default search action
European Journal of Information Systems, Volume 26
Volume 26, Number 1, January 2017
- Elina Niemimaa, Marko Niemimaa:
Information systems security policy implementation in practice: from best practices to situated practices. 1-20 - Magno Queiroz:
Mixed results in strategic IT alignment research: a synthesis and empirical study. 21-36 - Rachida Parks, Heng Xu, Chao-Hsien Chu, Paul Benjamin Lowry:
Examining the intended and unintended consequences of organisational privacy safeguards. 37-65 - Peter Axel Nielsen, John Stouby Persson:
Useful business cases: value creation in IS projects. 66-83 - Christoph Rosenkranz, Roland Holten, Marc Räkers, Wolf Behrmann:
Supporting the design of data integration requirements during the development of data warehouses: a communication theory-based approach. 84-115
Volume 26, Number 2, March 2017
- Sabine Dernbecher, Roman Beck:
The concept of mindfulness in information systems research: a multi-dimensional analysis. 121-142 - Carl Erik Moe, Mike Newman, Maung Kyaw Sein:
The public procurement of information systems: dialectics in requirements specification. 143-163 - Damien Power, Richard L. Gruner:
Variable use of standards-based IOS enabling technologies in Australian SMEs: an examination of deliberate and emergent decision making processes. 164-184 - Bangho Cho, Sung Yul Ryoo, Kyung Kyu Kim:
Interorganizational dependence, information transparency in interorganizational information systems, and supply chain performance. 185-205 - Balasubramaniam Ramesh, Lan Cao, Jongwoo Kim, Kannan Mohan, Tabitha L. James:
Conflicts and complements between eastern cultures and agile methods: an empirical investigation. 206-235
Volume 26, Number 3, May 2017
- Dov Te'eni:
Digital natives and immigrant editors, and special issues. 237-239 - Michel Avital, Lars Mathiassen, Ulrike Schultze:
Alternative genres in information systems research. 240-247 - Richard J. Boland, Kalle Lyytinen:
The limits to language in doing systems design. 248-259 - David E. Avison, Julien Malaurent, Philippe Eynaud:
A narrative approach to publishing information systems research: inspiration from the French New Novel tradition. 260-273 - Mads Bødker:
"What else is there...?": reporting meditations in experiential computing. 274-286 - Elpida Prasopoulou:
A half-moon on my skin: a memoir on life with an activity tracker. 287-297 - Michelle L. Kaarst-Brown:
Once upon a time: Crafting allegories to analyze and share the cultural complexity of strategic alignment. 298-314 - James Love, Rudy Hirschheim:
Crowdsourcing of information systems research. 315-332
Volume 26, Number 4, July 2017
- Sven Laumer, Christian Maier, Tim Weitzel:
Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users. 333-360 - Matthias Wenzel, Heinz-Theo Wagner, Jochen Koch:
The funeral industry and the Internet: on the historical emergence and destabilization of strategic paths. 361-378 - Gregory D. Moody, Paul Benjamin Lowry, Dennis F. Galletta:
It's complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis. 379-413 - Roozmehr Safi, Yang Yu:
Online product review as an indicator of users' degree of innovativeness and product adoption time: a longitudinal analysis of text reviews. 414-431 - Hung-Pin Shih, Kee-hung Lai, T. C. E. Cheng:
Constraint-based and dedication-based mechanisms for encouraging online self-disclosure: Is personalization the only thing that matters? 432-450
Volume 26, Number 5, September 2017
- Tobias Mettler, Michaela Sprenger, Robert Winter:
Service robots in hospitals: new perspectives on niche evolution and technology affordances. 451-468 - Joseph K. Nwankpa, Pratim Datta:
Balancing exploration and exploitation of IT resources: the influence of Digital Business Intensity on perceived organizational performance. 469-488 - Ricky Y. K. Chan, Katherine H. Y. Ma:
Impact of executive compensation on the execution of IT-based environmental strategies under competition. 489-508 - Ryan T. Wright, Nicholas H. Roberts, David W. Wilson:
The role of context in IT assimilation: A multi-method study of a SaaS platform in the US nonprofit sector. 509-539
Volume 26, Number 6, November 2017
- Dov Te'eni, Stefan Seidel, Jan vom Brocke:
Stimulating dialog between information systems research and practice. 541-545 - Paul Benjamin Lowry, Tamara Dinev, Robert Willison:
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. 546-563 - Gregory D. Moody, Dennis F. Galletta, Brian Kimball Dunn:
Which phish get caught? An exploratory study of individuals′ susceptibility to phishing. 564-584 - Clay Posey, Uzma Raja, Robert E. Crossler, A. J. Burns:
Taking stock of organisations' protection of privacy: categorising and assessing threats to personally identifiable information in the USA. 585-604 - W. Alec Cram, Jeffrey Proudfoot, John D'Arcy:
Organizational information security policies: a review and research framework. 605-641 - Zafer D. Ozdemir, H. Jeff Smith, John H. Benamati:
Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. 642-660 - Abdullah Algarni, Yue Xu, Taizan Chan:
An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook. 661-687 - Sabrina Karwatzki, Manuel Trenz, Virpi Kristiina Tuunainen, Daniel Veit:
Adverse consequences of access to individuals' information: an analysis of perceptions and the scope of organisational influence. 688-715
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.