Journal: EJIS

Volume 25, Issue 6

473 -- 476Dov Te'eni. EJIS
477 -- 492Gabriele Piccoli. Triggered essential reviewing: the effect of technology affordances on service experience evaluations
493 -- 508Guy Paré, Mary Tate, David Johnstone, Spyros Kitsiou. Contextualizing the twin concepts of systematicity and transparency in information systems literature reviews
509 -- 533Yong Liu, Hongxiu Li, Jorge Gonçalves, Vassilis Kostakos, Bei Xiao. Fragmentation or cohesion? Visualizing the process and consequences of information system diversity, 1993-2012
534 -- 552Arno Nuijten, Mark Keil, Harry R. Commandeur. Collaborative partner or opponent: How the messenger influences the deaf effect in IT projects
553 -- 568Bernhard R. Katzy, Gordon Sung, Kevin Crowston. ARC transistance

Volume 25, Issue 5

391 -- 410Norman A. Johnson, Randolph B. Cooper, Richard D. Holowczak. The impact of media on how positive, negative, and neutral communicated affect influence unilateral concessions during negotiations
411 -- 431Matthias Lange, Jan Mendling, Jan Recker. An empirical analysis of the factors and measures of Enterprise Architecture Management success
432 -- 447Ofir Turel. Untangling the complex role of guilt in rational decisions to discontinue the use of a hedonic Information System
448 -- 464Gregory Vial, Suzanne Rivard. A process explanation of the effects of institutional distance between parties in outsourced information systems development projects
465 -- 471Ann Frances Cameron, Jane Webster, Henri Barki, Ana Ortiz de Guinea. Four common multicommunicating misconceptions

Volume 25, Issue 4

289 -- 302Oliver Müller, Iris A. Junglas, Jan vom Brocke, Stefan Debortoli. Utilizing big data analytics for information systems research: challenges, promises and guidelines
303 -- 316Björn Niehaves, Kevin Ortbach. The inner and the outer model in explanatory design theory: the case of designing electronic feedback systems
317 -- 343Sven Laumer, Christian Maier, Andreas Eckhardt, Tim Weitzel. Work routines as an object of resistance during information systems implementations: theoretical foundation and empirical evidence
344 -- 363Anastasia Utesheva, Jason R. Simpson, Dubravka Cecez-Kecmanovic. Identity metamorphoses in digital disruption: a relational theory of identity
364 -- 390Bonnie Brinton Anderson, Anthony Vance, C. Brock Kirwan, David Eargle, Jeffrey L. Jenkins. How users perceive and respond to security messages: a NeuroIS research agenda and empirical study

Volume 25, Issue 3

187 -- 208Murray Scott, William H. DeLone, William Golden. Measuring eGovernment success: a public value approach
209 -- 230Douglas A. Battleson, Barry C. West, Jongwoo (Jonathan) Kim, Balasubramaniam Ramesh, Pamela S. Robinson. Achieving dynamic capabilities with cloud computing: an empirical investigation
231 -- 251Allen C. Johnston, Merrill Warkentin, Maranda E. McBride, Lemuria Carter. Dispositional and situational factors: influences on information security policy violations
252 -- 273Dan Jong Kim, Myung-Seong Yim, Vijayan Sugumaran, H. Raghav Rao. Web assurance seal services, trust and consumers' concerns: an investigation of e-commerce transaction intentions across two nations
274 -- 287Matthias Söllner, Axel Hoffmann, Jan Marco Leimeister. Why different trust relationships matter for information systems users

Volume 25, Issue 2

91 -- 109Michael Foth. Factors influencing the intention to comply with data protection regulations in hospitals: based on gender differences in behaviour and deterrence
110 -- 130Stephen Burgess. Representing small business web presence content: the web presence pyramid model
131 -- 153Zhen Shao, Yuqiang Feng, Qing Hu. Effectiveness of top management support in enterprise systems success: a contingency perspective of fit between leadership style and system life-cycle
154 -- 169W. Alec Cram, Sue Newell. Mindful revolution or mindless trend? Examining agile development as a management fashion
170 -- 186Susan A. Brown, Anne P. Massey, Kerry W. Ward. Handle mergers and acquisitions with care: the fragility of trust between the IT-service provider and end-users

Volume 25, Issue 1

1 -- 15Mari-Klara Stein, Robert D. Galliers, Edgar A. Whitley. Twenty years of the European information systems academy at ECIS: emergent trends and research topics
16 -- 28Maurizio Naldi, Loretta Mastroeni. Economic decision criteria for the migration to cloud storage
29 -- 46Alena Audzeyeva, Robert Hudson. How to get the most from a business intelligence application during the post implementation phase? Deep structure transformation at a U.K. retail bank
47 -- 63Joeri van Laere, Lena Aggestam. Understanding champion behaviour in a health-care information system development project - how multiple champions and champion behaviours build a coherent whole
64 -- 76Ela Klecun. Transforming healthcare: policy discourses of IT and patient-centred care
77 -- 89John R. Venable, Jan Pries-Heje, Richard Baskerville. FEDS: a Framework for Evaluation in Design Science Research Open