Journal of the Association for Information Systems, Volume 19 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



jump to

SPARQL queries 
🛈 Please note that only 61% of the items listed on this page have a DOI stored with their dblp record. Therefore, DOI-based queries can only provide partial results.
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 19, Number 1, 2018
Editorial

James J. Jiang, Gary Klein, Walter D. Fernández:
From Project Management to Program Management: An Invitation to Investigate Programs Where IT Plays a Significant Role. 1
Articles

Zhijie Lin, Quansheng Wang:
E-commerce Product Networks, Word-of-mouth Convergence, and Product Sales. 2

Thomas W. Ferratt, Jayesh Prasad, E. James Dunne:
Fast and Slow Processes Underlying Theories of Information Technology Use. 3
Volume 19, Number 2, 2018
ICT Challenges and Opportunities in Building a “Bright Society” Part I
Articles

Michelle F. Wright:
Cyberbullying Victimization through Social Networking Sites and Adjustment Difficulties: The Role of Parental Mediation. 1

Majid Dadgar, K. D. Joshi:
The Role of Information and Communication Technology in Self-Management of Chronic Diseases: An Empirical Investigation through Value Sensitive Design. 2
Editorials

Jae Kyu Lee, Daegon Cho, Gyoo Gun Lim:
Design and Validation of the Bright Internet. 3

Wonseok Oh, Alessandro Acquisti, Choon Ling Sia:
ICT Challenges and Opportunities in Building a "Bright Society". 4
Volume 19, Number 3, 2018
ICT Challenges and Opportunities in Building a “Bright Society” Part II
Articles

Gun-Woong Lee, Benjamin B. M. Shao, Ajay S. Vinze:
The Role of ICT as a Double-Edged Sword in Fostering Societal Transformations. 1

Kil-Soo Suh, Seongwon Lee, Eung Kyo Suh, Hojin Lee, Jaehoon Lee:
Online Comment Moderation Policies for Deliberative Discussion-Seed Comments and Identifiability. 2

Young Yung Shin, Jae Kyu Lee, Myungchul Kim:
Preventing State-Led Cyberattacks Using the Bright Internet and Internet Peace Principles. 3

Ben C. F. Choi, Yi Wu, Jie Yu
, Lesley Pek Wee Land
:
Love at First Sight: The Interplay Between Privacy Dispositions and Privacy Calculus in Online Social Connectivity Management. 4
Volume 19, Number 4, 2018
Articles

Jason H. Triche, Eric A. Walden:
The Use of Impression Management Strategies to Manage Stock Market Reactions to IT Failures. 1

Tung-Ching Lin, Shiu-Li Huang, Shun-Chi Chiang:
User Resistance to the Implementation of Information Systems: A Psychological Contract Breach Perspective. 2

Guofang Nan, Dan Wu, Minqiang Li, Yong Tan:
Optimal Freemium Strategy for Information Goods in the Presence of Piracy. 3
Editorial

Mikko T. Siponen, Richard L. Baskerville
:
Intervention Effect Rates as a Path to Research Relevance: Information Systems Security Example. 4
Volume 19, Number 5, 2018
Articles

Andrew Harrison:
The Effects of Media Capabilities on the Rationalization of Online Consumer Fraud. 1

Sangseok You, Lionel P. Robert Jr.
:
Emotional Attachment, Performance, and Viability in Teams Collaborating with Embodied Physical Action (EPA) Robots. 2
Editorial
Volume 19, Number 6, 2018
Editorial

Dorothy E. Leidner:
Review and Theory Symbiosis: An Introspective Retrospective. 1
Articles

Monideepa Tarafdar, Robert M. Davison
:
Research in Information Systems: Intra-Disciplinary and Inter-Disciplinary Approaches. 2

Liqiang Huang, Chuan-Hoo Tan
, Weiling Ke, Kwok Kee Wei:
Helpfulness of Online Review Content: The Moderating Effects of Temporal and Social Cues. 3

Saeed Akhlaghpour, Liette Lapointe:
From Placebo to Panacea: Studying the Diffusion of IT Management Techniques with Ambiguous Efficiencies: The Case of Capability Maturity Model. 4
Volume 19, Number 7, 2018
Articles

Chao-Min Chiu, Jack Shih-Chieh Hsu, Paul Benjamin Lowry, Ting-Peng Liang:
Solving the Interpretational-Confounding and Interpretational-Ambiguity Problems of Formative Construct Modeling in Behavioral Research: Proposing a Two-Stage Fixed-Weight Redundancy Approach. 4
Mikko T. Siponen, Aggeliki Tsohou:
Demystifying the Influential IS Legends of Positivism. 5
Nik Rushdi Hassan, John Mingers:
Reinterpreting the Kuhnian Paradigm in Information Systems. 6
Volume 19, Number 8, 2018
Editorial
Articles

Monideepa Tarafdar, Hüseyin Tanriverdi:
Impact of the Information Technology Unit on Information Technology-Embedded Product Innovation. 2

Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, Alan R. Dennis:
Don't Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance. 3

Steffen Zimmermann, Peter Angerer, Daniel Provin, Barrie R. Nault
:
Pricing in C2C Sharing Platforms. 4
Volume 19, Number 9, 2018
Editorial

Suprateek Sarker, Xiao Xiao, Tanya Beaulieu, Allen S. Lee:
Learning from First-Generation Qualitative Approaches in the IS Discipline: An Evolutionary View and Some Implications for Authors and Evaluators (Part 2/2). 1
Articles

Stefan Tams, Jason Bennett Thatcher
, Varun Grover:
Concentration, Competence, Confidence, and Capture: An Experimental Study of Age, Interruption-based Technostress, and Task Performance. 2

Oliver Krancher
, Jens Dibbern, Paul Meyer:
How Social Media-Enabled Communication Awareness Enhances Project Team Performance. 3

Mira Slavova
, Stan Karanasios
:
When Institutional Logics Meet Information and Communication Technologies: Examining Hybrid Information Practices in Ghana's Agriculture. 4
Volume 19, Number 10, 2018
Special Issue Celebrating 50 Years of Ideas and Science at HICSS
Articles

Roman Beck, Christoph Müller-Bloch, John Leslie King:
Governance in the Blockchain Economy: A Framework and Research Agenda. 1
Dina Koutsikouri, Rikard Lindgren, Ola Henfridsson, Daniel Rudmark:
Extending Digital Infrastructures: A Typology of Growth Tactics. 2
Sirkka Jarvenpaa, Willem Standaert:
Digital Probes as Opening Possibilities of Generativity. 3
Mike Seymour, Kai Riemer, Judy Kay:
Actors, Avatars and Agents: Potentials and Implications of Natural Face Technology for the Creation of Realistic Visual Presence. 4
Dionysios S. Demetis, Allen S. Lee:
When Humans Using the IT Artifact Becomes IT Using the Human Artifact. 5
Editorial

Dirk Hovorka, Jason Bennett Thatcher, Alan R. Dennis, Joey F. George:
Informing Research: Celebrating 50 Years of Ideas and Science at HICSS. 6
Volume 19, Number 11, 2018
Articles

Hong Xu:
Is More Information Better? An Economic Analysis of Group-Buying Platforms. 1
Shamel Addas, Alain Pinsonneault:
Theorizing the Multilevel Effects of Interruptions and the Role of Communication Technology. 2
Jens Lansing, Alexander Benlian, Ali Sunyaev:
"Unblackboxing" Decision Makers' Interpretations of IS Certifications in the Context of Cloud Service Certifications. 3
David W. Wainwright, Briony J. Oates, Helen M. Edwards, Sue Childs:
Evidence-Based Information Systems: A New Perspective and a Road Map for Research-Informed Practice. 4
Volume 19, Number 12, 2018
Editorial

Wolfgang Maass, Jeffrey Parsons, Sandeep Purao, Veda C. Storey, Carson Woo:
Data-Driven Meets Theory-Driven Research in the Era of Big Data: Opportunities and Challenges for Information Systems Research. 1
Articles

Xuan Xiao, Aron Lindberg, Sean W. Hansen, Kalle Lyytinen:
"Computing" Requirements for Open Source Software: A Distributed Cognitive Approach. 2
Robert Willison, Paul Benjamin Lowry, Raymond Paternoster:
A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research. 3
Martin Kretzer, Alexander Maedche:
Designing Social Nudges for Enterprise Recommendation Agents: An Investigation in the Business Intelligence Systems Context. 4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






