default search action
Journal of Computer Information Systems, Volume 60
Volume 60, Number 1, 2020
- Alex Koohang, Alojzy Nowak, Joanna Paliszkiewicz
, Jeretta Horn Nord
:
Information Security Policy Compliance: Leadership, Trust, Role Values, and Awareness. 1-8 - Tomasz Kijek
, Marek Angowski
, Adam Skrzypek
:
Millennials Use of Social Media in Product Innovation Purchasing Processes. 9-17 - Martin D. Hassell
, Moez Limayem:
Media Impacts and Performance in Dispersed Teams. 18-25 - Li Qin:
A Cross-Cultural Study of Interpersonal Trust in Social Commerce. 26-33 - George Mangalaraj, Anand Jeyaraj, Edmund L. Prater:
Differential effects on assimilation stages for supply chain management information systems. 34-48 - Alireza Moayedikia, William Yeoh
, Kok-Leong Ong, Yee Ling Boo
:
Framework and Literature Analysis for Crowdsourcing's Answer Aggregation. 49-60 - Ofir Turel
, Zhengchuan Xu, Ken H. Guo:
Organizational Citizenship Behavior Regarding Security: Leadership Approach Perspective. 61-75 - Sally Rao Hill
, Indrit Troshani, Dezri Chandrasekar:
Signalling Effects of Vlogger Popularity on Online Consumers. 76-84 - Melinda Korzaan, Amy H. Harris:
Understanding Predictors of Over-Optimism in IS Project Teams. 85-92 - Natalie Gerhart:
Generalizing stopping rule research: Development of scales. 93-100
Volume 60, Number 2, 2020
- Jeretta Horn Nord
, Susana de Juana Espinosa
, Joanna Paliszkiewicz
, Magdalena Madra-Sawicka
:
Do technology and social media preferences differ with age? A study of the use of social technologies for business purposes in Spain. 101-112 - Yuan Li
, Kuo-Chung Chang, Jingguo Wang
:
Self-Determination and Perceived Information Control in Cloud Storage Service. 113-123 - Quynh N. Nguyen
, Anna Sidorova
:
Organizational Identification and User Responses to Online Organization Criticism. 124-135 - Ester Gonzalez
, Sinjini Mitra
, Ofir Turel
:
Motivational Impacts on Intent to Use Health-Related Social Media. 136-145 - Zhaohao Sun
, Kenneth David Strang
, Francisca Pambel:
Privacy and security in the big data paradigm. 146-155 - Kyeongjin Park, Meuel Jeong, Kyungdoh Kim
:
Usability evaluation of menu interfaces for smartwatches. 156-165 - Ruidong Zhang:
The impacts of cloud computing architecture on cloud service performance. 166-174 - Guy Janssens, Linda van Moorst, Rob J. Kusters
, Harry Martin:
An expert-based taxonomy of ERP implementation activities. 175-183 - Trisha T. C. Lin
, John Robert Bautista
:
Content-related factors influence perceived value of location-based mobile advertising. 184-193 - Jeannie L. Pridmore
, Joy Godin
:
Investigation of virtual teams and serious games. 194-200
Volume 60, Number 3, 2020
- Sadaf Hina
, P. Dhanapal Durai Dominic:
Information security policies' compliance: a perspective for higher education institutions. 201-211
- Ilyoo Barry Hong
:
Predicting user-level marketing performance of location-based social networking sites. 212-222 - John D'Ambra, Concepción S. Wilson, Shahriar Akter
:
Continuance of E-Textbook Use by Tertiary Students: A Qualitative Approach. 223-232 - Richard W. C. Lui, Cheuk Hang (Allen) Au
:
I.S. educational game: Adoption in teaching search engine optimization (SEO). 233-243 - Vess Johnson
, Angelina I. T. Kiser, Leon A. Kappelman:
Women in IT Management: Significant Gains and Continuing Challenges. 244-255 - Assion Lawson-Body, Lori Willoughby, Laurence Lawson-Body, Eric Matofam Tamandja:
Students' acceptance of E-books: An application of UTAUT. 256-267 - Stoney L. Brooks, W. Jeff Clark, Carol Clark, Stanley E. Gambill:
The Information Systems name game revisited: Still muddled 20 years later. 268-273 - Xihui Zhang
, John D. Crabtree, Mark G. Terwilliger, Tyler T. Redman:
Assessing Students' Object-Oriented Programming Skills with Java: The "Department-Employee" Project. 274-286 - Catherine Chen, Haoqiang Jiang:
Important Skills for Data Scientists in China: Two Delphi Studies. 287-296
Volume 60, Number 4, 2020
- Aaron Zimba
, Zhaoshun Wang, Mwenge Mulenga, Nickson Herbert Odongo:
Crypto Mining Attacks in Information Systems: An Emerging Threat to Cyber Security. 297-308 - Malgorzata Karpinska-Krakowiak
, Artur Modlinski
:
Popularity of Branded Content in Social Media. 309-315 - Jingquan Li
:
A Service-Oriented Model for Personal Health Records. 316-325 - Catherine Prentice
, Xuequn Wang
, Xiaolin Lin:
An Organic Approach to Customer Engagement and Loyalty. 326-335 - Khawaja A. Saeed:
Mobile Services as a Means to Control: An Empirical Assessment. 336-346 - Xiaodie Pu, Zhengxu Wang, Felix Tung Sun Chan
:
Leveraging Open E-Logistic Standards to Achieve Ambidexterity in Supply Chain. 347-358 - Lakshman Mahadevan
, Jeffrey P. Kaleta
:
Free Wi-Fi: To Buy or Not to Buy. 359-369 - Daniel Adomako Asamoah
, Derek Doran, Shu Schiller:
Interdisciplinarity in Data Science Pedagogy: A Foundational Design. 370-377 - Anna Rohunen, Jouni Markkula, Marikka Heikkilä
, Markku Oivo:
Explaining Diversity and Conflicts in Privacy Behavior Models. 378-393
Volume 60, Number 5, 2020
- Maryam Ghasemaghaei:
Improving Organizational Performance Through the Use of Big Data. 395-408 - Xiaolin Li, Fujun Lai, Yang Yuan
, Dongqing Yao, Baojun Yang:
Understanding Adoption and Continuance of Online Direct Sales Channel. 409-417 - Peiqin Zhang, Yong Ge, Hsun-Ming Lee:
E-WOM's Impact on App Development. 418-427 - Sasa Baskarada, Vivian Nguyen, Andy Koronios:
Architecting Microservices: Practical Opportunities and Challenges. 428-436 - Xuequn Wang
, Tanya Jane McGill
, Jane E. Klobas
:
I Want It Anyway: Consumer Perceptions of Smart Home Devices. 437-447 - Wei-Hsi Hung, Chih-Lang Tseng, Chin-Fu Ho, Chung-Cheng Wu:
How Social Impact Affects Smartphone Brand Loyalty. 448-458 - Chin-Lung Hsu, Judy Chuan-Chuan Lin:
Examining Social Networking O2O Apps User Loyalty. 459-467 - Tao Hu, Kai-Yu Wang, Wen-Hai Chih, Xiu-Hua Yang:
Trade off Cybersecurity Concerns for Co-Created Value. 468-483 - Chuleeporn Changchit, Tim Klaus, Ravi Lonkani, Jomjai Sampet:
A Cultural Comparative Study of Mobile Banking Adoption Factors. 484-494
Volume 60, Number 6, 2020
- Efpraxia D. Zamani
, Ying He
, Matthew Phillips:
On the Security Risks of the Blockchain. 495-506 - Mobark Q. Aldossari
, Anna Sidorova:
Consumer Acceptance of Internet of Things (IoT): Smart Home Context. 507-517 - Melina Seedoyal Doargajudhur
, Peter Dell
:
The Effect of Bring Your Own Device (BYOD) Adoption on Work Performance and Motivation. 518-529 - Dong Kyoon Yoo
, Sunyoung Cho
:
Role of Habit and Value Perceptions on m-Learning Outcomes. 530-540 - Xiang Guo
, Brian J. Reithel:
Information-Processing Support Index: A New Perspective on IT Usage. 541-554 - Au Vo
, Christopher Yost-Bremm:
A High-Frequency Algorithmic Trading Strategy for Cryptocurrency. 555-568 - Jonathan Whitaker
, Mayuram S. Krishnan, Claes Fornell, Forrest V. Morgeson III
:
How Does Customer Service Offshoring Impact Customer Satisfaction? 569-582 - Trisha T. C. Lin
, Anastasia Kononova
, Yi-Hsuan Chiang:
Screen Addiction and Media Multitasking among American and Taiwanese Users. 583-592 - Nik Thompson
, Xuequn Wang
, Pratiq Daya:
Determinants of News Sharing Behavior on Social Media. 593-601
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.