default search action
Journal of Computer Information Systems, Volume 57
Volume 57, Number 1, 2017
- June Lu, Chang Liu, June Wei:
How Important Are Enjoyment and Mobility for Mobile Applications? 1-12 - Bostjan Delak, Olegas Vasilecas, Marko Bajec:
Novelties Within the Framework for Information System Due Diligence. 13-21 - Hongyi Sun, Pei-Lee Teh
, Karis Ho, Binshan Lin
:
Team Diversity, Learning, and Innovation: A Mediation Model. 22-30 - Seonjin Shin, Joon Koh:
Analysis of Mobile Broadband Service Penetration in South Korea. 31-38 - Ben Martz, Jim Hughes, Frank Braun:
Creativity and Problem-Solving: Closing The Skills Gap. 39-48 - Xuequn Wang
, Yibai Li:
How Trust and Need Satisfaction Motivate Producing User-Generated Content. 49-57 - Lucian L. Visinescu, Mary C. Jones, Anna Sidorova
:
Improving Decision Quality: The Role of Business Intelligence. 58-66 - Kenneth David Strang
, Zhaohao Sun
:
Analyzing Relationships in Terrorism Big Data Using Hadoop and Statistics. 67-75 - Shasha Teng, Kok Wei Khong
, Alain Yee-Loong Chong, Binshan Lin
:
Persuasive Electronic Word-of-Mouth Messages in Social Media. 76-88 - Neelima Bhatnagar, Harold Madden, Yair Levy
:
Initial Empirical Testing of Potential Factors Contributing to Patient Use of Secure Medical Teleconferencing. 89-95
Volume 57, Number 2, 2017
- Nancy Tobler, Janet Colvin, Neil W. Rawlins:
Longitudinal Analysis and Coping Model of User Adaptation. 97-105 - Vered Silber-Varod
, Amir Winer
, Nitza Geri
:
Opening the Knowledge Dam: Speech Recognition for Video Search. 106-111 - Jonathan Whitaker, Peter Ekman
, Steve Thompson:
How Multinational Corporations Use Information Technology to Manage Global Operations. 112-122 - Girish H. Subramanian, Parag C. Pendharkar, Dinesh R. Pai:
An Examination of Determinants of Software Testing and Project Management Effort. 123-129 - Hongyi Sun, Waileung Ha, Pei-Lee Teh
, Jianglin Huang
:
A Case Study on Implementing Modularity in Software Development. 130-138 - Koteswara Ivaturi, Cecil Chua
, Lech J. Janczewski
:
Impact of Information Seeking and Warning Frames on Online Deception: A Quasi-Experiment. 139-147 - Sonya Zhang, Neal Cabage:
Search Engine Optimization: Comparison of Link Building and Social Sharing. 148-159 - Yibai Li, Xuequn Wang
:
Online Social Networking Sites Continuance Intention: A Model Comparison Approach. 160-168 - Zhaohao Sun
, Kenneth D. Strang
, Sally Firmin:
Business Analytics-Based Enterprise Information Systems. 169-178 - E. Mitchell Church, Lakshmi S. Iyer:
"When Is Short, Sweet?" Selection Uncertainty and Online Review Presentations. 179-189
Volume 57, Number 3, 2017
- Jie Zhang
, Han Li, Ruiliang Yan, Chuck Johnston:
Examining the Signaling Effect of E-tailers' Return Policies. 191-200 - Matt Wimble, Harminder Singh, Brandis Phillips:
A Multilevel Model of Information Technology Value. 201-207 - Adarsh Kumar Kakar:
Assessing Self-Organization in Agile Software Development Teams. 208-217 - Oscar Avila, Kelly Garcés:
Change Management Support to Preserve Business-Information Technology Alignment. 218-228 - Natalie Gerhart, Anna Sidorova
:
The Effect of Network Characteristics on Online Identity Management Practices. 229-237 - Shasha Teng, Kok Wei Khong
, Alain Yee-Loong Chong, Binshan Lin:
Examining the Impacts of Electronic Word-of-Mouth Message on Consumers' Attitude. 238-251 - Ronald Dattero, Stuart D. Galup, Alan Kan, Jing Quan:
It Pays to Be Agile. 252-257 - Jordan Shropshire, Art Gowan:
Identifying Traits and Values of Top-Performing Information Security Personnel. 258-268 - Kenneth W. Green Jr., Pamela J. Zelbst, Victor E. Sower, Jeremy C. Bellah:
Impact of Radio Frequency Identification Technology on Environmental Sustainability. 269-277 - Jeretta Horn Nord, Maria Teresa Riggio, Joanna Paliszkiewicz
:
Social and Economic Development through Information and Communications Technologies: Italy. 278-285
Volume 57, Number 4, 2017
- Xiaogang Chen, Shaorui Li:
Understanding Continuance Intention of Mobile Payment Services: An Empirical Study. 287-298 - Robert J. Mills, Tanya Beaulieu
, Jeffrey J. Johnson:
Examining Micro-Level (SQL) Curriculum-Oriented and Promotional IS Enrollment Strategies. 299-308 - James Lee
, Merrill Warkentin
, Robert E. Crossler
, Robert F. Otondo
:
Implications of Monitoring Mechanisms on Bring Your Own Device Adoption. 309-318 - Assion Lawson-Body, Lori Willoughby, Laurence Lawson-Body, Kinvi Logossah:
Developing and Validating a Cultural User Satisfaction Instrument in Developing Countries. 319-329 - Gaurav Bansal
:
Distinguishing between Privacy and Security Concerns: An Empirical Examination and Scale Validation. 330-343 - Matthew Etco, Sylvain Sénécal, Pierre-Majorique Léger, Marc Fredette:
The Influence of Online Search Behavior on Consumers' Decision-Making Heuristics. 344-352 - Garry L. White, Tahir Ekin
, Lucian L. Visinescu:
Analysis of Protective Behavior and Security Incidents for Home Computers. 353-363 - Matthew J. Liberatore, Bruce Pollack-Johnson, Suzanne Heller Clain:
Analytics Capabilities and the Decision to Invest in Analytics. 364-373 - Karen C. Kao
, Sally Rao Hill
, Indrit Troshani:
Online Consumers' Responses to Deal Popularity as an Extrinsic Cue. 374-384 - Alex Koohang, Melanie Hatch:
Leadership Effectiveness in IT-Centered Organizations: Gender and Levels of Management. 385-391
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.