


default search action
Journal of Computer Information Systems, Volume 64
Volume 64, Number 1, 2024
- Chuleeporn Changchit, Robert Cutshall
, Joseph Mollick:
A Three Country Comparative Study of Social Commerce Adoption. 1-16 - Kane J. Smith:
Bad Employees: Examining Deviant Security Behaviors. 17-30 - Sahar Farshadkhah, Michele Maasberg, T. Selwyn Ellis, Craig Van Slyke
:
An Empirical Examination of Employee Information Security Advice Sharing. 31-46 - Yogesh Mungra, Ritu Srivastava
, Anuj Sharma
, Diptiman Banerji
, Neela Gollapudi:
Impact of Digital Competence on Employees' Flourishing Through Basic Psychological Needs Satisfaction. 47-61 - Rathika Palanisamy
, Azah Anir Norman
, Miss Laiha Mat Kiah
:
Employees' BYOD Security Policy Compliance in the Public Sector. 62-77 - Gaurav Bansal, Zhuoli Axelton:
Impact of Cybersecurity Disclosures on Stakeholder Intentions. 78-91 - Yasir Afaq, Ankush Manocha:
Blockchain and Deep Learning Integration for Various Application: A Review. 92-105 - T. N. Nisha
, Dhanya Pramod
:
Insider Intrusion Detection Techniques: A State-of-the-Art Review. 106-123 - Carol Springer Sargent
, Jennifer L. Breese
:
Blockchain Barriers in Supply Chain: A Literature Review. 124-135 - Arun Amaithi Rajan
, V. Vetriselvi
:
Systematic Survey: Secure and Privacy-Preserving Big Data Analytics in Cloud. 136-156 - Richard McGregor, Carmen Reaiche, Stephen Boyle, Graciela Corral de Zubielqui:
Cyberspace and Personal Cyber Insurance: A Systematic Review. 157-171
Volume 64, Number 2, 2024
- Sujeet Kumar Sharma
, Yogesh K. Dwivedi
, Santosh K. Misra, Nripendra P. Rana
:
Conjoint Analysis of Blockchain Adoption Challenges in Government. 173-186 - Jiwat Ram
:
Using Social Media in Projects: Information Management Challenges and Recommendations. 187-203 - Sandip Rakshit
, Anand Jeyaraj, Tripti Paul
:
SME Performance Through Blockchain Technologies. 204-218 - Dae-Kyoo Kim, Yeasun K. Chung:
Addressing Class Imbalances in Software Defect Detection. 219-231 - Sophia Xiaoxia Duan
, Hepu Deng
, Santoso Wibowo
:
Technology Affordances for Enhancing Job Performance in Digital Work. 232-244 - Tat Huei Cham
, Boon Liat Cheng, Eugene Cheng-Xi Aw
, Garry Wei-Han Tan
, Xiu-Ming Loh, Keng-Boon Ooi
:
Counteracting the Impact of Online Fake News on Brands. 245-264 - Smita Dange
, Prashant Nitnaware:
Secure Share: Optimal Blockchain Integration in IoT Systems. 265-277 - Amy H. Harris, Carol Clark:
Understanding the Diffusion of Business Analysis Responsibilities. 278-288 - Anna Maria Górska
, Pawel Korzynski
, Grzegorz Mazurek
:
The Effects of USR and Its Communication on Faculty Satisfaction. 289-300 - Fatemeh Shapouri
, Kerry Ward, Tenace Setor:
Determinants of Software as a Service (SaaS) Adoption. 301-313 - Purnima Naik, Salomi Nelaballi, Venkata Sai Pusuluri, Dae-Kyoo Kim:
Deep Learning-Based Code Refactoring: A Review of Current Knowledge. 314-328
Volume 64, Number 3, 2024
- David C. Chou
, Binshan Lin:
Social Entrepreneurship Success: Relevance to Social Mediating Technologies. 329-341 - Neelesh Kumar Mishra
, Alok Raj, Anand Jeyaraj, Riya Gupta:
Antecedents and Outcomes of Blockchain Technology Adoption: Meta-Analysis. 342-359 - Cheuk Hang (Allen) Au
, Wen Shou Hsu, Po-Hsu Shieh, Lin Yue:
Can Stablecoins Foster Cryptocurrencies Adoption? 360-369 - Aruna Polisetty
, Debarun Chakraborty
, Sowmya G
, Arpan Kumar Kar
, Subhajit Pahari
:
What Determines AI Adoption in Companies? Mixed-Method Evidence. 370-387 - Sihem Ben Sassi
, Nacim Yanes
:
Data Science with Semantic Technologies: Application to Information Systems Development. 388-407 - Galit Klein
, Moti Zwilling
:
The Weakest Link: Employee Cyber-Defense Behaviors While Working from Home. 408-422 - Nan (Tina) Wang, Weijun Zheng, Wenbo Zhang:
Management Emotion and Firm's Strategic IT Investment Propensity. 423-437 - Zhunzhun Liu
, Ruidong Zhang:
An Empirical Study on Herd Behavior in Cryptocurrency Trading. 438-452 - Kalyan Prasad Agrawal
, Ashis K. Pani, Anuj Sharma
, Nripendra P. Rana:
Process Virtualization Goes Mainstream: Diving into its Normalization. 453-468
Volume 64, Number 4, 2024
- Pooja Goel
, Aashish Garg, Anuj Sharma
, Nripendra P. Rana:
Impact of Sensory Perceptions on the Urge to Buy Impulsively. 469-485 - Yixiu Yu, Fred D. Davis:
User Satisfaction and Dissatisfaction: Bipolar versus Unipolar Conceptualizations. 486-500 - Manish Shrivastava:
Optimal Data Placement for Scientific Workflows in Cloud. 501-517 - Rahul Dwivedi
, Sridhar P. Nerur, George Mangalaraj:
Predicting Insider Breaches Using Employee Reviews. 518-532 - Hui Gao
, Alain Yee-Loong Chong, Haijun Bao:
Metaverse: Literature Review, Synthesis and Future Research Agenda. 533-553 - Hsieh-Hong Huang
, Jian-Wei Lin:
Inconsistencies Between Information Security Policy Compliance and Shadow IT Usage. 554-564 - Obi Ogbanufe, Jordan Wolfe, Fallon Baucum:
Towards a Conceptual Typology of Darknet Risks. 565-576 - Satish Radhakrishnan
, Lavanya Rajendran:
Information Security Practices and Intervention Among Teenagers. 577-591
Volume 64, Number 5, 2024
- Sarah Pinon, Corentin Burnay, Isabelle Linden
:
Business-Driven Data Recommender System: Design and Implementation. 593-606 - Yu (audrey) Zhao
, Yaojie Li
, Kakoli Bandyopadhyay:
The Role of Techno-Eustress in Technology-Enhanced IT Learning. 607-621 - Michael J. Cuellar, Hirotoshi Takeda, Duane P. Truex:
Are Ranked Journal Lists Effective Determiners of Article Quality? 622-635 - Kalyan Prasad Agrawal
:
Towards Adoption of Generative AI in Organizational Settings. 636-651 - Jiaxing Wang, Woon Kian Chong, Junyi Lin
, Carl Philip T. Hedenstierna:
Retail Demand Forecasting Using Spatial-Temporal Gradient Boosting Methods. 652-664 - Shavindrie Cooray
:
The Subjectivity of Data Scientists in Machine Learning Design. 665-682 - Mohammad I. Merhi, Punit Ahluwalia:
Predicting Compliance of Security Policies: Norms and Sanctions. 683-697 - Ruti Gafni
, Itzhak Aviv, Dror Haim:
Multi-Party Secured Collaboration Architecture from Cloud to Edge. 698-709
Volume 64, Number 6, 2024
- Juan Carlos Fernandez de Arroyabe
, Ignacio Fernandez De Arroyabe, Ignacio Fernandez, Carlos F. A. Arranz
:
Cybersecurity Resilience in SMEs. A Machine Learning Approach. 711-727 - Arum Park, Sae Bom Lee:
Examining AI and Systemic Factors for Improved Chatbot Sustainability. 728-742 - Guan-Yu Lin, Meng-Xuan Lee, Yi-Shun Wang:
Developing and Validating a Live Streaming Social Commerce Success Model. 743-761 - Nan Peter Liang, David P. Biros, Andy Luse:
An Empirical Comparison of Malicious Insiders and Benign Insiders. 762-774 - Sibanjan Debeeprasad Das
, Pradip Kumar Bala, Arindra Nath Mishra
:
Towards Defining a Trustworthy Artificial Intelligence System Development Maturity Model. 775-796 - Fulya Acikgoz, AbdelSalam H. Busalim, James Gaskin, Shahla Asadi:
An Integrated Model for Information Adoption&Trust in Mobile Social Commerce. 797-819 - Malyun Muhudin Hilowle, William Yeoh, Marthie Grobler, Graeme Pye, Frank Jiang:
Improving National Digital Identity Systems Usage: Human-Centric Cybersecurity Survey. 820-834 - Salah Albenjasim, Tooska Dargahi, Haifa Takruri, Rabab Al-Zaidi
:
FinTech Cybersecurity Challenges and Regulations: Bahrain Case Study. 835-851

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.