Journal: DATA BASE

Volume 51, Issue 4

8 -- 10Tom Stafford 0001. Uncommon Method Bias
11 -- 39Christoph Weinert, Christian Maier, Sven Laumer, Tim Weitzel. IS Reappraisal and Technology Adaptation Behaviors: A Longitudinal Study During an IS Implementation
40 -- 67Tracy A. Jenkin, David B. Skillicorn, Yolande E. Chan. Novel Information Discovery and Collaborative Filtering to Support Group Creativity
68 -- 92Sherae L. Daniel, Shadi Janansefat, E. Ilana Diamant, Yuqing Ren. Single- and Double-Loop Learning: Linking Free/Libre Open Source Software (FLOSS) Developer Motivation, Contribution, and Turnover Intentions
93 -- 122Mehdi Darban, Greta L. Polites. Why Is It Hard to Fight Herding?: The Roles of User and Technology Attributes
123 -- 138Steven Alter. The Philosopher's Corner: Taking Different Types of Knowledge Objects Seriously: A Step toward Generating Greater Value from IS Research

Volume 51, Issue 3

11 -- 12Deborah J. Armstrong. Introduction
13 -- 54René Riedl, Thomas Fischer 0010, Pierre-Majorique Léger, Fred D. Davis. A Decade of NeuroIS Research: Progress, Challenges, and Future Directions
55 -- 80Miguel I. Aguirre-Urreta, Mikko Rönkkö, Jiang Hu. Polynomial Regression and Measurement Error: Implications for Information Systems Research
81 -- 96Alexander Serenko, Ofir Turel. Directing Technology Addiction Research in Information Systems: Part I. Understanding Behavioral Addictions
97 -- 118Björn Häckel, Jochen Übelhör, Christian Voit. Creating Competitive Advantage in E-Business Value Chains by Using Excess Capacity via IT-enabled Marketplaces

Volume 51, Issue 2

10 -- 11Tom Stafford 0001. Metaphilosophical Musings
12 -- 35Tejaswini C. Herath, Hemantha S. B. Herath, John D'Arcy. Organizational Adoption of Information Security Solutions: An Integrative Lens Based on Innovation Adoption and the Technology- Organization- Environment Framework
36 -- 53Nirup M. Menon, Mikko T. Siponen. Executives' Commitment to Information Security: Interaction between the Preferred Subordinate Influence Approach (PSIA) and Proposal Characteristics
54 -- 81Colleen Carraher-Wolverton, Ronald T. Cenfetelli. An Exploration of the Drivers of Non- Adoption Behavior: A Discriminant Analysis Approach
82 -- 100Owolabi Justine Abayomi, Xuehe Zhang, Xiaobao Peng, Shuliang Zhao. How Do Institutional Pressures and Behavioral Intentions Affect Mobile Services Adoption?: The Moderating Role of Perceived Risk
101 -- 112Michael J. Cuellar. The Philosopher's Corner: Beyond Epistemology and Methodology - A Plea for a Disciplined Metatheoretical Pluralism

Volume 51, Issue 1

9 -- 10Deborah J. Armstrong. We've Only Just Begun
11 -- 13Gurvirender Tejay, Souren Paul. Special Issue Introduction: Desperately Seeking the Information in Information Systems Research at HICSS 2019
14 -- 36Zahra Aivazpour, V. Srinivasan (Chino) Rao. Information Disclosure and Privacy Paradox: The Role of Impulsivity
37 -- 50Moritz Becker, Christian Matt 0001, Thomas Hess. It's Not Just About the Product: How Persuasive Communication Affects the Disclosure of Personal Health Information
51 -- 69David Harborth, Sebastian Pape 0001. How Privacy Concerns, Trust and Risk Beliefs, and Privacy Literacy Influence Users' Intentions to Use Privacy-Enhancing Technologies: The Case of Tor
70 -- 83Louis Raymond, Guy Paré, Éric Maillet. Enabling Laboratory Medicine in Primary Care Through IT Systems Use
84 -- 103Daniel Gerster, Christian Dremel, Walter Brenner, Prashant Kelker. How Enterprises Adopt Agile Forms of Organizational Design: A Multiple-Case Study
104 -- 128Corinna Rutschi, Jens Dibbern. Towards a Framework of Implementing Software Robots: Transforming Human-executed Routines into Machines