EJIS - volume 26 - 2017 论文列表 |
点击这里查看 European Journal of Information Systems 的JCR分区、影响因子等信息 |
Sabrina Karwatzki Manuel Trenz Virpi Kristiina Tuunainen Daniel Veit
An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook.Abdullah Algarni Yue Xu Taizan Chan
Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study.Zafer D. Ozdemir H. Jeff Smith John H. Benamati
Organizational information security policies: a review and research framework.W. Alec Cram Jeffrey Proudfoot John D&aposArcy
Taking stock of organisations' protection of privacy: categorising and assessing threats to personally identifiable information in the USA.Clay Posey Uzma Raja Robert E. Crossler A. J. Burns
Which phish get caught? An exploratory study of individuals′ susceptibility to phishing.Gregory D. Moody Dennis F. Galletta Brian Kimball Dunn
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. Stimulating dialog between information systems research and practice.Ryan T. Wright Nicholas H. Roberts David W. Wilson
Impact of executive compensation on the execution of IT-based environmental strategies under competition.Ricky Y. K. Chan Katherine H. Y. Ma
Balancing exploration and exploitation of IT resources: the influence of Digital Business Intensity on perceived organizational performance. Service robots in hospitals: new perspectives on niche evolution and technology affordances.Hung-Pin Shih Kee-hung Lai T. C. E. Cheng
Online product review as an indicator of users' degree of innovativeness and product adoption time: a longitudinal analysis of text reviews. It's complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis.Gregory D. Moody Paul Benjamin Lowry Dennis F. Galletta
The funeral industry and the Internet: on the historical emergence and destabilization of strategic paths. Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users.David E. Avison Julien Malaurent Philippe Eynaud
The limits to language in doing systems design.Richard J. Boland Kalle Lyytinen
Alternative genres in information systems research. Digital natives and immigrant editors, and special issues.Balasubramaniam Ramesh Lan Cao Jongwoo (Jonathan) Kim Kannan Mohan Tabitha L. James
Interorganizational dependence, information transparency in interorganizational information systems, and supply chain performance.Bangho Cho Sung Yul Ryoo Kyung Kyu Kim
Variable use of standards-based IOS enabling technologies in Australian SMEs: an examination of deliberate and emergent decision making processes.Damien Power Richard L. Gruner
The public procurement of information systems: dialectics in requirements specification. The concept of mindfulness in information systems research: a multi-dimensional analysis.Christoph Rosenkranz Roland Holten Marc Räkers Wolf Behrmann
Useful business cases: value creation in IS projects.Peter Axel Nielsen John Stouby Persson
Examining the intended and unintended consequences of organisational privacy safeguards. Mixed results in strategic IT alignment research: a synthesis and empirical study. Information systems security policy implementation in practice: from best practices to situated practices.