


default search action
Journal of Management Information Systems, Volume 29
Volume 29, Number 1, Summer 2012
- Vladimir Zwass:

Editorial Introduction. 5-14 - Amrit Tiwana:

Novelty-Knowledge Alignment: A Theory of Design Convergence in Systems Development. 15-52 - Jong Seok Lee, Mark Keil, Vijay Kasi:

The Effect of an Initial Budget and Schedule Goal on Software Project Escalation. 53-78 - Likoebe M. Maruping

, Massimo Magni
:
What's the Weather Like? The Effect of Team Learning Climate, Empowerment Climate, and Gender on Individuals' Technology Exploration and Use. 79-114 - Shirish C. Srivastava, Thompson SianHin Teo:

Contract Performance in Offshore Systems Development: Role of Control Mechanisms. 115-158 - Samuel Otim, Kevin E. Dow

, Varun Grover, Jeffrey A. Wong:
The Impact of Information Technology Investments on Downside Risk of the Firm: Alternative Measurement of the Business Value of IT. 159-194 - Mei Lin

, Xuqing Ke, Andrew B. Whinston:
Vertical Differentiation and a Comparison of Online Advertising Models. 195-236 - Alexander Benlian

, Ryad Titah, Thomas Hess
:
Differential Effects of Provider Recommendations and Consumer Reviews in E-Commerce Transactions: An Experimental Study. 237-272 - Zhongyun Zhou, Yulin Fang, Douglas R. Vogel, Xiaoling Jin, Xi Zhang

:
Attracted to or Locked In? Predicting Continuance Intention in Social Virtual World Services. 273-306 - Zeying Wan, Deborah Compeau, Nicole Haggerty

:
The Effects of Self-Regulated Learning Processes on E-Learning Outcomes in Organizational Settings. 307-340 - Geng Cui

, Man Leung Wong, Xiang Wan:
Cost-Sensitive Learning via Priority Sampling to Improve the Return on Marketing and CRM Investment. 341-374
Volume 29, Number 2, Fall 2012
- Vladimir Zwass:

Editorial Introduction. 5-6
- Robert J. Kauffman, Thomas A. Weber

, Dongjun Wu:
Special Section: Information and Competitive Strategy in a Networked Economy. 7-10 - Xiaoquan (Michael) Zhang, Chong (Alex) Wang

:
Network Positions and Contributions to Online Public Goods: The Case of Chinese Wikipedia. 11-40 - Qian Candy Tang, Bin Gu, Andrew B. Whinston:

Content Contribution for Revenue Sharing and Reputation in Social Media: A Dynamic Structural Model. 41-76 - Debabrata Dey, Atanu Lahiri, Guoying Zhang:

Hacker Behavior, Network Effects, and the Security Software Market. 77-108 - Ravi Mantena

, Rajib L. Saha
:
Co-opetition Between Differentiated Platforms in Two-Sided Markets. 109-140
- Li Chen, James R. Marsden, Zhongju Zhang:

Theory and Analysis of Company-Sponsored Value Co-Creation. 141-172 - Xiao Fang, Paul Jen-Hwa Hu, Michael Chau

, Han-fen Hu
, Zhuo Yang, Olivia R. Liu Sheng:
A Data-Driven Approach to Measure Web Site Navigability. 173-212 - Arun Rai, Mark Keil, Rob Hornyak, Kim Wüllenweber:

Hybrid Relational-Contractual Governance for Business Process Outsourcing. 213-256 - Corey M. Angst

, Sarv Devaraj, John D'Arcy:
Dual Role of IT-Assisted Communication in Patient Care: A Validated Structure-Process-Outcome Framework. 257-292 - Aaron Baird

, Michael F. Furukawa, T. S. Raghu:
Understanding Contingencies Associated with the Early Adoption of Customer-Facing Web Portals. 293-324 - Nianxin Wang

, Huigang Liang
, Weijun Zhong, Yajiong Xue, Jinghua Xiao:
Resource Structuring or Capability Building? An Empirical Study of the Business Value of Information Technology. 325-367
Volume 29, Number 3, Winter 2013
- Vladimir Zwass:

Editorial Introduction. 5-8 - Massimo Magni

, Corey M. Angst
, Ritu Agarwal:
Everybody Needs Somebody: The Influence of Team Network Structure on Information Technology Use. 9-42 - Monica J. Garfield, Alan R. Dennis:

Toward an Integrated Model of Group Development: Disruption of Routines by Technology-Induced Change. 43-86 - Ofer Arazy, Ian R. Gellatly:

Corporate Wikis: The Effects of Owners' Motivation and Behavior on Group Members' Engagement. 87-116 - Kai Lung Hui

, Wendy Hui
, Wei T. Yue
:
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement. 117-156 - Yan Chen

, K. Ram Ramamurthy, Kuang-Wei Wen:
Organizations' Information Security Policy Compliance: Stick or Carrot Approach? 157-188 - Xia Zhao, Ling Xue:

Competitive Target Advertising and Consumer Data Sharing. 189-222 - Yinping Yang

, Sharad Singhal, Yunjie Calvin Xu:
Alternate Strategies for a Win-Win Seeking Agent in Agent-Human Negotiations. 223-256 - Weiling Ke, Chuan-Hoo Tan

, Choon-Ling Sia
, Kwok-Kee Wei
:
Inducing Intrinsic Motivation to Explore the Enterprise System: The Supremacy of Organizational Levers. 257-290 - Xuefei (Nancy) Deng, Lei Chi:

Understanding Postadoptive Behaviors in Information Systems Use: A Longitudinal Analysis of System Use Problems in the Business Intelligence Context. 291-326 - Gimun Kim

, Bongsik Shin
, Ohbyung Kwon:
Investigating the Value of Sociomaterialism in Conceptualizing IT Capability of a Firm. 327-362
Volume 29, Number 4, Spring 2013
- Vladimir Zwass:

Editorial Introduction. 5-6 - Stacie Petter

, William H. DeLone, Ephraim R. McLean:
Information Systems Success: The Quest for the Independent Variables. 7-62 - Alexander Benlian

:
Effect Mechanisms of Perceptual Congruence Between Information Systems Professionals and Users on Satisfaction with Service. 63-96
- Robert O. Briggs

, Jay F. Nunamaker Jr.:
Special Issue: Multiple Dimensions of Value in Information Systems. 97-102 - Alina Dulipovici, Daniel Robey:

Strategic Alignment and Misalignment of Knowledge Management Systems: A Social Representation Perspective. 103-126 - Shu Han, Jason Nicholas Kuruzovich, T. Ravichandran

:
Service Expansion of Product Firms in the Information Technology Industry: An Empirical Study. 127-158 - Robert O. Briggs

, Gwendolyn L. Kolfschoten, Gert-Jan de Vreede
, Stephan G. Lukosch
, Conan C. Albrecht:
Facilitator-in-a-Box: Process Support Applications to Help Practitioners Realize the Potential of Collaboration Technology. 159-194 - Alan R. Dennis, Randall K. Minas

, Akshay Bhagwatwar:
Sparking Creativity: Improving Electronic Brainstorming with Individual Cognitive Priming. 195-216 - Stefan Stieglitz, Linh Dang-Xuan:

Emotions and Information Diffusion in Social Media - Sentiment of Microblogs and Sharing Behavior. 217-248 - Aaron C. Elkins

, Norah E. Dunbar
, Bradley J. Adame
, Jay F. Nunamaker Jr.:
Are Users Threatened by Credibility Assessment Systems? 249-262 - Anthony Vance

, Paul Benjamin Lowry, Dennis Eggett:
Using Accountability to Reduce Access Policy Violations in Information Systems. 263-290

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














