![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Journal of Computer Information Systems, Volume 64
Volume 64, Number 1, 2024
- Chuleeporn Changchit, Robert Cutshall
, Joseph Mollick:
A Three Country Comparative Study of Social Commerce Adoption. 1-16 - Kane J. Smith:
Bad Employees: Examining Deviant Security Behaviors. 17-30 - Sahar Farshadkhah, Michele Maasberg, T. Selwyn Ellis, Craig Van Slyke
:
An Empirical Examination of Employee Information Security Advice Sharing. 31-46 - Yogesh Mungra, Ritu Srivastava
, Anuj Sharma
, Diptiman Banerji
, Neela Gollapudi:
Impact of Digital Competence on Employees' Flourishing Through Basic Psychological Needs Satisfaction. 47-61 - Rathika Palanisamy
, Azah Anir Norman
, Miss Laiha Mat Kiah
:
Employees' BYOD Security Policy Compliance in the Public Sector. 62-77 - Gaurav Bansal, Zhuoli Axelton:
Impact of Cybersecurity Disclosures on Stakeholder Intentions. 78-91 - Yasir Afaq, Ankush Manocha:
Blockchain and Deep Learning Integration for Various Application: A Review. 92-105 - T. N. Nisha
, Dhanya Pramod
:
Insider Intrusion Detection Techniques: A State-of-the-Art Review. 106-123 - Carol Springer Sargent
, Jennifer L. Breese
:
Blockchain Barriers in Supply Chain: A Literature Review. 124-135 - Arun Amaithi Rajan
, V. Vetriselvi
:
Systematic Survey: Secure and Privacy-Preserving Big Data Analytics in Cloud. 136-156 - Richard McGregor, Carmen Reaiche, Stephen Boyle, Graciela Corral de Zubielqui:
Cyberspace and Personal Cyber Insurance: A Systematic Review. 157-171
Volume 64, Number 2, 2024
- Sujeet Kumar Sharma, Yogesh K. Dwivedi
, Santosh K. Misra, Nripendra P. Rana
:
Conjoint Analysis of Blockchain Adoption Challenges in Government. 173-186 - Jiwat Ram
:
Using Social Media in Projects: Information Management Challenges and Recommendations. 187-203 - Sandip Rakshit
, Anand Jeyaraj, Tripti Paul
:
SME Performance Through Blockchain Technologies. 204-218 - Dae-Kyoo Kim, Yeasun K. Chung:
Addressing Class Imbalances in Software Defect Detection. 219-231 - Sophia Xiaoxia Duan
, Hepu Deng
, Santoso Wibowo
:
Technology Affordances for Enhancing Job Performance in Digital Work. 232-244 - Tat Huei Cham
, Boon Liat Cheng, Eugene Cheng-Xi Aw
, Garry Wei-Han Tan
, Xiu-Ming Loh, Keng-Boon Ooi
:
Counteracting the Impact of Online Fake News on Brands. 245-264 - Smita Dange
, Prashant Nitnaware:
Secure Share: Optimal Blockchain Integration in IoT Systems. 265-277 - Amy H. Harris, Carol Clark:
Understanding the Diffusion of Business Analysis Responsibilities. 278-288 - Anna Górska
, Pawel Korzynski
, Grzegorz Mazurek
:
The Effects of USR and Its Communication on Faculty Satisfaction. 289-300 - Fatemeh Shapouri
, Kerry Ward, Tenace Setor:
Determinants of Software as a Service (SaaS) Adoption. 301-313 - Purnima Naik, Salomi Nelaballi, Venkata Sai Pusuluri, Dae-Kyoo Kim:
Deep Learning-Based Code Refactoring: A Review of Current Knowledge. 314-328
Volume 64, Number 3, 2024
- David C. Chou
, Binshan Lin:
Social Entrepreneurship Success: Relevance to Social Mediating Technologies. 329-341 - Neelesh Kumar Mishra
, Alok Raj, Anand Jeyaraj, Riya Gupta:
Antecedents and Outcomes of Blockchain Technology Adoption: Meta-Analysis. 342-359 - Cheuk Hang (Allen) Au, Wen Shou Hsu, Po-Hsu Shieh, Lin Yue:
Can Stablecoins Foster Cryptocurrencies Adoption? 360-369 - Aruna Polisetty
, Debarun Chakraborty
, Sowmya G
, Arpan Kumar Kar
, Subhajit Pahari
:
What Determines AI Adoption in Companies? Mixed-Method Evidence. 370-387 - Sihem Ben Sassi
, Nacim Yanes
:
Data Science with Semantic Technologies: Application to Information Systems Development. 388-407 - Galit Klein
, Moti Zwilling
:
The Weakest Link: Employee Cyber-Defense Behaviors While Working from Home. 408-422 - Nan (Tina) Wang, Weijun Zheng, Wenbo Zhang:
Management Emotion and Firm's Strategic IT Investment Propensity. 423-437 - Zhunzhun Liu
, Ruidong Zhang:
An Empirical Study on Herd Behavior in Cryptocurrency Trading. 438-452 - Kalyan Prasad Agrawal
, Ashis K. Pani, Anuj Sharma
, Nripendra P. Rana:
Process Virtualization Goes Mainstream: Diving into its Normalization. 453-468
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.