


default search action
MIS Quarterly, Volume 40
Volume 40, Number 1, March 2016
- Chee-Wee Tan, Izak Benbasat, Ronald T. Cenfetelli:

An Exploratory Study of the Formation and Impact of Electronic Service Failures. 1-29 - Hyelim Oh, Animesh Animesh, Alain Pinsonneault:

Free Versus For-a-Fee: The Impact of a Paywall on the Pattern and Effectiveness of Word-of-Mouth via Social Media. 31-56 - Michel Benaroch, Yossi Lichtenstein, Lior Fink:

Contract Design Choices and the Balance of Ex Ante and Ex Post Transaction Costs in Software Development Outsourcing. 57-82 - Adam Saunders, Erik Brynjolfsson:

Valuing Information Technology Related Intangible Assets. 83-110 - Srinivasan Raghunathan

, Sumit Sarkar
:
Competitive Bundling in Information Markets: A Seller-Side Analysis. 111-131 - Seung Hyun Kim

, Tridas Mukhopadhyay, Robert E. Kraut:
When Does Repository KMS Use Lift Performance? The Role of Alternative Knowledge Sources and Task Environments. 133-156
- Saggi Nevo, Dorit Nevo, Alain Pinsonneault:

A Temporally Situated Self-Agency Theory of Information Technology Reinvention. 157-186
- Il Im

, Jongkun Jun, Wonseok Oh, Seok-Oh Jeong:
Deal-Seeking Versus Brand-Seeking: Search Behaviors and Purchase Propensities in Sponsored Search Platforms. 187-203 - Yan Chen

, F. Mariam Zahedi:
Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China. 205-222 - Sunil Mithas

, Roland T. Rust:
How Information Technology Strategy and Investments Influence Firm Performance: Conjecture and Empirical Evidence. 223-245 - Jie-Mein Goh, Guodong Gordon Gao, Ritu Agarwal:

The Creation of Social Value: Can an Online Health Community Reduce Rural-Urban Health Disparities? 247-263
Volume 40, Number 2, June 2016
- Ann Majchrzak, M. Lynne Markus, Jonathan Wareham:

Designing for Digital Transformation: Lessons for Information Systems Research from the Study of ICT and Societal Challenges. 267-277 - Xuefei (Nancy) Deng, K. D. Joshi, Robert D. Galliers:

The Duality of Empowerment and Marginalization in Microtask Crowdsourcing: Giving Voice to the Less Powerful Through Value Sensitive Design. 279-302 - Shaila M. Miranda

, Amber Grace Young, Emre Yetgin:
Are Social Media Emancipatory or Hegemonic? Societal Effects of Mass Media Digitization in the Case of the SOPA Discourse. 303-329 - Lisen Selander

, Sirkka L. Jarvenpaa:
Digital Action Repertoires and Transforming a Social Movement Organization. 331-352 - Viswanath Venkatesh, Arun Rai, Tracy Ann Sykes, Ruba Aljafari

:
Combating Infant Mortality in Rural India: Evidence from a Field Study of eHealth Kiosk Imlementations. 353-380
- Jason Chan, Anindya Ghose, Robert Seamans:

The Internet and Racial Hate Crimes: Offline Spillovers from Online Access. 381-403 - Antonio Díaz-Andrade, Bill Doolin:

Information and Communication Technology and the Social Inclusion of Refugees. 405-416 - Kartik K. Ganju, Paul A. Pavlou, Rajiv D. Banker:

Does Information and Communication Technology Lead to the Well-Being of Nations? A Country-Level Empirical Investigation. 417-430 - Srivardhini K. Jha, Alain Pinsonneault, Laurette Dubé:

The Evolution of an ICT Platform-Enabled Ecosystem for Poverty Alleviation: The Case of eKutir. 431-445 - Wolfgang Ketter

, Markus Peters, John Collins, Alok Gupta
:
A Multiagent Competitive Gaming Platform to Address Societal Challenges. 447-460 - Paul M. Leonardi, Diane E. Bailey, Eduardo Henrique Diniz

, Dan Sholler, Bonnie A. Nardi:
Multiplex Appropriation in Complex Systems Implementation: The Case of Brazil's Correspondent Banking System. 461-473 - Carmen Mei Ling Leong

, Shan-Ling Pan
, Sue Newell, Lili Cui:
The Emergence of Self-Organizing E-Commerce Ecosystems in Remote Villages of China: A Tale of Digital Empowerment for Rural Development. 475-484 - Kathy McGrath:

Identity Verification and Societal Challenges: Explaining the Gap Between Service Provision and Development Outcomes. 485-500 - Elisa Oreglia, Janaki Srinivasan

:
ICT, Intermediaries, and the Transformation of Gendered Power Structures. 501-510 - Shirish C. Srivastava, Thompson S. H. Teo, Sarv Devaraj:

You Can't Bribe a Computer: Dealing with the Societal Challenge of Corruption Through ICT. 511-526
Volume 40, Number 3, September 2016
- Kai R. Larsen, Chih How Bong:

A Tool for Addressing Construct Identity in Literature Reviews and Meta-Analyses. 529-551
- Rajiv Kohli, Sharon Swee-Lin Tan:

Electronic Health Records: How Can IS Researchers Contribute to Transforming Healthcare? 553-573
- Jianqing Chen

, Ming Fan, Mingzhe Li:
Advertising Versus Brokerage Model for Online Trading Platforms. 575-596 - Christina I. Serrano, Elena Karahanna:

The Compensatory Interaction Between User Capabiities and Technology Capabilities in Influencing Task Performance: An Empirical Assessment in Telemedicine Consultations. 597-621 - Oliver Hinz, Shawndra Hill, Ju-Young Kim:

TV's Dirty Little Secret: The Negative Effect of Popular TV on Online Auction Sales. 623-644 - Yixin Lu

, Alok Gupta
, Wolfgang Ketter
, Eric van Heck:
Exploring Bidder Heterogeneity in Multichannel Sequential B2B Auctions. 645-662 - Kurt Schmitz

, James T. C. Teng, Kimberly Webb:
Capturing the Complexity of Malleable IT Use: Adaptive Structuration Theory for Individuals. 663-686 - Adi Masli, Vernon J. Richardson, Marcia Weidenmier Watson, Robert W. Zmud:

Senior Executives' IT Management Responsibilities: Serious IT-Related Deficiencies and CEO/CFO Turnover. 687-708 - Piotr Cwiakowski, Marek Giergiczny

, Michal Krawczyk:
Pirates in the Lab: Using Incentivized Choice Experiments to Explore Preference for (Un)Authorized Content. 709-715 - Zhen Sun, Milind Dawande

, Ganesh Janakiraman
, Vijay S. Mookerjee:
The Making of a Good Impression: Information Hiding in Ad Exchanges. 717-739
- Martin Wiener

, Magnus Mähring
, Ulrich Remus
, Carol Stoak Saunders:
Control Configuration and Control Enactment in Information Systems Projects: Review and Expanded Theoretical Framework. 741-774
- Petra Saskia Bayerl, Kristina Lauche, Carolyn Axtell:

Revisiting Group-Based Technology Adoption as a Dynamic Process: The Role of Changing Attitude-Rationale Configurations. 775-784 - Peng Huang

, Zhongju Zhang:
Participation in Open Knowledge Communities and Job-Hopping: Evidence from Enterprise Software. 785-806
Volume 40, Number 4, December 2016
- Bart Baesens, Ravi Bapna, James R. Marsden, Jan Vanthienen

, J. Leon Zhao:
Transformational Issues of Big Data and Analytics in Networked Business. 807-818 - Inbal Yahav, Galit Shmueli, Deepa Mani:

A Tree-Based Approach for Addressing Self-Selection in Impact Studies with Big Data. 819-848 - Kunpeng Zhang, Siddhartha Bhattacharyya, Sudha Ram:

Large-Scale Network Analysis for Online Social Brand Advertising. 849-868 - David Martens, Foster J. Provost, Jessica Clark, Enric Junqué de Fortuny

:
Mining Massive Fine-Grained Behavior Data to Improve Predictive Analytics. 869-888 - Anindya Ghose, Vilma Todri-Adamopoulos:

Toward a Digital Attribution Model: Measuring the Impact of Display Advertising on Online Consumer Behavior. 889-910 - Alok R. Saboo, V. Kumar, Insu Park:

Using Big Data to Model Time-Varying Effects for Marketing Resource (Re)Allocation. 911-939 - Erik Brynjolfsson, Tomer Geva, Shachar Reichman:

Crowd-Squared: Amplifying the Predictive Power of Search Trend Data. 941-961 - Syam Menon

, Sumit Sarkar
:
Privacy and Big Data: Scalable Approaches to Sanitize Large Transactional Databases for Sharing. 963-981 - Sang Pil Han, Sungho Park, Wonseok Oh:

Mobile App Analytics: A Multiple Discrete-Continuous Choice Framework. 983-1008 - Dominic Breuker, Martin Matzner

, Patrick Delfmann, Jörg Becker:
Comprehensible Predictive Models for Business Processes. 1009-1034 - Zhan Shi, Gene Moo Lee

, Andrew B. Whinston:
Toward a Better Measure of Business Proximity: Topic Modeling for Industry Intelligence. 1035-1056 - Wolfgang Ketter

, Markus Peters, John Collins, Alok Gupta
:
Competitive Benchmarking: An IS Research Approach to Address Wicked Problems with Big Data and Analytics. 1057-1080

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














