default search action
Journal of Information Systems, Volume 28
Volume 28, Number 1, Spring 2014
- Qi Liu, Miklos A. Vasarhelyi:
Big Questions in AIS Research: Measurement, Information Processing, Data Analysis, and Reporting. 1-17
- Grant M. Beck, Rina Limor, Vairam Arunachalam, Patrick R. Wheeler:
The Effect of Changes in Decision Aid Bias on Learning: Evidence of Functional Fixation. 19-42 - Asheq Razaur Rahman, Roger S. Debreceny:
Institutionalized Online Access to Corporate Information and Cost of Equity Capital: A Cross-Country Analysis. 43-74 - Glen L. Gray, Won Gyun No, David W. Miller:
Internal Auditors' Experiences and Opinions Regarding Green IT: Assessing the Gap in Normative and Positive Perspectives. 75-109 - Daryl M. Guffey, Nancy L. Harp:
Ranking Faculties, Ph.D. Programs, Individual Scholars, and Influential Articles in Accounting Information Systems Based on Citations to Publications in the Journal of Information Systems. 111-144 - Yongbum Kim, Alexander Kogan:
Development of an Anomaly Detection Model for a Bank's Transitory Account System. 145-165
- Alessandro Arbore, Rebecca Graziani, Sergio Venturini:
Understanding Personal Mobile Technologies: Decomposing and De-Averaging the Value of a Smartphone. 167-185 - Ludwig Christian Schaupp, France Bélanger:
The Value of Social Media for Small Businesses. 187-207
- Robert E. Crossler, James H. Long, Tina M. Loraas, Brad S. Trinkle:
Understanding Compliance with Bring Your Own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap. 209-226 - Robyn L. Raschke, Anjala S. Krishen, Pushkin Kachroo:
Understanding the Components of Information Privacy Threats for Location-Based Services. 227-242 - Yuan Hong, Jaideep Vaidya, Shengbin Wang:
A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications. 243-268 - Bonnie W. Morris, Virginia Franke Kleist, Richard B. Dull, Cynthia D. Tanner:
Secure Information Market: A Model to Support Information Sharing, Data Fusion, Privacy, and Decisions. 269-285
- Kishore Singh, Peter J. Best, Mario Bojilov, Catherine Blunt:
Continuous Auditing and Continuous Monitoring in ERP Environments: Case Studies of Application Implementations. 287-310
- Alexey N. Nikitkov, Dan N. Stone, Timothy C. Miller:
Internal Controls, Routine Activity Theory (RAT), and Sustained Online Auction Deception: A Longitudinal Analysis. 311-337
Volume 28, Number 2, Fall 2014
- John Peter Krahel, Miklos A. Vasarhelyi:
AIS as a Facilitator of Accounting Change: Technology, Practice, and Education. 1-15
- Xuefei (Nancy) Deng, Tawei Wang:
Understanding Post-Implementation Support for Enterprise Systems: An Empirical Study of IT Personnel's Customer-Oriented Citizenship Behaviors. 17-39 - Adi Masli, Vernon J. Richardson, Juan Manuel Sánchez, Rodney E. Smith:
The Interrelationships Between Information Technology Spending, CEO Equity Incentives, and Firm Value. 41-65 - K. Asli Basoglu, Traci J. Hess:
Online Business Reporting: A Signaling Theory Perspective. 67-101 - Brad Tuttle, Mark H. Taylor, Yi-Jing Wu:
Overcoming the Reluctance to Convey Negative Project Information during an Information Systems Pre-Implementation Review. 103-125 - Tawei Wang, Jia-Lang Seng:
Mandatory Adoption of XBRL and Foreign Institutional Investors' Holdings: Evidence from China. 127-147 - Yunhao Chen, Antoinette L. Smith, Jian Cao, Weidong Xia:
Information Technology Capability, Internal Control Effectiveness, and Audit Fees and Delays. 149-180 - Yu Cong, Jia Hao, Lin Zou:
The Impact of XBRL Reporting on Market Efficiency. 181-207 - Hussein Issa, Alexander Kogan:
A Predictive Ordered Logistic Regression Model as a Tool for Quality Review of Control Risk Assessments. 209-229 - J. Efrim Boritz, Carla Carnaghan, Paulo S. C. Alencar:
Business Modeling to Improve Auditor Risk Assessment: An Investigation of Alternative Representations. 231-256 - Vicky Arnold, Tanya S. Benford, Clark Hampton, Steve G. Sutton:
Enterprise Risk Management: Re-Conceptualizing the Role of Risk and Trust on Information Sharing in Transnational Alliances. 257-285
- Weng Marc Lim:
Understanding the Influence of Online Flow Elements on Hedonic and Utilitarian Online Shopping Experiences: A Case of Online Group Buying. 287-306 - Brad S. Trinkle, Robert E. Crossler, Merrill Warkentin:
I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks. 307-327
- Fiona Harrigan:
Evolution of Accounting Controls in a De-Integrated Project Structure: A Case of Hybridization. 329-355 - Catherine A. Hardy:
The Messy Matters of Continuous Assurance: Findings from Exploratory Research in Australia. 357-377
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.