


default search action
Journal of Computer Information Systems, Volume 62
Volume 62, Number 1, January 2022
- Jason A. Williams, Henry G. Torres, Traci A. Carte:
A Review of IS Strategy Literature: Current Trends and Future Opportunities. 1-11 - Myungjae Kwak, Kyungwoo Kang, Yingfeng Wang:
Methods of Metabolite Identification Using MS/MS Data. 12-18 - Yuxiang Hong
, Steven Furnell:
Motivating Information Security Policy Compliance: Insights from Perceived Organizational Formalization. 19-28 - Hannu Hannila
, Risto Silvola, Janne Härkönen
, Harri Haapasalo:
Data-driven Begins with DATA; Potential of Data Assets. 29-38 - Xiu-Ming Loh
, Voon-Hsien Lee
, Garry Wei-Han Tan
, Jun-Jie Hew
, Keng-Boon Ooi
:
Towards a Cashless Society: The Imminent Role of Wearable Technology. 39-49 - Barbara Hewitt
, Garry L. White:
Optimistic Bias and Exposure Affect Security Incidents on Home Computer. 50-60 - Rathika Palanisamy
, Azah Anir Norman, Miss Laiha Mat Kiah
:
BYOD Policy Compliance: Risks and Strategies in Organizations. 61-72 - Chung-Yean Chiang, Xiao Tang:
Use Public Wi-Fi? Fear Arouse and Avoidance Behavior. 73-81 - Moti Zwilling, Galit Klein
, Dusan Lesjak, Lukasz Wiechetek
, Fatih Çetin
, Hamdullah Nejat Basim
:
Cyber Security Awareness, Knowledge and Behavior: A Comparative Study. 82-97 - Chuleeporn Changchit, Robert Cutshall
, Anh Pham:
Personality and Demographic Characteristics Influence on Consumers' Social Commerce Preference. 98-108 - Matthew J. Liberatore, William P. Wagner:
Gender, Performance, and Self-Efficacy: A Quasi-Experimental Field Study. 109-117 - Xiaolin Lin, Xun Xu, Xuequn Wang
:
Users' Knowledge Sharing on Social Networking Sites. 118-127 - Nima Kordzadeh
, Diana K. Young
:
How Social Media Analytics Can Inform Content Strategies. 128-140 - Senem Sancar Gozukara, Bedir Tekinerdogan
, Cagatay Catal
:
Obstacles of On-Premise Enterprise Resource Planning Systems and Solution Directions. 141-152 - Gelareh Towhidi, Atish P. Sinha, Mark Srite, Huimin Zhao:
Trust Decision-Making in Online Social Communities: A Network-Based Model. 153-163 - Nghi Thuc Le, Sally Rao Hill
, Indrit Troshani:
Perceived Control and Perceived Risk in Self-service Technology Recovery. 164-173 - Helen S. Du, Jiahong Xu
, Heng Tang
, Ruixin Jiang:
Repurchase Intention in Online Knowledge Service: The Brand Awareness Perspective. 174-185 - Tenace Kwaku Setor
, Damien Joseph
:
When Agile Means Staying: A Moderated Mediated Model. 186-195 - Hsun-Ming Lee, Peiqin Zhang, Mayur R. Mehta:
Effect of Competitors' eWOM in the Mobile Game Market. 196-204
Volume 62, Number 2, March 2022
- Fernando S. Oliveira
:
A Causal Map Analysis of Supply Chain Decentralization. 205-215 - Michel Mitri:
Story Analysis Using Natural Language Processing and Interactive Dashboards. 216-226 - Chuleeporn Changchit, Tim Klaus, Ravi Lonkani:
Online Reviews: What Drives Consumers to Use Them. 227-236 - Jinyoung Han
, Anat Hovav, Martin Hemmert:
Confucian Values, Social Fear, and Knowledge Sharing in Korean Organizations. 237-246 - Dapeng Liu
, Heinz Roland Weistroffer
:
Statistically Significant! But Is Trust of Practical Significance? 247-258 - Grzegorz Mazurek
, Anna Maria Górska
, Pawel Korzynski
, Susana Silva
:
Social Networking Sites and Researcher's Success. 259-266 - Neethu Mathai, Tanya McGill, Danny Toohey:
Factors Influencing Consumer Adoption of Electronic Health Records. 267-277 - Elizabeth White Baker
, Christopher Sibona:
Digital OER Impact on Learning Outcomes for Social Inclusion. 278-289 - Robert Cutshall
, Chuleeporn Changchit, Anh Pham:
Factors Influencing Consumers' Participation in Social Commerce. 290-301 - Ewa Ziemba
, Monika Eisenbardt
, Roisin Mullins, Sandra Dettmer:
Consumer Engagement in Business Process Innovation-ICT Companies Cases from Poland and UK. 302-315 - Dominic Thomas
, Yurong Yao:
Supporting Mobile Innovation in the Middle: Hospital IT Manager Attitudes. 316-325 - Bo Shang, Zheshi Bao:
How Repurchase Intention Is Affected in Social Commerce?: An Empirical Study. 326-336 - Yanfeng Zhang, Wu He, Lihui Peng:
How Perceived Pressure Affects Users' Social Media Fatigue Behavior: A Case on WeChat. 337-348 - Matthew Wimble
, Young K. Ro, Cheong Kyu Park:
The Dynamics Information Technology and Systematic Risk. 349-358 - Bih-Ru Lea
, Dinesh Mirchandani, Mary Sumner, Katherine Yu:
Personality Types in Learning Enterprise Resource Planning (ERP) Systems. 359-371 - Brent Furneaux
, Sophia Mannina
, Lars Rieser
:
Responding to Information System Obsolescence: Should We Upgrade or Replace? 372-383 - Nusa Erman, Katarina Rojko, Dusan Lesjak:
Traditional and New ICT Spending and Its Impact on Economy. 384-396 - Dejarvis Oliver, Adriane B. Randolph:
Hacker Definitions in Information Systems Research. 397-409 - Vess L. Johnson
, Richard W. Woolridge, Angelina I. T. Kiser, Katia Guerra:
The Impact of Coproduction Resentment on Continuation Intention. 410-421 - Mohamad Almgerbi
, Andrea De Mauro
, Adham Kahlawi
, Valentina Poggioni
:
A Systematic Review of Data Analytics Job Requirements and Online-Courses. 422-434
Volume 62, Number 3, May 2022
- Nik Thompson
, Xuequn Wang
, Richard L. Baskerville
:
Improving IS Practical Significance through Effect Size Measures. 434-441 - Guangming Cao, Na Tian, Charles Blankson:
Big Data, Marketing Analytics, and Firm Marketing Capabilities. 442-451 - Anna Georgiadou
, Spiros Mouzakitis
, Kanaris Bounas
, Dimitrios Askounis
:
A Cyber-Security Culture Framework for Assessing Organization Readiness. 452-462 - Haoqiang Jiang
, Catherine Chen:
Data Science Skills and Graduate Certificates: A Quantitative Text Analysis. 463-479 - Shah Jahan Miah
, Edwin Camilleri, Huy Quan Vu:
Big Data in Healthcare Research: A survey study. 480-492 - Cheuk Hang (Allen) Au
, Richard Wing Cheung Lui, Kris M. Y. Law
:
Acquisition of IS Capabilities by Collaborating with Academics: A Case in A Non-Profit Organization in Hong Kong. 493-502 - Hoon Seok Choi, Shin-Yuan Hung, Cheng-Yung Peng, Charlie C. Chen:
Different Perspectives on BDA Usage by Management Levels. 503-515 - Bartlomiej Hanus
, Yu Andy Wu, James Parrish
:
Phish Me, Phish Me Not. 516-526 - Hui-Ting Tew, Garry Wei-Han Tan
, Xiu-Ming Loh
, Voon-Hsien Lee
, Wei-Lee Lim
, Keng-Boon Ooi
:
Tapping the Next Purchase: Embracing the Wave of Mobile Payment. 527-535 - Peng Gao
, Hao Han:
Robust Web Data Extraction Based on Weighted Path-layer Similarity. 536-546 - Shan Wang, William Yeoh
, Jie Ren, Alvin Lee:
Learnings and Implications of Virtual Hackathon. 547-559 - Garry White:
Generation Z: Cyber-Attack Awareness Training Effectiveness. 560-571 - Au Vo, Thomas A. Chapman, Yen-Sheng Lee
:
Examining Bitcoin and Economic Determinants: An Evolutionary Perspective. 572-586 - Insu Park, Vetrivadivel Vel, Jun Liu:
The Role of Enterprise Crowdsourcing Systems on Knowledge Application. 587-597 - Yi Sun
, Rui Wang
:
The Research Framework and Evolution of Service Robots. 598-608 - Caihong Liu, Hannah Ji, June Wei:
Smart Supply Chain Risk Assessment in Intelligent Manufacturing. 609-621 - Ho-Jun Kang, Sang-Gun Lee, Soo-Yong Park:
Information Efficiency in the Cryptocurrency Market: The Efficient-Market Hypothesis. 622-631 - Feng Xu
, Carol Hsu
, Xin (Robert) Luo
, Merrill Warkentin
:
Reactions to Abusive Supervision: Neutralization and IS Misuse. 632-641 - Catalin C. Dinulescu
, Lucian L. Visinescu, Victor R. Prybutok
, Marcos Sivitanides:
Customer Relationships, Privacy, and Security in Social Commerce. 642-654
Volume 62, Number 4, July 2022
- Sheshadri Chatterjee
, Arpan Kumar Kar
, Yogesh K. Dwivedi
:
Intention to Use IoT by Aged Indian Consumers. 655-666 - Matthew J. Liberatore, William P. Wagner:
Simon's Decision Phases and User Performance: An Experimental Study. 667-679 - Anand Jeyaraj, Amir Hassan Zadeh
:
Exploration and Exploitation in Organizational Cybersecurity. 680-693 - Jamie Y. T. Chang, Xiaosong (Jason) Wu, Richard Discenza, Gary Klein:
Creative Software Development with Team Boundary Management. 694-705 - Anna Georgiadou
, Spiros Mouzakitis
, Dimitris Askounis
:
Detecting Insider Threat via a Cyber-Security Culture Framework. 706-716 - Dyin Mabe, Guilherme Esmael, Manoel Burg, Patricia Soares, Leila A. Halawi
:
Optimization of Organizational Design. 717-729 - Mieczyslaw Pawlowski
:
Machine Learning Based Product Classification for eCommerce. 730-739 - Jignya Patel, Robin S. Poston:
Using Social Intelligence to Overcome Agile Adoption Challenges. 740-751 - Siqi Hu, Carol Hsu
, Zhongyun Zhou
:
Security Education, Training, and Awareness Programs: Literature Review. 752-764 - Neha Srivastava, Abhishek Mishra
, Yogesh K. Dwivedi
:
Investigating Antecedents of Adoption Intention for Audiobook Applications. 765-777 - Son Bui, William J. Kettinger
, Insu Park:
Identity Sharing and Adaptive Personalization Influencing Online Repurchases. 778-789 - Fatih Çetin
, Joanna Paliszkiewicz
, Murat Güler
, Onur Köksal
, Malgorzata Cieciora:
Exploring Relational Needs on Using Social Network Sites. 790-801 - William Yeoh
, He Huang
, Wang-Sheng Lee, Fadi Al Jafari, Rachel Mansson:
Simulated Phishing Attack and Embedded Training Campaign. 802-821 - Robert Cutshall
, Chuleeporn Changchit
, Chat Chuchuen:
An Examination of Factors Influencing Social Commerce Adoption. 822-836 - Natalie Gerhart, Obi Ogbanufe
, Russell Torres, Anna Sidorova, Nicholas E. Evangelopoulos:
Effort Minimization Theory in the Data Analytics Era. 837-849 - Faten N. Jaber, Muneer Abbad:
Big Data and Firm Performance: An Outside-in Approach. 850-862 - Jeretta Horn Nord
, Carol Springer Sargent
, Alex Koohang
, Angelica Marotta
:
Predictors of Success in Information Security Policy Compliance. 863-873 - Correction. 874
Volume 62, Number 5, September 2022
- Junru Zhang, Yuan George Shan, Fei Peng:
Web-Crawling Architecture in Accounting and Finance Research. 875-887 - Matjaz Drev, Bostjan Delak
:
Conceptual Model of Privacy by Design. 888-895 - J. David Patón-Romero
, Maria Teresa Baldassarre
, Ambrosio Toval
, Moisés Rodríguez
, Mario Piattini
:
Auditing the Governance and Management of Green IT. 896-906 - Zhengzhong Shi
, Hua Sun
:
Sustained Participation in Open Source Software Project Communities. 907-920 - Tao Eric Hu, Zhenya Tang, Merrill Warkentin, Na Wen:
SLSS Gamification as an E-Commerce Model in China. 921-939 - William H. Money, Stephen H. Kaisler, Stephen J. Cohen:
Understanding Failed Software Projects through Forensic Analysis. 940-953 - Derek L. Nazareth, Jae Choi, Thomas L. Ngo-Ye:
The Security-as-a-Service Market for Small and Medium Enterprises. 954-964 - Marcin Soniewicki
, Joanna Paliszkiewicz
, Alex Koohang
, Jeretta Horn Nord
:
Critical Components Affecting Organizational Performance. 965-974 - Alex Sumner
, Xiaohong Yuan, Mohd Anwar
, Maranda E. McBride
:
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings. 975-997 - Kyle Nash
, Robin L. Wakefield
:
The Role of Identity in Green IT Attitude and Intention. 998-1008 - Nurhafihz Noor
, Sally Rao Hill
, Indrit Troshani:
Artificial Intelligence Service Agents: Role of Parasocial Relationship. 1009-1023 - Yaojie Li
, Johnny C. Ho
, Rania Hodhod, Jennifer Pitts, John Finley:
Participative and Practical Goal-setting in Enterprise Systems Learning. 1024-1035 - Xu Xin, Jilan Wu, Lei Huang, Shanshan Shang, Pei Chen:
Effect of Multi-Channel Integration on Customer Purchase Intention. 1036-1047 - Hokey Min, Bih-Ru Lea
:
Developing the Profiles of Business Analytics Adopters and Non-adopters Using Data Mining Tools. 1048-1060 - Brian Cusack
, Adekemi Adedokun:
Cloud Disruption Impacts Business IT Role Requirements. 1061-1071 - Xiaodan Yu
, Yuanyanhang Shen
, Deepak Khazanchi
:
Swift Trust and Sensemaking in Fast Response Virtual Teams. 1072-1087 - Pi-Jung Hsieh:
Determinants of Knowledge-Sharing Intentions for Shared Decision-Making Platforms. 1088-1099
Volume 62, Number 6, November 2022
- Edson Machado de Sousa
, Abid Shahzad:
Data Loss Prevention from a Malicious Insider. 1101-1111 - Zhenya Tang, Andrew Miller, Zhongyun Zhou
, Merrill Warkentin:
Understanding Rumor Combating Behavior on Social Media. 1112-1124 - Cheuk Hang (Allen) Au
, Kevin K. W. Ho
, Dickson K. W. Chiu
:
Managing Users' Behaviors on Open Content Crowdsourcing Platform. 1125-1135 - Matthew J. Liberatore, William P. Wagner:
An Experiment Assessing the Sequential Difficulty Effect on IT Tasks. 1136-1144 - Carol Springer Sargent
:
Replacing Financial Audits with Blockchain: The Verification Issue. 1145-1153 - Ewa Wanda Ziemba
, Monika Eisenbardt
:
The Effect of the Covid-19 Pandemic on ICT Usage by Academics. 1154-1168 - James Wairimu, Qinyu Liao
, Lin Zhang
:
Digital Investments in Organizational Learning and Entrepreneurial Agility. 1169-1181 - Marina Liu, William Yeoh
, Frank Jiang, Kim-Kwang Raymond Choo:
Blockchain for Cybersecurity: Systematic Literature Review and Classification. 1182-1198 - Son Bui, Khuong Le-Nguyen, Quang Neo Bui, Tim Jacks, Prashant Palvia:
IT Workplace Preferences, Job Demands, and Work Exhaustion. 1199-1210 - Maciej Rys
:
Management of Probability of Desired Invention during Hackathon. 1211-1222 - Sze-Mun Wan, Li-Na Cham, Garry Wei-Han Tan
, Pei-San Lo
, Keng-Boon Ooi
, Rajat-Subhra Chatterjee:
What's Stopping You from Migrating to Mobile Tourism Shopping? 1223-1238 - Ritanjali Panigrahi, Praveen Ranjan Srivastava
, Prabin Kumar Panigrahi, Yogesh K. Dwivedi
:
Role of Internet Self-Efficacy and Interactions on Blended Learning Effectiveness. 1239-1252 - Ilker Kara:
Cyber-Espionage Malware Attacks Detection and Analysis: A Case Study. 1253-1270 - Raymond Angelo
:
An Authentic Pedagogical Approach to Developing Information Systems Project-based Solutions. 1271-1282 - Seyed Pouyan Eslami
, Khaled Hassanein:
Understanding Data Analytics Recommendation Execution: The Role of Recommendation Quality. 1283-1296 - Caihong Liu, Hannah Ji, June Wei:
Block Chain Influences on Manufacturing Collaborative Product Innovation. 1297-1309 - Angelica Marotta
:
When AI Is Wrong: Addressing Liability Challenges in Women's Healthcare. 1310-1319

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.