


default search action
MIS Quarterly, Volume 33
Volume 33, Number 1, March 2009
- Gerald C. Kane, Robert G. Fichman:

The Shoemaker's Children: Using Wikis for Information Systems Teaching, Research, and Publication. 1-17 
- Wenjing Duan, Bin Gu, Andrew B. Whinston:

Informational Cascades and Software Adoption on the Internet: An Empirical Investigation. 23-48 - Sung S. Kim, Jai-Yeol Son:

Out of Dedication or Constraint? A Dual Model of Post-Adoption Phenomena and its Empirical Test in the Context of Online Services. 49-70 - Huigang Liang, Yajiong Xue:

Avoidance of Information Technology Threats: A Theoretical Perspective. 71-90 - Venugopal Balijepally, RadhaKanta Mahapatra, Sridhar P. Nerur, Kenneth H. Price:

Are Two Heads Better than One for Software Development? The Productivity Paradox of Pair Programming. 91-118 - Jahyun Goo, Rajiv Kishore, H. Raghav Rao, Kichan Nam:

The Role of Service Level Agreements in Relational Management of Information Technology Outsourcing: An Empirical Study. 119-145 - Norman A. Johnson, Randolph B. Cooper:

Power and Concession in Computer-Mediated Negotiations: An Examination of First Offers. 147-170 
- Martin Wetzels, Gaby Odekerken-Schröder, Claudia van Oppen:

Using PLS Path Modeling for Assessing Hierarchial Construct Models: Guidelines and Impirical Illustration. 177-195 - Israr Qureshi, Deborah Compeau:

Assessing Between-Group Differences in Information Systems Research: A Comparison of Covariance-and Component-Based SEM. 197-214 
Volume 33, Number 2, June 2009
- Grandon Gill, Anol Bhattacherjee:

Whom Are We Informing? Issues and Recommendations for MIS Research from an Informing Science Perspective. 217-235 
- Allen S. Lee, Geoffrey S. Hubona:

A Scientific Basis for Rigor in Information Systems Research. 237-262 
- Anindya Ghose:

Internet Exchanges for Used Goods: An Empirical Analysis of Trade Patterns and Adverse Selection. 263-291 - Weiquan Wang, Izak Benbasat:

Interactive Decision Aids for Consumer Decision Making in E-Commerce: The Influence of Perceived Strategy Restrictiveness. 203-320 - Michael D. Smith, Rahul Telang:

Competing with Free: The Impact of Movie Broadcasts on DVD Sales and Internet Piracy. 321-338 - Corey M. Angst, Ritu Agarwal:

Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion. 339-370 - Tracy Ann Sykes, Viswanath Venkatesh, Sanjay Gosain:

Model of Acceptance with Peer Support: A Social Network Perspective to Understand Employees' System Use. 371-393 
- Jiming Wu, Albert L. Lederer:

A Meta-Analysis of the Role of Environment-Based Voluntariness in Information Technology Acceptance. 419-432 
- Ned Kock:

Information Systems Theorizing Based on Evolutionary Psychology: An Interdisciplinary Review and Theory Integration Framework. 395-418 
Volume 33, Number 4, December 2009
- Richard L. Baskerville, Michael D. Myers:

Fashion Waves in Information Systems Research and Practice. 647-662 - Mary J. Culnan, Cynthia Clark Williams:

How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches. 673-687 
- Ronald T. Cenfetelli, Geneviève Bassellier:

Interpretation of Formative Measurement in Information Systems Research. 689-708 
- Ping Wang, Neil C. Ramiller:

Community Learning in Information Technology Innovation. 709-734 - Richard Klein, Arun Rai:

Interfirm Strategic Information Flows in Logistics Supply Chain Relationships. 735-762 - Ravi Bapna, Seokjoo Andrew Chang, Paulo B. Góes, Alok Gupta:

Overlapping Online Auctions: Empirical Characterization of Bidder Strategies and Auction Prices. 763-783 - Charalambos L. Iacovou, Ronald L. Thompson, H. Jeff Smith:

Selective Status Reporting in Information Systems Projects: A Dyadic-Level Investigation. 785-810 
- Gary Klein, James J. Jiang, Paul H. Cheney:

Resolving Difference Score Issues in Information Systems Research. 811-826 - Ryad Titah, Henri Barki:

Nonlinearities Between Attitude and Subjective Norms in Information Technology Acceptance: A Negative Synergy? 827-844 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














