default search action
Journal of Information Systems, Volume 30
Volume 30, Number 1, Spring 2016
- Mary B. Curtis, Roger S. Debreceny:
The Journal of Information Systems at Thirty. 1-2
- Diane J. Janvrin, David A. Wood:
The Journal of Information Systems 2015 Conference on Information Technology Audit. 3-5 - Ann C. Dzuranin, Irina Malaescu:
The Current State and Future Direction of IT Audit: Challenges and Opportunities. 7-20 - Maia J. Farkas, Rina M. Hirsch:
The Effect of Frequency and Automation of Internal Control Testing on External Auditor Reliance on the Internal Audit Function. 21-40 - Jacob Z. Haislip, Adi Masli, Vernon J. Richardson, Juan Manuel Sánchez:
Repairing Organizational Legitimacy Following Information Technology (IT) Material Weaknesses: Executive Turnover, IT Expertise, and IT System Upgrades. 41-70 - Paul John Steinbart, Robyn L. Raschke, Graham Gal, William N. Dilla:
SECURQUAL: An Instrument for Evaluating the Effectiveness of Enterprise Information Security Programs. 71-92 - Shipeng Han, Zabihollah Rezaee, Ling Xue, Joseph H. Zhang:
The Association between Information Technology Investments and Audit Risk. 93-116 - W. Alec Cram, R. Brent Gallupe:
A Method to Evaluate Information Systems Control Alignment. 117-135
- Ron Weber:
Thirty Years of the Journal of Information Systems: Reflections of a Prodigal Son. 137-146
Volume 30, Number 2, Summer 2016
- Guido L. Geerts:
Special Section on Enterprise Ontologies. 1-3 - Christian Vibe Scheller, Pavel Hruby:
Business Process and Value Delivery Modeling Using Possession, Ownership, and Availability (POA) in Enterprises and Business Networks. 5-47 - Neal M. Snow, Jacqueline L. Reck:
Developing a Government Reporting Taxonomy. 49-81 - Sergio de Cesare, Chris Partridge:
BORO as a Foundation to Enterprise Ontology. 83-112 - Hans Weigand:
The e3value Ontology for Value Networks: Current State and Future Directions. 113-133 - Pei Li, David Y. Chan, Alexander Kogan:
Exception Prioritization in the Continuous Auditing Environment: A Framework and Experimental Evaluation. 135-157
- Uday S. Murthy:
Researching at the Intersection of Accounting and Information Technology: A Call for Action. 159-167 - Juergen Sidgman, Malcolm Crompton:
Valuing Personal Data to Foster Privacy: A Thought Experiment and Opportunities for Research. 169-181
- Glen L. Gray:
Blogs as Research and Teaching Resources for Accounting Academics. 183-202
Volume 30, Number 3, Fall 2016
- Michael T. Lee, Sally K. Widener:
The Performance Effects of Using Business Intelligence Systems for Exploitation and Exploration Learning. 1-31 - Noah Myers, Neal M. Snow, Scott L. Summers, David A. Wood:
Accounting Institution Citation-Based Research Rankings by Topical Area and Methodology. 33-62 - Fengchun Tang, Christopher Kevin Eller, Benson Wier:
Reporting Frequency and Presentation Format: Detecting Real Activities Manipulation. 63-77 - Julia L. Higgs, Robert E. Pinsker, Thomas J. Smith, George R. Young:
The Relationship between Board-Level Technology Committees and Reported Security Breaches. 79-98 - Andrea Seaton Kelton, Uday S. Murthy:
The Effects of Information Disaggregation and Financial Statement Interactivity on Judgments and Decisions of Nonprofessional Investors. 99-118 - Ryan J. Baxter, D. Kip Holderness Jr., David A. Wood:
Applying Basic Gamification Techniques to IT Compliance Training: Evidence from the Lab and Field. 119-133 - David L. Henderson III, Marianne Bradford, Amr Kotb:
Inhibitors and Enablers of GAS Usage: Testing the Dual Factor Theory. 135-155
- Kevin C. Moffitt, Vernon J. Richardson, Neal M. Snow, Martin M. Weisner, David A. Wood:
Perspectives on Past and Future AIS Research as the Journal of Information Systems Turns Thirty. 157-171 - Pamela J. Schmidt, Jason T. Wood, Severin V. Grabski:
Business in the Cloud: Research Questions on Governance, Audit, and Assurance. 173-189
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.