添加

jmis - Volume 34

  • 主办方 / 出版社 Taylor & Francis
  • 关注的研究方向 计算机系统,信息系统,管理
  • CCF等级 / JCR分区
jmis - Volume 34 - Number 4 - 2017
Editorial Introduction.

Vladimir Zwass==

Special Issue: Creating Social Value with Information.

Justin Scott Giboney==Robert O. Briggs==Jay F. Nunamaker Jr.==

Beyond Brainstorming: Exploring Convergence in Teams.

Isabella Seeber==Gert-Jan de Vreede==Ronald Maier==Barbara Weber==

A Video-Based Screening System for Automated Risk Assessment Using Nuanced Facial Features.

Steven J. Pentland==Nathan W. Twyman==Judee K. Burgoon==Jay F. Nunamaker Jr.==Christopher B. R. Diller==

Promoting the System Integration of Renewable Energies: Toward a Decision Support System for Incentivizing Spatially Diversified Deployment.

Jan-Hendrik Piel==Julian F. H. Hamann==André Koukal==Michael H. Breitner==

Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence.

Sagar Samtani==Ryan Chinn==Hsinchun Chen==Jay F. Nunamaker Jr.==

A Data-Mining Approach to Identification of Risk Factors in Safety Management Systems.

Donghui Shi==Jian Guan==Jacek M. Zurada==Andrew Manikas==

Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information.

Chad Anderson==Richard L. Baskerville==Mala Kaul==

Risks and Controls in Internet-Enabled Reverse Auctions: Perspectives from Buyers and Suppliers.

Chaitanya Sambhara==Arun Rai==Mark Keil==Vijay Kasi==

Assessing the Credibility of Decisional Guidance Delivered by Information Systems.

Andrew M. Hardin==Clayton A. Looney==Gregory D. Moody==

A Temporal Study of the Effects of Online Opinions: Information Sources Matter.

Jianxiong Huang==Wai Fong Boh==Kim Huat Goh==

User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory.

Philip Menard==Gregory Bott==Robert E. Crossler==


jmis - Volume 34 - Number 3 - 2017
Editorial Introduction.

Vladimir Zwass==

Special Issue: Action Research in Information Systems.

David E. Avison==Ned Kock==Julien Malaurent==

An Agile Methodology for the Disaster Recovery of Information Systems Under Catastrophic Scenarios.

Corey Baham==Rudy Hirschheim==Andres Calderon==Victoria Kisekka==

Reflective Technology Assimilation: Facilitating Electronic Health Record Assimilation in Small Physician Practices.

Aaron Baird==Elizabeth Davidson==Lars Mathiassen==

IT-Enabled Revenue Cycle Transformation in Resource-Constrained Hospitals: A Collaborative Digital Options Inquiry.

Rajendra Singh==Vitali Mindel==Lars Mathiassen==

Enabling Effective Operational Risk Management in a Financial Institution: An Action Research Study.

Shirley Ou Yang==Carol Hsu==Suprateek Sarker==Allen S. Lee==

Positivist Information Systems Action Research: Methodological Issues.

Ned Kock==David E. Avison==Julien Malaurent==

Platform Structures, Homing Preferences, and Homophilous Propensities in Online Social Networks.

Hyeokkoo Eric Kwon==Wonseok Oh==Taekyung Kim==

The Impact of Mental Representations on ICT-Related Overload in the Use of Mobile Phones.

Carol Saunders==Martin Wiener==Sabrina Klett==Sebastian Sprenger==

A Two-Stage Model of Generating Product Advice: Proposing and Testing the Complementarity Principle.

David Jingjun Xu==Izak Benbasat==Ronald T. Cenfetelli==

Using IT Design to Prevent Cyberbullying.

Paul Benjamin Lowry==Gregory D. Moody==Sutirtha Chatterjee==

Impediments to Information Systems Replacement: A Calculus of Discontinuance.

Brent Furneaux==Michael R. Wade==


jmis - Volume 34 - Number 2 - 2017
Editorial Introduction.

Vladimir Zwass==

Special Section: Technological Innovations for Communication and Collaboration in Social Spaces.

Eric K. Clemons==Rajiv M. Dewan==Robert J. Kauffman==Thomas A. Weber==

Whose and What Social Media Complaints Have Happier Resolutions? Evidence from Twitter.

Priyanga Gunarathne==Huaxia Rui==Abraham Seidmann==

Smart Products for Sharing.

Thomas A. Weber==

Beyond the Personalization-Privacy Paradox: Privacy Valuation, Transparency Features, and Service Personalization.

Sabrina Karwatzki==Olga Dytynko==Manuel Trenz==Daniel Veit==

Predicting and Deterring Default with Social Media Information in Peer-to-Peer Lending.

Ruyi Ge==Juan Feng==Bin Gu==Pengzhu Zhang==

Understanding the Information-Based Transformation of Strategy and Society.

Eric K. Clemons==Rajiv M. Dewan==Robert J. Kauffman==Thomas A. Weber==

Integrated Health Information Technology and the Quality of Patient Care: A Natural Experiment.

Alain Pinsonneault==Shamel Addas==Christina Qian==Vijay Dakshinamoorthy==Robyn Tamblyn==

How Doctors Gain Social and Economic Returns in Online Health-Care Communities: A Professional Capital Perspective.

Shanshan Guo==Xitong Guo==Yulin Fang==Doug Vogel==

The Effects of Process Orientations on Collaboration Technology Use and Outcomes in Product Development.

Hillol Bala==Anne P. Massey==Mitzi M. Montoya==

The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks.

Tabitha L. James==Paul Benjamin Lowry==Linda G. Wallace==Merrill Warkentin==

Training to Mitigate Phishing Attacks Using Mindfulness Techniques.

Matthew L. Jensen==Michael Dinger==Ryan T. Wright==Jason Bennett Thatcher==


jmis - Volume 34 - Number 1 - 2017
Editorial Introduction.

Vladimir Zwass==

The Consensus Effect in Online Health-Care Communities.

Lu (LUCY) Yan==Yong Tan==

What Leads to Prosocial Behaviors on Social Networking Services: A Tripartite Model.

Jungwon Kuem==Soumya Ray==Mikko T. Siponen==Sung S. Kim==

Who Do You Think You Are? Common and Differential Effects of Social Self-Identity on Social Media Usage.

Zhao Pan==Yaobin Lu==Bin Wang==Patrick Y. K. Chau==

Winning Back Technology Disadopters: Testing a Technology Readoption Model in the Context of Mobile Internet Services.

Xin Xu==James Y. L. Thong==Kar Yan Tam==

To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls.

Lara Khansa==Jungwon Kuem==Mikko T. Siponen==Sung S. Kim==

A Study of Enterprise Software Licensing Models.

Shengli Li==Hsing Kenneth Cheng==Yang Duan==Yu-Chen Yang==

A Strategic Analysis of Multi-Channel Expert Services.

M. Tolga Akçura==Zafer D. Ozdemir==

The Risk Implications of Mergers and Acquisitions with Information Technology Firms.

Young Bong Chang==Wooje Cho==

Gamification in the Workplace: The Central Role of the Aesthetic Experience.

Ayoung Suh==Christy M. K. Cheung==Manju Ahuja==Christian Wagner==


回到顶部