Abstract is missing.
- Factors Influencing Premium Pricing in e-MarketplacesMichael van der Linden, Cesar Alexandre de Souza. [doi]
- Information Systems Research Impact on Informing PolicyMahdi Moqri, Akmal Mirsadikov, Parham Amiri. [doi]
- Driving Relevance into the Introductory Information Systems CourseCarol McGuire, John Benamati. [doi]
- The Fit of Data Visualization Design for Knowledge ActivationKari Sandouka, Cherie Noteboom, Surendra Sarnikar. [doi]
- Understanding the barriers to Knowledge sharing in the French healthcare system: a conceptual model and research propositionsIman Ben Hamouda, Olfa Chourabi, Imed Boughzala. [doi]
- Role of Communication in Online PlatformsYili Hong 0002, Jing Peng, Gordon Burtch, Ni Huang. [doi]
- Alleviating Emergency Department CongestionAnjee Gorkhali. [doi]
- Identifying Factors Affecting Blockchain Technology DiffusionRuben Post, Koen Smit, Martijn Zoet. [doi]
- Understanding user interactions with a chatbot: a self-determination theory approachQuynh N. Nguyen, Anna Sidorova. [doi]
- The Impact of Extended Global Ransomware Attacks on Trust: How the Attacker's Competence and Institutional Trust Influence the Decision to PayAlex Zarifis, Xusen Cheng. [doi]
- Shared Design: Design Discourse in Open Source Software CommunitiesKevin Lumbard. [doi]
- The Role of Service Standardization Capability in Service Innovation: Evidence from the Knowledge-Intensive Service FirmsYing Wang, Jaeki Song, Jeff Baker, Yong Jin Kim. [doi]
- Information Credibility and Perceived Privacy in Social Commerce AgeNick Hajli. [doi]
- Reviewing the Role of the Agile Manifesto and Agile Methods in LiteratureAnna Zaitsev, Uri Gal, Barney Tan. [doi]
- Theory of Dataphoric Space: A Dataphoric Systems TheoryMichael Pritchard, Cherie Noteboom. [doi]
- Turnaway Intention in the IT Area: A Delphi-based InvestigationLuiz Antonio Joia, Mariela Assis. [doi]
- Creating Value from Business Intelligence and Analytics in SMEs: Insights from ExpertsMarilex Rea Llave, Eli Hustad, Dag H. Olsen. [doi]
- Barriers to Adoption of Blockchain TechnologyVikram Sadhya, Harshali Sadhya. [doi]
- Connected Homes and Online Retail: The Case of IoT Enabled Online ShoppingSiddharth Baswani, Joey F. George, Anthony M. Townsend. [doi]
- Requirements for Representing Data-Driven Business Models - Towards Extending the Business Model CanvasBabett Kühne, Tilo Böhmann. [doi]
- User-Centered Changes in Workflow Agreement and Solution Satisfaction: An Expectation-Confirmation PerspectiveDaniel Narh Treku, Jun Sun. [doi]
- 10 Years of Research on Technostress Creators and Inhibitors: Synthesis and CritiqueJalal Sarabadani, Michelle Carter, Deborah Compeau. [doi]
- mHeath Technology: Collaborating for GoodZonayed Mahid, Gina Green, Hope Koch, Shelby Garner, Julia Hitchcock, Phil Young. [doi]
- Budding Female IT Entrepreneurs in Saudi Arabia: Impact of IT and Institutional EnvironmentAsma Aleidi, Daniel Chandran. [doi]
- Unpacking Knowledge on Cloud Computing: An Umbrella ReviewRania Fahim El-Gazzar, Fathul Wahid, Karen Stendal. [doi]
- The Effect of Perceived Innovativeness of Student Response Systems (SRSs) on Classroom EngagementMd Rasel Al Mamun, Dan Kim. [doi]
- Big Data Capability, Customer Agility, and Organization Performance: A Dynamic Capability PerspectiveGhazwan Hassna, Paul Lowry. [doi]
- Why Marginalized Groups Struggle to Leverage Digital ActivismJordana J. George, Dorothy E. Leidner. [doi]
- The Role of Mental Factors for the Design of a Virtual Memory PalaceJan-Paul Huttner, Kathrin Robbert. [doi]
- Innovating Citizenship and Social Control Courses through Distance EducationRosana Abutakka Vasconcelos dos Anjos, Cristiano Maciel, Cassyra L. Vuolo, Alexandre Martins dos Anjos, Marina de Andrade. [doi]
- Organizational Change in the Artificial Intelligence Age - The Case of Marketing and SalesYin Yang, Keng Siau. [doi]
- Enterprise Digital Nudging: Between adoption gain and unintended rejectionTobias Kißmer, Tobias Potthoff, Stefan Stieglitz. [doi]
- Using Image-based and Text-based Information for Sales Prediction: A Deep Neural Network ModelYing Wang, Yue Guo, Jaeki Song. [doi]
- Modeling the Impact of the Sharing Economy on Traditional FirmsCong Zhang, Derek L. Nazareth. [doi]
- From Traditional to Agile E-Government Service Development: Starting from Practitioners' ChallengesAnthony Simonofski, Hajer Ayed, Benoît Vanderose, Monique Snoeck. [doi]
- How to Implement Clan Control in DevOps TeamsAnna Wiedemann, Manuel Wiesche. [doi]
- Theoretical Support for Enhancing Data Quality: Application in Electronic Medical RecordsCaihua Liu, Amir Talaei-Khoei, Didar Zowghi. [doi]
- E-Learning as a Means of Social Inclusion: The Case of Syrian Refugees in GermanySafa'a AbuJarour, Hanna Krasnova. [doi]
- The Role of Tech Corporations at Historically Black Colleges and Universities in American STEM EducationCurtis Cain, Allison J. Morgan Bryant, Carlos D. Buskey, Rajni Goel. [doi]
- Business Analytics Capability and Supply Chain ManagementThiagarajan Ramakrishnan, Abhishek Kathuria, Jiban Khuntia. [doi]
- A Qualitative Investigation of Unmet Information-Seeking Needs of Online WorkersAllie Blaising, David Askay, Yasmine Kotturi, Chinmay Kulkarni. [doi]
- Exploring the Effects of System Alert Notifications on End-User Security Behavior IntentionsRoberto Sandoval. [doi]
- Assessment of Readiness for Launching Cloud Computing Services: The case of Ethio telecom, EthiopiaGetachew Hailemariam Mengesha, Solomon Negash, Ruth Leuleged, Joseph Van Matre, Philip F. Musa. [doi]
- NEW DETAILS EMERGE! Revealing the Effects of Clickbait Headlines on User ResponsesSupavich (Fone) Pengnate, Alex Young, Jeffrey Chen. [doi]
- Iterating the Cybernetic Loops in Anti-Phishing Behavior: A Theoretical IntegrationAlaa Nehme, Joey F. George. [doi]
- The Determinant of Selfless Misuse Intention and the Role of System Resilience under the Context of DisastersDheyaaldin Alsalman, Insu Park. [doi]
- Creating Win-Win Opportunities: Integrating Community Engagement into the IS ClassroomRoslin Hauck. [doi]
- Dynamics of the IT adoption: exploring changes in the cognitive models of a userAlejandro Cataldo, Gustavo Farias, Cristobal Gonzalez. [doi]
- Blockchain and Information SystemsEduardo Salcedo, Jose Pineda, Karlene Cousins, Daniel Conway, Lina Bouyad Bouyad, Alpen Sheth, Hemang Subramanian. [doi]
- Biometric Technology for Fighting Fraud in National Health Insurance: Ghana's ExperienceEmmanuel Kwame Owusu-Oware, John Effah, Richard Boateng. [doi]
- Mobile Applications Security: Role of PrivacyHamid Reza Nikkhah, Ali Balapour, Rajiv Sabherwal. [doi]
- Machine Learning Classifiers for Predicting Transit FraudJay Claiborne, Ashish Gupta. [doi]
- Blockchain Economic Networks and Algorithmic TrustMelanie Swan, Sabine Brunswicker. [doi]
- Self-congruency Models for Self-disclosure: A Comparative AnalysisAsim Shrestha. [doi]
- Eco-Feedback Interventions: Selective Attention and Actual Behavior ChangeLiliane Ableitner, Verena Tiefenbeck, Elgar Fleisch, Thorsten Staake. [doi]
- ERP System Implementation and Sustainability Performance Rating and ReputationDaphne Simmonds, Amanuel F. Tadesse, Uday S. Murthy. [doi]
- Clinician Satisfaction with In-house and Cloud-based EHR VendorsMassara Alazazi, Jun Sun, Nan Xiao. [doi]
- Web-Image Signifier Congruency Theory (WISC): Conceptualization and Examination in an Online Donation ContextGaurav Bansal, Wenkai Zhou. [doi]
- Predicting Security Events in Cloud ComputingVivek Kumar Singh 0003, Kaushik Dutta. [doi]
- Bridging the Gap between Research and Practice: Ten Lessons Learned about Enterprise Wearable Computer SystemsSebastian Hobert, Matthias Schumann. [doi]
- Mortality Prediction Performance using Similarity Measures for Medical Event SequencesJoel Fredrickson, Michael Mannino, Omar Alqahtani, Farnoush Banaei Kashani. [doi]
- User engagement in an open collaboration community after the insertion of a game design element: An online field experimentAna Paula O. Bertholdo, Claudia de O. Melo, Artur S. Rozestraten, Marco Aurélio Gerosa, Heather O'Brien. [doi]
- Import Clearance Digitalization and Socioeconomic Development: The Case of GhanaFred Amankwah-Sarfo, John Effah, Richard Boateng. [doi]
- CO-EVOC: An Enterprise Architecture Model Co-Evolution Operations CatalogNuno Silva, Miguel Mira da Silva, Pedro Sousa. [doi]
- A Comparison of Sentiment Analysis ToolsAmirkiarash Kiani, Sameh Al-Natour, Ozgur Turetken. [doi]
- What Do You Mean, My Results are Incorrect? The Impact of Multicollinearity and Measurement Error in Tests of Statistical SignificanceDale Goodhue, William Lewis, Ronald L. Thompson. [doi]
- Examining the effects of Information Technology Outsourcing on Competitive AdvantageBenjamin Agyei-Owusu, David Asamoah, Leonard Agbenyo. [doi]
- Fintech Social: Definição, Categorização e Ilustrações Empíricas - Social Fintech: Definition, Categorization and Empirical IllustrationÉrica Siqueira, Eduardo H. Diniz, Raphael Albino. [doi]
- Privacy by Design to Comply with GDPR: A Review on Third-Party Data ProcessorsChristian Kurtz, Martin Semmann, Tilo Böhmann. [doi]
- Broadband Internet Access as a Localized Facilitator for Improving Security KnowledgeKent Marett, Shan Xiao. [doi]
- Exploit Social Relations in Sentiment Analysis of Social Media Content for Disaster ManagementPratik Shivarkar, Wei Wei. [doi]
- A Look on the Generational Differences in IT Self-Service EngagementIbtissam Zaza, Deborah J. Armstrong. [doi]
- Exploring the Spatial Relationships between Language Education and Surrounding CommunitiesAu Vo, Miloslava Plachkinova, Ala Alluhaidan. [doi]
- Comprehensive Framework for the Design of Diabetes RegistriesHassan Alyami, Omar El-Gayar. [doi]
- EcoCloud: A Specialized Computer System for Elaboration Echocardiography ReportsRenato Kuroe, Robson Bonidia, Luiz A. L. Rodrigues, Jacques Brancher, Danilo Sanches, Willyan Nazima, Fabrício Furtado. [doi]
- Understanding EHR Assimilation Using Social Information Processing CuesRishikesh Jena, Vishal Shah. [doi]
- Role of reputation cues in trust formation for a developer's decision to join Open Source Software projectsMikhail Tsoy, D. Sandy Staples. [doi]
- The Impact of BYOD Use on Employees' Proactive Behaviors: A Job Crafting PerspectiveWeian Wang, Lakshmi S. Iyer, Prabin Panigrahi. [doi]
- Social commerce and consumer search behavior: An eye-tracking studyPatrick Mikalef, Kshitij Sharma, Ilias O. Pappas. [doi]
- Someone On My Level: How Women of Color Describe the Role of Teaching Assistants in Creating Inclusive Technology CoursesMina Tari, Hala Annabi. [doi]
- Archetypes of Data Analytics Providers in the Big Data EraChristian Dremel, Emanuel Stöckli, Jochen Wulf, André Herrmann. [doi]
- Privacy and Security: An Organization wide DSS FrameworkV. S. Prakash Attili, Saji K. Mathew, Vijayan Sugumaran. [doi]
- Mejorando la Circulación de Vehículos: Simulación con Semãforos Inteligentes - Improving Traffic: Simulation with Smart Traffic LightsLuis Carpio Ali, Alex Oviedo Meneses, Shirley Reynozo Torres, Arnaldo Tejada Espinoza, Jose Antonio Robles-Flores. [doi]
- The Effect of Values on Hacker Participation Volume in Online CommunitiesRuby Booth. [doi]
- Theory of Dataphoric SpaceMichael Pritchard, Cherie Noteboom. [doi]
- What promote the mobilization and coordination of knowledge for crowdsourced digital innovation?Jiayuan Liu. [doi]
- Exploratory Study for Readmission in Cancer PatientsLuwen Huangfu, Stephen Hayne, James Ma, Nicholas Roberts. [doi]
- MyMemory: an ontology for privacy protection in external digital memoriesBianca Rodrigues Teixeira, Flávia Maria Santoro, Fernanda Araujo Baião. [doi]
- Enterprise Personal Analytics: A Research AgendaTrevor Clohessy, Thomas Acton. [doi]
- Spillover of Information Security Incidents' Impact: The Moderating Role of Social Networks and ITJoonghee Lee, Dianne Hall, Casey G. Cegielski. [doi]
- Video Tutorials Improve Students' Ability to Recover from ErrorsNathan Garrett. [doi]
- Product Lifecycle Management System and NPD Performance: The Role of Coordination Capability and Organizational AmbidexterityYi-Ming Tai, Shu-Chiung Lin. [doi]
- Social Networking Site Use on Social Capital of Older AdultsNicole O'Brien, Yufei Yuan. [doi]
- Decision-making participation and locus of control among military MIS managers in PolandMonika Ziobrowska. [doi]
- Resolving the Pedagogical Disconnect between User Stories and Use Cases in Systems Analysis and Design TextbooksGary Spurrier, Heikki Topi. [doi]
- Acceptance of Video Conferencing in Healthcare Planning in HospitalsMohammed Shubber, Tomas Östlind, Ann Svensson, Lena Larsson. [doi]
- Are Electricity Prosumers More Engaged? An Analysis of Brand-Follower Engagement on TwitterJacqueline Corbett, Tony Savarimuthu, Mahmoud Mohanna. [doi]
- Identifying Similar Questions in Healthcare Social Question Answering: A Design Science ResearchMohan John Blooma, Nilmini Wickramasinghe, Jayan Chirayath Kurian. [doi]
- Decision Engineering in Case of Intuitive DecisionsDavid Rueckel, Barbara Krumay, Philipp Wicke. [doi]
- Why Lie?: Deception of Health InformationAndrew Miller, Merrill Warkentin. [doi]
- Affordance-based Use Case MiningMostafa Mesgari. [doi]
- Is Smartwatch Really for Me? An Expectation-Confirmation PerspectiveJames Wairimu, Jun Sun. [doi]
- Executable Business Model BlueprintsMaría Camila Romero, Mario E. Sánchez, Jorge Villalobos. [doi]
- The Impact of Online Health Searches on Medical Outcomes: Some Evidence from Google TrendsTamuchin McCreless. [doi]
- Satisfying Secure Load Balancing Expectations in the CloudBrian Cusack, Eghbal Ghazizadeh. [doi]
- The Role of Trust and Self-Efficacy in Mitigating Perceptions of Privacy Risk in Online Self-DisclosureJennifer L. Ziegelmayer, Laurie Barfitt. [doi]
- ADR Reporting Through Twitter from Patient PerspectiveOsama A. Mujallid, Salem Alghamdi. [doi]
- The Role of Emotional Intelligence Training in Moderating Conflict Resolution in Virtual TeamsAyman Alfahid. [doi]
- Trusted Apps - Analysis and Evaluation of Mobile Medical ApplicationsHenning Schneider, Thomas Friedl, Miloslava Plachkinova. [doi]
- Using Cognitive Dissonance Theory to Explain Information Security Policy ViolationsNasim Talebi, Mohsen M. Jozani, Teju Herath, H. Raghav Rao. [doi]
- Using Experiential Learning to Effectively Inform People About Web Privacy RisksClaus-Peter H. Ernst, Birte Malzahn, Katharina Simbeck. [doi]
- Privacy with Big Data: A FrameworkDavid Hoffman. [doi]
- Toward a Conceptual Decision Framework for Shadow IT IntegrationMelanie Huber, Stephan Zimmermann, Christopher Rentrop, Carsten Felden. [doi]
- Evaluation of Voice Authentication for Patient Health Record AccessJeanette Rose, John R. Windle, Ryan M. Schuetzler, Ann L. Fruhling. [doi]
- A Stress-Strain-Outcome Model of Job Satisfaction: The Moderating Role of Professional Self-efficacyA. K. M. Najmul Islam, Nicholas B. Mavengere, Ulla-Riitta Ahlfors, Mikko J. Ruohonen, Alexander Serenko, Prashant Palvia. [doi]
- Towards a Development of Cybersecurity Risk-Responsibility Taxonomy of Small Enterprises for Data Breach Risk MitigationKeiona Davis, Yair Levy, Bostjan Delak. [doi]
- Rethinking Into Programming: A light-lifting, high-impact flipped class teaching programming through iOS app developmentJohn Gallaugher, John FitzGibbon, Shirley Cho, Jorge Alberto Mahecha. [doi]
- ICT4D: Exploring Emergent ThemesVikram S. Bhadauria, RadhaKanta Mahapatra, Sridhar P. Nerur. [doi]
- Business Models and Blockchain: What can Change?Fernanda da Silva Momo, Giovana S. Schiavi, Ariel Behr. [doi]
- The Development of a Multidimensional Engagement MeasureStephanie Andel, Triparna de Vreede, Gert-Jan de Vreede, Balaji Padmanabhan, Vivek Singh, Paul E. Spector. [doi]
- Crowd Sourced approach towards Sustainability and ProductivityChristopher Wood, Asfahaan Mirza, Gabrielle Peko, David Sundaram. [doi]
- Building a Platform's User-base: An Investigation of Value-driven Lock-ins in Digital Service InnovationHosea Ofe. [doi]
- When Worlds Collide: Alignment of Information Systems (IS) Incompatibilities Abstract for Effective Disaster RecoveryDeborah Bunker, Christian Ehnis, Linda Levine, Abdul Babar, Anthony Sleigh. [doi]
- Understanding Online Produce Cue Effects on Consumer Behavior: Evidence from EEG DataYa-Ling Wu, Chun-Yu Hsiung. [doi]
- To eWOM, or not? Investigating the Restricting Factors to Provide Online Ratings for PhysiciansMaximilian Haug, Heiko Gewald. [doi]
- How Does This Benefit Me? An Employee's Value Perception of Enterprise Social MediaJeff Cummings. [doi]
- Advantage of Simulation in Online Project Management EducationApril H. Reed, Mark Angolia. [doi]
- Applying the Onion Model to Scaffold Writing Development in Information Systems CoursesDivakaran Liginlal, Silvia Pessoa, Maria Pia Gomez Laich, Chadi Aoun. [doi]
- Towards an understanding of the Role of Design Thinking for Requirements Elicitation - Findings from a Multiple-Case StudyJennifer Hehn, Falk Uebernickel. [doi]
- The Impact of Prosocial Microlending on Entrepreneurship in Emerging Economies: A Cross-National Natural ExperimentMinxu Shen, Jason Chan, Yi Ding, Jin Chen. [doi]
- Digital Privacy GDPR: A Proposed Digital Transformation FrameworkKenneth D. Russell, Paidi O'Raghallaigh, Philip O'Reilly, Jeremy Hayes. [doi]
- Students' Learning Experience in Flipped Classes Using Social MediaAmir Talaei-Khoei, Jay Daniel, Mohsen Dokhanchi. [doi]
- Hands-on Exercises and Assignments on Google Cloud PlatformTai-Yin Chi. [doi]
- The Influence of IT Artifacts on Players Leading to Internet Gaming Addiction among University Students in AfricaMakafui Nyamadi, Richard Boateng. [doi]
- A Framework for ICT Usage Classification of Higher Education InstitutionsGuillermo Rodríguez-Abitia, Marina Kriscautzky-Laxague. [doi]
- Big Data Sentiment Analysis of Customers' Reviews, and the Prediction of Companies' Stock PerformanceSumali Conlon, Chad Diaz II. [doi]
- Prediction Tool for Consumer Decision Making in E-Commerce: Exploring "If not" type of Explanation Facilities on TrustLianlian Jiang. [doi]
- Examining Determinants of Controls in Open Source Software DevelopmentYanni Hu, Yuanfeng Cai, Radhika Jain. [doi]
- Do You Regret Using Social Media? Understanding the Role of Dark Side of Social Media in Regret and Discontinuance BehaviorZiyue Huang, Prashant Palvia. [doi]
- The Misunderstood Link: Information Security Training StrategyHenry G. Torres, Saurabh Gupta. [doi]
- A Systematic review of mHealth interventions for public healthcare in East AfricaPatrick Ndayizigamiye, Manoj Maharaj. [doi]
- Trolls and Social Movement Participation: An Empirical InvestigationPratyush Bharati, Carol Lee, Romilla Syed. [doi]
- Play to Learn: Conducting a Playtest Session for Improving an Educational GameLinda Eckardt, Steve Grogorick, Susanne Robra-Bissantz. [doi]
- Seeking the 'Smart' in Cities: Managing the process of Innovating with ITJeffrey James Pittaway, Ali Reza Montazemi. [doi]
- IS Success at Organizational Level: A Meta-analysisInderjeet Kaur, Sumedha Chauhan. [doi]
- Better Trust Between Users in Sharing Economy PlatformsBadr Alsamani. [doi]
- Social Media Overload and fatigue: the Moderating Role of Multitasking Computer Self-EfficacyA. K. M. Najmul Islam, Eoin Whelan, Stoney Brooks. [doi]
- Direct Application of Research Study Findings in a Practitioner Setting: The Application of the Small Retail Facilities Model for Retail Facility AssessmentOmar Ibrahim Aboulola. [doi]
- Positivity Bias: Effects of Discrete Emotions on Review HelpfulnessChaoqun Deng, T. Ravichandran. [doi]
- Factors Affecting the Adoption of Telemedicine in Rural Areas of BangladeshMohammed Sajedur Rahman, Rakibul Hoque. [doi]
- Simulation Games for Active Learning of ERP ConceptsJean-François Michon, Forough Karimi Alaghehband, Félix Gaudet-Lafontaine. [doi]
- Effects of 'Fit' on Email OverloadMonideepa Tarafdar, Helena Wenninger. [doi]
- Computational Ontologies as Classification Artifacts in IS ResearchAurona Gerber. [doi]
- Vulnerability and Risk Assessment of XEN HypervisorAlan T. Litchfield, Abid Shahzad. [doi]
- Information and Communications Technologies as an Enabler of Supply Chain IntegrationAbdullah Oguz, Wei Xie, Prashant Palvia, Kwasi Amoako-Gyampah. [doi]
- Classroom Strategies for Overworked Faculty of Intro to MIS: Harnessing the Power of Cooperative LearningAmy J. Connolly, Daniel Rush. [doi]
- User Experience Design of a Patient Reported Outcome System for Musculoskeletal CareBenjamin L. Schooley, John Brooks, Charles Thigpen, Neset Hikmet. [doi]
- Analyzing Influences on Pivotal ITO Contract Features: A Quantitative Multi-Study Design with Evidence from Western EuropeMichael Könning, Kai Heinrich, Patrick Zschech, Christian Leyh. [doi]
- Understanding Healthcare Data Breaches: Crafting Security ProfilesAlexander McLeod, Diane Dolezel. [doi]
- Effective Use of Twitter Data in Crisis Management: The Challenge of Harnessing Geospatial DataDario Bonaretti. [doi]
- Data Quality Assurance via Perioperative EMR ReconciliationJames (Jim) Ryan, Barbara Doster, Sandra Daily, Carmen Lewis. [doi]
- Content Snacking and Pricing in Mobile ChannelsXia Zhao, Lei Wang, Cheng Zhang. [doi]
- Nomological Networks in IS ResearchZakariya Belkhamza, Geoffrey S. Hubona. [doi]
- Academic Career Advancement in IS: Does Gender Matter?Eleanor T. Loiacono, Lakshmi S. Iyer, Shiya Cao. [doi]
- Ride-Sharing Services: The Tumultuous Tale of the Rural Urban DivideRhoda C. Joseph. [doi]
- Immersive Virtual Environments in Corporate Education and TrainingAnna Carolina Muller Queiroz, Alexandre Moreira Nascimento, Romero Tori, Thomas Brashear Alejandro, Vinicius Veloso de Melo, Fernando de Souza Meirelles, Maria Isabel da Silva Leme. [doi]
- A Study of Factors Affecting Technology UsageOlanike Sharon Nicholas-Omoregbe, Romanus Osabohien, David Ibidapo, Nicholas A. Omoregbe, Efosa C. Idemudia, Victor Mbarika, Jose Noguera. [doi]
- Go Tell It on the Internet: Twitter Effects on Expectations ManagementTeagen Nabity, Trevor Sorensen, Peter Johnson. [doi]
- The Changing Liability Structures of Information Technology FirmsGary F. Templeton, Andrew Miller, Martin Ndicu. [doi]
- FinCare - A Digital Spending Conscience or "Do you really need a flamethrower?"Michel Kuhlmann, Felix Maximilian Roth, Christian Becker, Erik Theissen. [doi]
- NLP in Electronic Health Records: A Decade PerspectiveJames Boit, Hassan Alyami, Omar El-Gayar. [doi]
- Thinking Outside of the IT Capability BoxFlorian Wiesböck. [doi]
- What-if Model Games in ExcelNathan Garrett. [doi]
- Bi-modal Network Relationships in Online Health NetworksSrikanth Venkatesan, Sanjukta Das-Smith, Raj Sharman, Vandana Prabhu. [doi]
- Does Business Intelligence and Analytics Leverage Dynamic and Operational Capabilities? An Empirical Study in a Brazilian Telecommunications CompanyValter Moreno, Wagner Carvalho, Flavia Cavazotte. [doi]
- Enabling Bimodal IT: Practices for Improving Organizational Ambidexterity for Successful Innovation IntegrationNabil Georges Badr. [doi]
- Predicting Brand Post Popularity in Online Social Networks: An Ex-Ante ApproachAmir Hassan Zadeh, Ramesh Sharda. [doi]
- Towards an Ontology-Based Information System for Smart City EcosystemsAdrian Hernandez-Mendez, Anne Faber, Gloria Bondel, Florian Matthes. [doi]
- Discrete-Event Simulation of Aviation Rescue Efficiency on Earthquake Medical EvacuationYang Shen, Xiaoxia Zhang, Yongchen Guo. [doi]
- ZigBee Architecture for Disaster Relief Supply Chain Visibility and Supply Chain CoordinationCameron Chi Sum Taylor, Tiru Arthanari. [doi]
- Social Media Operationalized for Locational Analytics: A Hands-on Tutorial Utilizing NLP, Topic Modeling, and GISBrian Hilton, Anthony Corso, Sarah Osailan. [doi]
- A Networked Taxonomy of Perceptions towards Electronic Medical Record Systems and the Circumstances in Which They Are FormedRoopa Raman, Merete Hvalshagen. [doi]
- The Impact of Digitization on Business Models - A Systematic Literature ReviewChristoph Buck, David Eder. [doi]
- Russian Roulette or A Game of Whack A Mole? Effect of Overconfidence in Protecting Information SystemsKelvin King-Kizito, Nan Xiao. [doi]
- The Strategic Decision on Mobile Payment: A Study on Merchants' AdoptionYang Li. [doi]
- Combining system success factors with trust to explain e-government adoption using fsQCAIlias O. Pappas, Panos E. Kourouthanassis, Patrick Mikalef, Michail N. Giannakos. [doi]
- Communicating Compliance: Developing a GDPR Privacy LabelGrace Fox, Colin Tonge, Theo Lynn, John Mooney. [doi]
- Mining the Value of Network Structure on Stock PerformanceWuyue Shangguan, Shichao Wang, Xi Chen, Alvin Chung Man Leung. [doi]
- Institutional Effects on API Development and Integration in Developing Countries: Evidence from GhanaJoshua Ofoeda, Richard Boateng. [doi]
- The role of feedforward-enabled analytics in improving decision quality: a field studyCurtis Smith, David Schuff. [doi]
- Incorporating Culture into The Theory of IT AffordancesJobany Rico, Weidong Xia. [doi]
- The Influence of Values on the Use of Citizen Services: The Elderly PerspectiveYara Khoury, Sandeep Purao, Marybeth Duffy. [doi]
- Why Does Investment Experience Matter in Herding Rationality in P2P Lending?Chi Hon Li, Vincent Siu-king Lai, Waiman Cheung, Xiling Cui. [doi]
- A Methodological Improvement in the Evaluation of Research Output: an Adapted use of the Scholarly Capital ModelMichael J. Cuellar, Hirotoshi Takeda, Duane Truex. [doi]
- The Effects of Gender On The Adoption of Smartphone: An Empirical InvestigationEfosa C. Idemudia, Ogechi Adeola, Nubi Achebo, Mahesh S. Raisinghani, Nicholas A. Omoregbe. [doi]
- Developing and testing a smartphone health application for older people to improve their mental healthShadi Erfani, Kimiya Ramin. [doi]
- Exploring Job Satisfaction of IT Workers in Taiwan, Japan, and China: The Role of Employee Demographics, Job Demographics, and Uncertainty AvoidanceBenjamin Yeo, Alexander Serenko, Prashant Palvia, Osam Sato, Hiroshi Sasaki, Jie Yu, Yue Guo. [doi]
- Using Analytic Hierarchy Process for COBIT 5 Process PrioritizationRafael Almeida, João Souza Neto, Miguel Mira da Silva. [doi]
- Analyze the Factors of Firms to Rely on Internal and External SuppliersJiang Hu. [doi]
- The Effect of Students' Technology Readiness on Technology AcceptanceJoy Galaige, Sebastian Binnewies, Geraldine Torrisi-Steele, Kewen Wang. [doi]
- Examining the relationship between a hospital's IT infrastructure capability and digital capabilities: a resource-based perspectiveRogier van de Wetering, Johan Versendaal, Pien Walraven. [doi]
- Lack of Female Authorship in the High-Impact IS Journals: Where are the Women?Andrea Everard, Scott McCoy, Kent St. Pierre. [doi]
- The Paradox Evaluation of IT Stereotypes -A Post-hoc Analysis of Women's Missing Interest in IT Study ProgramsCaroline Ernestine Oehlhorn. [doi]
- Cybersecurity Threats in the Context of Project Meta-PhasesSteven Presley, Jeffrey P. Landry, Jordan Shropshire. [doi]
- A Study of IT Security PoliciesHassan Alyami, James Boit, Omar El-Gayar. [doi]
- Information Avoidance in Requirements Determination for Systems DevelopmentSaman Bina, Glenn Browne. [doi]
- Using mental models to understand the ICT adoption processAlejandro Cataldo. [doi]
- Q&As and Reviews: Substitutes or Complements?Gaurav Jetley, Shivendu Shivendu. [doi]
- A Study of Factors in HIPAA Non Complaint BehaviorJoana Gaia, Xunyi Wang, Jenn Basile, G. L. Sanders, David Murray. [doi]
- A Solution in Search of a Problem: A Method for the Development of Blockchain Use CasesGilbert Fridgen, Jannik Lockl, Sven Radszuwill, Alexander Rieger, André Schweizer, Nils Urbach. [doi]
- #Sponsored #Ad: Exploring the Effect of Influencer Marketing on Purchase IntentionLea Katharina Müller, Jens Mattke, Christian Maier. [doi]
- Go Back to Your Room: Designing a Scalable In-Class Required College CourseBiagio Palese, Sun-Tae Kim, Joaquin Alfredo Rodriguez, Gabriele Piccoli. [doi]
- Exploring Ethical Design Dimensions of a Physiotherapeutic mHealth Solution through Value Sensitive DesignMarius Müller 0001, Oliver Heger, Björn Niehaves. [doi]
- Effect of Agglomeration in the Restaurant IndustryKeertana V. Chidambaram, Nargis Pervin. [doi]
- An Examination of the Blockchain, the Emerging Technology that Promises to Transform Digital Tracking of AssetsMeg Murray. [doi]
- Facebook and Dataveillance: Demonstrating a Multimodal Discourse AnalysisKarl Van der Schyff, Kirstin Krauss, Jan Kroeze. [doi]
- Post-Merger IT Integration Success and Performance Measurement: A Systematic Literature StudyChristian Sillaber, Nikolas Huber, Andrea Mussmann, Ruth Breu. [doi]
- Deriving Viewpoints for Enterprise Architecture AnalysisAlixandre Santana, Daniel Simon, Hermano Perrelli de Moura, Kai Fischbach, Matthias Kreimeyer. [doi]
- A Test of Search-Experience-Credence Framework Through Online ReviewYun Wan, Makoto Nakayama, Jin Qin. [doi]
- Design and Implementation of an Agile Teaching FrameworkElahe Javadi, Season Tanner. [doi]
- An Exploratory Empirical Examination of the Integrated Sustainability Framework via Case StudyViet Dao, Thomas Abraham. [doi]
- Understanding the Factors that Hinder Online Civic ParticipationHyerin Kim, Younghoon Chang, Siew Fan Wong. [doi]
- An In-depth Analysis of Careers in Data Science: A K-Means Clustering ApproachLakshmi S. Iyer, Mitchell Church, Dan Emery. [doi]
- Using SCRUM principles to transform the classroomDawn Owens, Gaurav Shekhar. [doi]
- Too Good to Be True? Understanding How Blockchain Revolutionizes Loyalty ProgramsLu Wang, Xin (Robert) Luo, Botong Xue. [doi]
- Feasibility of Blockchain ApplicationsMala Kaul, Veda Storey, Carson Woo. [doi]
- Factors affecting Herd Behaviour in Buying Decisions influenced by Online CommunitiesNatascha Pavlovic. [doi]
- What Does it Mean to be Autistic? Examining How Identity Threats and Coping Strategies Influence the ASD Identity through Analysis of Identity Talk in Online CommunitiesJennifer Large, Christina Serrano. [doi]
- The Relationship between Mobile Web and Mobile App Channels for RetailersZiqing Yuan, Hailiang Chen. [doi]
- A Framework of AR-Enabled GIS Affordances for Disaster ResponseMoataz Soliman, Michael Bliemel, Binod Sundararajan. [doi]
- Agile Methods as a Risk Management Strategy Tool - A Fintech Case StudyAnna Zaitsev. [doi]
- Digital Entrepreneurship: A Path to a More Inclusive Digital FutureJonathan P. Allen. [doi]
- How to bring IT home: Developing a common terminology to compare cases of IS BacksourcingBenedikt von Bary. [doi]
- Disclosure of Stigmatized Sexual Health Issues in Online Support CommunitiesErsin Dincelli, Xin Zhou. [doi]
- Designing User Interfaces for Ecological Momentary Assessments for Superior User Engagement: A Theory Driven ApproachAvijit Sengupta, Theresa Beckie, Kaushik Dutta. [doi]
- The Untold Story: The Masked Experiences of Women with Autism Working in ITHala Annabi. [doi]
- Analyzing Transaction Codes in Manufacturing for Compliance MonitoringYuxin Wang, Joris Hulstijn, Yao-Hua Tan. [doi]
- Mechanical Turk and Financial Dependency on CrowdsourcingEric Bogert. [doi]
- The GMetrix Exam: Does It Add Value?Lily Pharris, Mary Beth Tarver, Curtis Penrod. [doi]
- A Study on the Behavior of Crowd Workers when Reporting Forecasts under Proper Scoring RulesArthur Carvalho, Denise Kroon. [doi]
- Leveraging the IoT to Support the Guided Self-determination methodNilmini Wickramasinghe, Bodil Rasmussen, Freimut Bodendorf, Vibeke Zoffmann, Lars Kayser, Judy Curry. [doi]
- Open Data Policy and Open Data ServicesAkemi Takeoka Chatfield, Christopher G. Reddick. [doi]
- RisCC - A Risk Management Tool for Cloud Computing EnvironmentsMichael Adelmeyer, Lukas Beike, Mirko Buggenthin, Sebastian Osada, Frank Teuteberg. [doi]
- Aligning Enterprise Systems Capabilities with Business Strategy: An extension of the Strategic Alignment Model (SAM) using Enterprise ArchitecturePrithvi Bhattacharya. [doi]
- What Drives In-App Purchase Intention in Video Games? An Examination of Patience and the Enjoyment of Routine TasksClaus-Peter H. Ernst. [doi]
- Expectation Disconfirmation in ENP Information Filtering: An fMRI ExperimentKelly J. Fadel, Thomas O. Meservy, Brock Kirwan. [doi]
- Measuring Open Source Software ImpactVinod Ahuja, Matt Germonprez. [doi]
- Gender Difference on Students' Email Security BehaviorsJie Du, Gregory Schymik. [doi]
- Impulsivity and Risky Cybersecurity Behaviors: A ReplicationZahra Aivazpour, V. Srinivasan (Chino) Rao. [doi]
- Electronic Performance Monitoring Friend or Foe: Empowering Employees through Data AnalyticsKarma Sherif, Omolola Jewisimi. [doi]
- Big Data and Business Analytic Concepts: A Literature ReviewFabiane Fernando, Tobias Engel. [doi]
- What Drives Paid Search Success? A Systematic Literature ReviewDarius Schlangenotto, Martin Poniatowski, Dennis Kundisch. [doi]
- An Examination of Risk Perceptions and Protected Health Information Disclosure Intentions: A Construal Level Theory PerspectiveTripti Singh, Allen C. Johnston, Paul Michael Di Gangi, Gregory Bott. [doi]
- Factors Influencing Physician's Well-being Management within the Mobile Health Context: A Scoping ReviewShuqing Chen, Xiaofeng Ju, Xitong Guo, Stella Wen Tian. [doi]
- Using Signaling Theory to Understand the Impact of Information Disclosure on Online Collaborative ConsumptionSin-Jie Wang, Jack Shih-Chieh Hsu, Yuzhu Li, Tung-Ching Lin. [doi]
- The Generic Blockchain Ecosystem and its Strategic ImplicationsTobias Riasanow, Fiona Burckhardt, David Soto Setzke, Markus Böhm 0001, Helmut Krcmar. [doi]
- The OYSTER Open Source Project for Introducing Entity Resolution and MDM into Information Systems CurriculaJohn Talburt, Yumeng Ye, Bingyi Zhong, Xinming Li, James true, Sapna Srimal. [doi]
- A Literature Analysis of Research on Artificial Intelligence in Management Information System (MIS)Alexandre Moreira Nascimento, Maria Alexandra Viegas Cortez da Cunha, Fernando de Souza Meirelles, Eusebio Scornavacca, Vinicius V. de Melo. [doi]
- Towards an Understanding of the Influence of Personality on Student Engagement in Distance Learning CoursesColleen Carraher-Wolverton. [doi]
- Text Mining for FactorsAndrés Díaz López, Yuan Xue, Xiang Guo. [doi]
- Towards Guidelines for Building Ecosystem Business Models in the Software IndustryKatarina Stanoevska-Slabeva. [doi]
- The Impact of Online Consumption Communities on Crowdfunding SuccessGhazwan Hassna, J. Leon Zhao. [doi]
- Research Methods in the Information Systems Discipline: A Literature Analysis of Conference PapersAnna Kupfer. [doi]
- Health Consumers' Information Search: Daily Search Triggers and Preferred Media CapabilityHyeyoung Hah, Xuan Tan, Manjul Gupta. [doi]
- Scaling Up Beyond Walls: Discovering New Revenue StreamsUchenna Peters, Eric Villafranca, Hope Koch. [doi]
- Structuration analysis of accounting-based ERP system organizational changeMostafa Hassan, Samar Mouakket. [doi]
- Information Technology Firms: Creating Value Through Digital DisruptionGary F. Templeton, Aaron French, Kai Larsen, Stacie Petter, Ben Pace. [doi]
- How ECS Improve Creative Use of Employees' Knowledge?Vetrivadivel Vel, Insu Park. [doi]
- Geographic Variations and The Utilization of Health Care ResourcesTareq Nasralah, Abdullah Wahbeh, Cherie Noteboom, Yong Wang. [doi]
- Estimating Rooftop Photovoltaic (PV) Potential in The Northern Region of Riyadh, Saudi ArabiaYazeed Alsuhaibany, Yan Li. [doi]
- Federated Machine Learning for Translational ResearchManoj A. Thomas, Diya Suzanne Abraham, Dapeng Liu. [doi]
- Monitoring, Surveillance and Technostress-An Enterprise Application CaseKhushboo Agrawal, Monideepa Tarafdar, Sanjiv D. Vaidya. [doi]
- Mobile Health Privacy Concerns - A Systematic ReviewBouabre Koffi, Adel Yazdanmehr, RadhaKanta Mahapatra. [doi]
- Examining the Determinants of Valuable Customer Experiences in O2O Commerce ContextsYen-Hao Hsieh, Hsiao-Hsuan Chiu, Wei-Lun Chang. [doi]
- The effects of Students' Motivation and Student-Student Dialogue, Student-Instructor Dialogue on Students' Perceived E-Learning OutcomesSean Eom. [doi]
- Quitting the Problematic Use of Social Networking Sites: A Theoretical Model and Empirical Examination of Organizational EmployeesChongyang Chen. [doi]
- Designing a Mobile App to Help Young Adults Develop and Maintain Mental Well-BeingMaya Patel, Aman Shah, Krisha Shah, Miloslava Plachkinova. [doi]
- Bimodal IT: Predictability versus ExplorationLuiz Fernando Gopi Valente, Claudia Cappelli, Luciana Salgado. [doi]
- Understanding Information and Communication Technology Diffusion in Developing CountriesSwathi Jagannath, Kimberley Hemmings-Jarrett, Ali Jazayeri. [doi]
- Exploring the Continued Economic Importance of High Tech Industries: Trends and ImplicationsBenjamin Yeo. [doi]
- Towards an Open Ecosystem for Maturity Models in the Digital Era: The Example of the Data Quality Management PerspectiveThomas Schäffer, Christian Leyh, Katja Bley, Mario Schimmele. [doi]
- Ethical and Moral Issues with AIWeiyu Wang, Keng Siau. [doi]
- The Influence of Goal Orientation, Goal Commitment, and Implementation Mindset on Project SuccessMelinda Korzaan, Michael Erskine. [doi]
- Evaluation of cross-organizational business processes for data collection initiativesAlessio De Santo, Ulysse Rosselet, Cédric Gaspoz. [doi]
- People, Process, And Technology Dimensions Of Smart Home AdoptionDeepikah Amirthalingam, Gabrielle Peko, David Sundaram. [doi]
- Virtual Reality in Marketing: Technological and Psychological immersionAnna Carolina Muller Queiroz, Alexandre Moreira Nascimento, Thomas Brashear Alejandro, Romero Tori, Vinicius Veloso de Melo, Fernando de Souza Meirelles, Maria Isabel da Silva Leme. [doi]
- The Impact of Social Media on Ventures' SuccessKangkang Qi, Yen-Yao Wang 0001. [doi]
- Applications of Big Data Analytics in Financial Auditing- A Study on The Big FourMoutaz Haddara, Kuan Lin Su, Kholoud Alkayid, Maged Ali. [doi]
- Blame Distribution Following Information Security BreachesAndrew Miller, Kent Marett. [doi]
- Entrepreneurial IT Firm Value Signaling and the Application of Acquisition DiscountsNikhil Bandodkar, Renu Singh. [doi]
- Block Chain Based Double Auction DesignYang Lu, Xianrong Zheng. [doi]
- From Signs to Insights: the Moderating Role of the Absorptive Capacity between Strategic Foresight and the Firm's SustainabilityYuri Zaidan, Raquel Janissek-Muniz. [doi]
- Text Analytics for Employee Dissatisfaction in Human Resources ManagementDavid Goldberg 0004, Nohel Zaman. [doi]
- The Effect of Age of Information on Its Perceived Usefulness: Implication For "The Right to be Forgotten"Roozmehr Safi. [doi]
- Security Violation Prevention; CPTED in the context of information SecuritySahar Farshadkhah, Jaeung Lee 0003. [doi]
- Social Media Response Based Upon Media RichnessTimothy Kaskela, Jaeki Song. [doi]
- Digital Transformation - Role of Agility in Business ProcessesAbayomi Baiyere, Tommi Tapanainen, Hannu Salmela. [doi]
- Digital Literacy and Self-Regulated Learning: Testing Reciprocal Relationships with Longitudinal DataMuthupoltotage Udayangi Perera, Lesley A. Gardner. [doi]
- Intelligent Home Assistant Use in the Home EnvironmentRobert E. Crossler, France Bélanger, Kim-Kwang Raymond Choo. [doi]
- Measurement Model for the Construct 'Eco-Driving': A Mockup for Real-Time Eco-FeedbackMatthias Gottlieb, Markus Böhm 0001. [doi]
- Conceptualizing IT Service Management as a Management Control System for Business-IT AlignmentDon MacLean, Ryad Titah. [doi]
- Vulnerable Paths Assessment in Cloud for DDoS AttacksManas Tripathi, Arunabha Mukhopadhyay. [doi]
- Cheers to Untappd! Preferences for Beer Reflect Cultural Differences Around the WorldSaulo Brito, Ariane Baldykowski, Sandro Miczevski, Thiago Silva. [doi]
- Challenges in the Instruction of Risk ManagementMichael E. Whitman. [doi]
- How are Metamodels Specified in Practice? Empirical Insights and RecommendationsDominik Bork, Dimitris Karagiannis, Benedikt Pittl. [doi]
- Internal Audit Function (IAF)'s Competencies and Cybersecurity AuditMd. Shariful Islam, Jaeung Lee 0003. [doi]
- Can an Ego Defense Mechanism Model Help Explain Dysfunctional IS Security Behavior?Abhijit Chaudhury, Debasish Mallick. [doi]
- Blockchain-Enabled Trust: The Case of Inter-Firm DataflowJ. Leon Zhao, Shaokun Fan, Eric Zheng. [doi]
- Understanding the E-Viewer System ImplementationNilmini Wickramasinghe, Imran Muhammad, Jeremy Grummet, Louise O'Connor. [doi]
- Points of Failure in the Ransomware Electronic Business ModelBrian Cusack, Gerard Ward. [doi]
- Be Careful What You Read - Evidence of Demand-driven Media BiasHang Dong, Jie Ren, Jefferey Nickerson. [doi]
- An Architectural Design for Learning Analytics in Remote Education EnvironmentsSameer Verma, Andreas Gros, Martin Dluhos. [doi]
- An Investigation of Conversational Agent Relevance, Presence, and EngagementRyan M. Schuetzler, Mark Grimes, Justin Scott Giboney. [doi]
- Exploring Project Management Methodologies Used Within Data Science TeamsJeff Saltz, Nicholas Hotz, David Wild, Kyle Stirling. [doi]
- Understanding ERP Learning Success in Flipped ClassroomsSaifur Bhuiyan, Soheil Goodarzi, Jennifer Large, Christina Serrano, Susan Bristow. [doi]
- Social Media-based Overweight Prediction Using Deep LearningLuwen Huangfu, Daniel Zeng. [doi]
- Decision-making participation and locus of control among military MIS managers in PolandMonika Ziobrowska. [doi]
- Beyond Lift in Predictive Modeling: Duo-mining to Glean Strategic InsightsQ Chung. [doi]
- The effects of perceived health status on privacy concerns and opt-in intention toward Health Information Exchanges (HIEs)Pouyan Esmaeil Zadeh, Mahed Maddah. [doi]
- Big Data Analytics in Human Resource Management and Their Impact: Theoretical Development and Empirical ResultsHelen Han-Haas, Gang Peng. [doi]
- Trusting Artificial Intelligence in HealthcareWeiyu Wang, Keng Siau. [doi]
- A review of the IS strategic alignment literature: A replication studyJason Williams, Henry Torres, Traci Carte. [doi]
- Factors Influencing Student Enrollment in the Information Systems MajorMinoo Modaresnezhad, Jeff Cummings. [doi]
- Internet Censorship and Economic Impacts: A case study of Internet outages in IndiaChris Leberknight, Nivitha Raveendran. [doi]
- Impact of Free Online Medical Consulting Service on Physician PerformanceYiyang Bian, Jianwei Liu, Dong Jing, Qiang Ye. [doi]
- E-Business Value in Small and Medium-Sized Enterprises in Southern Africa: A Quantitative Content Analysis of WebsitesMeduduetso Tsumake, Michael Kyobe. [doi]
- Predicting the Performance of Basketball Players Using Automated Personality MiningDominik Siemon, Rangina Ahmad, Jan-Paul Huttner, Susanne Robra-Bissantz. [doi]
- 'If at First You Don't Succeed, Try, Try Again' Might Not Always Make Sense: On the Influence of Past Technology Category Satisfaction on Technology UsageClaus-Peter H. Ernst, Birte Malzahn. [doi]
- A Clustering Based Social Matrix Factorization Technique for Personalized Recommender SystemsDivyaa L. R., Aniruddha Tamhane, Nargis Pervin. [doi]
- So Talk to Me: Designing Voice-enabled Tools for Health-related InformationSandeep Purao, Yanling Xu. [doi]
- Classifying Big Data Technologies - An Ontology-based ApproachMatthias Volk 0002, Matthias Pohl, Klaus Turowski. [doi]
- Neural Correlates of Flow ExperienceFiona Fui-Hoon Nah, Tejaswini Yelamanchili, Langtao Chen, Keng Siau, Chandana Mallapragada. [doi]
- Real-Time Integrated Crime Information System ModelChikodili Ugwuishiwu, Mathew Okoronkwo, Caroline Asogwa. [doi]
- Employee Database Creates Value for Labor Hire Firm and ClientsJon Heales, Renae Agrey, Tri Lam. [doi]
- Goal Orientations and Their Impacts on Advice Ties and Employee Outcomes: A Longitudinal Field Study of an Enterprise System ImplementationSonakshi Sharma, Tracy Ann Sykes. [doi]
- Beyond Facts: A New Spin on Fake News in the Age of Social MediaDavid Murungi, Sandeep Purao, David Yates. [doi]
- Manual Versus Online Card Sorts: A Cautionary Tale for IS ResearchersJames S. Denford, Kurt B. Schobel. [doi]
- Assessing Fraud Risks in IT SecurityRandi Jiang, Jae Ung Lee. [doi]
- Challenges and Future Directions of Automated Cyberbullying DetectionNargess Tahmasbi, Alexander Fuchsberger. [doi]
- An Application System Landscape Engineering Process Framework (ASLEP)Johannes Hintsch, Karthik Gali, Naoum Jamous, Klaus Turowski. [doi]
- What are the problems and their solutions in IT Project manager selection?Ali Reza Afshari, Jolanta Kowal. [doi]
- A Recommender System for Cultural Restaurants Based on Review Factors and Review SentimentSonya Zhang, Mohammad Salehan, Andrew Leung, Ishmene Cabral, Navid Aghakhani. [doi]
- There and back again: the cyclical process of IT useJason Williams, Saurabh Gupta. [doi]
- IS/T Leadership: A Comprehensive Review of Published ResearchAbhishek Tripathi, Deepak Khazanchi. [doi]
- A Computational Framework for Railway Incident Analysis: from Data Mining to Data VisualizationSérgio Viademonte, Cleidson De Souza, Nikolas Carneiro, Jair Ferreira, Wallace Lira. [doi]
- Automated Machine Learning (AutoML) for all Business Majors and LevelsKai Larsen. [doi]
- Healthcare Analytical System to Predict Necessary Resources in Case of CrisesLily Popova Zhuhadar. [doi]
- Implications of Web APIs for Teaching and ResearchTimothy Olsen. [doi]
- Perceived IT Ambiguity: Development of a Measurement InstrumentJean-Charles Pillet, Kevin Carillo, Claudio Vitari, Federico Pigni. [doi]
- Caracterizando os usuários de Internet no Brasil: uma anãlise a partir das habilidades digitais - Characterizing Brazilian Internet Users: An analysis based on Digital SkillsMarcelo Henrique de Araujo, Nicolau Reinhard. [doi]
- Architectural Drivers of EHR Integration and AssimilationRishikesh Jena, Vishal Shah. [doi]
- Organizations' Proactive Information Security BehaviorFereshteh Ghahramani, Daniel Chen, Jingguo Wang. [doi]
- The Role of Security Beliefs in the Use of Personal Health Records (PHR)Mohamed Abdelhamid, Spyridon Samonas. [doi]
- IT Operation Management - A possibility in the flux of digitizationNaoum Jamous, Christian Haertel, Marco Finkendei, Matthias Volk 0002, Johannes Hintsch. [doi]
- CSSO: Ontology-Based Framework for Semantic Interoperatability Between Heterogeneous Web SourcesSamreen Kazi, Quratulain Rajput, Shakeel A. Khoja. [doi]
- Mobile Micro-work in South AfricaZaakirah Roomaney, Jean-Paul Van Belle, Pitso Tsibolane. [doi]
- Measuring Corporate Transparency in Sustainability ReportingMohammed Zakaria, Divakaran Liginlal, Chadi Aoun. [doi]
- Formulation of Integrated e-Government Implementation Framework (eGovIF): case of developing economiesAbdou Karim Jallow. [doi]
- Blockchain Technology Impacting Property Rights and Transaction Cost RegimesStefan Hopf, Claudia Loebbecke, Michel Avital. [doi]
- A Problem-Solving Based Approach to Teaching Database DesignAnil Singh, Vikram S. Bhadauria, Anil Gurung. [doi]
- Toward a Gamified Mobile Application to Improve Eco-Driving: A Design and Evaluation ApproachKenan Degirmenci. [doi]
- Experience on Consumer Purchasing Decision-making: a Study of Anchoring EffectsJiang Hu, Wei He. [doi]
- Social Media, Organisation-Community Relationships and Co-creation: A Case of Nonprofit OrganizationsFatuma Namisango, Kyeong Kang. [doi]
- Teenage social media use and coping with stress: the case of Alzheimer'sAkum Dhillon. [doi]
- Designing a Healthcare Data Analytics Course: A Contextual Active Learning ApproachRachida Parks, Fay Cobb Payton. [doi]
- Smart Locks: Evaluating the Roles of Security, Trust, and Perceived Risk on Consumer AdoptionDavid Bourrie. [doi]
- A paradigm shift for bring your own device (BYOD)Donald Kerr, Amir Talaei-Khoei, Amir Hossein Ghapanchi. [doi]
- Initial Coin Offerings (ICOs): An Introduction to the Novel Funding Mechanism Based on Blockchain TechnologyMathieu Chanson, Marten Risius, Felix Wortmann. [doi]
- How Prior Users' Helpfulness Votes on a Review Influence Subsequent Users' Trust of the Review and Corresponding Product Evaluations in E-commerce ContextJing Li, Xin Xu, Eric Ngai. [doi]
- Improving Scrum Adoption with GamificationRita Marques, Gonçalo Costa, Miguel Mira da Silva, Daniel Gonçalves, Pedro Gonçalves. [doi]
- Healthcare Hyperchain: Digital Transformation in the Healthcare Value ChainJoseph M. Woodside, Shahram Amiri. [doi]
- Final Report of the ACM/IEEE/AIS/IFIP Joint Task Force (JTF) on Cybersecurity EducationYair Levy, Herbert J. Mattord. [doi]
- Technology Materiality and Individual SensemakingSampath Bemgal. [doi]
- Inconsistency Investigation between Online Review Content and RatingsGuohou Shan, Dongsong Zhang, Lina Zhou, Lingge Suo, Jaewan Lim, Chunming Shi. [doi]
- Smartphone Addiction and Cognitive Performance of College StudentsWeihong Ning, Fred D. Davis, Roman Taraban. [doi]
- Moral and Subjective Norms: How do they Effect Information Security Compliance?Punit Ahluwalia, Mohammad I. Merhi. [doi]
- Analytics and Evidence-based Decision MakingDaniel J. Power, Dale Cyphert, Roberta M. Roth. [doi]
- Mirror, Mirror on the Wall: An Experiment on Feedback and Overconfidence in Computer-Mediated TasksCarlo Gabriel Porto Bellini, Malu Lacet Serpa. [doi]
- Reputation in Repeated Pay-to-Bid AuctionsAnqi Wu, Dharma Kwon, Sung Kim. [doi]
- Audience Evaluation and Biometric Technology: Challenges and OpportunitiesAndrea North-Samardzic. [doi]
- Technological Advancement in Marketing: Co-creation of Value with CustomersMina Tajvidi, Yichuan Wang, Nick Hajli. [doi]
- The Exploration of E-personality in IT-enabled Value Co-creationChih-Yuan Chou. [doi]
- What Attracts the Best Information Technology Talents? Employer Branding in Transition EconomiesDorota Dobija, Grzegorz Mazurek, Narcyz Roztocki, Heinz Roland Weistroffer. [doi]
- Social Networking in a Virtual EnvironmentAlsius David, Md Rasel Al Mamun, Daniel Peak. [doi]
- Deep Intelligent Systems for Time Series Prediction: Champion or Lame Duck? - Evidence from Crude Oil Price PredictionKai Heinrich, Vera Fleißner. [doi]
- Supporting Diffusion of IoT Solutions Exemplified by the ChainPORT InitiativeJöran Tesse, Ingrid Schirmer, Paul Drews, Sebastian Saxe, Ulrich Baldauf. [doi]
- Exploring an individual's commitment toward the social network sitesHsin-Yi Huang, Sheng-Pao Shih. [doi]
- IT Project Crisis and EscalationBruce C. Herniter, Michele Maasberg. [doi]
- Big Data Analytics for New Product Success (Product Innovation)Mina Tajvidi, Nick Hajli, Yichuan Wang. [doi]
- smartCVC: Data Science Meets Corporate Venture CapitalRuiyun Xu, Hailiang Chen, J. Leon Zhao. [doi]
- Enterprise Systems Adoption and Implementation in Chinese SMEs: Exploring relationships between user firms and technology providers through ANTZheng Xu, David Brown, Mark Stevenson. [doi]
- The Business Value of Engaging in Counter-Breach InitiativesTaha Havakhor, Tianjian Zhang, Bryan Hammer. [doi]
- Learning Information System Consulting through the Serious Game CityOneOlfa Chourabi, Imed Boughzala, Daniel Lang. [doi]
- The IT Department's Role in Enabling Business Value from Business AnalyticsMichael Koelbl, Franz Lehner, Saji K. Mathew. [doi]
- The Mediating Role of Psychological Ownership in Increasing Information Security Stewardship BehaviorsObi Ogbanufe. [doi]
- A Conceptual Model to Understand Privacy Concerns in a Social P2P Payment AppMohsen M. Jozani, Emmanuel Ayaburi, Myung Ko, Kim-Kwang Raymond Choo. [doi]
- Integration of Mobile Health and EHRNeetu Singh, Sumantra Sarkar, Upkar Varshney. [doi]
- Improving Security Message Adherence through Improved Comprehension: Neural and Behavioral InsightsBonnie Brinton Anderson, Daniel Bjorn, Jeffrey L. Jenkins, C. Brock Kirwan, Anthony Vance. [doi]
- Relationship between Digital Business Intensity and Process Innovation: An Empirical ExaminationJoseph Nwankpa, Yaman Roumani. [doi]
- Using Government Microblogs to Enhance Citizen EngagementLihua Wang, Xin (Robert) Luo. [doi]
- Individual Creativity Towards Technology Business Incubator PerformanceMuhammad Binsawad, Osama Sohaib, Igor Hawryszkiewycz, Asma Aleidi. [doi]
- Teaching Blockchain in the MIS CurriculumDavid Firth. [doi]
- Benefits of Blockchain for Digital Social CurrencyDénis Rodrigues, Maria Alexandra Cunha, Fernando Meirelles, Eduardo Diniz. [doi]
- Cyber-rumor Sharing: The Case of Zika VirusTejaswi Volety, Rohit Valecha, Naga Vemprala, Kyounghee Hazel Kwon, H. Raghav Rao. [doi]
- Designing Incentive-Pricing Mechanisms to Promote Health Information ExchangeSaeede Eftekhari, Niam Yaraghi, Ram D. Gopal, Ram Ramesh. [doi]
- Using Social Media Data to Improve Situational Awareness during Emergent EventsNaga Vemprala, Charles Zhechao Liu, Rachael Ruizhu Xiong, Kim-Kwang Raymond Choo. [doi]
- "Agile Meets Non-Agile": Implications of Adopting Agile Practices at EnterprisesDaniel Gerster, Christian Dremel, Prashant Kelker. [doi]
- The Impact of Enterprise Social Media Identity on Job Performance and Job SatisfactionRasha Alahmad, Casey Pierce, Michelle Carter, Lionel Robert. [doi]
- Predicting Re-loan Success based on Friendship Network Characteristics in the Online Micro-loan MarketplaceHongming Gao, Carol Xiaojuan Ou, Hongwei Liu, Paul A. Pavlou, Hui Zhu, Mingjun Zhan. [doi]
- Information Systems and the Opioid CrisisAriann Nassel, Sue S. Feldman, Benjamin L. Schooley, James Galbraith, Suzanne Muir. [doi]
- IKON-OWL: Using Ontologies for Knowledge Representation of Local Indigenous Knowledge on DroughtAdeyinka K. Akanbi, Muthoni Masinde. [doi]
- The Emergence of Discursive Leaders in Online CommunitiesChad Diaz II, Sumali Conlon, Milorad Novicevic, Tony Ammeter. [doi]
- Factors that Influence Lurking Behaviors in Open Innovation Communities: The Role of Social CapitalJames Wairimu, Francis Kofi Andoh-Baidoo. [doi]
- Bringing Dead Brands Back From the Grave: The Power of Social MediaFadi Almazyad, Eleanor Loiacono, Purvi Shah. [doi]
- What Makes Games Fun? Card Sort Reveals 34 Sources of Computer Game EnjoymentOwen Schaffer, Xiaowen Fang. [doi]
- Can IoT Devices Be Trusted? An Exploratory StudyDonald Privitera, Lei Li. [doi]
- Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and TrustDavid Harborth, Sebastian Pape 0001. [doi]
- The Role of Media on User Satisfaction with City Cultural Digital Stories: A Case StudyFariba Nosrati, Brian Detlor. [doi]
- Necesidad de Uso de Tecnologías para el Aprendizaje y el Conocimiento en Adolescentes - Need of Use of Knowledge and Learning Technologies in AdolescentsMarco Antonio Vera-Ramírez, Guillermo Rodríguez-Abitia. [doi]
- Oil Prices Forecasting: A Hybrid ApproachManas Tripathi, Inderjeet Kaur. [doi]
- Requirements Analysis for an Open iPaaS: Exploring the CSP, ISP, and SME ViewMax-Marcel Theilig, Thorsten Pröhl, Rüdiger Zarnekow. [doi]
- Privacy Assurances and Information Sensitivity on the Intention to DiscloseOscar Lopez, Traci Hess. [doi]
- C-R-P-M-I: A framework to model cyber risk from phishing and mitigation through insuranceArunabha Mukhopadhyay, Baidyanath Biswas, Shounak Pal. [doi]
- Third parties in the context of Smart Grid: information processing theory based approachSalma Trid. [doi]
- An Overview of Crowd-based Markets and Racial DiscriminationLauren Rhue. [doi]
- A Framework for Creating Secure and Memorable PasswordsMartha McNeil, Omar El-Gayar, Cherie Noteboom. [doi]
- Can Information Security Awarness Mitigate Resistance Towards Patients Healthcare Portals?Bahae Samhan, Roslin Hauck. [doi]
- The Impact of Digital Transformation on Sourcing Strategies in the Financial Services Sector: Evolution or Revolution?Ugur Demirbas, Heiko Gewald, Bernhard Moos. [doi]
- Framework to explain factors affecting severity of exposure of medical data breach: a statistical analysisShounak Pal, Arunabha Mukhopadhyay. [doi]
- Theoretical Perspectives on Usage of e-Government Services: A Literature ReviewMartha Liliana Correa Ospina, Beatriz Helena Diaz Pinzon. [doi]
- Set-Theoretic Methods: Qualitative Comparative Analysis (QCA) for IS ResearchYoungki Park, James S. Denford. [doi]
- Methods and Metrics for Estimating and Planning Agile Software ProjectsEdna Dias Canedo, Ruyther Parente da Costa. [doi]
- Online WOM Spillover Effect in the U.S. Automobile IndustryYen-Yao Wang 0001. [doi]
- Validating Hollywood Golden Rules: A Preliminary StudyMorgan Wood, Yong Seog Kim. [doi]
- How Digital Business Strategy Affects Profitability: Opening the 'Black Box' of PerformanceMatthias Murawski, Julian Bühler, Malte Martensen, Christina Rademacher, Markus Bick. [doi]
- Personality Traits and the Digital Entrepreneur: A New Breed or Same Actor?Cesar Bandera, Katia Passerini. [doi]
- Examining the Competencies of the Chief Digital OfficerSamuli Tahvanainen, Eetu Luoma. [doi]
- Large-Scale Agile Methodology AcceptanceDinesh Batra. [doi]
- A Framework Proposal for Examining the Effect of ICT Adoption Level on Innovativeness in SMEsBüsra Alma, Erman Coskun, Mehtap Ozsahin. [doi]
- Whose Stake in Open Source Software ProjectsCarlos Denner dos Santos. [doi]
- Decision Support to Business Intelligence and Big DataNatalie Gerhart, Mehrdad Koohikamali. [doi]
- Digital Volunteers for Emergency Management: Lessons from the 2016 Central Italy EarthquakeDario Bonaretti, Gabriele Piccoli. [doi]
- Knowledge Workers' Expectations Towards a Digital WorkplaceTobias Kissmer, Julian Knoll, Stefan Stieglitz, Rainer Groß. [doi]
- Gamification for Achieving Sustained Engagement in Programming ClassesNargess Tahmasbi, Alexander Fuchsberger. [doi]
- How Do You Cope: Individuals' Responses to Identity Theft VictimizationYuan Li 0002, Adel Yazdanmehr, Jingguo Wang, H. Raghav Rao. [doi]
- An Empirical Study on the Factors Contributing to Disclosing Personal Information Online: Insecurity in the Digital AgeIqbal Amiri, Ling Wang, Yair Levy, Inkyoung Hur. [doi]
- The Role of Attention and Neutralization in Posting Malicious Comments OnlineHan-Min Kim, Gee-Woo Bock. [doi]
- Privacy, Security and Legislative Actions Related to Drone UsageBeverly Medlin, Sandra A. Vannoy, Austin Eggers. [doi]
- Real time Monitoring of the Health of InfantsTina Susan Thomas, Abraham Cyril Issac. [doi]
- A Framework for Teaching the Undergraduate Data Analytics CourseJason Triche. [doi]
- Balancing Workload and Care Communication Costs in Nurse Patient AssignmentHaoqiang Jiang, Debra E. VanderMeer, Paulo Gomes. [doi]
- Digital Transformation in Healthcare: Enabling Employee Co-Creation through Web 2.0Niels Frederik Garmann-Johnsen, Migle Helmersen, Tom Roar Eikebrokk. [doi]
- A Study of News Credibility and Trust on Social Media - A Multi-Cultural EvaluationMohammadreza Mousavizadeh, Bidyut Hazarika, Alan Rea 0002. [doi]
- First-Mover (Dis)Advantages of Investment in Innovative IT Applications: Lesson from ERP AdoptionHo-Chang Chae. [doi]
- Facts or Opinions? Making Sense through Social MediaJose Ortiz. [doi]
- A Social Recommendation Mechanism for Peer-to-Peer LendingTing-Kai Hwang, Yung-Ming Li, Jun-Fei Wan. [doi]
- Digital Currencies and Employers' Expectations of Business GraduatesCarmella Parker, Lily Pharris, Eddie Horton. [doi]
- Alert Fatigue and PersonalityThant Syn. [doi]
- Resource-based Perspective on Slack and Data BreachQian Wang, E. W. T. Ngai. [doi]
- Investigating of In-app Advertising Features' Impact on Effective Clicks for Different Advertising FormatsXiaoyu Li, Xia Zhao, Lakshmi S. Iyer. [doi]
- Governance of collaborative projects organized as communitiesIsabela Ferraz, Carlos Santos Jr.. [doi]
- The Interaction Between Organizational Culture and Knowledge Sharing via SocializationAli Baker, Timothy Ellis. [doi]
- Conceptual Foundations of Information Systems LeadershipAli Ghawe, Kathryn Brohman. [doi]
- Water Wells Site Selection in East Africa Using GIS ApplicationsClaudia Caceres, Sarah Osailan. [doi]
- 'Doing Good Matters': The Role of Problem Context in Improving Programming ProjectsLakshmi S. Iyer, Indika Dissanayake, Rudolph Bedeley. [doi]
- Archetypes for Industry 4.0 Business Model InnovationsJörg Weking, Maria Stöcker, Marek Kowalkiewicz, Markus Böhm 0001, Helmut Krcmar. [doi]
- IT-enabled dynamic capabilities, environmental uncertainty, and competitive performance: A configurational approachPatrick Mikalef. [doi]
- Detecting Biased Items When Developing a Scale: a Quantitative ApproachJean-Charles Pillet, Claudio Vitari, Federico Pigni, Kevin Carillo. [doi]
- Detection of Review ManipulationKavita Krishnan, Yun Wan. [doi]
- Quality of Tests in Virtual Learning Environments: a Study Based on Classical Test Theory and Facility and Discrimination IndexesBruno Araújo, Adriana Viana, Daielly Mantovani, Celso Machado Jr. [doi]
- Interests and Agency in AI: The case of image with Inception 3 modelAnna Sidorova. [doi]
- Virtual Reality and Blockchain Technology in the Era of 5G: Disrupting Business and SocietyAaron French, Marten Risius, J. P. Shim, Patrick S. Bordnick, Jeffrey Parsons, David Holtman. [doi]
- Creating Environmental Sensemaking through Green IS: An Experimental Study on Eco-Nudging Paper Printing BehaviorKenan Degirmenci, Jan Recker. [doi]
- Teaching Big Data Analytics and Machine Learning with Cloud Technology and PythonThuan Nguyen. [doi]
- Behind Cyber Doors: Securing the Internet of SelfAlaa Nehme, Joey F. George. [doi]
- Leadership and Group Cohesion on Team Performance in Virtual TeamsRobert Schanke, Indira Guzman, Hyo-Joo Han. [doi]
- Smartwatches as Smart Shopping Devices: Enhanced Information Retrieval in an Omni-channel EnvironmentTeun Koldeweij, Ton Spil, Björn Kijl. [doi]
- Conceptualizing and Developing a Future Ready Competency and Educational Content Curation (CECC) PlatformJungwoo Lee, Wooju Kim, Taeyon Kim, Jaemin Myung, Hong Won Suh, Soyoun Kang. [doi]
- A portfolio of knowledge integration mechanisms in open ecosystemsFranck Loic Soh Noume, Jennifer Large, Beverly A. Hodges-McDaniel. [doi]
- Improving Decision-Making for Incident Commanders by Analyzing Visualizations for First Responder's Vital InformationVikas Sahu, Ann L. Fruhling. [doi]
- Dynamics of Information Revelation in Online ReviewsYichen Cheng, Wael Jabr, Sanjay Srivastava, Kai Zhao. [doi]
- Leading Information Systems Academic Teams to High PerformanceJoão Varajão, Isabel C. Moura. [doi]
- Using Open Healthcare Datasets to Teach Health Data AnalyticsChi Zhang. [doi]
- In search of project leadership principles for navigating the complexity of IT projectsMogens Frank Mikkelsen. [doi]
- Wearable Sensor Based Gait Asymmetry Visualization ToolArif Reza Anwary, Hongnian Yu, Michael Vassallo. [doi]
- Platforms for Sharing Health-related Information: A Preliminary Design ProposalIan-Manuel Markwei, Sandeep Purao. [doi]
- Routine Use of Mobile Health Services: Promotion or PreventionFei Liu, Xitong Guo, Xiaofeng Ju. [doi]
- The impact of product placements in YouTube tutorials on the buying decisionAriane-Tabea Schüller. [doi]
- Leadership competency and quality of life of IT professionals in transition economiesJolanta Kowal, Alicja Keplinger, Juho Mäkiö, Magdalena Kapala. [doi]
- Development of a Measuring Instrument for Storytelling via a Virtual NarratorGuillaume Faddoul, Samir Chatterjee. [doi]
- Use and Influence of Social Media on student performance in Higher Education Institutions in CameroonJosué Kuika Watat, Samuel Fosso Wamba, Jean-Robert Kala Kamdjoug. [doi]
- Processing Electric Vehicle Charging Transactions in a Blockchain-based Information SystemBenedikt Kirpes, Christian Becker. [doi]
- Why Do Users Participate in Online Communities? The Effect of Motivational Affordances, Comments, and Peer Contribution on ContinuanceLangtao Chen, Aaron Baird, Detmar W. Straub. [doi]
- Costumes in League of Legends - Replicating Findings from Cyworld and HabboBastian Kordyaka, Marius Müller 0001, Katharina Jahn, Oliver Heger, Björn Niehaves. [doi]
- A Practice-Based Study on the Challenges of IT Governance Auditing in GhanaAlexander Ekow Asmah, Michael Kyobe. [doi]
- Value of Electronic Health Records since HITECH: A Literature ReviewShikha Modi, Sue Feldman. [doi]
- Gamifying Sakai: Understanding Game Elements for LearningKingsley Ofosu-Ampong, Richard Boateng. [doi]
- The Influence of Information Display and Availability on Reviewer Usefulness StatusWael Jabr, Zirun Qi, Ritu Lohtia, Monica D. Guillory. [doi]
- Master Curriculum in "Digital Service Innovation"Michel Thomsen, Maria Åkesson. [doi]
- Examining Internet Behavior of Young Technology-Literate Consumers in IndiaNarasimha Rao Vajjhala, Kenneth David Strang. [doi]
- Data Science: Recruiting, Comforting and Intertwining Multi-disciplinary Students in the General Education CurriculumLaurel Miller. [doi]
- Agile Process Consultation - An Applied Psychology Approach to AgilityLucas Gren. [doi]
- Towards an Extended Enterprise Architecture Meta-Model for Big Data - A Literature-based ApproachFabian Burmeister, Paul Drews, Ingrid Schirmer. [doi]
- Operationalizing Cultural Differences in the Use of New Media TechnologyClaudia Loebbecke, Katherina Michalenko, Stefan Cremer. [doi]
- Cyber Risk Quantification and Mitigation Framework for Healthcare using Machine LearningShounak Pal, Arunabha Mukhopadhyay. [doi]
- Assessing the potential Learning from simulation GamesTimo Lainema, A. K. M. Najmul Islam, Kirsi Lainema. [doi]
- Extending Web Services with Agent Models and PatternsHabibullah Aminu, Muhammadou M. O. Kah, Kweku-Muata Osei-Bryson. [doi]
- Developing IT Applications without Coding: An Experiential Inter-Team-Based ApproachGerard De Leoz, Farouq Alhourani. [doi]
- Key Management and Governance Challenges when Executing Data Science / Analytics ProjectsJeffrey Saltz, Michael Goul, Frank Armour, Ramesh Sharda. [doi]
- A Review of Systems Science in the Information Systems DisciplineMichael Erskine, Misagh Faezipour. [doi]
- E-Learning Modules for Sustainable Management: Potentials and ChallengesJan Moritz Anke, Matthias Schumann. [doi]
- Study on Crowdfunding Patterns and Factors in Different PhasesBih-Huang Jin, Yung-Ming Li, Zhi-wei Li. [doi]
- E-Commerce and Social Media Use in CambodiaMargaret Meiling Luo, Sophea Chea. [doi]
- Who Are the Users of Digital Innovation for Financial Inclusion? The Case of M-ShwariWenxiu Nan. [doi]
- Obstacles to Adopting Speech Recognition in Emergency Services SolutionsMichael Strobel, Catherine Dwyer. [doi]
- Using analytics to gain insights into the cryptocurrency marketXuan Wang, Helmut Schneider. [doi]
- Talk your way to serial success: Creator post-campaign interaction in crowdfundingOnochie Fan-Osuala, Daniel Zantedeschi, Wolfgang Jank. [doi]
- Beacon-based Customer Tracking across the High Street: Perspectives for Location-based Smart Services in RetailJan Hendrik Betzing. [doi]
- IT Strategy and Business Strategy Alignment: Assessing Risk of Misalignment in Large Financial InstitutionsSuhanthi Kamesh, Simon Jin. [doi]
- Post-Course Continuity of Entrepreneurial Class ProjectsAndrés Díaz López. [doi]
- IT for diabetes self-management - What are the patients' expectations?Omar F. El-Gayar, Tareq Nasralah, Ahmed El Noshokaty. [doi]
- Lessons Learned from using Gamification for Teaching Business Informatics to First Year Undergraduate StudentsAmir Talaei-Khoei, Donald Kerr, Luvai Motiwalla. [doi]
- Drivers and Effects of Inter-Organizational Systems (IOS) use in a developing countryLeonard Agbenyo, David Asamoah, Benjamin Agyei-Owusu. [doi]
- An Exploration of Agile Project Management & Technical DebtChristopher Sibona. [doi]
- Best Practices for Development and Delivery of Graduate Health Informatics CurriculumElliot B. Sloane, Nilmini Wickramasinghe, Vijay Gehlot, Angelo Thalassinidis, Doug Fridsma, Robert E. Hoyt. [doi]
- Transparency of Customer-Facing Order Processes: Can We Ever Have Too Much of a Good Thing?Iaroslava Dutchak. [doi]
- Conflicting logics in IT Governance: Achieving ambidexterity in healthcare organisationsMichael Kizito, Evelyn Kahiigi. [doi]
- The Role of mHealth for Equitable Access to Healthcare for Rural ResidentsBecky Deitenbeck, Sajda Qureshi, Jason Xiong. [doi]
- Changing Brand Attitudes through Influencer MarketingYuyang Liang, Young Lee-Argyris, Aziz Muqaddam. [doi]
- Are graduate programs offered by IS relevant in the age of digital disruption?Munir Mandviwalla, Mark Thouin, Rassule Hadidi, Andrew Wasser, Balasubramaniam Ramesh. [doi]
- Course Offering Support SystemChristopher Claypool. [doi]
- Leveraging DevOps for mission critical softwareMichael Gall, Federico Pigni. [doi]
- Examining the Role of Individuals' Need for Online Social Interactions and Interpersonal Incompetence in Game AddictionSarbottam Bhagat, Dan J. Kim. [doi]
- How traditional incumbents react to sharing economy entrants? Evidence from the car industryYue Guo, Fu Xin, Qiong Jia, Stuart J. Barnes, Ying Wang. [doi]
- Understanding the Effect of Trust, Familiarity and Uncertainty on Use AirbnbS. P. Ng, Eric W. T. Ngai, Chun Fong Lei. [doi]
- Gaia Maturity Model to Deploy IT Services ContinuityWagner Ueno, Rodolfo M. Barros, Jacques Duilio Brancher. [doi]
- It Is So (If You Think So): Social Representation Theory and Constructs Definition in the MIS Area in BrazilLuiz Antonio Joia, Gustavo Marchisotti. [doi]
- A Citation Analysis of the Basket of Eight IS JournalsParham Amiri, Mahdi Moqri. [doi]
- A Study of Perception Factors that Affect Green IT BehaviorNelson K. Y. Leung, Sim Kim Lau, Hannarong Shamsub, Sim Yee Lau. [doi]
- Decision Support for Urban E-Grocery OperationsMax Leyerer, Marc-Oliver Sonneberg, Michael H. Breitner. [doi]
- Theories for Analysing Innovation and Technology in Emerging Financial Markets: The Case of Algorithmic and High Frequency TradingWendy Currie, Jonathan J. M. Seddon, Ricky Cooper, Ben Van Vliet. [doi]
- Guilt Appeals and Information Security Policy ComplianceEunhee Park, Jongwoo Kim, Elaine Shan. [doi]
- Mobile Government Adoption: Citizen-Centric ApproachMohammad Alomari. [doi]
- Mendix as a solution for present gaps in Computer Programming in Higher EducationMichael Litman, Daniela Field. [doi]
- More Than Meets the Eye: A Case Study on the Role of IT Affordances in Supporting ComplianceAndrea Zasada, Tung Bui. [doi]
- Uso de CRM Social para mejorar Campañas de Marketing Dirigido en Sector Minorista - Use of Social CRM to improve Targeted Marketing Campaigns in the Retail SectorVíctor Wilfredo Bohórquez López, Edwin Huaynate, Christiam Mendez. [doi]
- Motivating Health Information Exchange Use as a Formative Construct for Measuring Quality of IT-Enabled Healthcare DeliveryDaniel Narh Treku, Nan Xiao. [doi]
- Investigating Privacy Concerns of Internet of Things (IoT) UsersPhilip Menard, Gregory Bott. [doi]
- Effects of Occupational Culture of IT Professionals on Job Satisfaction in JapanOsam Sato, Prashant Palvia, Tim Jacks, Hiroshi Sasaki. [doi]
- E-Services Provided by Local Governments in Chile: A Comparative AnalysisValentina Bustos, Aurora Sánchez-Ortiz. [doi]
- Why do You Like Me? Why Users Like an SME PageMarko Budler, Peter Trkman. [doi]
- Legality and Ethics of Web ScrapingVlad Krotov, Leiser Silva. [doi]
- Rethinking Technology Acceptance: Towards a Theory of Technology UtilizationAmir Hossein Ghapanchi, Amir Talaei-Khoei. [doi]
- Digital Currencies & Cryptocurrencies as Alternative Providers of Institutional TrustMayur Joshi, Nuruddin Ahmed, Jean-Philippe Vergne. [doi]
- We Need to Talk! Antecedents and Consequences of Children's Smartphone Use - A Literature ReviewMargarita Gladkaya, Jana Gundlach, Cora Bergert, Annika Baumann, Hanna Krasnova. [doi]
- Is Information Systems Late to the Party? The Current State of DevOps Research in the Association for Information Systems eLibraryJason Sharp, Jeffry Babb. [doi]
- Design of a Colorectal Cancer Data WarehouseBunyamin Ozaydin, Upender Manne, Sue Feldman. [doi]
- Security Related Information Sharing among Firms: Potential Theoretical ExplanationsRadha Appan, Dinko Bacic, Sreedhar Madhavaram. [doi]
- Balancing Innovation and Standardization in IS Course ContentJames Nowotarski. [doi]
- The Impact of Performance-Contingent Monetary Incentives on User-Generated Content ContributionYinan Yu, Warut Khern-am-nuai, Alain Pinsonneault. [doi]
- The Complementarity between Information Technology Management and Human Resource ManagementSalman Aljazzaf, Sunil Mithas, Ali Tafti. [doi]
- Signaling your Religion: How Strength of Religious Identity Presentation over Social Media Effects Hireability AssessmentsMarie Esposito, Philip L. Roth, Jason Thatcher. [doi]
- Processing Electronic Medical Records to Improve Predictive Analytics for Hospital ReadmissionsHamed Majidi Zolbanin. [doi]
- Investigating User Disclosure of Sensitive Information: An Extended ELM TheoryKelvin King-Kizito, Jun Sun. [doi]
- Examining the Role of Information Quality, Relevance, Expertise in News Sharing on Social MediaSarbottam Bhagat, James Parrish. [doi]
- Investigating the impact of governance on value co-creation in analytics ecosystemsHossein Kalantar. [doi]
- Influence of Digital Transformation on Teaching PracticesMarcelo Amorim, Fernando Meirelles, Alberto Albertin, Maria Alexandra Cunha. [doi]
- Evaluación de Efectividad de Recursos Educativos Digitales - Evaluation of Effectiveness of Digital Educational ResourcesLuis Alberto Gómez del Campo, Guillermo Rodríguez-Abitia. [doi]
- How Do We Know If Our Project is Successful? A Call to Reconceptualize Project SuccessMichael J. Cuellar. [doi]
- Media Impact on Patient Empowerment in Complicated Medical SituationsIris Reychav, Roger McHaney, Lin Zhu, Rami Moshonov. [doi]
- Understanding students' learning behavior outside of the classroomMichael Kallookaran, Dominik Siemon, Susanne Robra-Bissantz. [doi]
- A Review on the Identification and Classification of Impediments in Software FlowNoel Carroll, Mairead O'Connor, Henry Edison. [doi]
- Using Twitter to Predict County-Level Cancer Mortality: Five Stages of Grief FrameworkAnton Ivanov, Sanjukta Smith, Raj Sharman. [doi]
- Shadow-IT system and Insider Threat: Opportunity as a Situational PerspectiveAsif Shaikh. [doi]
- Disruptive Digital Technology Services: The Case of Uber Car Ridesharing in GhanaRobert Ohene-Bonsu Simmons. [doi]
- Interaction-Aware Watching Duration Prediction on Live Streaming PlatformsJiawei Chen, Hongyan Liu, Jun He 0008, Sanpu Han. [doi]
- A proposal of a methodology for software ecosystems developmentAndré Luiz de Gusmão, Cleidson R. B. de Souza, Rodrigo Q. Reis, Adailton M. Lima. [doi]
- Assessing Wearable Technology's Role to Reduce HAZMAT Health RisksChaitra Venkatesan, Sharon Medcalf, Ann L. Fruhling. [doi]
- Detection and Classification of Attacks on IoT NetworksAgnieszka Onuchowska, Saurav Chakraborty, Wolfgang Jank, Utkarsh Shrivastava. [doi]
- Multiple Scenarios for Rewards and Punishments in Medication AdherenceXinying Liu, Upkar Varshney. [doi]
- Exploring the Impact of Information Security Practices on Competitive AdvantageDejan Kosutic, Federico Pigni. [doi]
- An Examination of the Incidental Emotions from Personal Use of Technology at WorkJames Burleson, Bruce Greenbaum. [doi]
- Privacy Negotiation Mechanism in Internet of Things EnvironmentsFagner Roger Pereira Couto, Sergio Zorzo. [doi]
- Taking Advantage of Using Professionally-Oriented Social Network Sites: The Role of Users' Actions and ProfilesMorteza Mashayekhi, Milena M. Head. [doi]
- How Loud is the Scream of a Clickstream? Insights from Big Data AnalysisGokul Bhandari, David Bussiere, Peter Voyer. [doi]
- An Agile Integrated Methodology for Strategic Business Intelligence (AimS-BI)Lila Rao, Maurice McNaughton, Gunjan Mansingh. [doi]
- Digital Transformation Strategies for Healthcare Providers: Perspectives from Senior LeadershipKaushik Ghosh, Michael Dohan, Hareesh Veldandi. [doi]
- The Effect of Image Choice on Airbnb Reservations: A Combination of Deep Learning and Econometric AnalysisVivek Singh, Anol Bhattacherjee, Jaideep Kalapatapu, Utkarsh Srivastava, Shixuan Fu. [doi]
- Benchmarking Methodology Development for Establishing Information System Security Policy: A Design Science ApproachMartin (Dae Youp) Kang, SungYong Um, Ted (Euntae) Lee, Horim Kim. [doi]
- Gamified Wearables in Obesity Therapy for YouthLuisa Schulz, Ton Spil, Sjoerd de Vries. [doi]
- Cybersecurity Vulnerability Management: An Ontology-Based Conceptual ModelRomilla Syed, Haonan Zhong. [doi]
- What We Know and What We Need to Know about Peer Platforms - Airbnb and UberHarshali Sadhya, Vikram Sadhya. [doi]
- Analytics for Accounting Information Systems ApplicationsThomas F. Stafford, Tawei Wang, Rhonda Syler, Md. Shariful Islam. [doi]
- Patterns of Requirements Gathering for a CIS Capstone CourseCarey Cole, Devin Boehmer, Thomas W. Dillon, Diane Lending. [doi]
- Care Coordination Conceptual FrameworkRima Artonian Gibbings, Nilmini Wickramasinghe. [doi]
- Personality in the Human Robot Interaction Literature: A Review and Brief CritiqueLionel Robert. [doi]
- Assessing Open Source Project HealthGeorg J. P. Link, Matt Germonprez. [doi]
- Comparing the Use of Agile Methodologies in the ClassroomJames S. Gray, Elizabeth White Baker. [doi]
- Towards an Understanding of Farmers' Mobile Technology Adoption: A Comparison of Adoption and Continuance IntentionsGrace Fox, John Mooney, Pierangelo Rosati, Victoria Paulsson, Theo Lynn. [doi]
- An Analysis of Cultural Factors Influencing Career Persistence for Indian Women's ICT CareersAparna Venkatesan. [doi]
- Cyberbullying: Investigating the Roles of Power and Communication MediumZahra Aivazpour, Nicole Beebe. [doi]
- The Role of IT Steering Committees in Attaining Effective IT GovernanceMichael A. Erskine, Paola Gonzalez, Dietmar Nedbal. [doi]
- Development of a Metric for Assessing Full-Stack Developers' ExpertiseJordan Shropshire, Jeffrey P. Landry, Steven Presley. [doi]
- Autistic Tendency, Attachment Insecurity, and Intrinsic Interest in ITRonnie Jia, Zachary R. Steelman. [doi]
- Are the "Best Answers" in Online Question-Answering (Q&A) Sites Really Best?Yixiu (Ashley) Yu, Fred D. Davis. [doi]
- Technology Leadership, Brand Equity, and Customer Loyalty towards Fintech Service Providers in ChinaMay Wang, Younghoon Chang. [doi]
- Information Systems Design Considerations for Reducing Alarm Fatigue in ICUBalaraman Rajan, Surendra Sarnikar. [doi]
- Community-Engaged Projects in System Analysis and DesignStephen Larson. [doi]
- IT and Knowledge in Teams: A Longitudinal StudyHamid Reza Nikkhah, Franck Loic Soh Noume, Beverly A. Hodges-McDaniel, Rajiv Sabherwal. [doi]