contexts. 9-25 - Elisa Mattarelli, Fabiola Bertolotti, Diego Maria Macrì:
The use of ethnography and grounded theory in the development of a management information system. 26-44 - Joost F. Wolfswinkel, Elfi Furtmüller, Celeste Wilderom:
Using grounded theory as a method for rigorously reviewing literature. 45-55 - Chon Abraham, Marie-Claude Boudreau, Iris A. Junglas, Richard T. Watson:
Enriching our theoretical repertoire: the role of evolutionary psychology in technology acceptance. 56-75 - Riitta Hekkala, Cathy Urquhart:
Everyday power struggles: living in an IOIS project. 76-94 - Susan Gasson, Jim Waters:
Using a grounded theory approach to study online collaboration behaviors. 95-118 - Rangarirai Matavire, Irwin Brown:
Profiling grounded theory approaches in information systems research. 119-129
Volume 22, Number 2, March 2013
- Ken Peffers, Brian L. Dos Santos:
Research opportunities in information technology funding and system justification. 131-138
- Guido Schryen:
Revisiting IS business value research: what we already know, what we still need to know, and how we can get there. 139-169
- Greg Filbeck, Matthew Swinarski, Xin Zhao:
Shareholder reaction to firm investments in the capability maturity model: an event study. 170-190 - Lan Cao, Kannan Mohan, Balasubramaniam Ramesh, Sumantra Sarkar:
Adapting funding processes for agile IT projects: an empirical investigation. 191-205 - Sarah S. Khan, Moutaz J. Khouja, Ram L. Kumar:
Effects of time-inconsistent preferences on information technology infrastructure investments with growth options. 206-220 - Daqing Zheng, Jin Chen, Lihua Huang, Cheng Zhang:
E-government adoption in public administration organizations: integrating institutional theory perspective and resource-based view. 221-234 - Edward Bernroider:
Effective ERP adoption processes: the role of project activators and resource investments. 235-250
Volume 22, Number 3, May 2013
- Pär J. Ågerfalk:
Embracing diversity through mixed methods research. 251-256
- Véronique Guilloux, Joanne Locke, Alan Lowe:
Digital business reporting standards: mapping the battle in France. 257-277 - Amany R. Elbanna:
Top management support in multiple-project environments: an in-practice view. 278-294 - Tamara Dinev, Heng Xu, H. Jeff Smith, Paul J. Hart:
Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. 295-316 - Matthias Trier, Judith Molka-Danielsen:
Sympathy or strategy: social capital drivers for collaborative contributions to the IS community. 317-335 - Robert C. Nickerson, Upkar Varshney, Jan Muntermann:
A method for taxonomy development and its application in information systems. 336-359 - Jennifer E. Gerow, Ramakrishna Ayyagari, Jason Bennett Thatcher, Philip L. Roth:
Can we have fun @ work? The role of intrinsic motivation for utilitarian systems. 360-380
Volume 22, Number 4, July 2013
- Mark Lycett:
'Datafication': making sense of (big) data in a complex world. 381-386
- M. N. Ravishankar, Shan Ling Pan, Michael D. Myers:
Information technology offshoring in India: a postcolonial perspective. 387-402 - Joshua M. Davis:
Leveraging the IT competence of non-IS workers: social exchange and the good corporate citizen. 403-415 - Jianan Wu, Edgardo Arturo Ayala Gaytán:
The role of online seller reviews and product price on buyers' willingness-to-pay: a risk perspective. 416-433 - Marjolein van Offenbeek, Albert Boonstra, DongBack Seo:
Towards integrating acceptance and resistance research: evidence from a telecare case study. 434-454 - Bjarne Rerup Schlichter, Jeremy Rose:
Trust dynamics in a large system implementation: six theoretical propositions. 455-474 - Lars Mathiassen, Anna Sandberg:
How a professionally qualified doctoral student bridged the practice-research gap: a confessional account of Collaborative Practice Research. 475-492
Volume 22, Number 5, September 2013
- Gerald Grant, Felix B. Tan:
Governing IT in inter-organizational relationships: Issues and future research. 493-497
- Carla Wilkin, John Campbell, Stephen Moore:
Creating value through governing IT deployment in a public/private-sector inter-organisational context: a human agency perspective. 498-511 - JingHua Xiao, Kang Xie, Qing Hu:
Inter-firm IT governance in power-imbalanced buyer-supplier dyads: exploring how it works and why it lasts. 512-528 - Hyung Jin Kim, Bongsik Shin, Ho Geun Lee:
The mediating role of psychological contract breach in IS outsourcing: inter-firm governance perspective. 529-547 - Nelson E. King:
Exploring the impact of operating model choice on the governance of inter-organizational workflow: the U.S. e-prescribing network. 548-568 - Lorraine Morgan, Joseph Feller, Patrick Finnegan:
Exploring value networks: theorising the creation and capture of value with open source software. 569-588
Volume 22, Number 6, November 2013
- Dov Te'eni:
Journals and conferences in discourse. 589-591
- Nilesh Saraf, Christoph Schlueter Langdon, Omar El Sawy:
IS integration and knowledge sharing in multi-unit firms: the winner's curse. 592-603 - David Gefen, Erran Carmel:
Why the first provider takes it all: the consequences of a low trust culture on pricing and ratings in online sourcing markets. 604-618 - Shoshana Altschuller, Raquel Benbunan-Fich:
The pursuit of trust in ad hoc virtual teams: how much electronic portrayal is too much? 619-636 - Elmar Kutsch, David Denyer, Mark Hall, Elizabeth (Liz) Lee-Kelley:
Does risk matter? Disengagement from risk management practices in information systems projects. 637-649 - Mark Keil, Arun Rai, Shan Liu:
How user risk and requirements risk moderate the effects of formal and informal control on the process performance of IT projects. 650-672 - Jan Recker:
Empirical investigation of the usefulness of Gateway constructs in process models. 673-689 - Fredrik Karlsson:
Longitudinal use of method rationale in method configuration: an exploratory study. 690-710
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.