


default search action
Information Systems Journal, Volume 25
Volume 25, Number 1, January 2015
- Philip Powell:

Editorial. 1-4
- Allen S. Lee

, Manoj A. Thomas
, Richard L. Baskerville
:
Going back to basics in design science: from the information technology artifact to the information systems artifact. 5-21 - Richard L. Baskerville

, Michael D. Myers
:
Design ethnography in information systems. 23-46 - Steven Alter:

The concept of 'IT artifact' has outlived its usefulness and should be retired now. 47-60
- Balasubramaniam Ramesh

, Lan Cao, Richard L. Baskerville
:
Erratum. 65
Volume 25, Number 2, March 2015
- Eileen M. Trauth:

Editorial. 67-69
- Kalle Lyytinen

, Mike Newman:
A tale of two coalitions - marginalising the users while successfully implementing an enterprise resource planning system. 71-101 - Monideepa Tarafdar

, Ellen Bolman Pullins, T. S. Ragu-Nathan:
Technostress: negative effect on performance and possible mitigations. 103-132 - Benjamin P. W. Ellway

, Geoff Walsham:
A doxa-informed practice analysis: reflexivity and representations, technology and action. 133-160
Volume 25, Number 3, May 2015
- Monideepa Tarafdar

, Ashish Gupta, Ofir Turel
:
Editorial. 161-170
- Jenine P. Beekhuyzen, Liisa von Hellens, Sue H. Nielsen:

Illuminating the underground: the reality of unauthorised file sharing. 171-192 - Paul Benjamin Lowry, Clay Posey, Rebecca J. Bennett, Tom L. Roberts:

Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust. 193-273 - Shamel Addas

, Alain Pinsonneault:
The many faces of information technology interruptions: a taxonomy and preliminary investigation of their performance effects. 231-273 - Christian Maier, Sven Laumer, Christoph Weinert

, Tim Weitzel:
The effects of technostress and switching stress on discontinued use of social networking services: a study of Facebook use. 275-308
- Stan Karanasios

, David K. Allen, Patrick Finnegan:
Information Systems Journal Special Issue on: Activity Theory in Information Systems Research. 309-313
Volume 25, Number 4, July 2015
Editorial
- Monideepa Tarafdar, Ashish Gupta, Ofir Turel

:
Introduction to the special issue on 'dark side of information technology use' - part two. 315-317
- João Vieira da Cunha

, Andrea Carugati
, Aurélie Leclercq-Vandelannoitte
:
The dark side of computer-mediated control. 319-354 - Shirish C. Srivastava, Shalini Chandra, Anuragini Shirish

:
Technostress creators and job outcomes: theorising the moderating influence of personality traits. 355-401 - Amr A. Soror, Bryan I. Hammer

, Zachary R. Steelman, Fred D. Davis, Moez Limayem:
Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual-systems perspective. 403-427
Volume 25, Number 5, September 2015
- Robert M. Davison

:
Editorial-The Art of Constructive Reviewing. 429-432
- Paul Benjamin Lowry, Gregory D. Moody:

Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies. 433-463 - Matthias Trier, Alexander Richter

:
The deep structure of organizational online networking - an actor-oriented case study. 465-488 - Xuefei (Nancy) Deng, Tawei Wang

, Robert D. Galliers:
More than providing 'solutions': towards an understanding of customer-oriented citizenship behaviours of IS professionals. 489-530 - Jeremy Rose, John Stouby Persson, Lise Tordrup Heeager, Zahir Irani:

Managing e-Government: value positions and relationships. 531-571
Volume 25, Number 6, November 2015
Editorial
- France Bélanger, Heng Xu:

The role of information systems research in shaping the future of information privacy. 573-578
- Kathleen E. Greenaway, Yolande E. Chan

, Robert E. Crossler
:
Company information privacy orientation: a conceptual framework. 579-606 - Flavius Kehr, Tobias Kowatsch

, Daniel Wentzel, Elgar Fleisch:
Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus. 607-635 - Mark J. Keith

, Jeffry S. Babb, Paul Benjamin Lowry, Christopher P. Furner, Amjad Abdullat:
The role of mobile-computing self-efficacy in consumer information disclosure. 637-667

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














