Information Systems Research, Volume 30 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 30, Number 1, March 2019
Research Articles

Liangfei Qiu
, Huaxia Rui, Andrew B. Whinston:
Optimal Auction Design for Wi-Fi Procurement. 1-14

Shunyuan Zhang, Param Vir Singh
, Anindya Ghose:
A Structural Analysis of the Role of Superstars in Crowdsourcing Contests. 15-33

Nicholas Berente
, Stefan Seidel
, Hani Safadi
:
Research Commentary - Data-Driven Computationally Intensive Theory Development. 50-64

Jiao Xu, Chris Forman
, Yu (Jeffrey) Hu
:
Battle of the Internet Channels: How Do Mobile and Fixed-Line Quality Drive Internet Use? 65-80

Wei Chen
, Bin Gu, Qiang Ye, Kevin Xiaoguo Zhu:
Measuring and Managing the Externality of Managerial Responses to Online Customer Reviews. 81-96

Mehmet Eren Ahsen, Mehmet U. S. Ayvaci
, Srinivasan Raghunathan
:
When Algorithmic Predictions Use Human-Generated Data: A Bias-Aware Classification Algorithm for Breast Cancer Diagnosis. 97-116

Prasanta Bhattacharya, Tuan Quang Phan
, Xue Bai
, Edoardo M. Airoldi:
A Coevolution Model of Network Structure and User Behavior: The Case of Content Generation in Online Social Networks. 117-132

Reza Mousavi
, Bin Gu
:
The Impact of Twitter Adoption on Lawmakers' Voting Orientations. 133-153

Anindya Ghose
, Hyeokkoo Eric Kwon
, Dongwon Lee
, Wonseok Oh
:
Seizing the Commuting Moment: Contextual Targeting Based on Mobile Transportation Apps. 154-174

Youngsoo Kim
, Ramayya Krishnan
:
The Dynamics of Online Consumers' Response to Price Promotion. 175-190

Tingting Song
, Jinghua Huang
, Yong Tan
, Yifan Yu
:
Using User- and Marketer-Generated Content for Box Office Revenue Prediction: Differences Between Microblogging and Third-Party Platforms. 191-203

Zachary R. Steelman
, Taha Havakhor
, Rajiv Sabherwal
, Sanjiv Sabherwal
:
Performance Consequences of Information Technology Investments: Implications of Emphasizing New or Current Information Technologies. 204-218

Jason Chan
, Probal Mojumder
, Anindya Ghose
:
The Digital Sin City: An Empirical Study of Craigslist's Impact on Prostitution Trends. 219-238

Dokyun Lee
, Kartik Hosanagar:
How Do Recommender Systems Affect Sales Diversity? A Cross-Category Investigation via Randomized Field Experiment. 239-259

Zhijie Lin
, Ying Zhang, Yong Tan
:
An Empirical Study of Free Product Sampling and Rating Bias. 260-275

Keongtae Kim
, Il-Horn Hann:
Crowdfunding and the Democratization of Access to Capital - An Illusion? Evidence from Housing Prices. 276-290

Taha Havakhor
, Rajiv Sabherwal
, Zachary R. Steelman
, Sanjiv Sabherwal
:
Relationships Between Information Technology and Other Investments: A Contingent Interaction Model. 291-305

Yu-Kai Lin
, Mingfeng Lin
, Hsinchun Chen:
Do Electronic Health Records Affect Quality of Care? Evidence from the HITECH Act. 306-318

Anuj Kumar
, Amit Mehra
, Subodha Kumar
:
Why Do Stores Drive Online Sales? Evidence of Underlying Mechanisms from a Multichannel Retailer. 319-338
Volume 30, Number 2, June 2019
Research Articles

Mingwen Yang
, Zhiqiang (Eric) Zheng, Vijay S. Mookerjee
:
Prescribing Response Strategies to Manage Customer Opinions: A Stochastic Differential Equation Approach. 351-374

Joseph R. Buckman
, Jesse C. Bockstedt
, Matthew J. Hashim
:
Relative Privacy Valuations Under Varying Disclosure Characteristics. 375-388

Elina H. Hwang
, Param Vir Singh
, Linda Argote:
Jack of All, Master of Some: Information Network and Innovation in Crowdsourcing Communities. 389-410

Kai Lung Hui
, Ping Fan Ke
, Yuxi Yao, Wei T. Yue
:
Bilateral Liability-Based Contracts in Information Security Outsourcing. 411-429

Hong Guo
, Lin Hao, Tridas Mukhopadhyay
, Daewon Sun:
Selling Virtual Currency in Digital Games: Implications for Gameplay and Social Welfare. 430-446

Rob Gleasure
, Kieran Conboy, Lorraine Morgan:
Talking Up a Storm: How Backers Use Public Discourse to Exert Control in Crowdfunded Systems Development Projects. 447-465

Lina Bouayad
, Balaji Padmanabhan
, Kaushal Chari:
Audit Policies Under the Sentinel Effect: Deterrence-Driven Algorithms. 466-485

Tat Koon Koh
:
Adopting Seekers' Solution Exemplars in Crowdsourcing Ideation Contests: Antecedents and Consequences. 486-506

Weiquan Wang
, May D. Wang
:
Effects of Sponsorship Disclosure on Perceived Integrity of Biased Recommendation Agents: Psychological Contract Violation and Knowledge-Based Trust Perspectives. 507-522

Tianshu Sun
, Lanfei Shi
, Siva Viswanathan
, Elena Zheleva:
Motivating Effective Mobile App Adoptions: Evidence from a Large-Scale Randomized Field Experiment. 523-539

Yang Pan
, Peng Huang
, Anandasivam Gopal
:
Storm Clouds on the Horizon? New Entry Threats and R&D Investments in the U.S. IT Industry. 540-562

Brad N. Greenwood
, Kartik K. Ganju
, Corey M. Angst
:
How Does the Implementation of Enterprise Information Systems Affect a Professional's Mobility? An Empirical Study. 563-594

Mochen Yang
, Gediminas Adomavicius
, Alok Gupta
:
Efficient Computational Strategies for Dynamic Inventory Liquidation. 595-615

Lizhen Xu
, Jason A. Duan
, Yu (Jeffrey) Hu
, Yuan Cheng, Yan Zhu:
Forward-Looking Behavior in Mobile Data Consumption and Targeted Promotion Design: A Dynamic Structural Model. 616-635

Martin Eisend
:
Explaining Digital Piracy: A Meta-Analysis. 636-664

Paul M. Leonardi
, Diane E. Bailey, Casey S. Pierce
:
The Coevolution of Objects and Boundaries over Time: Materiality, Affordances, and Boundary Salience. 665-686

Mari Karjalainen
, Suprateek Sarker, Mikko T. Siponen
:
Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective. 687-704
Volume 30, Number 3, September 2019
Research Articles

Cheng Yi, Zhenhui (Jack) Jiang
, Xiuping Li, Xianghua Lu
:
Leveraging User-Generated Content for Product Promotion: The Effects of Firm-Highlighted Reviews. 711-725

T. Ravichandran
, Simona Ileana Giura:
Knowledge Transfers in Alliances: Exploring the Facilitating Role of Information Technology. 726-744

Barrie R. Nault
, Steffen Zimmermann
:
Balancing Openness and Prioritization in a Two-Tier Internet. 745-763

Poonacha K. Medappa
, Shirish C. Srivastava
:
Does Superposition Influence the Success of FLOSS Projects? An Examination of Open-Source Software Development by Organizations and Individuals. 764-786

Yingjie Zhang
, Beibei Li
, Xueming Luo
, Xiaoyi Wang
:
Personalized Mobile Targeting with User Engagement Stages: Combining a Structural Hidden Markov Model and Field Experiment. 787-804

Ni Huang
, Tianshu Sun
, Pei-Yu Chen
, Joseph M. Golden:
Word-of-Mouth System Implementation and Customer Conversion: A Randomized Field Experiment. 805-818

Anuj Kumar
, Kartik Hosanagar
:
Measuring the Value of Recommendation Links on Product Demand. 819-838

Mochen Yang
, Yuqing Ren
, Gediminas Adomavicius
:
Understanding User-Generated Content and Customer Engagement on Facebook Business Pages. 839-855

Jeffrey D. Shulman
, Xianjun Geng
:
Does It Pay to Shroud In-App Purchase Prices? 856-871

Sandeep Khurana, Liangfei Qiu
, Subodha Kumar
:
When a Doctor Knows, It Shows: An Empirical Analysis of Doctors' Responses in a Q&A Forum of an Online Healthcare Portal. 872-891

Jonathan Whitaker
, Sunil Mithas
, CheWei Liu:
Beauty Is in the Eye of the Beholder: Toward a Contextual Understanding of Compensation of Information Technology Professionals Within and Across Geographies. 892-911

Tingting Song
, Qian Tang
, Jinghua Huang
:
Triadic Closure, Homophily, and Reciprocation: An Empirical Investigation of Social Ties Between Content Providers. 912-926

Yan Huang
, Stefanus Jasin
, Puneet Manchanda
:
"Level Up": Leveraging Skill and Engagement to Maximize Player Game-Play in Online Video Games. 927-947

Chih-Hung Peng
, Nicholas H. Lurie
, Sandra A. Slaughter:
Using Technology to Persuade: Visual Representation Technologies and Consensus Seeking in Virtual Teams. 948-962

Yunhui Huang
, Kai H. Lim
, Zhijie Lin
, Shunping Han:
Large Online Product Catalog Space Indicates High Store Price: Understanding Customers' Overgeneralization and Illogical Inference. 963-979

Dominik Gutt
, Philipp Herrmann, Mohammad Saifur Rahman
:
Crowd-Driven Competitive Intelligence: Understanding the Relationship Between Local Market Competition and Online Rating Distributions. 980-994

Robert E. Crossler
, France Bélanger
:
Why Would I Use Location-Protective Settings on My Smartphone? Motivating Protective Behaviors and the Existence of the Privacy Knowledge-Belief Gap. 995-1006

Ahmed Abbasi
, Jingjing Li
, Donald A. Adjeroh, Marie Abate, Wanhong Zheng
:
Don't Mention It? Analyzing User-Generated Content Signals for Early Adverse Event Warnings. 1007-1028

Amrit Tiwana
, Stephen K. Kim
:
From Bricks to an Edifice: Cultivating Strong Inference in Information Systems Research. 1029-1036

Dawoon Jung, Byung Cho Kim
, Myungsub Park, Detmar W. Straub:
Innovation and Policy Support for Two-Sided Market Platforms: Can Government Policy Makers and Executives Optimize Both Societal Value and Profits? 1037-1050

Jong Seok Lee
, Mark Keil
, Eliezer Shalev:
Seeing the Trees or the Forest? The Effect of IT Project Managers' Mental Construal on IT Project Risk Management Activities. 1051-1072

Sunghun Chung
, Animesh Animesh
, Kunsoo Han
, Alain Pinsonneault
:
Software Patents and Firm Value: A Real Options Perspective on the Role of Innovation Orientation and Environmental Uncertainty. 1073-1097
Volume 30, Number 4, December 2019
Research Articles

Juan Feng
, Xin Li
, Xiaoquan (Michael) Zhang
:
Online Product Reviews-Triggered Dynamic Pricing: Theory and Evidence. 1107-1123

Dawei (David) Zhang
, Barrie R. Nault
, Xueqi (David) Wei:
The Strategic Value of Information Technology in Setting Productive Capacity. 1124-1144

Thomas Kude
, Sunil Mithas
, Christoph Tobias Schmidt, Armin Heinzl
:
How Pair Programming Influences Team Performance: The Role of Backup Behavior, Shared Mental Models, and Task Novelty. 1145-1163

Angela Aerry Choi
, Daegon Cho
, Dobin Yim
, Jae Yun Moon, Wonseok Oh
:
When Seeing Helps Believing: The Interactive Effects of Previews and Reviews on E-Book Purchases. 1164-1183

Seung Hyun Kim
, Juhee Kwon
:
How Do EHRs and a Meaningful Use Initiative Affect Breaches of Patient Information? 1184-1202

Xueming Luo
, Xianghua Lu
, Jing Li
:
When and How to Leverage E-commerce Cart Targeting: The Relative and Moderated Effects of Scarcity and Price Incentives with a Two-Stage Field Experiment and Causal Forest Optimization. 1203-1227

A. J. Burns
, Tom L. Roberts
, Clay Posey, Paul Benjamin Lowry
:
The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking. 1228-1247

Xue (Jane) Tan
, Youwei Wang
, Yong Tan
:
Impact of Live Chat on Purchase in Electronic Markets: The Moderating Role of Information Cues. 1248-1271

Che-Wei Liu
, Guodong Gordon Gao
, Ritu Agarwal
:
Unraveling the "Social" in Social Norms: The Conditioning Effect of User Connectivity. 1272-1295

Chen Liang
, Zhan (Michael) Shi
, T. S. Raghu
:
The Spillover of Spotlight: Platform Recommendation in the Mobile App Market. 1296-1318

Daniel Fürstenau
, Abayomi Baiyere
, Natalia Kliewer
:
A Dynamic Model of Embeddedness in Digital Infrastructures. 1319-1342

Jinyang Zheng
, Zhengling Qi
, Yifan Dou
, Yong Tan
:
How Mega Is the Mega? Exploring the Spillover Effects of WeChat Using Graphical Model. 1343-1362

Jorge Mejia
, Shawn Mankad
, Anandasivam Gopal
:
A for Effort? Using the Crowd to Identify Moral Hazard in New York City Restaurant Hygiene Inspections. 1363-1386

Martin Wiener
, Magnus Mähring
, Ulrich Remus
, Carol Saunders, W. Alec Cram:
Moving IS Project Control Research into the Digital Era: The "Why" of Control and the Concept of Control Purpose. 1387-1401

Yuliang Yao
, Martin E. Dresner, Kevin Xiaoguo Zhu:
"Monday Effect" on Performance Variations in Supply Chain Fulfillment: How Information Technology-Enabled Procurement May Help. 1402-1423

Zhiling Guo
, Jin Li
, Ram Ramesh
:
Optimal Management of Virtual Infrastructures Under Flexible Cloud Service Agreements. 1424-1446

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







