


default search action
Journal of Computer Information Systems, Volume 60
Volume 60, Number 1, 2020
- Alex Koohang, Alojzy Nowak, Joanna Paliszkiewicz

, Jeretta Horn Nord
:
Information Security Policy Compliance: Leadership, Trust, Role Values, and Awareness. 1-8 - Tomasz Kijek

, Marek Angowski
, Adam Skrzypek
:
Millennials Use of Social Media in Product Innovation Purchasing Processes. 9-17 - Martin D. Hassell

, Moez Limayem:
Media Impacts and Performance in Dispersed Teams. 18-25 - Li Qin:

A Cross-Cultural Study of Interpersonal Trust in Social Commerce. 26-33 - George Mangalaraj, Anand Jeyaraj, Edmund L. Prater:

Differential effects on assimilation stages for supply chain management information systems. 34-48 - Alireza Moayedikia, William Yeoh

, Kok-Leong Ong, Yee Ling Boo
:
Framework and Literature Analysis for Crowdsourcing's Answer Aggregation. 49-60 - Ofir Turel

, Zhengchuan Xu, Ken H. Guo:
Organizational Citizenship Behavior Regarding Security: Leadership Approach Perspective. 61-75 - Sally Rao Hill

, Indrit Troshani, Dezri Chandrasekar:
Signalling Effects of Vlogger Popularity on Online Consumers. 76-84 - Melinda Korzaan, Amy H. Harris:

Understanding Predictors of Over-Optimism in IS Project Teams. 85-92 - Natalie Gerhart:

Generalizing stopping rule research: Development of scales. 93-100
Volume 60, Number 2, 2020
- Jeretta Horn Nord

, Susana de Juana Espinosa
, Joanna Paliszkiewicz
, Magdalena Madra-Sawicka
:
Do technology and social media preferences differ with age? A study of the use of social technologies for business purposes in Spain. 101-112 - Yuan Li

, Kuo-Chung Chang, Jingguo Wang
:
Self-Determination and Perceived Information Control in Cloud Storage Service. 113-123 - Quynh N. Nguyen

, Anna Sidorova
:
Organizational Identification and User Responses to Online Organization Criticism. 124-135 - Ester Gonzalez

, Sinjini Mitra
, Ofir Turel
:
Motivational Impacts on Intent to Use Health-Related Social Media. 136-145 - Zhaohao Sun

, Kenneth David Strang
, Francisca Pambel:
Privacy and security in the big data paradigm. 146-155 - Kyeongjin Park, Meuel Jeong, Kyungdoh Kim

:
Usability evaluation of menu interfaces for smartwatches. 156-165 - Ruidong Zhang:

The impacts of cloud computing architecture on cloud service performance. 166-174 - Guy Janssens, Linda van Moorst, Rob J. Kusters

, Harry Martin:
An expert-based taxonomy of ERP implementation activities. 175-183 - Trisha T. C. Lin

, John Robert Bautista
:
Content-related factors influence perceived value of location-based mobile advertising. 184-193 - Jeannie L. Pridmore

, Joy Godin
:
Investigation of virtual teams and serious games. 194-200
Volume 60, Number 3, 2020
- Sadaf Hina

, P. Dhanapal Durai Dominic:
Information security policies' compliance: a perspective for higher education institutions. 201-211
- Ilyoo Barry Hong

:
Predicting user-level marketing performance of location-based social networking sites. 212-222 - John D'Ambra, Concepción S. Wilson, Shahriar Akter

:
Continuance of E-Textbook Use by Tertiary Students: A Qualitative Approach. 223-232 - Richard W. C. Lui, Cheuk Hang (Allen) Au

:
I.S. educational game: Adoption in teaching search engine optimization (SEO). 233-243 - Vess Johnson

, Angelina I. T. Kiser, Leon A. Kappelman:
Women in IT Management: Significant Gains and Continuing Challenges. 244-255 - Assion Lawson-Body, Lori Willoughby, Laurence Lawson-Body, Eric Matofam Tamandja:

Students' acceptance of E-books: An application of UTAUT. 256-267 - Stoney L. Brooks, W. Jeff Clark, Carol Clark, Stanley E. Gambill:

The Information Systems name game revisited: Still muddled 20 years later. 268-273 - Xihui Zhang

, John D. Crabtree, Mark G. Terwilliger, Tyler T. Redman:
Assessing Students' Object-Oriented Programming Skills with Java: The "Department-Employee" Project. 274-286 - Catherine Chen, Haoqiang Jiang:

Important Skills for Data Scientists in China: Two Delphi Studies. 287-296
Volume 60, Number 4, 2020
- Aaron Zimba

, Zhaoshun Wang, Mwenge Mulenga, Nickson Herbert Odongo:
Crypto Mining Attacks in Information Systems: An Emerging Threat to Cyber Security. 297-308 - Malgorzata Karpinska-Krakowiak

, Artur Modlinski
:
Popularity of Branded Content in Social Media. 309-315 - Jingquan Li

:
A Service-Oriented Model for Personal Health Records. 316-325 - Catherine Prentice

, Xuequn Wang
, Xiaolin Lin:
An Organic Approach to Customer Engagement and Loyalty. 326-335 - Khawaja A. Saeed:

Mobile Services as a Means to Control: An Empirical Assessment. 336-346 - Xiaodie Pu, Zhengxu Wang, Felix Tung Sun Chan

:
Leveraging Open E-Logistic Standards to Achieve Ambidexterity in Supply Chain. 347-358 - Lakshman Mahadevan

, Jeffrey P. Kaleta
:
Free Wi-Fi: To Buy or Not to Buy. 359-369 - Daniel Adomako Asamoah

, Derek Doran, Shu Schiller:
Interdisciplinarity in Data Science Pedagogy: A Foundational Design. 370-377 - Anna Rohunen, Jouni Markkula, Marikka Heikkilä

, Markku Oivo:
Explaining Diversity and Conflicts in Privacy Behavior Models. 378-393
Volume 60, Number 5, 2020
- Maryam Ghasemaghaei:

Improving Organizational Performance Through the Use of Big Data. 395-408 - Xiaolin Li, Fujun Lai, Yang Yuan

, Dongqing Yao, Baojun Yang:
Understanding Adoption and Continuance of Online Direct Sales Channel. 409-417 - Peiqin Zhang, Yong Ge, Hsun-Ming Lee:

E-WOM's Impact on App Development. 418-427 - Sasa Baskarada, Vivian Nguyen, Andy Koronios:

Architecting Microservices: Practical Opportunities and Challenges. 428-436 - Xuequn Wang

, Tanya Jane McGill
, Jane E. Klobas
:
I Want It Anyway: Consumer Perceptions of Smart Home Devices. 437-447 - Wei-Hsi Hung, Chih-Lang Tseng, Chin-Fu Ho, Chung-Cheng Wu:

How Social Impact Affects Smartphone Brand Loyalty. 448-458 - Chin-Lung Hsu, Judy Chuan-Chuan Lin:

Examining Social Networking O2O Apps User Loyalty. 459-467 - Tao Hu, Kai-Yu Wang, Wen-Hai Chih, Xiu-Hua Yang:

Trade off Cybersecurity Concerns for Co-Created Value. 468-483 - Chuleeporn Changchit, Tim Klaus, Ravi Lonkani, Jomjai Sampet:

A Cultural Comparative Study of Mobile Banking Adoption Factors. 484-494
Volume 60, Number 6, 2020
- Efpraxia D. Zamani

, Ying He
, Matthew Phillips:
On the Security Risks of the Blockchain. 495-506 - Mobark Q. Aldossari

, Anna Sidorova:
Consumer Acceptance of Internet of Things (IoT): Smart Home Context. 507-517 - Melina Seedoyal Doargajudhur

, Peter Dell
:
The Effect of Bring Your Own Device (BYOD) Adoption on Work Performance and Motivation. 518-529 - Dong Kyoon Yoo

, Sunyoung Cho
:
Role of Habit and Value Perceptions on m-Learning Outcomes. 530-540 - Xiang Guo

, Brian J. Reithel:
Information-Processing Support Index: A New Perspective on IT Usage. 541-554 - Au Vo

, Christopher Yost-Bremm:
A High-Frequency Algorithmic Trading Strategy for Cryptocurrency. 555-568 - Jonathan Whitaker

, Mayuram S. Krishnan, Claes Fornell, Forrest V. Morgeson III
:
How Does Customer Service Offshoring Impact Customer Satisfaction? 569-582 - Trisha T. C. Lin

, Anastasia Kononova
, Yi-Hsuan Chiang:
Screen Addiction and Media Multitasking among American and Taiwanese Users. 583-592 - Nik Thompson

, Xuequn Wang
, Pratiq Daya:
Determinants of News Sharing Behavior on Social Media. 593-601

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














