default search action
Search dblp for Publications
export results for "toc:db/journals/db/db51.bht:"
@article{DBLP:journals/db/AbayomiZPZ20, author = {Owolabi Justine Abayomi and Xuehe Zhang and Xiaobao Peng and Shuliang Zhao}, title = {How Do Institutional Pressures and Behavioral Intentions Affect Mobile Services Adoption?: The Moderating Role of Perceived Risk}, journal = {Data Base}, volume = {51}, number = {2}, pages = {82--100}, year = {2020}, url = {https://doi.org/10.1145/3400043.3400049}, doi = {10.1145/3400043.3400049}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/AbayomiZPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/Aguirre-UrretaR20, author = {Miguel I. Aguirre{-}Urreta and Mikko R{\"{o}}nkk{\"{o}} and Jiang Hu}, title = {Polynomial Regression and Measurement Error: Implications for Information Systems Research}, journal = {Data Base}, volume = {51}, number = {3}, pages = {55--80}, year = {2020}, url = {https://doi.org/10.1145/3410977.3410981}, doi = {10.1145/3410977.3410981}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/Aguirre-UrretaR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/AivazpourR20, author = {Zahra Aivazpour and V. Srinivasan (Chino) Rao}, title = {Information Disclosure and Privacy Paradox: The Role of Impulsivity}, journal = {Data Base}, volume = {51}, number = {1}, pages = {14--36}, year = {2020}, url = {https://doi.org/10.1145/3380799.3380803}, doi = {10.1145/3380799.3380803}, timestamp = {Wed, 16 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/AivazpourR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/Alter20, author = {Steven Alter}, title = {The Philosopher's Corner: Taking Different Types of Knowledge Objects Seriously: {A} Step toward Generating Greater Value from {IS} Research}, journal = {Data Base}, volume = {51}, number = {4}, pages = {123--138}, year = {2020}, url = {https://doi.org/10.1145/3433148.3433155}, doi = {10.1145/3433148.3433155}, timestamp = {Wed, 16 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/Alter20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/Armstrong20, author = {Deborah J. Armstrong}, title = {We've Only Just Begun}, journal = {Data Base}, volume = {51}, number = {1}, pages = {9--10}, year = {2020}, url = {https://doi.org/10.1145/3380799.3380801}, doi = {10.1145/3380799.3380801}, timestamp = {Wed, 16 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/Armstrong20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/Armstrong20a, author = {Deborah J. Armstrong}, title = {Introduction}, journal = {Data Base}, volume = {51}, number = {3}, pages = {11--12}, year = {2020}, url = {https://doi.org/10.1145/3410977.3410979}, doi = {10.1145/3410977.3410979}, timestamp = {Wed, 16 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/Armstrong20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/BeckerMH20, author = {Moritz Becker and Christian Matt and Thomas Hess}, title = {It's Not Just About the Product: How Persuasive Communication Affects the Disclosure of Personal Health Information}, journal = {Data Base}, volume = {51}, number = {1}, pages = {37--50}, year = {2020}, url = {https://doi.org/10.1145/3380799.3380804}, doi = {10.1145/3380799.3380804}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/BeckerMH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/Cuellar20, author = {Michael J. Cuellar}, title = {The Philosopher's Corner: Beyond Epistemology and Methodology - {A} Plea for a Disciplined Metatheoretical Pluralism}, journal = {Data Base}, volume = {51}, number = {2}, pages = {101--112}, year = {2020}, url = {https://doi.org/10.1145/3400043.3400050}, doi = {10.1145/3400043.3400050}, timestamp = {Wed, 16 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/Cuellar20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/DanielJDR20, author = {Sherae L. Daniel and Shadi Janansefat and E. Ilana Diamant and Yuqing Ren}, title = {Single- and Double-Loop Learning: Linking Free/Libre Open Source Software {(FLOSS)} Developer Motivation, Contribution, and Turnover Intentions}, journal = {Data Base}, volume = {51}, number = {4}, pages = {68--92}, year = {2020}, url = {https://doi.org/10.1145/3433148.3433153}, doi = {10.1145/3433148.3433153}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/DanielJDR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/DarbanP20, author = {Mehdi Darban and Greta L. Polites}, title = {Why Is It Hard to Fight Herding?: The Roles of User and Technology Attributes}, journal = {Data Base}, volume = {51}, number = {4}, pages = {93--122}, year = {2020}, url = {https://doi.org/10.1145/3433148.3433154}, doi = {10.1145/3433148.3433154}, timestamp = {Wed, 16 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/DarbanP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/GersterDBK20, author = {Daniel Gerster and Christian Dremel and Walter Brenner and Prashant Kelker}, title = {How Enterprises Adopt Agile Forms of Organizational Design: {A} Multiple-Case Study}, journal = {Data Base}, volume = {51}, number = {1}, pages = {84--103}, year = {2020}, url = {https://doi.org/10.1145/3380799.3380807}, doi = {10.1145/3380799.3380807}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/GersterDBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/HackelUV20, author = {Bj{\"{o}}rn H{\"{a}}ckel and Jochen {\"{U}}belh{\"{o}}r and Christian Voit}, title = {Creating Competitive Advantage in E-Business Value Chains by Using Excess Capacity via IT-enabled Marketplaces}, journal = {Data Base}, volume = {51}, number = {3}, pages = {97--118}, year = {2020}, url = {https://doi.org/10.1145/3410977.3410983}, doi = {10.1145/3410977.3410983}, timestamp = {Wed, 16 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/HackelUV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/HarborthP20, author = {David Harborth and Sebastian Pape}, title = {How Privacy Concerns, Trust and Risk Beliefs, and Privacy Literacy Influence Users' Intentions to Use Privacy-Enhancing Technologies: The Case of Tor}, journal = {Data Base}, volume = {51}, number = {1}, pages = {51--69}, year = {2020}, url = {https://doi.org/10.1145/3380799.3380805}, doi = {10.1145/3380799.3380805}, timestamp = {Wed, 16 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/HarborthP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/HerathHD20, author = {Tejaswini C. Herath and Hemantha S. B. Herath and John D'Arcy}, title = {Organizational Adoption of Information Security Solutions: An Integrative Lens Based on Innovation Adoption and the Technology- Organization- Environment Framework}, journal = {Data Base}, volume = {51}, number = {2}, pages = {12--35}, year = {2020}, url = {https://doi.org/10.1145/3400043.3400046}, doi = {10.1145/3400043.3400046}, timestamp = {Wed, 16 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/HerathHD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/JenkinSC20, author = {Tracy A. Jenkin and David B. Skillicorn and Yolande E. Chan}, title = {Novel Information Discovery and Collaborative Filtering to Support Group Creativity}, journal = {Data Base}, volume = {51}, number = {4}, pages = {40--67}, year = {2020}, url = {https://doi.org/10.1145/3433148.3433152}, doi = {10.1145/3433148.3433152}, timestamp = {Wed, 16 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/JenkinSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/MenonS20, author = {Nirup M. Menon and Mikko T. Siponen}, title = {Executives' Commitment to Information Security: Interaction between the Preferred Subordinate Influence Approach {(PSIA)} and Proposal Characteristics}, journal = {Data Base}, volume = {51}, number = {2}, pages = {36--53}, year = {2020}, url = {https://doi.org/10.1145/3400043.3400047}, doi = {10.1145/3400043.3400047}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/MenonS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/RaymondPM20, author = {Louis Raymond and Guy Par{\'{e}} and {\'{E}}ric Maillet}, title = {Enabling Laboratory Medicine in Primary Care Through {IT} Systems Use}, journal = {Data Base}, volume = {51}, number = {1}, pages = {70--83}, year = {2020}, url = {https://doi.org/10.1145/3380799.3380806}, doi = {10.1145/3380799.3380806}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/RaymondPM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/RiedlFLD20, author = {Ren{\'{e}} Riedl and Thomas Fischer and Pierre{-}Majorique L{\'{e}}ger and Fred D. Davis}, title = {A Decade of NeuroIS Research: Progress, Challenges, and Future Directions}, journal = {Data Base}, volume = {51}, number = {3}, pages = {13--54}, year = {2020}, url = {https://doi.org/10.1145/3410977.3410980}, doi = {10.1145/3410977.3410980}, timestamp = {Wed, 16 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/RiedlFLD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/RutschiD20, author = {Corinna Rutschi and Jens Dibbern}, title = {Towards a Framework of Implementing Software Robots: Transforming Human-executed Routines into Machines}, journal = {Data Base}, volume = {51}, number = {1}, pages = {104--128}, year = {2020}, url = {https://doi.org/10.1145/3380799.3380808}, doi = {10.1145/3380799.3380808}, timestamp = {Wed, 16 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/RutschiD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/SerenkoT20, author = {Alexander Serenko and Ofir Turel}, title = {Directing Technology Addiction Research in Information Systems: Part I. Understanding Behavioral Addictions}, journal = {Data Base}, volume = {51}, number = {3}, pages = {81--96}, year = {2020}, url = {https://doi.org/10.1145/3410977.3410982}, doi = {10.1145/3410977.3410982}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/SerenkoT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/Stafford20, author = {Tom Stafford}, title = {Metaphilosophical Musings}, journal = {Data Base}, volume = {51}, number = {2}, pages = {10--11}, year = {2020}, url = {https://doi.org/10.1145/3400043.3400045}, doi = {10.1145/3400043.3400045}, timestamp = {Wed, 16 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/Stafford20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/Stafford20a, author = {Tom Stafford}, title = {Uncommon Method Bias}, journal = {Data Base}, volume = {51}, number = {4}, pages = {8--10}, year = {2020}, url = {https://doi.org/10.1145/3433148.3433150}, doi = {10.1145/3433148.3433150}, timestamp = {Wed, 16 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/Stafford20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/TejayP20, author = {Gurvirender Tejay and Souren Paul}, title = {Special Issue Introduction: Desperately Seeking the Information in Information Systems Research at {HICSS} 2019}, journal = {Data Base}, volume = {51}, number = {1}, pages = {11--13}, year = {2020}, url = {https://doi.org/10.1145/3380799.3380802}, doi = {10.1145/3380799.3380802}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/TejayP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/WeinertMLW20, author = {Christoph Weinert and Christian Maier and Sven Laumer and Tim Weitzel}, title = {{IS} Reappraisal and Technology Adaptation Behaviors: {A} Longitudinal Study During an {IS} Implementation}, journal = {Data Base}, volume = {51}, number = {4}, pages = {11--39}, year = {2020}, url = {https://doi.org/10.1145/3433148.3433151}, doi = {10.1145/3433148.3433151}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/WeinertMLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/WolvertonC20, author = {Colleen Carraher Wolverton and Ronald T. Cenfetelli}, title = {An Exploration of the Drivers of Non- Adoption Behavior: {A} Discriminant Analysis Approach}, journal = {Data Base}, volume = {51}, number = {2}, pages = {54--81}, year = {2020}, url = {https://doi.org/10.1145/3400043.3400048}, doi = {10.1145/3400043.3400048}, timestamp = {Wed, 16 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/WolvertonC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.