Journal: DATA BASE

Volume 49, Issue SI

1 -- 14Tom Stafford. New Theoretical Perspectives in Behavioral IS Security Research: New Ideas and the Plight of Sacrificial Oxen
15 -- 38Alan R. Dennis, Randall K. Minas. Security on Autopilot: Why Current Security Theories Hijack our Thinking and Lead Us Astray
39 -- 48Ali Vedadi, Merrill Warkentin. Secure Behavior over Time: Perspectives from the Theory of Process Memory
49 -- 66Michael Curry, Byron Marshall, Robert E. Crossler, John Correia. InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior
67 -- 80Jeffrey D. Wall, Rahul Singh. The Organization Man and the Innovator: Theoretical Archetypes to Inform Behavioral Information Security Research
81 -- 102Robert Willison, Paul Benjamin Lowry. Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives
103 -- 133Bartlomiej Hanus, John C. Windsor, Yu Wu. Definition and Multidimensionality of Security Awareness: Close Encounters of the Second Order

Volume 49, Issue 4

8 -- 10Thomas F. Stafford. Philosophically Speaking..
11 -- 14Michael D. Myers. The Philosopher's Corner: The Value of Philosophical Debate: Paul Feyerabend and his Relevance for IS Research
15 -- 29Jaime B. Windeler, Andrew Harrison. Rethinking Media Synchronicity Theory: Examining the Cooperative Assumption
30 -- 45Yan Li, Hua (Jonathan) Ye, Aoyan Liu, Xueping Yang, Xinwei Wang. Will Digital Fluency Influence Social Media Use?: An Empirical Study of WeChat Users
46 -- 77Susan Gasson, James Waters. Simulating Experiential Learning in Professional Online Courses
78 -- 91Pengfei Zhao, Jian Ma 0008, Zhongsheng Hua, Shijian Fang. Academic Social Network-Based Recommendation Approach for Knowledge Sharing

Volume 49, Issue 3

10 -- 18Stacie Petter, Michelle Carter, Adriane B. Randolph, Allen S. Lee. Desperately Seeking the Information in Information Systems Research
19 -- 33Carlo Batini, Marco Castelli, Gianluigi Viscusi, Cinzia Cappiello, Chiara Francalanci. Digital Information Asset Evaluation: A Case Study in Manufacturing
34 -- 53Jaeki Song, Junghwan Kim, Jason Triche, Miri Kim, Sangmi Chai. The Effects of Institution-Based Trust on Community Commitments: A Regulatory Focus Perspective
54 -- 77Soohyun Jeon, Anat Hovav, Jinyoung Han, Steven Alter. Rethinking the Prevailing Security Paradigm: Can User Empowerment with Traceability Reduce the Rate of Security Policy Circumvention?
78 -- 97Russell Torres, Natalie Gerhart, Arash Negahban. Epistemology in the Era of Fake News: An Exploration of Information Verification Behaviors among Social Networking Site Users
98 -- 113Dibu John Philip, Nandan Sudarsanam, Balaraman Ravindran. Improved Insights on Financial Health through Partially Constrained Hidden Markov Model Clustering on Loan Repayment Data
114 -- 120Shirley Gregor. The Value of Feyerabend's Anarchic Thinking for Information Systems Research
121 -- 124Andrew Burton-Jones. Questioning Assumptions in the Information Systems Discipline

Volume 49, Issue 2

10 -- 13Stacie Petter. "Haters Gonna Hate": PLS and Information Systems Research
14 -- 34Kyuhan Lee, Jinsoo Park, Jihae Suh. Investigating Knowledge Flows between Information Systems and Other Disciplines: : Seeking Greater Research Opportunities
35 -- 53Janice Lo, Dorothy E. Leidner. Are Dynamic Capabilities the Missing Link Between the IS Strategy and Performance Relationship?: A Model and Exploratory Test at Three Levels of Environmental Dynamism
54 -- 78Jeffrey Cummings, Alan Dennis, Wooje Cho, Kevin Cooney. The Benefit of Being Second: An Event Study of Social Media Adoption
79 -- 92Marc Schmalz, Michelle Carter, Jin Ha Lee. It's Not You, It's Me: : Identity, Self-Verification, and Amazon Reviews
93 -- 101Horst Treiblmaier. The Philosopher's Corner: Paul Feyerabend and the Art of Epistemological Anarchy - A Discussion of the Basic Tenets of Against Method and an Assessment of Their Potential Usefulness for the Information Systems Field

Volume 49, Issue 1

11 -- 12Tom Stafford. On Impact
13 -- 32Young-Kyu Kim, Dongwon Lee, Janghyuk Lee, Ji Hwan Lee, Detmar W. Straub. Influential Users in Social Network Services: The Contingent Value of Connecting User Status and Brokerage
33 -- 52Richard Baskerville, Frantz Rowe, François-Charles Wolff. Integration of Information Systems and Cybersecurity Countermeasures: An Exposure to Risk Perspective
53 -- 66Jonghwa Park, Yoonhyuk Jung, Wooje Cho. The Role of Sense of Presence and Irritation in the Context of Mobile Social Network Sites
67 -- 92Rui Gu, Zhenhui Jack Jiang, Lih-Bin Oh, Kanliang Wang. Exploring the Impact of Optimum Stimulation Level on Individual Perceptions of IT Innovations: A Trait Hierarchical Model Perspective
93 -- 117Tim Jacks, Prashant Palvia, Lakshmi S. Iyer, Riikka Sarala, Sarah Daynes. An Ideology of IT Occupational Culture: The ASPIRE Values