


default search action
Journal of the Association for Information Systems, Volume 21
Volume 21, Number 1, 2020
Editorials
- Dubravka Cecez-Kecmanovic, Robert M. Davison, Walter Fernandez, Patrick Finnegan, Shan L. Pan, Suprateek Sarker:
Advancing Qualitative IS Research Methodologies: Expanding Horizons and Seeking New Paths. 1 - Dorothy E. Leidner:
What's in a Contribution? 2
- Stefan Tams, Alina Dulipovici, Jason Bennett Thatcher, Kevin Craig, Mark Srite:
The Role of Basic Human Values in Knowledge Sharing: How Values Shape the Postadoptive Use of Electronic Knowledge Repositories. 3 - Chuang Wang, Matthew K. O. Lee:
Why We Cannot Resist Our Smartphones: Investigating Compulsive Use of Mobile SNS from a Stimulus-Response-Reinforcement Perspective. 4 - Gurpreet Dhillon, Yurita Yakimini Abdul Talib, Winnie Ng Picoto:
The Mediating Role of Psychological Empowerment in Information Security Compliance Intentions. 5 - John Mingers, Craig Standing:
A Framework for Validating Information Systems Research Based on a Pluralist Account of Truth and Correctness. 6 - Aron Lindberg:
Developing Theory Through Integrating Human and Machine Pattern Recognition. 7 - Donald E. Wynn Jr., Clay K. Williams:
Recent Advances and Opportunities for Improving Critical Realism-Based Case Study Research in IS. 8 - Sune Dueholm Müller, Lars Mathiassen, Carol Saunders:
Pluralist Theory Building: A Methodology for Generalizing from Data to Theory. 9 - Carsten S. Østerlund, Kevin Crowston, Corey Brian Jackson:
Building an Apparatus: Refractive, Reflective, and Diffractive Readings of Trace Data. 10
Volume 21, Number 2, 2020
- Roger Clarke, Robert M. Davison:
Research Perspectives: Through Whose Eyes? The Critical Concept of Researcher Perspective. 1 - Sebastian Walter Schuetz, Viswanath Venkatesh:
Research Perspectives: The Rise of Human Machines: How Cognitive Computing Systems Challenge Assumptions of User-System Interaction. 2 - Ali Vedadi, Merrill Warkentin:
Can Secure Behaviors Be Contagious? A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions. 3 - Markus Mandrella, Simon Trang, Lutz M. Kolbe:
Synthesizing and Integrating Research on IT-Based Value Cocreation: A Meta-Analysis. 4 - Rob Hornyak, Arun Rai, John Qi Dong:
Incumbent System Context and Job Outcomes of Effective Enterprise System Use. 5 - Jengchung Victor Chen, Timothy McBush Hiele, Adam Kryszak, William H. Ross:
Predicting Intention to Participate in Socially Responsible Collective Action in Social Networking Website Groups. 6 - Gloria H. W. Liu, Cecil Eng Huang Chua:
The Reinforcing Effects of Formal Control Enactment in Complex IT Projects. 7 - Hua (Jonathan) Ye, Atreyi Kankanhalli:
Value Cocreation for Service Innovation: Examining the Relationships between Service Innovativeness, Customer Participation, and Mobile App Performance. 8
- Varun Grover, Aron Lindberg, Izak Benbasat, Kalle Lyytinen:
The Perils and Promises of Big Data Research in Information Systems. 9 - Dorothy E. Leidner:
Editorial Reflections: Lockdowns, Slow Downs, and Some Introductions. 10
Volume 21, Number 3, 2020
Articles
- Hannes Rothe
, Lauri Wessel, Ana Paula Barquet:
Accumulating Design Knowledge: A Mechanisms-Based Approach. 1 - Christine Legner
, Tobias Pentek, Boris Otto:
Accumulating Design Knowledge with Reference Models: Insights from 12 Years' Research into Data Management. 2 - Hazbi Avdiji, Dina Elikan, Stéphanie Missonier, Yves Pigneur:
A Design Theory for Visual Inquiry Tools. 3 - Thomas Widjaja
, Robert Wayne Gregory:
Monitoring the Complexity of IT Architectures: Design Principles and an IT Artifact. 4 - Matt Germonprez, Matt Levy, Julie E. Kendall, Kenneth E. Kendall:
Tapestries of Innovation: Structures of Contemporary Open Source Project Engagements. 5 - Peng Luo, Eric W. T. Ngai, Xin Tian
:
Exploring the Dynamic Influence of Visit Behavior on Online Store Sales Performance: An Empirical Investigation. 6 - Jochen Wulf, Till J. Winkler
:
Evolutional and Transformational Configuration Strategies: A Rasch Analysis of IT Providers' Service Management Capability. 7 - Liwei Xu, Jiangnan Qiu, Wenjing Gu, Yidi Ge:
The Dynamic Effects of Perceptions of Dread Risk and Unknown Risk on SNS Sharing Behavior During Emerging Infectious Disease Events: Do Crisis Stages Matter? 8
- Jan vom Brocke, Robert Winter, Alan R. Hevner, Alexander Maedche:
Special Issue Editorial - Accumulation and Evolution of Design Knowledge in Design Science Research: A Journey Through Time and Space. 9 - Juhani Iivari:
Editorial: A Critical Look at Theories in Design Science Research. 10
Volume 21, Number 4, 2020
- Willem Mertens, Jan Recker:
New Guidelines for Null Hypothesis Significance Testing in Hypothetico-Deductive IS Research. 1 - Vikram S. Bhadauria, Radha K. Mahapatra, Sridhar P. Nerur:
Performance Outcomes of Test-Driven Development: An Experimental Investigation. 2 - Arturo Castellanos, Monica Chiarini Tremblay
, Roman Lukyanenko, Binny M. Samuel:
Basic Classes in Conceptual Modeling: Theory and Practical Guidelines. 3 - Dapeng Liu
, Ugochukwu O. Etudo, Victoria Y. Yoon:
X-IM Framework to Overcome Semantic Heterogeneity Across XBRL Filings. 4 - Yasser Rahrovani
, Alain Pinsonneault:
Innovative IT Use and Innovating with IT: A Study of the Motivational Antecedents of Two Different Types of Innovative Behaviors. 5 - Edouard Pignot
, Davide Nicolini
, Mark Thompson:
Affective Politics and Technology Buy-In: A Framework of Social, Political, and Fantasmatic Logics. 6 - Babu Veeresh Thummadi
, Kalle Lyytinen:
How Much Method-in-Use Matters? A Case Study of Agile and Waterfall Software Projects and their Design Routine Variation. 7 - Wen Xie, Xin Xu
, Ruiqi Liu
, Yong Jimmy Jin
, Wenchao Bai, Qiang Li:
Living in a Simulation? An Empirical Investigation of a Smart Driving-Simulation Testing System. 8
- Allen S. Lee
:
Commentary on "Demystifying the Influential IS Legends of Positivism". 9
- Ulrike Schultze, Gijs van den Heuvel, Marko Niemimaa:
Enacting Accountability in IS Research after the Sociomaterial Turn(ing). 10
Volume 21, Number 5, 2020
Articles
- Roman Lukyanenko, Jeffrey Parsons
:
Research Perspectives: Design Theory Indeterminacy: What Is it, How Can it Be Reduced, and Why Did the Polar Bear Drown? 1 - Michelle Carter
, Stacie Petter
, Varun Grover, Jason Bennett Thatcher
:
IT Identity: A Measure and Empirical Investigation of its Utility to IS Research. 2 - Xixi Li, Arun Rai, Ganapathy Krishnan
:
Designing Cost-Effective Telemedicine Camps for Underprivileged Individuals in Less Developed Countries: A Decomposed Affordance-Effectivity Framework. 3 - Göran Goldkuhl, Fredrik Karlsson:
Method Engineering as Design Science. 4 - Brian T. Pentland, Jan Recker, Julie Ryan Wolf, George M. Wyner:
Bringing Context Inside Process Research with Digital Trace Data. 5 - Yong Jimmy Jin
, Chao Ding, Yang Duan, Hsing Kenneth Cheng:
Click to Success? The Temporal Effects of Facebook Likes on Crowdfunding. 6 - Jens Lausen
, Benjamin Clapham
, Michael Siering, Peter Gomber:
Who Is the Next "Wolf of Wall Street"? Detection of Financial Intermediary Misconduct. 7 - Yue Han, Pinar Öztürk
, Jeffrey V. Nickerson
:
Leveraging the Wisdom of the Crowd to Address Societal Challenges: Revisiting the Knowledge Reuse for Innovation Process through Analytics. 8
- Wolfgang Ketter
, Balaji Padmanabhan, Gautam Pant, T. S. Raghu:
Special Issue Editorial: Addressing Societal Challenges through Analytics: An ESG ICE Framework and Research Agenda. 9 - W. Alec Cram, Mathieu Templier
, Guy Paré:
(Re)considering the Concept of Literature Review Reproducibility. 10
Volume 21, Number 6, 2020
- Mikko T. Siponen, Aggeliki Tsohou:
Demystifying the Influential IS Legends of Positivism: Response to Lee's Commentary. 1
- Shirley Gregor
, Leona Chandra Kruse
, Stefan Seidel
:
Research Perspectives: The Anatomy of a Design Principle. 2 - Joyce H. Y. Lee, Carol Hsu, Leiser Silva:
What Lies Beneath: Unraveling the Generative Mechanisms of Smart Technology and Service Design. 3 - Lele Kang, Qiqi Jiang, Chih-Hung Peng, Choon Ling Sia, Ting-Peng Liang:
Managing Change with the Support of Smart Technology: A Field Investigation of Ride-Hailing Services. 4 - Xin (Robert) Luo, Han Li, Qing Hu, Heng Xu:
Why Individual Employees Commit Malicious Computer Abuse: A Routine Activity Theory Perspective. 5 - Xiong Zhang, Wei T. Yue:
Integration of On-Premises and Cloud-Based Software: The Product Bundling Perspective. 6 - Kangkang Qi, Sumin Han:
Does IT Improve Revenue Management in Hospitals? 7 - Hasan B. Kartal, Xiao-Bai Li:
Protecting Privacy When Sharing and Releasing Data with Multiple Records per Person. 8 - Christian Janiesch
, Christoph Rosenkranz
, Ulrich Scholten:
An Information Systems Design Theory for Service Network Effects. 9
- Blair Wang
, Daniel Schlagwein
, Dubravka Cecez-Kecmanovic
, Michael C. Cahalane
:
Editorial: Beyond the Factory Paradigm: Digital Nomadism and the Digital Future(s) of Knowledge Work Post-COVID-19. 10 - Wietske van Osch, Dorothy E. Leidner, Cynthia Mathis Beath:
Editorial: Does a Societal Lockdown Treat Gender the Same? Submission and Reviewing Patterns at JAIS During Spring 2020. 11

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.