default search action
Journal of Management Information Systems, Volume 29
Volume 29, Number 1, Summer 2012
- Vladimir Zwass:
Editorial Introduction. 5-14 - Amrit Tiwana:
Novelty-Knowledge Alignment: A Theory of Design Convergence in Systems Development. 15-52 - Jong Seok Lee, Mark Keil, Vijay Kasi:
The Effect of an Initial Budget and Schedule Goal on Software Project Escalation. 53-78 - Likoebe M. Maruping, Massimo Magni:
What's the Weather Like? The Effect of Team Learning Climate, Empowerment Climate, and Gender on Individuals' Technology Exploration and Use. 79-114 - Shirish C. Srivastava, Thompson SianHin Teo:
Contract Performance in Offshore Systems Development: Role of Control Mechanisms. 115-158 - Samuel Otim, Kevin E. Dow, Varun Grover, Jeffrey A. Wong:
The Impact of Information Technology Investments on Downside Risk of the Firm: Alternative Measurement of the Business Value of IT. 159-194 - Mei Lin, Xuqing Ke, Andrew B. Whinston:
Vertical Differentiation and a Comparison of Online Advertising Models. 195-236 - Alexander Benlian, Ryad Titah, Thomas Hess:
Differential Effects of Provider Recommendations and Consumer Reviews in E-Commerce Transactions: An Experimental Study. 237-272 - Zhongyun Zhou, Yulin Fang, Douglas R. Vogel, Xiaoling Jin, Xi Zhang:
Attracted to or Locked In? Predicting Continuance Intention in Social Virtual World Services. 273-306 - Zeying Wan, Deborah Compeau, Nicole Haggerty:
The Effects of Self-Regulated Learning Processes on E-Learning Outcomes in Organizational Settings. 307-340 - Geng Cui, Man Leung Wong, Xiang Wan:
Cost-Sensitive Learning via Priority Sampling to Improve the Return on Marketing and CRM Investment. 341-374
Volume 29, Number 2, Fall 2012
- Vladimir Zwass:
Editorial Introduction. 5-6
- Robert J. Kauffman, Thomas A. Weber, Dongjun Wu:
Special Section: Information and Competitive Strategy in a Networked Economy. 7-10 - Xiaoquan (Michael) Zhang, Chong (Alex) Wang:
Network Positions and Contributions to Online Public Goods: The Case of Chinese Wikipedia. 11-40 - Qian Candy Tang, Bin Gu, Andrew B. Whinston:
Content Contribution for Revenue Sharing and Reputation in Social Media: A Dynamic Structural Model. 41-76 - Debabrata Dey, Atanu Lahiri, Guoying Zhang:
Hacker Behavior, Network Effects, and the Security Software Market. 77-108 - Ravi Mantena, Rajib L. Saha:
Co-opetition Between Differentiated Platforms in Two-Sided Markets. 109-140
- Li Chen, James R. Marsden, Zhongju Zhang:
Theory and Analysis of Company-Sponsored Value Co-Creation. 141-172 - Xiao Fang, Paul Jen-Hwa Hu, Michael Chau, Han-fen Hu, Zhuo Yang, Olivia R. Liu Sheng:
A Data-Driven Approach to Measure Web Site Navigability. 173-212 - Arun Rai, Mark Keil, Rob Hornyak, Kim Wüllenweber:
Hybrid Relational-Contractual Governance for Business Process Outsourcing. 213-256 - Corey M. Angst, Sarv Devaraj, John D'Arcy:
Dual Role of IT-Assisted Communication in Patient Care: A Validated Structure-Process-Outcome Framework. 257-292 - Aaron Baird, Michael F. Furukawa, T. S. Raghu:
Understanding Contingencies Associated with the Early Adoption of Customer-Facing Web Portals. 293-324 - Nianxin Wang, Huigang Liang, Weijun Zhong, Yajiong Xue, Jinghua Xiao:
Resource Structuring or Capability Building? An Empirical Study of the Business Value of Information Technology. 325-367
Volume 29, Number 3, Winter 2013
- Vladimir Zwass:
Editorial Introduction. 5-8 - Massimo Magni, Corey M. Angst, Ritu Agarwal:
Everybody Needs Somebody: The Influence of Team Network Structure on Information Technology Use. 9-42 - Monica J. Garfield, Alan R. Dennis:
Toward an Integrated Model of Group Development: Disruption of Routines by Technology-Induced Change. 43-86 - Ofer Arazy, Ian R. Gellatly:
Corporate Wikis: The Effects of Owners' Motivation and Behavior on Group Members' Engagement. 87-116 - Kai Lung Hui, Wendy Hui, Wei T. Yue:
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement. 117-156 - Yan Chen, K. Ram Ramamurthy, Kuang-Wei Wen:
Organizations' Information Security Policy Compliance: Stick or Carrot Approach? 157-188 - Xia Zhao, Ling Xue:
Competitive Target Advertising and Consumer Data Sharing. 189-222 - Yinping Yang, Sharad Singhal, Yunjie Calvin Xu:
Alternate Strategies for a Win-Win Seeking Agent in Agent-Human Negotiations. 223-256 - Weiling Ke, Chuan-Hoo Tan, Choon-Ling Sia, Kwok-Kee Wei:
Inducing Intrinsic Motivation to Explore the Enterprise System: The Supremacy of Organizational Levers. 257-290 - Xuefei (Nancy) Deng, Lei Chi:
Understanding Postadoptive Behaviors in Information Systems Use: A Longitudinal Analysis of System Use Problems in the Business Intelligence Context. 291-326 - Gimun Kim, Bongsik Shin, Ohbyung Kwon:
Investigating the Value of Sociomaterialism in Conceptualizing IT Capability of a Firm. 327-362
Volume 29, Number 4, Spring 2013
- Vladimir Zwass:
Editorial Introduction. 5-6 - Stacie Petter, William H. DeLone, Ephraim R. McLean:
Information Systems Success: The Quest for the Independent Variables. 7-62 - Alexander Benlian:
Effect Mechanisms of Perceptual Congruence Between Information Systems Professionals and Users on Satisfaction with Service. 63-96
- Robert O. Briggs, Jay F. Nunamaker Jr.:
Special Issue: Multiple Dimensions of Value in Information Systems. 97-102 - Alina Dulipovici, Daniel Robey:
Strategic Alignment and Misalignment of Knowledge Management Systems: A Social Representation Perspective. 103-126 - Shu Han, Jason Nicholas Kuruzovich, T. Ravichandran:
Service Expansion of Product Firms in the Information Technology Industry: An Empirical Study. 127-158 - Robert O. Briggs, Gwendolyn L. Kolfschoten, Gert-Jan de Vreede, Stephan G. Lukosch, Conan C. Albrecht:
Facilitator-in-a-Box: Process Support Applications to Help Practitioners Realize the Potential of Collaboration Technology. 159-194 - Alan R. Dennis, Randall K. Minas, Akshay Bhagwatwar:
Sparking Creativity: Improving Electronic Brainstorming with Individual Cognitive Priming. 195-216 - Stefan Stieglitz, Linh Dang-Xuan:
Emotions and Information Diffusion in Social Media - Sentiment of Microblogs and Sharing Behavior. 217-248 - Aaron C. Elkins, Norah E. Dunbar, Bradley J. Adame, Jay F. Nunamaker Jr.:
Are Users Threatened by Credibility Assessment Systems? 249-262 - Anthony Vance, Paul Benjamin Lowry, Dennis Eggett:
Using Accountability to Reduce Access Policy Violations in Information Systems. 263-290
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.