default search action
Journal of Computer Information Systems, Volume 55
Volume 55, Number 1, 2014
- Liqiang Chen:
Understanding it Entrepreneurial Intention: An Information Systems View. 2-12 - Gaurav Bansal, Fatemeh "Mariam" Zahedi:
Trust-Discount Tradeoff in Three Contexts: Frugality Moderating Privacy and Security Concerns. 13-29 - Shouhong Wang, Hai Wang:
Redesigning the Information Systems Analysis and Design Course: Curriculum Renewal. 30-39 - Brandi N. Guidry Hollier, David P. Stevens:
Comparing Perceptions of the Systems Analysis and Design Course. 40-47 - Dwayne Whitten, Ross Hightower, Lutfus Sayeed:
Mobile Device Adaptation Efforts: The Impact of Hedonic and Utilitarian Value. 48-58 - Robert J. Boncella, Wenying Nan Sun, Carol J. Boncella:
Information Technology and Human Factors Affecting Active Medication List Accuracy. 59-69 - William E. Spangler, Robert Sroufe, Matthew Madia, Jyothsna Singadivakkam:
Sustainability-Focused Knowledge Management in a Global Enterprise. 70-82 - Philip Menard, Robert Gatlin, Merrill Warkentin:
Threat Protection and Convenience: Antecedents of Cloud-Based Data Backup. 83-91 - Jeretta Horn Nord, Joanna Paliszkiewicz, Alex Koohang:
Using Social Technologies for Competitive Advantage: Impact on Organizations and Higher Education. 92-104 - William Yeoh, Gregory Richards, Shan Wang:
Benefits and Barriers to Corporate Performance Management Systems. 105-116
Volume 55, Number 2, 2015
- Cheolho Yoon, Erik Rolland:
Understanding Continuance Use in Social Networking Services. 1-8 - Dustin Ormond, Merrill Warkentin:
Is this a Joke? The Impact of Message Manipulations on Risk Perceptions. 9-19 - David C. Li:
Online Security Performances and Information Security Disclosures. 20-28 - Jiwat Ram, David Corkindale, Ming-Lu Wu:
Examining the Role of Organizational Readiness in Erp Project Delivery. 29-39 - HeeJeong Jasmine Lee, Kok-Lim Alvin Yau:
Addressing the Major Information Technology Challenges of Electronic Textbooks. 40-47 - Wing S. Chow, Si Shi:
Investigating Customers' Satisfaction with Brand Pages in Social Networking Sites. 48-58 - Christie M. Fuller, David P. Biros, Douglas P. Twitchell, Rick L. Wilson:
Real-World Deception and the Impact of Severity. 59-67 - Michal Pietrzak, Krzysztof Jalosinski, Joanna Paliszkiewicz, Andrzej Brzozowski:
A Case Study of Strategic Group Map Application Used as a Tool for Knowledge Management. 68-77 - Shuiqing Yang, Yuangao Chen, June Wei:
Understanding Consumers' Web-Mobile Shopping Extension Behavior: A Trust Transfer Perspective. 78-87 - Hans Solli-Sæther, Petter Gottschalk:
Stages-of-Growth in Outsourcing, Offshoring and Backsourcing: Back to the Future? 88-94
Volume 55, Number 3, 2015
- Jijie Wang, Mark Keil, Li Wang:
The Effect of Moral Intensity on it Employees' Bad News Reporting. 1-10 - Yan Chen, Keshavamurthy Ramamurthy, Kuang-Wei Wen:
Impacts of Comprehensive Information Security Programs on Information Security Culture. 11-19 - Sumali J. Conlon, Alan S. Abrahams, Lakisha L. Simmons:
Terrorism Information Extraction from Online Reports. 20-28 - Garry L. White:
Education and Prevention Relationships on Security Incidents for Home Computers. 29-37 - Iván Alfaro, Mary Beth Watson-Manheim:
Social Media: A Technology that needs no Support from It...Yet. 38-45 - Raymond M. Henry, Ravi Narayanaswamy, Russell L. Purvis:
Effect of Control on Information Systems Development Performance: A Meta-Analysis. 46-54 - Yi-Wen Fan, Chun-Der Chen, Cheng-Chieh Wu, Yu-Hsien Fang:
The Effect of Status Quo Bias on Cloud System Adoption. 55-64 - Libby Elliott, Eusebio Scornavacca Jr., Stuart J. Barnes:
Wireless Technologies in New Zealand Businesses: A Longitudinal Assessment. 65-71 - Tanja Grubljesic, Jurij Jaklic:
Conceptualization of the Business Intelligence Extended Use Model. 72-82 - Ofir Turel:
An Empirical Examination of the "Vicious Cycle" of Facebook Addiction. 83-91
Volume 55, Number 4, 2015
- Hua Xin, Angsana A. Techatassanasoontorn, Felix B. Tan:
Antecedents of Consumer Trust in Mobile Payment Adoption. 1-10 - Babajide Osatuyi:
Personality Traits and Information Privacy Concern on Social Media Platforms. 11-19 - Jeffrey L. May, Diane Lending:
A Conceptual Model for Communicating an Integrated Information Systems Curriculum. 20-27 - Soon G. Hong, Silvana Trimi, Dong W. Kim, Joon H. Hyun:
A Delphi Study of Factors Hindering Web Accessibility for Persons with Disabilities. 28-34 - Mohammadreza Mousavizadeh, Sherry D. Ryan, Gina Harden, John C. Windsor:
Knowledge Management and the Creation of Business Value. 35-45 - Huilin Xiao, Qilin Cao, Xubin Cao, Yong Lu:
Linear and Nonlinear Relationships on E-Repository Adoption. 46-52 - Mohd Hisham Mohd Sharif, Indrit Troshani, Robyn Davidson:
Public Sector Adoption of Social Media. 53-61 - Jun Sun, Zhaojun Yang, Ying Wang, Yali Zhang:
Rethinking E-Commerce Service Quality: Does Website Quality Still Suffice? 62-72 - Anteneh Ayanso, Kaveepan Lertwachara:
Analyzing Customer Service Technologies for Online Retailing: A Customer Service Life Cycle Approach. 73-80 - Weng Marc Lim:
The Influence of Internet Advertising and Electronic Word of Mouth on Consumer Perceptions and Intention: Some Evidence from Online Group Buying. 81-89
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.