Content
June 2017, Volume 28, Issue 2
- 397-412 Price of Identical Product with Gray Market Sales: An Analytical Model and Empirical Analysis
by Zhongju Zhang & Juan Feng - 413-429 Designing for Diagnosticity and Serendipity: An Investigation of Social Product-Search Mechanisms
by Cheng Yi & Zhenhui (Jack) Jiang & Izak Benbasat - 430-444 Information Technology, Revenues, and Profits: Exploring the Role of Foreign and Domestic Operations
by Sunil Mithas & Jonathan Whitaker & Ali Tafti
March 2017, Volume 28, Issue 1
- 1-4 Editorial Thoughts: What and How ISR Publishes
by Alok Gupta - 5-21 Research Commentary—Diversity of the Information Systems Research Field: A Journal Governance Perspective
by Thomas F. Burgess & Paul Grimshaw & Nicky E. Shaw - 22-32 Providing a Window of Opportunity for Converting eStore Visitors
by Amit Bhatnagar & Arun Sen & Atish P. Sinha - 33-45 Politics and Information Technology Investments in the U.S. Federal Government in 2003–2016
by Min-Seok Pang - 46-63 Technology Mergers and Acquisitions in the Presence of an Installed Base: A Strategic Analysis
by Qiu-Hong Wang & Kai-Lung Hui - 64-83 A Theory of Responsive Design: A Field Study of Corporate Engagement with Open Source Communities
by Matt Germonprez & Julie E. Kendall & Kenneth E. Kendall & Lars Mathiassen & Brett Young & Brian Warner - 84-96 Extending the Concept of Control Beliefs: Integrating the Role of Advice Networks
by Lionel P. Robert Jr. & Tracy Ann Sykes - 97-116 Electronic Commerce, Spatial Arbitrage, and Market Efficiency
by Hemang Subramanian & Eric Overby - 117-136 Popularity or Proximity: Characterizing the Nature of Social Influence in an Online Music Community
by Sanjeev Dewan & Yi-Jen (Ian) Ho & Jui Ramaprasad - 137-158 Cost-Effective Quality Assurance in Crowd Labeling
by Jing Wang & Panagiotis G. Ipeirotis & Foster Provost - 159-179 Coalition-Based Pricing in Ascending Combinatorial Auctions
by Martin Bichler & Zhen Hao & Gediminas Adomavicius - 180-198 Managerial Incentives and IT Strategic Posture
by Ling Xue & Gautam Ray & Xia Zhao
December 2016, Volume 27, Issue 4
- 668-684 Special Section Introduction—Online Community as Space for Knowledge Flows
by Samer Faraj & Georg von Krogh & Eric Monteiro & Karim R. Lakhani - 685-703 Effect of Knowledge-Sharing Trajectories on Innovative Outcomes in Temporary Online Crowds
by Ann Majchrzak & Arvind Malhotra - 704-723 Creating Value in Online Communities: The Sociomaterial Configuring of Strategy, Platform, and Stakeholder Engagement
by Michael Barrett & Eivor Oborn & Wanda Orlikowski - 724-750 Intellectual Property Norms in Online Communities: How User-Organized Intellectual Property Regulation Supports Innovation
by Julia Bauer & Nikolaus Franke & Philipp Tuertscher - 751-772 Coordinating Interdependencies in Online Communities: A Study of an Open Source Software Project
by Aron Lindberg & Nicholas Berente & James Gaskin & Kalle Lyytinen - 773-791 Toward a Theory of Remixing in Online Innovation Communities
by Michael A. Stanko - 792-812 Turbulent Stability of Emergent Roles: The Dualistic Nature of Self-Organizing Knowledge Coproduction
by Ofer Arazy & Johannes Daxenberger & Hila Lifshitz-Assaf & Oded Nov & Iryna Gurevych - 813-833 Folding and Unfolding: Balancing Openness and Transparency in Open Source Communities
by Maha Shaikh & Emmanuelle Vaast - 834-847 Special Section Introduction—Ubiquitous IT and Digital Vulnerabilities
by Sam Ransbotham & Robert G. Fichman & Ram Gopal & Alok Gupta - 848-879 Assessing the Impact of Granular Privacy Controls on Content Sharing and Disclosure on Facebook
by Huseyin Cavusoglu & Tuan Q. Phan & Hasan Cavusoglu & Edoardo M. Airoldi - 880-896 More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable
by Jeffrey L. Jenkins & Bonnie Brinton Anderson & Anthony Vance & C. Brock Kirwan & David Eargle - 897-918 When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security
by Yonghua Ji & Subodha Kumar & Vijay Mookerjee - 919-939 Excessive Dependence on Mobile Social Apps: A Rational Addiction Perspective
by Hyeokkoo Eric Kwon & Hyunji So & Sang Pil Han & Wonseok Oh - 940-961 The Impact of Fake Reviews on Online Visibility: A Vulnerability Assessment of the Hotel Industry
by Theodoros Lappas & Gaurav Sabnis & Georgios Valkanas - 962-986 Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model
by Paul Benjamin Lowry & Jun Zhang & Chuang Wang & Mikko Siponen
September 2016, Volume 27, Issue 3
- 471-477 Editorial—On the Intellectual Structure and Evolution of ISR
by Ritu Agarwal - 478-496 Secret Admirers: An Empirical Examination of Information Hiding and Contribution Dynamics in Online Crowdfunding
by Gordon Burtch & Anindya Ghose & Sunil Wattal - 497-516 Do Incentive Hierarchies Induce User Effort? Evidence from an Online Knowledge Exchange
by Paulo B. Goes & Chenhui Guo & Mingfeng Lin - 558-579 Implementation of an Information and Communication Technology in a Developing Country: A Multimethod Longitudinal Study in a Bank in India
by Viswanath Venkatesh & Hillol Bala & V. Sambamurthy - 648-660 Research Note—Designing Promotion Ladders to Mitigate Turnover of IT Professionals
by Frank MacCrory & Vidyanand Choudhary & Alain Pinsonneault
2016, Volume 27, Issue 3
- 517-537 Managing Co-Creation in Information Technology Projects: A Differential Games Approach
by Emre M. Demirezen & Subodha Kumar & Bala Shetty - 538-557 The Impact of Competing Ads on Click Performance in Sponsored Search
by Ashish Agarwal & Tridas Mukhopadhyay - 580-595 Should Online Content Providers Be Allowed To Subsidize Content?—An Economic Analysis
by Soohyun Cho & Liangfei Qiu & Subhajyoti Bandyopadhyay - 596-617 Pricing Data Services: Pricing by Minutes, by Gigs, or by Megabytes per Second?
by Ying-Ju Chen & Ke-Wei Huang - 618-635 Open Content, Linus’ Law, and Neutral Point of View
by Shane Greenstein & Feng Zhu - 636-647 Research Note —IT Outsourcing and the Impact of Advisors on Clients and Vendors
by Ravi Bapna & Alok Gupta & Gautam Ray & Shweta Singh
June 2016, Volume 27, Issue 2
- 219-239 Examining the Continuance of Secure Behavior: A Longitudinal Field Study of Mobile Device Authentication
by Paul John Steinbart & Mark J. Keith & Jeffry Babb - 240-258 Sustainability of Healthcare Information Exchanges: A Game-Theoretic Approach
by Emre M. Demirezen & Subodha Kumar & Arun Sen - 259-281 Does Product Market Competition Drive CVC Investment? Evidence from the U.S. IT Industry
by Keongtae Kim & Anandasivam Gopal & Gerard Hoberg - 282-301 Product Line Extension in Consumer Software Markets in the Presence of Free Alternatives
by Aaron Baird & Chadwick J. Miller & T. S. Raghu & Rajiv K. Sinha - 302-323 Framing Innovation Opportunities While Staying Committed to an Organizational Epistemic Stance
by Anne-Laure Fayard & Emmanouil Gkeredakis & Natalia Levina - 324-346 Facilitating the Transformational: An Exploration of Control in Cyberinfrastructure Projects and the Discovery of Field Control
by Gregory D. Moody & Laurie J. Kirsch & Sandra A. Slaughter & Brian Kimball Dunn & Qin Weng - 347-364 Characteristics and Economic Consequences of Jump Bids in Combinatorial Auctions
by Pallab Sanyal - 365-382 On the Ontological Quality and Logical Quality of Conceptual-Modeling Grammars: The Need for a Dual Perspective
by Roger Clarke & Andrew Burton-Jones & Ron Weber - 383-402 Research Note—Leader Influence on Sustained Participation in Online Collaborative Work Communities: A Simulation-Based Approach
by Wonseok Oh & Jae Yun Moon & Jungpil Hahn & Taekyung Kim - 403-423 Research Note—Are Online Labor Markets Spot Markets for Tasks? A Field Experiment on the Behavioral Response to Wage Cuts
by Daniel L. Chen & John J. Horton - 424-439 Research Note—Content and Collaboration: An Affiliation Network Approach to Information Quality in Online Peer Production Communities
by Gerald C. Kane & Sam Ransbotham - 440-452 Research Note—An Internet-Enabled Move to the Market in Logistics
by Fengmei Gong & Barrie R. Nault & Mohammad S. Rahman - 453-465 Research Note—Gamification of Technology-Mediated Training: Not All Competitions Are the Same
by Radhika Santhanam & De Liu & Wei-Cheng Milton Shen
March 2016, Volume 27, Issue 1
- 1-5 Invited Commentary—Reflections on ICT-enabled Bright Society Research
by Jae Kyu Lee - 6-26 On the Longitudinal Effects of IT Use on Firm-Level Employment
by Hilal Atasoy & Rajiv D. Banker & Paul A. Pavlou - 27-48 Rate or Trade? Identifying Winning Ideas in Open Idea Sourcing
by Ivo Blohm & Christoph Riedl & Johann Füller & Jan Marco Leimeister - 49-69 Comparing Open and Sealed Bid Auctions: Evidence from Online Labor Markets
by Yili Hong & Chong (Alex) Wang & Paul A. Pavlou - 70-86 Mandatory Standards and Organizational Information Security
by Chul Ho Lee & Xianjun Geng & Srinivasan Raghunathan - 87-111 Managing Citizens’ Uncertainty in E-Government Services: The Mediating and Moderating Roles of Transparency and Trust
by Viswanath Venkatesh & James Y. L. Thong & Frank K. Y. Chan & Paul J. H. Hu - 112-130 The Double-Edged Sword of Backward Compatibility: The Adoption of Multigenerational Platforms in the Presence of Intergenerational Services
by Il-Horn Hann & Byungwan Koh & Marius F. Niculescu - 131-144 Research Note—When Do Consumers Value Positive vs. Negative Reviews? An Empirical Investigation of Confirmation Bias in Online Word of Mouth
by Dezhi Yin & Sabyasachi Mitra & Han Zhang - 145-165 Research Note—Cloud Computing Spot Pricing Dynamics: Latency and Limits to Arbitrage
by Hsing Kenneth Cheng & Zhi Li & Andy Naranjo - 166-181 Research Note—Information Technology, Customer Satisfaction, and Profit: Theory and Evidence
by Sunil Mithas & M. S. Krishnan & Claes Fornell - 182-196 Research Note—In CARSs We Trust: How Context-Aware Recommendations Affect Customers’ Trust and Other Business Performance Measures of Recommender Systems
by Umberto Panniello & Michele Gorgoglione & Alexander Tuzhilin - 197-213 Research Note—Using Expectation Disconfirmation Theory and Polynomial Modeling to Understand Trust in Technology
by Nancy K. Lankton & D. Harrison McKnight & Ryan T. Wright & Jason Bennett Thatcher
December 2015, Volume 26, Issue 4
- 639-655 Research Commentary—Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the “APCO” Box
by Tamara Dinev & Allen R. McConnell & H. Jeff Smith - 656-674 Discriminating IT Governance
by Amrit Tiwana & Stephen K. Kim - 675-694 Embarrassing Exposures in Online Social Networks: An Integrated Perspective of Privacy Invasion and Relationship Bonding
by Ben C. F. Choi & Zhenhui (Jack) Jiang & Bo Xiao & Sung S. Kim - 695-713 Do Organic Results Help or Hurt Sponsored Search Performance?
by Ashish Agarwal & Kartik Hosanagar & Michael D. Smith - 714-730 Design of Consumer Review Systems and Product Pricing
by Yabing Jiang & Hong Guo - 731-753 Versioning in the Software Industry: Heterogeneous Disutility from Underprovisioning of Functionality
by Shivendu Shivendu & Zhe (James) Zhang - 754-772 Can Payment-per-Click Induce Improvements in Click Fraud Identification Technologies?
by Min Chen & Varghese S. Jacob & Suresh Radhakrishnan & Young U. Ryu - 773-792 What Motivates Contributors vs. Lurkers? An Investigation of Online Feedback Forums
by Chee Wei Phang & Atreyi Kankanhalli & Bernard C. Y. Tan - 793-811 Designing Warning Messages for Detecting Biased Online Product Recommendations: An Empirical Investigation
by Bo Xiao & Izak Benbasat - 812-828 Research Note—Tigerblood: Newspapers, Blogs, and the Founding of Information Technology Firms
by Brad N. Greenwood & Anand Gopal - 829-844 Research Note—Parenting New Acquisitions: Acquirers’ Digital Resource Redeployment and Targets’ Performance Improvement in the U.S. Hospital Industry
by Kui Du - 845-858 Research Note—Patching the Cloud: The Impact of SaaS on Patching Strategy and the Timing of Software Release
by Vidyanand Choudhary & Zhe (James) Zhang - 859-870 Research Note—Can’t Buy Me Love…Or Can I? Social Capital Attainment Through Conspicuous Consumption in Virtual Environments
by Oliver Hinz & Martin Spann & Il-Horn Hann
September 2015, Volume 26, Issue 3
- 473-479 Editorial—Evolvable Systems: Through the Looking Glass of IS
by Ritu Agarwal & Amrit Tiwana - 480-495 Research Commentary—Information Technology Substitution Revisited
by Dawei Zhang & Zhuo (June) Cheng & Hasan A. Qurban H. Mohammad & Barrie R. Nault - 496-512 Network Dynamics: How Can We Find Patients Like Us?
by Lu (Lucy) Yan & Jianping Peng & Yong Tan - 513-531 IT-Enabled Broadcasting in Social Media: An Empirical Study of Artists’ Activities and Music Sales
by Hailiang Chen & Prabuddha De & Yu Jeffrey Hu - 532-551 Recommendations Using Information from Multiple Association Rules: A Probabilistic Approach
by Abhijeet Ghoshal & Syam Menon & Sumit Sarkar - 552-564 Contemporaneous and Delayed Sales Impact of Location-Based Mobile Promotions
by Zheng Fang & Bin Gu & Xueming Luo & Yunjie Xu - 565-584 Information Disclosure and the Diffusion of Information Security Attacks
by Sabyasachi Mitra & Sam Ransbotham - 585-605 Research Note—Why Following Friends Can Hurt You: An Exploratory Investigation of the Effects of Envy on Social Networking Sites among College-Age Users
by Hanna Krasnova & Thomas Widjaja & Peter Buxmann & Helena Wenninger & Izak Benbasat - 606-618 Research Note—Migration of Service to the Internet: Evidence from a Federal Natural Experiment
by Kai-Lung Hui & I. P. L. Png - 619-633 Research Note—An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior
by Jingguo Wang & Nan Xiao & H. Raghav Rao
June 2015, Volume 26, Issue 2
- 243-265 Finding Similar Mobile Consumers with a Privacy-Friendly Geosocial Design
by Foster Provost & David Martens & Alan Murray - 266-281 Evolutionary Competition in Platform Ecosystems
by Amrit Tiwana - 282-300 The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness
by Jack Shih-Chieh Hsu & Sheng-Pao Shih & Yu Wen Hung & Paul Benjamin Lowry - 301-319 Cable News Wars on the Internet: Competition and User-Generated Content
by Gaurav Sabnis & Rajdeep Grewal - 320-338 Net Neutrality, Exclusivity Contracts, and Internet Fragmentation
by Frago Kourandi & Jan Krämer & Tommaso Valletti - 339-359 Learning User Real-Time Intent for Optimal Dynamic Web Page Transformation
by Amy Wenxuan Ding & Shibo Li & Patrali Chatterjee - 360-378 Analyzing Software as a Service with Per-Transaction Charges
by Dan Ma & Abraham Seidmann - 379-397 Social Capital and Contract Duration in Buyer-Supplier Networks for Information Technology Outsourcing
by Kiron Ravindran & Anjana Susarla & Deepa Mani & Vijay Gurbaxani - 398-417 How Does IT Ambidexterity Impact Organizational Agility?
by One-Ki (Daniel) Lee & Vallabh Sambamurthy & Kai H. Lim & Kwok Kee Wei - 418-436 The Road to Early Success: Impact of System Use in the Swift Response Phase
by Yu Tong & Sharon Swee-Lin Tan & Hock-Hai Teo - 437-455 Research Note—Deliberation Without Attention: The Latent Benefits of Distracting Website Features for Online Purchase Decisions
by Barney Tan & Cheng Yi & Hock C. Chan - 456-468 Research Note—Investigating Firm Strategies on Offering Consumer-Customizable Products
by Zheyin (Jane) Gu & Giri K. Tayi
March 2015, Volume 26, Issue 1
- 1-18 Health Information Exchange as a Multisided Platform: Adoption, Usage, and Practice Involvement in Service Co-Production
by Niam Yaraghi & Anna Ye Du & Raj Sharman & Ram D. Gopal & Ram Ramesh - 19-39 Predictive Analytics for Readmission of Patients with Congestive Heart Failure
by Indranil Bardhan & Jeong-ha (Cath) Oh & Zhiqiang (Eric) Zheng & Kirk Kirksey - 40-56 Information Infrastructure Development and Governance as Collective Action
by Panos Constantinides & Michael Barrett - 57-80 Paradoxes and the Nature of Ambidexterity in IT Transformation Programs
by Robert Wayne Gregory & Mark Keil & Jan Muntermann & Magnus Mähring - 81-99 Organizational Control, Incentive Contracts, and Knowledge Transfer in Offshore Business Process Outsourcing
by Ying Liu & Ravi Aron - 100-126 Market Positioning by IT Service Vendors Through Imitation
by Karen Ruckman & Nilesh Saraf & Vallabh Sambamurthy - 127-144 Early to Adopt and Early to Discontinue: The Impact of Self-Perceived and Actual IT Knowledge on Technology Use Behaviors of End Users
by Rohit Aggarwal & David Kryscynski & Vishal Midha & Harpreet Singh - 145-164 Turnover or Turnaway? Competing Risks Analysis of Male and Female IT Professionals’ Job Mobility and Relative Pay Gap
by Damien Joseph & Soon Ang & Sandra A. Slaughter - 165-187 The Emergence of Online Community Leadership
by Steven L. Johnson & Hani Safadi & Samer Faraj - 188-209 Web Footprints of Firms: Using Online Isomorphism for Competitor Identification
by Gautam Pant & Olivia R. L. Sheng - 210-223 Research Note —Role of Social Media in Social Change: An Analysis of Collective Sense Making During the 2011 Egypt Revolution
by Onook Oh & Chanyoung Eom & H. R. Rao - 224-237 Research Note —Perceived Firm Attributes and Intrinsic Motivation in Sponsored Open Source Software Projects
by Sebastian Spaeth & Georg von Krogh & Fang He
December 2014, Volume 25, Issue 4
- 669-689 The IQ of the Crowd: Understanding and Improving Information Quality in Structured User-Generated Content
by Roman Lukyanenko & Jeffrey Parsons & Yolanda F. Wiersma - 690-709 Feeling Blue? Go Online: An Empirical Study of Social Support Among Patients
by Lu Yan & Yong Tan - 710-729 Effects of ICT Service Innovation and Complementary Strategies on Brand Equity and Customer Loyalty in a Consumer Technology Market
by Xin Xu & James Y. L. Thong & Viswanath Venkatesh - 730-746 Optimal Management of Digital Content on Tiered Infrastructure Platforms
by Anna Ye Du & Sanjukta Das & Ram D. Gopal & Ram Ramesh - 747-760 Lateral Coordination Mechanisms and the Moderating Role of Arrangement Characteristics in Information Systems Development Outsourcing
by S. Balaji & Carol V. Brown - 761-778 Research Note—Partial Least Squares and Models with Formatively Specified Endogenous Constructs: A Cautionary Note
by Miguel I. Aguirre-Urreta & George M. Marakas - 780-784 Conflating Antecedents and Formative Indicators: A Comment on Aguirre-Urreta and Marakas
by Edward E. Rigdon & Jan-Michael Becker & Arun Rai & Christian M. Ringle & Adamantios Diamantopoulos & Elena Karahanna & Detmar W. Straub & Theo K. Dijkstra - 785-788 A Rejoinder to Rigdon et al. (2014)
by Miguel I. Aguirre-Urreta & George M. Marakas - 789-795 Special Section Introduction—Information, Technology, and the Changing Nature of Work
by Chris Forman & John Leslie King & Kalle Lyytinen - 796-816 Social Media, Knowledge Sharing, and Innovation: Toward a Theory of Communication Visibility
by Paul M. Leonardi - 817-833 Patient Data as Medical Facts: Social Media Practices as a Foundation for Medical Knowledge Creation
by Jannis Kallinikos & Niccolò Tempini - 834-845 Infrastructuring Work: Building a State-Wide Hospital Information Infrastructure in India
by Margunn Aanestad & Bob Jolliffe & Arunima Mukherjee & Sundeep Sahay - 846-864 Efficacy of R&D Work in Offshore Captive Centers: An Empirical Study of Task Characteristics, Coordination Mechanisms, and Performance
by Deepa Mani & Kannan Srikanth & Anandhi Bharadwaj - 865-886 Doing Business with Strangers: Reputation in Online Service Marketplaces
by Antonio Moreno & Christian Terwiesch
September 2014, Volume 25, Issue 3
- 443-448 Editorial —Big Data, Data Science, and Analytics: The Opportunity and Challenge for IS Research
by Ritu Agarwal & Vasant Dhar - 449-467 Research Commentary —Using Income Accounting as the Theoretical Basis for Measuring IT Productivity
by Dennis O. Kundisch & Neeraj Mittal & Barrie R. Nault - 468-488 Distinction and Status Production on User-Generated Content Platforms: Using Bourdieu’s Theory of Cultural Production to Understand Social Dynamics in Online Fields
by Natalia Levina & Manuel Arriaga - 489-510 Cloud Implications on Software Network Structure and Security Risks
by Terrence August & Marius Florin Niculescu & Hyoduk Shin - 511-527 Online Gambling Behavior: The Impacts of Cumulative Outcomes, Recent Outcomes, and Prior Use
by Xiao Ma & Seung Hyun Kim & Sung S. Kim - 528-546 The Central Role of Engagement in Online Communities
by Soumya Ray & Sung S. Kim & James G. Morris - 547-568 Latent Growth Modeling for Information Systems: Theoretical Extensions and Practical Applications
by Zhiqiang (Eric) Zheng & Paul A. Pavlou & Bin Gu - 569-589 The “Most Popular News” Recommender: Count Amplification and Manipulation Resistance
by Shankar Prawesh & Balaji Padmanabhan - 590-603 An Empirical Analysis of the Impact of Pre-Release Movie Piracy on Box Office Revenue
by Liye Ma & Alan L. Montgomery & Param Vir Singh & Michael D. Smith - 604-617 Research Note —The Allure of Homophily in Social Media: Evidence from Investor Responses on Virtual Communities
by Bin Gu & Prabhudev Konana & Rajagopal Raghunathan & Hsuanwei Michelle Chen - 618-638 Research Note —Industry-Specific Human Capital and Wages: Evidence from the Business Process Outsourcing Industry
by Keongtae Kim & Sunil Mithas & Jonathan Whitaker & Prasanto K. Roy - 639-653 Research Note —Heuristic Theorizing: Proactively Generating Design Theories
by Robert Wayne Gregory & Jan Muntermann - 654-662 Research Note —Discriminant Analysis with Strategically Manipulated Data
by Juheng Zhang & Haldun Aytug & Gary J. Koehler
June 2014, Volume 25, Issue 2
- 205-221 Research Commentary ---The Disciplines of Information: Lessons from the History of the Discipline of Medicine
by David G. Schwartz - 222-238 “Popularity Effect” in User-Generated Content: Evidence from Online Product Reviews
by Paulo B. Goes & Mingfeng Lin & Ching-man Au Yeung - 239-263 A Machine Learning Approach to Improving Dynamic Decision Making
by Georg Meyer & Gediminas Adomavicius & Paul E. Johnson & Mohamed Elidrisi & William A. Rush & JoAnn M. Sperl-Hillen & Patrick J. O'Connor - 264-284 Prediction in Economic Networks
by Vasant Dhar & Tomer Geva & Gal Oestreicher-Singer & Arun Sundararajan - 285-306 Selling vs. Profiling: Optimizing the Offer Set in Web-Based Personalization
by Monica Johar & Vijay Mookerjee & Sumit Sarkar - 307-327 Using Personal Communication Technologies for Commercial Communications: A Cross-Country Investigation of Email and SMS
by Chuan-Hoo Tan & Juliana Sutanto & Chee Wei Phang & Anar Gasimov - 328-344 Product Fit Uncertainty in Online Markets: Nature, Effects, and Antecedents
by Yili (Kevin) Hong & Paul A. Pavlou - 345-363 Consumer Informedness and Firm Information Strategy
by Ting Li & Robert J. Kauffman & Eric van Heck & Peter Vervest & Benedict G. C. Dellaert - 364-384 Project Managers' Practical Intelligence and Project Performance in Software Offshore Outsourcing: A Field Study
by Nishtha Langer & Sandra A. Slaughter & Tridas Mukhopadhyay - 385-400 Research Note ---Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance
by Ryan T. Wright & Matthew L. Jensen & Jason Bennett Thatcher & Michael Dinger & Kent Marett - 401-419 Research Note ---How Semantics and Pragmatics Interact in Understanding Conceptual Models
by Palash Bera & Andrew Burton-Jones & Yair Wand - 420-436 Research Note ---The Influences of Online Service Technologies and Task Complexity on Efficiency and Personalization
by Jingjun (David) Xu & Izak Benbasat & Ronald T. Cenfetelli
March 2014, Volume 25, Issue 1
- 1-14 Research Commentary ---Information Technology-Enabled Business Models: A Conceptual Framework and a Coevolution Perspective for Future Research
by Arun Rai & Xinlin Tang - 15-34 Evaluation of Competing Candidate Solutions in Electronic Networks of Practice
by Thomas O. Meservy & Matthew L. Jensen & Kelly J. Fadel - 35-52 How to Attract and Retain Readers in Enterprise Blogging?
by Param Vir Singh & Nachiketa Sahoo & Tridas Mukhopadhyay - 53-71 Measuring Information Technology Spillovers
by Prasanna Tambe & Lorin M. Hitt - 72-92 IT-Enabled Coordination for Ambidextrous Interorganizational Relationships
by Ghiyoung Im & Arun Rai - 93-110 Online Product Reviews: Implications for Retailers and Competing Manufacturers
by Young Kwark & Jianqing Chen & Srinivasan Raghunathan - 111-136 A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research
by Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong & Lewis C. Chasalow & Gurpreet Dhillon - 137-151 Joint Product Improvement by Client and Customer Support Center: The Role of Gain-Share Contracts in Coordination
by Shantanu Bhattacharya & Alok Gupta & Sameer Hasija - 152-172 Platform Performance Investment in the Presence of Network Externalities
by Edward G. Anderson & Geoffrey G. Parker & Burcu Tan - 173-199 Economics of Free Under Perpetual Licensing: Implications for the Software Industry
by Marius F. Niculescu & D. J. Wu
December 2013, Volume 24, Issue 4
- 883-905 Research Commentary ---Information in Digital, Economic, and Social Networks
by Arun Sundararajan & Foster Provost & Gal Oestreicher-Singer & Sinan Aral - 906-917 Research Commentary ---Too Big to Fail: Large Samples and the p -Value Problem
by Mingfeng Lin & Henry C. Lucas & Galit Shmueli - 918-932 Blunting Damocles' Sword: A Longitudinal Model of Healthcare IT Impact on Malpractice Insurance Premium and Quality of Patient Care
by Nirup M. Menon & Rajiv Kohli - 933-955 From Knowing It to “Getting It”: Envisioning Practices in Computer Games Development
by Joe Nandhakumar & Nikiforos S. Panourgias & Harry Scarbrough - 956-975 Do Recommender Systems Manipulate Consumer Preferences? A Study of Anchoring Effects
by Gediminas Adomavicius & Jesse C. Bockstedt & Shawn P. Curley & Jingjing Zhang - 976-997 Information Technology Competencies, Organizational Agility, and Firm Performance: Enabling and Facilitating Roles
by Anindita Chakravarty & Rajdeep Grewal & V. Sambamurthy - 998-1010 Product-Oriented Web Technologies and Product Returns: An Exploratory Study
by Prabuddha De & Yu (Jeffrey) Hu & Mohammad S. Rahman - 1011-1027 A Real Options Model for Generalized Meta-Staged Projects---Valuing the Migration to SOA
by Suvankar Ghosh & Xiaolin Li - 1028-1049 Outsourcing Contracts and Equity Prices
by Deepa Mani & Anitesh Barua & Andrew B. Whinston - 1050-1067 Information Valuation and Confirmation Bias in Virtual Communities: Evidence from Stock Message Boards
by JaeHong Park & Prabhudev Konana & Bin Gu & Alok Kumar & Rajagopal Raghunathan - 1068-1086 Licensing and Competition for Services in Open Source Software
by Terrence August & Hyoduk Shin & Tunay I. Tunca - 1087-1099 Research Note ---A Dynamic View of the Impact of Network Structure on Technology Adoption: The Case of OSS Development
by Gang Peng & Debabrata Dey - 1100-1111 Research Note ---The Value of Third-Party Assurance Seals in Online Retailing: An Empirical Investigation
by Koray Özpolat & Guodong (Gordon) Gao & Wolfgang Jank & Siva Viswanathan - 1112-1130 Research Note ---Continued Participation in Online Innovation Communities: Does Community Response Matter Equally for Everyone?
by Chen Zhang & Jungpil Hahn & Prabuddha De - 1131-1146 Research Note ---The Impact of Intellectual Property Rights Enforcement on Open Source Software Project Success
by Wen Wen & Chris Forman & Stuart J. H. Graham - 1147-1161 Research Note ---Business Value of Information Technology: Testing the Interaction Effect of IT and R&D on Tobin's Q
by Indranil Bardhan & Viswanathan Krishnan & Shu Lin
September 2013, Volume 24, Issue 3
- 499-519 An Empirical Examination of the Antecedents and Consequences of Contribution Patterns in Crowd-Funded Markets
by Gordon Burtch & Anindya Ghose & Sunil Wattal - 520-538 All Are Not Equal: An Examination of the Economic Returns to Different Forms of Participation in Open Source Software Communities
by Il-Horn Hann & Jeffrey A. Roberts & Sandra A. Slaughter - 539-560 Networks, Social Influence, and the Choice Among Competing Innovations: Insights from Open Source Software Licenses
by Param Vir Singh & Corey Phelps - 561-578 An Empirical Analysis of Technical Efficiency: The Role of IT Intensity and Competition
by Young Bong Chang & Vijay Gurbaxani - 579-595 Research Note —Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions
by Zhenhui (Jack) Jiang & Cheng Suang Heng & Ben C. F. Choi - 596-612 Promotional Marketing or Word-of-Mouth? Evidence from Online Restaurant Reviews
by Xianghua Lu & Sulin Ba & Lihua Huang & Yue Feng - 613-631 How Is the Mobile Internet Different? Search Costs and Local Activities
by Anindya Ghose & Avi Goldfarb & Sang Pil Han - 632-658 From Use to Effective Use: A Representation Theory Perspective
by Andrew Burton-Jones & Camille Grange - 659-682 Motivational Differences Across Post-Acceptance Information System Usage Behaviors: An Investigation in the Business Intelligence Systems Context
by Xixi Li & J. J. Po-An Hsieh & Arun Rai - 683-708 To Personalize or Not to Personalize Online Purchase Interactions: Implications of Self-Selection by Retailers
by Sriram Thirumalai & Kingshuk K. Sinha - 709-730 Moving from Access to Use of the Information Infrastructure: A Multilevel Sociotechnical Framework
by Pradeep Racherla & Munir Mandviwalla - 731-749 On Risk Management with Information Flows in Business Processes
by Xue Bai & Ramayya Krishnan & Rema Padman & Harry Jiannan Wang - 750-767 The Impact and Implications of On-Demand Services on Market Structure
by Pei-yu Chen & Shin-yi Wu - 768-786 Ascending Combinatorial Auctions with Allocation Constraints: On Game Theoretical and Computational Properties of Generic Pricing Rules
by Ioannis Petrakis & Georg Ziegler & Martin Bichler - 787-801 IT Implementation Contract Design: Analytical and Experimental Investigation of IT Value, Learning, and Contract Structure
by D. J. Wu & Min Ding & Lorin M. Hitt - 802-821 Status Locality on the Web: Implications for Building Focused Collections
by Gautam Pant & Padmini Srinivasan - 822-841 Interdependencies in IT Infrastructure Services: Analyzing Service Processes for Optimal Incentive Design
by Sagnika Sen & T. S. Raghu - 842-860 Research Note —A View from the Top: Integrated Information Delivery and Effective Information Use from the Senior Executive's Perspective
by William J. Kettinger & Chen Zhang & Kuo-Chung Chang - 861-876 Research Note —A Contingency Approach to Investigating the Effects of User-System Interaction Modes of Online Decision Aids
by Weiquan Wang & Izak Benbasat
June 2013, Volume 24, Issue 2
- 201-218 The Association Between the Disclosure and the Realization of Information Security Risk Factors
by Tawei Wang & Karthik N. Kannan & Jackie Rees Ulmer