


default search action
Information & Management, Volume 52
Volume 52, Number 1, January 2015
- Lucian L. Visinescu, Anna Sidorova

, Mary C. Jones, Victor R. Prybutok:
The influence of website dimensionality on customer experiences, perceptions and behavioral intentions: An exploration of 2D vs. 3D web design. 1-17 - Varol Onur Kayhan:

The nature, dimensionality, and effects of perceptions of community governance. 18-29 - Shih-Wei Chou

, Angsana A. Techatassanasoontorn, I. H. Hung:
Understanding commitment in business process outsourcing relationships. 30-43 - John Ingham, Jean Cadieux, Abdelouahab Mekki Berrada:

e-Shopping acceptance: A qualitative and meta-analytic review. 44-60 - Yonggang Pan

, Yunjie Calvin Xu, Xiaolun Wang
, Chenghong Zhang, Hong Ling, Jie Lin:
Integrating social networking support for dyadic knowledge exchange: A study in a virtual community of practice. 61-70 - Fang Wang, Xiao-Ping (Steven) Zhang:

The role of the Internet in changing industry competition. 71-81 - Shahla Ghobadi:

What drives knowledge sharing in software development teams: A literature review and classification framework. 82-97 - Hua (Jonathan) Ye

, Atreyi Kankanhalli:
Investigating the antecedents of organizational task crowdsourcing. 98-110 - John Qi Dong

, Chia-Han Yang:
Information technology and organizational learning in knowledge alliances and networks: Evidence from U.S. pharmaceutical industry. 111-122 - Derek L. Nazareth, Jae Choi:

A system dynamics model for information security management. 123-134
Volume 52, Number 2, March 2015
- Muhammad Mustafa Kamal, Alinaghi Ziaee Bigdeli

, Marinos Themistocleous, Vincenzo Morabito:
Investigating factors influencing local government decision makers while adopting integration technologies (IntTech). 135-150 - Wen Guang Qu

, Alain Pinsonneault, Daniel Tomiuk, Shaoqing Wang
, Yuan Liu:
The impacts of social trust on open and closed B2B e-commerce: A Europe-based study. 151-159 - Candy K. Y. Ho

, Weiling Ke, Hefu Liu
:
Choice decision of e-learning system: Implications from construal level theory. 160-169 - Jeremy Glassman, Marilyn Prosch, Benjamin B. M. Shao:

To monitor or not to monitor: Effectiveness of a cyberloafing countermeasure. 170-182 - Guy Paré, Marie-Claude Trudel, Mirou Jaana, Spyros Kitsiou

:
Synthesizing information systems knowledge: A typology of literature reviews. 183-199 - Miao Cui, Shan L. Pan

:
Developing focal capabilities for e-commerce adoption: A resource orchestration perspective. 200-209 - Ali Reza Montazemi, Hamed Qahri-Saremi

:
Factors affecting adoption of online banking: A meta-analytic structural equation modeling study. 210-226 - Indranil Bose, Xi Chen

:
Detecting the migration of mobile service customers using fuzzy clustering. 227-238 - Hock Chuan Chan, Varsha Guness, Hee-Woong Kim:

A method for identifying journals in a discipline: An application to information systems. 239-246 - Ali E. Akgün, Halit Keskin

, A. Yavuz Cebecioglu, Derya Dogan
:
Antecedents and consequences of collective empathy in software development project teams. 247-259
Volume 52, Number 3, 2015
- Kai Wang:

Determinants of mobile value-added service continuance: The mediating role of service experience. 261-274 - Bo Xu, Dahui Li

:
An empirical study of the motivations for content contribution and community participation in Wikipedia. 275-286 - Mark de Reuver

, Harry Bouwman
:
Dealing with self-report bias in mobile Internet acceptance and usage studies. 287-294 - Dongwon Lee

, Junghoon Moon, YongJin Kim, Mun Yong Yi:
Antecedents and consequences of mobile phone usability: Linking simplicity and interactivity to satisfaction, trust, and brand loyalty. 295-304 - Chuan Luo, Xin (Robert) Luo, Yun Xu, Merrill Warkentin

, Choon-Ling Sia
:
Examining the moderating role of sense of membership in online review evaluations. 305-316 - Srikanth Parameswaran

, Rajiv Kishore, Jessica Pu Li:
Within-study measurement invariance of the UTAUT instrument: An assessment with user technology engagement variables. 317-336 - Oliver Hinz, Michael Nofer, Dirk Schiereck, Julian Trillig:

The influence of data theft on the share prices and systematic risk of consumer electronics companies. 337-347 - Tingru Cui, Hua (Jonathan) Ye

, Hock-Hai Teo, Jizhen Li
:
Information technology and open innovation: A strategic alignment perspective. 348-358 - Enrique Mu, Laurie J. Kirsch, Brian S. Butler

:
The assimilation of enterprise information system: An interpretation systems perspective. 359-370 - Tung-Ching Lin, Jack Shih-Chieh Hsu, Hsiang-Lan Cheng, Chao-Min Chiu:

Exploring the relationship between receiving and offering online social support: A dual social support model. 371-383
Volume 52, Number 4, 2015
- Huseyin Cavusoglu

, Hasan Cavusoglu
, Jai-Yeol Son, Izak Benbasat:
Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources. 385-400 - Gary S. C. Pan, Shan-Ling Pan

, Chu-Yeong Lim:
Examining how firms leverage IT to achieve firm productivity: RBV and dynamic capabilities perspectives. 401-412 - Zach W. Y. Lee

, Christy M. K. Cheung
, Tommy K. H. Chan
:
Massively multiplayer online game addiction: Instrument development and validation. 413-430 - Le Chen

, Patrick S. W. Fong
:
Evaluation of knowledge management performance: An organic approach. 431-453 - Zhenbin Yang, Atreyi Kankanhalli, Boon-Yuen Ng, Justin Tuang Yong Lim:

Examining the pre-adoption stages of healthcare IT: A case study of vital signs monitoring systems. 454-467 - Hong Zhang, Yaobin Lu, Bin Wang

, Sibin Wu
:
The impacts of technological environments and co-creation experiences on customer participation. 468-482 - Henri Barki, Jacques Robert, Alina Dulipovici

:
Reconceptualizing trust: A non-linear Boolean model. 483-495 - Chul Woo Yoo, Yong Jin Kim, G. Lawrence Sanders:

The impact of interactivity of electronic word of mouth systems and E-Quality on decision support in the context of the e-marketplace. 496-505 - Zhiling Tu, Ofir Turel

, Yufei Yuan, Norman P. Archer:
Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination. 506-517 - Sherah Kurnia, Reyner Jovian Karnali, Md. Mahbubur Rahim:

A qualitative study of business-to-business electronic commerce adoption within the Indonesian grocery industry: A multi-theory perspective. 518-536
Volume 52, Number 5, 2015
- Jen-Ruei Fu, Jessica Hsiaofen Chen

:
Career commitment of information technology professionals: The investment model perspective. 537-549 - Jahyun Goo, C. Derrick Huang, Chulmo Koo

:
Learning for healthy outcomes: Exploration and exploitation with electronic medical records. 550-562 - Raluca Bunduchi

, Alison U. Smart, Kathryn Charles, Lorna McKee, Augusto Azuara-Blanco
:
When innovation fails: An institutional perspective of the (non)adoption of boundary spanning IT innovation. 563-576 - Yonggui Wang

, Shuang (Sara) Ma, Dahui Li
:
Customer participation in virtual brand communities: The self-construal perspective. 577-587 - Tong Che, Zeyu Peng, Kai Hin Lim

, Zhongsheng Hua
:
Antecedents of consumers' intention to revisit an online group-buying website: A transaction cost perspective. 588-598 - Mumin Abubakre

, M. N. Ravishankar
, Crispin R. Coombs
:
The role of formal controls in facilitating information system diffusion. 599-609
Volume 52, Number 6, September 2015
- Julia Kroenung, Andreas Eckhardt:

The attitude cube - A three-dimensional model of situational factors in IS adoption and their impact on the attitude-behavior relationship. 611-627 - Jie Wei, Paul Benjamin Lowry, Stefan Seedorf:

The assimilation of RFID technology by Chinese companies: A technology diffusion perspective. 628-642 - Yang Chen, Yi Wang

, Saggi Nevo, Jose Benitez-Amado, Gang Kou
:
IT capabilities and product innovation performance: The roles of corporate entrepreneurship and competitive intensity. 643-657 - Hanpeng Zhang, Xin (Robert) Luo, Qinyu Liao, Lifang Peng:

Does IT team climate matter? An empirical study of the impact of co-workers and the Confucian work ethic on deviance behavior. 658-667 - Anil Bilgihan, Khaldoon Nusair, Fevzi Okumus

, Cihan Cobanoglu
:
Applying flow theory to booking experiences: An integrated model in an online service context. 668-678 - Zhen Zhu

, Jing Zhao, Xinlin Tang, Yao Zhang:
Leveraging e-business process for business value: A layered structure perspective. 679-691 - Chul Woo Yoo, Srikanth Parameswaran

, Rajiv Kishore:
Knowing about your food from the farm to the table: Using information systems that reduce information asymmetry and health risks in retail contexts. 692-709 - Mary Tate

, Joerg Evermann, Guy Gable
:
An integrated framework for theories of individual attitudes toward technology. 710-727 - Baofeng Huo

, Cheng Zhang
, Xiande Zhao
:
The effect of IT and relationship commitment on supply chain coordination: A contingency and configuration approach. 728-740 - Caroline Lancelot Miltgen

, H. Jeff Smith:
Exploring information privacy regulation, risks, trust, and behavior. 741-759
Volume 52, Number 7, November 2015
- Weiguo Fan

, Xiangbin Yan:
Novel applications of social media analytics. 761-763 - Qian Liu, Mi Zhou, Xin Zhao

:
Understanding News 2.0: A framework for explaining the number of comments from readers on online news. 764-776 - Weihui Dai

, Dongmei Han, Yonghui Dai
, Dongrong Xu:
Emotion recognition and affective computing on vocal social media. 777-788 - Haoyuan Feng, Jin Tian, Harry Jiannan Wang, Minqiang Li:

Personalized recommendations based on time-weighted overlapping community detection. 789-800 - Wu He, Harris Wu, Gongjun Yan, Vasudeva Akula, Jiancheng Shen:

A novel social media competitive analytics framework with sentiment benchmarks. 801-812 - Ji Wu, Liqiang Huang, Jianliang Leon Zhao, Zhongsheng Hua

:
The deeper, the better? Effect of online brand community activity on customer purchase frequency. 813-823 - Marten Risius

, Roman Beck
:
Effectiveness of corporate social media activities in increasing relational outcomes. 824-839 - Jiahua Jin, Yijun Li, Xiaojia Zhong, Li Zhai:

Why users contribute knowledge to online communities: An empirical study of an online social Q&A community. 840-849 - Zhijun Yan, Meiming Xing, Dongsong Zhang, Baizhang Ma:

EXPRS: An extended pagerank method for product feature extraction from online consumer reviews. 850-858 - Jiayin Qi, Xiangling Fu

, Ge Zhu
:
Subjective well-being measurement based on Chinese grassroots blog text sentiment analysis. 859-869 - Naichen Li, Xunhua Guo

, Guoqing Chen, Nianlong Luo:
Reading behavior on intra-organizational blogging systems: A group-level analysis through the lens of social capital theory. 870-881 - Kai Li, Zhangxi Lin, Xiaowen Wang:

An empirical analysis of users' privacy disclosure behaviors on social network sites. 882-891
Volume 52, Number 8, December 2015
- Tabitha L. James, Merrill Warkentin

, Stéphane E. Collignon:
A dual privacy decision model for online social networks. 893-908 - Michael T. Lee, Kit Scott:

Leveraging IT resources, embeddedness, and dependence: A supplier's perspective on appropriating benefits with powerful buyers. 909-924 - Pei-Fang Hsu, HsiuJu Rebecca Yen, Jung-Ching Chung:

Assessing ERP post-implementation success at the individual level: Revisiting the role of service quality. 925-942 - Xinping Shi, Ziqi Liao:

Inter-firm dependence, inter-firm trust, and operational performance: The mediating effect of e-business integration. 943-950 - Hsin-Hsuan Meg Lee, Willemijn van Dolen

:
Creative participation: Collective sentiment in online co-creation communities. 951-964 - Maryam Ghasemaghaei, Khaled Hassanein

:
Online information quality and consumer satisfaction: The moderating roles of contextual factors - A meta-analysis. 965-981 - Lien-Fa Lin, Yung-Ming Li, Wen-Hsiang Wu:

A social endorsing mechanism for target advertisement diffusion. 982-997 - Sungjune Park

, Antonis C. Stylianou, Chandrasekar Subramaniam, Yuan Niu:
Information technology and interorganizational learning: An investigation of knowledge exploration and exploitation processes. 998-1011 - Hadrian Geri Djajadikerta

, Saiyidi Mat Roni
, Terri Trireksani
:
Dysfunctional information system behaviors are not all created the same: Challenges to the generalizability of security-based research. 1012-1024 - Caroline Cuny

, Marianela Fornerino, Agnès Helme-Guizon:
Can music improve e-behavioral intentions by enhancing consumers' immersion and experience? 1025-1034

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














