


default search action
Journal of Management Information Systems, Volume 33
Volume 33, Number 1, 2016
- Vladimir Zwass:

Editorial Introduction. 1-10 - Niek Althuizen

, Astrid Reichel
:
The Effects of IT-Enabled Cognitive Stimulation Tools on Creative Problem Solving: A Dual Pathway to Creativity. 11-44 - Nicholas H. Roberts, Damon E. Campbell, Leo R. Vijayasarathy:

Using Information Systems to Sense Opportunities for Innovation: Integrating Postadoptive Use Behaviors with the Dynamic Managerial Capability Perspective. 45-69 - Li Zhao, Brian Detlor, Catherine E. Connelly:

Sharing Knowledge in Social Q&A Sites: The Unintended Consequences of Extrinsic Motivation. 70-100 - Amrit Tiwana, Stephen K. Kim:

Concurrent IT Sourcing: Mechanisms and Contingent Advantages. 101-138 - Anjana Susarla

, Jeong-ha (Cath) Oh, Yong Tan:
Influentials, Imitables, or Susceptibles? Virality and Word-of-Mouth Conversations in Online Social Networks. 139-170 - Xitong Li:

Could Deal Promotion Improve Merchants' Online Reputations? The Moderating Role of Prior Reviews. 171-201 - Wenqi Zhou, Wenjing Duan:

Do Professional Reviews Affect Online User Choices Through User Reviews? An Empirical Study. 202-228 - Zhenhui Jack Jiang, Weiquan Wang, Bernard C. Y. Tan, Jie Yu

:
The Determinants and Impacts of Aesthetics in Users' First Interaction with Websites. 229-259 - Zan Zhang

, Guofang Nan, Minqiang Li, Yong Tan:
Duopoly Pricing Strategy for Information Products with Premium Service: Free Product or Bundling? 260-295 - Hong Guo, Hsing Kenneth Cheng, Ken Kelley:

Impact of Network Structure on Malware Propagation: A Growth Curve Perspective. 296-325
Volume 33, Number 2, 2016
- Jay F. Nunamaker Jr., Judee K. Burgoon, Justin Scott Giboney:

Special Issue: Information Systems for Deception Detection. 327-331 - Jeffrey Gainer Proudfoot, Jeffrey L. Jenkins

, Judee K. Burgoon, Jay F. Nunamaker Jr.:
More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions. 332-360 - Nan Peter Liang, David P. Biros, Andy Luse:

An Empirical Validation of Malicious Insider Characteristics. 361-392 - Shuyuan Mary Ho, Jeffrey T. Hancock

, Cheryl Booth, Xiuwen Liu:
Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication. 393-420 - Michael Siering, Jascha-Alexander Koch, Amit V. Deokar

:
Detecting Fraudulent Behavior on Crowdfunding Platforms: The Role of Linguistic and Content-Based Cues in Static and Dynamic Contexts. 421-455 - Dongsong Zhang, Lina Zhou, Juan Luo Kehoe, Isil Yakut Kilic:

What Online Reviewer Behaviors Really Matter? Effects of Verbal and Nonverbal Behaviors on Detection of Fake Online Reviews. 456-481 - Victor A. Benjamin, Bin Zhang, Jay F. Nunamaker Jr., Hsinchun Chen:

Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities. 482-510 - Stephan Ludwig, Tom van Laer, Ko de Ruyter, Mike Friedman:

Untangling a Web of Lies: Exploring Automated Detection of Deception in Computer-Mediated Communication. 511-541
- Eric K. Clemons, Rajiv M. Dewan, Robert J. Kauffman, Thomas A. Weber

:
Special Section: When Machine Meets Society: Social Impacts of Information and Information Economics. 542-545 - Debabrata Dey

, Atanu Lahiri
:
Versioning: Go Vertical in a Horizontal Market? 546-572 - Thomas A. Weber

:
Product Pricing in a Peer-to-Peer Economy. 573-596 - Josephine Wolff:

Perverse Effects in Defense of Computer Systems: When More Is Less. 597-620
Volume 33, Number 3, 2016
- Vladimir Zwass:

Editorial Introduction. 621-623 - Panos M. Markopoulos

, Ravi Aron, Lyle H. Ungar:
Product Information Websites: Are They Good for Consumers? 624-651 - Eun Hee Park, Balasubramaniam Ramesh

, Lan Cao:
Emotion in IT Investment Decision Making with A Real Options Perspective: The Intertwining of Cognition and Regret. 652-683 - Jordan B. Barlow, Alan R. Dennis:

Not As Smart As We Think: A Study of Collective Intelligence in Virtual Groups. 684-712 - Bonnie Brinton Anderson, Anthony Vance

, C. Brock Kirwan
, Jeffrey L. Jenkins
, David Eargle:
From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It. 713-743 - Weiquan Wang, Izak Benbasat:

Empirical Assessment of Alternative Designs for Enhancing Different Types of Trusting Beliefs in Online Recommendation Agents. 744-775 - Fatemeh Zahedi, Nitin Walia, Hemant K. Jain:

Augmented Virtual Doctor Office: Theory-based Design and Assessment. 776-808 - Jaime Gómez

, Idana Salazar
, Pilar Vargas
:
Firm Boundaries, Information Processing Capacity, and Performance in Manufacturing Firms. 809-842 - Ferdinand Thies

, Michael Wessel
, Alexander Benlian
:
Effects of Social Interaction Dynamics on Platforms. 843-873 - Michael T. Lash

, Kang Zhao
:
Early Predictions of Movie Success: The Who, What, and When of Profitability. 874-903 - Ben C. F. Choi, Sung S. Kim, Zhenhui Jack Jiang:

Influence of Firm's Recovery Endeavors upon Privacy Breach on Online Customer Behavior. 904-933
Volume 33, Number 4, 2016
- Vladimir Zwass:

Editorial Introduction. 935-937
- Justin Scott Giboney, Robert O. Briggs

, Jay F. Nunamaker Jr.:
Special Issue: Designing Tools to Answer Great Information Systems Research Questions. 938-941 - Stefan Henningsson, William J. Kettinger:

Understanding Information Systems Integration Deficiencies in Mergers and Acquisitions: A Configurational Perspective. 942-977 - Xusen Cheng, Shixuan Fu

, Douglas A. Druckenmiller:
Trust Development in Globally Distributed Collaboration: A Case of U.S. and Chinese Mixed Teams. 978-1007 - Gene Moo Lee

, Liangfei Qiu
, Andrew B. Whinston:
A Friend Like Me: Modeling Network Formation in a Location-Based Social Network. 1008-1033 - Manoochehr Ghiassi, David Zimbra, Sean Lee:

Targeted Twitter Sentiment Analysis for Brands Using Supervised Feature Engineering and the Dynamic Architecture for Artificial Neural Networks. 1034-1058 - Weifeng Li

, Hsinchun Chen, Jay F. Nunamaker Jr.:
Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System. 1059-1086
- Ofir Turel

, Hamed Qahri-Saremi
:
Problematic Use of Social Networking Sites: Antecedents and Consequence from a Dual-System Theory Perspective. 1087-1116 - Eric K. Clemons, Joshua S. Wilson, Christian Matt

, Thomas Hess
, Fei Ren, Fujie Jin, Noi Sian Koh:
Global Differences in Online Shopping Behavior: Understanding Factors Leading to Trust. 1117-1148 - Paul Jen-Hwa Hu, Han-fen Hu

, Chih-Ping Wei, Pei-Fang Hsu:
Examining Firms' Green Information Technology Practices: A Hierarchical View of Key Drivers and Their Effects. 1149-1179 - Gregory S. Dawson, James S. Denford

, Clay K. Williams, David Preston, Kevin C. Desouza
:
An Examination of Effective IT Governance in the Public Sector Using the Legal View of Agency Theory. 1180-1208 - Vincent Siu-king Lai, Fujun Lai, Paul Benjamin Lowry:

Technology Evaluation and Imitation: Do They Have Differential or Dichotomous Effects on ERP Adoption and Assimilation in China? 1209-1251

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














