default search action
Journal of Computer Information Systems, Volume 57
Volume 57, Number 1, 2017
- June Lu, Chang Liu, June Wei:
How Important Are Enjoyment and Mobility for Mobile Applications? 1-12 - Bostjan Delak, Olegas Vasilecas, Marko Bajec:
Novelties Within the Framework for Information System Due Diligence. 13-21 - Hongyi Sun, Pei-Lee Teh, Karis Ho, Binshan Lin:
Team Diversity, Learning, and Innovation: A Mediation Model. 22-30 - Seonjin Shin, Joon Koh:
Analysis of Mobile Broadband Service Penetration in South Korea. 31-38 - Ben Martz, Jim Hughes, Frank Braun:
Creativity and Problem-Solving: Closing The Skills Gap. 39-48 - Xuequn Wang, Yibai Li:
How Trust and Need Satisfaction Motivate Producing User-Generated Content. 49-57 - Lucian L. Visinescu, Mary C. Jones, Anna Sidorova:
Improving Decision Quality: The Role of Business Intelligence. 58-66 - Kenneth David Strang, Zhaohao Sun:
Analyzing Relationships in Terrorism Big Data Using Hadoop and Statistics. 67-75 - Shasha Teng, Kok Wei Khong, Alain Yee-Loong Chong, Binshan Lin:
Persuasive Electronic Word-of-Mouth Messages in Social Media. 76-88 - Neelima Bhatnagar, Harold Madden, Yair Levy:
Initial Empirical Testing of Potential Factors Contributing to Patient Use of Secure Medical Teleconferencing. 89-95
Volume 57, Number 2, 2017
- Nancy Tobler, Janet Colvin, Neil W. Rawlins:
Longitudinal Analysis and Coping Model of User Adaptation. 97-105 - Vered Silber-Varod, Amir Winer, Nitza Geri:
Opening the Knowledge Dam: Speech Recognition for Video Search. 106-111 - Jonathan Whitaker, Peter Ekman, Steve Thompson:
How Multinational Corporations Use Information Technology to Manage Global Operations. 112-122 - Girish H. Subramanian, Parag C. Pendharkar, Dinesh R. Pai:
An Examination of Determinants of Software Testing and Project Management Effort. 123-129 - Hongyi Sun, Waileung Ha, Pei-Lee Teh, Jianglin Huang:
A Case Study on Implementing Modularity in Software Development. 130-138 - Koteswara Ivaturi, Cecil Chua, Lech J. Janczewski:
Impact of Information Seeking and Warning Frames on Online Deception: A Quasi-Experiment. 139-147 - Sonya Zhang, Neal Cabage:
Search Engine Optimization: Comparison of Link Building and Social Sharing. 148-159 - Yibai Li, Xuequn Wang:
Online Social Networking Sites Continuance Intention: A Model Comparison Approach. 160-168 - Zhaohao Sun, Kenneth D. Strang, Sally Firmin:
Business Analytics-Based Enterprise Information Systems. 169-178 - E. Mitchell Church, Lakshmi S. Iyer:
"When Is Short, Sweet?" Selection Uncertainty and Online Review Presentations. 179-189
Volume 57, Number 3, 2017
- Jie Zhang, Han Li, Ruiliang Yan, Chuck Johnston:
Examining the Signaling Effect of E-tailers' Return Policies. 191-200 - Matt Wimble, Harminder Singh, Brandis Phillips:
A Multilevel Model of Information Technology Value. 201-207 - Adarsh Kumar Kakar:
Assessing Self-Organization in Agile Software Development Teams. 208-217 - Oscar Avila, Kelly Garcés:
Change Management Support to Preserve Business-Information Technology Alignment. 218-228 - Natalie Gerhart, Anna Sidorova:
The Effect of Network Characteristics on Online Identity Management Practices. 229-237 - Shasha Teng, Kok Wei Khong, Alain Yee-Loong Chong, Binshan Lin:
Examining the Impacts of Electronic Word-of-Mouth Message on Consumers' Attitude. 238-251 - Ronald Dattero, Stuart D. Galup, Alan Kan, Jing Quan:
It Pays to Be Agile. 252-257 - Jordan Shropshire, Art Gowan:
Identifying Traits and Values of Top-Performing Information Security Personnel. 258-268 - Kenneth W. Green Jr., Pamela J. Zelbst, Victor E. Sower, Jeremy C. Bellah:
Impact of Radio Frequency Identification Technology on Environmental Sustainability. 269-277 - Jeretta Horn Nord, Maria Teresa Riggio, Joanna Paliszkiewicz:
Social and Economic Development through Information and Communications Technologies: Italy. 278-285
Volume 57, Number 4, 2017
- Xiaogang Chen, Shaorui Li:
Understanding Continuance Intention of Mobile Payment Services: An Empirical Study. 287-298 - Robert J. Mills, Tanya Beaulieu, Jeffrey J. Johnson:
Examining Micro-Level (SQL) Curriculum-Oriented and Promotional IS Enrollment Strategies. 299-308 - James Lee, Merrill Warkentin, Robert E. Crossler, Robert F. Otondo:
Implications of Monitoring Mechanisms on Bring Your Own Device Adoption. 309-318 - Assion Lawson-Body, Lori Willoughby, Laurence Lawson-Body, Kinvi Logossah:
Developing and Validating a Cultural User Satisfaction Instrument in Developing Countries. 319-329 - Gaurav Bansal:
Distinguishing between Privacy and Security Concerns: An Empirical Examination and Scale Validation. 330-343 - Matthew Etco, Sylvain Sénécal, Pierre-Majorique Léger, Marc Fredette:
The Influence of Online Search Behavior on Consumers' Decision-Making Heuristics. 344-352 - Garry L. White, Tahir Ekin, Lucian L. Visinescu:
Analysis of Protective Behavior and Security Incidents for Home Computers. 353-363 - Matthew J. Liberatore, Bruce Pollack-Johnson, Suzanne Heller Clain:
Analytics Capabilities and the Decision to Invest in Analytics. 364-373 - Karen C. Kao, Sally Rao Hill, Indrit Troshani:
Online Consumers' Responses to Deal Popularity as an Extrinsic Cue. 374-384 - Alex Koohang, Melanie Hatch:
Leadership Effectiveness in IT-Centered Organizations: Gender and Levels of Management. 385-391
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.