All Stories

  1. Interorganizational cooperation and supplier performance in high-technology supply chains
  2. A Review and Theoretical Explanation of the ‘Cyberthreat-Intelligence (CTI) Capability’ that Needs to be Fostered in Information Security Practitioners and How this Can be Accomplished
  3. Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance
  4. The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Security-Based Precaution Taking
  5. Effects of the Design of Mobile Security Notifications and Mobile App Usability on Users’ Security Perceptions and Continued-Use Intention
  6. An Integrative Theory Addressing Cyberharassment in the Light of Technology-Based Opportunism
  7. Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes
  8. Institutional Governance and Protection Motivation: Theoretical Insights into Shaping Employees’ Security Compliance Behavior in Higher Education Institutions in the Developing World
  9. Does more accessibility lead to more disclosure? Exploring the influence of information accessibility on self-disclosure in online social networks
  10. Digital Borders, Location Recognition, and Experience Attribution within a Digital Geography
  11. The process of information systems theorizing as a discursive practice
  12. Visual storytelling for improving the comprehension and utility in disseminating information systems research: Evidence from a quasi‐experiment
  13. Does opportunity make the thief? Abilities and moral disengagement in illegal downloading
  14. The Influence of Role Stress on Self-disclosure on Social Networking Sites: A Conservation of Resources Perspective
  15. A storyteller's guide to problem-based learning for information systems management education
  16. Why students engage in cyber-cheating through a collective movement: A case of deviance and collusion
  17. Research Commentary: Setting a Definition, Context, and Theory-Based Research Agenda for the Gamification of Non-Gaming Applications
  18. Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities
  19. The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination
  20. Absorbing Knowledge from and with External Partners: The Role of Social Integration Mechanisms
  21. Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives
  22. A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research
  23. Solving the Interpretational-Confounding and Interpretational-Ambiguity Problems of Formative Construct Modeling in Behavioral Research: Proposing a Two-Stage Fixed-Weight Redundancy Approach
  24. Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
  25. Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
  26. Using IT Design to Prevent Cyberbullying
  27. How increased social presence through co-browsing influences user engagement in collaborative online shopping
  28. Using multistage competing risks approaches to model web page transitions
  29. The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks
  30. The agent bidding habit and use model (ABHUM) and its validation in the Taobao online auction context
  31. It’s complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis
  32. Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework
  33. Using Item Response Theory in Information Systems Research
  34. Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals
  35. Gender deception in asynchronous online communication: A path analysis
  36. Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model
  37. Semantic Learning-Based Innovation Framework for Social Media
  38. “Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels
  39. Technology Evaluation and Imitation: Do They Have Differential or Dichotomous Effects on ERP Adoption and Assimilation in China?
  40. Creating agile organizations through IT: The influence of internal IT service perceptions on IT service quality and IT agility
  41. The effects of perceived enjoyment and perceived risks on trust formation and intentions to use online payment systems: New perspectives from an Arab country
  42. Examining the intended and unintended consequences of organisational privacy safeguards
  43. How do bidders’ organism reactions mediate auction stimuli and bidder loyalty in online auctions? The case of Taobao in China
  44. Application of Expectancy Violations Theory to communication with and judgments about embodied agents during a decision-making task
  45. Factors that influence interorganizational use of information and communications technology in relationship-based supply chains: evidence from the Macedonian and American wine industries
  46. The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets
  47. Using trust and anonymity to expand the use of anonymizing systems that improve security across organizations
  48. The assimilation of RFID technology by Chinese companies: A technology diffusion perspective
  49. Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation
  50. The role of mobile-computing self-efficacy in consumer information disclosure
  51. The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness
  52. What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
  53. User acceptance of knowledge-based system recommendations: Explanations, arguments, and fit
  54. Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust
  55. Dimensions of Business-to-Consumer (B2C) Systems Success in Kuwait
  56. Patient Compliance Behavior in a Mobile Healthcare System: An Integration of Theories of Rational Choice and Planned Behavior
  57. Is Trust Always Better than Distrust? The Potential Value of Distrust in Newer Virtual Teams Engaged in Short-Term Decision-Making
  58. Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies
  59. Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals
  60. Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders
  61. Proposing the Affect-Trust Infusion Model (ATIM) to explain and predict the influence of high and low affect infusion on Web vendor trust
  62. When trust and distrust collide online: The engenderment and role of consumer ambivalence in online consumer behavior
  63. Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It
  64. A Longitudinal Study of Information Privacy on Mobile Devices
  65. Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior
  66. A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and Website Design for Heightened Credibility and Consumer Trust
  67. Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals
  68. The Drivers in the Use of Online Whistle-Blowing Reporting Systems
  69. Investigation of the Radio Frequency Identification Assimilation Process in China: A Stage-based Model Perspective
  70. Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse
  71. Using Accountability to Reduce Access Policy Violations in Information Systems
  72. What signal is your inspection team sending to each other? Using a shared collaborative interface to improve shared cognition and implicit coordination in error-detection teams
  73. Future directions for behavioral information security research
  74. Explaining Opposing Compliance Motivations towards Organizational Information Security Policies
  75. Unifying Conflicting Models of Trust and Distrust for Enhanced Understanding and Predictive Power in Organizational Relationships: Proposing the Unified Trust-Distrust Model (UTDM)
  76. Reducing Unauthorized Access by Insiders through User Interface Design: Making End Users Accountable
  77. Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers
  78. Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment
  79. Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures
  80. Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment
  81. Effects of culture, social presence, and group composition on trust in technology-supported decision-making groups
  82. Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities
  83. Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect
  84. The Value of Distrust in Computer-Based Decision-Making Groups
  85. Creating automated plans for Semantic Web applications through planning as model checking
  86. The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups
  87. Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites
  88. Minitrack Introduction
  89. Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems
  90. A Scientometric Study of the Perceived Quality of Business and Technical Communication Journals
  91. Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection
  92. The Impact of Individualism—Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence
  93. Technology-Supported Small Group Interaction: Extending a Tradition of Leading Research for Virtual Teams and Global Organizations
  94. Minitack Introduction: Cross-cultural Issues in Collaboration Technology
  95. Interactive Digital Entertainment, Social Computing, and Lifestyle Computing
  96. The Impact of National Culture and Social Pr esence on Trust and Communication Quality within Collabor ative Groups
  97. The Interactive Digital Entertainment (IDE) Unification Framework: Creating a Taxonomy of IDE and Lifestyle Computing
  98. Human-Computer Interaction. HCI Applications and Services
  99. The Impact of Group Size and Social Presence on Small-Group Communication: Does Computer-Mediated Communication Make a Difference?
  100. The application of model checking for securing e-commerce transactions
  101. Standards and verification for fair-exchange and atomicity in e-commerce transactions
  102. An Evaluation of the Impact of Social Presence Through Group Size and the Use of Collaborative Software on Group Member “Voice” in Face-to-Face and Computer-Mediated Task Groups
  103. A Theoretical Model and Empirical Results Linking Website Interactivity and Usability Satisfaction
  104. Minitrack Introduction
  105. Culture and Media Effects on Group Decision Making under Majority Influence
  106. Explaining and Predicting Outcomes of Large Classrooms Using Audience Response Systems
  107. Improving Group Communication Outcomes with Collaborative Software: The Impact of Group Size, Media Richness, and Social Presence
  108. The Impact of Process Structure on Novice, Virtual Collaborative Writing Teams
  109. Model Checking for E-Business Control and Assurance
  110. Model checking for design and assurance of e-Business processes
  111. Creating Hybrid Distributed Learning Environments by Implementing Distributed Collaborative Writing in Traditional Educational Settings
  112. Building a Taxonomy and Nomenclature of Collaborative Writing to Improve Interdisciplinary Research and Practice
  113. Using internet-based, distributed collaborative writing tools to improve coordination and group awareness in writing teams
  114. Evolutionary development and research on Internet-based collaborative writing tools and processes to enhance eWriting in an eGovernment setting
  115. The E-Business Handbook
  116. XML, A Collaborative Enabler of E-Business through the Mediation of Heterogeneous Data between Trading Partners
  117. Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect
  118. The 'Voice Effect' in Groups
  119. Information Security Policy Compliance Survey
  120. Using the Thinklet Framework to Improve Distributed Collaborative Writing
  121. Research on Proximity Choices for Distributed, Asynchronous Collaborative Writing Groups
  122. Research on Process Structure for Distributed, Asynchronous Collaborative Writing Groups
  123. Design Requirements for Collaborative Writing Tools for Distributed Work Over the Internet
  124. Dependability Auditing with Model Checking
  125. Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems
  126. Improving Design Artifact Reviews with Group Support Systems and an Extension of Heuristic Evaluation Techniques
  127. Synchronous, distributed collaborative writing for policy agenda setting using Collaboratus, an Internet-based collaboration tool
  128. Users' experiences in collaborative writing using Collaboratus, an Internet-based collaborative work
  129. Using the thinkLet framework to improve distributed collaborative writing
  130. XML data mediation and collaboration: a proposed comprehensive architecture and query requirements for using XML to mediate heterogeneous data sources and targets
  131. Biometrics, A Critical Consideration in Information Security Management
  132. Making Money with Open-Source Business Initiatives
  133. Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems
  134. Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems
  135. Biometrics, A Critical Consideration in Information Security Management
  136. Making Money with Open-Source Business Initiatives
  137. Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems
  138. Users Experiences in Collaborative Writing Using Collaboratus, an Internet-Based Collaborative Work
  139. New Perspectives on Global Information Systems Journal Rankings and Reference Disciplines
  140. Improving the Usability Evaluation Technique, Heuristic Evaluation, Through the Use of Collaborative Software
  141. Improving Design Artifact Reviews with Group Support Systems and an Extension of Heuristic Evaluation Techniques
  142. The IS Core: An Integration of the Core IS Courses
  143. The Potential of Group Support Systems (Gss) to Enhance Systems Analysis and Design Processes and Outcomes
  144. Making Money with Open-Source Business Initiatives
  145. Biometrics, A Critical Consideration in Information Security Management
  146. Revisiting Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems
  147. Xml Data Mediation and Collaboration: A Proposed Comprehensive Architecture and Query Requirements for Using Xml to Mediate Heterogeneous Data Sources and Targets
  148. The Interactive Digital Entertainment (Ide) Unification Framework: Creating a Taxonomy of Ide and Lifestyle Computing
  149. The Impact of National Culture and Social Presence on Trust and Communication Quality within Collaborative Groups
  150. Proposing the Interactivity-Stimulus-Attention Model (ISAM) to Explain and Predict Enjoyment, Immersion, and Adoption of Purely Hedonic Systems
  151. The Value of Distrust in Computer-Based Decision-Making Groups
  152. Overview and Guidance on Agile Development in Large Organizations
  153. Bridging the Divide: A Qualitative Comparison of Information Security Thought Patterns between Information Security Professionals and Ordinary Organizational Insiders