


default search action
Journal of Computer Information Systems, Volume 63
Volume 63, Number 1, January 2023
- Botong Xue
, Merrill Warkentin
, Leigh A. Mutchler
, Puzant Balozian
:
Self-efficacy in Information Security: A Replication Study. 1-10 - George Mangalaraj
, Sridhar P. Nerur, Rahul Dwivedi
:
Digital Transformation for Agility and Resilience: An Exploratory Study. 11-23 - Hai Dung Do
, Kun-Tan Tsai, Ju May Wen
, Shihping Kevin Huang:
Hard Skill Gap between University Education and the Robotic Industry. 24-36 - Anuj Sharma
, Alex Koohang
, Nripendra P. Rana
, Salma S. Abed, Yogesh K. Dwivedi
:
Journal of Computer Information Systems: Intellectual and Conceptual Structure. 37-67 - Karin Högberg:
Multiple Social Media in Practice - Investigating Emergent Work Practices. 68-80 - Wenhong Luo:
User Selection Strategies of Interactive Data Visualization Format. 81-93 - Claire Seungeun Lee
, Dongsim Kim
:
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea. 94-106 - Craig C. Claybaugh, Iris Reychav
, Fiona Fui-Hoon Nah:
Relational and Technological Assessment of CRM Providers: A Multifactor Study. 107-117 - Tung Cu
, James R. Van Scotter
, Helmut Schneider
:
Do Life-cycle and Generation Moderate Sentiment and Diffusion? 118-132 - Hai Wang, Shouhong Wang
:
A Semantic Model for Enterprise Digital Transformation Analysis. 133-148 - Craig Van Slyke
, William Grant Clary
, Mohamed Y. Tazkarji
:
Distress, Eustress, and Continuance Intentions for Distance Learners. 149-161 - Le Thanh Ha:
Digital Business and Economic Complexity. 162-175 - Félix A. Martín-Velicia
, José A. Folgado-Fernández
, Pedro R. Palos Sánchez
, Blanca López-Catalán
:
mWOM Business Strategies: Factors Affecting Recommendations. 176-189 - Minli Yu
, Hui Jin, Hejie Zhang, Alain Yee-Loong Chong:
ICT, Financial Development and Renewable Energy Consumption. 190-203 - Andrew Ishmael, Leila A. Halawi
:
Retention of Qualified Cybersecurity Professionals: A Qualitative Study. 204-215 - Chungwon Woo
, Jaeheung Yoo
:
Exploring the Determinants of Blockchain Acceptance for Research Data Management. 216-227 - Ho-Chang Chae, Gimun Kim, Chang E. Koh:
Impact of Privacy Behaviors on Relatedness and Well-Being in SNSs. 228-239
Volume 63, Number 2, March 2023
- Zhunzhun Liu
, Shenglin Ben
, Ruidong Zhang
:
Factors Affecting Crowdfunding Success. 241-256 - Aaron M. French
, Robert F. Otondo
, Jung P. Shim
:
Latent-Curve Modeling of Continued-Use Intentions: Near- Versus Distant-Future. 257-268 - Jeffrey P. Kaleta
, Cheryl Aasheim:
Construal of Social Relationships in Online Consumer Reviews. 269-280 - Bakthavachalam Elango
, S. Matilda
, M. Martina Jose Mary, M. Arul Pugazhendhi:
Mapping the Cybersecurity Research: A Scientometric Analysis of Indian Publications. 293-309 - Paphada Tatpornpan, Pattarawan Prasarnphanich
, Chiraphol New Chiyachantana:
Information Quality of Investment Services with Social Media. 310-321 - David C. Chou
, Houn-Gee Chen
, Binshan Lin
:
Green IT and Corporate Social Responsibility for Sustainability. 322-333 - Jean A. Pratt, Liqiang Chen, Hans F. Kishel, Abraham Y. Nahm
:
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review. 334-350 - Matthew J. Liberatore, William P. Wagner:
The Impact of Age on User Performance: A Field Experiment. 369-379 - Princely Ifinedo:
Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors. 380-396 - Martin Wilson
, Sharon McDonald
, Dominic Button
, Kenneth McGarry
:
It Won't Happen to Me: Surveying SME Attitudes to Cyber-security. 397-409 - Mary Macharia:
Cloud Computing Risk: A Decision-making Framework. 421-435 - Kaushik Ghosh, Michael S. Dohan, Hareesh Veldandi
, Monica J. Garfield:
Digital Transformation in Healthcare: Insights on Value Creation. 449-459 - Maryam Ghasemaghaei
:
Does Knowledge Sharing Belief of Data Analysts Impact Their Behavior? 460-478
Volume 63, Number 3, May 2023
- Assion Lawson-Body, Laurence Lawson-Body, Abdou Illia:
Data Visualization: Developing and Validating Dashboard Measurement Instruments. 479-491 - Yunfei Xing
, Wu He, Zuopeng Justin Zhang
, Gaohui Cao:
AI Privacy Opinions between US and Chinese People. 492-506 - Jason K. Deane
, Wade H. Baker
, Loren Paul Rees:
Cybersecurity in Supply Chains: Quantifying Risk. 507-521 - Ken Owen, Milena M. Head
:
Motivation and Demotivation of Hackers in Selecting a Hacking Task. 522-536 - Moti Zwilling
:
Big Data Challenges in Social Sciences: An NLP Analysis. 537-554 - Ahad Zareravasan, Anand Jeyaraj:
Evolution of Information Systems Business Value Research: Topic Modeling Analysis. 555-573 - Sally Rao Hill
, Graciela Corral de Zubielqui:
Managing Privacy in B2B Marketing: A Systematic Literature Review. 574-591 - Jiongbin Liu, William Yeoh, Longxiang Gao, Shang Gao
, Ojelanki K. Ngwenyama
:
Designing a Secure Blockchain-Based Supply Chain Management Framework. 592-607 - Jalpesh Vasa
, Amit Thakkar:
Deep Learning: Differential Privacy Preservation in the Era of Big Data. 608-631 - Chao Wen
, Nan (Tina) Wang
, Jiaming Fang
, Meng Huang
:
An Integrated Model of Continued M-Commerce Applications Usage. 632-647 - Huosong Xia, Duqun Lu, Boqiang Lin
, Jeretta Horn Nord
, Zuopeng Justin Zhang
:
Trust in Fintech: Risk, Governance, and Continuance Intention. 648-662 - Yabing Jiang, Thant Syn
:
Online Privacy Policy Disclosure: An Empirical Investigation. 663-680 - Xiaoni Lu, Xia Zhao, Xi Zhao:
How Does Smartphone Usage Feedback Influence Mobility Behavior? 681-694 - Ibrahim Arpaci
, Ömer Aslan
:
Development of a Scale to Measure Cybercrime-Awareness on Social Media. 695-705 - Matthew J. Liberatore, William P. Wagner:
Recursive Decision-Making: A Confirmation of Newell and Simon. 706-715 - Ignacio Fernandez De Arroyabe, Tim Watson, Olga Angelopoulou
:
Cybersecurity in the Automotive Industry: A Systematic Literature Review (SLR). 716-734 - Alex Koohang
, Jeretta Horn Nord
, Keng-Boon Ooi
, Garry Wei-Han Tan
, Mostafa Al-Emran
, Eugene Cheng-Xi Aw
, Abdullah Mohammed Baabdullah, Dimitrios Buhalis
, Tat Huei Cham
, Charles Dennis
, Vincent Dutot
, Yogesh K. Dwivedi
, Laurie Hughes, Emmanuel Mogaji
, Neeraj Pandey
, Ian Phau, Ramakrishnan Raman
, Anshuman Sharma, Marianna Sigala, Akiko Ueno
, Lai-Wan Wong
:
Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation. 735-765

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.