


default search action
Journal of Computer Information Systems, Volume 63
Volume 63, Number 1, January 2023
- Botong Xue

, Merrill Warkentin
, Leigh A. Mutchler
, Puzant Balozian
:
Self-efficacy in Information Security: A Replication Study. 1-10 - George Mangalaraj

, Sridhar P. Nerur, Rahul Dwivedi
:
Digital Transformation for Agility and Resilience: An Exploratory Study. 11-23 - Hai Dung Do

, Kun-Tan Tsai, Ju May Wen
, Shihping Kevin Huang:
Hard Skill Gap between University Education and the Robotic Industry. 24-36 - Anuj Sharma

, Alex Koohang
, Nripendra P. Rana
, Salma S. Abed, Yogesh K. Dwivedi
:
Journal of Computer Information Systems: Intellectual and Conceptual Structure. 37-67 - Karin Högberg:

Multiple Social Media in Practice - Investigating Emergent Work Practices. 68-80 - Wenhong Luo:

User Selection Strategies of Interactive Data Visualization Format. 81-93 - Claire Seungeun Lee

, Dongsim Kim
:
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea. 94-106 - Craig C. Claybaugh, Iris Reychav

, Fiona Fui-Hoon Nah
:
Relational and Technological Assessment of CRM Providers: A Multifactor Study. 107-117 - Tung Cu

, James R. Van Scotter
, Helmut Schneider
:
Do Life-cycle and Generation Moderate Sentiment and Diffusion? 118-132 - Hai Wang, Shouhong Wang

:
A Semantic Model for Enterprise Digital Transformation Analysis. 133-148 - Craig Van Slyke

, William Grant Clary
, Mohamed Y. Tazkarji
:
Distress, Eustress, and Continuance Intentions for Distance Learners. 149-161 - Le Thanh Ha:

Digital Business and Economic Complexity. 162-175 - Félix A. Martín-Velicia

, José A. Folgado-Fernández
, Pedro R. Palos Sánchez
, Blanca López-Catalán
:
mWOM Business Strategies: Factors Affecting Recommendations. 176-189 - Minli Yu

, Hui Jin, Hejie Zhang, Alain Yee-Loong Chong:
ICT, Financial Development and Renewable Energy Consumption. 190-203 - Andrew Ishmael, Leila A. Halawi

:
Retention of Qualified Cybersecurity Professionals: A Qualitative Study. 204-215 - Chungwon Woo

, Jaeheung Yoo
:
Exploring the Determinants of Blockchain Acceptance for Research Data Management. 216-227 - Ho-Chang Chae, Gimun Kim, Chang E. Koh:

Impact of Privacy Behaviors on Relatedness and Well-Being in SNSs. 228-239
Volume 63, Number 2, March 2023
- Zhunzhun Liu

, Shenglin Ben
, Ruidong Zhang
:
Factors Affecting Crowdfunding Success. 241-256 - Aaron M. French

, Robert F. Otondo
, Jung P. Shim
:
Latent-Curve Modeling of Continued-Use Intentions: Near- Versus Distant-Future. 257-268 - Jeffrey P. Kaleta

, Cheryl Aasheim:
Construal of Social Relationships in Online Consumer Reviews. 269-280 - Bakthavachalam Elango

, S. Matilda
, M. Martina Jose Mary
, M. Arul Pugazhendhi:
Mapping the Cybersecurity Research: A Scientometric Analysis of Indian Publications. 293-309 - Paphada Tatpornpan, Pattarawan Prasarnphanich

, Chiraphol New Chiyachantana:
Information Quality of Investment Services with Social Media. 310-321 - David C. Chou

, Houn-Gee Chen
, Binshan Lin
:
Green IT and Corporate Social Responsibility for Sustainability. 322-333 - Jean A. Pratt, Liqiang Chen, Hans F. Kishel, Abraham Y. Nahm

:
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review. 334-350 - Matthew J. Liberatore, William P. Wagner:

The Impact of Age on User Performance: A Field Experiment. 369-379 - Princely Ifinedo:

Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors. 380-396 - Martin Wilson

, Sharon McDonald
, Dominic Button
, Kenneth McGarry
:
It Won't Happen to Me: Surveying SME Attitudes to Cyber-security. 397-409 - Mary Macharia:

Cloud Computing Risk: A Decision-making Framework. 421-435 - Kaushik Ghosh, Michael S. Dohan, Hareesh Veldandi

, Monica J. Garfield:
Digital Transformation in Healthcare: Insights on Value Creation. 449-459 - Maryam Ghasemaghaei

:
Does Knowledge Sharing Belief of Data Analysts Impact Their Behavior? 460-478
Volume 63, Number 3, May 2023
- Assion Lawson-Body, Laurence Lawson-Body, Abdou Illia:

Data Visualization: Developing and Validating Dashboard Measurement Instruments. 479-491 - Yunfei Xing

, Wu He, Zuopeng Justin Zhang
, Gaohui Cao:
AI Privacy Opinions between US and Chinese People. 492-506 - Jason K. Deane

, Wade H. Baker
, Loren Paul Rees:
Cybersecurity in Supply Chains: Quantifying Risk. 507-521 - Ken Owen, Milena M. Head

:
Motivation and Demotivation of Hackers in Selecting a Hacking Task. 522-536 - Moti Zwilling

:
Big Data Challenges in Social Sciences: An NLP Analysis. 537-554 - Ahad Zareravasan, Anand Jeyaraj:

Evolution of Information Systems Business Value Research: Topic Modeling Analysis. 555-573 - Sally Rao Hill

, Graciela Corral de Zubielqui:
Managing Privacy in B2B Marketing: A Systematic Literature Review. 574-591 - Jiongbin Liu

, William Yeoh, Longxiang Gao, Shang Gao
, Ojelanki K. Ngwenyama
:
Designing a Secure Blockchain-Based Supply Chain Management Framework. 592-607 - Jalpesh Vasa

, Amit Thakkar
:
Deep Learning: Differential Privacy Preservation in the Era of Big Data. 608-631 - Chao Wen

, Nan (Tina) Wang
, Jiaming Fang
, Meng Huang
:
An Integrated Model of Continued M-Commerce Applications Usage. 632-647 - Huosong Xia, Duqun Lu, Boqiang Lin

, Jeretta Horn Nord
, Zuopeng Justin Zhang
:
Trust in Fintech: Risk, Governance, and Continuance Intention. 648-662 - Yabing Jiang, Thant Syn

:
Online Privacy Policy Disclosure: An Empirical Investigation. 663-680 - Xiaoni Lu, Xia Zhao, Xi Zhao:

How Does Smartphone Usage Feedback Influence Mobility Behavior? 681-694 - Ibrahim Arpaci

, Ömer Aslan
:
Development of a Scale to Measure Cybercrime-Awareness on Social Media. 695-705 - Matthew J. Liberatore, William P. Wagner:

Recursive Decision-Making: A Confirmation of Newell and Simon. 706-715 - Ignacio Fernandez De Arroyabe, Tim Watson, Olga Angelopoulou

:
Cybersecurity in the Automotive Industry: A Systematic Literature Review (SLR). 716-734 - Alex Koohang

, Jeretta Horn Nord
, Keng-Boon Ooi
, Garry Wei-Han Tan
, Mostafa Al-Emran
, Eugene Cheng-Xi Aw
, Abdullah Mohammed Baabdullah, Dimitrios Buhalis
, Tat Huei Cham
, Charles Dennis
, Vincent Dutot
, Yogesh K. Dwivedi
, Laurie Hughes, Emmanuel Mogaji
, Neeraj Pandey
, Ian Phau, Ramakrishnan Raman
, Anshuman Sharma, Marianna Sigala, Akiko Ueno
, Lai-Wan Wong
:
Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation. 735-765
Volume 63, Number 4, 2023
- Pow-Yee Hoh, Sook-Jian Loo, Garry Wei-Han Tan

, Voon-Hsien Lee
, Eugene Cheng-Xi Aw
, Tat Huei Cham
, Keng-Boon Ooi
:
Understanding Valences in Mobile Grocery Shopping: Do Consumers' Characteristics Matter? 767-780 - Kashif Saeed

, Anna Sidorova, Akash Vasanthan:
The Bundling of Business Intelligence and Analytics. 781-792 - Katarina Rojko, Dusan Lesjak, Nusa Erman:

The COVID-19 Pandemic Crisis: Impact on ICT Spending. 793-808 - Anand Jeyaraj

:
Models of Information Technology Use: Meta-Review and Research Directions. 809-824 - Priyanka Sharma

, Angappa Gunasekaran, Girish Subramanian
:
Distributor Opportunism Toward the Supplier: A Social Network Perspective. 825-840 - Francisco Fernández de Vega:

Teaching Programming in the 21st Century. 841-852 - Charlie C. Chen, Peter Ractham, Myungjae Kwak:

Achieving Entrepreneurial Success for Student Ventures under Uncertainty. 853-865 - Orly Barzilai

, Ruti Gafni
:
Using Web Frameworks in Server Side Programming Courses. 866-876 - Yamin Xu

, Chuang Wang
, Zhengang Zhang:
Understanding Big Data-Business Alignment from a Dynamic Perspective. 877-889 - Linda M. Pittenger, Aaron Glassman, Stacey Mumbower, Daisha M. Merritt, Denise Bollenback:

Bounded Rationality: Managerial Decision-Making and Data. 890-903 - Hossein Mohit

, Vess L. Johnson
, Sara Memarian Esfahani
:
Social Media Continuance from the Perspective of Commitment. 904-918 - Harrison Stewart

:
Digital Transformation Security Challenges. 919-936 - C. Matt Graham

, Yonggang Lu:
Skills Expectations in Cybersecurity: Semantic Network Analysis of Job Advertisements. 937-949 - Muralidharan Ramakrishnan

, Shirley Gregor
, Anup Shrestha
, Jeffrey Soar
:
Achieving Industry-aligned Education through Digital-Commons: A Case Study. 950-964 - Bilge Yigit Ozkan

, Marco Spruit
:
Adaptable Security Maturity Assessment and Standardization for Digital SMEs. 965-987 - Aaron M. French

, Andrew William Green:
Social Networking Continuance and Success: A Replication Study. 988-997 - Luan-Thanh Nguyen

, Yogesh K. Dwivedi
, Garry Wei-Han Tan
, Eugene Cheng-Xi Aw
, Pei-San Lo, Keng-Boon Ooi
:
Unlocking Pathways to Mobile Payment Satisfaction and Commitment. 998-1015 - Vijay V. Raghavan

, Ravi Chinta
:
Influence of Leadership Style on Information Systems Project Outcomes. 1016-1029
Volume 63, Number 5, 2023
- Debarun Chakraborty

:
Purchase Behavior of Consumers Toward GSAs: A Longitudinal Assessment. 1031-1056 - Anupama Prashar, Parul Gupta, Anand Jeyaraj, Yogesh K. Dwivedi

:
Expectation-Reality Gap in Information Technology Discontinuance Intention. 1057-1069 - Xiu-Ming Loh

, Voon-Hsien Lee
, Lai-Ying Leong
:
A Multi-Dimensional Nomological Network of Mobile Payment Continuance. 1070-1092 - Maryam Ghasemaghaei

, Ofir Turel:
The Duality of Big Data in Explaining Decision-Making Quality. 1093-1111 - Mary Helen Fagan, Sunil Vidiyala:

Analytics Use Intention: The Role of STEM and Software Attitudes. 1112-1123 - Germán Terrazas

, Gregory Hawkridge, Mike McNally, Duncan C. McFarlane, Zhengyang Ling, Jun Lau:
Hackathons to Accelerate the Development of Low-Cost Digital Solutions. 1124-1138 - Kimberly Deranek

, Barbara Hewitt
:
Knowledge Management Model Development and Validation Using an ERP Simulation. 1139-1152 - Miloslava Plachkinova

, Kenneth J. Knapp:
Least Privilege across People, Process, and Technology: Endpoint Security Framework. 1153-1165 - Hakan Özköse

, Özcan Özyurt
, Ahmet Ayaz
:
Management Information Systems Research: A Topic Modeling Based Bibliometric Analysis. 1166-1182 - Syed Mudasser Abbas

, Zhiqiang Liu
, Muhammad Khushnood
:
When Human Meets Technology: Unlocking Hybrid Intelligence Role in Breakthrough Innovation Engagement via Self-Extension and Social Intelligence. 1183-1200 - Andy Luse, Jim Burkman, Erin Stewart:

The Impact of Self-Perceived Facial Attractiveness on Webcam Use. 1201-1212 - Elisabeth Joyce, Pinar Öztürk

, Jacqueline Pike:
Effective Organizing on the Fly: Social Capital in Temporary Organizations. 1213-1227 - Shi-Zhu Liang

, Meng-Hsiang Hsu, Wei-Hong Chen:
Psychological Factors Behind Innovation Adoption: Affordance Actualisation Model. 1228-1242 - Debarun Chakraborty

, Nripendra P. Rana
, Sangeeta Khorana
, Hari Babu Singu
, Sunil Luthra
:
Big Data in Food: Systematic Literature Review and Future Directions. 1243-1263 - Malyun Muhudin Hilowle, William Yeoh

, Marthie Grobler
, Graeme Pye, Frank Jiang:
Users' Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review. 1264-1279 - Amna Altaf, Adnen El-Amraoui

, François Delmotte
, Christophe Lecoutre:
Applications of Artificial Intelligence in Cross Docking: A Systematic Literature Review. 1280-1300
Volume 63, Number 6, 2023
- Joong-Lyul Lee

, Joobum Kim, Myungjae Kwak:
Performance Evaluation of Co-Channel Interference on Wireless Networks. 1301-1315 - Katia Guerra, Chang E. Koh, Victor R. Prybutok

, Vess Johnson
:
WIoT Adoption Among Young Adults in Healthcare Crises. 1316-1331 - Yuna Ro, Ilsue Roh, Jungjoo Jahng, Bo-Ram Kwon

:
Determining Priority in Smart City Technologies and Services for International Development Cooperation. 1332-1344 - Temitayo Abiodun

, Giselle Rampersad
, Russell S. A. Brinkworth
:
Driving Industrial Digital Transformation. 1345-1361 - Arvind Kumar Gautam

, Abhishek Bansal
:
Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach. 1362-1381 - Tao Zhou, Qingqing Yuan:

Examining Users' Contribution in Open Source Software Communities. 1382-1393 - Alexei Tretiakov

, Tanya Jurado
, Jo Bensemann
:
Employee Empowerment and HR Flexibility in Information Technology SMEs. 1394-1407 - Xiaofeng Chen, Craig K. Tyran:

A Framework for Analyzing and Improving ISP Compliance. 1408-1423 - Yuguang Xie, Shuping Zhao, Peiyu Zhou

, Changyong Liang:
Understanding Continued Use Intention of AI Assistants. 1424-1437 - Hakan Özköse

:
Bibliometric Analysis and Scientific Mapping of IoT. 1438-1459 - Ho-Chang Chae, Chang E. Koh, Quynh Nguyen

:
Individual Creativity and Acceptance of Emerging Information Technology. 1460-1476 - Kimia Ansari

, Maryam Ghasemaghaei
:
Big Data Analytics Capability and Firm Performance: Meta-Analysis. 1477-1494 - Sandipkumar Patel

, Ritesh Patel:
A Comprehensive Analysis of Computing Paradigms Leading to Fog Computing: Simulation Tools, Applications, and Use Cases. 1495-1516 - Anand Jeyaraj:

Task Dependence and External Control Constraints in Technology Acceptance. 1517-1530 - B. J. Praveena

, Natesan Arivazhagan, P. Vijaya Pal Reddy:
Blockchain based Sensor System Design For Embedded IoT. 1531-1548 - Kashif Saeed

, Anna Sidorova:
Explaining Digital Technology: Digital Artifact Delineation and Coalescence. 1549-1573

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














