Journal: MIS Quarterly

Volume 33, Issue 4

647 -- 662Richard L. Baskerville, Michael D. Myers. Fashion Waves in Information Systems Research and Practice
673 -- 687Mary J. Culnan, Cynthia Clark Williams. How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches
689 -- 708Ronald T. Cenfetelli, Geneviève Bassellier. Interpretation of Formative Measurement in Information Systems Research
709 -- 734Ping Wang, Neil C. Ramiller. Community Learning in Information Technology Innovation
735 -- 762Richard Klein, Arun Rai. Interfirm Strategic Information Flows in Logistics Supply Chain Relationships
763 -- 783Ravi Bapna, Seokjoo Andrew Chang, Paulo B. Goes, Alok Gupta. Overlapping Online Auctions: Empirical Characterization of Bidder Strategies and Auction Prices
785 -- 810Charalambos L. Iacovou, Ronald L. Thompson, H. Jeff Smith. Selective Status Reporting in Information Systems Projects: A Dyadic-Level Investigation
811 -- 826Gary Klein, James J. Jiang, Paul H. Cheney. Resolving Difference Score Issues in Information Systems Research
827 -- 844Ryad Titah, Henri Barki. Nonlinearities Between Attitude and Subjective Norms in Information Technology Acceptance: A Negative Synergy?

Volume 33, Issue 2

203 -- 320Weiquan Wang, Izak Benbasat. Interactive Decision Aids for Consumer Decision Making in E-Commerce: The Influence of Perceived Strategy Restrictiveness
217 -- 235Grandon Gill, Anol Bhattacherjee. Whom Are We Informing? Issues and Recommendations for MIS Research from an Informing Science Perspective
237 -- 262Allen S. Lee, Geoffrey S. Hubona. A Scientific Basis for Rigor in Information Systems Research
263 -- 291Anindya Ghose. Internet Exchanges for Used Goods: An Empirical Analysis of Trade Patterns and Adverse Selection
321 -- 338Michael D. Smith, Rahul Telang. Competing with Free: The Impact of Movie Broadcasts on DVD Sales and Internet Piracy
339 -- 370Corey M. Angst, Ritu Agarwal. Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion
371 -- 393Tracy Ann Sykes, Viswanath Venkatesh, Sanjay Gosain. Model of Acceptance with Peer Support: A Social Network Perspective to Understand Employees System Use
395 -- 418Ned Kock. Information Systems Theorizing Based on Evolutionary Psychology: An Interdisciplinary Review and Theory Integration Framework
419 -- 432Jiming Wu, Albert L. Lederer. A Meta-Analysis of the Role of Environment-Based Voluntariness in Information Technology Acceptance

Volume 33, Issue 1

1 -- 17Gerald C. Kane, Robert G. Fichman. The Shoemaker s Children: Using Wikis for Information Systems Teaching, Research, and Publication
23 -- 48Wenjing Duan, Bin Gu, Andrew B. Whinston. Informational Cascades and Software Adoption on the Internet: An Empirical Investigation
49 -- 70Sung S. Kim, Jai-Yeol Son. Out of Dedication or Constraint? A Dual Model of Post-Adoption Phenomena and its Empirical Test in the Context of Online Services
71 -- 90Huigang Liang, Yajiong Xue. Avoidance of Information Technology Threats: A Theoretical Perspective
91 -- 118Venugopal Balijepally, RadhaKanta Mahapatra, Sridhar P. Nerur, Kenneth H. Price. Are Two Heads Better than One for Software Development? The Productivity Paradox of Pair Programming
119 -- 145Jahyun Goo, Rajiv Kishore, H. Raghav Rao, Kichan Nam. The Role of Service Level Agreements in Relational Management of Information Technology Outsourcing: An Empirical Study
147 -- 170Norman A. Johnson, Randolph B. Cooper. Power and Concession in Computer-Mediated Negotiations: An Examination of First Offers
177 -- 195Martin Wetzels, Gaby Odekerken-Schroder, Claudia van Oppen. Using PLS Path Modeling for Assessing Hierarchial Construct Models: Guidelines and Impirical Illustration
197 -- 214Israr Qureshi, Deborah Compeau. Assessing Between-Group Differences in Information Systems Research: A Comparison of Covariance-and Component-Based SEM