


default search action
Journal of Management Information Systems, Volume 34
Volume 34, Number 1, 2017
- Vladimir Zwass:

Editorial Introduction. 1-10 - Lu Lucy Yan, Yong Tan:

The Consensus Effect in Online Health-Care Communities. 11-39 - Jungwon Kuem

, Soumya Ray
, Mikko T. Siponen, Sung S. Kim:
What Leads to Prosocial Behaviors on Social Networking Services: A Tripartite Model. 40-70 - Zhao Pan, Yaobin Lu, Bin Wang

, Patrick Y. K. Chau:
Who Do You Think You Are? Common and Differential Effects of Social Self-Identity on Social Media Usage. 71-101 - Xin Xu

, James Y. L. Thong
, Kar Yan Tam:
Winning Back Technology Disadopters: Testing a Technology Readoption Model in the Context of Mobile Internet Services. 102-140 - Lara Khansa

, Jungwon Kuem
, Mikko T. Siponen, Sung S. Kim:
To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls. 141-176 - Shengli Li, Hsing Kenneth Cheng, Yang Duan

, Yu-Chen Yang:
A Study of Enterprise Software Licensing Models. 177-205 - Münir Tolga Akçura, Zafer D. Ozdemir

:
A Strategic Analysis of Multi-Channel Expert Services. 206-231 - Young Bong Chang, Wooje Cho:

The Risk Implications of Mergers and Acquisitions with Information Technology Firms. 232-267 - Ayoung Suh

, Christy M. K. Cheung, Manju Ahuja, Christian Wagner
:
Gamification in the Workplace: The Central Role of the Aesthetic Experience. 268-305
Volume 34, Number 2, 2017
- Vladimir Zwass:

Editorial Introduction. 307-309
- Eric K. Clemons, Rajiv M. Dewan, Robert J. Kauffman, Thomas A. Weber

:
Special Section: Technological Innovations for Communication and Collaboration in Social Spaces. 310-313 - Priyanga Gunarathne, Huaxia Rui, Abraham Seidmann:

Whose and What Social Media Complaints Have Happier Resolutions? Evidence from Twitter. 314-340 - Thomas A. Weber

:
Smart Products for Sharing. 341-368 - Sabrina Karwatzki, Olga Dytynko, Manuel Trenz, Daniel Veit

:
Beyond the Personalization-Privacy Paradox: Privacy Valuation, Transparency Features, and Service Personalization. 369-400 - Ruyi Ge, Juan Feng, Bin Gu, Pengzhu Zhang:

Predicting and Deterring Default with Social Media Information in Peer-to-Peer Lending. 401-424 - Eric K. Clemons, Rajiv M. Dewan, Robert J. Kauffman, Thomas A. Weber

:
Understanding the Information-Based Transformation of Strategy and Society. 425-456
- Alain Pinsonneault, Shamel Addas

, Christina J. Qian, Vijay Dakshinamoorthy, Robyn Tamblyn:
Integrated Health Information Technology and the Quality of Patient Care: A Natural Experiment. 457-486 - Shanshan Guo, Xitong Guo

, Yulin Fang, Doug Vogel:
How Doctors Gain Social and Economic Returns in Online Health-Care Communities: A Professional Capital Perspective. 487-519 - Hillol Bala

, Anne P. Massey, Mitzi M. Montoya:
The Effects of Process Orientations on Collaboration Technology Use and Outcomes in Product Development. 520-559 - Tabitha L. James, Paul Benjamin Lowry, Linda G. Wallace

, Merrill Warkentin
:
The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks. 560-596 - Matthew L. Jensen, Michael Dinger, Ryan T. Wright

, Jason Bennett Thatcher
:
Training to Mitigate Phishing Attacks Using Mindfulness Techniques. 597-626
Volume 34, Number 3, 2017
- Vladimir Zwass:

Editorial Introduction. 627-629
- David E. Avison, Ned Kock, Julien Malaurent:

Special Issue: Action Research in Information Systems. 630-632 - Corey Baham, Rudy Hirschheim, Andres Calderon, Victoria Kisekka:

An Agile Methodology for the Disaster Recovery of Information Systems Under Catastrophic Scenarios. 633-663 - Aaron Baird

, Elizabeth J. Davidson, Lars Mathiassen:
Reflective Technology Assimilation: Facilitating Electronic Health Record Assimilation in Small Physician Practices. 664-694 - Rajendra Singh, Vitali Mindel, Lars Mathiassen:

IT-Enabled Revenue Cycle Transformation in Resource-Constrained Hospitals: A Collaborative Digital Options Inquiry. 695-726 - Shirley Ou Yang, Carol Hsu, Suprateek Sarker, Allen S. Lee

:
Enabling Effective Operational Risk Management in a Financial Institution: An Action Research Study. 727-753 - Ned Kock, David E. Avison, Julien Malaurent:

Positivist Information Systems Action Research: Methodological Issues. 754-767
- Hyeokkoo Eric Kwon

, Wonseok Oh, Taekyung Kim
:
Platform Structures, Homing Preferences, and Homophilous Propensities in Online Social Networks. 768-802 - Carol Saunders, Martin Wiener

, Sabrina Klett, Sebastian Sprenger:
The Impact of Mental Representations on ICT-Related Overload in the Use of Mobile Phones. 803-825 - David Jingjun Xu

, Izak Benbasat, Ronald T. Cenfetelli:
A Two-Stage Model of Generating Product Advice: Proposing and Testing the Complementarity Principle. 826-862 - Paul Benjamin Lowry, Gregory D. Moody, Sutirtha Chatterjee

:
Using IT Design to Prevent Cyberbullying. 863-901 - Brent Furneaux, Michael R. Wade

:
Impediments to Information Systems Replacement: A Calculus of Discontinuance. 902-932
Volume 34, Number 4, 2017
- Vladimir Zwass:

Editorial Introduction. 933-934
- Justin Scott Giboney, Robert O. Briggs, Jay F. Nunamaker Jr.:

Special Issue: Creating Social Value with Information. 935-938 - Isabella Seeber

, Gert-Jan de Vreede
, Ronald Maier
, Barbara Weber
:
Beyond Brainstorming: Exploring Convergence in Teams. 939-969 - Steven J. Pentland, Nathan W. Twyman

, Judee K. Burgoon, Jay F. Nunamaker Jr., Christopher B. R. Diller:
A Video-Based Screening System for Automated Risk Assessment Using Nuanced Facial Features. 970-993 - Jan-Hendrik Piel, Julian F. H. Hamann

, André Koukal, Michael H. Breitner
:
Promoting the System Integration of Renewable Energies: Toward a Decision Support System for Incentivizing Spatially Diversified Deployment. 994-1022 - Sagar Samtani

, Ryan Chinn, Hsinchun Chen, Jay F. Nunamaker Jr.:
Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence. 1023-1053 - Donghui Shi

, Jian Guan, Jozef M. Zurada, Andrew S. Manikas:
A Data-Mining Approach to Identification of Risk Factors in Safety Management Systems. 1054-1081 - Chad Anderson

, Richard L. Baskerville
, Mala Kaul:
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information. 1082-1112
- Chaitanya Sambhara

, Arun Rai, Mark Keil, Vijay Kasi:
Risks and Controls in Internet-Enabled Reverse Auctions: Perspectives from Buyers and Suppliers. 1113-1142 - Andrew M. Hardin

, Clayton A. Looney, Gregory D. Moody:
Assessing the Credibility of Decisional Guidance Delivered by Information Systems. 1143-1168 - Jianxiong Huang

, Wai Fong Boh
, Kim Huat Goh
:
A Temporal Study of the Effects of Online Opinions: Information Sources Matter. 1169-1202 - Philip Menard

, Gregory Bott
, Robert E. Crossler
:
User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory. 1203-1230

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














