


default search action
Information Systems Research, Volume 26
Volume 26, Number 1, March 2015
- Niam Yaraghi

, Anna Ye Du, Raj Sharman, Ram D. Gopal
, Ram Ramesh:
Health Information Exchange as a Multisided Platform: Adoption, Usage, and Practice Involvement in Service Co-Production. 1-18 - Indranil R. Bardhan, Jeong-ha (Cath) Oh, Zhiqiang (Eric) Zheng, Kirk Kirksey:

Predictive Analytics for Readmission of Patients with Congestive Heart Failure. 19-39 - Panos Constantinides

, Michael I. Barrett:
Information Infrastructure Development and Governance as Collective Action. 40-56 - Robert Wayne Gregory

, Mark Keil, Jan Muntermann, Magnus Mähring
:
Paradoxes and the Nature of Ambidexterity in IT Transformation Programs. 57-80 - Ying Liu, Ravi Aron:

Organizational Control, Incentive Contracts, and Knowledge Transfer in Offshore Business Process Outsourcing. 81-99 - Karen Ruckman

, Nilesh Saraf, Vallabh Sambamurthy:
Market Positioning by IT Service Vendors Through Imitation. 100-126 - Rohit Aggarwal, David Kryscynski

, Vishal Midha, Harpreet Singh
:
Early to Adopt and Early to Discontinue: The Impact of Self-Perceived and Actual IT Knowledge on Technology Use Behaviors of End Users. 127-144 - Damien Joseph

, Soon Ang, Sandra Slaughter:
Turnover or Turnaway? Competing Risks Analysis of Male and Female IT Professionals' Job Mobility and Relative Pay Gap. 145-164 - Steven L. Johnson

, Hani Safadi
, Samer Faraj
:
The Emergence of Online Community Leadership. 165-187 - Gautam Pant, Olivia R. Liu Sheng:

Web Footprints of Firms: Using Online Isomorphism for Competitor Identification. 188-209 - Onook Oh, Chanyoung Eom, H. Raghav Rao:

Research Note - Role of Social Media in Social Change: An Analysis of Collective Sense Making During the 2011 Egypt Revolution. 210-223 - Sebastian Spaeth

, Georg von Krogh
, Fang He
:
Research Note - Perceived Firm Attributes and Intrinsic Motivation in Sponsored Open Source Software Projects. 224-237
Volume 26, Number 2, June 2015
- Foster J. Provost, David Martens, Alan Murray:

Finding Similar Mobile Consumers with a Privacy-Friendly Geosocial Design. 243-265 - Amrit Tiwana:

Evolutionary Competition in Platform Ecosystems. 266-281 - Jack Shih-Chieh Hsu, Sheng-Pao Shih, Yu Wen Hung, Paul Benjamin Lowry:

The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness. 282-300 - Gaurav Sabnis, Rajdeep Grewal:

Cable News Wars on the Internet: Competition and User-Generated Content. 301-319 - Frago Kourandi, Jan Krämer, Tommaso M. Valletti:

Net Neutrality, Exclusivity Contracts, and Internet Fragmentation. 320-338 - Amy Wenxuan Ding, Shibo Li, Patrali Chatterjee:

Learning User Real-Time Intent for Optimal Dynamic Web Page Transformation. 339-359 - Dan Ma

, Abraham Seidmann:
Analyzing Software as a Service with Per-Transaction Charges. 360-378 - Kiron Ravindran

, Anjana Susarla
, Deepa Mani, Vijay Gurbaxani:
Social Capital and Contract Duration in Buyer-Supplier Networks for Information Technology Outsourcing. 379-397 - One-Ki (Daniel) Lee, Vallabh Sambamurthy, Kai H. Lim

, Kwok Kee Wei:
How Does IT Ambidexterity Impact Organizational Agility? 398-417 - Yu Tong, Sharon Swee-Lin Tan, Hock-Hai Teo:

The Road to Early Success: Impact of System Use in the Swift Response Phase. 418-436 - Barney Tan

, Cheng Yi, Hock Chuan Chan:
Research Note - Deliberation Without Attention: The Latent Benefits of Distracting Website Features for Online Purchase Decisions. 437-455 - Zheyin (Jane) Gu, Giri Kumar Tayi:

Research Note - Investigating Firm Strategies on Offering Consumer-Customizable Products. 456-468
Volume 26, Number 3, September 2015
- Ritu Agarwal, Amrit Tiwana:

Editorial - Evolvable Systems: Through the Looking Glass of IS. 473-479
- Dawei (David) Zhang, Zhuo (June) Cheng, Hasan A. Qurban H. Mohammad, Barrie R. Nault

:
Research Commentary - Information Technology Substitution Revisited. 480-495 - Lu Lucy Yan, Jianping Peng, Yong Tan:

Network Dynamics: How Can We Find Patients Like Us? 496-512 - Hailiang Chen

, Prabuddha De, Yu (Jeffrey) Hu:
IT-Enabled Broadcasting in Social Media: An Empirical Study of Artists' Activities and Music Sales. 513-531 - Abhijeet Ghoshal, Syam Menon

, Sumit Sarkar
:
Recommendations Using Information from Multiple Association Rules: A Probabilistic Approach. 532-551 - Zheng Fang, Bin Gu, Xueming Luo, Yunjie Xu:

Contemporaneous and Delayed Sales Impact of Location-Based Mobile Promotions. 552-564 - Sabyasachi Mitra, Sam Ransbotham:

Information Disclosure and the Diffusion of Information Security Attacks. 565-584
- Hanna Krasnova, Thomas Widjaja

, Peter Buxmann, Helena Wenninger
, Izak Benbasat:
Research Note - Why Following Friends Can Hurt You: An Exploratory Investigation of the Effects of Envy on Social Networking Sites among College-Age Users. 585-605 - Kai Lung Hui

, Ivan P. L. Png:
Research Note - Migration of Service to the Internet: Evidence from a Federal Natural Experiment. 606-618 - Jingguo Wang

, Nan Xiao, H. Raghav Rao:
Research Note - An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior. 619-633
Volume 26, Number 4, December 2015
- Ritu Agarwal:

Editorial Notes. 637-638
- Tamara Dinev, Allen R. McConnell

, H. Jeff Smith:
Research Commentary - Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the "APCO" Box. 639-655
- Amrit Tiwana, Stephen K. Kim:

Discriminating IT Governance. 656-674 - Ben C. F. Choi, Zhenhui Jack Jiang, Bo Xiao, Sung S. Kim:

Embarrassing Exposures in Online Social Networks: An Integrated Perspective of Privacy Invasion and Relationship Bonding. 675-694 - Ashish Agarwal, Kartik Hosanagar, Michael D. Smith

:
Do Organic Results Help or Hurt Sponsored Search Performance? 695-713 - Yabing Jiang, Hong Guo:

Design of Consumer Review Systems and Product Pricing. 714-730 - Shivendu Shivendu, Zhe (James) Zhang:

Versioning in the Software Industry: Heterogeneous Disutility from Underprovisioning of Functionality. 731-753 - Min Chen

, Varghese S. Jacob, Suresh Radhakrishnan, Young U. Ryu
:
Can Payment-per-Click Induce Improvements in Click Fraud Identification Technologies? 754-772 - Chee Wei Phang, Atreyi Kankanhalli, Bernard C. Y. Tan:

What Motivates Contributors vs. Lurkers? An Investigation of Online Feedback Forums. 773-792 - Bo Xiao, Izak Benbasat:

Designing Warning Messages for Detecting Biased Online Product Recommendations: An Empirical Investigation. 793-811
- Brad N. Greenwood

, Anandasivam Gopal
:
Research Note - Tigerblood: Newspapers, Blogs, and the Founding of Information Technology Firms. 812-828 - Kui Du

:
Research Note - Parenting New Acquisitions: Acquirers' Digital Resource Redeployment and Targets' Performance Improvement in the U.S. Hospital Industry. 829-844 - Vidyanand Choudhary

, Zhe (James) Zhang:
Research Note - Patching the Cloud: The Impact of SaaS on Patching Strategy and the Timing of Software Release. 845-858 - Oliver Hinz, Martin Spann

, Il-Horn Hann:
Research Note - Can't Buy Me Love...Or Can I? Social Capital Attainment Through Conspicuous Consumption in Virtual Environments. 859-870

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














