


default search action
Information Systems Research, Volume 30
Volume 30, Number 1, March 2019
- Liangfei Qiu
, Huaxia Rui, Andrew B. Whinston:
Optimal Auction Design for Wi-Fi Procurement. 1-14 - Shunyuan Zhang, Param Vir Singh
, Anindya Ghose:
A Structural Analysis of the Role of Superstars in Crowdsourcing Contests. 15-33 - Lin Hao, Yong Tan
:
Who Wants Consumers to Be Informed? Facilitating Information Disclosure in a Distribution Channel. 34-49 - Nicholas Berente
, Stefan Seidel
, Hani Safadi
:
Research Commentary - Data-Driven Computationally Intensive Theory Development. 50-64 - Jiao Xu, Chris Forman
, Yu (Jeffrey) Hu
:
Battle of the Internet Channels: How Do Mobile and Fixed-Line Quality Drive Internet Use? 65-80 - Wei Chen
, Bin Gu, Qiang Ye, Kevin Xiaoguo Zhu:
Measuring and Managing the Externality of Managerial Responses to Online Customer Reviews. 81-96 - Mehmet Eren Ahsen, Mehmet U. S. Ayvaci
, Srinivasan Raghunathan
:
When Algorithmic Predictions Use Human-Generated Data: A Bias-Aware Classification Algorithm for Breast Cancer Diagnosis. 97-116 - Prasanta Bhattacharya, Tuan Quang Phan
, Xue Bai
, Edoardo M. Airoldi:
A Coevolution Model of Network Structure and User Behavior: The Case of Content Generation in Online Social Networks. 117-132 - Reza Mousavi
, Bin Gu
:
The Impact of Twitter Adoption on Lawmakers' Voting Orientations. 133-153 - Anindya Ghose
, Hyeokkoo Eric Kwon
, Dongwon Lee
, Wonseok Oh
:
Seizing the Commuting Moment: Contextual Targeting Based on Mobile Transportation Apps. 154-174 - Youngsoo Kim
, Ramayya Krishnan
:
The Dynamics of Online Consumers' Response to Price Promotion. 175-190 - Tingting Song
, Jinghua Huang
, Yong Tan
, Yifan Yu
:
Using User- and Marketer-Generated Content for Box Office Revenue Prediction: Differences Between Microblogging and Third-Party Platforms. 191-203 - Zachary R. Steelman
, Taha Havakhor
, Rajiv Sabherwal
, Sanjiv Sabherwal
:
Performance Consequences of Information Technology Investments: Implications of Emphasizing New or Current Information Technologies. 204-218 - Jason Chan
, Probal Mojumder
, Anindya Ghose
:
The Digital Sin City: An Empirical Study of Craigslist's Impact on Prostitution Trends. 219-238 - Dokyun Lee
, Kartik Hosanagar:
How Do Recommender Systems Affect Sales Diversity? A Cross-Category Investigation via Randomized Field Experiment. 239-259 - Zhijie Lin
, Ying Zhang, Yong Tan
:
An Empirical Study of Free Product Sampling and Rating Bias. 260-275 - Keongtae Kim
, Il-Horn Hann:
Crowdfunding and the Democratization of Access to Capital - An Illusion? Evidence from Housing Prices. 276-290 - Taha Havakhor
, Rajiv Sabherwal
, Zachary R. Steelman
, Sanjiv Sabherwal
:
Relationships Between Information Technology and Other Investments: A Contingent Interaction Model. 291-305 - Yu-Kai Lin
, Mingfeng Lin
, Hsinchun Chen:
Do Electronic Health Records Affect Quality of Care? Evidence from the HITECH Act. 306-318 - Anuj Kumar
, Amit Mehra
, Subodha Kumar
:
Why Do Stores Drive Online Sales? Evidence of Underlying Mechanisms from a Multichannel Retailer. 319-338
Volume 30, Number 2, June 2019
- Mingwen Yang
, Zhiqiang (Eric) Zheng, Vijay S. Mookerjee
:
Prescribing Response Strategies to Manage Customer Opinions: A Stochastic Differential Equation Approach. 351-374 - Joseph R. Buckman, Jesse C. Bockstedt
, Matthew J. Hashim
:
Relative Privacy Valuations Under Varying Disclosure Characteristics. 375-388 - Elina H. Hwang
, Param Vir Singh
, Linda Argote:
Jack of All, Master of Some: Information Network and Innovation in Crowdsourcing Communities. 389-410 - Kai Lung Hui
, Ping Fan Ke
, Yuxi Yao, Wei T. Yue
:
Bilateral Liability-Based Contracts in Information Security Outsourcing. 411-429 - Hong Guo
, Lin Hao, Tridas Mukhopadhyay
, Daewon Sun:
Selling Virtual Currency in Digital Games: Implications for Gameplay and Social Welfare. 430-446 - Rob Gleasure
, Kieran Conboy, Lorraine Morgan:
Talking Up a Storm: How Backers Use Public Discourse to Exert Control in Crowdfunded Systems Development Projects. 447-465 - Lina Bouayad
, Balaji Padmanabhan
, Kaushal Chari:
Audit Policies Under the Sentinel Effect: Deterrence-Driven Algorithms. 466-485 - Tat Koon Koh
:
Adopting Seekers' Solution Exemplars in Crowdsourcing Ideation Contests: Antecedents and Consequences. 486-506 - Weiquan Wang
, May D. Wang
:
Effects of Sponsorship Disclosure on Perceived Integrity of Biased Recommendation Agents: Psychological Contract Violation and Knowledge-Based Trust Perspectives. 507-522 - Tianshu Sun
, Lanfei Shi
, Siva Viswanathan
, Elena Zheleva:
Motivating Effective Mobile App Adoptions: Evidence from a Large-Scale Randomized Field Experiment. 523-539 - Yang Pan
, Peng Huang
, Anandasivam Gopal
:
Storm Clouds on the Horizon? New Entry Threats and R&D Investments in the U.S. IT Industry. 540-562 - Brad N. Greenwood
, Kartik K. Ganju
, Corey M. Angst
:
How Does the Implementation of Enterprise Information Systems Affect a Professional's Mobility? An Empirical Study. 563-594 - Mochen Yang
, Gediminas Adomavicius
, Alok Gupta
:
Efficient Computational Strategies for Dynamic Inventory Liquidation. 595-615 - Lizhen Xu
, Jason A. Duan
, Yu (Jeffrey) Hu
, Yuan Cheng, Yan Zhu:
Forward-Looking Behavior in Mobile Data Consumption and Targeted Promotion Design: A Dynamic Structural Model. 616-635 - Martin Eisend
:
Explaining Digital Piracy: A Meta-Analysis. 636-664 - Paul M. Leonardi
, Diane E. Bailey, Casey S. Pierce
:
The Coevolution of Objects and Boundaries over Time: Materiality, Affordances, and Boundary Salience. 665-686 - Mari Karjalainen
, Suprateek Sarker, Mikko T. Siponen
:
Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective. 687-704
Volume 30, Number 3, September 2019
- Cheng Yi, Zhenhui (Jack) Jiang
, Xiuping Li, Xianghua Lu
:
Leveraging User-Generated Content for Product Promotion: The Effects of Firm-Highlighted Reviews. 711-725 - T. Ravichandran
, Simona Ileana Giura:
Knowledge Transfers in Alliances: Exploring the Facilitating Role of Information Technology. 726-744 - Barrie R. Nault
, Steffen Zimmermann
:
Balancing Openness and Prioritization in a Two-Tier Internet. 745-763 - Poonacha K. Medappa
, Shirish C. Srivastava
:
Does Superposition Influence the Success of FLOSS Projects? An Examination of Open-Source Software Development by Organizations and Individuals. 764-786 - Yingjie Zhang
, Beibei Li
, Xueming Luo
, Xiaoyi Wang
:
Personalized Mobile Targeting with User Engagement Stages: Combining a Structural Hidden Markov Model and Field Experiment. 787-804 - Ni Huang
, Tianshu Sun
, Pei-Yu Chen
, Joseph M. Golden:
Word-of-Mouth System Implementation and Customer Conversion: A Randomized Field Experiment. 805-818 - Anuj Kumar
, Kartik Hosanagar
:
Measuring the Value of Recommendation Links on Product Demand. 819-838 - Mochen Yang
, Yuqing Ren
, Gediminas Adomavicius
:
Understanding User-Generated Content and Customer Engagement on Facebook Business Pages. 839-855 - Jeffrey D. Shulman
, Xianjun Geng
:
Does It Pay to Shroud In-App Purchase Prices? 856-871 - Sandeep Khurana, Liangfei Qiu
, Subodha Kumar
:
When a Doctor Knows, It Shows: An Empirical Analysis of Doctors' Responses in a Q&A Forum of an Online Healthcare Portal. 872-891 - Jonathan Whitaker
, Sunil Mithas
, CheWei Liu:
Beauty Is in the Eye of the Beholder: Toward a Contextual Understanding of Compensation of Information Technology Professionals Within and Across Geographies. 892-911 - Tingting Song
, Qian Tang
, Jinghua Huang
:
Triadic Closure, Homophily, and Reciprocation: An Empirical Investigation of Social Ties Between Content Providers. 912-926 - Yan Huang
, Stefanus Jasin
, Puneet Manchanda
:
"Level Up": Leveraging Skill and Engagement to Maximize Player Game-Play in Online Video Games. 927-947 - Chih-Hung Peng
, Nicholas H. Lurie
, Sandra A. Slaughter:
Using Technology to Persuade: Visual Representation Technologies and Consensus Seeking in Virtual Teams. 948-962 - Yunhui Huang
, Kai H. Lim
, Zhijie Lin
, Shunping Han:
Large Online Product Catalog Space Indicates High Store Price: Understanding Customers' Overgeneralization and Illogical Inference. 963-979 - Dominik Gutt, Philipp Herrmann, Mohammad Saifur Rahman
:
Crowd-Driven Competitive Intelligence: Understanding the Relationship Between Local Market Competition and Online Rating Distributions. 980-994 - Robert E. Crossler
, France Bélanger
:
Why Would I Use Location-Protective Settings on My Smartphone? Motivating Protective Behaviors and the Existence of the Privacy Knowledge-Belief Gap. 995-1006 - Ahmed Abbasi
, Jingjing Li, Donald A. Adjeroh, Marie Abate, Wanhong Zheng:
Don't Mention It? Analyzing User-Generated Content Signals for Early Adverse Event Warnings. 1007-1028 - Amrit Tiwana
, Stephen K. Kim
:
From Bricks to an Edifice: Cultivating Strong Inference in Information Systems Research. 1029-1036 - Dawoon Jung, Byung Cho Kim
, Myungsub Park, Detmar W. Straub:
Innovation and Policy Support for Two-Sided Market Platforms: Can Government Policy Makers and Executives Optimize Both Societal Value and Profits? 1037-1050 - Jong Seok Lee
, Mark Keil
, Eliezer Shalev:
Seeing the Trees or the Forest? The Effect of IT Project Managers' Mental Construal on IT Project Risk Management Activities. 1051-1072 - Sunghun Chung
, Animesh Animesh
, Kunsoo Han
, Alain Pinsonneault
:
Software Patents and Firm Value: A Real Options Perspective on the Role of Innovation Orientation and Environmental Uncertainty. 1073-1097
Volume 30, Number 4, December 2019
- Juan Feng
, Xin Li
, Xiaoquan (Michael) Zhang
:
Online Product Reviews-Triggered Dynamic Pricing: Theory and Evidence. 1107-1123 - Dawei (David) Zhang
, Barrie R. Nault
, Xueqi (David) Wei:
The Strategic Value of Information Technology in Setting Productive Capacity. 1124-1144 - Thomas Kude
, Sunil Mithas
, Christoph Tobias Schmidt, Armin Heinzl
:
How Pair Programming Influences Team Performance: The Role of Backup Behavior, Shared Mental Models, and Task Novelty. 1145-1163 - Angela Aerry Choi
, Daegon Cho
, Dobin Yim
, Jae Yun Moon, Wonseok Oh
:
When Seeing Helps Believing: The Interactive Effects of Previews and Reviews on E-Book Purchases. 1164-1183 - Seung Hyun Kim
, Juhee Kwon
:
How Do EHRs and a Meaningful Use Initiative Affect Breaches of Patient Information? 1184-1202 - Xueming Luo
, Xianghua Lu
, Jing Li
:
When and How to Leverage E-commerce Cart Targeting: The Relative and Moderated Effects of Scarcity and Price Incentives with a Two-Stage Field Experiment and Causal Forest Optimization. 1203-1227 - A. J. Burns
, Tom L. Roberts
, Clay Posey, Paul Benjamin Lowry
:
The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking. 1228-1247 - Xue (Jane) Tan
, Youwei Wang
, Yong Tan
:
Impact of Live Chat on Purchase in Electronic Markets: The Moderating Role of Information Cues. 1248-1271 - Che-Wei Liu
, Guodong Gordon Gao
, Ritu Agarwal
:
Unraveling the "Social" in Social Norms: The Conditioning Effect of User Connectivity. 1272-1295 - Chen Liang
, Zhan (Michael) Shi
, T. S. Raghu
:
The Spillover of Spotlight: Platform Recommendation in the Mobile App Market. 1296-1318 - Daniel Fürstenau
, Abayomi Baiyere
, Natalia Kliewer
:
A Dynamic Model of Embeddedness in Digital Infrastructures. 1319-1342 - Jinyang Zheng
, Zhengling Qi
, Yifan Dou
, Yong Tan
:
How Mega Is the Mega? Exploring the Spillover Effects of WeChat Using Graphical Model. 1343-1362 - Jorge Mejia
, Shawn Mankad
, Anandasivam Gopal
:
A for Effort? Using the Crowd to Identify Moral Hazard in New York City Restaurant Hygiene Inspections. 1363-1386 - Martin Wiener
, Magnus Mähring
, Ulrich Remus
, Carol Saunders, W. Alec Cram:
Moving IS Project Control Research into the Digital Era: The "Why" of Control and the Concept of Control Purpose. 1387-1401 - Yuliang Yao
, Martin E. Dresner, Kevin Xiaoguo Zhu:
"Monday Effect" on Performance Variations in Supply Chain Fulfillment: How Information Technology-Enabled Procurement May Help. 1402-1423 - Zhiling Guo
, Jin Li
, Ram Ramesh
:
Optimal Management of Virtual Infrastructures Under Flexible Cloud Service Agreements. 1424-1446

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.