


default search action
Information Systems Journal, Volume 29
Volume 29, Number 1, January 2019
- Robert M. Davison

:
The art of vivacious variance. 1-5
- Monideepa Tarafdar

, Cary L. Cooper
, Jean-François Stich
:
The technostress trifecta - techno eustress, techno distress and design: Theoretical directions and an agenda for research. 6-42
- John D'Arcy

, Paul Benjamin Lowry
:
Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study. 43-69 - Richard Heeks

, Angelica V. Ospina:
Conceptualising the link between information systems and resilience: A developing country field study. 70-96 - Lars Öbrand

, Nils-Petter Augustsson, Lars Mathiassen, Jonny Holmström:
The interstitiality of IT risk: An inquiry into information systems development practices. 97-118 - Jens Förderer

, Thomas Kude
, Sebastian Walter Schütz, Armin Heinzl:
Knowledge boundaries in enterprise software platform development: Antecedents and consequences for platform governance. 119-144 - Antonio Díaz-Andrade

, Bill Doolin:
Temporal enactment of resettled refugees' ICT-mediated information practices. 145-174 - Mark Lycett

, Omar Radwan:
Developing a Quality of Experience (QoE) model for Web Applications. 175-199 - Rajiv Kohli

, Nigel P. Melville
:
Digital innovation: A review and synthesis. 200-223
- Nikunj Dalal, David J. Pauleen

:
The wisdom nexus: Guiding information systems research, practice, and education. 224-244
- Tobias Mettler

, Jochen Wulf
:
Physiolytics at the workplace: Affordances and constraints of wearables use from an employee's perspective. 245-273
Volume 29, Number 2, March 2019
- Robert M. Davison

:
On serendipity: The happy discovery of unsought knowledge. 275-278
- Zilong Liu, Xuequn Wang

, Qingfei Min, Wenli Li
:
The effect of role conflict on self-disclosure in social network sites: An integrated perspective of boundary regulation and dual process model. 279-316 - Iris A. Junglas

, Lakshmi Goel
, Blake Ives
, Jeanne Harris:
Innovation at work: The relative advantage of using consumer IT in the workplace. 317-339 - Nadine Guhr

, Benedikt Lebek, Michael H. Breitner
:
The impact of leadership on employees' intended information security behaviour: An examination of the full-range leadership theory. 340-362 - Dennis M. Steininger

:
Linking information systems and entrepreneurship: A review and agenda for IT-associated and digital entrepreneurship research. 363-407 - Markus Salo

, Henri Pirkkalainen
, Tiina Koskelainen
:
Technostress and social networking services: Explaining users' concentration, sleep, identity, and social relation problems. 408-435 - Calvin M. L. Chan

, Say Yen Teoh
, Adrian Yeow
, Gary Pan:
Agility in responding to disruptive digital innovation: Case study of an SME. 436-455 - Michael Siering

:
The economics of stock touting during Internet-based pump and dump campaigns. 456-483 - Aleksandre Asatiani

, Esko Penttinen
:
Constructing continuities in virtual work environments: A multiple case study of two firms with differing degrees of virtuality. 484-513 - Sean W. Hansen, Janis L. Gogan

, Ryan J. Baxter, Monica J. Garfield
:
Informed collaboration in health care: An embedded-cases study in geriatric telepsychiatry. 514-547 - Jin P. Gerlach

, Nicole Eling, Nora Wessels, Peter Buxmann:
Flamingos on a slackline: Companies' challenges of balancing the competing demands of handling customer information and privacy. 548-575
Volume 29, Number 3, May 2019
- Robert M. Davison

:
For whom do we write? 577-581
- Felix Ter Chian Tan

, Shan L. Pan, Meiyun Zuo:
Realising platform operational agility through information technology-enabled capabilities: A resource-interdependence perspective. 582-608 - Stefan K. Mueller

, Jan Mendling
, Edward W. N. Bernroider
:
The roles of social identity and dynamic salient group formations for ERP program management success in a postmerger context. 609-640 - Joseph Taylor

, K. D. Joshi:
Joining the crowd: The career anchors of information technology workers participating in crowdsourcing. 641-673 - Ned Kock

:
From composites to factors: Bridging the gap between PLS and covariance-based structural equation modelling. 674-706 - Ulrike Schultze

, Jo Ann M. Brooks:
An interactional view of social presence: Making the virtual other "real". 707-737
- Douglas P. Twitchell

, Christie M. Fuller
:
Advancing the assessment of automated deception detection systems: Incorporating base rate and cost into system evaluation. 738-761
Volume 29, Number 4, July 2019
Editorial
- Petter Nielsen

, Sundeep Sahay:
Critically studying openness: A way forward. 763-767
- Polyxeni Vassilakopoulou

, Espen Skorve, Margunn Aanestad:
Enabling openness of valuable information resources: Curbing data subtractability and exclusion. 768-786 - Caitlin M. Bentley

, Arul Chib
, Sammia C. Poveda
:
A critical narrative approach to openness: The impact of open development on structural transformation. 787-810 - Daniel Schlagwein

, Dubravka Cecez-Kecmanovic
, Benjamin Hanckel
:
Ethical norms and issues in crowdsourcing practices: A Habermasian analysis. 811-837
- Antonio Díaz-Andrade

, Angsana A. Techatassanasoontorn, Carol Ou
:
Making the developing world a better place with high-impact IS research. 838-841
- Luiz Antonio Joia

, Ricardo Paschoeto dos Santos:
ICT-equipped bank boat and the financial inclusion of the riverine population of Marajó Island in the Brazilian Amazon. 842-887 - Stan Karanasios

, Mira Slavova
:
How do development actors do "ICT for development"? A strategy-as-practice perspective on emerging practices in Ghanaian agriculture. 888-913 - Liang Li, Kui Du

, Wei Zhang
, Ji-Ye Mao:
Poverty alleviation through government-led e-commerce development in rural China: An activity theory perspective. 914-952 - Miao Cui

, Shan L. Pan, Lili Cui:
Developing community capability for e-commerce development in rural China: A resource orchestration perspective. 953-988
Volume 29, Number 5, September 2019
- Robert M. Davison

, Niels Bjørn-Andersen:
Do we care about the Societal Impact of our research?: The Tyranny of the H-Index and New Value-Oriented Research Directions. 989-993
- Shirin Madon

, Ranjini C. R.
:
Impact sourcing in India: Trends and implications. 994-1009
- Tabitha L. James

, Jason K. Deane
, Linda G. Wallace:
An application of goal content theory to examine how desired exercise outcomes impact fitness technology feature set selection. 1010-1039
- David M. Hull

, Paul Benjamin Lowry
, James E. Gaskin
, Kristijan Mirkovski:
A storyteller's guide to problem-based learning for information systems management education. 1040-1057
- David M. Murungi

, Martin Wiener
, Marco Marabelli:
Control and emotions: Understanding the dynamics of controllee behaviours in a health care information systems project. 1058-1082 - Christoph Mittendorf

, Nicholas Berente
, Roland Holten:
Trust in sharing encounters among millennials. 1083-1119
Volume 29, Number 6, November 2019
Editorial
- Gerhard Schwabe, Alexander Richter

, Erik Wende:
Special issue on storytelling and information systems. 1122-1125
- Valeriia Boldosova

:
Deliberate storytelling in big data analytics adoption. 1126-1152 - Kristijan Mirkovski

, James E. Gaskin
, David M. Hull
, Paul Benjamin Lowry
:
Visual storytelling for improving the comprehension and utility in disseminating information systems research: Evidence from a quasi-experiment. 1153-1177 - Jonas Hedman

, Mads Bødker, Gregory Gimpel
, Jan Damsgaard:
Translating evolving technology use into user stories: Technology life narratives of consumer technology use. 1178-1200
- Daniel Beverungen, Christoph F. Breidbach

, Jens Poeppelbuss, Virpi Kristiina Tuunainen
:
Smart service systems: An interdisciplinary perspective. 1201-1206
- Rocco Xaver Richard Huber, Louis Christian Püschel, Maximilian Röglinger

:
Capturing smart service systems: Development of a domain-specific modelling language. 1207-1255 - Lauri Wessel

, Elizabeth J. Davidson, Ana Paula Barquet
, Hannes Rothe
, Oliver Peters
, Herlind Megges
:
Configuration in smart service systems: A practice-based inquiry. 1256-1292

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














