All Stories

  1. Understanding the Influence of Data Breaches on Patients’ Willingness to Share Protected Health Information: A Mixed Methods Study of a Construals Privacy Calculus Perspective
  2. <p><span>Words Matter When Gangs Cyberbang: Predicting Imminent Urban Violence from Gang Members’ Social Media Posts</span></p>
  3. Proposing a Design Theory for a Human-Learning-Guided Virtual Negotiator for Online Trading PlatformsSupplementary Materials for Proposing a Design Theory for a Human-Learning-Guided Virtual Negotiator for Online Trading Platforms
  4. Are negative reviews always helpful? effects of emotional arousal on the usefulness of negative reviews and how merchants should respond
  5. Heeding the Messenger: The Influence of Sender Characteristics on Security Message Compliance Intentions
  6. A Visual Literature Review on Continuous Intention to Use Online Learning Systems
  7. Enhancing team creativity among information technology professionals through knowledge sharing and motivational rewards: A self-determination perspective
  8. Uncovering the effects of non-hedonic social media use on knowledge workers’ depression through the conservation of resources theory
  9. Understanding the postadoption use of gamified learning systems against the conflicting role of the game layer
  10. Essential Validation Criteria for Rigorous Covariance‐Based Structural Equation Modelling
  11. Achieving strategic alignment between business and information technology with information technology governance: the role of commitment to principles and Top Leadership Support
  12. The influence of ERP-vendor contract compliance and transaction-specific investment on vendee trust: A signaling theory perspective
  13. How do consumers make behavioural decisions on social commerce platforms? The interaction effect between behaviour visibility and social needs
  14. Supply Chain Resilience as Endotherm Resilience: Theorizing Through Metaphorical Transfer
  15. Balancing the commitment to the common good and the protection of personal privacy: Consumer adoption of sustainable, smart connected cars
  16. Digitalization and network capability as enablers of business model innovation and sustainability performance: The moderating effect of environmental dynamism
  17. A dual-process model to explain self-disclosure on online social networking sites: examining the moderating effect of enjoyment
  18. The antecedents of employees' proactive information security behaviour: The perspective of proactive motivation
  19. How can firms unlock successful implementation of digitalisation? Firm-level evidence from manufacturing companies
  20. Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis
  21. How Facebook's newsfeed algorithm shapes childhood vaccine hesitancy: An algorithmic fairness, accountability, and transparency (FAT) perspective
  22. The roles of user interface design and uncertainty avoidance in B2C ecommerce success: Using evidence from three national cultures
  23. How Lending Experience and Borrower Credit Influence Rational Herding Behavior in Peer-to-Peer Microloan Platform Markets
  24. Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training
  25. “Do as I say but not as I do”: Influence of political leaders’ populist communication styles on public adherence in a crisis using the global case of COVID-19 movement restrictions
  26. Achieving entrepreneurial growth despite resource and capability constraints: the role of service intermediaries
  27. The importance of theory at the Information Systems Journal
  28. Explaining the Outcomes of Social Gamification: A Longitudinal Field Experiment
  29. Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse
  30. Moving Consumers from Free to Fee in Platform-Based Markets: An Empirical Study of Multiplayer Online Battle Arena Games
  31. ISJ editorial: Addressing the implications of recent developments in journal impact factors
  32. Patient Trust in Physicians Matters—Understanding the Role of a Mobile Patient Education System and Patient-Physician Communication in Improving Patient Adherence Behavior: Field Study
  33. Balancing information privacy and operational utility in healthcare: proposing a privacy impact assessment (PIA) framework
  34. The mediating role of group dynamics in shaping received social support from active and passive use in online health communities
  35. Useful Products in Information Systems Theorizing: A Discursive Formation Perspective
  36. Do Enterprise Systems Necessarily Lead to Innovation? Identifying the Missing Links with A Moderated Mediation Model
  37. The Mediating Role of Fitness Technology Enablement of Psychological Need Satisfaction and Frustration on the Relationship between Goals for Fitness Technology Use and Use Outcomes
  38. Stock market reactions to favorable and unfavorable information security events: A systematic literature review
  39. Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model
  40. The roles of prior experience and the location on the severity of supply chain disruptions
  41. Efficiency and Exposure: Reconciling the Effects of Website Browsing Behaviors for Non-transactional Outcomes
  42. Improving the Design of Information Security Messages by Leveraging the Effects of Temporal Distance and Argument Nature
  43. Patients’ compliance behavior in a personalized mobile patient education system (PMPES) setting: Rational, social, or personal choices?
  44. Desperately seeking the artefacts and the foundations of native theory in gamification research: why information systems researchers can play a legitimate role in this discourse and how they can better contribute
  45. The effects of bidder factors on online bidding strategies: A motivation-opportunity-ability (MOA) model
  46. The nonlinear influence of harmonious information technology affordance on organisational innovation
  47. Information privacy behavior in the use of Facebook apps: A personality-based vulnerability assessment
  48. The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security
  49. Corporate crisis management on social media: A morality violations perspective
  50. The physical internet as a new supply chain paradigm: a systematic literature review and a comprehensive framework
  51. Interorganizational cooperation and supplier performance in high-technology supply chains
  52. Information Technology and organizational innovation: Harmonious information technology affordance and courage-based actualization
  53. Collaborating with technology-based autonomous agents
  54. A Review and Theoretical Explanation of the ‘Cyberthreat-Intelligence (CTI) Capability’ that Needs to be Fostered in Information Security Practitioners and How this Can be Accomplished
  55. Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance
  56. The Design of Personal Privacy and Security Risk Scores for Minimizing Consumers' Cognitive Gaps in IoT Settings
  57. The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Security-Based Precaution Taking
  58. Effects of the Design of Mobile Security Notifications and Mobile App Usability on Users’ Security Perceptions and Continued-Use Intention
  59. An Integrative Theory Addressing Cyberharassment in the Light of Technology-Based Opportunism
  60. Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes
  61. Institutional Governance and Protection Motivation: Theoretical Insights into Shaping Employees’ Security Compliance Behavior in Higher Education Institutions in the Developing World
  62. Does more accessibility lead to more disclosure? Exploring the influence of information accessibility on self-disclosure in online social networks
  63. Digital Borders, Location Recognition, and Experience Attribution within a Digital Geography
  64. The process of information systems theorizing as a discursive practice
  65. Visual storytelling for improving the comprehension and utility in disseminating information systems research: Evidence from a quasi‐experiment
  66. Does opportunity make the thief? Abilities and moral disengagement in illegal downloading
  67. The Influence of Role Stress on Self-disclosure on Social Networking Sites: A Conservation of Resources Perspective
  68. A storyteller's guide to problem-based learning for information systems management education
  69. The Effect of CIO Virtues on CIO Role Effectiveness
  70. Why students engage in cyber-cheating through a collective movement: A case of deviance and collusion
  71. Research Commentary: Setting a Definition, Context, and Theory-Based Research Agenda for the Gamification of Non-Gaming Applications
  72. Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities
  73. The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination
  74. Absorbing Knowledge from and with External Partners: The Role of Social Integration Mechanisms
  75. Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives
  76. A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research
  77. Solving the Interpretational-Confounding and Interpretational-Ambiguity Problems of Formative Construct Modeling in Behavioral Research: Proposing a Two-Stage Fixed-Weight Redundancy Approach
  78. Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
  79. Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
  80. Goals, Values, and Expectations of the AIS Family of Journals
  81. Using IT Design to Prevent Cyberbullying
  82. How increased social presence through co-browsing influences user engagement in collaborative online shopping
  83. Using multistage competing risks approaches to model web page transitions
  84. The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks
  85. The agent bidding habit and use model (ABHUM) and its validation in the Taobao online auction context
  86. It’s complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis
  87. Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework
  88. Using Item Response Theory in Information Systems Research
  89. Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals
  90. Gender deception in asynchronous online communication: A path analysis
  91. Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model
  92. Semantic Learning-Based Innovation Framework for Social Media
  93. “Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels
  94. Technology Evaluation and Imitation: Do They Have Differential or Dichotomous Effects on ERP Adoption and Assimilation in China?
  95. Creating agile organizations through IT: The influence of internal IT service perceptions on IT service quality and IT agility
  96. The effects of perceived enjoyment and perceived risks on trust formation and intentions to use online payment systems: New perspectives from an Arab country
  97. Examining the intended and unintended consequences of organisational privacy safeguards
  98. How do bidders’ organism reactions mediate auction stimuli and bidder loyalty in online auctions? The case of Taobao in China
  99. Application of Expectancy Violations Theory to communication with and judgments about embodied agents during a decision-making task
  100. Leveraging Multimedia to Advance Science by Disseminating a Greater Variety of Scholarly Contributions in More Accessible Formats
  101. Factors that influence interorganizational use of information and communications technology in relationship-based supply chains: evidence from the Macedonian and American wine industries
  102. Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess
  103. A Contingency Model of Bidding Strategies in Online Auctions in China
  104. The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets
  105. Using trust and anonymity to expand the use of anonymizing systems that improve security across organizations
  106. The assimilation of RFID technology by Chinese companies: A technology diffusion perspective
  107. Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation
  108. Proposing the Multimotive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions
  109. The role of mobile-computing self-efficacy in consumer information disclosure
  110. The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness
  111. Increasing Accountability Through User-Interface Design Artifacts: A New Approach To Addressing the Problem of Access-Policy Violations1
  112. What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
  113. User acceptance of knowledge-based system recommendations: Explanations, arguments, and fit
  114. Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust
  115. Dimensions of Business-to-Consumer (B2C) Systems Success in Kuwait
  116. Patient Compliance Behavior in a Mobile Healthcare System: An Integration of Theories of Rational Choice and Planned Behavior
  117. A Systematic Review of Social Networks Research in Information Systems: Building a Foundation for Exciting Future Research
  118. Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modeling Technique: A Tutorial and an Annotated Example
  119. Is Trust Always Better than Distrust? The Potential Value of Distrust in Newer Virtual Teams Engaged in Short-Term Decision-Making
  120. Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies
  121. Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals
  122. Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders
  123. Proposing the Affect-Trust Infusion Model (ATIM) to explain and predict the influence of high and low affect infusion on Web vendor trust
  124. When trust and distrust collide online: The engenderment and role of consumer ambivalence in online consumer behavior
  125. Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It
  126. A Longitudinal Study of Information Privacy on Mobile Devices
  127. Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior
  128. Evaluating Journal Quality and the Association for Information Systems Senior Scholars’ Journal Basket Via Bibliometric Measures: Do Expert Journal Assessments Add Value?1
  129. Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors1
  130. A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and Website Design for Heightened Credibility and Consumer Trust
  131. Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy
  132. Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals
  133. The Drivers in the Use of Online Whistle-Blowing Reporting Systems
  134. Investigation of the Radio Frequency Identification Assimilation Process in China: A Stage-based Model Perspective
  135. Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse
  136. Using Accountability to Reduce Access Policy Violations in Information Systems
  137. What signal is your inspection team sending to each other? Using a shared collaborative interface to improve shared cognition and implicit coordination in error-detection teams
  138. Future directions for behavioral information security research
  139. Explaining Opposing Compliance Motivations towards Organizational Information Security Policies
  140. Unifying Conflicting Models of Trust and Distrust for Enhanced Understanding and Predictive Power in Organizational Relationships: Proposing the Unified Trust-Distrust Model (UTDM)
  141. The Roles of Privacy Assurance, Network Effects, and Information Cascades in the Adoption of and Willingness to Pay for Location-Based Services with Mobile Applications
  142. Reducing Unauthorized Access by Insiders through User Interface Design: Making End Users Accountable
  143. Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers
  144. Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment
  145. Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures
  146. Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment
  147. Effects of culture, social presence, and group composition on trust in technology-supported decision-making groups
  148. Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities
  149. Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect
  150. The Value of Distrust in Computer-Based Decision-Making Groups
  151. Creating automated plans for Semantic Web applications through planning as model checking
  152. The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups
  153. Toward Building Self-Sustaining Groups in PCR-based Tasks through Implicit Coordination: The Case of Heuristic Evaluation
  154. Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites
  155. Minitrack Introduction
  156. Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems
  157. Explaining the Key Elements of Information Systems-Based Supply-Chain Strategy That Are Necessary for Business-to-Business Electronic Marketplace Survival
  158. An Overview and Tutorial of the Repertory Grid Technique in Information Systems Research
  159. A Scientometric Study of the Perceived Quality of Business and Technical Communication Journals
  160. Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection
  161. The Impact of Individualism—Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence
  162. Technology-Supported Small Group Interaction: Extending a Tradition of Leading Research for Virtual Teams and Global Organizations
  163. Minitack Introduction: Cross-cultural Issues in Collaboration Technology
  164. Interactive Digital Entertainment, Social Computing, and Lifestyle Computing
  165. The Impact of National Culture and Social Pr esence on Trust and Communication Quality within Collabor ative Groups
  166. The Interactive Digital Entertainment (IDE) Unification Framework: Creating a Taxonomy of IDE and Lifestyle Computing
  167. Human-Computer Interaction. HCI Applications and Services
  168. Assessing Leading Institutions, Faculty, and Articles in Premier Information Systems Research Journals
  169. Assessing the Impact of Premier Information Systems Research over Time
  170. The Impact of Group Size and Social Presence on Small-Group Communication: Does Computer-Mediated Communication Make a Difference?
  171. The application of model checking for securing e-commerce transactions
  172. Standards and verification for fair-exchange and atomicity in e-commerce transactions
  173. An Evaluation of the Impact of Social Presence Through Group Size and the Use of Collaborative Software on Group Member “Voice” in Face-to-Face and Computer-Mediated Task Groups
  174. A Theoretical Model and Empirical Results Linking Website Interactivity and Usability Satisfaction
  175. Minitrack Introduction
  176. Culture and Media Effects on Group Decision Making under Majority Influence
  177. Explaining and Predicting Outcomes of Large Classrooms Using Audience Response Systems
  178. Improving Group Communication Outcomes with Collaborative Software: The Impact of Group Size, Media Richness, and Social Presence
  179. Online Payment Gateways Used to Facilitate E-Commerce Transactions and Improve Risk Management
  180. The Impact of Process Structure on Novice, Virtual Collaborative Writing Teams
  181. Model Checking for E-Business Control and Assurance
  182. Model checking for design and assurance of e-Business processes
  183. Creating Hybrid Distributed Learning Environments by Implementing Distributed Collaborative Writing in Traditional Educational Settings
  184. Global Journal Prestige and Supporting Disciplines: A Scientometric Study of Information Systems Journals
  185. Building a Taxonomy and Nomenclature of Collaborative Writing to Improve Interdisciplinary Research and Practice
  186. Using internet-based, distributed collaborative writing tools to improve coordination and group awareness in writing teams
  187. Evolutionary development and research on Internet-based collaborative writing tools and processes to enhance eWriting in an eGovernment setting
  188. The E-Business Handbook
  189. XML, A Collaborative Enabler of E-Business through the Mediation of Heterogeneous Data between Trading Partners
  190. Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect
  191. The 'Voice Effect' in Groups
  192. Information Security Policy Compliance Survey
  193. Using the Thinklet Framework to Improve Distributed Collaborative Writing
  194. Research on Proximity Choices for Distributed, Asynchronous Collaborative Writing Groups
  195. Research on Process Structure for Distributed, Asynchronous Collaborative Writing Groups
  196. Design Requirements for Collaborative Writing Tools for Distributed Work Over the Internet
  197. Dependability Auditing with Model Checking
  198. Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems
  199. Improving Design Artifact Reviews with Group Support Systems and an Extension of Heuristic Evaluation Techniques
  200. Synchronous, distributed collaborative writing for policy agenda setting using Collaboratus, an Internet-based collaboration tool
  201. Users' experiences in collaborative writing using Collaboratus, an Internet-based collaborative work
  202. Using the thinkLet framework to improve distributed collaborative writing
  203. XML data mediation and collaboration: a proposed comprehensive architecture and query requirements for using XML to mediate heterogeneous data sources and targets
  204. Biometrics, A Critical Consideration in Information Security Management
  205. Making Money with Open-Source Business Initiatives
  206. Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems
  207. Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems
  208. Biometrics, A Critical Consideration in Information Security Management
  209. Making Money with Open-Source Business Initiatives
  210. Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems
  211. Users Experiences in Collaborative Writing Using Collaboratus, an Internet-Based Collaborative Work
  212. New Perspectives on Global Information Systems Journal Rankings and Reference Disciplines
  213. Improving the Usability Evaluation Technique, Heuristic Evaluation, Through the Use of Collaborative Software
  214. Improving Design Artifact Reviews with Group Support Systems and an Extension of Heuristic Evaluation Techniques
  215. The IS Core: An Integration of the Core IS Courses
  216. The Potential of Group Support Systems (Gss) to Enhance Systems Analysis and Design Processes and Outcomes
  217. Making Money with Open-Source Business Initiatives
  218. Biometrics, A Critical Consideration in Information Security Management
  219. Revisiting Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems
  220. Xml Data Mediation and Collaboration: A Proposed Comprehensive Architecture and Query Requirements for Using Xml to Mediate Heterogeneous Data Sources and Targets
  221. The Interactive Digital Entertainment (Ide) Unification Framework: Creating a Taxonomy of Ide and Lifestyle Computing
  222. The Impact of National Culture and Social Presence on Trust and Communication Quality within Collaborative Groups
  223. Proposing the Interactivity-Stimulus-Attention Model (ISAM) to Explain and Predict Enjoyment, Immersion, and Adoption of Purely Hedonic Systems
  224. The Value of Distrust in Computer-Based Decision-Making Groups
  225. Overview and Guidance on Agile Development in Large Organizations
  226. Bridging the Divide: A Qualitative Comparison of Information Security Thought Patterns between Information Security Professionals and Ordinary Organizational Insiders
  227. First Impressions with Websites: The Effect of the Familiarity and Credibility of Corporate Logos on Perceived Consumer Swift Trust of Websites