default search action
Journal of Computer Information Systems, Volume 61
Volume 61, Number 1, 2021
- Fatih Çetin, Tara Urich, Joanna Paliszkiewicz, Magdalena Madra-Sawicka, Jeretta Horn Nord:
ICTs, Empowerment, and Success: Women's Perceptions across Eight Countries. 1-10 - Gaurav Bansal:
Restoring Trust after an Insider Breach: Both the Genders Matter - CEOs and Users. 11-29 - Andrew Besmer, Tyler Thomas, Heather Richter Lipford:
Effects of Privacy Notification Style and Frequency on Phone Usage. 30-41 - Duong Dang:
Institutional Logics and Their Influence on Enterprise Architecture Adoption. 42-52 - Aaron Zimba, Zhaoshun Wang, Mumbi Chishimba:
Addressing Crypto-Ransomware Attacks: Before You Decide whether To-Pay or Not-To. 53-63 - Craig C. Claybaugh, Peter Haried, Yan Chen, Langtao Chen:
ERP Vendor Satisfaction: From Communication and IT Capability Perspectives. 64-75 - Vess Johnson, Richard W. Woolridge, Joseph R. Bell:
The Impact of Consumer Confusion on Mobile Self-Checkout Adoption. 76-86 - Junyoung Oh, Hwansoo Lee, Hangjung Zo:
The Effect of Leadership and Teamwork on ISD Project Success. 87-97
Volume 61, Number 2, 2021
- Alex Koohang, Jeretta Horn Nord, Zoroayka V. Sandoval, Joanna Paliszkiewicz:
Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance. 99-107 - Xuequn Wang, Xiaolin Lin, Nick Hajli:
Understanding Software Engineers' Skill Development in Software Development. 108-117 - Puneet Kaur, Amandeep Dhir, Sufen Chen, Risto Rajala:
Attitudinal and Behavioral Loyalty Toward Virtual Goods. 118-129 - Kathleen S. Hartzel, William E. Spangler:
A High-Reliability Approach to Risk Management in an IT Project. 130-140 - Saleh Hamed Alharthi, Yair Levy, Ling Wang, Inkyoung Hur:
Employees' Mobile Cyberslacking and Their Commitment to the Organization. 141-153 - Zhaohao Sun, Yanxia Huo:
The Spectrum of Big Data Analytics. 154-162 - Ned Kock, Murad A. Moqbel:
Social Networking Site Use, Positive Emotions, and Job Performance. 163-173 - Derek L. Nazareth, Jae Choi:
Market Share Strategies for Cloud Computing Providers. 182-192
- Retraction: Gender Reputation Differences on Online Programming Q&A Communities. 193
- (Withdrawn) RETRACTED ARTICLE: Gender Reputation Differences on Online Programming Q&A Communities.
Volume 61, Number 3, 2021
- Carlene Blackwood-Brown, Yair Levy, John D'Arcy:
Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective. 195-206 - Brian Cusack, Eghbal Ghazizadeh:
Formulating Knowledge-Based Cloud Identity Selection. 207-218 - Cheryl Aasheim, Jeffrey P. Kaleta, Paige Rutner:
Assessing IT Students' Intentions to Commit Unethical Actions. 219-228 - Evren Eryilmaz, Brian Thoms, Zafor Ahmed, Kuo-Hao Lee:
Affordances of Recommender Systems for Disorientation in Large Online Conversations. 229-239 - Lori N. K. Leonard, Kiku Jones:
Trust in C2C Electronic Commerce: Ten Years Later. 240-246 - Jun-Jie Hew, Voon-Hsien Lee, Keng-Boon Ooi, Binshan Lin:
Computer Science in ASEAN: A Ten-Year Bibliometric Analysis (2009-2018). 247-255 - Dong-Gil Ko, Gwanhoo Lee, Mark Keil, Weidong Xia:
Project Control, Coordination, and Performance in Complex Information Systems Outsourcing. 256-266 - Jeffrey A. Stone, S. Hakan Can:
Investigating Factors of Twitter Use among Municipal Governments. 267-274 - Xuequn Wang, Xiaolin Lin, Zilong Liu:
Understanding Consumers' Post-Adoption Behavior in Sharing Economy Services. 275-284 - Jong-Hyun Park, Yun Bae Kim:
Factors Activating Big Data Adoption by Korean Firms. 285-293
Volume 61, Number 4, 2021
- Oswaldo E. Diaz, María Gabriela Perez, Jorge Edison Lascano:
Literature Review about Intention Mining in Information Systems. 295-304
- Katarzyna Toskin, Richard V. McCarthy:
Information Technology Work Value Differences. 305-313 - Huosong Xia, Xiaoting Pan, Wuyue An, Zuopeng Justin Zhang:
Can Online Rating Reflect Authentic Customer Purchase Feelings? Understanding How Customer Dissatisfaction Relates to Negative Reviews. 314-327 - Janice C. Sipior, Danielle R. Lombardi, Renata Gabryelczyk:
Information Technology Operational Risk: A Teaching Case. 328-344 - Inho Hwang, Robin L. Wakefield, Sanghyun Kim, Taeha Kim:
Security Awareness: The First Step in Information Security Compliance Behavior. 345-356 - Lin Qiao, Mengmeng Song, Nan (Tina) Wang:
Virtual Brand Community Experience, Identification, and Electronic Word-of-mouth. 357-370 - Keng-Boon Ooi, Voon-Hsien Lee, Jun-Jie Hew, Binshan Lin:
Mobile Social Cyberbullying: Why are Keyboard Warriors Raging? 371-382 - Philip Tin Yun Lee, Michael Chau, Richard Wing Cheung Lui:
The Role of Attitude toward Challenge in Serious Game Design. 383-394
Volume 61, Number 5, 2021
- Michael J. Cuellar, Manoucheher Tabatabaei, Thomas Case:
Antecedents of Technology Selection for Project Use. 395-409 - Lidong Wang, Randy Jones:
Big Data Analytics in Cyber Security: Network Traffic and Attacks. 410-417 - Milos Ulman, Cristina Galamba Marreiros, Rui Quaresma, Albert L. Harris:
IT Ethics Perceptions and Behavior: An International Comparison. 418-427 - Marcus Eriksson, Bruce Ferwerda:
Towards a User Experience Framework for Business Intelligence. 428-437 - Thomas A. Chapman, Brian J. Reithel:
Perceptions of Cybersecurity Readiness among Workgroup IT Managers. 438-449 - Raymond Angelo, Richard McCarthy:
A Pedagogy to Develop Effective Virtual Teams. 450-457 - Angela Siew-Hoong Lee, Shan Wang, William Yeoh, Novita Ikasari:
Understanding the Use of Knowledge Sharing Tools. 458-470 - Hamid Reza Nikkhah, Franck Loic Soh Noume, Beverly A. Hodges-McDaniel, Rajiv Sabherwal:
Team Performance and Triangle Approach: A Longitudinal Study. 471-480 - Indrit Troshani, Sally Rao Hill, Claire Sherman, Damien Arthur:
Do We Trust in AI? Role of Anthropomorphism and Intelligence. 481-491
Volume 61, Number 6, 2021
- Ji-Myoun Lee, Gee-Woo Bock, Ayoung Suh:
The Influence of Social Power on Knowledge Utilization. 493-506 - Jong-Hyun Kim, Rajiv Sabherwal, Gee-Woo Bock, Han-Min Kim:
Understanding Social Media Monitoring and Online Rumors. 507-519 - Zhongwei Gu, June Wei:
Empirical Study on Initial Trust of Wearable Devices Based on Product Characteristics. 520-528 - Vess L. Johnson, Angelina I. T. Kiser, Richard W. Woolridge:
Factors Affecting Coproduction Resentment within a Self-checkout Environment. 529-538 - Hamidreza Shahbaznezhad, Farzan Kolini, Mona Rashidirad:
Employees' Behavior in Phishing Attacks: What Individual, Organizational, and Technological Factors Matter? 539-550 - E. Mitchell Church, Xia Zhao, Lakshmi S. Iyer:
Media-Generating Activities and Follower Growth within Social Networks. 551-560 - Breno Gontijo Tavares, Mark Keil, Carlos Eduardo Sanches da Silva, Adler Diniz de Souza:
A Risk Management Tool for Agile Software Development. 561-570 - Forough Nasirpouri Shadbad, David Biros:
Understanding Employee Information Security Policy Compliance from Role Theory Perspective. 571-580 - Daniel Adomako Asamoah:
Utilizing a Simulation Approach for Data Analytics Pedagogy. 581-591
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.