


default search action
MIS Quarterly, Volume 43
Volume 43, Number 1, March 2019
- Victor A. Benjamin, Joseph S. Valacich, Hsinchun Chen:
DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics.
- Byungwan Koh, Il-Horn Hann, Srinivasan Raghunathan
:
Digitization of Music: Consumer Adoption Amidst Piracy, Unbundling, and Rebundling. - JaeHwuen Jung, Ravi Bapna, Jui Ramaprasad, Akhmed Umyarov:
Love Unshackled: Identifying the Effect of Mobile App Adoption in Online Dating. - Wei T. Yue, Qiu-Hong Wang
, Kai Lung Hui:
See No Evil, Hear No Evil? Dissecting the Impact of Online Hacker Forums. - Lian Jian, Sha Yang, Sulin Ba, Li Lu, Li Crystal Jiang
:
Managing the Crowds: The Effect of Prize Guarantees and In-Process Feedback on Participation in Crowdsourcing Contests. - Elena Karahanna, Adela J. Chen, Qianqian Ben Liu, Christina I. Serrano:
Capitalizing on Health Information Technology to Enable Advantage in U.S. Hospitals. - Mohammad Hosein Rezazade Mehrizi
, Joan Rodon Modol, Milad Zafar Nezhad:
Intensifying to Cease: Unpacking the Process of Information Systems Discontinuance. - Eric Monteiro, Elena Parmiggiani
:
Synthetic Knowing: The Politics of the Internet of Things. - Eric Overby, Sam Ransbotham:
How Do Adopters Transition Between New and Incumbent Channels? - Huifang Li, Yulin Fang, Kai H. Lim
, Youwei Wang:
Platform-Based Function Repertoire, Reputation, and Sales Performance of E-Marketplace Sellers. - Gordon Burtch
, Jason Chan:
Investigating the Relationship Between Medical Crowdfunding and Personal Bankruptcy in the United States: Evidence of a Digital Divide. - Yiyi Li, Ying Xie
, Zhiqiang (Eric) Zheng:
Modeling Multichannel Advertising Attribution Across Competitors. - Tabitha L. James, Linda G. Wallace, Jason K. Deane
:
Using Organismic Integration Theory to Explore the Associations Between Users' Exercise Motivations and Fitness Technology Feature Set Use.
- Indranil Bose, Alvin Chung Man Leung:
Adoption of Identity Theft Countermeasures and its Short- and Long-Term Impact on Firm Value. - Maryam Ghasemaghaei, Khaled Hassanein, Izak Benbasat:
Assessing the Design Choices for Online Recommendation Agents for Older Adults: Older Does Not Always Mean Simpler Information Technology.
Volume 43, Number 2, June 2019
- Keongtae Kim
, Siva Viswanathan
:
The Experts in the Crowd: The Role of Experienced Investors in a Crowdfunding Market. - Huigang Liang
, Yajiong Xue, Alain Pinsonneault, Yu Andy Wu:
What Users Do Besides Problem-Focused Coping When Facing IT Security Threats: An Emotion-Focused Coping Perspective. - Kuang-Yuan Huang, InduShobha N. Chengalur-Smith, Alain Pinsonneault:
Sharing Is Caring: Social Support Provision and Companionship Activities in Healthcare Virtual Support Communities. - Sofia Bapna, Mary J. Benner, Liangfei Qiu:
Nurturing Online Communities: An Empirical Investigation. - Rajiv Sabherwal
, Sanjiv Sabherwal, Taha Havakhor, Zachary R. Steelman:
How Does Strategic Alignment Affect Firm Performance? The Roles of Information Technology Investment and Environmental Uncertainty. - Mohammad Moeini, Suzanne Rivard:
Responding - or Not - to Information Technology Project Risks: An Integrative Model. - Hilah Geva, Gal Oestreicher-Singer, Maytal Saar-Tsechansky:
Using Retweets When Shaping Our Online Persona: Topic Modeling Approach. - W. Alec Cram, John D'Arcy, Jeffrey Proudfoot:
Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance. - Antti Salovaara
, Kalle Lyytinen, Esko Penttinen
:
High Reliability in Digital Organizing: Mindlessness, the Frame Problem, and Digital Operations. - Shun-Yang Lee
, Huaxia Rui, Andrew B. Whinston:
Is Best Answer Really the Best Answer? The Politeness Bias. - Jingguo Wang
, Zhe Shan, Manish Gupta, H. Raghav Rao:
A Longitudinal Study of Unauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts. - Roman Lukyanenko, Jeffrey Parsons
, Yolanda F. Wiersma, Mahed Maddah:
Expecting the Unexpected: Effects of Data Collection Design Choices on the Quality of Crowdsourced User-Generated Content. - Tracy A. Jenkin, Yolande E. Chan, Rajiv Sabherwal
:
Mutual Understanding in Information Systems Development: Changes Within and Across Projects. - Philipp Wunderlich, Daniel Veit
, Saonee Sarker:
Adoption of Sustainable Technologies: A Mixed-Methods Study of German Households.
Volume 43, Number 3, September 2019
- Gediminas Adomavicius, Alok Gupta
, Mochen Yang
:
Designing Real-Time Feedback for Bidders in Homogeneous-Item Continuous Combinatorial Auctions. - Ji Wu, Liqiang Huang, J. Leon Zhao:
Operationalizing Regulatory Focus in the Digital Age: Evidence from an E-Commerce Context. - Elad Liebman, Maytal Saar-Tsechansky, Peter Stone:
The Right Music at the Right Time: Adaptive Personalized Playlists Based on Sequence Modeling. - Zhengrui Jiang, Xinxue (Shawn) Qu, Dipak C. Jain:
Optimal Market Entry Timing for Successive Generations of Technological Innovations. - Rohit Nishant
, Shirish C. Srivastava, Thompson S. H. Teo:
Using Polynomial Modeling to Understand Service Quality in E-Government Websites. - Jiangning He, Xiao Fang, Hongyan Liu, Xindan Li:
Mobile App Recommendation: An Involvement-Enhanced Approach. - Thomas O. Meservy
, Kelly J. Fadel, C. Brock Kirwan, Rayman D. Meservy:
An fMRI Exploration of Information Processing in Electronic Networks of Practice. - Nicholas Berente, Kalle Lyytinen, Youngjin Yoo
, Chris Maurer:
Institutional Logics and Pluralistic Responses to Enterprise System Implementation: A Qualitative Meta-Analysis. - Viswanath Venkatesh, Tracy Ann Sykes
, Frank K. Y. Chan
, James Y. L. Thong
, Paul Jen-Hwa Hu:
Children's Internet Addiction, Family-to-Work Conflict, and Job Outcomes: A Study of Parent-Child Dyads. - Anjana Susarla, Tridas Mukhopadhyay:
Can Outsourcing of Information Technology Foster Innovations in Client Organizations? An Empirical Analysis. - Likoebe M. Maruping, Sherae L. Daniel, Marcelo Cataldo:
Developer Centrality and the Impact of Value Congruence and Incongruence on Commitment and Code Contribution Activity in Open Source Software Communities.
- Antino Kim, Alan R. Dennis:
Says Who? The Effects of Presentation Format and Source Rating on Fake News in Social Media.
- Suprateek Sarker, Sutirtha Chatterjee
, Xiao Xiao
, Amany R. Elbanna:
The Sociotechnical Axis of Cohesion for the IS Discipline: Its Historical Legacy and its Continued Relevance.
- Chrisanthi Avgerou:
Contextual Explanation: Alternative Approaches and Persistent Challenges. - E. Burton Swanson:
Technology as Routine Capability.
Volume 43, Number 4, December 2019
- Xinxue (Shawn) Qu, Zhengrui Jiang:
A Time-Based Dynamic Synchronization Policy for Consolidated Database Systems. - Roch Guérin, Kartik Hosanagar, Xinxin Li, Soumya Sen:
Shared or Dedicated Infrastructures: On the Impact of Reprovisioning Ability. - Viswanath Venkatesh, Tracy Ann Sykes, Arun Rai, Pankaj Setia:
Governance and ICT4D Initiative Success: A Longitudinal Field Study of Ten Villages in Rural India. - Palash Bera, Pnina Soffer, Jeffrey Parsons:
Using Eye Tracking to Expose Cognitive Processes in Understanding Conceptual Models. - Lauren Rhue, Arun Sundararajan:
Playing to the Crowd: Digital Visibility and the Social Dynamics of Purchase Disclosure. - Liron Sivan, Michael D. Smith, Rahul Telang:
Do Search Engines Influence Media Piracy? Evidence from a Randomized Study. - Anna Essén, Sara Winterstorm Värlander:
How Technology-Afforded Practices at the Micro-Level can Generate Change at the Field Level: Theorizing the Recursive Mechanism Actualized in Swedish Rheumatology 2000-2014. - Roberta Bernardi, Suprateek Sarker, Sundeep Sahay:
The Role of Affordances in the Deinstitutionalization of a Dysfunctional Health Management Information System in Kenya: An Identity Work Perspective. - Jae-Nam Lee, YoungKi Park, Detmar W. Straub, Yunmo Koo:
Holistic Archetypes of IT Outsourcing Strategy: A Contingency Fit and Configurational Approach. - Hilah Geva, Ohad Barzilay, Gal Oestreicher-Singer:
A Potato Salad with a Lemon Twist: Using a Supply-Side Shock to Study the Impact of Opportunistic Behavior on Crowdfunding Platforms. - Sabine Brunswicker, Esteve Almirall, Ann Majchrzak:
Optimizing and Satisficing: The Interplay Between Platform Architecture and Producers' Design Strategies for Platform Performance.
- Qiqi Jiang, Chuan-Hoo Tan, Choon Ling Sia, Kwok Kee Wei:
Followership in an Open-Source Software Project and its Significance in Code Reuse. - Gediminas Adomavicius, Jesse C. Bockstedt, Shawn P. Curley, Jingjing Zhang:
Reeducing Recommender System Biases: An Investigation of Rating Display Designs. - Patricia L. Moravec, Randall K. Minas, Alan R. Dennis:
Fake News on Social Media: People Believe What They Want to Believe When it Makes No Sense At All.
- Philip Faulkner, Jochen Runde:
Theorizing the Digital Object.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.