


default search action
Journal of Information Systems, Volume 34
Volume 34, Number 1, March 2020
- Noel D. Addy, Nathan R. Berglund
:
Determinants of Timely Adoption of the 2013 COSO Integrated Framework. 1-20 - Roger S. Debreceny, Stephanie M. Farewell, Audrey N. Scarlata
, Dan N. Stone
:
Knowledge and Skills in Complex Assurance Engagements: The Case of XBRL. 21-45 - Mary P. Durkin, Jacob M. Rose, Jay C. Thibodeau:
Can Simple Metaphors Be Used as Decision Aids to Promote Professional Skepticism? 47-60 - Andrew J. Harrison, William N. Dilla
, Brian E. Mennecke:
Relationships within the Fraud Diamond: The Decision Processes That Influence Fraudulent Intentions in Online Consumer Fraud. 61-80 - Rina M. Hirsch:
The Effect of Spatial Distance and Domain Knowledge Distinctiveness on Auditor Reliance on IT Specialists. 81-103 - Andrea Seaton Kelton
, Robin R. Pennington:
If You Tweet, They Will Follow: CEO Tweets, Social Capital, and Investor Say-on-Pay Judgments. 105-122 - Kalana Malimage, Nirmalee I. Raddatz
, Brad S. Trinkle, Robert E. Crossler, Rebecca Baaske:
Impact of Deterrence and Inertia on Information Security Policy Changes. 123-134 - Nirmalee I. Raddatz
, Kent Marett, Brad S. Trinkle:
The Impact of Awareness of Being Monitored on Computer Usage Policy Compliance: An Agency View. 135-149 - Mikko Rönkkö, Miguel I. Aguirre-Urreta
:
Cautionary Note on the Two-Step Transformation to Normality. 151-166 - Hamzah Ritchi
, Mieke Jans
, Jan Mendling
, Hajo A. Reijers:
The Influence of Business Process Representation on Performance of Different Task Types. 167-194
Volume 34, Number 2, June 2020
- Pamela J. Schmidt, Graham Gal:
Editors' Introduction to the Special Section on Cloud Computing and Accounting Information Systems (JISC 2018). 1-4 - Deniz Appelbaum
, Robert A. Nehmer
:
Auditing Cloud-Based Blockchain Accounting Systems. 5-21 - Kim S. Church
, Pamela J. Schmidt
, Kemi Ajayi
:
Forecast Cloudy - Fair or Stormy Weather: Cloud Computing Insights and Issues. 23-46 - David Lewis Coss
, Gurpreet Dhillon
:
A Framework for Auditing and Strategizing to Ensure Cloud Privacy. 47-63 - Lorraine S. Lee
, William D. Brink
:
Trust in Cloud-Based Services: A Framework for Consumer Adoption of Software as a Service. 65-85 - YunSen Wang
, Alexander Kogan
:
Cloud-Based In-Memory Columnar Database Architecture for Continuous Audit Analytics. 87-107 - Michael G. Alles
, Glen L. Gray
:
Will the Medium Become the Message? A Framework for Understanding the Coming Automation of the Audit Process. 109-130 - Joseph Canada, Erica E. Harris
:
The Role of Web Assurance Seals in Nonprofit Giving. 131-148 - Renata Paola Dameri, Roberto Garelli
, Marina Resta
:
Neural Networks in Accounting: Clustering Firm Performance Using Financial Reporting Data. 149-166 - Jacob Z. Haislip
, Khondkar E. Karim, Karen Jingrong Lin, Robert E. Pinsker
:
The Influences of CEO IT Expertise and Board-Level Technology Committees on Form 8-K Disclosure Timeliness. 167-185 - Chris Zhijian He, Tracie Frost
, Robert E. Pinsker
:
The Impact of Reported Cybersecurity Breaches on Firm Innovation. 187-209 - Uday S. Murthy
, Thomas J. Smith
, James D. Whitworth
, Yiyang Zhang:
The Effects of Information Systems Compatibility on Firm Performance following Mergers and Acquisitions. 211-233 - Nikki Shoemaker, Mary B. Curtis
, Louis Fayard, Marie T. Kelly:
What Happens When Formal and Informal Norms Conflict for IT Usage? 235-256 - Carla L. Wilkin
, Robert H. Chenhall:
Information Technology Governance: Reflections on the Past and Future Directions. 257-292
Volume 34, Number 3, September 2020
- John L. Abernathy
, Brooke Beyer
, Jimmy F. Downes
, Eric T. Rapley
:
High-Quality Information Technology and Capital Investment Decisions. 1-29 - Adel Alamin
, Carla L. Wilkin
, William Yeoh
, Matthew J. Warren
:
The Impact of Self-Efficacy on Accountants' Behavioral Intention to Adopt and Use Accounting Information Systems. 31-46 - J. Efrim Boritz
, Won Gyun No
:
How Significant are the Differences in Financial Data Provided by Key Data Sources? A Comparison of XBRL, Compustat, Yahoo! Finance, and Google Finance. 47-75 - Diane J. Janvrin
, Maureen Francis Mascha
, Melvin A. Lamboy-Ruiz
:
SOX 404(b) Audits: Evidence from Auditing the Financial Close Process of the Accounting System. 77-103 - Joseph Johnston
:
Extended XBRL Tags and Financial Analysts' Forecast Error and Dispersion. 105-131 - Andrea Seaton Kelton
, Robin R. Pennington:
Do Voluntary Disclosures Mitigate the Cybersecurity Breach Contagion Effect? 133-157 - Hsing-Jung Li, She-I Chang
, Tawei Wang
, Li-Min Chang:
Information Technology Internal Control Items for the Post-Implementation Phase of Enterprise Resource Planning Systems. 159-197 - Nirmalee I. Raddatz
, Joshua G. Coyne
, Brad S. Trinkle
:
Internal Motivators for the Protection of Organizational Data. 199-211 - Nirmalee I. Raddatz
, Thomas F. Stafford
, Craig Van Slyke
, Merrill Warkentin:
Grassroots Adoption of Cloud-Based Storage Solutions. 213-232 - Yibo James Zhang
:
The Impact of Vivid Graphical Presentation of Financial Information in Digital Annual Reports on Investors' Impressions of Management and Firm Performance. 233-253

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.