default search action
Journal of Computer Information Systems, Volume 64
Volume 64, Number 1, 2024
- Chuleeporn Changchit, Robert Cutshall, Joseph Mollick:
A Three Country Comparative Study of Social Commerce Adoption. 1-16 - Kane J. Smith:
Bad Employees: Examining Deviant Security Behaviors. 17-30 - Sahar Farshadkhah, Michele Maasberg, T. Selwyn Ellis, Craig Van Slyke:
An Empirical Examination of Employee Information Security Advice Sharing. 31-46 - Yogesh Mungra, Ritu Srivastava, Anuj Sharma, Diptiman Banerji, Neela Gollapudi:
Impact of Digital Competence on Employees' Flourishing Through Basic Psychological Needs Satisfaction. 47-61 - Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah:
Employees' BYOD Security Policy Compliance in the Public Sector. 62-77 - Gaurav Bansal, Zhuoli Axelton:
Impact of Cybersecurity Disclosures on Stakeholder Intentions. 78-91 - Yasir Afaq, Ankush Manocha:
Blockchain and Deep Learning Integration for Various Application: A Review. 92-105 - T. N. Nisha, Dhanya Pramod:
Insider Intrusion Detection Techniques: A State-of-the-Art Review. 106-123 - Carol Springer Sargent, Jennifer L. Breese:
Blockchain Barriers in Supply Chain: A Literature Review. 124-135 - Arun Amaithi Rajan, V. Vetriselvi:
Systematic Survey: Secure and Privacy-Preserving Big Data Analytics in Cloud. 136-156 - Richard McGregor, Carmen Reaiche, Stephen Boyle, Graciela Corral de Zubielqui:
Cyberspace and Personal Cyber Insurance: A Systematic Review. 157-171
Volume 64, Number 2, 2024
- Sujeet Kumar Sharma, Yogesh K. Dwivedi, Santosh K. Misra, Nripendra P. Rana:
Conjoint Analysis of Blockchain Adoption Challenges in Government. 173-186 - Jiwat Ram:
Using Social Media in Projects: Information Management Challenges and Recommendations. 187-203 - Sandip Rakshit, Anand Jeyaraj, Tripti Paul:
SME Performance Through Blockchain Technologies. 204-218 - Dae-Kyoo Kim, Yeasun K. Chung:
Addressing Class Imbalances in Software Defect Detection. 219-231 - Sophia Xiaoxia Duan, Hepu Deng, Santoso Wibowo:
Technology Affordances for Enhancing Job Performance in Digital Work. 232-244 - Tat Huei Cham, Boon Liat Cheng, Eugene Cheng-Xi Aw, Garry Wei-Han Tan, Xiu-Ming Loh, Keng-Boon Ooi:
Counteracting the Impact of Online Fake News on Brands. 245-264 - Smita Dange, Prashant Nitnaware:
Secure Share: Optimal Blockchain Integration in IoT Systems. 265-277 - Amy H. Harris, Carol Clark:
Understanding the Diffusion of Business Analysis Responsibilities. 278-288 - Anna Górska, Pawel Korzynski, Grzegorz Mazurek:
The Effects of USR and Its Communication on Faculty Satisfaction. 289-300 - Fatemeh Shapouri, Kerry Ward, Tenace Setor:
Determinants of Software as a Service (SaaS) Adoption. 301-313 - Purnima Naik, Salomi Nelaballi, Venkata Sai Pusuluri, Dae-Kyoo Kim:
Deep Learning-Based Code Refactoring: A Review of Current Knowledge. 314-328
Volume 64, Number 3, 2024
- David C. Chou, Binshan Lin:
Social Entrepreneurship Success: Relevance to Social Mediating Technologies. 329-341 - Neelesh Kumar Mishra, Alok Raj, Anand Jeyaraj, Riya Gupta:
Antecedents and Outcomes of Blockchain Technology Adoption: Meta-Analysis. 342-359 - Cheuk Hang (Allen) Au, Wen Shou Hsu, Po-Hsu Shieh, Lin Yue:
Can Stablecoins Foster Cryptocurrencies Adoption? 360-369 - Aruna Polisetty, Debarun Chakraborty, Sowmya G, Arpan Kumar Kar, Subhajit Pahari:
What Determines AI Adoption in Companies? Mixed-Method Evidence. 370-387 - Sihem Ben Sassi, Nacim Yanes:
Data Science with Semantic Technologies: Application to Information Systems Development. 388-407 - Galit Klein, Moti Zwilling:
The Weakest Link: Employee Cyber-Defense Behaviors While Working from Home. 408-422 - Nan (Tina) Wang, Weijun Zheng, Wenbo Zhang:
Management Emotion and Firm's Strategic IT Investment Propensity. 423-437 - Zhunzhun Liu, Ruidong Zhang:
An Empirical Study on Herd Behavior in Cryptocurrency Trading. 438-452 - Kalyan Prasad Agrawal, Ashis K. Pani, Anuj Sharma, Nripendra P. Rana:
Process Virtualization Goes Mainstream: Diving into its Normalization. 453-468
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.