


default search action
Journal of Information Systems, Volume 33
Volume 33, Number 1, Spring 2019
- Roger S. Debreceny, Tawei Wang
, Mi (Jamie) Zhou
:
Research in Social Media: Data Sources and Methodologies. 1-28 - Travis P. Holt
, Tina M. Loraas
:
Using Qualtrics Panels to Source External Auditors: A Replication Study. 29-41 - Nicholas C. Hunt
, Andrea M. Scheetz:
Using MTurk to Distribute a Survey or Experiment: Methodological Considerations. 43-65 - Khondkar E. Karim, Karen Jingrong Lin, Robert E. Pinsker
, Hongwei Zhu:
Using Linguistics to Mine Unstructured Data from FASB Exposure Drafts. 67-83 - Chih Hao Ku
, Maryam Firoozi
:
The Use of Crowdsourcing and Social Media in Accounting Research. 85-111 - Joel Owens
, Erin M. Hawkins:
Using Online Labor Market Participants for Nonprofessional Investor Research: A Comparison of MTurk and Qualtrics Samples. 113-128 - Jay C. Thibodeau, L. Tyler Williams
, Annie L. Witte:
Point and Click Data: An Assessment of Editorial Perceptions and Recommendations for the Peer-Review Process in the New Data Frontier. 129-144 - Michael Chuancai Zhang
, Dan N. Stone
, Hong Xie
:
Text Data Sources in Archival Accounting Research: Insights and Strategies for Accounting Systems' Scholars. 145-180
Volume 33, Number 2, June 2019
- John A. Barrick, Nathan W. Mecham, Scott L. Summers
, David A. Wood
:
Ranking Accounting Journals by Topical Area and Methodology. 1-22 - Gary Chen
, Jie Zhou
:
XBRL Adoption and Systematic Information Acquisition via EDGAR. 23-43 - Yu Cong, Ayishat Omar, Huey-Lian Sun:
Does IT Outsourcing Affect the Accuracy and Speed of Financial Disclosures? Evidence from Preparer-Side XBRL Filing Decisions. 45-61 - David R. Fordham, Carol W. Hamilton:
Accounting Information Technology in Small Businesses: An Inquiry. 63-75 - Peter C. Kipp
, Yibo James Zhang, Amanuel F. Tadesse
:
Can Social Media Interaction and Message Features Influence Nonprofessional Investors' Perceptions of Firms? 77-98 - Lijun (Gillian) Lei, Yutao Li, Yan Luo
:
Social Media and Voluntary Nonfinancial Disclosure: Evidence from Twitter Presence and Corporate Political Disclosure. 99-128 - Margarita M. Lenk, John Peter Krahel, Diane J. Janvrin
, Brett Considine:
Social Technology: An Integrated Strategy and Risk Management Framework. 129-153 - Robert Marley
, Neal M. Snow
:
An Empirical Investigation on Social Media Users' Demand for Financial Information Distributed via Social Media Platforms. 155-175 - Thomas J. Smith
, Julia L. Higgs
, Robert E. Pinsker
:
Do Auditors Price Breach Risk in Their Audit Fees? 177-204 - Michael Werner
, Nick Gehrke:
Identifying the Absence of Effective Internal Controls: An Alternative Approach for Internal Control Audits. 205-222
Volume 33, Number 3, Fall 2019
- Antoinette L. Smith, Yibo James Zhang
, Peter C. Kipp
:
Cloud-Computing Risk Disclosure and ICFR Material Weakness: The Moderating Role of Accounting Reporting Complexity. 1-17 - Melvin A. Lamboy-Ruiz
, Won Gyun No
, Olena V. Watanabe
:
Discrepancies in Hospital Financial Information: Comparison of Financial Data in State Data Repositories and the Healthcare Cost Reporting Information System. 19-44 - Dan Ionita
, Roel J. Wieringa, Jaap Gordijn
, Ahmed Seid Yesuf:
Quantitative, Value-Driven Risk Analysis of e-Services. 45-60 - Feiqi Huang, Won Gyun No
, Miklos A. Vasarhelyi
:
Do Managers Use Extension Elements Strategically in the SEC's Tagged Data for Financial Statements? Evidence from XBRL Complexity. 61-74 - Tien-Shih Hsieh, Zhihong Wang, Mohammad Abdolmohammadi:
Factors Associated with Companies' Choices of XBRL Implementation Strategies: Evidence from the U.S. Market. 75-91 - Lei Gao
, Alisa G. Brink
:
A Content Analysis of the Privacy Policies of Cloud Computing Services. 93-115 - Nishani Edirisinghe Vincent
, Julia L. Higgs
, Robert E. Pinsker
:
Board and Management-Level Factors Affecting the Maturity of IT Risk Management Practices. 117-135 - Daniel E. O'Leary
:
Facilitating Citizens' Voice and Process Reengineering Using a Cloud-Based Mobile App. 137-162 - Xu (Joyce) Cheng
, Stephanie Walton
:
Do Nonprofessional Investors Care About How and When Data Breaches are Disclosed? 163-182 - Michele L. Frank
, Jonathan H. Grenier
, Jonathan S. Pyzoha
:
How Disclosing a Prior Cyberattack Influences the Efficacy of Cybersecurity Risk Management Reporting and Independent Assurance. 183-200 - Michael Curry, Byron Marshall
, John Correia, Robert E. Crossler:
InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior. 201-225 - Vernon J. Richardson
, Rodney E. Smith, Marcia Weidenmier Watson:
Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches. 227-265 - Howard Xu, Savannah (Yuanyaun) Guo, Jacob Z. Haislip
, Robert E. Pinsker
:
Earnings Management in Firms with Data Security Breaches. 267-284 - Daniel E. O'Leary
:
What Phishing E-mails Reveal: An Exploratory Analysis of Phishing Attempts Using Text Analysis. 285-307 - Rajiv D. Banker, Cecilia (Qian) Feng
:
The Impact of Information Security Breach Incidents on CIO Turnover. 309-329

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.