


default search action
Information Systems Journal, Volume 25
Volume 25, Number 1, January 2015
- Philip Powell:
Editorial. 1-4
- Allen S. Lee
, Manoj A. Thomas
, Richard L. Baskerville
:
Going back to basics in design science: from the information technology artifact to the information systems artifact. 5-21 - Richard L. Baskerville
, Michael D. Myers
:
Design ethnography in information systems. 23-46 - Steven Alter:
The concept of 'IT artifact' has outlived its usefulness and should be retired now. 47-60
- Balasubramaniam Ramesh
, Lan Cao, Richard L. Baskerville
:
Erratum. 65
Volume 25, Number 2, March 2015
- Eileen M. Trauth:
Editorial. 67-69
- Kalle Lyytinen, Mike Newman:
A tale of two coalitions - marginalising the users while successfully implementing an enterprise resource planning system. 71-101 - Monideepa Tarafdar
, Ellen Bolman Pullins, T. S. Ragu-Nathan:
Technostress: negative effect on performance and possible mitigations. 103-132 - Benjamin P. W. Ellway
, Geoff Walsham:
A doxa-informed practice analysis: reflexivity and representations, technology and action. 133-160
Volume 25, Number 3, May 2015
- Monideepa Tarafdar
, Ashish Gupta, Ofir Turel
:
Editorial. 161-170
- Jenine P. Beekhuyzen, Liisa von Hellens, Sue H. Nielsen:
Illuminating the underground: the reality of unauthorised file sharing. 171-192 - Paul Benjamin Lowry, Clay Posey, Rebecca J. Bennett, Tom L. Roberts:
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust. 193-273 - Shamel Addas
, Alain Pinsonneault:
The many faces of information technology interruptions: a taxonomy and preliminary investigation of their performance effects. 231-273 - Christian Maier, Sven Laumer, Christoph Weinert
, Tim Weitzel:
The effects of technostress and switching stress on discontinued use of social networking services: a study of Facebook use. 275-308
- Stan Karanasios
, David K. Allen, Patrick Finnegan:
Information Systems Journal Special Issue on: Activity Theory in Information Systems Research. 309-313
Volume 25, Number 4, July 2015
Editorial
- Monideepa Tarafdar, Ashish Gupta, Ofir Turel
:
Introduction to the special issue on 'dark side of information technology use' - part two. 315-317
- João Vieira da Cunha
, Andrea Carugati
, Aurélie Leclercq-Vandelannoitte:
The dark side of computer-mediated control. 319-354 - Shirish C. Srivastava, Shalini Chandra, Anuragini Shirish
:
Technostress creators and job outcomes: theorising the moderating influence of personality traits. 355-401 - Amr A. Soror, Bryan I. Hammer
, Zachary R. Steelman, Fred D. Davis, Moez Limayem:
Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual-systems perspective. 403-427
Volume 25, Number 5, September 2015
- Robert M. Davison
:
Editorial-The Art of Constructive Reviewing. 429-432
- Paul Benjamin Lowry, Gregory D. Moody:
Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies. 433-463 - Matthias Trier, Alexander Richter
:
The deep structure of organizational online networking - an actor-oriented case study. 465-488 - Xuefei (Nancy) Deng, Tawei Wang
, Robert D. Galliers:
More than providing 'solutions': towards an understanding of customer-oriented citizenship behaviours of IS professionals. 489-530 - Jeremy Rose, John Stouby Persson, Lise Tordrup Heeager, Zahir Irani:
Managing e-Government: value positions and relationships. 531-571
Volume 25, Number 6, November 2015
Editorial
- France Bélanger, Heng Xu:
The role of information systems research in shaping the future of information privacy. 573-578
- Kathleen E. Greenaway, Yolande E. Chan
, Robert E. Crossler
:
Company information privacy orientation: a conceptual framework. 579-606 - Flavius Kehr, Tobias Kowatsch
, Daniel Wentzel, Elgar Fleisch:
Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus. 607-635 - Mark J. Keith
, Jeffry S. Babb, Paul Benjamin Lowry, Christopher P. Furner, Amjad Abdullat:
The role of mobile-computing self-efficacy in consumer information disclosure. 637-667

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.