default search action
Information Systems Journal, Volume 28
Volume 28, Number 1, January 2018
- Robert M. Davison:
Editorial: Researchers and the stakeholder's perspective. 1-5
- Andrea Carugati, Walter Fernandez, Lapo Mola, Cecilia Rossignoli:
My choice, your problem? Mandating IT use in large organisational networks. 6-47 - Yenni Tim, Shan L. Pan, Shamshul Bahri, Ali Fauzi Ahmad Khan:
Digitally enabled affordances for community-driven environmental movement in rural Malaysia. 48-75 - Joe Peppard:
Rethinking the concept of the IS organization. 76-103 - Taha Havakhor, Amr A. Soror, Rajiv Sabherwal:
Diffusion of knowledge in social media networks: effects of reputation mechanisms and distribution of knowledge roles. 104-141 - Riitta Hekkala, Mari-Klara Stein, Matti Rossi:
Metaphors in managerial and employee sensemaking in an information systems project. 142-174 - Nik Rushdi Hassan, Lars Mathiassen:
Distilling a body of knowledge for information systems development. 175-226 - Ned Kock, Pierre Hadaya:
Minimum sample size estimation in PLS-SEM: The inverse square root and gamma-exponential methods. 227-261
Volume 28, Number 2, March 2018
- Robert M. Davison:
The ethics of extended revisions. 263-265
- Robert Willison, Merrill Warkentin, Allen C. Johnston:
Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. 266-293 - Stephen C. Wingreen, J. Ellis Blanton:
IT professionals' person-organization fit with IT training and development priorities. 294-317 - Joyce Yi-Hui Lee, Niki Panteli, Anne Marie Bülow, Carol Hsu:
Email adaptation for conflict handling: A case study of cross-border inter-organisational partnership in East Asia. 318-339 - Amber Grace Young:
Using ICT for social good: Cultural identity restoration through emancipatory pedagogy. 340-358 - Yue Guo, Yongchuan Bao, Stuart J. Barnes, Khuong Le-Nguyen:
To sell or not to sell: Exploring sellers' trust and risk of chargeback fraud in cross-border electronic commerce. 359-383 - Federico Iannacci, Tony Cornford:
Unravelling causal and temporal influences underpinning monitoring systems success: A typological approach. 384-407 - Thomas Jensen, Ravi Vatrapu, Niels Bjørn-Andersen:
Avocados crossing borders: The problem of runaway objects and the solution of a shipping information pipeline for improving international trade. 408-438
Volume 28, Number 3, May 2018
Editorial
- Stan Karanasios, David K. Allen:
Activity theory in Information Systems Research. 439-441
- Emma Forsgren, Katriina Byström:
Multiple social media in the workplace: Contradictions and congruencies. 442-464 - Paul Richard Kelly:
An activity theory study of data, knowledge, and power in the design of an international development NGO impact evaluation. 465-488 - Rob Gleasure, Lorraine Morgan:
The pastoral crowd: Exploring self-hosted crowdfunding using activity theory and social capital. 489-515 - Reijo Miettinen, Sami Paavola:
Reconceptualizing object construction: the dynamics of Building Information Modelling in construction design. 516-531
- Brian Nicholson, Sundeep Sahay, Richard Heeks:
Global sourcing and development: New drivers, models, and impacts. 532-537
- Shaji Khan, Mary C. Lacity, Erran Carmel:
Entrepreneurial impact sourcing: a conceptual framework of social and commercial institutional logics. 538-562 - M. S. Sandeep, M. N. Ravishankar:
Sociocultural transitions and developmental impacts in the digital economy of impact sourcing. 563-586
Volume 28, Number 4, July 2018
- Robert M. Davison, Monideepa Tarafdar:
Shifting baselines in information systems research threaten our future relevance. 587-591
- Boyka Simeonova:
Transactive memory systems and Web 2.0 in knowledge sharing: A conceptual model based on activity theory and critical realism. 592-611 - Paul Beynon-Davies:
Declarations of significance: Exploring the pragmatic nature of information models. 612-633 - Joseph Vithayathil:
Will cloud computing make the Information Technology (IT) department obsolete? 634-649 - Hillol Bala, Akshay Bhagwatwar:
Employee dispositions to job and organization as antecedents and consequences of information systems use. 650-683 - Tobias Mettler:
Contextualizing a professional social network for health care: Experiences from an action design research study. 684-707 - Magnus Mähring, Martin Wiener, Ulrich Remus:
Getting the control across: Control transmission in information systems offshoring projects. 708-728 - Jacqueline Pike, Patrick J. Bateman, Brian S. Butler:
Information from social networking sites: Context collapse and ambiguity in the hiring process. 729-758
Volume 28, Number 5, September 2018
- Robert M. Davison, Antonio Díaz-Andrade:
Promoting indigenous theory. 759-764
- Thomas Kude, Miroslav Lazic, Armin Heinzl, Alexander Neff:
Achieving IT-based synergies through regulation-oriented and consensus-oriented IT governance capabilities. 765-795 - Devinder Thapa, Maung K. Sein:
Trajectory of Affordances: Insights from a case of telemedicine in Nepal. 796-817 - Mark Keil, Eun Hee Park, Balasubramaniam Ramesh:
Violations of health information privacy: The role of attributions and anticipated regret in shaping whistle-blowing intentions. 818-848 - James E. Gaskin, Nicholas Berente, Kalle Lyytinen, Gregory M. Rose:
Innovation among different classes of software development organizations. 849-878 - Niek Althuizen:
Using structural technology acceptance models to segment intended users of a new technology: Propositions and an empirical illustration. 879-904 - Albert Boonstra, Marjolein van Offenbeek:
Shaping a buyer's software selection process through tendering legislation. 905-928 - Israr Qureshi, Yulin Fang, Nicole Haggerty, Deborah R. Compeau, Xiaojie Zhang:
IT-mediated social interactions and knowledge sharing: Role of competence-based trust and background heterogeneity. 929-955 - David Jingjun Xu, Izak Benbasat, Ronald T. Cenfetelli:
The outcomes and the mediating role of the functional triad: The users' perspective. 956-988
Volume 28, Number 6, November 2018
Editorial
- Eileen M. Trauth, K. D. Joshi, Lynette Kvasny:
ISJ Editorial. 989-994
- Grace Fox, Regina Connolly:
Mobile health technology adoption across generations: Narrowing the digital divide. 995-1019 - Netta Iivari, Marianne Kinnula, Tonja Molin-Juustila, Leena Kuure:
Exclusions in social inclusion projects: Struggles in involving children in digital technology development. 1020-1048 - Hala Annabi, Sarah Lebovitz:
Improving the retention of women in the IT workforce: An investigation of gender diversity interventions in the USA. 1049-1081 - Deborah J. Armstrong, Cynthia K. Riemenschneider, Laurie Giddens:
The advancement and persistence of women in the information technology profession: An extension of Ahuja's gendered theory of IT career stages. 1082-1124
- Kathy Ning Shen, Valerie Lindsay, Yunjie (Calvin) Xu:
Digital entrepreneurship. 1125-1128
- Liang Li, Fang Su, Wei Zhang, Ji-Ye Mao:
Digital transformation by SME entrepreneurs: A capability perspective. 1129-1157 - Wenyu Derek Du, Shan L. Pan, Ning Zhou, Tao Hua Ouyang:
From a marketplace of electronics to a digital entrepreneurial ecosystem (DEE): The emergence of a meta-organization in Zhongguancun, China. 1158-1175 - Claire Ingram Bogusz, Marcel Morisse:
How infrastructures anchor open entrepreneurship: The case of Bitcoin and stigma. 1176-1212 - Haichao Zheng, Bo Xu, Min Zhang, Tao Wang:
Sponsor's cocreation and psychological ownership in reward-based crowdfunding. 1213-1238 - Ferdinand Thies, Michael Wessel, Alexander Benlian:
Network effects on crowdfunding platforms: Exploring the implications of relaxing input control. 1239-1262
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.