callback( { "result":{ "query":":facetid:toc:\"db/journals/jisys/jisys29.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"65.11" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"33", "@dc":"33", "@oc":"33", "@id":"43469090", "text":":facetid:toc:db/journals/jisys/jisys29.bht" } }, "hits":{ "@total":"33", "@computed":"33", "@sent":"33", "@first":"0", "hit":[{ "@score":"1", "@id":"3456403", "info":{"authors":{"author":[{"@pid":"88/5179","text":"Enrique Bonsón"},{"@pid":"137/7156","text":"Michaela Bednárová"}]},"title":"YouTube Sustainability Reporting: Empirical Evidence from Eurozone-Listed Companies.","venue":"J. Inf. Syst.","volume":"29","number":"3","pages":"35-50","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/BonsonB15","doi":"10.2308/ISYS-50993","ee":"https://doi.org/10.2308/isys-50993","url":"https://dblp.org/rec/journals/jisys/BonsonB15"}, "url":"URL#3456403" }, { "@score":"1", "@id":"3456404", "info":{"title":"Retraction: Investigating the Impact of Auditor-Provided Systems Reliability Assurance on Potential Service Recipients.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"239","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/BoritzH15","doi":"10.2308/ISYS-10441","ee":"https://doi.org/10.2308/isys-10441","url":"https://dblp.org/rec/journals/jisys/BoritzH15"}, "url":"URL#3456404" }, { "@score":"1", "@id":"3456405", "info":{"authors":{"author":[{"@pid":"53/4909","text":"J. Efrim Boritz"},{"@pid":"222/0855","text":"Lev M. Timoshenko"}]},"title":"Firm-Specific Characteristics of the Participants in the SEC's XBRL Voluntary Filing Program.","venue":"J. Inf. Syst.","volume":"29","number":"1","pages":"9-36","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/BoritzT15","doi":"10.2308/ISYS-50896","ee":"https://doi.org/10.2308/isys-50896","url":"https://dblp.org/rec/journals/jisys/BoritzT15"}, "url":"URL#3456405" }, { "@score":"1", "@id":"3456406", "info":{"authors":{"author":[{"@pid":"15/11082","text":"Roman Chychyla"},{"@pid":"38/4508","text":"Alexander Kogan"}]},"title":"Using XBRL to Conduct a Large-Scale Study of Discrepancies between the Accounting Numbers in Compustat and SEC 10-K Filings.","venue":"J. Inf. Syst.","volume":"29","number":"1","pages":"37-72","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/ChychylaK15","doi":"10.2308/ISYS-50922","ee":"https://doi.org/10.2308/isys-50922","url":"https://dblp.org/rec/journals/jisys/ChychylaK15"}, "url":"URL#3456406" }, { "@score":"1", "@id":"3456407", "info":{"authors":{"author":[{"@pid":"40/9191","text":"W. Alec Cram"},{"@pid":"00/900","text":"M. Kathryn Brohman"},{"@pid":"25/3835","text":"R. Brent Gallupe"}]},"title":"Addressing the Control Challenges of the Enterprise Architecture Process.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"161-182","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/CramBG15","doi":"10.2308/ISYS-50913","ee":"https://doi.org/10.2308/isys-50913","url":"https://dblp.org/rec/journals/jisys/CramBG15"}, "url":"URL#3456407" }, { "@score":"1", "@id":"3456408", "info":{"authors":{"author":{"@pid":"d/RogerDebreceny","text":"Roger S. Debreceny"}},"title":"Social Media, Social Networks, and Accounting.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"1-4","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/Debreceny15","doi":"10.2308/ISYS-10462","ee":"https://doi.org/10.2308/isys-10462","url":"https://dblp.org/rec/journals/jisys/Debreceny15"}, "url":"URL#3456408" }, { "@score":"1", "@id":"3456409", "info":{"authors":{"author":[{"@pid":"d/RogerDebreceny","text":"Roger S. Debreceny"},{"@pid":"217/8876","text":"Mary B. Curtis"}]},"title":"Challenges From and To the Senior Editors of the Journal of Information Systems.","venue":"J. Inf. Syst.","volume":"29","number":"1","pages":"1-8","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/DebrecenyC15","doi":"10.2308/ISYS-10416","ee":"https://doi.org/10.2308/isys-10416","url":"https://dblp.org/rec/journals/jisys/DebrecenyC15"}, "url":"URL#3456409" }, { "@score":"1", "@id":"3456410", "info":{"authors":{"author":[{"@pid":"145/0385","text":"Dawna Drum"},{"@pid":"222/0883","text":"Rhetta Standifer"},{"@pid":"222/0859","text":"Kristina Bourne"}]},"title":"Facing the Consequences: Examining a Workaround Outcomes-Based Model.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"137-159","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/DrumSB15","doi":"10.2308/ISYS-50875","ee":"https://doi.org/10.2308/isys-50875","url":"https://dblp.org/rec/journals/jisys/DrumSB15"}, "url":"URL#3456410" }, { "@score":"1", "@id":"3456411", "info":{"authors":{"author":[{"@pid":"81/2785","text":"Hui Du"},{"@pid":"21/3839","text":"Wei Jiang"}]},"title":"Do Social Media Matter? Initial Empirical Evidence.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"51-70","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/DuJ15","doi":"10.2308/ISYS-50995","ee":"https://doi.org/10.2308/isys-50995","url":"https://dblp.org/rec/journals/jisys/DuJ15"}, "url":"URL#3456411" }, { "@score":"1", "@id":"3456412", "info":{"authors":{"author":[{"@pid":"48/3832","text":"Brenda Eschenbrenner"},{"@pid":"n/FionaFuiHoonNah","text":"Fiona Fui-Hoon Nah"},{"@pid":"131/9331","text":"Venkata Rajasekhar Telaprolu"}]},"title":"Efficacy of Social Media Utilization by Public Accounting Firms: Findings and Directions for Future Research.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"5-21","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/EschenbrennerNT15","doi":"10.2308/ISYS-50894","ee":"https://doi.org/10.2308/isys-50894","url":"https://dblp.org/rec/journals/jisys/EschenbrennerNT15"}, "url":"URL#3456412" }, { "@score":"1", "@id":"3456413", "info":{"title":"Retraction: Extending the Accounting Brand to Privacy Services.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"237","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/GreensteinH15","doi":"10.2308/ISYS-10440","ee":"https://doi.org/10.2308/isys-10440","url":"https://dblp.org/rec/journals/jisys/GreensteinH15"}, "url":"URL#3456413" }, { "@score":"1", "@id":"3456414", "info":{"authors":{"author":[{"@pid":"00/5584","text":"Catherine A. Hardy"},{"@pid":"222/0885","text":"Glen Laslett"}]},"title":"Continuous Auditing and Monitoring in Practice: Lessons from Metcash's Business Assurance Group.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"183-194","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/HardyL15","doi":"10.2308/ISYS-50969","ee":"https://doi.org/10.2308/isys-50969","url":"https://dblp.org/rec/journals/jisys/HardyL15"}, "url":"URL#3456414" }, { "@score":"1", "@id":"3456415", "info":{"title":"Retraction: Behavioral Self-Regulation of Telework Locations: Interrupting Interruptions!","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"233","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/Hunton15","doi":"10.2308/ISYS-10437","ee":"https://doi.org/10.2308/isys-10437","url":"https://dblp.org/rec/journals/jisys/Hunton15"}, "url":"URL#3456415" }, { "@score":"1", "@id":"3456416", "info":{"title":"Retraction: The Reaction of Financial Analysts to Enterprise Resource Planning (ERP) Implementation Plans.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"241","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/HuntonMW15","doi":"10.2308/ISYS-10443","ee":"https://doi.org/10.2308/isys-10443","url":"https://dblp.org/rec/journals/jisys/HuntonMW15"}, "url":"URL#3456416" }, { "@score":"1", "@id":"3456417", "info":{"title":"Retraction: The Impact of Alternative Telework Arrangements on Organizational Commitment: Insights from a Longitudinal Field Experiment.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"231","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/HuntonN15","doi":"10.2308/ISYS-10431","ee":"https://doi.org/10.2308/isys-10431","url":"https://dblp.org/rec/journals/jisys/HuntonN15"}, "url":"URL#3456417" }, { "@score":"1", "@id":"3456418", "info":{"title":"Retraction: Are Financial Auditors Overconfident in Their Ability to Assess Risks Associated with Enterprise Resource Planning Systems.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"235","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/HuntonWW15","doi":"10.2308/ISYS-10439","ee":"https://doi.org/10.2308/isys-10439","url":"https://dblp.org/rec/journals/jisys/HuntonWW15"}, "url":"URL#3456418" }, { "@score":"1", "@id":"3456419", "info":{"authors":{"author":[{"@pid":"26/10369","text":"Diane J. Janvrin"},{"@pid":"57/8014","text":"Jee-Hae Lim"},{"@pid":"16/10678","text":"Gary F. Peters"}]},"title":"The Perceived Impact of Journal of Information Systems on Promotion and Tenure.","venue":"J. Inf. Syst.","volume":"29","number":"1","pages":"73-93","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/JanvrinLP15","doi":"10.2308/ISYS-50963","ee":"https://doi.org/10.2308/isys-50963","url":"https://dblp.org/rec/journals/jisys/JanvrinLP15"}, "url":"URL#3456419" }, { "@score":"1", "@id":"3456420", "info":{"authors":{"author":[{"@pid":"22/9496","text":"Lorraine S. Lee"},{"@pid":"126/0260","text":"Edmund Green"}]},"title":"Systems Thinking and its Implications in Enterprise Risk Management.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"195-210","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/LeeG15","doi":"10.2308/ISYS-51047","ee":"https://doi.org/10.2308/isys-51047","url":"https://dblp.org/rec/journals/jisys/LeeG15"}, "url":"URL#3456420" }, { "@score":"1", "@id":"3456421", "info":{"authors":{"author":[{"@pid":"222/0880","text":"Shiyou Li"},{"@pid":"222/0876","text":"Emeka T. Nwaeze"}]},"title":"The Association between Extensions in XBRL Disclosures and Financial Information Environment.","venue":"J. Inf. Syst.","volume":"29","number":"3","pages":"73-99","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/LiN15","doi":"10.2308/ISYS-51005","ee":"https://doi.org/10.2308/isys-51005","url":"https://dblp.org/rec/journals/jisys/LiN15"}, "url":"URL#3456421" }, { "@score":"1", "@id":"3456422", "info":{"authors":{"author":{"@pid":"222/0877","text":"Rina Limor"}},"title":"Knowledge Resources and Book Reviews.","venue":"J. Inf. Syst.","volume":"29","number":"1","pages":"163-166","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/Limor15","doi":"10.2308/ISYS-10419","ee":"https://doi.org/10.2308/isys-10419","url":"https://dblp.org/rec/journals/jisys/Limor15"}, "url":"URL#3456422" }, { "@score":"1", "@id":"3456423", "info":{"authors":{"author":[{"@pid":"222/0879","text":"Irina Malaescu"},{"@pid":"19/5048","text":"Steve G. Sutton"}]},"title":"The Reliance of External Auditors on Internal Audit's Use of Continuous Audit.","venue":"J. Inf. Syst.","volume":"29","number":"1","pages":"95-114","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/MalaescuS15","doi":"10.2308/ISYS-50899","ee":"https://doi.org/10.2308/isys-50899","url":"https://dblp.org/rec/journals/jisys/MalaescuS15"}, "url":"URL#3456423" }, { "@score":"1", "@id":"3456424", "info":{"authors":{"author":[{"@pid":"144/0966","text":"Arif Perdana"},{"@pid":"40/9028","text":"D. Alastair Robb"},{"@pid":"93/4634","text":"Fiona H. Rohde"}]},"title":"An Integrative Review and Synthesis of XBRL Research in Academic Journals.","venue":"J. Inf. Syst.","volume":"29","number":"1","pages":"115-153","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/PerdanaRR15","doi":"10.2308/ISYS-50884","ee":"https://doi.org/10.2308/isys-50884","url":"https://dblp.org/rec/journals/jisys/PerdanaRR15"}, "url":"URL#3456424" }, { "@score":"1", "@id":"3456425", "info":{"authors":{"author":[{"@pid":"144/0966","text":"Arif Perdana"},{"@pid":"40/9028","text":"D. Alastair Robb"},{"@pid":"93/4634","text":"Fiona H. Rohde"}]},"title":"XBRL Diffusion in Social Media: Discourses and Community Learning.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"71-106","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/PerdanaRR15a","doi":"10.2308/ISYS-50996","ee":"https://doi.org/10.2308/isys-50996","url":"https://dblp.org/rec/journals/jisys/PerdanaRR15a"}, "url":"URL#3456425" }, { "@score":"1", "@id":"3456426", "info":{"authors":{"author":[{"@pid":"54/11056","text":"Matthew D. Pickard"},{"@pid":"222/0868","text":"Gary Cokins"}]},"title":"From Bean Counters to Bean Growers: Accountants as Data Analysts - A Customer Profitability Example.","venue":"J. Inf. Syst.","volume":"29","number":"3","pages":"151-164","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/PickardC15","doi":"10.2308/ISYS-51180","ee":"https://doi.org/10.2308/isys-51180","url":"https://dblp.org/rec/journals/jisys/PickardC15"}, "url":"URL#3456426" }, { "@score":"1", "@id":"3456427", "info":{"authors":{"author":[{"@pid":"89/10657","text":"Acklesh Prasad"},{"@pid":"65/3279","text":"Peter F. Green"}]},"title":"Organizational Competencies and Dynamic Accounting Information System Capability: Impact on AIS Processes and Firm Performance.","venue":"J. Inf. Syst.","volume":"29","number":"3","pages":"123-149","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/PrasadG15","doi":"10.2308/ISYS-51127","ee":"https://doi.org/10.2308/isys-51127","url":"https://dblp.org/rec/journals/jisys/PrasadG15"}, "url":"URL#3456427" }, { "@score":"1", "@id":"3456428", "info":{"authors":{"author":{"@pid":"222/0884","text":"Maria Prokofieva"}},"title":"Twitter-Based Dissemination of Corporate Disclosure and the Intervening Effects of Firms' Visibility: Evidence from Australian-Listed Companies.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"107-136","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/Prokofieva15","doi":"10.2308/ISYS-50994","ee":"https://doi.org/10.2308/isys-50994","url":"https://dblp.org/rec/journals/jisys/Prokofieva15"}, "url":"URL#3456428" }, { "@score":"1", "@id":"3456429", "info":{"authors":{"author":{"@pid":"222/0882","text":"Juergen Sidgman"}},"title":"Form 4 Electronic Submissions and the Thomson Reuters Insider Filing Data Feed: Discrepancies and Their Impact on Research.","venue":"J. Inf. Syst.","volume":"29","number":"3","pages":"1-33","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/Sidgman15","doi":"10.2308/ISYS-50981","ee":"https://doi.org/10.2308/isys-50981","url":"https://dblp.org/rec/journals/jisys/Sidgman15"}, "url":"URL#3456429" }, { "@score":"1", "@id":"3456430", "info":{"title":"Retraction: The Dark Side of Online Knowledge Sharing.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"229","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/SmithBBH15","doi":"10.2308/ISYS-10429","ee":"https://doi.org/10.2308/isys-10429","url":"https://dblp.org/rec/journals/jisys/SmithBBH15"}, "url":"URL#3456430" }, { "@score":"1", "@id":"3456431", "info":{"authors":{"author":{"@pid":"22/6167","text":"Dan N. Stone"}},"title":"Post-Hunton: Reclaiming Our Integrity and Literature.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"211-227","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/Stone15","doi":"10.2308/ISYS-51094","ee":"https://doi.org/10.2308/isys-51094","url":"https://dblp.org/rec/journals/jisys/Stone15"}, "url":"URL#3456431" }, { "@score":"1", "@id":"3456432", "info":{"authors":{"author":[{"@pid":"92/9568","text":"Brad S. Trinkle"},{"@pid":"96/289","text":"Robert E. Crossler"},{"@pid":"00/5685","text":"France Bélanger"}]},"title":"Voluntary Disclosures via Social Media and the Role of Comments.","venue":"J. Inf. Syst.","volume":"29","number":"3","pages":"101-121","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/TrinkleCB15","doi":"10.2308/ISYS-51133","ee":"https://doi.org/10.2308/isys-51133","url":"https://dblp.org/rec/journals/jisys/TrinkleCB15"}, "url":"URL#3456432" }, { "@score":"1", "@id":"3456433", "info":{"authors":{"author":[{"@pid":"48/8051","text":"Tawei Wang"},{"@pid":"222/0853","text":"Robert Cuthbertson"}]},"title":"Eight Issues on Audit Data Analytics We Would Like Researched.","venue":"J. Inf. Syst.","volume":"29","number":"1","pages":"155-162","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/WangC15","doi":"10.2308/ISYS-50955","ee":"https://doi.org/10.2308/isys-50955","url":"https://dblp.org/rec/journals/jisys/WangC15"}, "url":"URL#3456433" }, { "@score":"1", "@id":"3456434", "info":{"authors":{"author":[{"@pid":"23/1703","text":"Ju-Chun Yen"},{"@pid":"48/8051","text":"Tawei Wang"}]},"title":"The Association between XBRL Adoption and Market Reactions to Earnings Surprises.","venue":"J. Inf. Syst.","volume":"29","number":"3","pages":"51-71","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/YenW15","doi":"10.2308/ISYS-51039","ee":"https://doi.org/10.2308/isys-51039","url":"https://dblp.org/rec/journals/jisys/YenW15"}, "url":"URL#3456434" }, { "@score":"1", "@id":"3456435", "info":{"authors":{"author":[{"@pid":"24/2508-1","text":"Mi (Jamie) Zhou"},{"@pid":"222/0886","text":"Lijun (Gillian) Lei"},{"@pid":"50/8201","text":"Jianling Wang"},{"@pid":"f/WeiguoFan","text":"Weiguo (Patrick) Fan"},{"@pid":"00/2079","text":"Alan Gang Wang"}]},"title":"Social Media Adoption and Corporate Disclosure.","venue":"J. Inf. Syst.","volume":"29","number":"2","pages":"23-50","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jisys/ZhouLWFW15","doi":"10.2308/ISYS-50961","ee":"https://doi.org/10.2308/isys-50961","url":"https://dblp.org/rec/journals/jisys/ZhouLWFW15"}, "url":"URL#3456435" } ] } } } )