Journal: EJIS

Volume 22, Issue 6

589 -- 591Dov Te'eni. Journals and conferences in discourse
592 -- 603Nilesh Saraf, Christoph Schlueter Langdon, Omar El Sawy. IS integration and knowledge sharing in multi-unit firms: the winner's curse
604 -- 618David Gefen, Erran Carmel. Why the first provider takes it all: the consequences of a low trust culture on pricing and ratings in online sourcing markets
619 -- 636Shoshana Altschuller, Raquel Benbunan-Fich. ad hoc virtual teams: how much electronic portrayal is too much?
637 -- 649Elmar Kutsch, David Denyer, Mark Hall, Elizabeth (Liz) Lee-Kelley. Does risk matter? Disengagement from risk management practices in information systems projects
650 -- 672Mark Keil, Arun Rai, Shan Liu. How user risk and requirements risk moderate the effects of formal and informal control on the process performance of IT projects
673 -- 689Jan Recker. Empirical investigation of the usefulness of Gateway constructs in process models
690 -- 710Fredrik Karlsson. Longitudinal use of method rationale in method configuration: an exploratory study

Volume 22, Issue 5

493 -- 497Gerald Grant, Felix B. Tan. Governing IT in inter-organizational relationships: Issues and future research
498 -- 511Carla Wilkin, John Campbell, Stephen Moore. Creating value through governing IT deployment in a public/private-sector inter-organisational context: a human agency perspective
512 -- 528JingHua Xiao, Kang Xie, Qing Hu. Inter-firm IT governance in power-imbalanced buyer-supplier dyads: exploring how it works and why it lasts
529 -- 547Hyung Jin Kim, Bongsik Shin, Ho Geun Lee. The mediating role of psychological contract breach in IS outsourcing: inter-firm governance perspective
548 -- 568Nelson King. Exploring the impact of operating model choice on the governance of inter-organizational workflow: the U.S. e-prescribing network
569 -- 588Lorraine Morgan, Joseph Feller, Patrick Finnegan. Exploring value networks: theorising the creation and capture of value with open source software

Volume 22, Issue 4

381 -- 386Mark Lycett. 'Datafication': making sense of (big) data in a complex world
387 -- 402M. N. Ravishankar, Shan Ling Pan, Michael D. Myers. Information technology offshoring in India: a postcolonial perspective
403 -- 415Joshua M. Davis. Leveraging the IT competence of non-IS workers: social exchange and the good corporate citizen
416 -- 433Jianan Wu, Edgardo Arturo Ayala Gaytán. The role of online seller reviews and product price on buyers' willingness-to-pay: a risk perspective
434 -- 454Marjolein van Offenbeek, Albert Boonstra, DongBack Seo. Towards integrating acceptance and resistance research: evidence from a telecare case study
455 -- 474Bjarne Rerup Schlichter, Jeremy Rose. Trust dynamics in a large system implementation: six theoretical propositions
475 -- 492Lars Mathiassen, Anna Sandberg. How a professionally qualified doctoral student bridged the practice-research gap: a confessional account of Collaborative Practice Research

Volume 22, Issue 3

251 -- 256Pär J. Ågerfalk. Embracing diversity through mixed methods research
257 -- 277Véronique Guilloux, Joanne Locke, Alan Lowe. Digital business reporting standards: mapping the battle in France
278 -- 294Amany Elbanna. Top management support in multiple-project environments: an in-practice view
295 -- 316Tamara Dinev, Heng Xu, H. Jeff Smith, Paul J. Hart. Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts
317 -- 335Matthias Trier, Judith Molka-Danielsen. Sympathy or strategy: social capital drivers for collaborative contributions to the IS community
336 -- 359Robert C. Nickerson, Upkar Varshney, Jan Muntermann. A method for taxonomy development and its application in information systems
360 -- 380Jennifer E. Gerow, Ramakrishna Ayyagari, Jason Bennett Thatcher, Philip L. Roth. Can we have fun @ work? The role of intrinsic motivation for utilitarian systems

Volume 22, Issue 2

131 -- 138Ken Peffers, Brian L. Dos Santos. Research opportunities in information technology funding and system justification
139 -- 169Guido Schryen. Revisiting IS business value research: what we already know, what we still need to know, and how we can get there
170 -- 190Greg Filbeck, Matthew Swinarski, Xin Zhao. Shareholder reaction to firm investments in the capability maturity model: an event study
191 -- 205Lan Cao, Kannan Mohan, Balasubramaniam Ramesh, Sumantra Sarkar. Adapting funding processes for agile IT projects: an empirical investigation
206 -- 220Sarah S. Khan, Moutaz J. Khouja, Ram L. Kumar. Effects of time-inconsistent preferences on information technology infrastructure investments with growth options
221 -- 234Daqing Zheng, Jin Chen, Lihua Huang, Cheng Zhang. E-government adoption in public administration organizations: integrating institutional theory perspective and resource-based view
235 -- 250Edward Bernroider. Effective ERP adoption processes: the role of project activators and resource investments

Volume 22, Issue 1

1 -- 8David F. Birks, Walter Fernandez, Natalia Levina, Syed Nasirin. Grounded theory method in information systems research: its nature, diversity and opportunities
9 -- 25Emmanuelle Vaast, Geoff Walsham. Grounded theorizing for electronically mediated social contexts
26 -- 44Elisa Mattarelli, Fabiola Bertolotti, Diego Maria Macrì. The use of ethnography and grounded theory in the development of a management information system
45 -- 55Joost F. Wolfswinkel, Elfi Furtmüller, Celeste Wilderom. Using grounded theory as a method for rigorously reviewing literature
56 -- 75Chon Abraham, Marie-Claude Boudreau, Iris A. Junglas, Richard T. Watson. Enriching our theoretical repertoire: the role of evolutionary psychology in technology acceptance
76 -- 94Riitta Hekkala, Cathy Urquhart. Everyday power struggles: living in an IOIS project
95 -- 118Susan Gasson, Jim Waters. Using a grounded theory approach to study online collaboration behaviors
119 -- 129Rangarirai Matavire, Irwin Brown. Profiling grounded theory approaches in information systems research