default search action
Linda G. Wallace
Person information
- affiliation: Virginia Tech, Department of Accounting and Information Systems, Blacksburg, VA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Cecil Chua, Veda Storey, Linda G. Wallace:
Project Wars: A Serious Game to Teach Decision Making in Project Execution. Commun. Assoc. Inf. Syst. 55: 8 (2024) - [j24]Aaron M. French, Veda C. Storey, Linda G. Wallace:
A typology of disinformation intentionality and impact. Inf. Syst. J. 34(4): 1324-1354 (2024) - 2021
- [j23]Tabitha L. James, Wenqi Shen, David M. Townsend, Marc T. Junkunc, Linda G. Wallace:
Love cannot buy you money: Resource exchange on reward-based crowdfunding platforms. Inf. Syst. J. 31(4): 579-609 (2021) - [j22]Aaron M. French, Veda C. Storey, Linda G. Wallace:
LES MISÉRABLES: The Tale of COVID-19 and Role of Information. J. Organ. Comput. Electron. Commer. 31(2): 96-113 (2021)
2010 – 2019
- 2019
- [j21]Veda C. Storey, Linda G. Wallace:
Information Technology and Entrepreneurship: Factors that Shape Investment Support for Innovation. Found. Trends Inf. Syst. 4(1): 1-106 (2019) - [j20]Tabitha L. James, Jason K. Deane, Linda G. Wallace:
An application of goal content theory to examine how desired exercise outcomes impact fitness technology feature set selection. Inf. Syst. J. 29(5): 1010-1039 (2019) - [j19]Tabitha L. James, Linda G. Wallace, Jason K. Deane:
Using Organismic Integration Theory to Explore the Associations Between Users' Exercise Motivations and Fitness Technology Feature Set Use. MIS Q. 43(1) (2019) - 2018
- [c3]Linda G. Wallace, Merrill Warkentin, Izak Benbasat:
How Do You Handle It? An Investigation of Facebook Affordances and Envy. HICSS 2018: 1-10 - 2017
- [j18]Linda G. Wallace, Tabitha L. James, Merrill Warkentin:
How do you feel about your friends? Understanding situational envy in online social networks. Inf. Manag. 54(5): 669-682 (2017) - [j17]Tabitha L. James, Linda G. Wallace, Merrill Warkentin, Byung Cho Kim, Stéphane E. Collignon:
Exposing others' information on online social networks (OSNs): Perceived shared risk, its determinants, and its influence on OSN privacy control use. Inf. Manag. 54(7): 851-865 (2017) - [j16]Tabitha L. James, Paul Benjamin Lowry, Linda G. Wallace, Merrill Warkentin:
The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks. J. Manag. Inf. Syst. 34(2): 560-596 (2017) - 2014
- [j15]Linda G. Wallace, Steven D. Sheetz:
The adoption of software measures: A technology acceptance model (TAM) perspective. Inf. Manag. 51(2): 249-259 (2014) - [j14]Alan S. Abrahams, Reza Barkhi, Eloise Coupey, Cliff T. Ragsdale, Linda G. Wallace:
Converting browsers into recurring customers: an analysis of the determinants of sponsored search success for monthly subscription services. Inf. Technol. Manag. 15(3): 177-197 (2014) - 2013
- [j13]Hui Lin, Weiguo Fan, Linda G. Wallace:
The Effects of Social and Technical Factors on User Satisfaction, Sense of Belonging and Knowledge Community Usage. Int. J. e Collab. 9(3): 13-30 (2013) - 2011
- [j12]Steve Camara, Robert E. Crossler, Vishal Midha, Linda G. Wallace:
Teaching Case: Bank Solutions Disaster Recovery and Business Continuity: A Case Study for Business Students. J. Inf. Syst. Educ. 22(2): 117-122 (2011) - [j11]Linda G. Wallace, Hui Lin, Meghann Cefaratti:
Information Security and Sarbanes-Oxley Compliance: An Exploratory Study. J. Inf. Syst. 25(1): 185-211 (2011)
2000 – 2009
- 2009
- [j10]Steven D. Sheetz, David Henderson, Linda G. Wallace:
Understanding developer and manager perceptions of function points and source lines of code. J. Syst. Softw. 82(9): 1540-1549 (2009) - 2007
- [j9]Andrew P. Snow, Mark Keil, Linda G. Wallace:
The effects of optimistic and pessimistic biasing on software project status reporting. Inf. Manag. 44(2): 130-141 (2007) - [j8]Wade H. Baker, Linda G. Wallace:
Is Information Security Under Control?: Investigating Quality in Information Security Management. IEEE Secur. Priv. 5(1): 36-44 (2007) - [j7]Reza Barkhi, Linda G. Wallace:
The impact of personality type on purchasing decisions in virtual stores. Inf. Technol. Manag. 8(4): 313-330 (2007) - [c2]Hui Lin, Weiguo Fan, Linda G. Wallace, Zhongju Zhang:
An Empirical Study of Web-Based Knowledge Community Success. HICSS 2007: 178 - 2006
- [j6]Weiguo Fan, Linda G. Wallace, Stephanie Rich, Zhongju Zhang:
Tapping the power of text mining. Commun. ACM 49(9): 76-82 (2006) - [j5]Weiguo Fan, Praveen Pathak, Linda G. Wallace:
Nonlinear ranking function representations in genetic programming-based ranking discovery for personalized search. Decis. Support Syst. 42(3): 1338-1349 (2006) - 2005
- [c1]Steven D. Sheetz, Linda G. Wallace, David Henderson:
Understanding Manager and Developer Perceptions of the Relative Advantage, Compatibility, and Complexity of Function Points and Source Lines of Code. AMCIS 2005: 384 - 2004
- [j4]Linda G. Wallace, Mark Keil:
Software project risks and their effect on outcomes. Commun. ACM 47(4): 68-73 (2004) - [j3]Linda G. Wallace, Mark Keil, Arun Rai:
How Software Project Risk Affects Project Performance: An Investigation of the Dimensions of Risk and an Exploratory Model. Decis. Sci. 35(2): 289-321 (2004) - [j2]Linda G. Wallace, Mark Keil, Arun Rai:
Understanding software project risk: a cluster analysis. Inf. Manag. 42(1): 115-125 (2004) - 2000
- [j1]Mark Keil, Linda G. Wallace, Daniel E. Turk, Gayle Dixon-Randall, Urban Nulden:
An investigation of risk perception and risk propensity on the decision to continue a software development project. J. Syst. Softw. 53(2): 145-157 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint