default search action
Data Base, Volume 49
Volume 49, Number 1, February 2018
- Tom Stafford:
On Impact. 11-12 - Young-Kyu Kim, Dongwon Lee, Janghyuk Lee, Ji-Hwan Lee, Detmar W. Straub:
Influential Users in Social Network Services: The Contingent Value of Connecting User Status and Brokerage. 13-32 - Richard L. Baskerville, Frantz Rowe, François-Charles Wolff:
Integration of Information Systems and Cybersecurity Countermeasures: An Exposure to Risk Perspective. 33-52 - Jonghwa Park, Yoonhyuk Jung, Wooje Cho:
The Role of Sense of Presence and Irritation in the Context of Mobile Social Network Sites. 53-66 - Rui Gu, Zhenhui Jack Jiang, Lih-Bin Oh, Kanliang Wang:
Exploring the Impact of Optimum Stimulation Level on Individual Perceptions of IT Innovations: A Trait Hierarchical Model Perspective. 67-92 - Tim Jacks, Prashant Palvia, Lakshmi S. Iyer, Riikka Sarala, Sarah Daynes:
An Ideology of IT Occupational Culture: The ASPIRE Values. 93-117
Volume 49, Number SI, April 2018
- Tom Stafford:
New Theoretical Perspectives in Behavioral IS Security Research: New Ideas and the Plight of Sacrificial Oxen. 1-14 - Alan R. Dennis, Randall K. Minas:
Security on Autopilot: Why Current Security Theories Hijack our Thinking and Lead Us Astray. 15-38 - Ali Vedadi, Merrill Warkentin:
Secure Behavior over Time: Perspectives from the Theory of Process Memory. 39-48 - Michael Curry, Byron Marshall, Robert E. Crossler, John Correia:
InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior. 49-66 - Jeffrey D. Wall, Rahul Singh:
The Organization Man and the Innovator: Theoretical Archetypes to Inform Behavioral Information Security Research. 67-80 - Robert Willison, Paul Benjamin Lowry:
Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives. 81-102 - Bartlomiej Hanus, John C. Windsor, Yu Wu:
Definition and Multidimensionality of Security Awareness: Close Encounters of the Second Order. 103-133
Volume 49, Number 2, May 2018
- Stacie Petter:
"Haters Gonna Hate": PLS and Information Systems Research. 10-13 - Kyuhan Lee, Jinsoo Park, Jihae Suh:
Investigating Knowledge Flows between Information Systems and Other Disciplines: : Seeking Greater Research Opportunities. 14-34 - Janice Lo, Dorothy E. Leidner:
Are Dynamic Capabilities the Missing Link Between the IS Strategy and Performance Relationship?: A Model and Exploratory Test at Three Levels of Environmental Dynamism. 35-53 - Jeffrey Cummings, Alan R. Dennis, Wooje Cho, Kevin Cooney:
The Benefit of Being Second: An Event Study of Social Media Adoption. 54-78 - Marc L. Schmalz, Michelle Carter, Jin Ha Lee:
It's Not You, It's Me: : Identity, Self-Verification, and Amazon Reviews. 79-92 - Horst Treiblmaier:
The Philosopher's Corner: Paul Feyerabend and the Art of Epistemological Anarchy - A Discussion of the Basic Tenets of Against Method and an Assessment of Their Potential Usefulness for the Information Systems Field. 93-101
Volume 49, Number 3, May 2018
- Stacie Petter, Michelle Carter, Adriane B. Randolph, Allen S. Lee:
Desperately Seeking the Information in Information Systems Research. 10-18 - Carlo Batini, Marco Castelli, Gianluigi Viscusi, Cinzia Cappiello, Chiara Francalanci:
Digital Information Asset Evaluation: A Case Study in Manufacturing. 19-33 - Jaeki Song, Junghwan Kim, Jason Triche, Miri Kim, Sangmi Chai:
The Effects of Institution-Based Trust on Community Commitments: A Regulatory Focus Perspective. 34-53 - Soohyun Jeon, Anat Hovav, Jinyoung Han, Steven Alter:
Rethinking the Prevailing Security Paradigm: Can User Empowerment with Traceability Reduce the Rate of Security Policy Circumvention? 54-77 - Russell Torres, Natalie Gerhart, Arash Negahban:
Epistemology in the Era of Fake News: An Exploration of Information Verification Behaviors among Social Networking Site Users. 78-97 - Dibu John Philip, Nandan Sudarsanam, Balaraman Ravindran:
Improved Insights on Financial Health through Partially Constrained Hidden Markov Model Clustering on Loan Repayment Data. 98-113 - Shirley Gregor:
The Value of Feyerabend's Anarchic Thinking for Information Systems Research. 114-120 - Andrew Burton-Jones:
Questioning Assumptions in the Information Systems Discipline. 121-124
Volume 49, Number 4, November 2018
- Thomas F. Stafford:
Philosophically Speaking... 8-10 - Michael D. Myers:
The Philosopher's Corner: The Value of Philosophical Debate: Paul Feyerabend and his Relevance for IS Research. 11-14 - Jaime B. Windeler, Andrew J. Harrison:
Rethinking Media Synchronicity Theory: Examining the Cooperative Assumption. 15-29 - Yan Li, Hua (Jonathan) Ye, Aoyan Liu, Xueping Yang, Xinwei Wang:
Will Digital Fluency Influence Social Media Use?: An Empirical Study of WeChat Users. 30-45 - Susan Gasson, James Waters:
Simulating Experiential Learning in Professional Online Courses. 46-77 - Pengfei Zhao, Jian Ma, Zhongsheng Hua, Shijian Fang:
Academic Social Network-Based Recommendation Approach for Knowledge Sharing. 78-91
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.