Journal: Information & Management

Volume 51, Issue 8

939 -- 951Yinglei Wang, Peter H. Gray, Darren B. Meister. Task-driven learning: The antecedents and outcomes of internal and external knowledge sourcing
952 -- 963Qian Huang, Robert M. Davison, Hefu Liu. An exploratory study of buyers' participation intentions in reputation systems: The relationship quality perspective
964 -- 971Enes Eryarsoy, Selwyn Piramuthu. Experimental evaluation of sequential bias in online customer reviews
972 -- 983Jin Chen, Jing Elaine Chen, Khim-Yong Goh, Yunjie Calvin Xu, Bernard C. Y. Tan. When do sellers bifurcate from Electronic Multisided Platforms? The effects of customer demand, competitive intensity, and service differentiation
984 -- 994Carol Hsu, Jimmy C. Huang, Robert D. Galliers. Conceptualizing the dynamics of rhetorical practice and technological frame in the context of technology diffusion and adoption
995 -- 1004Yung-Shao Yeh, Yung-Ming Li. Design-to-lure in the e-shopping environment: A landscape preference approach
1005 -- 1016Fang Zhao, Kathy Ning Shen, Alan Collier. Effects of national culture on e-government diffusion - A global study of 55 countries
1017 -- 1030Hong Zhang, Yaobin Lu, Sumeet Gupta, Ling Zhao. What motivates customers to participate in social commerce? The impact of technological environments and virtual customer experiences
1031 -- 1042Aurora Garrido-Moreno, Nigel Lockett, Víctor García-Morales. Paving the way for CRM success: The mediating role of knowledge management and organizational commitment
1043 -- 1052Hongxiu Li, Yong Liu. Understanding post-adoption behaviors of e-service users in the context of online travel services

Volume 51, Issue 7

833 -- 844Chien-Lung Hsu, Yi-Chuan Liao. Exploring the linkages between perceived information accessibility and microblog stickiness: The moderating role of a sense of community
845 -- 853Dongsong Zhang, Zhijun Yan, Hansi Jiang, Taeha Kim. A domain-feature enhanced classification model for the detection of Chinese phishing e-Business websites
854 -- 864Ruey-Jer "Bryan" Jean, Rudolf R. Sinkovics, Daekwan Kim. The impact of technological, organizational and environmental characteristics on electronic collaboration and relationship performance in international customer-supplier relationships
865 -- 879Fang Ding, Dong Li, Joey F. George. Investigating the effects of IS strategic leadership on organizational benefits from the perspective of CIO strategic roles
880 -- 0Sunghun Chung, Kyung Young Lee, Kimin Kim. Corrigendum to "Job performance through mobile enterprise systems: The role of organizational agility, location independence, and task characteristics" [Information & Management 51 (2014) 605-617]
881 -- 882Jae-Nam Lee, Byounggu Choi. Strategic role of IT and its impact on organizations
883 -- 894Liqiang Huang, Chuan-Hoo Tan, Weiling Ke, Kwok Kee Wei. Do we order product review information display? How?
895 -- 911Alexander A. Neff, Florian Hamel, Thomas Herz, Falk Uebernickel, Walter Brenner, Jan vom Brocke. Developing a maturity model for service systems in heavy equipment manufacturing enterprises
912 -- 923Chih-Chien Wang, Ming-Chang Hsu. An exploratory study using inexpensive electroencephalography (EEG) to understand flow experience in computer-based instruction
924 -- 938Eric T. G. Wang, Frank K. Y. Chou, Neil Chueh-An Lee, S. Z. Lai. Can intrafirm IT skills benefit interfirm integration and performance?

Volume 51, Issue 6

605 -- 617Sunghun Chung, Kyung Young Lee, Kimin Kim. Job performance through mobile enterprise systems: The role of organizational agility, location independence, and task characteristics
618 -- 626Manon Ghislaine Guillemette, Maxime Laroche, Jean Cadieux. Defining decision making process performance: Conceptualization and validation of an index
627 -- 640Daniel Belanche, Luis Vicente Casaló, Carlos Flavián, Jeroen Schepers. Trust transfer in the continued usage of public e-services
641 -- 652Ioannis G. Krasonikolakis, Adam P. Vrechopoulos, Athanasia Pouloudi. Store selection criteria and sales prediction in virtual worlds
653 -- 669Insoo Son, Dongwon Lee, Jae-Nam Lee, Young Bong Chang. Market perception on cloud computing initiatives in organizations: An extended resource-based view
670 -- 678Sheng-Pao Shih, Ting Lie, Gary Klein, James J. Jiang. Information technology customer aggression: The importance of an organizational climate of support
679 -- 687Eugenia Y. Huang, Sheng-Wei Lin. How does e-mail use affect perceived control of time?
688 -- 699Chei Sian Lee, Mary Beth Watson-Manheim, Katherine M. Chudoba. Investigating the relationship between perceived risks in communication and ICT-enabled communicative behaviors
700 -- 711M. S. Sandeep, M. N. Ravishankar. The continuity of underperforming ICT projects in the public sector
712 -- 725Margarita Martínez-Núñez, Waldo Saul Pérez-Aguiar. Efficiency analysis of information technology and online social networks management: An integrated DEA-model assessment
726 -- 737Lina Zhou, Jiang Wu, Dongsong Zhang. Discourse cues to deception in the case of multiple receivers
738 -- 746Hui-Chih Wang, Her-Sen Doong. Revisiting the Task-Media Fit Circumflex: A further examination of negotiation tasks
747 -- 761Blanca Hernandez-Ortega, Carlos Serrano-Cinca, Fabio Gomez-Meneses. The firm's continuance intentions to use inter-organizational ICTs: The influence of contingency factors and perceptions
762 -- 773Amitava Dutta, Hun Lee, Masoud Yasai-Ardekani. Digital systems and competitive responsiveness: The dynamics of IT business value
774 -- 782Lan-Ying Huang, Ying-Jiun Hsieh, Yen-Chun Jim Wu. Gratifications and social network service usage: The mediating role of online experience
783 -- 797Wendy L. Currie, Jonathan J. M. Seddon. A cross-national analysis of eHealth in the European Union: Some policy and research directions
799 -- 800Trevor T. Moores. Preface
801 -- 809Michael D. Myers, John R. Venable. A set of ethical principles for design science research in information systems
810 -- 818Bernd Carsten Stahl, Grace Eden, Marina Jirotka, Mark Coeckelbergh. From computer ethics to responsible research and innovation in ICT: The transition of reference discourses informing ethics-related research in information systems
819 -- 832Helen Ashman, Tim J. Brailsford, Alexandra I. Cristea, Quan Z. Sheng, Craig D. Stewart, Elaine G. Toms, Vincent P. Wade. The ethical and social implications of personalization technologies for e-learning

Volume 51, Issue 5

497 -- 510Tiago Oliveira, Manoj Thomas, Mariana Espadanal. Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors
511 -- 519Kelly J. Fadel, Alexandra Durcikova. If it's fair, I'll share: The effect of perceived knowledge validation justice on contributions to an organizational knowledge repository
520 -- 531Yoonhyuk Jung, Suzanne D. Pawlowski. Virtual goods, real goals: Exploring means-end goal structures of consumers in social virtual worlds
532 -- 540Carol Xiaojuan Ou, Keith C. C. Chan. Developing a competitive edge in electronic markets via institutional and social based quality signaling mechanisms
541 -- 550Dong-Gil Ko. The mediating role of knowledge transfer and the effects of client-consultant mutual trust on the performance of enterprise implementation projects
551 -- 567Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Ross T. Hightower. Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders
568 -- 578Ying-Hueih Chen, Tzu-Pei Lin, David C. Yen. How to facilitate inter-organizational knowledge sharing: The impact of trust
579 -- 594Paul Benjamin Lowry, Nathan W. Twyman, Matthew D. Pickard, Jeffrey L. Jenkins, Quang "Neo" Bui. Proposing the Affect-Trust Infusion Model (ATIM) to explain and predict the influence of high and low affect infusion on Web vendor trust
595 -- 603Hui Lin 0003, Weiguo Fan, Patrick Y. K. Chau. Determinants of users' continuance of social networking sites: A self-regulation perspective

Volume 51, Issue 4

375 -- 390Mohamed Slim Ben Mimoun, Marion Garnier, Richard Ladwein, Christophe Benavent. Determinants of e-consumer productivity in product retrieval on a commercial website: An experimental approach
391 -- 397Muhammad Aljukhadar, Sylvain Senecal, Jacques Nantel. Is more always better? Investigating the task-technology fit theory in an online user context
398 -- 416Tae Hun Kim, Jae-Nam Lee, Jae Uk Chun, Izak Benbasat. Understanding the effect of knowledge management strategies on knowledge management performance: A contingency perspective
417 -- 429Nikhil Mehta, Dianne Hall, Terry Anthony Byrd. Information technology and knowledge in software development teams: The role of project uncertainty
430 -- 440Dongming Xu, Wayne W. Huang, Huaiqing Wang, Jon Heales. Enhancing e-learning effectiveness using an intelligent agent-supported personalized virtual learning environment: An empirical investigation
441 -- 450Yongqiang Sun, Yulin Fang, Kai H. Lim. Understanding knowledge contributors' satisfaction in transactional virtual communities: A cost-benefit trade-off perspective
451 -- 464Donghyun Kim, Anthony P. Ammeter. Predicting personal information system adoption using an integrated diffusion model
465 -- 478Jamie Y. T. Chang, James J. Jiang, Gary Klein, Eric T. G. Wang. Do too many goals impede a program? A case study of enterprise system implementation with multiple interdependent projects
479 -- 487Tracey E. Rizzuto, Andrew Schwarz, Colleen Schwarz. Toward a deeper understanding of IT adoption: A multilevel analysis
488 -- 496Haichao Zheng, Dahui Li, Jing Wu, Yun Xu. The role of multidimensional social capital in crowdfunding: A comparative study in China and US

Volume 51, Issue 3

297 -- 309Kangning Wei, Kevin Crowston, Na Li, Robert Heckman. Understanding group maintenance behavior in Free/Libre Open-Source Software projects: The case of Fire and Gaim
310 -- 319Edith Galy, Mary Jane Sauceda. Post-implementation practices of ERP systems and their relationship to financial performance
320 -- 335Narasimhaiah Gorla, Toni M. Somers. The impact of IT outsourcing on information systems success
336 -- 346Tawei Wang, Ching Yao Wen, Jia-Lang Seng. The association between the mandatory adoption of XBRL and the performance of listed state-owned enterprises and non-state-owned enterprises in China
347 -- 358Yun Ji Moon, Woo Gon Kim, Deborah J. Armstrong. Exploring neuroticism and extraversion in flow and user generated content consumption
359 -- 373Jessie Pallud, Detmar W. Straub. Effective website design for experience-influenced environments: The case of high culture museums

Volume 51, Issue 2

177 -- 186Thompson S. H. Teo, Anol Bhattacherjee. Knowledge transfer and utilization in IT outsourcing partnerships: A preliminary model of antecedents and outcomes
187 -- 205She-I Chang, David C. Yen, I-Cheng Chang, Derek Jan. Internal control framework for a compliant ERP system
206 -- 216Yun Xu, Wai Fong Boh, Christina Soh. Vertical IS standards deployment and integration: A study of antecedents and benefits
217 -- 224Mikko T. Siponen, M. Adam Mahmood, Seppo Pahnila. Employees' adherence to information security policies: An exploratory field study
225 -- 239Qing Cao, Donald R. Jones, Hong Sheng. Contained nomadic information environments: Technology, organization, and environment influences on adoption of hospital RFID patient tracking
240 -- 248Liu Fan, Yung Ho Suh. Why do users switch to a disruptive technology? An empirical study based on expectation-disconfirmation theory
249 -- 259Linda Wallace, Steven D. Sheetz. The adoption of software measures: A technology acceptance model (TAM) perspective
260 -- 269Jerrel Leung, Waiman Cheung, Sung-Chi Chu. Aligning RFID applications with supply chain strategies
270 -- 282Jing Elaine Chen, Shan L. Pan, Tao Hua Ouyang. Routine reconfiguration in traditional companies' e-commerce strategy implementation: A trajectory perspective
283 -- 295Jack Shih-Chieh Hsu, Tsai-hsin Chu, Tung-Ching Lin, Chiao-Fang Lo. Coping knowledge boundaries between information system and business disciplines: An intellectual capital perspective

Volume 51, Issue 1

1 -- 12Tung-Ching Lin, Yi-Cheng Ku, Yu-Shan Huang. Exploring top managers' innovative IT (IIT) championing behavior: Integrating the personal and technical contexts
13 -- 26Xihui Zhang, Thomas F. Stafford, Jasbir Singh Dhaliwal, Mark L. Gillenson, Gertrude Moeller. Sources of conflict between developers and testers in software development
27 -- 42Farnoosh Khodakarami, Yolande E. Chan. Exploring the role of customer relationship management (CRM) systems in customer knowledge creation
43 -- 56Theresa Schmiedel, Jan vom Brocke, Jan Recker. Development and validation of an instrument to measure organizational cultures' support of Business Process Management
57 -- 68Aykut Hamit Turan, Prashant C. Palvia. Critical information technology issues in Turkish healthcare
69 -- 79Princely Ifinedo. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
80 -- 92Jiming Wu, Clyde W. Holsapple. Imaginal and emotional experiences in pleasure-oriented IT usage: A hedonic consumption perspective
93 -- 103Shu-Ching Wang, Jen-Her Wu. Proactive privacy practices in transition: Toward ubiquitous services
104 -- 112Hao-Chiang Koong Lin, Tsung-Yen Chuang, I.-Long Lin, Hsuan-Yu Chen. Elucidating the role of IT/IS assessment and resource allocation in IT/IS performance in hospitals
113 -- 119Paurav Shukla. The impact of organizational efforts on consumer concerns in an online context
120 -- 128Jing Fan, Pengzhu Zhang, David C. Yen. G2G information sharing among government agencies
129 -- 137Ghiyoung Im. Effects of cognitive and social factors on system utilization and performance outcomes
138 -- 151Richard Baskerville, Paolo Spagnoletti, Jongwoo Kim. Incident-centered information security: Managing a strategic balance between prevention and response
152 -- 164Colleen Schwarz. Toward an understanding of the nature and conceptualization of outsourcing success
165 -- 176Thang N. Nguyen. A different approach to information management by exceptions (toward the prevention of another Enron)