


default search action
Information Systems Research, Volume 30
Volume 30, Number 1, March 2019
- Liangfei Qiu

, Huaxia Rui, Andrew B. Whinston:
Optimal Auction Design for Wi-Fi Procurement. 1-14 - Shunyuan Zhang, Param Vir Singh

, Anindya Ghose:
A Structural Analysis of the Role of Superstars in Crowdsourcing Contests. 15-33 - Lin Hao, Yong Tan

:
Who Wants Consumers to Be Informed? Facilitating Information Disclosure in a Distribution Channel. 34-49 - Nicholas Berente

, Stefan Seidel
, Hani Safadi
:
Research Commentary - Data-Driven Computationally Intensive Theory Development. 50-64 - Jiao Xu, Chris Forman

, Yu (Jeffrey) Hu
:
Battle of the Internet Channels: How Do Mobile and Fixed-Line Quality Drive Internet Use? 65-80 - Wei Chen

, Bin Gu, Qiang Ye, Kevin Xiaoguo Zhu:
Measuring and Managing the Externality of Managerial Responses to Online Customer Reviews. 81-96 - Mehmet Eren Ahsen, Mehmet U. S. Ayvaci

, Srinivasan Raghunathan
:
When Algorithmic Predictions Use Human-Generated Data: A Bias-Aware Classification Algorithm for Breast Cancer Diagnosis. 97-116 - Prasanta Bhattacharya, Tuan Quang Phan

, Xue Bai
, Edoardo M. Airoldi:
A Coevolution Model of Network Structure and User Behavior: The Case of Content Generation in Online Social Networks. 117-132 - Reza Mousavi

, Bin Gu
:
The Impact of Twitter Adoption on Lawmakers' Voting Orientations. 133-153 - Anindya Ghose

, Hyeokkoo Eric Kwon
, Dongwon Lee
, Wonseok Oh
:
Seizing the Commuting Moment: Contextual Targeting Based on Mobile Transportation Apps. 154-174 - Youngsoo Kim

, Ramayya Krishnan
:
The Dynamics of Online Consumers' Response to Price Promotion. 175-190 - Tingting Song

, Jinghua Huang
, Yong Tan
, Yifan Yu
:
Using User- and Marketer-Generated Content for Box Office Revenue Prediction: Differences Between Microblogging and Third-Party Platforms. 191-203 - Zachary R. Steelman

, Taha Havakhor
, Rajiv Sabherwal
, Sanjiv Sabherwal
:
Performance Consequences of Information Technology Investments: Implications of Emphasizing New or Current Information Technologies. 204-218 - Jason Chan

, Probal Mojumder
, Anindya Ghose
:
The Digital Sin City: An Empirical Study of Craigslist's Impact on Prostitution Trends. 219-238 - Dokyun Lee

, Kartik Hosanagar:
How Do Recommender Systems Affect Sales Diversity? A Cross-Category Investigation via Randomized Field Experiment. 239-259 - Zhijie Lin

, Ying Zhang, Yong Tan
:
An Empirical Study of Free Product Sampling and Rating Bias. 260-275 - Keongtae Kim

, Il-Horn Hann:
Crowdfunding and the Democratization of Access to Capital - An Illusion? Evidence from Housing Prices. 276-290 - Taha Havakhor

, Rajiv Sabherwal
, Zachary R. Steelman
, Sanjiv Sabherwal
:
Relationships Between Information Technology and Other Investments: A Contingent Interaction Model. 291-305 - Yu-Kai Lin

, Mingfeng Lin
, Hsinchun Chen:
Do Electronic Health Records Affect Quality of Care? Evidence from the HITECH Act. 306-318 - Anuj Kumar

, Amit Mehra
, Subodha Kumar
:
Why Do Stores Drive Online Sales? Evidence of Underlying Mechanisms from a Multichannel Retailer. 319-338
Volume 30, Number 2, June 2019
- Mingwen Yang

, Zhiqiang (Eric) Zheng, Vijay S. Mookerjee
:
Prescribing Response Strategies to Manage Customer Opinions: A Stochastic Differential Equation Approach. 351-374 - Joseph R. Buckman

, Jesse C. Bockstedt
, Matthew J. Hashim
:
Relative Privacy Valuations Under Varying Disclosure Characteristics. 375-388 - Elina H. Hwang

, Param Vir Singh
, Linda Argote:
Jack of All, Master of Some: Information Network and Innovation in Crowdsourcing Communities. 389-410 - Kai Lung Hui

, Ping Fan Ke
, Yuxi Yao, Wei T. Yue
:
Bilateral Liability-Based Contracts in Information Security Outsourcing. 411-429 - Hong Guo

, Lin Hao, Tridas Mukhopadhyay
, Daewon Sun:
Selling Virtual Currency in Digital Games: Implications for Gameplay and Social Welfare. 430-446 - Rob Gleasure

, Kieran Conboy, Lorraine Morgan:
Talking Up a Storm: How Backers Use Public Discourse to Exert Control in Crowdfunded Systems Development Projects. 447-465 - Lina Bouayad

, Balaji Padmanabhan
, Kaushal Chari:
Audit Policies Under the Sentinel Effect: Deterrence-Driven Algorithms. 466-485 - Tat Koon Koh

:
Adopting Seekers' Solution Exemplars in Crowdsourcing Ideation Contests: Antecedents and Consequences. 486-506 - Weiquan Wang

, May D. Wang
:
Effects of Sponsorship Disclosure on Perceived Integrity of Biased Recommendation Agents: Psychological Contract Violation and Knowledge-Based Trust Perspectives. 507-522 - Tianshu Sun

, Lanfei Shi
, Siva Viswanathan
, Elena Zheleva:
Motivating Effective Mobile App Adoptions: Evidence from a Large-Scale Randomized Field Experiment. 523-539 - Yang Pan

, Peng Huang
, Anandasivam Gopal
:
Storm Clouds on the Horizon? New Entry Threats and R&D Investments in the U.S. IT Industry. 540-562 - Brad N. Greenwood

, Kartik K. Ganju
, Corey M. Angst
:
How Does the Implementation of Enterprise Information Systems Affect a Professional's Mobility? An Empirical Study. 563-594 - Mochen Yang

, Gediminas Adomavicius
, Alok Gupta
:
Efficient Computational Strategies for Dynamic Inventory Liquidation. 595-615 - Lizhen Xu

, Jason A. Duan
, Yu (Jeffrey) Hu
, Yuan Cheng, Yan Zhu:
Forward-Looking Behavior in Mobile Data Consumption and Targeted Promotion Design: A Dynamic Structural Model. 616-635 - Martin Eisend

:
Explaining Digital Piracy: A Meta-Analysis. 636-664 - Paul M. Leonardi

, Diane E. Bailey, Casey S. Pierce
:
The Coevolution of Objects and Boundaries over Time: Materiality, Affordances, and Boundary Salience. 665-686 - Mari Karjalainen

, Suprateek Sarker, Mikko T. Siponen
:
Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective. 687-704
Volume 30, Number 3, September 2019
- Cheng Yi, Zhenhui (Jack) Jiang

, Xiuping Li, Xianghua Lu
:
Leveraging User-Generated Content for Product Promotion: The Effects of Firm-Highlighted Reviews. 711-725 - T. Ravichandran

, Simona Ileana Giura:
Knowledge Transfers in Alliances: Exploring the Facilitating Role of Information Technology. 726-744 - Barrie R. Nault

, Steffen Zimmermann
:
Balancing Openness and Prioritization in a Two-Tier Internet. 745-763 - Poonacha K. Medappa

, Shirish C. Srivastava
:
Does Superposition Influence the Success of FLOSS Projects? An Examination of Open-Source Software Development by Organizations and Individuals. 764-786 - Yingjie Zhang

, Beibei Li
, Xueming Luo
, Xiaoyi Wang
:
Personalized Mobile Targeting with User Engagement Stages: Combining a Structural Hidden Markov Model and Field Experiment. 787-804 - Ni Huang

, Tianshu Sun
, Pei-Yu Chen
, Joseph M. Golden:
Word-of-Mouth System Implementation and Customer Conversion: A Randomized Field Experiment. 805-818 - Anuj Kumar

, Kartik Hosanagar
:
Measuring the Value of Recommendation Links on Product Demand. 819-838 - Mochen Yang

, Yuqing Ren
, Gediminas Adomavicius
:
Understanding User-Generated Content and Customer Engagement on Facebook Business Pages. 839-855 - Jeffrey D. Shulman

, Xianjun Geng
:
Does It Pay to Shroud In-App Purchase Prices? 856-871 - Sandeep Khurana, Liangfei Qiu

, Subodha Kumar
:
When a Doctor Knows, It Shows: An Empirical Analysis of Doctors' Responses in a Q&A Forum of an Online Healthcare Portal. 872-891 - Jonathan Whitaker

, Sunil Mithas
, CheWei Liu:
Beauty Is in the Eye of the Beholder: Toward a Contextual Understanding of Compensation of Information Technology Professionals Within and Across Geographies. 892-911 - Tingting Song

, Qian Tang
, Jinghua Huang
:
Triadic Closure, Homophily, and Reciprocation: An Empirical Investigation of Social Ties Between Content Providers. 912-926 - Yan Huang

, Stefanus Jasin
, Puneet Manchanda
:
"Level Up": Leveraging Skill and Engagement to Maximize Player Game-Play in Online Video Games. 927-947 - Chih-Hung Peng

, Nicholas H. Lurie
, Sandra A. Slaughter:
Using Technology to Persuade: Visual Representation Technologies and Consensus Seeking in Virtual Teams. 948-962 - Yunhui Huang

, Kai H. Lim
, Zhijie Lin
, Shunping Han:
Large Online Product Catalog Space Indicates High Store Price: Understanding Customers' Overgeneralization and Illogical Inference. 963-979 - Dominik Gutt, Philipp Herrmann, Mohammad Saifur Rahman

:
Crowd-Driven Competitive Intelligence: Understanding the Relationship Between Local Market Competition and Online Rating Distributions. 980-994 - Robert E. Crossler

, France Bélanger
:
Why Would I Use Location-Protective Settings on My Smartphone? Motivating Protective Behaviors and the Existence of the Privacy Knowledge-Belief Gap. 995-1006 - Ahmed Abbasi

, Jingjing Li, Donald A. Adjeroh, Marie Abate, Wanhong Zheng
:
Don't Mention It? Analyzing User-Generated Content Signals for Early Adverse Event Warnings. 1007-1028 - Amrit Tiwana

, Stephen K. Kim
:
From Bricks to an Edifice: Cultivating Strong Inference in Information Systems Research. 1029-1036 - Dawoon Jung, Byung Cho Kim

, Myungsub Park, Detmar W. Straub:
Innovation and Policy Support for Two-Sided Market Platforms: Can Government Policy Makers and Executives Optimize Both Societal Value and Profits? 1037-1050 - Jong Seok Lee

, Mark Keil
, Eliezer Shalev:
Seeing the Trees or the Forest? The Effect of IT Project Managers' Mental Construal on IT Project Risk Management Activities. 1051-1072 - Sunghun Chung

, Animesh Animesh
, Kunsoo Han
, Alain Pinsonneault
:
Software Patents and Firm Value: A Real Options Perspective on the Role of Innovation Orientation and Environmental Uncertainty. 1073-1097
Volume 30, Number 4, December 2019
- Juan Feng

, Xin Li
, Xiaoquan (Michael) Zhang
:
Online Product Reviews-Triggered Dynamic Pricing: Theory and Evidence. 1107-1123 - Dawei (David) Zhang

, Barrie R. Nault
, Xueqi (David) Wei:
The Strategic Value of Information Technology in Setting Productive Capacity. 1124-1144 - Thomas Kude

, Sunil Mithas
, Christoph Tobias Schmidt, Armin Heinzl
:
How Pair Programming Influences Team Performance: The Role of Backup Behavior, Shared Mental Models, and Task Novelty. 1145-1163 - Angela Aerry Choi

, Daegon Cho
, Dobin Yim
, Jae Yun Moon, Wonseok Oh
:
When Seeing Helps Believing: The Interactive Effects of Previews and Reviews on E-Book Purchases. 1164-1183 - Seung Hyun Kim

, Juhee Kwon
:
How Do EHRs and a Meaningful Use Initiative Affect Breaches of Patient Information? 1184-1202 - Xueming Luo

, Xianghua Lu
, Jing Li
:
When and How to Leverage E-commerce Cart Targeting: The Relative and Moderated Effects of Scarcity and Price Incentives with a Two-Stage Field Experiment and Causal Forest Optimization. 1203-1227 - A. J. Burns

, Tom L. Roberts
, Clay Posey, Paul Benjamin Lowry
:
The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking. 1228-1247 - Xue (Jane) Tan

, Youwei Wang
, Yong Tan
:
Impact of Live Chat on Purchase in Electronic Markets: The Moderating Role of Information Cues. 1248-1271 - Che-Wei Liu

, Guodong Gordon Gao
, Ritu Agarwal
:
Unraveling the "Social" in Social Norms: The Conditioning Effect of User Connectivity. 1272-1295 - Chen Liang

, Zhan (Michael) Shi
, T. S. Raghu
:
The Spillover of Spotlight: Platform Recommendation in the Mobile App Market. 1296-1318 - Daniel Fürstenau

, Abayomi Baiyere
, Natalia Kliewer
:
A Dynamic Model of Embeddedness in Digital Infrastructures. 1319-1342 - Jinyang Zheng

, Zhengling Qi
, Yifan Dou
, Yong Tan
:
How Mega Is the Mega? Exploring the Spillover Effects of WeChat Using Graphical Model. 1343-1362 - Jorge Mejia

, Shawn Mankad
, Anandasivam Gopal
:
A for Effort? Using the Crowd to Identify Moral Hazard in New York City Restaurant Hygiene Inspections. 1363-1386 - Martin Wiener

, Magnus Mähring
, Ulrich Remus
, Carol Saunders, W. Alec Cram:
Moving IS Project Control Research into the Digital Era: The "Why" of Control and the Concept of Control Purpose. 1387-1401 - Yuliang Yao

, Martin E. Dresner, Kevin Xiaoguo Zhu:
"Monday Effect" on Performance Variations in Supply Chain Fulfillment: How Information Technology-Enabled Procurement May Help. 1402-1423 - Zhiling Guo

, Jin Li
, Ram Ramesh
:
Optimal Management of Virtual Infrastructures Under Flexible Cloud Service Agreements. 1424-1446

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














