Volume 26, Number 6, November 2017
Adverse consequences of access to individuals' information: an analysis of perceptions and the scope of organisational influence.

Sabrina Karwatzki Manuel Trenz Virpi Kristiina Tuunainen Daniel Veit

An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook.

Abdullah Algarni Yue Xu Taizan Chan

Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study.

Zafer D. Ozdemir H. Jeff Smith John H. Benamati

Organizational information security policies: a review and research framework.

W. Alec Cram Jeffrey Proudfoot John D&aposArcy

Taking stock of organisations' protection of privacy: categorising and assessing threats to personally identifiable information in the USA.

Clay Posey Uzma Raja Robert E. Crossler A. J. Burns

Which phish get caught? An exploratory study of individuals′ susceptibility to phishing.

Gregory D. Moody Dennis F. Galletta Brian Kimball Dunn

Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda.

Paul Benjamin Lowry Tamara Dinev Robert Willison

Stimulating dialog between information systems research and practice.

Dov Te&aposeni Stefan Seidel Jan vom Brocke


Volume 26, Number 5, September 2017
The role of context in IT assimilation: A multi-method study of a SaaS platform in the US nonprofit sector.

Ryan T. Wright Nicholas H. Roberts David W. Wilson

Impact of executive compensation on the execution of IT-based environmental strategies under competition.

Ricky Y. K. Chan Katherine H. Y. Ma

Balancing exploration and exploitation of IT resources: the influence of Digital Business Intensity on perceived organizational performance.

Joseph K. Nwankpa Pratim Datta

Service robots in hospitals: new perspectives on niche evolution and technology affordances.

Tobias Mettler Michaela Sprenger Robert Winter


Volume 26, Number 4, July 2017
Constraint-based and dedication-based mechanisms for encouraging online self-disclosure: Is personalization the only thing that matters?

Hung-Pin Shih Kee-hung Lai T. C. E. Cheng

Online product review as an indicator of users' degree of innovativeness and product adoption time: a longitudinal analysis of text reviews.

Roozmehr Safi Yang Yu

It's complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis.

Gregory D. Moody Paul Benjamin Lowry Dennis F. Galletta

The funeral industry and the Internet: on the historical emergence and destabilization of strategic paths.

Matthias Wenzel Heinz-Theo Wagner Jochen Koch

Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users.

Sven Laumer Christian Maier Tim Weitzel


Volume 26, Number 3, May 2017
Crowdsourcing of information systems research.

James Love Rudy Hirschheim

Once upon a time: Crafting allegories to analyze and share the cultural complexity of strategic alignment.

Michelle L. Kaarst-Brown

A half-moon on my skin: a memoir on life with an activity tracker.

Elpida Prasopoulou

"What else is there...?": reporting meditations in experiential computing.

Mads Bødker

A narrative approach to publishing information systems research: inspiration from the French New Novel tradition.

David E. Avison Julien Malaurent Philippe Eynaud

The limits to language in doing systems design.

Richard J. Boland Kalle Lyytinen

Alternative genres in information systems research.

Michel Avital Lars Mathiassen Ulrike Schultze

Digital natives and immigrant editors, and special issues.

Dov Te&aposeni


Volume 26, Number 2, March 2017
Conflicts and complements between eastern cultures and agile methods: an empirical investigation.

Balasubramaniam Ramesh Lan Cao Jongwoo (Jonathan) Kim Kannan Mohan Tabitha L. James

Interorganizational dependence, information transparency in interorganizational information systems, and supply chain performance.

Bangho Cho Sung Yul Ryoo Kyung Kyu Kim

Variable use of standards-based IOS enabling technologies in Australian SMEs: an examination of deliberate and emergent decision making processes.

Damien Power Richard L. Gruner

The public procurement of information systems: dialectics in requirements specification.

Carl Erik Moe Mike Newman Maung Kyaw Sein

The concept of mindfulness in information systems research: a multi-dimensional analysis.

Sabine Dernbecher Roman Beck


Volume 26, Number 1, January 2017
Supporting the design of data integration requirements during the development of data warehouses: a communication theory-based approach.

Christoph Rosenkranz Roland Holten Marc Räkers Wolf Behrmann

Useful business cases: value creation in IS projects.

Peter Axel Nielsen John Stouby Persson

Examining the intended and unintended consequences of organisational privacy safeguards.

Rachida Parks Heng Xu Chao-Hsien Chu Paul Benjamin Lowry

Mixed results in strategic IT alignment research: a synthesis and empirical study.

Magno Queiroz

Information systems security policy implementation in practice: from best practices to situated practices.

Elina Niemimaa Marko Niemimaa