Content
September 2019, Volume 28, Issue 5
- 523-548 A critical perspective of engagement in online health communities
by Inkyoung Hur & Karlene C. Cousins & Bernd Carsten Stahl - 549-565 Creating “informating” systems using Agile development practices: an action research study
by Nanda Chingleput Surendra & Salman Nazir - 566-589 Abductive innovations in information security policy development: an ethnographic study
by Marko Niemimaa & Elina Niemimaa
July 2019, Volume 28, Issue 4
- 355-369 Information as a difference: toward a subjective theory of information
by Earl H. McKinney & Charles J. Yoos - 370-393 Assessing the long-term fragmentation of information systems research with a longitudinal multi-network analysis
by Gohar Feroz Khan & Matthias Trier - 394-412 Are social bots a real threat? An agent-based model of the spiral of silence to analyse the impact of manipulative actors in social networks
by Björn Ross & Laura Pilz & Benjamin Cabrera & Florian Brachten & German Neubaum & Stefan Stieglitz - 413-438 Enabling service co-production: a theory-building case study
by Audrey Grace & Rob Gleasure & Patrick Finnegan & Tom Butler - 439-456 A multilevel investigation on antecedents for employees’ exploration of enterprise systems
by Zeyu Peng & Xitong Guo - 457-472 Exploring the impact of IS function maturity and IS planning process on IS planning success: an ACE analysis
by Tomoaki Shimada & James Ang Soo-Keng & Darren Ee
May 2019, Volume 28, Issue 3
- 233-255 A generic cloud migration process model
by Mahdi Fahmideh & Farhad Daneshgar & Fethi Rabhi & Ghassan Beydoun - 256-271 An affordance lens for wearable information systems
by Raquel Benbunan-Fich - 272-290 Arousal, valence, and volume: how the influence of online review characteristics differs with respect to utilitarian and hedonic products
by Jie Ren & Jeffrey V. Nickerson - 291-317 Determinants and heterogeneity of switching costs in IT outsourcing: estimates from firm-level data
by Christian Peukert - 318-335 Designed entrepreneurial legitimacy: the case of a Swedish crowdfunding platform
by Claire Ingram Bogusz & Robin Teigland & Emmanuelle Vaast - 336-354 How does online interactional unfairness matter for patient–doctor relationship quality in online health consultation? The contingencies of professional seniority and disease severity
by Xiaofei Zhang & Xitong Guo & Kee-hung Lai & Wu Yi
March 2019, Volume 28, Issue 2
- 119-125 Being Promethean
by Kieran Conboy - 126-148 Understanding the role of social networking sites in the subjective well-being of users: a diary study
by Helena Wenninger & Hanna Krasnova & Peter Buxmann - 149-172 The paradoxical effects of digital artefacts on innovation practices
by Raffaele Fabio Ciriello & Alexander Richter & Gerhard Schwabe - 173-204 Social media empowerment in social movements: power activation and power accrual in digital activism
by Carmen Leong & Shan L. Pan & Shamshul Bahri & Ali Fauzi - 205-232 Critical review of organisation-technology sensemaking: towards technology materiality, discovery, and action
by Mostafa Mesgari & Chitu Okoli
January 2019, Volume 28, Issue 1
- 1-5 Stimulating academic discourse: a call for response
by Pär J. Ågerfalk - 6-20 An elaborated action design research process model
by Matthew T. Mullarkey & Alan R. Hevner & Pär Ågerfalk - 21-25 Elaborating ADR while drifting away from its essence: A commentary on Mullarkey and Hevner
by Maung K. Sein & Matti Rossi - 26-42 A study of information systems issues, practices, and leadership in Europe
by Leon Kappelman & Vess Johnson & Russell Torres & Chris Maurer & Ephraim McLean - 43-67 Directions for research on gender imbalance in the IT profession
by Elena Gorbacheva & Jenine Beekhuyzen & Jan vom Brocke & Jörg Becker - 68-90 Representing instances: the case for reengineering conceptual modelling grammars
by Roman Lukyanenko & Jeffrey Parsons & Binny M. Samuel - 91-113 A nomological network of customers’ privacy perceptions: linking artifact design to shopping efficiency
by Hartmut Hoehle & John A. Aloysius & Soheil Goodarzi & Viswanath Venkatesh - 114-118 Thanks to Reviewers
by The Editors
November 2018, Volume 27, Issue 6
- 623-628 Taking on sacred cows: openness, fair critique, and retaining value when revising classics
by Frantz Rowe & M. Lynne Markus - 629-653 Opinion seeking in a social network-enabled product review website: a study of word-of-mouth in the era of digital social networks
by Camille Grange & Izak Benbasat - 654-669 Feedback, task performance, and interface preferences
by Steven Bellman & Kyle B. Murray - 670-685 Designing an Internet-of-Things (IoT) and sensor-based in-home monitoring system for assisting diabetes patients: iterative learning from two case studies
by Samir Chatterjee & Jongbok Byun & Kaushik Dutta & Rasmus Ulslev Pedersen & Akshay Pottathil & Harry (Qi) Xie - 686-711 Population targeted requirements acquisition
by Tuure Tuunanen & Ken Peffers
September 2018, Volume 27, Issue 5
- 503-550 Transparency in literature reviews: an assessment of reporting practices across review types and genres in top IS journals
by Mathieu Templier & Guy Paré - 551-569 The effects of relative and criticism-based performance appraisals on task-level escalation in an IT project: a laboratory experiment
by Jong Seok Lee & Mark Keil - 570-599 “How does tech make you feel?” a review and examination of negative affective responses to technology use
by David Agogo & Traci J. Hess - 600-621 Understanding social networking site (SNS) identity from a dual systems perspective: an investigation of the dark side of SNS use
by Greta L. Polites & Christina Serrano & Jason Bennett Thatcher & Kevin Matthews
July 2018, Volume 27, Issue 4
- 395-414 User response to mandatory IT use: a coping theory perspective
by Anol Bhattacherjee & Christopher J. Davis & Amy J. Connolly & Neset Hikmet & Frantz Rowe & Régis Meissonier - 415-433 Stakeholders’ enactment of competing logics in IT governance: polarization, compromise or synthesis?
by Albert Boonstra & U. Yeliz Eseryel & Marjolein A. G. van Offenbeek & Frantz Rowe & Régis Meissonier - 434-448 Reversed loss aversion in crowdsourcing contest
by Haichao Zheng & Bo Xu & Linna Hao & Zhangxi Lin & Dov Te'Eni & Evangelos Katsamakas - 449-469 Disaggregation of the IT capital effects on firm performance: Empirical evidence from an IT asset portfolio perspective
by Tae Hun Kim & Matt Wimble & Vallabh Sambamurthy & Frantz Rowe & Jason Thatcher - 470-485 The insider on the outside: a novel system for the detection of information leakers in social networks
by Giuseppe Cascavilla & Mauro Conti & David G. Schwartz & Inbal Yahav - 486-502 Conceptualizing business-to-thing interactions – A sociomaterial perspective on the Internet of Things
by Anna Maria Oberländer & Maximilian Röglinger & Michael Rosemann & Alexandra Kees & Pär Ågerfalk & Virpi Tuunainen
May 2018, Volume 27, Issue 3
- 263-277 Philosophy and information systems: where are we and where should we go?
by Nik Rushdi Hassan & John Mingers & Bernd Stahl - 278-294 The IT artifact and its spirit: a nexus of human values, affordances, symbolic expressions, and IT features
by Mustapha Cheikh-Ammar & Nik Rushdi Hassan & John Mingers & Bernd Stah - 295-314 What’s in a face? Making sense of tangible information systems in terms of Peircean semiotics
by Paul Beynon-Davies & Nik Rushdi Hassan & John Mingers & Bernd Stahl - 315-325 A critical realist script for creative theorising in information systems
by Clay K. Williams & Donald E. Wynn & Nik Rushdi Hassan & John Mingers & Bernd Stahl - 326-346 From sovereign IT governance to liberal IT governmentality? A Foucauldian analogy
by Aurélie Leclercq-Vandelannoitte & Emmanuel Bertin - 347-366 Phronesis, argumentation and puzzle solving in IS research: illustrating an approach to phronetic IS research practice
by Ojelanki Ngwenyama & Stefan Klein & Nik Rushdi Hassan & John Mingers & Bernd Stahl - 367-379 Philosophical foundations for informing the future(S) through IS research
by Mike Chiasson & Elizabeth Davidson & Jenifer Winter & Nik Rushdi Hassan & John Mingers & Bernd Stahl - 380-393 Being critical is good, but better with philosophy! From digital transformation and values to the future of IS research
by Frantz Rowe
March 2018, Volume 27, Issue 2
- 127-128 Whither design science research?
by Pär J. Ågerfalk - 129-139 Design science research genres: introduction to the special issue on exemplars and criteria for applicable design science research
by Ken Peffers & Tuure Tuunanen & Björn Niehaves - 140-153 Aesthetics in design science research
by Richard L. Baskerville & Mala Kaul & Veda C. Storey & Ken Peffers & Tuure Tuunanen & Björn Niehaves - 154-170 Considering the social impacts of artefacts in information systems design science research
by Gerard De Leoz & Stacie Petter & Ken Peffers & Tuure Tuunanen & Bjoern Niehaves - 171-188 Design and evaluation of a model-driven decision support system for repurposing electric vehicle batteries
by Benjamin Klör & Markus Monhof & Daniel Beverungen & Sebastian Bräuer & Bjoern Niehaves & Tuure Tuunanen & Ken Peffers - 189-206 ERP prototype with built-in task and process support
by Tamara Babaian & Jennifer Xu & Wendy Lucas & Ken Peffers & Tuure Tuunanen & Björn Niehaves - 207-220 Modeling interferences in information systems design for cyberphysical systems: Insights from a smart grid application
by Tobias Brandt & Stefan Feuerriegel & Dirk Neumann & Ken Peffers & Tuure Tuunanen & Björn Niehaves & Anders Hjalmarsson - 221-247 Design principles for sensemaking support systems in environmental sustainability transformations
by Stefan Seidel & Leona Chandra Kruse & Nadine Székely & Michael Gau & Daniel Stieger & Ken Peffers & Tuure Tuunanen & Björn Niehaves & Kalle Lyytinen - 248-261 An information system design theory for the comparative judgement of competences
by Tanguy Coenen & Liesje Coertjens & Peter Vlerick & Marije Lesterhuis & Anneleen Viona Mortier & Vincent Donche & Pieter Ballon & Sven De Maeyer & Ken Peffers & Tuure Tuunanen & Bjoern Niehaves
January 2018, Volume 27, Issue 1
- 1-2 Going through changes
by Pär J. Ågerfalk - 3-21 Knowledge exchange roles and EKR performance impact: extending the theory of knowledge reuse
by Nicole Forsgren & Rajiv Sabherwal & Alexandra Durcikova & Frantz Rowe & Andrew Hardin - 22-45 Intention–behaviour misalignment at B2C websites: when the horse brings itself to water, will it drink?
by Greta L. Polites & Elena Karahanna & Larry Seligman & Pär Ågerfalk & Iris Junglas - 46-61 Adding background music as new stimuli of interest to information systems research
by David Gefen & René Riedl & Dov Te’eni & Ryad Titah - 62-89 Online health communities: how do community members build the trust required to adopt information and form close relationships?
by Hanmei Fan & Reeva Lederman & Frantz Rowe & Sabine Matook - 90-123 Assessing the robustness of meta-analytic results in information systems: publication bias and outliers
by Sven Kepes & Manoj A. Thomas & Frantz Rowe & Mark Silver - 124-126 Thanks to Reviewers
by The Editors
November 2017, Volume 26, Issue 6
- 541-545 Stimulating dialog between information systems research and practice
by Dov Te’eni & Stefan Seidel & Jan vom Brocke - 546-563 Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
by Paul Benjamin Lowry & Tamara Dinev & Robert Willison - 564-584 Which phish get caught? An exploratory study of individuals′ susceptibility to phishing
by Gregory D. Moody & Dennis F. Galletta & Brian Kimball Dunn - 585-604 Taking stock of organisations’ protection of privacy: categorising and assessing threats to personally identifiable information in the USA
by Clay Posey & Uzma Raja & Robert E. Crossler & A. J. Burns - 605-641 Organizational information security policies: a review and research framework
by W. Alec Cram & Jeffrey G. Proudfoot & John D’Arcy - 642-660 Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study
by Zafer D. Ozdemir & H. Jeff Smith & John H. Benamati - 661-687 An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook
by Abdullah Algarni & Yue Xu & Taizan Chan - 688-715 Adverse consequences of access to individuals’ information: an analysis of perceptions and the scope of organisational influence
by Sabrina Karwatzki & Manuel Trenz & Virpi Kristiina Tuunainen & Daniel Veit
September 2017, Volume 26, Issue 5
- 451-468 Service robots in hospitals: new perspectives on niche evolution and technology affordances
by Tobias Mettler & Michaela Sprenger & Robert Winter - 469-488 Balancing exploration and exploitation of IT resources: the influence of Digital Business Intensity on perceived organizational performance
by Joseph K. Nwankpa & Pratim Datta - 489-508 Impact of executive compensation on the execution of IT-based environmental strategies under competition
by Ricky Y. K. Chan & Katherine H. Y. Ma - 509-539 The role of context in IT assimilation: A multi-method study of a SaaS platform in the US nonprofit sector
by Ryan T. Wright & Nicholas Roberts & David Wilson
July 2017, Volume 26, Issue 4
- 333-360 Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users
by Sven Laumer & Christian Maier & Tim Weitzel - 361-378 The funeral industry and the Internet: on the historical emergence and destabilization of strategic paths
by Matthias Wenzel & Heinz-Theo Wagner & Jochen Koch - 379-413 It’s complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis
by Gregory D. Moody & Paul Benjamin Lowry & Dennis F. Galletta - 414-431 Online product review as an indicator of users’ degree of innovativeness and product adoption time: a longitudinal analysis of text reviews
by Roozmehr Safi & Yang Yu - 432-450 Constraint-based and dedication-based mechanisms for encouraging online self-disclosure: Is personalization the only thing that matters?
by Hung-pin Shih & Kee-hung Lai & T. C. E. Cheng
May 2017, Volume 26, Issue 3
- 237-239 Digital natives and immigrant editors, and special issues
by Dov Te’eni - 240-247 Alternative genres in information systems research
by Michel Avital & Lars Mathiassen & Ulrike Schultze - 248-259 The limits to language in doing systems design
by Richard J. Boland & Kalle Lyytinen - 260-273 A narrative approach to publishing information systems research: inspiration from the French New Novel tradition
by David Avison & Julien Malaurent & Philippe Eynaud - 274-286 “What else is there…?”: reporting meditations in experiential computing
by Mads Bødker - 287-297 A half-moon on my skin: a memoir on life with an activity tracker
by Elpida Prasopoulou - 298-314 Once upon a time: Crafting allegories to analyze and share the cultural complexity of strategic alignment
by Michelle Lynn Kaarst-Brown - 315-332 Crowdsourcing of information systems research
by James Love & Rudy Hirschheim
March 2017, Volume 26, Issue 2
- 121-142 The concept of mindfulness in information systems research: a multi-dimensional analysis
by Sabine Dernbecher & Roman Beck - 143-163 The public procurement of information systems: dialectics in requirements specification
by Carl Erik Moe & Mike Newman & Maung Kyaw Sein - 164-184 Variable use of standards-based IOS enabling technologies in Australian SMEs: an examination of deliberate and emergent decision making processes
by Damien Power & Richard L. Gruner - 185-205 Interorganizational dependence, information transparency in interorganizational information systems, and supply chain performance
by Bangho Cho & Sung Yul Ryoo & Kyung Kyu Kim - 206-235 Conflicts and complements between eastern cultures and agile methods: an empirical investigation
by Balasubramaniam Ramesh & Lan Cao & Jongwoo Kim & Kannan Mohan & Tabitha L. James
January 2017, Volume 26, Issue 1
- 1-20 Information systems security policy implementation in practice: from best practices to situated practices
by Elina Niemimaa & Marko Niemimaa - 21-36 Mixed results in strategic IT alignment research: a synthesis and empirical study
by Magno Queiroz - 37-65 Examining the intended and unintended consequences of organisational privacy safeguards
by Rachida Parks & Heng Xu & Chao-Hsien Chu & Paul Benjamin Lowry - 66-83 Useful business cases: value creation in IS projects
by Peter Axel Nielsen & John Stouby Persson - 84-115 Supporting the design of data integration requirements during the development of data warehouses: a communication theory-based approach
by Christoph Rosenkranz & Roland Holten & Marc Räkers & Wolf Behrmann - 116-120 Thanks to Reviewers
by The Editors
November 2016, Volume 25, Issue 6
- 473-476 Contextualization and problematization, gamification and affordance: a traveler’s reflections on EJIS
by Dov Te’eni - 477-492 Triggered essential reviewing: the effect of technology affordances on service experience evaluations
by Gabriele Piccoli - 493-508 Contextualizing the twin concepts of systematicity and transparency in information systems literature reviews
by Guy Paré & Mary Tate & David Johnstone & Spyros Kitsiou - 509-533 Fragmentation or cohesion? Visualizing the process and consequences of information system diversity, 1993–2012
by Yong Liu & Hongxiu Li & Jorge Goncalves & Vassilis Kostakos & Bei Xiao - 534-552 Collaborative partner or opponent: How the messenger influences the deaf effect in IT projects
by Arno Nuijten & Mark Keil & Harry Commandeur - 553-568 Alignment in an inter-organisational network: the case of ARC transistance
by Bernhard R Katzy & Gordon Sung & Kevin Crowston
September 2016, Volume 25, Issue 5
- 391-410 The impact of media on how positive, negative, and neutral communicated affect influence unilateral concessions during negotiations
by Norman A Johnson & Randolph B Cooper & Richard D Holowczak - 411-431 An empirical analysis of the factors and measures of Enterprise Architecture Management success
by Matthias Lange & Jan Mendling & Jan Recker - 432-447 Untangling the complex role of guilt in rational decisions to discontinue the use of a hedonic Information System
by Ofir Turel - 448-464 A process explanation of the effects of institutional distance between parties in outsourced information systems development projects
by Gregory Vial & Suzanne Rivard - 465-471 Four common multicommunicating misconceptions
by Ann-Frances Cameron & Jane Webster & Henri Barki & Ana Ortiz de Guinea
July 2016, Volume 25, Issue 4
- 289-302 Utilizing big data analytics for information systems research: challenges, promises and guidelines
by Oliver Müller & Iris Junglas & Jan vom Brocke & Stefan Debortoli - 303-316 The inner and the outer model in explanatory design theory: the case of designing electronic feedback systems
by Bjoern Niehaves & Kevin Ortbach - 317-343 Work routines as an object of resistance during information systems implementations: theoretical foundation and empirical evidence
by Sven Laumer & Christian Maier & Andreas Eckhardt & Tim Weitzel - 344-363 Identity metamorphoses in digital disruption: a relational theory of identity
by Anastasia Utesheva & Jason R Simpson & Dubravka Cecez-Kecmanovic - 364-390 How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
by Bonnie Brinton Anderson & Anthony Vance & C Brock Kirwan & David Eargle & Jeffrey L Jenkins
May 2016, Volume 25, Issue 3
- 187-208 Measuring eGovernment success: a public value approach
by Murray Scott & William DeLone & William Golden - 209-230 Achieving dynamic capabilities with cloud computing: an empirical investigation
by Douglas A Battleson & Barry C West & Jongwoo Kim & Balasubramaniam Ramesh & Pamela S Robinson - 231-251 Dispositional and situational factors: influences on information security policy violations
by Allen C Johnston & Merrill Warkentin & Maranda McBride & Lemuria Carter - 252-273 Web assurance seal services, trust and consumers’ concerns: an investigation of e-commerce transaction intentions across two nations
by Dan J Kim & Myung-Seong Yim & Vijayan Sugumaran & H Raghav Rao - 274-287 Why different trust relationships matter for information systems users
by Matthias Söllner & Axel Hoffmann & Jan Marco Leimeister
March 2016, Volume 25, Issue 2
- 91-109 Factors influencing the intention to comply with data protection regulations in hospitals: based on gender differences in behaviour and deterrence
by Michael Foth - 110-130 Representing small business web presence content: the web presence pyramid model
by Stephen Burgess - 131-153 Effectiveness of top management support in enterprise systems success: a contingency perspective of fit between leadership style and system life-cycle
by Zhen Shao & Yuqiang Feng & Qing Hu - 154-169 Mindful revolution or mindless trend? Examining agile development as a management fashion
by W Alec Cram & Sue Newell - 170-186 Handle mergers and acquisitions with care: the fragility of trust between the IT-service provider and end-users
by Susan A Brown & Anne P Massey & Kerry W Ward
January 2016, Volume 25, Issue 1
- 1-15 Twenty years of the European information systems academy at ECIS: emergent trends and research topics
by Mari-Klara Stein & Robert D Galliers & Edgar A Whitley - 16-28 Economic decision criteria for the migration to cloud storage
by Maurizio Naldi & Loretta Mastroeni - 29-46 How to get the most from a business intelligence application during the post implementation phase? Deep structure transformation at a U.K. retail bank
by Alena Audzeyeva & Robert Hudson - 47-63 Understanding champion behaviour in a health-care information system development project – how multiple champions and champion behaviours build a coherent whole
by Joeri van Laere & Lena Aggestam - 64-76 Transforming healthcare: policy discourses of IT and patient-centred care
by Ela Klecun - 77-89 FEDS: a Framework for Evaluation in Design Science Research
by John Venable & Jan Pries-Heje & Richard Baskerville
November 2015, Volume 24, Issue 6
- 559-568 Publishing and getting published in EJIS: marshaling contributions for a diversity of genres
by Dov Te'eni & Frantz Rowe & Pär J Ågerfalk & Jong Seok Lee - 569-587 The effective promotion of informal control in information systems offshoring projects
by Martin Wiener & Ulrich Remus & Jakob Heumann & Magnus Mähring - 588-606 Personal information management effectiveness of knowledge workers: conceptual development and empirical validation
by Yujong Hwang & William J Kettinger & Mun Y Yi - 607-623 The impact of decision support system features on user overconfidence and risky behavior
by Chi-Wen Chen & Marios Koufaris - 624-644 The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern
by Gaurav Bansal & Fatemeh ‘Mariam’ Zahedi & David Gefen - 645-663 Flexible generification: ICT standardization strategies and service innovation in health care
by Ole Hanseth & Bendik Bygstad - 664-679 Theoretical perspectives in IS research: from variance and process to conceptual latitude and conceptual fit
by Andrew Burton-Jones & Ephraim R McLean & Emmanuel Monod
September 2015, Volume 24, Issue 5
- 447-464 Giving too much social support: social overload on social networking sites
by Christian Maier & Sven Laumer & Andreas Eckhardt & Tim Weitzel - 465-491 Six types of IT-business strategic alignment: an investigation of the constructs and their measurement
by Jennifer E Gerow & Jason Bennett Thatcher & Varun Grover - 492-518 Time and information technology in teams: a review of empirical research and future research directions
by Zixing Shen & Kalle Lyytinen & Youngjin Yoo - 519-530 Determinants of software piracy under risk aversion: a model with empirical evidence
by Ahmed Driouchi & Mingzhu Wang & Tarik Driouchi - 531-557 Using quantitative data in mixed-design grounded theory studies: an enhanced path to formal grounded theory in information systems
by Isabelle Walsh
July 2015, Volume 24, Issue 4
- 361-363 Current issue and future submissions, contextualized
by Dov Te'eni - 364-373 A unified model of IT continuance: three complementary perspectives and crossover effects
by Anol Bhattacherjee & Chieh-Peng Lin - 374-390 Five-factor model personality traits as predictors of perceived and actual usage of technology
by Tim Barnett & Allison W Pearson & Rodney Pearson & Franz W Kellermanns - 391-410 The effect of online social value on satisfaction and continued use of social media
by Tao Hu & William J Kettinger & Robin S Poston - 411-430 Examining the antecedents of user gratification and its effects on individuals’ social network services usage: the moderating role of habit
by Chao-Min Chiu & Hsin-Yi Huang - 431-446 Quitting the use of a habituated hedonic information system: a theoretical model and empirical examination of Facebook users
by Ofir Turel
May 2015, Volume 24, Issue 3
- 229-233 Cross-cultural IS research: perspectives from Eastern and Western traditions
by Merrill Warkentin & Brigitte Charles-Pauvers & Patrick Y K Chau - 234-246 The realignment of offshoring frame disputes (OFD): an ethnographic ‘cultural’ analysis
by M N Ravishankar - 247-261 Toward a theory of perceived benefits, affective commitment, and continuance intention in social virtual worlds: cultural values (indulgence and individualism) matter
by Zhongyun Zhou & Xiao-Ling Jin & Yulin Fang & Doug Vogel - 262-277 Knowledge sharing intention in the United States and China: a cross-cultural study
by Yu-Wei Chang & Ping-Yu Hsu & Wen-Lung Shiau & Chung-Chih Tsai - 278-294 A legitimacy challenge of a cross-cultural interorganizational information system
by Carol Hsu & Yu-Tzu Lin & Tawei Wang - 295-313 The effect of culture on requirements: a value-based view of prioritization
by Tuure Tuunanen & I-Te Kuo - 314-336 Cross-national differences in individual knowledge-seeking patterns: a climato-economic contextualization
by Liwei Chen & J J Po-An Hsieh & Evert Van de Vliert & Xu Huang - 337-359 An espoused cultural perspective to understand continued intention to use mobile applications: a four-country study of mobile social media application usability
by Hartmut Hoehle & Xiaojun Zhang & Viswanath Venkatesh
March 2015, Volume 24, Issue 2
- 117-120 Information system integration in mergers and acquisitions: research ahead
by Jonas Hedman & Suprateek Sarker - 121-144 Learning to acquire: how serial acquirers build organisational knowledge for information systems integration
by Stefan Henningsson - 145-158 When IT capabilities are not scale-free in merger and acquisition integrations: how do capital markets react to IT capability asymmetries between acquirer and target?
by Hüseyin Tanriverdi & Vahap Bülent Uysal - 159-177 The roles of contextual elements in post-merger common platform development: an empirical investigation
by Radhika P Jain & Balasubramaniam Ramesh - 178-201 Discovery paths: exploring emergence and IT evolutionary design in cross-border M&As. Analysing grupo Santander’s acquisition of abbey (2004–2009)
by Javier Busquets - 202-226 Knowledge-acquisitions and post-acquisition innovation performance: a comparative hazards model
by Pratim Datta & Yaman Roumani - 227-227 Erratum: Discovery paths: exploring emergence and IT evolutionary design in cross-border M&As. Analysing Grupo Santander’s acquisition of Abbey (2004–2009)
by Javier Busquets
January 2015, Volume 24, Issue 1
- 1-3 Challenges in learning and improving continuously
by Dov Te'eni - 4-22 Associating consumer perceived value with business models for digital services
by Aaron Baird & T S Raghu - 23-37 Adopting IS process innovations in organizations: the role of IS leaders’ individual factors and technology perceptions in decision making
by Srinarayan Sharma & Arun Rai - 38-58 Managing the introduction of information security awareness programmes in organisations
by Aggeliki Tsohou & Maria Karyda & Spyros Kokolakis & Evangelos Kiountouzis - 59-75 The roles of psychological climate, information management capabilities, and IT support on knowledge-sharing: an MOA perspective
by William J Kettinger & Yuan Li & Joshua M Davis & Lynda Kettinger - 76-92 Forming an intention to act on recommendations given via online social networks
by Sabine Matook & Susan A Brown & Johanna Rolf - 93-106 Learning and self-disclosure behavior on social networking sites: the case of Facebook users
by Rui Chen & Sushil K Sharma - 107-115 Distinguishing and contrasting two strategies for design science research
by Juhani Iivari
November 2014, Volume 23, Issue 6
- 593-599 Insufficient theoretical contribution: a conclusive rationale for rejection?
by Pär J Ågerfalk - 600-615 Paradigm lost … paradigm gained: a hermeneutical rejoinder to Banville and Landry’s ‘Can the Field of MIS be Disciplined?’
by Nik R Hassan - 616-628 The competitive impact of information technology: can commodity IT contribute to competitive performance?
by Gabriele Piccoli & Tsz-Wai Lui - 629-654 No time to waste: the role of timing and complementarity of alignment practices in creating business value in IT projects
by Armin Vermerris & Martin Mocker & Eric van Heck - 655-671 A ‘sweet spot’ change strategy for a least developed country: leveraging e-Government in Bangladesh
by Shirley Gregor & Ahmed Imran & Tim Turner - 672-690 An empirical investigation of Technology Readiness among medical staff based in Greek hospitals
by Christos D Melas & Leonidas A Zampetakis & Anastasia Dimopoulou & Vassilis S Moustakis - 691-707 The longitudinal impact of enterprise system users’ pre-adoption expectations and organizational support on post-adoption proficient usage
by John F Veiga & Marcus M Keupp & Steven W Floyd & Franz W Kellermanns - 708-726 Internet adoption by the elderly: employing IS technology acceptance theories for understanding the age-related digital divide
by Björn Niehaves & Ralf Plattfaut
September 2014, Volume 23, Issue 5
- 503-512 When mobile is the norm: researching mobile information systems and mobility as post-adoption phenomena
by Catherine Middleton & Rens Scheepers & Virpi Kristiina Tuunainen - 513-528 Changing information retrieval behaviours: an empirical investigation of users’ cognitive processes in the choice of location-based services
by Ioanna D Constantiou & Christiane Lehrer & Thomas Hess - 529-542 Mobile technology in mobile work: contradictions and congruencies in activity systems
by Stan Karanasios & David Allen - 543-557 Mobile information systems and organisational control: beyond the panopticon metaphor?
by Aurélie Leclercq-Vandelannoitte & Henri Isaac & Michel Kalika - 558-570 Working with connective flow: how smartphone use is evolving in practice
by Kristine Dery & Darl Kolb & Judith MacCormick - 571-592 An organizational perspective on m-business: usage factors and value determination
by Winnie Ng Picoto & France Bélanger & António Palma-dos-Reis
July 2014, Volume 23, Issue 4
- 373-399 An empirical evaluation of existing IS change theories for the case of IOIS evolution
by Kai Reimers & Robert B Johnston & Stefan Klein - 400-417 Integrated clinical pathway management for medical quality improvement – based on a semiotically inspired systems architecture
by Weizi Li & Kecheng Liu & Hongqiao Yang & Changrui Yu - 418-432 Information sharing and interoperability: the case of major incident management
by David K Allen & Stan Karanasios & Alistair Norman - 433-441 Transforming decision-making processes: a research agenda for understanding the impact of business analytics on organisations
by Rajeev Sharma & Sunil Mithas & Atreyi Kankanhalli - 442-461 Design matters for decision makers: Discovering IT investment alternatives
by Jane Elisabeth Frisk & Rikard Lindgren & Lars Mathiassen - 462-480 Developing information processing capability for operational agility: implications from a Chinese manufacturer
by Pei-Ying Huang & Shan L Pan & Tao Hua Ouyang - 481-502 The role of GPS-enabled information in transforming operational decision making: an exploratory study
by Andreja Habjan & Constantine Andriopoulos & Manto Gotsi
May 2014, Volume 23, Issue 3
- 241-255 What literature review is not: diversity, boundaries and recommendations
by Frantz Rowe