default search action
Information Systems Research, Volume 26
Volume 26, Number 1, March 2015
- Niam Yaraghi, Anna Ye Du, Raj Sharman, Ram D. Gopal, Ram Ramesh:
Health Information Exchange as a Multisided Platform: Adoption, Usage, and Practice Involvement in Service Co-Production. 1-18 - Indranil R. Bardhan, Jeong-ha (Cath) Oh, Zhiqiang (Eric) Zheng, Kirk Kirksey:
Predictive Analytics for Readmission of Patients with Congestive Heart Failure. 19-39 - Panos Constantinides, Michael I. Barrett:
Information Infrastructure Development and Governance as Collective Action. 40-56 - Robert Wayne Gregory, Mark Keil, Jan Muntermann, Magnus Mähring:
Paradoxes and the Nature of Ambidexterity in IT Transformation Programs. 57-80 - Ying Liu, Ravi Aron:
Organizational Control, Incentive Contracts, and Knowledge Transfer in Offshore Business Process Outsourcing. 81-99 - Karen Ruckman, Nilesh Saraf, Vallabh Sambamurthy:
Market Positioning by IT Service Vendors Through Imitation. 100-126 - Rohit Aggarwal, David Kryscynski, Vishal Midha, Harpreet Singh:
Early to Adopt and Early to Discontinue: The Impact of Self-Perceived and Actual IT Knowledge on Technology Use Behaviors of End Users. 127-144 - Damien Joseph, Soon Ang, Sandra Slaughter:
Turnover or Turnaway? Competing Risks Analysis of Male and Female IT Professionals' Job Mobility and Relative Pay Gap. 145-164 - Steven L. Johnson, Hani Safadi, Samer Faraj:
The Emergence of Online Community Leadership. 165-187 - Gautam Pant, Olivia R. Liu Sheng:
Web Footprints of Firms: Using Online Isomorphism for Competitor Identification. 188-209 - Onook Oh, Chanyoung Eom, H. Raghav Rao:
Research Note - Role of Social Media in Social Change: An Analysis of Collective Sense Making During the 2011 Egypt Revolution. 210-223 - Sebastian Spaeth, Georg von Krogh, Fang He:
Research Note - Perceived Firm Attributes and Intrinsic Motivation in Sponsored Open Source Software Projects. 224-237
Volume 26, Number 2, June 2015
- Foster J. Provost, David Martens, Alan Murray:
Finding Similar Mobile Consumers with a Privacy-Friendly Geosocial Design. 243-265 - Amrit Tiwana:
Evolutionary Competition in Platform Ecosystems. 266-281 - Jack Shih-Chieh Hsu, Sheng-Pao Shih, Yu Wen Hung, Paul Benjamin Lowry:
The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness. 282-300 - Gaurav Sabnis, Rajdeep Grewal:
Cable News Wars on the Internet: Competition and User-Generated Content. 301-319 - Frago Kourandi, Jan Krämer, Tommaso M. Valletti:
Net Neutrality, Exclusivity Contracts, and Internet Fragmentation. 320-338 - Amy Wenxuan Ding, Shibo Li, Patrali Chatterjee:
Learning User Real-Time Intent for Optimal Dynamic Web Page Transformation. 339-359 - Dan Ma, Abraham Seidmann:
Analyzing Software as a Service with Per-Transaction Charges. 360-378 - Kiron Ravindran, Anjana Susarla, Deepa Mani, Vijay Gurbaxani:
Social Capital and Contract Duration in Buyer-Supplier Networks for Information Technology Outsourcing. 379-397 - One-Ki (Daniel) Lee, Vallabh Sambamurthy, Kai H. Lim, Kwok Kee Wei:
How Does IT Ambidexterity Impact Organizational Agility? 398-417 - Yu Tong, Sharon Swee-Lin Tan, Hock-Hai Teo:
The Road to Early Success: Impact of System Use in the Swift Response Phase. 418-436 - Barney Tan, Cheng Yi, Hock Chuan Chan:
Research Note - Deliberation Without Attention: The Latent Benefits of Distracting Website Features for Online Purchase Decisions. 437-455 - Zheyin (Jane) Gu, Giri Kumar Tayi:
Research Note - Investigating Firm Strategies on Offering Consumer-Customizable Products. 456-468
Volume 26, Number 3, September 2015
- Ritu Agarwal, Amrit Tiwana:
Editorial - Evolvable Systems: Through the Looking Glass of IS. 473-479
- Dawei (David) Zhang, Zhuo (June) Cheng, Hasan A. Qurban H. Mohammad, Barrie R. Nault:
Research Commentary - Information Technology Substitution Revisited. 480-495 - Lu Lucy Yan, Jianping Peng, Yong Tan:
Network Dynamics: How Can We Find Patients Like Us? 496-512 - Hailiang Chen, Prabuddha De, Yu (Jeffrey) Hu:
IT-Enabled Broadcasting in Social Media: An Empirical Study of Artists' Activities and Music Sales. 513-531 - Abhijeet Ghoshal, Syam Menon, Sumit Sarkar:
Recommendations Using Information from Multiple Association Rules: A Probabilistic Approach. 532-551 - Zheng Fang, Bin Gu, Xueming Luo, Yunjie Xu:
Contemporaneous and Delayed Sales Impact of Location-Based Mobile Promotions. 552-564 - Sabyasachi Mitra, Sam Ransbotham:
Information Disclosure and the Diffusion of Information Security Attacks. 565-584
- Hanna Krasnova, Thomas Widjaja, Peter Buxmann, Helena Wenninger, Izak Benbasat:
Research Note - Why Following Friends Can Hurt You: An Exploratory Investigation of the Effects of Envy on Social Networking Sites among College-Age Users. 585-605 - Kai Lung Hui, Ivan P. L. Png:
Research Note - Migration of Service to the Internet: Evidence from a Federal Natural Experiment. 606-618 - Jingguo Wang, Nan Xiao, H. Raghav Rao:
Research Note - An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior. 619-633
Volume 26, Number 4, December 2015
- Ritu Agarwal:
Editorial Notes. 637-638
- Tamara Dinev, Allen R. McConnell, H. Jeff Smith:
Research Commentary - Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the "APCO" Box. 639-655
- Amrit Tiwana, Stephen K. Kim:
Discriminating IT Governance. 656-674 - Ben C. F. Choi, Zhenhui Jack Jiang, Bo Xiao, Sung S. Kim:
Embarrassing Exposures in Online Social Networks: An Integrated Perspective of Privacy Invasion and Relationship Bonding. 675-694 - Ashish Agarwal, Kartik Hosanagar, Michael D. Smith:
Do Organic Results Help or Hurt Sponsored Search Performance? 695-713 - Yabing Jiang, Hong Guo:
Design of Consumer Review Systems and Product Pricing. 714-730 - Shivendu Shivendu, Zhe (James) Zhang:
Versioning in the Software Industry: Heterogeneous Disutility from Underprovisioning of Functionality. 731-753 - Min Chen, Varghese S. Jacob, Suresh Radhakrishnan, Young U. Ryu:
Can Payment-per-Click Induce Improvements in Click Fraud Identification Technologies? 754-772 - Chee Wei Phang, Atreyi Kankanhalli, Bernard C. Y. Tan:
What Motivates Contributors vs. Lurkers? An Investigation of Online Feedback Forums. 773-792 - Bo Xiao, Izak Benbasat:
Designing Warning Messages for Detecting Biased Online Product Recommendations: An Empirical Investigation. 793-811
- Brad N. Greenwood, Anandasivam Gopal:
Research Note - Tigerblood: Newspapers, Blogs, and the Founding of Information Technology Firms. 812-828 - Kui Du:
Research Note - Parenting New Acquisitions: Acquirers' Digital Resource Redeployment and Targets' Performance Improvement in the U.S. Hospital Industry. 829-844 - Vidyanand Choudhary, Zhe (James) Zhang:
Research Note - Patching the Cloud: The Impact of SaaS on Patching Strategy and the Timing of Software Release. 845-858 - Oliver Hinz, Martin Spann, Il-Horn Hann:
Research Note - Can't Buy Me Love...Or Can I? Social Capital Attainment Through Conspicuous Consumption in Virtual Environments. 859-870
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.