default search action
Journal of Computer Information Systems, Volume 62
Volume 62, Number 1, January 2022
- Jason A. Williams, Henry G. Torres, Traci A. Carte:
A Review of IS Strategy Literature: Current Trends and Future Opportunities. 1-11 - Myungjae Kwak, Kyungwoo Kang, Yingfeng Wang:
Methods of Metabolite Identification Using MS/MS Data. 12-18 - Yuxiang Hong, Steven Furnell:
Motivating Information Security Policy Compliance: Insights from Perceived Organizational Formalization. 19-28 - Hannu Hannila, Risto Silvola, Janne Härkönen, Harri Haapasalo:
Data-driven Begins with DATA; Potential of Data Assets. 29-38 - Xiu-Ming Loh, Voon-Hsien Lee, Garry Wei-Han Tan, Jun-Jie Hew, Keng-Boon Ooi:
Towards a Cashless Society: The Imminent Role of Wearable Technology. 39-49 - Barbara Hewitt, Garry L. White:
Optimistic Bias and Exposure Affect Security Incidents on Home Computer. 50-60 - Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah:
BYOD Policy Compliance: Risks and Strategies in Organizations. 61-72 - Chung-Yean Chiang, Xiao Tang:
Use Public Wi-Fi? Fear Arouse and Avoidance Behavior. 73-81 - Moti Zwilling, Galit Klein, Dusan Lesjak, Lukasz Wiechetek, Fatih Çetin, Hamdullah Nejat Basim:
Cyber Security Awareness, Knowledge and Behavior: A Comparative Study. 82-97 - Chuleeporn Changchit, Robert Cutshall, Anh Pham:
Personality and Demographic Characteristics Influence on Consumers' Social Commerce Preference. 98-108 - Matthew J. Liberatore, William P. Wagner:
Gender, Performance, and Self-Efficacy: A Quasi-Experimental Field Study. 109-117 - Xiaolin Lin, Xun Xu, Xuequn Wang:
Users' Knowledge Sharing on Social Networking Sites. 118-127 - Nima Kordzadeh, Diana K. Young:
How Social Media Analytics Can Inform Content Strategies. 128-140 - Senem Sancar Gozukara, Bedir Tekinerdogan, Cagatay Catal:
Obstacles of On-Premise Enterprise Resource Planning Systems and Solution Directions. 141-152 - Gelareh Towhidi, Atish P. Sinha, Mark Srite, Huimin Zhao:
Trust Decision-Making in Online Social Communities: A Network-Based Model. 153-163 - Nghi Thuc Le, Sally Rao Hill, Indrit Troshani:
Perceived Control and Perceived Risk in Self-service Technology Recovery. 164-173 - Helen S. Du, Jiahong Xu, Heng Tang, Ruixin Jiang:
Repurchase Intention in Online Knowledge Service: The Brand Awareness Perspective. 174-185 - Tenace Kwaku Setor, Damien Joseph:
When Agile Means Staying: A Moderated Mediated Model. 186-195 - Hsun-Ming Lee, Peiqin Zhang, Mayur R. Mehta:
Effect of Competitors' eWOM in the Mobile Game Market. 196-204
Volume 62, Number 2, March 2022
- Fernando S. Oliveira:
A Causal Map Analysis of Supply Chain Decentralization. 205-215 - Michel Mitri:
Story Analysis Using Natural Language Processing and Interactive Dashboards. 216-226 - Chuleeporn Changchit, Tim Klaus, Ravi Lonkani:
Online Reviews: What Drives Consumers to Use Them. 227-236 - Jinyoung Han, Anat Hovav, Martin Hemmert:
Confucian Values, Social Fear, and Knowledge Sharing in Korean Organizations. 237-246 - Dapeng Liu, Heinz Roland Weistroffer:
Statistically Significant! But Is Trust of Practical Significance? 247-258 - Grzegorz Mazurek, Anna Górska, Pawel Korzynski, Susana Silva:
Social Networking Sites and Researcher's Success. 259-266 - Neethu Mathai, Tanya McGill, Danny Toohey:
Factors Influencing Consumer Adoption of Electronic Health Records. 267-277 - Elizabeth White Baker, Christopher Sibona:
Digital OER Impact on Learning Outcomes for Social Inclusion. 278-289 - Robert Cutshall, Chuleeporn Changchit, Anh Pham:
Factors Influencing Consumers' Participation in Social Commerce. 290-301 - Ewa Ziemba, Monika Eisenbardt, Roisin Mullins, Sandra Dettmer:
Consumer Engagement in Business Process Innovation-ICT Companies Cases from Poland and UK. 302-315 - Dominic Thomas, Yurong Yao:
Supporting Mobile Innovation in the Middle: Hospital IT Manager Attitudes. 316-325 - Bo Shang, Zheshi Bao:
How Repurchase Intention Is Affected in Social Commerce?: An Empirical Study. 326-336 - Yanfeng Zhang, Wu He, Lihui Peng:
How Perceived Pressure Affects Users' Social Media Fatigue Behavior: A Case on WeChat. 337-348 - Matthew Wimble, Young K. Ro, Cheong Kyu Park:
The Dynamics Information Technology and Systematic Risk. 349-358 - Bih-Ru Lea, Dinesh Mirchandani, Mary Sumner, Katherine Yu:
Personality Types in Learning Enterprise Resource Planning (ERP) Systems. 359-371 - Brent Furneaux, Sophia Mannina, Lars Rieser:
Responding to Information System Obsolescence: Should We Upgrade or Replace? 372-383 - Nusa Erman, Katarina Rojko, Dusan Lesjak:
Traditional and New ICT Spending and Its Impact on Economy. 384-396 - Dejarvis Oliver, Adriane B. Randolph:
Hacker Definitions in Information Systems Research. 397-409 - Vess L. Johnson, Richard W. Woolridge, Angelina I. T. Kiser, Katia Guerra:
The Impact of Coproduction Resentment on Continuation Intention. 410-421 - Mohamad Almgerbi, Andrea De Mauro, Adham Kahlawi, Valentina Poggioni:
A Systematic Review of Data Analytics Job Requirements and Online-Courses. 422-434
Volume 62, Number 3, May 2022
- Nik Thompson, Xuequn Wang, Richard L. Baskerville:
Improving IS Practical Significance through Effect Size Measures. 434-441 - Guangming Cao, Na Tian, Charles Blankson:
Big Data, Marketing Analytics, and Firm Marketing Capabilities. 442-451 - Anna Georgiadou, Spiros Mouzakitis, Kanaris Bounas, Dimitrios Askounis:
A Cyber-Security Culture Framework for Assessing Organization Readiness. 452-462 - Haoqiang Jiang, Catherine Chen:
Data Science Skills and Graduate Certificates: A Quantitative Text Analysis. 463-479 - Shah Jahan Miah, Edwin Camilleri, Huy Quan Vu:
Big Data in Healthcare Research: A survey study. 480-492 - Cheuk Hang (Allen) Au, Richard Wing Cheung Lui, Kris M. Y. Law:
Acquisition of IS Capabilities by Collaborating with Academics: A Case in A Non-Profit Organization in Hong Kong. 493-502 - Hoon Seok Choi, Shin-Yuan Hung, Cheng-Yung Peng, Charlie C. Chen:
Different Perspectives on BDA Usage by Management Levels. 503-515 - Bartlomiej Hanus, Yu Andy Wu, James Parrish:
Phish Me, Phish Me Not. 516-526 - Hui-Ting Tew, Garry Wei-Han Tan, Xiu-Ming Loh, Voon-Hsien Lee, Wei-Lee Lim, Keng-Boon Ooi:
Tapping the Next Purchase: Embracing the Wave of Mobile Payment. 527-535 - Peng Gao, Hao Han:
Robust Web Data Extraction Based on Weighted Path-layer Similarity. 536-546 - Shan Wang, William Yeoh, Jie Ren, Alvin Lee:
Learnings and Implications of Virtual Hackathon. 547-559 - Garry White:
Generation Z: Cyber-Attack Awareness Training Effectiveness. 560-571 - Au Vo, Thomas A. Chapman, Yen-Sheng Lee:
Examining Bitcoin and Economic Determinants: An Evolutionary Perspective. 572-586 - Insu Park, Vetrivadivel Vel, Jun Liu:
The Role of Enterprise Crowdsourcing Systems on Knowledge Application. 587-597 - Yi Sun, Rui Wang:
The Research Framework and Evolution of Service Robots. 598-608 - Caihong Liu, Hannah Ji, June Wei:
Smart Supply Chain Risk Assessment in Intelligent Manufacturing. 609-621 - Ho-Jun Kang, Sang-Gun Lee, Soo-Yong Park:
Information Efficiency in the Cryptocurrency Market: The Efficient-Market Hypothesis. 622-631 - Feng Xu, Carol Hsu, Xin (Robert) Luo, Merrill Warkentin:
Reactions to Abusive Supervision: Neutralization and IS Misuse. 632-641 - Catalin C. Dinulescu, Lucian L. Visinescu, Victor R. Prybutok, Marcos Sivitanides:
Customer Relationships, Privacy, and Security in Social Commerce. 642-654
Volume 62, Number 4, July 2022
- Sheshadri Chatterjee, Arpan Kumar Kar, Yogesh K. Dwivedi:
Intention to Use IoT by Aged Indian Consumers. 655-666 - Matthew J. Liberatore, William P. Wagner:
Simon's Decision Phases and User Performance: An Experimental Study. 667-679 - Anand Jeyaraj, Amir Hassan Zadeh:
Exploration and Exploitation in Organizational Cybersecurity. 680-693 - Jamie Y. T. Chang, Xiaosong (Jason) Wu, Richard Discenza, Gary Klein:
Creative Software Development with Team Boundary Management. 694-705 - Anna Georgiadou, Spiros Mouzakitis, Dimitris Askounis:
Detecting Insider Threat via a Cyber-Security Culture Framework. 706-716 - Dyin Mabe, Guilherme Esmael, Manoel Burg, Patricia Soares, Leila A. Halawi:
Optimization of Organizational Design. 717-729 - Mieczyslaw Pawlowski:
Machine Learning Based Product Classification for eCommerce. 730-739 - Jignya Patel, Robin S. Poston:
Using Social Intelligence to Overcome Agile Adoption Challenges. 740-751 - Siqi Hu, Carol Hsu, Zhongyun Zhou:
Security Education, Training, and Awareness Programs: Literature Review. 752-764 - Neha Srivastava, Abhishek Mishra, Yogesh K. Dwivedi:
Investigating Antecedents of Adoption Intention for Audiobook Applications. 765-777 - Son Bui, William J. Kettinger, Insu Park:
Identity Sharing and Adaptive Personalization Influencing Online Repurchases. 778-789 - Fatih Çetin, Joanna Paliszkiewicz, Murat Güler, Onur Köksal, Malgorzata Cieciora:
Exploring Relational Needs on Using Social Network Sites. 790-801 - William Yeoh, He Huang, Wang-Sheng Lee, Fadi Al Jafari, Rachel Mansson:
Simulated Phishing Attack and Embedded Training Campaign. 802-821 - Robert Cutshall, Chuleeporn Changchit, Chat Chuchuen:
An Examination of Factors Influencing Social Commerce Adoption. 822-836 - Natalie Gerhart, Obi Ogbanufe, Russell Torres, Anna Sidorova, Nicholas E. Evangelopoulos:
Effort Minimization Theory in the Data Analytics Era. 837-849 - Faten Jaber, Muneer Abbad:
Big Data and Firm Performance: An Outside-in Approach. 850-862 - Jeretta Horn Nord, Carol Springer Sargent, Alex Koohang, Angelica Marotta:
Predictors of Success in Information Security Policy Compliance. 863-873 - Correction. 874
Volume 62, Number 5, September 2022
- Junru Zhang, Yuan George Shan, Fei Peng:
Web-Crawling Architecture in Accounting and Finance Research. 875-887 - Matjaz Drev, Bostjan Delak:
Conceptual Model of Privacy by Design. 888-895 - J. David Patón-Romero, Maria Teresa Baldassarre, Ambrosio Toval, Moisés Rodríguez, Mario Piattini:
Auditing the Governance and Management of Green IT. 896-906 - Zhengzhong Shi, Hua Sun:
Sustained Participation in Open Source Software Project Communities. 907-920 - Tao Eric Hu, Zhenya Tang, Merrill Warkentin, Na Wen:
SLSS Gamification as an E-Commerce Model in China. 921-939 - William H. Money, Stephen H. Kaisler, Stephen J. Cohen:
Understanding Failed Software Projects through Forensic Analysis. 940-953 - Derek L. Nazareth, Jae Choi, Thomas L. Ngo-Ye:
The Security-as-a-Service Market for Small and Medium Enterprises. 954-964 - Marcin Soniewicki, Joanna Paliszkiewicz, Alex Koohang, Jeretta Horn Nord:
Critical Components Affecting Organizational Performance. 965-974 - Alex Sumner, Xiaohong Yuan, Mohd Anwar, Maranda E. McBride:
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings. 975-997 - Kyle Nash, Robin L. Wakefield:
The Role of Identity in Green IT Attitude and Intention. 998-1008 - Nurhafihz Noor, Sally Rao Hill, Indrit Troshani:
Artificial Intelligence Service Agents: Role of Parasocial Relationship. 1009-1023 - Yaojie Li, Johnny C. Ho, Rania Hodhod, Jennifer Pitts, John Finley:
Participative and Practical Goal-setting in Enterprise Systems Learning. 1024-1035 - Xu Xin, Jilan Wu, Lei Huang, Shanshan Shang, Pei Chen:
Effect of Multi-Channel Integration on Customer Purchase Intention. 1036-1047 - Hokey Min, Bih-Ru Lea:
Developing the Profiles of Business Analytics Adopters and Non-adopters Using Data Mining Tools. 1048-1060 - Brian Cusack, Adekemi Adedokun:
Cloud Disruption Impacts Business IT Role Requirements. 1061-1071 - Xiaodan Yu, Yuanyanhang Shen, Deepak Khazanchi:
Swift Trust and Sensemaking in Fast Response Virtual Teams. 1072-1087 - Pi-Jung Hsieh:
Determinants of Knowledge-Sharing Intentions for Shared Decision-Making Platforms. 1088-1099
Volume 62, Number 6, November 2022
- Edson Machado de Sousa, Abid Shahzad:
Data Loss Prevention from a Malicious Insider. 1101-1111 - Zhenya Tang, Andrew Miller, Zhongyun Zhou, Merrill Warkentin:
Understanding Rumor Combating Behavior on Social Media. 1112-1124 - Cheuk Hang (Allen) Au, Kevin K. W. Ho, Dickson K. W. Chiu:
Managing Users' Behaviors on Open Content Crowdsourcing Platform. 1125-1135 - Matthew J. Liberatore, William P. Wagner:
An Experiment Assessing the Sequential Difficulty Effect on IT Tasks. 1136-1144 - Carol Springer Sargent:
Replacing Financial Audits with Blockchain: The Verification Issue. 1145-1153 - Ewa Wanda Ziemba, Monika Eisenbardt:
The Effect of the Covid-19 Pandemic on ICT Usage by Academics. 1154-1168 - James Wairimu, Qinyu Liao, Lin Zhang:
Digital Investments in Organizational Learning and Entrepreneurial Agility. 1169-1181 - Marina Liu, William Yeoh, Frank Jiang, Kim-Kwang Raymond Choo:
Blockchain for Cybersecurity: Systematic Literature Review and Classification. 1182-1198 - Son Bui, Khuong Le-Nguyen, Quang Neo Bui, Tim Jacks, Prashant Palvia:
IT Workplace Preferences, Job Demands, and Work Exhaustion. 1199-1210 - Maciej Rys:
Management of Probability of Desired Invention during Hackathon. 1211-1222 - Sze-Mun Wan, Li-Na Cham, Garry Wei-Han Tan, Pei-San Lo, Keng-Boon Ooi, Rajat-Subhra Chatterjee:
What's Stopping You from Migrating to Mobile Tourism Shopping? 1223-1238 - Ritanjali Panigrahi, Praveen Ranjan Srivastava, Prabin Kumar Panigrahi, Yogesh K. Dwivedi:
Role of Internet Self-Efficacy and Interactions on Blended Learning Effectiveness. 1239-1252 - Ilker Kara:
Cyber-Espionage Malware Attacks Detection and Analysis: A Case Study. 1253-1270 - Raymond Angelo:
An Authentic Pedagogical Approach to Developing Information Systems Project-based Solutions. 1271-1282 - Seyed Pouyan Eslami, Khaled Hassanein:
Understanding Data Analytics Recommendation Execution: The Role of Recommendation Quality. 1283-1296 - Caihong Liu, Hannah Ji, June Wei:
Block Chain Influences on Manufacturing Collaborative Product Innovation. 1297-1309 - Angelica Marotta:
When AI Is Wrong: Addressing Liability Challenges in Women's Healthcare. 1310-1319
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.