


default search action
Journal of Computer Information Systems, Volume 63
Volume 63, Number 1, January 2023
- Botong Xue
, Merrill Warkentin
, Leigh A. Mutchler
, Puzant Balozian
:
Self-efficacy in Information Security: A Replication Study. 1-10 - George Mangalaraj
, Sridhar P. Nerur, Rahul Dwivedi
:
Digital Transformation for Agility and Resilience: An Exploratory Study. 11-23 - Hai Dung Do
, Kun-Tan Tsai, Ju May Wen
, Shihping Kevin Huang:
Hard Skill Gap between University Education and the Robotic Industry. 24-36 - Anuj Sharma
, Alex Koohang
, Nripendra P. Rana
, Salma S. Abed, Yogesh K. Dwivedi
:
Journal of Computer Information Systems: Intellectual and Conceptual Structure. 37-67 - Karin Högberg:
Multiple Social Media in Practice - Investigating Emergent Work Practices. 68-80 - Wenhong Luo:
User Selection Strategies of Interactive Data Visualization Format. 81-93 - Claire Seungeun Lee
, Dongsim Kim
:
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea. 94-106 - Craig C. Claybaugh, Iris Reychav
, Fiona Fui-Hoon Nah
:
Relational and Technological Assessment of CRM Providers: A Multifactor Study. 107-117 - Tung Cu
, James R. Van Scotter
, Helmut Schneider
:
Do Life-cycle and Generation Moderate Sentiment and Diffusion? 118-132 - Hai Wang, Shouhong Wang
:
A Semantic Model for Enterprise Digital Transformation Analysis. 133-148 - Craig Van Slyke
, William Grant Clary
, Mohamed Y. Tazkarji
:
Distress, Eustress, and Continuance Intentions for Distance Learners. 149-161 - Le Thanh Ha:
Digital Business and Economic Complexity. 162-175 - Félix A. Martín-Velicia
, José A. Folgado-Fernández
, Pedro R. Palos Sánchez
, Blanca López-Catalán
:
mWOM Business Strategies: Factors Affecting Recommendations. 176-189 - Minli Yu
, Hui Jin, Hejie Zhang, Alain Yee-Loong Chong:
ICT, Financial Development and Renewable Energy Consumption. 190-203 - Andrew Ishmael, Leila A. Halawi
:
Retention of Qualified Cybersecurity Professionals: A Qualitative Study. 204-215 - Chungwon Woo
, Jaeheung Yoo
:
Exploring the Determinants of Blockchain Acceptance for Research Data Management. 216-227 - Ho-Chang Chae, Gimun Kim, Chang E. Koh:
Impact of Privacy Behaviors on Relatedness and Well-Being in SNSs. 228-239
Volume 63, Number 2, March 2023
- Zhunzhun Liu
, Shenglin Ben
, Ruidong Zhang
:
Factors Affecting Crowdfunding Success. 241-256 - Aaron M. French
, Robert F. Otondo
, Jung P. Shim
:
Latent-Curve Modeling of Continued-Use Intentions: Near- Versus Distant-Future. 257-268 - Jeffrey P. Kaleta
, Cheryl Aasheim:
Construal of Social Relationships in Online Consumer Reviews. 269-280 - Bakthavachalam Elango
, S. Matilda
, M. Martina Jose Mary
, M. Arul Pugazhendhi:
Mapping the Cybersecurity Research: A Scientometric Analysis of Indian Publications. 293-309 - Paphada Tatpornpan, Pattarawan Prasarnphanich
, Chiraphol New Chiyachantana:
Information Quality of Investment Services with Social Media. 310-321 - David C. Chou
, Houn-Gee Chen
, Binshan Lin
:
Green IT and Corporate Social Responsibility for Sustainability. 322-333 - Jean A. Pratt, Liqiang Chen, Hans F. Kishel, Abraham Y. Nahm
:
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review. 334-350 - Matthew J. Liberatore, William P. Wagner:
The Impact of Age on User Performance: A Field Experiment. 369-379 - Princely Ifinedo:
Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors. 380-396 - Martin Wilson
, Sharon McDonald
, Dominic Button
, Kenneth McGarry
:
It Won't Happen to Me: Surveying SME Attitudes to Cyber-security. 397-409 - Mary Macharia:
Cloud Computing Risk: A Decision-making Framework. 421-435 - Kaushik Ghosh, Michael S. Dohan, Hareesh Veldandi
, Monica J. Garfield:
Digital Transformation in Healthcare: Insights on Value Creation. 449-459 - Maryam Ghasemaghaei
:
Does Knowledge Sharing Belief of Data Analysts Impact Their Behavior? 460-478
Volume 63, Number 3, May 2023
- Assion Lawson-Body, Laurence Lawson-Body, Abdou Illia:
Data Visualization: Developing and Validating Dashboard Measurement Instruments. 479-491 - Yunfei Xing
, Wu He, Zuopeng Justin Zhang
, Gaohui Cao:
AI Privacy Opinions between US and Chinese People. 492-506 - Jason K. Deane
, Wade H. Baker
, Loren Paul Rees:
Cybersecurity in Supply Chains: Quantifying Risk. 507-521 - Ken Owen, Milena M. Head
:
Motivation and Demotivation of Hackers in Selecting a Hacking Task. 522-536 - Moti Zwilling
:
Big Data Challenges in Social Sciences: An NLP Analysis. 537-554 - Ahad Zareravasan, Anand Jeyaraj:
Evolution of Information Systems Business Value Research: Topic Modeling Analysis. 555-573 - Sally Rao Hill
, Graciela Corral de Zubielqui:
Managing Privacy in B2B Marketing: A Systematic Literature Review. 574-591 - Jiongbin Liu, William Yeoh, Longxiang Gao, Shang Gao
, Ojelanki K. Ngwenyama
:
Designing a Secure Blockchain-Based Supply Chain Management Framework. 592-607 - Jalpesh Vasa
, Amit Thakkar
:
Deep Learning: Differential Privacy Preservation in the Era of Big Data. 608-631 - Chao Wen
, Nan (Tina) Wang
, Jiaming Fang
, Meng Huang
:
An Integrated Model of Continued M-Commerce Applications Usage. 632-647 - Huosong Xia, Duqun Lu, Boqiang Lin
, Jeretta Horn Nord
, Zuopeng Justin Zhang
:
Trust in Fintech: Risk, Governance, and Continuance Intention. 648-662 - Yabing Jiang, Thant Syn
:
Online Privacy Policy Disclosure: An Empirical Investigation. 663-680 - Xiaoni Lu, Xia Zhao, Xi Zhao:
How Does Smartphone Usage Feedback Influence Mobility Behavior? 681-694 - Ibrahim Arpaci
, Ömer Aslan
:
Development of a Scale to Measure Cybercrime-Awareness on Social Media. 695-705 - Matthew J. Liberatore, William P. Wagner:
Recursive Decision-Making: A Confirmation of Newell and Simon. 706-715 - Ignacio Fernandez De Arroyabe, Tim Watson, Olga Angelopoulou
:
Cybersecurity in the Automotive Industry: A Systematic Literature Review (SLR). 716-734 - Alex Koohang
, Jeretta Horn Nord
, Keng-Boon Ooi
, Garry Wei-Han Tan
, Mostafa Al-Emran
, Eugene Cheng-Xi Aw
, Abdullah Mohammed Baabdullah, Dimitrios Buhalis
, Tat Huei Cham
, Charles Dennis
, Vincent Dutot
, Yogesh K. Dwivedi
, Laurie Hughes, Emmanuel Mogaji
, Neeraj Pandey
, Ian Phau, Ramakrishnan Raman
, Anshuman Sharma, Marianna Sigala, Akiko Ueno
, Lai-Wan Wong
:
Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation. 735-765
Volume 63, Number 4, 2023
- Pow-Yee Hoh, Sook-Jian Loo, Garry Wei-Han Tan
, Voon-Hsien Lee
, Eugene Cheng-Xi Aw
, Tat Huei Cham
, Keng-Boon Ooi
:
Understanding Valences in Mobile Grocery Shopping: Do Consumers' Characteristics Matter? 767-780 - Kashif Saeed
, Anna Sidorova, Akash Vasanthan:
The Bundling of Business Intelligence and Analytics. 781-792 - Katarina Rojko, Dusan Lesjak, Nusa Erman:
The COVID-19 Pandemic Crisis: Impact on ICT Spending. 793-808 - Anand Jeyaraj
:
Models of Information Technology Use: Meta-Review and Research Directions. 809-824 - Priyanka Sharma
, Angappa Gunasekaran, Girish Subramanian
:
Distributor Opportunism Toward the Supplier: A Social Network Perspective. 825-840 - Francisco Fernández de Vega:
Teaching Programming in the 21st Century. 841-852 - Charlie C. Chen, Peter Ractham, Myungjae Kwak:
Achieving Entrepreneurial Success for Student Ventures under Uncertainty. 853-865 - Orly Barzilai
, Ruti Gafni
:
Using Web Frameworks in Server Side Programming Courses. 866-876 - Yamin Xu
, Chuang Wang
, Zhengang Zhang:
Understanding Big Data-Business Alignment from a Dynamic Perspective. 877-889 - Linda M. Pittenger, Aaron Glassman, Stacey Mumbower, Daisha M. Merritt, Denise Bollenback:
Bounded Rationality: Managerial Decision-Making and Data. 890-903 - Hossein Mohit
, Vess L. Johnson
, Sara Memarian Esfahani
:
Social Media Continuance from the Perspective of Commitment. 904-918 - Harrison Stewart
:
Digital Transformation Security Challenges. 919-936 - C. Matt Graham
, Yonggang Lu:
Skills Expectations in Cybersecurity: Semantic Network Analysis of Job Advertisements. 937-949 - Muralidharan Ramakrishnan
, Shirley Gregor
, Anup Shrestha
, Jeffrey Soar
:
Achieving Industry-aligned Education through Digital-Commons: A Case Study. 950-964 - Bilge Yigit Ozkan
, Marco Spruit
:
Adaptable Security Maturity Assessment and Standardization for Digital SMEs. 965-987 - Aaron M. French
, Andrew William Green:
Social Networking Continuance and Success: A Replication Study. 988-997 - Luan-Thanh Nguyen
, Yogesh K. Dwivedi
, Garry Wei-Han Tan
, Eugene Cheng-Xi Aw
, Pei-San Lo, Keng-Boon Ooi
:
Unlocking Pathways to Mobile Payment Satisfaction and Commitment. 998-1015 - Vijay V. Raghavan
, Ravi Chinta
:
Influence of Leadership Style on Information Systems Project Outcomes. 1016-1029
Volume 63, Number 5, 2023
- Debarun Chakraborty
:
Purchase Behavior of Consumers Toward GSAs: A Longitudinal Assessment. 1031-1056 - Anupama Prashar, Parul Gupta, Anand Jeyaraj, Yogesh K. Dwivedi
:
Expectation-Reality Gap in Information Technology Discontinuance Intention. 1057-1069 - Xiu-Ming Loh
, Voon-Hsien Lee
, Lai-Ying Leong
:
A Multi-Dimensional Nomological Network of Mobile Payment Continuance. 1070-1092 - Maryam Ghasemaghaei
, Ofir Turel:
The Duality of Big Data in Explaining Decision-Making Quality. 1093-1111 - Mary Helen Fagan, Sunil Vidiyala:
Analytics Use Intention: The Role of STEM and Software Attitudes. 1112-1123 - Germán Terrazas
, Gregory Hawkridge, Mike McNally, Duncan C. McFarlane, Zhengyang Ling, Jun Lau:
Hackathons to Accelerate the Development of Low-Cost Digital Solutions. 1124-1138 - Kimberly Deranek
, Barbara Hewitt
:
Knowledge Management Model Development and Validation Using an ERP Simulation. 1139-1152 - Miloslava Plachkinova
, Kenneth J. Knapp:
Least Privilege across People, Process, and Technology: Endpoint Security Framework. 1153-1165 - Hakan Özköse
, Özcan Özyurt
, Ahmet Ayaz
:
Management Information Systems Research: A Topic Modeling Based Bibliometric Analysis. 1166-1182 - Syed Mudasser Abbas
, Zhiqiang Liu
, Muhammad Khushnood
:
When Human Meets Technology: Unlocking Hybrid Intelligence Role in Breakthrough Innovation Engagement via Self-Extension and Social Intelligence. 1183-1200 - Andy Luse, Jim Burkman, Erin Stewart:
The Impact of Self-Perceived Facial Attractiveness on Webcam Use. 1201-1212 - Elisabeth Joyce, Pinar Öztürk
, Jacqueline Pike:
Effective Organizing on the Fly: Social Capital in Temporary Organizations. 1213-1227 - Shi-Zhu Liang
, Meng-Hsiang Hsu, Wei-Hong Chen:
Psychological Factors Behind Innovation Adoption: Affordance Actualisation Model. 1228-1242 - Debarun Chakraborty
, Nripendra P. Rana
, Sangeeta Khorana
, Hari Babu Singu
, Sunil Luthra
:
Big Data in Food: Systematic Literature Review and Future Directions. 1243-1263 - Malyun Muhudin Hilowle, William Yeoh
, Marthie Grobler
, Graeme Pye, Frank Jiang:
Users' Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review. 1264-1279 - Amna Altaf, Adnen El-Amraoui
, François Delmotte
, Christophe Lecoutre:
Applications of Artificial Intelligence in Cross Docking: A Systematic Literature Review. 1280-1300
Volume 63, Number 6, 2023
- Joong-Lyul Lee
, Joobum Kim, Myungjae Kwak:
Performance Evaluation of Co-Channel Interference on Wireless Networks. 1301-1315 - Katia Guerra, Chang E. Koh, Victor R. Prybutok
, Vess Johnson
:
WIoT Adoption Among Young Adults in Healthcare Crises. 1316-1331 - Yuna Ro, Ilsue Roh, Jungjoo Jahng, Bo-Ram Kwon
:
Determining Priority in Smart City Technologies and Services for International Development Cooperation. 1332-1344 - Temitayo Abiodun
, Giselle Rampersad
, Russell S. A. Brinkworth
:
Driving Industrial Digital Transformation. 1345-1361 - Arvind Kumar Gautam
, Abhishek Bansal
:
Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach. 1362-1381 - Tao Zhou, Qingqing Yuan:
Examining Users' Contribution in Open Source Software Communities. 1382-1393 - Alexei Tretiakov
, Tanya Jurado
, Jo Bensemann
:
Employee Empowerment and HR Flexibility in Information Technology SMEs. 1394-1407 - Xiaofeng Chen, Craig K. Tyran:
A Framework for Analyzing and Improving ISP Compliance. 1408-1423 - Yuguang Xie, Shuping Zhao, Peiyu Zhou
, Changyong Liang:
Understanding Continued Use Intention of AI Assistants. 1424-1437 - Hakan Özköse
:
Bibliometric Analysis and Scientific Mapping of IoT. 1438-1459 - Ho-Chang Chae, Chang E. Koh, Quynh Nguyen
:
Individual Creativity and Acceptance of Emerging Information Technology. 1460-1476 - Kimia Ansari
, Maryam Ghasemaghaei
:
Big Data Analytics Capability and Firm Performance: Meta-Analysis. 1477-1494 - Sandipkumar Patel, Ritesh Patel:
A Comprehensive Analysis of Computing Paradigms Leading to Fog Computing: Simulation Tools, Applications, and Use Cases. 1495-1516 - Anand Jeyaraj:
Task Dependence and External Control Constraints in Technology Acceptance. 1517-1530 - B. J. Praveena
, N. Arivazhagan, P. Vijaya Pal Reddy:
Blockchain based Sensor System Design For Embedded IoT. 1531-1548 - Kashif Saeed
, Anna Sidorova:
Explaining Digital Technology: Digital Artifact Delineation and Coalescence. 1549-1573

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.