default search action
European Journal of Information Systems, Volume 25
Volume 25, Number 1, January 2016
- Mari-Klara Stein, Robert D. Galliers, Edgar A. Whitley:
Twenty years of the European information systems academy at ECIS: emergent trends and research topics. 1-15
- Maurizio Naldi, Loretta Mastroeni:
Economic decision criteria for the migration to cloud storage. 16-28 - Alena Audzeyeva, Robert Hudson:
How to get the most from a business intelligence application during the post implementation phase? Deep structure transformation at a U.K. retail bank. 29-46 - Joeri van Laere, Lena Aggestam:
Understanding champion behaviour in a health-care information system development project - how multiple champions and champion behaviours build a coherent whole. 47-63 - Ela Klecun:
Transforming healthcare: policy discourses of IT and patient-centred care. 64-76
- John R. Venable, Jan Pries-Heje, Richard L. Baskerville:
FEDS: a Framework for Evaluation in Design Science Research Open. 77-89
Volume 25, Number 2, March 2016
- Michael Foth:
Factors influencing the intention to comply with data protection regulations in hospitals: based on gender differences in behaviour and deterrence. 91-109 - Stephen Burgess:
Representing small business web presence content: the web presence pyramid model. 110-130 - Zhen Shao, Yuqiang Feng, Qing Hu:
Effectiveness of top management support in enterprise systems success: a contingency perspective of fit between leadership style and system life-cycle. 131-153 - W. Alec Cram, Sue Newell:
Mindful revolution or mindless trend? Examining agile development as a management fashion. 154-169 - Susan A. Brown, Anne P. Massey, Kerry W. Ward:
Handle mergers and acquisitions with care: the fragility of trust between the IT-service provider and end-users. 170-186
Volume 25, Number 3, May 2016
- Murray Scott, William H. DeLone, William Golden:
Measuring eGovernment success: a public value approach. 187-208 - Douglas A. Battleson, Barry C. West, Jongwoo Kim, Balasubramaniam Ramesh, Pamela S. Robinson:
Achieving dynamic capabilities with cloud computing: an empirical investigation. 209-230 - Allen C. Johnston, Merrill Warkentin, Maranda E. McBride, Lemuria D. Carter:
Dispositional and situational factors: influences on information security policy violations. 231-251 - Dan Jong Kim, Myung-Seong Yim, Vijayan Sugumaran, H. Raghav Rao:
Web assurance seal services, trust and consumers' concerns: an investigation of e-commerce transaction intentions across two nations. 252-273 - Matthias Söllner, Axel Hoffmann, Jan Marco Leimeister:
Why different trust relationships matter for information systems users. 274-287
Volume 25, Number 4, July 2016
- Oliver Müller, Iris A. Junglas, Jan vom Brocke, Stefan Debortoli:
Utilizing big data analytics for information systems research: challenges, promises and guidelines. 289-302 - Björn Niehaves, Kevin Ortbach:
The inner and the outer model in explanatory design theory: the case of designing electronic feedback systems. 303-316 - Sven Laumer, Christian Maier, Andreas Eckhardt, Tim Weitzel:
Work routines as an object of resistance during information systems implementations: theoretical foundation and empirical evidence. 317-343 - Anastasia Utesheva, Jason R. Simpson, Dubravka Cecez-Kecmanovic:
Identity metamorphoses in digital disruption: a relational theory of identity. 344-363 - Bonnie Brinton Anderson, Anthony Vance, C. Brock Kirwan, David Eargle, Jeffrey L. Jenkins:
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study. 364-390
Volume 25, Number 5, September 2016
- Norman A. Johnson, Randolph B. Cooper, Richard D. Holowczak:
The impact of media on how positive, negative, and neutral communicated affect influence unilateral concessions during negotiations. 391-410 - Matthias Lange, Jan Mendling, Jan Recker:
An empirical analysis of the factors and measures of Enterprise Architecture Management success. 411-431 - Ofir Turel:
Untangling the complex role of guilt in rational decisions to discontinue the use of a hedonic Information System. 432-447 - Gregory Vial, Suzanne Rivard:
A process explanation of the effects of institutional distance between parties in outsourced information systems development projects. 448-464 - Ann-Frances Cameron, Jane Webster, Henri Barki, Ana Ortiz de Guinea:
Four common multicommunicating misconceptions. 465-471
Volume 25, Number 6, November 2016
- Dov Te'eni:
Contextualization and problematization, gamification and affordance: a traveler's reflections on EJIS. 473-476 - Gabriele Piccoli:
Triggered essential reviewing: the effect of technology affordances on service experience evaluations. 477-492 - Guy Paré, Mary Tate, David Johnstone, Spyros Kitsiou:
Contextualizing the twin concepts of systematicity and transparency in information systems literature reviews. 493-508 - Yong Liu, Hongxiu Li, Jorge Gonçalves, Vassilis Kostakos, Bei Xiao:
Fragmentation or cohesion? Visualizing the process and consequences of information system diversity, 1993-2012. 509-533 - Arno L. P. Nuijten, Mark Keil, Harry R. Commandeur:
Collaborative partner or opponent: How the messenger influences the deaf effect in IT projects. 534-552 - Bernhard R. Katzy, Gordon Sung, Kevin Crowston:
Alignment in an inter-organisational network: the case of ARC transistance. 553-568
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.