


default search action
Information Systems Journal, Volume 28
Volume 28, Number 1, January 2018
- Robert M. Davison
:
Editorial: Researchers and the stakeholder's perspective. 1-5
- Andrea Carugati
, Walter Fernandez
, Lapo Mola
, Cecilia Rossignoli:
My choice, your problem? Mandating IT use in large organisational networks. 6-47 - Yenni Tim
, Shan L. Pan
, Shamshul Bahri, Ali Fauzi Ahmad Khan
:
Digitally enabled affordances for community-driven environmental movement in rural Malaysia. 48-75 - Joe Peppard:
Rethinking the concept of the IS organization. 76-103 - Taha Havakhor, Amr A. Soror, Rajiv Sabherwal
:
Diffusion of knowledge in social media networks: effects of reputation mechanisms and distribution of knowledge roles. 104-141 - Riitta Hekkala, Mari-Klara Stein
, Matti Rossi:
Metaphors in managerial and employee sensemaking in an information systems project. 142-174 - Nik Rushdi Hassan, Lars Mathiassen:
Distilling a body of knowledge for information systems development. 175-226 - Ned Kock, Pierre Hadaya:
Minimum sample size estimation in PLS-SEM: The inverse square root and gamma-exponential methods. 227-261
Volume 28, Number 2, March 2018
- Robert M. Davison
:
The ethics of extended revisions. 263-265
- Robert Willison, Merrill Warkentin
, Allen C. Johnston:
Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. 266-293 - Stephen C. Wingreen
, J. Ellis Blanton:
IT professionals' person-organization fit with IT training and development priorities. 294-317 - Joyce Yi-Hui Lee, Niki Panteli, Anne Marie Bülow, Carol Hsu
:
Email adaptation for conflict handling: A case study of cross-border inter-organisational partnership in East Asia. 318-339 - Amber Grace Young
:
Using ICT for social good: Cultural identity restoration through emancipatory pedagogy. 340-358 - Yue Guo
, Yongchuan Bao, Stuart J. Barnes, Khuong Le-Nguyen:
To sell or not to sell: Exploring sellers' trust and risk of chargeback fraud in cross-border electronic commerce. 359-383 - Federico Iannacci
, Tony Cornford:
Unravelling causal and temporal influences underpinning monitoring systems success: A typological approach. 384-407 - Thomas Jensen
, Ravi Vatrapu
, Niels Bjørn-Andersen:
Avocados crossing borders: The problem of runaway objects and the solution of a shipping information pipeline for improving international trade. 408-438
Volume 28, Number 3, May 2018
Editorial
- Stan Karanasios
, David K. Allen:
Activity theory in Information Systems Research. 439-441
- Emma Forsgren
, Katriina Byström
:
Multiple social media in the workplace: Contradictions and congruencies. 442-464 - Paul Richard Kelly
:
An activity theory study of data, knowledge, and power in the design of an international development NGO impact evaluation. 465-488 - Rob Gleasure
, Lorraine Morgan
:
The pastoral crowd: Exploring self-hosted crowdfunding using activity theory and social capital. 489-515 - Reijo Miettinen, Sami Paavola
:
Reconceptualizing object construction: the dynamics of Building Information Modelling in construction design. 516-531
- Brian Nicholson
, Sundeep Sahay, Richard Heeks
:
Global sourcing and development: New drivers, models, and impacts. 532-537
- Shaji Khan, Mary C. Lacity, Erran Carmel
:
Entrepreneurial impact sourcing: a conceptual framework of social and commercial institutional logics. 538-562 - M. S. Sandeep
, M. N. Ravishankar
:
Sociocultural transitions and developmental impacts in the digital economy of impact sourcing. 563-586
Volume 28, Number 4, July 2018
- Robert M. Davison
, Monideepa Tarafdar:
Shifting baselines in information systems research threaten our future relevance. 587-591
- Boyka Simeonova
:
Transactive memory systems and Web 2.0 in knowledge sharing: A conceptual model based on activity theory and critical realism. 592-611 - Paul Beynon-Davies
:
Declarations of significance: Exploring the pragmatic nature of information models. 612-633 - Joseph Vithayathil
:
Will cloud computing make the Information Technology (IT) department obsolete? 634-649 - Hillol Bala
, Akshay Bhagwatwar
:
Employee dispositions to job and organization as antecedents and consequences of information systems use. 650-683 - Tobias Mettler
:
Contextualizing a professional social network for health care: Experiences from an action design research study. 684-707 - Magnus Mähring
, Martin Wiener
, Ulrich Remus
:
Getting the control across: Control transmission in information systems offshoring projects. 708-728 - Jacqueline Pike
, Patrick J. Bateman
, Brian S. Butler
:
Information from social networking sites: Context collapse and ambiguity in the hiring process. 729-758
Volume 28, Number 5, September 2018
- Robert M. Davison
, Antonio Díaz-Andrade:
Promoting indigenous theory. 759-764
- Thomas Kude
, Miroslav Lazic, Armin Heinzl
, Alexander Neff:
Achieving IT-based synergies through regulation-oriented and consensus-oriented IT governance capabilities. 765-795 - Devinder Thapa
, Maung K. Sein
:
Trajectory of Affordances: Insights from a case of telemedicine in Nepal. 796-817 - Mark Keil, Eun Hee Park
, Balasubramaniam Ramesh
:
Violations of health information privacy: The role of attributions and anticipated regret in shaping whistle-blowing intentions. 818-848 - James E. Gaskin
, Nicholas Berente, Kalle Lyytinen, Gregory M. Rose
:
Innovation among different classes of software development organizations. 849-878 - Niek Althuizen
:
Using structural technology acceptance models to segment intended users of a new technology: Propositions and an empirical illustration. 879-904 - Albert Boonstra
, Marjolein van Offenbeek
:
Shaping a buyer's software selection process through tendering legislation. 905-928 - Israr Qureshi
, Yulin Fang, Nicole Haggerty
, Deborah R. Compeau, Xiaojie Zhang
:
IT-mediated social interactions and knowledge sharing: Role of competence-based trust and background heterogeneity. 929-955 - David Jingjun Xu
, Izak Benbasat, Ronald T. Cenfetelli:
The outcomes and the mediating role of the functional triad: The users' perspective. 956-988
Volume 28, Number 6, November 2018
Editorial
- Eileen M. Trauth, K. D. Joshi, Lynette Kvasny
:
ISJ Editorial. 989-994
- Grace Fox
, Regina Connolly
:
Mobile health technology adoption across generations: Narrowing the digital divide. 995-1019 - Netta Iivari
, Marianne Kinnula
, Tonja Molin-Juustila, Leena Kuure
:
Exclusions in social inclusion projects: Struggles in involving children in digital technology development. 1020-1048 - Hala Annabi
, Sarah Lebovitz:
Improving the retention of women in the IT workforce: An investigation of gender diversity interventions in the USA. 1049-1081 - Deborah J. Armstrong
, Cynthia K. Riemenschneider, Laurie Giddens
:
The advancement and persistence of women in the information technology profession: An extension of Ahuja's gendered theory of IT career stages. 1082-1124
- Kathy Ning Shen
, Valerie Lindsay, Yunjie (Calvin) Xu:
Digital entrepreneurship. 1125-1128
- Liang Li, Fang Su, Wei Zhang
, Ji-Ye Mao:
Digital transformation by SME entrepreneurs: A capability perspective. 1129-1157 - Wenyu Derek Du
, Shan L. Pan
, Ning Zhou, Tao Hua Ouyang:
From a marketplace of electronics to a digital entrepreneurial ecosystem (DEE): The emergence of a meta-organization in Zhongguancun, China. 1158-1175 - Claire Ingram Bogusz
, Marcel Morisse
:
How infrastructures anchor open entrepreneurship: The case of Bitcoin and stigma. 1176-1212 - Haichao Zheng, Bo Xu
, Min Zhang, Tao Wang:
Sponsor's cocreation and psychological ownership in reward-based crowdfunding. 1213-1238 - Ferdinand Thies
, Michael Wessel
, Alexander Benlian
:
Network effects on crowdfunding platforms: Exploring the implications of relaxing input control. 1239-1262

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.