


default search action
Journal of Information Systems, Volume 33
Volume 33, Number 1, Spring 2019
- Roger S. Debreceny, Tawei Wang

, Mi (Jamie) Zhou
:
Research in Social Media: Data Sources and Methodologies. 1-28 - Travis P. Holt

, Tina M. Loraas
:
Using Qualtrics Panels to Source External Auditors: A Replication Study. 29-41 - Nicholas C. Hunt

, Andrea M. Scheetz:
Using MTurk to Distribute a Survey or Experiment: Methodological Considerations. 43-65 - Khondkar E. Karim, Karen Jingrong Lin, Robert E. Pinsker

, Hongwei Zhu:
Using Linguistics to Mine Unstructured Data from FASB Exposure Drafts. 67-83 - Chih Hao Ku

, Maryam Firoozi
:
The Use of Crowdsourcing and Social Media in Accounting Research. 85-111 - Joel Owens

, Erin M. Hawkins:
Using Online Labor Market Participants for Nonprofessional Investor Research: A Comparison of MTurk and Qualtrics Samples. 113-128 - Jay C. Thibodeau, L. Tyler Williams

, Annie L. Witte:
Point and Click Data: An Assessment of Editorial Perceptions and Recommendations for the Peer-Review Process in the New Data Frontier. 129-144 - Michael Chuancai Zhang

, Dan N. Stone
, Hong Xie
:
Text Data Sources in Archival Accounting Research: Insights and Strategies for Accounting Systems' Scholars. 145-180
Volume 33, Number 2, June 2019
- John A. Barrick, Nathan W. Mecham, Scott L. Summers

, David A. Wood
:
Ranking Accounting Journals by Topical Area and Methodology. 1-22 - Gary Chen

, Jie Zhou
:
XBRL Adoption and Systematic Information Acquisition via EDGAR. 23-43 - Yu Cong, Ayishat Omar, Huey-Lian Sun:

Does IT Outsourcing Affect the Accuracy and Speed of Financial Disclosures? Evidence from Preparer-Side XBRL Filing Decisions. 45-61 - David R. Fordham, Carol W. Hamilton:

Accounting Information Technology in Small Businesses: An Inquiry. 63-75 - Peter C. Kipp

, Yibo James Zhang, Amanuel F. Tadesse
:
Can Social Media Interaction and Message Features Influence Nonprofessional Investors' Perceptions of Firms? 77-98 - Lijun (Gillian) Lei, Yutao Li, Yan Luo

:
Social Media and Voluntary Nonfinancial Disclosure: Evidence from Twitter Presence and Corporate Political Disclosure. 99-128 - Margarita M. Lenk, John Peter Krahel, Diane J. Janvrin

, Brett Considine
:
Social Technology: An Integrated Strategy and Risk Management Framework. 129-153 - Robert Marley

, Neal M. Snow
:
An Empirical Investigation on Social Media Users' Demand for Financial Information Distributed via Social Media Platforms. 155-175 - Thomas J. Smith

, Julia L. Higgs
, Robert E. Pinsker
:
Do Auditors Price Breach Risk in Their Audit Fees? 177-204 - Michael Werner

, Nick Gehrke:
Identifying the Absence of Effective Internal Controls: An Alternative Approach for Internal Control Audits. 205-222
Volume 33, Number 3, Fall 2019
- Antoinette L. Smith, Yibo James Zhang

, Peter C. Kipp
:
Cloud-Computing Risk Disclosure and ICFR Material Weakness: The Moderating Role of Accounting Reporting Complexity. 1-17 - Melvin A. Lamboy-Ruiz

, Won Gyun No
, Olena V. Watanabe
:
Discrepancies in Hospital Financial Information: Comparison of Financial Data in State Data Repositories and the Healthcare Cost Reporting Information System. 19-44 - Dan Ionita

, Roel J. Wieringa, Jaap Gordijn
, Ahmed Seid Yesuf:
Quantitative, Value-Driven Risk Analysis of e-Services. 45-60 - Feiqi Huang, Won Gyun No

, Miklos A. Vasarhelyi
:
Do Managers Use Extension Elements Strategically in the SEC's Tagged Data for Financial Statements? Evidence from XBRL Complexity. 61-74 - Tien-Shih Hsieh, Zhihong Wang, Mohammad Abdolmohammadi:

Factors Associated with Companies' Choices of XBRL Implementation Strategies: Evidence from the U.S. Market. 75-91 - Lei Gao

, Alisa G. Brink
:
A Content Analysis of the Privacy Policies of Cloud Computing Services. 93-115 - Nishani Edirisinghe Vincent

, Julia L. Higgs
, Robert E. Pinsker
:
Board and Management-Level Factors Affecting the Maturity of IT Risk Management Practices. 117-135 - Daniel E. O'Leary

:
Facilitating Citizens' Voice and Process Reengineering Using a Cloud-Based Mobile App. 137-162 - Xu (Joyce) Cheng

, Stephanie Walton
:
Do Nonprofessional Investors Care About How and When Data Breaches are Disclosed? 163-182 - Michele L. Frank

, Jonathan H. Grenier
, Jonathan S. Pyzoha
:
How Disclosing a Prior Cyberattack Influences the Efficacy of Cybersecurity Risk Management Reporting and Independent Assurance. 183-200 - Michael Curry, Byron Marshall

, John Correia, Robert E. Crossler:
InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior. 201-225 - Vernon J. Richardson

, Rodney E. Smith, Marcia Weidenmier Watson:
Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches. 227-265 - Howard Xu, Savannah (Yuanyaun) Guo, Jacob Z. Haislip

, Robert E. Pinsker
:
Earnings Management in Firms with Data Security Breaches. 267-284 - Daniel E. O'Leary

:
What Phishing E-mails Reveal: An Exploratory Analysis of Phishing Attempts Using Text Analysis. 285-307 - Rajiv D. Banker, Cecilia (Qian) Feng

:
The Impact of Information Security Breach Incidents on CIO Turnover. 309-329

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














