| 1 | -- | 21 | Kuo-Chung Chang, Yoke May Seow. Protective Measures and Security Policy Non-Compliance Intention: IT Vision Conflict as a Moderator |
| 22 | -- | 38 | Patrick Buckley, Seamus Noonan, Conor Geary, Thomas Mackessy, Eoghan Nagle. An Empirical Study of Gamification Frameworks |
| 39 | -- | 60 | Alimohammad Shahri, Mahmood Hosseini, Keith Phalp, Jacqui Taylor, Raian Ali. How to Engineer Gamification: The Consensus, the Best Practice and the Grey Areas |
| 61 | -- | 85 | Jianping Peng, Jing Quan, Le Peng. IT Application Maturity, Management Institutional Capability and Process Management Capability |
| 86 | -- | 109 | Chung-Lun Wei, Chien-Ta Ho. Exploring Signaling Roles of Service Providers' Reputation and Competence in Influencing Perceptions of Service Quality and Outsourcing Intentions |
| 110 | -- | 123 | Hyondong Kim. Investigating the Mediating Role of Social Networking Service Usage on the Big Five Personality Traits and on the Job Satisfaction of Korean Workers |