default search action
Journal of the Association for Information Systems, Volume 20
Volume 20, Number 1, 2019
- Eun Hee Park, Ghiyoung Im, Veda C. Storey, Richard L. Baskerville:
Never, Never Together Again: How Postpurchase Affect Drives Consumer Outcomes Within the Context of Online Consumer Support Communities. 1 - Rohit Valecha, H. Raghav Rao, Shambhu J. Upadhyaya, Raj Sharman:
An Activity Theory Approach to Modeling Dispatch-Mediated Emergency Response. 2 - Jeffrey L. Jenkins, Jeffrey Proudfoot, Joseph S. Valacich, G. Mark Grimes, Jay F. Nunamaker Jr.:
Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements. 3
Volume 20, Number 2, 2019
- Dong-Heon Kwak, Xiao Ma, Greta L. Polites, Mark Srite, Ross Hightower, William D. Haseman:
Cross-Level Moderation of Team Cohesion in Individuals' Utilitarian and Hedonic Information Processing: Evidence in the Context of Team-Based Gamified Training. 1 - Jean-François Stich, Monideepa Tarafdar, Patrick Stacey, Cary L. Cooper:
Appraisal of Email Use as A Source of Workplace Stress: A Person-Environment Fit Approach. 2 - Yan Chen, Shuyuan Deng, Dong-Heon Kwak, Ahmed Elnoshokaty, Jiao Wu:
A Multi-Appeal Model of Persuasion for Online Petition Success: A Linguistic Cue-Based Approach. 3
Volume 20, Number 3, 2019
- Mohammad Moeini, Suzanne Rivard:
Sublating Tensions in the IT Project Risk Management Literature: A Model of the Relative Performance of Intuition and Deliberate Analysis for Risk Assessment. 1 - Timm Teubner, Christoph M. Flath:
Privacy in the Sharing Economy. 2 - Allen C. Johnston, Paul Michael Di Gangi, Jack L. Howard, James L. Worrell:
It Takes a Village: Understanding the Collective Security Efficacy of Employee Groups. 3
Volume 20, Number 4, 2019
- Paul Beynon-Davies, Yingli Wang:
Deconstructing Information Sharing. 1 - Shuai-fu Lin, Deborah J. Armstrong:
Beyond Information: The Role of Territory in Privacy Management Behavior on Social Networking Sites. 2 - Heshan Sun, Ryan T. Wright, Jason Thatcher:
Revisiting the Impact of System Use on Task Performance: An Exploitative-Explorative System Use Framework. 3 - Pratyush Nidhi Sharma, Marko Sarstedt, Galit Shmueli, Kevin Hyunkyung Kim, Kai Oliver Thiele:
PLS-Based Model Selection: The Role of Alternative Explanations in Information Systems Research. 4 - Dong-Heon Kwak, Philipp Holtkamp, Sung S. Kim:
Measuring and Controlling Social Desirability Bias: Applications in Information Systems Research. 5 - Jin Li, Zhiling Guo, Geoffrey K. F. Tso:
An Economic Analysis of Consumer Learning on Entertainment Shopping Websites. 6
Volume 20, Number 5, 2019
- Ramiro Montealegre, Kishen Iyengar, Jeffrey R. Sweeney:
Understanding Ambidexterity: Managing Contradictory Tensions Between Exploration and Exploitation in the Evolution of Digital Infrastructure. 1 - Ermira Zifla, Sunil Wattal:
Understanding IT-Enabled Social Features in Online Peer-to-Peer Businesses for Cultural Goods. 2 - Kar Yan Tam, Katherine Yue Feng, Samuel Shu Kin Kwan:
The Role of Morality in Digital Piracy: Understanding the Deterrent and Motivational Effects of Moral Reasoning in Different Piracy Contexts. 3 - Shah Jahan Miah, John G. Gammack, Judy McKay:
A Metadesign Theory for Tailorable Decision Support. 4 - Jennifer J. Xu, Jane Fedorowicz, Christine B. Williams:
Effects of Symbol Sets and Needs Gratifications on Audience Engagement: Contextualizing Police Social Media Communication. 5 - Stefan Morana, Julia Kroenung, Alexander Maedche, Silvia Schacht:
Designing Process Guidance Systems. 6
Volume 20, Number 6, 2019
- Mary J. Culnan:
Policy to Avoid a Privacy Disaster. 1 - John Leslie King, Kenneth L. Kraemer:
Policy: An Information Systems Frontier. 2
- Niki Panteli, Anu Sivunen:
"I Am Your Fan; Bookmarked!" Members' Identification Development in Founder-Led Online Communities. 3 - Jin Gerlach, Peter Buxmann, Tamara Dinev:
"They're All the Same!" Stereotypical Thinking and Systematic Errors in Users' Privacy-Related Judgments About Online Services. 4 - Jan Recker, Marta Indulska, Peter F. Green, Andrew Burton-Jones, Ron Weber:
Information Systems as Representations: A Review of the Theory and Evidence. 5 - Thorhildur Jetzek, Michel Avital, Niels Bjørn-Andersen:
The Sustainable Value of Open Government Data. 6 - Isam Faik, Mark Thompson, Geoff Walsham:
Designing for ICT-Enabled Openness in Bureaucratic Organizations: Problematizing, Shifting, and Augmenting Boundary Work. 7
Volume 20, Number 7, 2019
- Richard T. Watson, Gregory S. Dawson, Marie-Claude Boudreau, Yan Li, Hongyun Zhang, Wayne Huong, Ibrahim M. Aljabri:
Constraining Opportunism in Information Systems Consulting: A Three Nation Examination. 12 - Felix Wortmann, Frédéric Thiesse, Elgar Fleisch:
The Impact of Goal-Congruent Feature Additions on Core IS Feature Use: When More Is Less and Less Is More. 13 - Niam Yaraghi, Ram D. Gopal, Ram Ramesh:
Doctors' Orders or Patients' Preferences? Examining the Role of Physicians in Patients' Privacy Decisions on Health Information Exchange Platforms. 14 - Kai R. Larsen, Dirk Hovorka, Alan R. Dennis, Jevin D. West:
Understanding the Elephant: The Discourse Approach to Boundary Identification and Corpus Construction for Theory Review Articles. 15 - Zhong Wen, Lihui Lin:
Pricing or Advertising? A Game-Theoretic Analysis of Online Retailing. 16
Volume 20, Number 8, 2019
- Jan Recker, Peter F. Green:
How do Individuals Interpret Multiple Conceptual Models? A Theory of Combined Ontological Completeness and Overlap. 1 - Shuk Ying Ho, Ka Wai (Stanley) Choi, Fan (Finn) Yang:
Harnessing Aspect - Based Sentiment Analysis: How A re Tweets Associated with Forecast Accuracy? 2 - Yicheng Zhang, Tian Lu, Chee Wei Phang, Chenghong Zhang:
Scientific Knowledge Communication in Online Q&A Communities: Linguistic Devices as a Tool to Increase the Popularity and Perceived Professionalism of Knowledge Contribution. 3 - Michal Ptaszynski, Pawel Lempa, Fumito Masui, Yasutomo Kimura, Rafal Rzepka, Kenji Araki, Michal Wroczynski, Gniewosz Leliwa:
Brute - Force Sentence Pattern Extortion from Harmful Messages for Cyberbullying Detection. 4 - Langtao Chen, Aaron Baird, Detmar W. Straub:
An Analysis of the Evolving Intellectual Structure of Health Information Systems Research in the Information Systems Discipline. 5
Volume 20, Number 9, 2019
- Rudy Hirschheim:
Against Theory: With Apologies to Feyerabend. 8 - Alain Yee-Loong Chong, Eric T. K. Lim, Xiuping Hua, Shuning Zheng, Chee-Wee Tan:
Business on Chain: A Comparative Case Study of Five Blockchain-Inspired Business Models. 9 - Mathieu Chanson, Andreas Bogner, Dominik Bilgeri, Elgar Fleisch, Felix Wortmann:
Blockchain for the IoT: Privacy-Preserving Protection of Sensor Data. 10 - Jonas Valbjørn Andersen, Claire Ingram Bogusz:
Self-Organizing in Blockchain Infrastructures: Generativity Through Shifting Objectives and Forking. 11
- Dirk S. Hovorka, Frantz Rowe, M. Lynne Markus, Sirkka Jarvenpaa, E. Burton Swanson, Mary C. Lacity, Andrew Burton-Jones, Viswanath Venkatesh, Rudy Hirschheim:
Scholarly Commentaries on Hirschheim's "Against Theory". 12
- Alan R. Dennis:
An Unhealthy Obsession with Theory. 13 - Matti Rossi, Christoph Müller-Bloch, Jason Bennett Thatcher, Roman Beck:
Blockchain Research in Information Systems: Current Trends and an Inclusive Future Research Agenda. 14
Volume 20, Number 10, 2019
- Carmen Leong, Shan L. Pan, Dorothy E. Leidner, Jinsong Huang:
Platform Leadership: Managing Boundaries for the Network Growth of Digital Platforms. 1 - Yumei He, Xunhua Guo, Guoqing Chen:
Assortment Size and Performance of Online Sellers: An Inverted U-Shaped Relationship. 2 - Sagit Bar-Gill:
Game of Platforms: Strategic Expansion into Rival (Online) Territory. 3 - Shinyi Wu, Paul A. Pavlou:
On the Optimal Fixed-Up-To Pricing for Information Services. 4 - Florian Pethig, Julia Kroenung:
Specialized Information Systems for the Digitally Disadvantaged. 5
Volume 20, Number 11, 2019
- Susan J. Winter, Carol Saunders:
The Personal in the Policy Cascade. 1
- Gengzhong Feng, Jiawen Zhu, Nengmin Wang, Huigang Liang:
How Paternalistic Leadership Influences IT Security Policy Compliance: The Mediating Role of the Social Bond. 2 - Dong-Heon Kwak, Keshavamurthy Ramamurthy, Derek L. Nazareth:
Beautiful is Good and Good is Reputable: Multiple-Attribute Charity Website Evaluation and Initial Perceptions of Reputation Under the Halo Effect. 3 - Indika Dissanayake, Sridhar P. Nerur, Rahul Singh, Yang Lee:
Medical Crowdsourcing: Harnessing the "Wisdom of the Crowd" to Solve Medical Mysteries. 4 - Dawei (David) Zhang, Barrie R. Nault:
Measuring Risk from IT Initiatives Using Implied Volatility. 5
Volume 20, Number 12, 2019
- Suprateek Sarker, Prashant Palvia, Abdullah Oguz, Caven Wu, Xiao Xiao:
Editorial: A Brief Retrospective (2013-2019). 1 - Babita Gupta, Eleanor T. Loiacono, Iaroslava Dutchak, Jason Bennett Thatcher:
A Field-Based View on Gender in the Information Systems Discipline: Preliminary Evidence and an Agenda for Change. 2
- Aileen Cater-Steel, Mark Toleman, Mohammad Mehdi Rajaeian:
Design Science Research in Doctoral Projects: An Analysis of Australian Theses. 3 - Dustin Ormond, Merrill Warkentin, Robert E. Crossler:
Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance. 4 - Jong Seok Lee, Mark Keil, Sang Cheol Park:
The Role of Evaluability Bias and the Fairness Effect in the Escalation of Commitment to Troubled Software Product Development Projects. 5 - Liwei Chen, Aaron Baird, Arun Rai:
Mobile Health (mHealth) Channel Preference: An Integrated Perspective of Approach-Avoidance Beliefs and Regulatory Focus. 6 - Sal Aurigemma, Thomas Mattson:
Generally Speaking, Context Matters: Making the Case for a Change from Universal to Particular ISP Research. 7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.