Search dblp for Publications

export results for "stream:journals/jisys:"

 download as .bib file

@article{DBLP:journals/jisys/BeerMP24,
  author       = {Christian Beer and
                  Janine Maniora and
                  Christiane Pott},
  title        = {The Risk of Silence - How the Capital Market Penalizes Social Media
                  Passivity},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {1},
  pages        = {5--38},
  year         = {2024},
  url          = {https://doi.org/10.2308/isys-2023-059},
  doi          = {10.2308/ISYS-2023-059},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BeerMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BradfordBA24,
  author       = {Marianne Bradford and
                  Robert A. Bucy and
                  Murat Adivar},
  title        = {Implementing {ERP} with Maintenance and Support in Mind: Exploring
                  the Efficacy of Application Management Services for the Post-Implementation
                  Phase},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {2},
  pages        = {1--27},
  year         = {2024},
  url          = {https://doi.org/10.2308/isys-2022-064},
  doi          = {10.2308/ISYS-2022-064},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BradfordBA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChoHL24,
  author       = {Myojung Cho and
                  Feiqi Huang and
                  Xin Luo},
  title        = {Retail Investor Attention and Audit Pricing},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {1},
  pages        = {39--66},
  year         = {2024},
  url          = {https://doi.org/10.2308/isys-2023-017},
  doi          = {10.2308/ISYS-2023-017},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChoHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DemersWW24,
  author       = {Elizabeth Demers and
                  Victor Xiaoqi Wang and
                  Kean Wu},
  title        = {Measuring Corporate Human Capital Disclosures: Lexicon, Data, Code,
                  and Research Opportunities},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {2},
  pages        = {163--186},
  year         = {2024},
  url          = {https://doi.org/10.2308/isys-2023-023},
  doi          = {10.2308/ISYS-2023-023},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DemersWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/EulerichWWW24,
  author       = {Marc Eulerich and
                  Nathan Waddoups and
                  Martin Wagener and
                  David A. Wood},
  title        = {Development of a Framework of Key Internal Control and Governance
                  Principles for Robotic Process Automation {(RPA)}},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {2},
  pages        = {29--49},
  year         = {2024},
  url          = {https://doi.org/10.2308/isys-2023-067},
  doi          = {10.2308/ISYS-2023-067},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/EulerichWWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HosseinpourJ24,
  author       = {Marzie Hosseinpour and
                  Mieke Jans},
  title        = {Auditors' Categorization of Process Deviations},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {1},
  pages        = {67--89},
  year         = {2024},
  url          = {https://doi.org/10.2308/isys-2023-051},
  doi          = {10.2308/ISYS-2023-051},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HosseinpourJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HuSVZ24,
  author       = {Hanxin Hu and
                  Ting Sun and
                  Miklos A. Vasarhelyi and
                  Min Zhang},
  title        = {Measuring Audit Quality with Surprise Scores: Evidence from China
                  and the {U.S}},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {2},
  pages        = {51--78},
  year         = {2024},
  url          = {https://doi.org/10.2308/isys-2023-027},
  doi          = {10.2308/ISYS-2023-027},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HuSVZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Jiang24,
  author       = {Wanying Jiang},
  title        = {Cybersecurity Risk and Audit Pricing - {A} Machine Learning-Based
                  Analysis},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {1},
  pages        = {91--117},
  year         = {2024},
  url          = {https://doi.org/10.2308/isys-2023-019},
  doi          = {10.2308/ISYS-2023-019},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Jiang24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/JohnstonRS24,
  author       = {Joseph Johnston and
                  Kenneth J. Reichelt and
                  Pradeep Sapkota},
  title        = {Measuring Financial Statement Disaggregation Using {XBRL}},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {1},
  pages        = {119--147},
  year         = {2024},
  url          = {https://doi.org/10.2308/isys-2021-004},
  doi          = {10.2308/ISYS-2021-004},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/JohnstonRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LaghmouchLMDJ24,
  author       = {Manal Laghmouch and
                  Sebastien Lizin and
                  Jan Mendling and
                  Beno{\^{\i}}t Depaire and
                  Mieke Jans},
  title        = {Auditors' Risk Perception of Process Control Deficiencies: {A} Discrete
                  Choice Experiment},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {2},
  pages        = {79--97},
  year         = {2024},
  url          = {https://doi.org/10.2308/isys-2021-039},
  doi          = {10.2308/ISYS-2021-039},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LaghmouchLMDJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LiCY24,
  author       = {Chang{-}Wei Li and
                  Chi{-}Chun Chou and
                  Ju{-}Chun Yen},
  title        = {An Accounting Classification System Using Constituency Analysis and
                  Semantic Web Technologies},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {1},
  pages        = {149--175},
  year         = {2024},
  url          = {https://doi.org/10.2308/isys-2023-005},
  doi          = {10.2308/ISYS-2023-005},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LiCY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LiSH24,
  author       = {He Li and
                  Zhengjie Sun and
                  Feiqi Huang},
  title        = {The Impact of Audit Office Cybersecurity Experience on Nonbreach Client's
                  Audit Fees and Cybersecurity Risks},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {1},
  pages        = {177--206},
  year         = {2024},
  url          = {https://doi.org/10.2308/isys-2023-014},
  doi          = {10.2308/ISYS-2023-014},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LiSH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MungaiL24,
  author       = {Ann N. Mungai and
                  Lorraine S. Lee},
  title        = {Information Technology Capability, Managerial Ability, and Financial
                  Reporting Quality: {A} Research Note},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {2},
  pages        = {99--121},
  year         = {2024},
  url          = {https://doi.org/10.2308/isys-2022-063},
  doi          = {10.2308/ISYS-2022-063},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MungaiL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WeiCVT24,
  author       = {Danyang Wei and
                  Soohyun Cho and
                  Miklos A. Vasarhelyi and
                  Liam Te{-}Wierik},
  title        = {Outlier Detection in Auditing: Integrating Unsupervised Learning within
                  a Multilevel Framework for General Ledger Analysis},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {2},
  pages        = {123--142},
  year         = {2024},
  url          = {https://doi.org/10.2308/isys-2022-026},
  doi          = {10.2308/ISYS-2022-026},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WeiCVT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WilkinW24,
  author       = {Carla L. Wilkin and
                  Tawei Wang},
  title        = {Reflections on the \emph{Journal of Information Systems} and Suggested
                  Future Initiatives},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {1},
  pages        = {1--3},
  year         = {2024},
  url          = {https://doi.org/10.2308/isys-2024-003},
  doi          = {10.2308/ISYS-2024-003},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WilkinW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/X24,
  title        = {Covers and Front Matter},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {1},
  pages        = {i--iv},
  year         = {2024},
  url          = {https://doi.org/10.2308/0888-7985-38.1.i},
  doi          = {10.2308/0888-7985-38.1.I},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/X24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/X24a,
  title        = {Editorial Policy},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.2308/0888-7985-38.1.e},
  doi          = {10.2308/0888-7985-38.1.E},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/X24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/X24b,
  title        = {Editorial Policy},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {2},
  pages        = {187--191},
  year         = {2024},
  url          = {https://doi.org/10.2308/0888-7985-38.2.e},
  doi          = {10.2308/0888-7985-38.2.E},
  timestamp    = {Sun, 14 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/X24b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/YoonKVP24,
  author       = {Kyunghee Yoon and
                  Alexander Kogan and
                  Miklos A. Vasarhelyi and
                  Tim Pearce},
  title        = {External Nonfinancial Measures in Substantive Analytical Procedures:
                  Contributions of Weather Information},
  journal      = {J. Inf. Syst.},
  volume       = {38},
  number       = {2},
  pages        = {143--162},
  year         = {2024},
  url          = {https://doi.org/10.2308/isys-2023-066},
  doi          = {10.2308/ISYS-2023-066},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/YoonKVP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoritzS23,
  author       = {J. Efrim Boritz and
                  Theophanis Stratopoulos},
  title        = {\emph{Journal of Information Systems} Workshop on Data Value Creation:
                  Views from Industry and Academia},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {1},
  pages        = {1--6},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2023-002},
  doi          = {10.2308/ISYS-2023-002},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BoritzS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoritzS23a,
  author       = {J. Efrim Boritz and
                  Theophanis C. Stratopoulos},
  title        = {{AI} and the Accounting Profession: Views from Industry and Academia},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {3},
  pages        = {1--9},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2023-054},
  doi          = {10.2308/ISYS-2023-054},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/BoritzS23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CalderonG23,
  author       = {Thomas G. Calderon and
                  Lei Gao},
  title        = {Innovative and Novel Research Datasets Related to Cybersecurity Risk
                  Disclosures: {A} Research Note},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {2},
  pages        = {123--128},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2022-065},
  doi          = {10.2308/ISYS-2022-065},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CalderonG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/FergusonHW23,
  author       = {Daniel P. Ferguson and
                  M. Kathleen Harris and
                  L. Tyler Williams},
  title        = {Constituent Input on Regulatory Initiatives: {A} Machine-Learning
                  Approach to Efficiently and Effectively Analyze Unstructured Data},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {3},
  pages        = {119--138},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2021-032},
  doi          = {10.2308/ISYS-2021-032},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/FergusonHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/FrostHNP23,
  author       = {Tracie S. Frost and
                  Chris Zhijian He and
                  Jiwon Nam and
                  Robert E. Pinsker},
  title        = {The Impact of {CEO} {IT} Ability on Bank Loan Terms},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {1},
  pages        = {7--37},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2021-020},
  doi          = {10.2308/ISYS-2021-020},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/FrostHNP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GeorgeGGMTL23,
  author       = {Joey F. George and
                  Manjul Gupta and
                  Gabriel A. Giordano and
                  Annette Mills and
                  Vanesa Tennant and
                  Carmen C. Lewis},
  title        = {Publishing the Data from "The Effects of Communication Mode and Culture
                  on Deception Detection Accuracy"},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {2},
  pages        = {129--136},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2022-025},
  doi          = {10.2308/ISYS-2022-025},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GeorgeGGMTL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HeHKW23,
  author       = {Chris Zhijian He and
                  Jiangbo Huangfu and
                  Mark Kohlbeck and
                  Lin Wang},
  title        = {The Impact of Customer-Reported Cybersecurity Breaches on Key Supplier
                  Innovations and Relationship Disruption},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {2},
  pages        = {21--49},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2020-006},
  doi          = {10.2308/ISYS-2020-006},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HeHKW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HeLP23,
  author       = {Chris Zhijian He and
                  Tianpei Li and
                  Robert E. Pinsker},
  title        = {Firm-Level Pay Disparity and Breach Risk},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {3},
  pages        = {11--32},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2021-040},
  doi          = {10.2308/ISYS-2021-040},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/HeLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HutchisonGG23,
  author       = {Paul D. Hutchison and
                  Benjamin T. George and
                  Binod Guragai},
  title        = {Application of Latent Semantic Analysis in Accounting Research},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {3},
  pages        = {139--155},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2022-013},
  doi          = {10.2308/ISYS-2022-013},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/HutchisonGG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/JeongL23,
  author       = {Anna Y. Jeong and
                  Jee{-}Hae Lim},
  title        = {The Impact of Blockchain Technology Adoption Announcements on Firm's
                  Market Value},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {1},
  pages        = {39--65},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2021-038},
  doi          = {10.2308/ISYS-2021-038},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/JeongL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KhadraO23,
  author       = {Husam A. Abu Khadra and
                  David Olsen},
  title        = {Toward Automating Shredding Nonprofit {XML} Files: The Case of {IRS}
                  Form 990 Data},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {1},
  pages        = {169--188},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2022-031},
  doi          = {10.2308/ISYS-2022-031},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KhadraO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KoreffBS23,
  author       = {Jared Koreff and
                  Lisa Baudot and
                  Steve G. Sutton},
  title        = {Exploring the Impact of Technology Dominance on Audit Professionalism
                  through Data Analytic-Driven Healthcare Audits},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {3},
  pages        = {59--80},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2022-023},
  doi          = {10.2308/ISYS-2022-023},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/KoreffBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LeeWD23,
  author       = {Heejae Lee and
                  Xinxin Wang and
                  Richard B. Dull},
  title        = {Designing a Classifying System for Nonprofit Organizations Using Textual
                  Contents from the Mission Statement},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {3},
  pages        = {33--58},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2021-033},
  doi          = {10.2308/ISYS-2021-033},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/LeeWD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LiW23,
  author       = {Tianpei Li and
                  Stephanie Walton},
  title        = {Business Strategy and Cybersecurity Breaches},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {2},
  pages        = {51--76},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2022-033},
  doi          = {10.2308/ISYS-2022-033},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LiW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LimRS23,
  author       = {Jee{-}Hae Lim and
                  Vernon J. Richardson and
                  Rodney E. Smith},
  title        = {Does {XBRL} Tagging Indicate Disclosure Quality? The Relationship
                  Between {XBRL} Standard and Extension Tags and Stock Return Synchronicity},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {3},
  pages        = {81--100},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2022-027},
  doi          = {10.2308/ISYS-2022-027},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/LimRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LittTW23,
  author       = {Barri Litt and
                  Paul Tanyi and
                  Marcia Weidenmier Watson},
  title        = {Cybersecurity Breach at a Big 4 Accounting Firm: Effects on Auditor
                  Reputation},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {2},
  pages        = {77--100},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2022-006},
  doi          = {10.2308/ISYS-2022-006},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LittTW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LombardiSD23,
  author       = {Danielle R. Lombardi and
                  Janice C. Sipior and
                  Steven Dannemiller},
  title        = {Auditor Judgment Bias Research: {A} 50-Year Trend Analysis and Emerging
                  Technology Use},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {1},
  pages        = {109--141},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2020-079},
  doi          = {10.2308/ISYS-2020-079},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LombardiSD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MayerLQK23,
  author       = {J{\"{o}}rg H. Mayer and
                  Linus Lischke and
                  Reiner Quick and
                  Friedrich Kalden},
  title        = {When Cash Is King - An Accounts Receivables App Accommodating Different
                  Use Situations},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {2},
  pages        = {101--122},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2022-022},
  doi          = {10.2308/ISYS-2022-022},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MayerLQK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/NuijtenKZ23,
  author       = {Arno L. P. Nuijten and
                  Mark Keil and
                  Bert Zwiers},
  title        = {Internal Auditors' Perceptions of Information Technology-Related Risks:
                  {A} Comparison Between General Auditors and Information Technology
                  Auditors},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {1},
  pages        = {67--83},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2020-040},
  doi          = {10.2308/ISYS-2020-040},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/NuijtenKZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PitrePDZ23,
  author       = {Terence J. Pitre and
                  Robert E. Pinsker and
                  Ronald J. Daigle and
                  Yibo James Zhang},
  title        = {{\#}Twitter: Examining the Impact of Earnings Format Choice and Rehashing
                  Prior Positive Information on Market Prices},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {2},
  pages        = {1--20},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2021-034},
  doi          = {10.2308/ISYS-2021-034},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PitrePDZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SheldonBB23,
  author       = {Mark D. Sheldon and
                  Sudip Bhattacharjee and
                  Reza Barkhi},
  title        = {The Impact of Persuasive Response Sequence and Consistency When Information
                  Technology Service Providers Address Auditor-Identified Issues in
                  System and Organization Control 2 Reports},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {1},
  pages        = {85--107},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2021-016},
  doi          = {10.2308/ISYS-2021-016},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SheldonBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ShresthaS23,
  author       = {Anup Shrestha and
                  Minu Saratchandra},
  title        = {A Conceptual Framework toward Knowledge Ambidexterity Using Information
                  Systems and Knowledge Management},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {1},
  pages        = {143--167},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2021-013},
  doi          = {10.2308/ISYS-2021-013},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ShresthaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ThiesKKK23,
  author       = {Simon Thies and
                  Marko Kureljusic and
                  Erik Karger and
                  Thilo Kr{\"{a}}mer},
  title        = {Blockchain-Based Triple-Entry Accounting: {A} Systematic Literature
                  Review and Future Research Agenda},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {3},
  pages        = {101--118},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2022-029},
  doi          = {10.2308/ISYS-2022-029},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/ThiesKKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/TsangBHAL23,
  author       = {Ronald C. W. Tsang and
                  Amelia A. Baldwin and
                  Joseph F. Hair and
                  Ermanno Affuso and
                  Kyre Dane Lahtinen},
  title        = {The Informativeness of Sentiment Types in Risk Factor Disclosures:
                  Evidence from Firms with Cybersecurity Breaches},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {3},
  pages        = {157--190},
  year         = {2023},
  url          = {https://doi.org/10.2308/isys-2022-014},
  doi          = {10.2308/ISYS-2022-014},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/TsangBHAL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/X23,
  title        = {Covers and Front Matter},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {1},
  pages        = {i--iv},
  year         = {2023},
  url          = {https://doi.org/10.2308/0888-7985-37.1.i},
  doi          = {10.2308/0888-7985-37.1.I},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/X23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/X23a,
  title        = {Editorial Policy},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.2308/0888-7985-37.1.e},
  doi          = {10.2308/0888-7985-37.1.E},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/X23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/X23b,
  title        = {Editorial Policy},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {2},
  pages        = {137--141},
  year         = {2023},
  url          = {https://doi.org/10.2308/0888-7985-37.2.137},
  doi          = {10.2308/0888-7985-37.2.137},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/X23b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/X23c,
  title        = {Editorial Policy},
  journal      = {J. Inf. Syst.},
  volume       = {37},
  number       = {3},
  pages        = {191--195},
  year         = {2023},
  url          = {https://doi.org/10.2308/0888-7985-37.3.191},
  doi          = {10.2308/0888-7985-37.3.191},
  timestamp    = {Sat, 11 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/X23c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AjayiZ22,
  author       = {Oluwakemi Ajayi and
                  James Zhang},
  title        = {The Joint Effects of Argument Quality and Interactivity on Nonprofessional
                  Investors' Perceptions of Disclosure Credibility and Investment Decisions},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {3},
  pages        = {1--26},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2021-024},
  doi          = {10.2308/ISYS-2021-024},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/AjayiZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BankerFT22,
  author       = {Rajiv D. Banker and
                  Tracie Frost and
                  Muktak K. Tripathi},
  title        = {The Determinants of InformationWeek 500 Selection and Its Implications:
                  {A} Textual Analysis Approach},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {1},
  pages        = {81--109},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-070},
  doi          = {10.2308/ISYS-2020-070},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BankerFT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoritzGP22,
  author       = {J. Efrim Boritz and
                  Chan Ge and
                  Katharine Patterson},
  title        = {Factors Affecting Employees' Susceptibility to Cyber-Attacks},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {3},
  pages        = {27--60},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-19-053},
  doi          = {10.2308/ISYS-19-053},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BoritzGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoritzS22,
  author       = {J. Efrim Boritz and
                  Theophanis C. Stratopoulos},
  title        = {\emph{JIS} Workshop on Robotic Process Automation {(RPA)} Research:
                  Views from {RPA} Industry Leaders and {AIS} Researchers},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {1},
  pages        = {1--5},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-10809},
  doi          = {10.2308/ISYS-10809},
  timestamp    = {Thu, 07 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BoritzS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BradfordTS22,
  author       = {Marianne Bradford and
                  Eileen Z. Taylor and
                  Megan Seymore},
  title        = {A View from the {CISO:} Insights from the Data Classification Process},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {1},
  pages        = {201--218},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-054},
  doi          = {10.2308/ISYS-2020-054},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BradfordTS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CarrilloPZ22,
  author       = {Hilda E. Carrillo and
                  Robin R. Pennington and
                  Yibo James Zhang},
  title        = {Is an Emoji Worth a Thousand Words? The Effect of Emoji Usage on Nonprofessional
                  Investors' Perceptions},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {2},
  pages        = {1--15},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-030},
  doi          = {10.2308/ISYS-2020-030},
  timestamp    = {Sun, 17 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CarrilloPZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChenHG22,
  author       = {Chu Chen and
                  Caroline Hartmann and
                  Anne Gottfried},
  title        = {The Impact of Audit Committee {IT} Expertise on Data Breaches},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {3},
  pages        = {61--81},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-076},
  doi          = {10.2308/ISYS-2020-076},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/ChenHG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Cheng22,
  author       = {Xu (Joyce) Cheng},
  title        = {The Effect of the Frequency and Source of Instructional Messages on
                  Knowledge Sharing Behavior},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {2},
  pages        = {125--140},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-069},
  doi          = {10.2308/ISYS-2020-069},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Cheng22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DuLW22,
  author       = {Hui Du and
                  Constance M. Lehmann and
                  Victor L. Willson},
  title        = {Would You Give Me Your Password?},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {2},
  pages        = {17--52},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2021-019},
  doi          = {10.2308/ISYS-2021-019},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DuLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/EulerichWW22,
  author       = {Marc Eulerich and
                  Martin Wagener and
                  David A. Wood},
  title        = {Evidence on Internal Audit Quality from Transitioning to Remote Audits
                  because of {COVID-19}},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {3},
  pages        = {219--234},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2021-021},
  doi          = {10.2308/ISYS-2021-021},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/EulerichWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GanboldRRR22,
  author       = {Odkhishig Ganbold and
                  Anna M. Rose and
                  Jacob M. Rose and
                  Kristian Rotaru},
  title        = {Increasing Reliance on Financial Advice with Avatars: The Effects
                  of Competence and Complexity on Algorithm Aversion},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {1},
  pages        = {7--17},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2021-002},
  doi          = {10.2308/ISYS-2021-002},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GanboldRRR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GreeneHLWK22,
  author       = {Linda Greene and
                  Inkyoung Hur and
                  Yair Levy and
                  Ling Wang and
                  Keumseok Kang},
  title        = {Assessing Effects of Media Affordances and Information Security Awareness
                  on Knowledge-Sharing in Global Software Development},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {1},
  pages        = {111--132},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-072},
  doi          = {10.2308/ISYS-2020-072},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GreeneHLWK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GuoYW22,
  author       = {Ken H. Guo and
                  Xiaoxiao Yu and
                  Carla Wilkin},
  title        = {A Picture is Worth a Thousand Journal Entries: Accounting Graph Topology
                  for Auditing and Fraud Detection},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {2},
  pages        = {53--81},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2021-003},
  doi          = {10.2308/ISYS-2021-003},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GuoYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HeHW22,
  author       = {Zhijian He and
                  Jiangbo Huangfu and
                  Stephanie Walton},
  title        = {Cybersecurity Breaches in the Supply Chain and Earnings Management},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {3},
  pages        = {83--113},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2021-042},
  doi          = {10.2308/ISYS-2021-042},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HeHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HoitashH22,
  author       = {Rani Hoitash and
                  Udi Hoitash},
  title        = {A Measure of Firm Complexity: Data and Code},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {2},
  pages        = {161--172},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2021-041},
  doi          = {10.2308/ISYS-2021-041},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HoitashH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HuangWYLWY22,
  author       = {Shi{-}Ming Huang and
                  Tawei Wang and
                  Ju{-}Chun Yen and
                  Chi{-}Bei Lee and
                  Yu{-}Chen Wang and
                  Yi{-}Ting Yang},
  title        = {The Use of Geographic Information in Audit Data Analytics for Evidence
                  Gathering: {A} Design Science Approach},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {3},
  pages        = {115--128},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-045},
  doi          = {10.2308/ISYS-2020-045},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/HuangWYLWY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Jena22,
  author       = {R. K. Jena},
  title        = {Exploring Antecedents of Peoples' Intentions to Use Smart Services
                  in a Smart City Environment: An Extended {UTAUT} Model},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {1},
  pages        = {133--149},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-050},
  doi          = {10.2308/ISYS-2020-050},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Jena22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/JiangLRW22,
  author       = {Wanying Jiang and
                  Joseph Legoria and
                  Kenneth J. Reichelt and
                  Stephanie Walton},
  title        = {Firm Use of Cybersecurity Risk Disclosures},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {1},
  pages        = {151--180},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-067},
  doi          = {10.2308/ISYS-2020-067},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/JiangLRW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KlausKMGK22,
  author       = {J. Philipp Klaus and
                  Kevin Kim and
                  Adi Masli and
                  Katia Guerra and
                  Leon A. Kappelman},
  title        = {Prioritizing {IT} Management Issues and Business Performance},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {2},
  pages        = {83--99},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-016},
  doi          = {10.2308/ISYS-2020-016},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KlausKMGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Koreff22,
  author       = {Jared Koreff},
  title        = {Are Auditors' Reliance on Conclusions from Data Analytics Impacted
                  by Different Data Analytic Inputs?},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {1},
  pages        = {19--37},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-19-051},
  doi          = {10.2308/ISYS-19-051},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Koreff22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LiJ22,
  author       = {Yuan Li and
                  Ahmad H. Juma'h},
  title        = {The Effect of Technological and Task Considerations on Auditors' Acceptance
                  of Blockchain Technology},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {3},
  pages        = {129--151},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-022},
  doi          = {10.2308/ISYS-2020-022},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/LiJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LiewOPW22,
  author       = {Angela Liew and
                  Daniel E. O'Leary and
                  Arif Perdana and
                  Tawei Wang},
  title        = {Digital Transformation in Accounting and Auditing: 2021 International
                  Conference of the Journal of Information Systems Panel Discussion},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {3},
  pages        = {177--190},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2022-008},
  doi          = {10.2308/ISYS-2022-008},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/LiewOPW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LiuW22,
  author       = {Xin Liu and
                  Bernard Wong{-}On{-}Wing},
  title        = {The Role of Construal Alignment in Enterprise Risk Management},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {1},
  pages        = {39--52},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-003},
  doi          = {10.2308/ISYS-2020-003},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LiuW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LiuYW22,
  author       = {Wu{-}Po Liu and
                  Meng{-}Feng Yen and
                  Tai{-}Ying Wu},
  title        = {Report Users' Perceived Sentiments of Key Audit Matters and Firm Performance:
                  Evidence from a Deep Learning-Based Natural Language Processing Approach},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {3},
  pages        = {191--209},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-061},
  doi          = {10.2308/ISYS-2020-061},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LiuYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PlattfautB22,
  author       = {Ralf Plattfaut and
                  Vincent Borghoff},
  title        = {Robotic Process Automation: {A} Literature-Based Research Agenda},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {2},
  pages        = {173--191},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-033},
  doi          = {10.2308/ISYS-2020-033},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PlattfautB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/RoseRRST22,
  author       = {Anna M. Rose and
                  Jacob M. Rose and
                  Kristian Rotaru and
                  Kerri{-}Ann Sanderson and
                  Jay C. Thibodeau},
  title        = {Effects of Data Visualization Choices on Psychophysiological Responses,
                  Judgment, and Audit Quality},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {1},
  pages        = {53--79},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-046},
  doi          = {10.2308/ISYS-2020-046},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/RoseRRST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Sheldon22,
  author       = {Mark D. Sheldon},
  title        = {Tracking Tangible Asset Ownership and Provenance with Blockchain},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {3},
  pages        = {153--175},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-042},
  doi          = {10.2308/ISYS-2020-042},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/Sheldon22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SunWY22,
  author       = {Chia{-}Ming Sun and
                  Yen{-}Yao Wang and
                  Chen{-}Bin Yang},
  title        = {Information Security Assurance and the Role of Security Configuration
                  Management: Substantive and Symbolic Perspectives},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {1},
  pages        = {181--199},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-065},
  doi          = {10.2308/ISYS-2020-065},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SunWY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Wang22,
  author       = {Yen{-}Yao Wang},
  title        = {Python Code and Illustrative Crisis Management Data from Twitter},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {3},
  pages        = {211--217},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2022-011},
  doi          = {10.2308/ISYS-2022-011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Wang22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WitteET22,
  author       = {Annie L. Witte and
                  Christine E. Earley and
                  Jay C. Thibodeau},
  title        = {Big Fish, Small Pond: How In-Charge Auditors Engage with Technology-Based
                  Audit Tools to Influence the Audit in Non-Global Network Firms},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {2},
  pages        = {141--160},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-047},
  doi          = {10.2308/ISYS-2020-047},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WitteET22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/X22,
  title        = {Editorial Policy},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {1},
  pages        = {219--222},
  year         = {2022},
  url          = {https://doi.org/10.2308/1558-7959-36.1.219},
  doi          = {10.2308/1558-7959-36.1.219},
  timestamp    = {Thu, 07 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/X22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/X22a,
  title        = {Covers and Front Matter},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {1},
  pages        = {i--vi},
  year         = {2022},
  url          = {https://doi.org/10.2308/1558-7959-36.1.i},
  doi          = {10.2308/1558-7959-36.1.I},
  timestamp    = {Thu, 07 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/X22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/X22b,
  title        = {Covers and Front Matter},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {2},
  pages        = {i--vi},
  year         = {2022},
  url          = {https://doi.org/10.2308/1558-7959-36.2.i},
  doi          = {10.2308/1558-7959-36.2.I},
  timestamp    = {Wed, 12 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/X22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/X22c,
  title        = {Editorial Policy},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {2},
  pages        = {193--196},
  year         = {2022},
  url          = {https://doi.org/10.2308/1558-7959-36.2.193},
  doi          = {10.2308/1558-7959-36.2.193},
  timestamp    = {Wed, 12 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/X22c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/X22d,
  title        = {Editorial Policy},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {3},
  pages        = {235--239},
  year         = {2022},
  url          = {https://doi.org/10.2308/1558-7959-36.3.235},
  doi          = {10.2308/1558-7959-36.3.235},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/X22d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ZhangTV22,
  author       = {Chanyuan (Abigail) Zhang and
                  Chanta Thomas and
                  Miklos A. Vasarhelyi},
  title        = {Attended Process Automation in Audit: {A} Framework and {A} Demonstration},
  journal      = {J. Inf. Syst.},
  volume       = {36},
  number       = {2},
  pages        = {101--124},
  year         = {2022},
  url          = {https://doi.org/10.2308/isys-2020-073},
  doi          = {10.2308/ISYS-2020-073},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ZhangTV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AlbizriA21,
  author       = {Abdullah Albizri and
                  Deniz Appelbaum},
  title        = {Trust but Verify: The Oracle Paradox of Blockchain Smart Contracts},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {2},
  pages        = {1--16},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-19-024},
  doi          = {10.2308/ISYS-19-024},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/AlbizriA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AllenOQS21,
  author       = {Eric Allen and
                  Daniel E. O'Leary and
                  Hao Qu and
                  Charles W. Swenson},
  title        = {Tax Specific versus Generic Accounting-Based Textual Analysis and
                  the Relationship with Effective Tax Rates: Building Context},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {2},
  pages        = {115--147},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-2020-018},
  doi          = {10.2308/ISYS-2020-018},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/AllenOQS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AlzamilAGV21,
  author       = {Zamil S. Alzamil and
                  Deniz Appelbaum and
                  William Glasgall and
                  Miklos A. Vasarhelyi},
  title        = {Applications of Data Analytics: Cluster Analysis of Not-for-Profit
                  Data},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {3},
  pages        = {199--221},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-2020-025},
  doi          = {10.2308/ISYS-2020-025},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/AlzamilAGV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CasterEJ21,
  author       = {Paul Caster and
                  Randal J. Elder and
                  Diane J. Janvrin},
  title        = {An Exploration of Bank Confirmation Process Automation: {A} Longitudinal
                  Study},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {3},
  pages        = {1--16},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-19-038},
  doi          = {10.2308/ISYS-19-038},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/CasterEJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChangKKR21,
  author       = {Hyun Woong (Daniel) Chang and
                  Steven Kaszak and
                  Peter C. Kipp and
                  Jesse C. Robertson},
  title        = {The Effect of iXBRL Formatted Financial Statements on the Effectiveness
                  of Managers' Decisions When Making Inter-Firm Comparisons},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {2},
  pages        = {149--177},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-2020-011},
  doi          = {10.2308/ISYS-2020-011},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChangKKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChengHPY21,
  author       = {Xin Cheng and
                  Feiqi Huang and
                  Dan Palmon and
                  Cheng Yin},
  title        = {How Does Information Processing Efficiency Relate to Investment Efficiency?
                  Evidence from {XBRL} Adoption},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {1--25},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-18-063},
  doi          = {10.2308/ISYS-18-063},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChengHPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CheongYCN21,
  author       = {Arion Cheong and
                  Kyunghee Yoon and
                  Soohyun Cho and
                  Won Gyun No},
  title        = {Classifying the Contents of Cybersecurity Risk Disclosure through
                  Textual Analysis and Factor Analysis},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {2},
  pages        = {179--194},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-2020-031},
  doi          = {10.2308/ISYS-2020-031},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/CheongYCN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChouHSWLW21,
  author       = {Chi{-}Chun Chou and
                  Nen{-}Chen Richard Hwang and
                  Gary P. Schneider and
                  Tawei Wang and
                  Chang{-}Wei Li and
                  William Wei},
  title        = {Using Smart Contracts to Establish Decentralized Accounting Contracts:
                  An Example of Revenue Recognition},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {3},
  pages        = {17--52},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-19-009},
  doi          = {10.2308/ISYS-19-009},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChouHSWLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChuCL21,
  author       = {K. C. Kenneth Chu and
                  Sipeng Chen and
                  Tommy Leung},
  title        = {A Novel Algorithm for Generating a {GVKEY-CIK} Link Table},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {27--46},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-18-068},
  doi          = {10.2308/ISYS-18-068},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChuCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CongDV21,
  author       = {Yu Cong and
                  Hui Du and
                  Miklos A. Vasarhelyi},
  title        = {Cloud Computing Start-ups and Emerging Technologies: From Private
                  Investors' Perspectives},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {47--64},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-17-040},
  doi          = {10.2308/ISYS-17-040},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CongDV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DebrecenyRW21,
  author       = {Roger S. Debreceny and
                  Asheq Razaur Rahman and
                  Tawei Wang},
  title        = {Is User-Generated Twittersphere Activity Associated with Stock Market
                  Reactions to 8-K Filings?},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {2},
  pages        = {195--217},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-2020-034},
  doi          = {10.2308/ISYS-2020-034},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DebrecenyRW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/FengK21,
  author       = {Cecilia (Qian) Feng and
                  Chansog (Francis) Kim},
  title        = {Information Processing Costs and Firms' Investment Efficiency: An
                  Examination of Channels of the {XBRL} Effect},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {3},
  pages        = {53--75},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-2020-077},
  doi          = {10.2308/ISYS-2020-077},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/FengK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GarrettHO21,
  author       = {Jace B. Garrett and
                  D. Kip Holderness Jr. and
                  Kari Joseph Olsen},
  title        = {An Experimental Investigation of How Self-Interested Organizational
                  Norms Undermine Prosocial Motivation and Influence Employee Effort},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {2},
  pages        = {17--36},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-19-047},
  doi          = {10.2308/ISYS-19-047},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GarrettHO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GuoLWYZZ21,
  author       = {Feng Guo and
                  Xin Luo and
                  Patrick R. Wheeler and
                  Liu (leo) Yang and
                  Xinlei Zhao and
                  Yiyang Ian Zhang},
  title        = {Enterprise Resource Planning Systems and {XBRL} Reporting Quality},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {3},
  pages        = {77--106},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-2020-007},
  doi          = {10.2308/ISYS-2020-007},
  timestamp    = {Sat, 11 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/GuoLWYZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GuoWWZ21,
  author       = {Feng Guo and
                  Stephanie Walton and
                  Patrick R. Wheeler and
                  Yiyang Ian Zhang},
  title        = {Early Disruptors: Examining the Determinants and Consequences of Blockchain
                  Early Adoption},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {2},
  pages        = {219--242},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-2020-004},
  doi          = {10.2308/ISYS-2020-004},
  timestamp    = {Sat, 11 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/GuoWWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HamptonSAK21,
  author       = {Clark Hampton and
                  Steve G. Sutton and
                  Vicky Arnold and
                  Deepak Khazanchi},
  title        = {Cyber Supply Chain Risk Management: Toward an Understanding of the
                  Antecedents to Demand for Assurance},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {2},
  pages        = {37--60},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-19-050},
  doi          = {10.2308/ISYS-19-050},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HamptonSAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HayesB21,
  author       = {Louise Hayes and
                  J. Efrim Boritz},
  title        = {Classifying Restatements: An Application of Machine Learning and Textual
                  Analytics},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {3},
  pages        = {107--131},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-19-003},
  doi          = {10.2308/ISYS-19-003},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/HayesB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HowardZ21,
  author       = {Jennifer Howard and
                  Jie Zhou},
  title        = {The Timeliness of {XBRL} Filings: An Empirical Examination},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {65--77},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-19-034},
  doi          = {10.2308/ISYS-19-034},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HowardZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/JohnstonZ21,
  author       = {Joseph Johnston and
                  Joseph H. Zhang},
  title        = {Auditor Style and Financial Reporting Similarity},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {79--99},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-18-046},
  doi          = {10.2308/ISYS-18-046},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/JohnstonZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KoganY21,
  author       = {Alexander Kogan and
                  Cheng Yin},
  title        = {Privacy-Preserving Information Sharing within an Audit Firm},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {2},
  pages        = {243--268},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-2020-017},
  doi          = {10.2308/ISYS-2020-017},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KoganY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LanktonPK21,
  author       = {Nancy K. Lankton and
                  Jean Price and
                  Mohammad Karim},
  title        = {Cybersecurity Breaches and the Role of Information Technology Governance
                  in Audit Committee Charters},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {101--119},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-18-071},
  doi          = {10.2308/ISYS-18-071},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LanktonPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LaurierHS21,
  author       = {Wim Laurier and
                  Satoshi Horiuchi and
                  Monique Snoeck},
  title        = {An Executable Axiomatization of the {REA2} Ontology},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {3},
  pages        = {133--154},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-19-026},
  doi          = {10.2308/ISYS-19-026},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/LaurierHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/NormanRRSX21,
  author       = {Carolyn Strand Norman and
                  Anna M. Rose and
                  Jacob M. Rose and
                  Ikseon Suh and
                  Xinning Xiao},
  title        = {An Investigation of the Effects of Allegation Sources and Consequences
                  on Corporate Directors' Responses to Whistleblowing Allegations},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {3},
  pages        = {223--232},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-2020-049},
  doi          = {10.2308/ISYS-2020-049},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/NormanRRSX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PimentelBEC21,
  author       = {Erica Pimentel and
                  Emilio Boulianne and
                  Shayan Eskandari and
                  Jeremy Clark},
  title        = {Systemizing the Challenges of Auditing Blockchain-Based Assets},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {2},
  pages        = {61--75},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-19-007},
  doi          = {10.2308/ISYS-19-007},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PimentelBEC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Sheldon21,
  author       = {Mark D. Sheldon},
  title        = {Auditing the Blockchain Oracle Problem},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {121--133},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-19-049},
  doi          = {10.2308/ISYS-19-049},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Sheldon21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SidgmanBB21,
  author       = {Juergen Sidgman and
                  Veena L. Brown and
                  Joseph F. Brazel},
  title        = {The Multitasking Audit Environment: The Effect of Alternative Modes
                  of Communication on Team Performance},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {3},
  pages        = {155--175},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-2020-019},
  doi          = {10.2308/ISYS-2020-019},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/SidgmanBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/StoelH21,
  author       = {M. Dale Stoel and
                  Douglas Havelka},
  title        = {Information Technology Audit Quality: An Investigation of the Impact
                  of Individual and Organizational Factors},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {135--154},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-18-043},
  doi          = {10.2308/ISYS-18-043},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/StoelH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/TangEC21,
  author       = {Fengchun Tang and
                  Christopher Kevin Eller and
                  Sandra J. Cereola},
  title        = {How Do Reporting Frequency and Analyst Perceptions of Real Activities
                  Manipulation {(RAM)} Influence Managers' {RAM} Behavior?},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {2},
  pages        = {77--90},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-19-030},
  doi          = {10.2308/ISYS-19-030},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/TangEC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WaltonWZZ21,
  author       = {Stephanie Walton and
                  Patrick R. Wheeler and
                  Yiyang Ian Zhang and
                  Xinlei Ray Zhao},
  title        = {An Integrative Review and Analysis of Cybersecurity Research: Current
                  State and Future Directions},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {155--186},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-19-033},
  doi          = {10.2308/ISYS-19-033},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WaltonWZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WaltonYZ21,
  author       = {Stephanie Walton and
                  Liu (leo) Yang and
                  Yiyang Ian Zhang},
  title        = {{XBRL} Tag Extensions and Tax Accrual Quality},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {2},
  pages        = {91--114},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-19-054},
  doi          = {10.2308/ISYS-19-054},
  timestamp    = {Sat, 11 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/WaltonYZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/X21,
  title        = {Covers and Front Matter},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {i--vi},
  year         = {2021},
  url          = {https://doi.org/10.2308/1558-7959-35.1.i},
  doi          = {10.2308/1558-7959-35.1.I},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/X21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/X21a,
  title        = {Covers and Front Matter},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {2},
  pages        = {i--vi},
  year         = {2021},
  url          = {https://doi.org/10.2308/1558-7959-35.2.i},
  doi          = {10.2308/1558-7959-35.2.I},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/X21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/X21b,
  title        = {Covers and Front Matter},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {3},
  pages        = {i--vi},
  year         = {2021},
  url          = {https://doi.org/10.2308/1558-7959-35.3.i},
  doi          = {10.2308/1558-7959-35.3.I},
  timestamp    = {Fri, 17 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/X21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/X21c,
  title        = {Editorial Policy},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {3},
  pages        = {233--236},
  year         = {2021},
  url          = {https://doi.org/10.2308/2380-4505-35.3.233},
  doi          = {10.2308/2380-4505-35.3.233},
  timestamp    = {Fri, 17 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/X21c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Yen21,
  author       = {Ju{-}Chun Yen},
  title        = {The Effect of Legal Entity Identifiers on Audit Fee Changes},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {3},
  pages        = {177--197},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-2020-056},
  doi          = {10.2308/ISYS-2020-056},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/Yen21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/YoonNGR21,
  author       = {Kyunghee Yoon and
                  Won Gyun No and
                  Glen L. Gray and
                  Peter J. Roebuck},
  title        = {Green {IT} Perceptions and Activities of Internal Auditors in Australia,
                  Canada, and the United States},
  journal      = {J. Inf. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {187--211},
  year         = {2021},
  url          = {https://doi.org/10.2308/isys-17-061},
  doi          = {10.2308/ISYS-17-061},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/YoonNGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/0001DM20,
  author       = {Andrew J. Harrison and
                  William N. Dilla and
                  Brian E. Mennecke},
  title        = {Relationships within the Fraud Diamond: The Decision Processes That
                  Influence Fraudulent Intentions in Online Consumer Fraud},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {1},
  pages        = {61--80},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52627},
  doi          = {10.2308/ISYS-52627},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/0001DM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AbernathyBDR20,
  author       = {John L. Abernathy and
                  Brooke Beyer and
                  Jimmy F. Downes and
                  Eric T. Rapley},
  title        = {High-Quality Information Technology and Capital Investment Decisions},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {3},
  pages        = {1--29},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52634},
  doi          = {10.2308/ISYS-52634},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/AbernathyBDR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AddyB20,
  author       = {Noel D. Addy and
                  Nathan R. Berglund},
  title        = {Determinants of Timely Adoption of the 2013 {COSO} Integrated Framework},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {1},
  pages        = {1--20},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52378},
  doi          = {10.2308/ISYS-52378},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/AddyB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AlaminW0W20,
  author       = {Adel Alamin and
                  Carla L. Wilkin and
                  William Yeoh and
                  Matthew J. Warren},
  title        = {The Impact of Self-Efficacy on Accountants' Behavioral Intention to
                  Adopt and Use Accounting Information Systems},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {3},
  pages        = {31--46},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52617},
  doi          = {10.2308/ISYS-52617},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/AlaminW0W20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AllesG20,
  author       = {Michael G. Alles and
                  Glen L. Gray},
  title        = {Will the Medium Become the Message? {A} Framework for Understanding
                  the Coming Automation of the Audit Process},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {109--130},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52633},
  doi          = {10.2308/ISYS-52633},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/AllesG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AppelbaumN20,
  author       = {Deniz Appelbaum and
                  Robert A. Nehmer},
  title        = {Auditing Cloud-Based Blockchain Accounting Systems},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {5--21},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52660},
  doi          = {10.2308/ISYS-52660},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/AppelbaumN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoritzN20,
  author       = {J. Efrim Boritz and
                  Won Gyun No},
  title        = {How Significant are the Differences in Financial Data Provided by
                  Key Data Sources? {A} Comparison of XBRL, Compustat, Yahoo! Finance,
                  and Google Finance},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {3},
  pages        = {47--75},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52618},
  doi          = {10.2308/ISYS-52618},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/BoritzN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CanadaH20,
  author       = {Joseph Canada and
                  Erica E. Harris},
  title        = {The Role of Web Assurance Seals in Nonprofit Giving},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {131--148},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52614},
  doi          = {10.2308/ISYS-52614},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/CanadaH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChurchSA20,
  author       = {Kim S. Church and
                  Pamela J. Schmidt and
                  Kemi Ajayi},
  title        = {Forecast Cloudy - Fair or Stormy Weather: Cloud Computing Insights
                  and Issues},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {23--46},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-18-037},
  doi          = {10.2308/ISYS-18-037},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChurchSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CossD20,
  author       = {David Lewis Coss and
                  Gurpreet Dhillon},
  title        = {A Framework for Auditing and Strategizing to Ensure Cloud Privacy},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {47--63},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-17-046},
  doi          = {10.2308/ISYS-17-046},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CossD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DameriGR20,
  author       = {Renata Paola Dameri and
                  Roberto Garelli and
                  Marina Resta},
  title        = {Neural Networks in Accounting: Clustering Firm Performance Using Financial
                  Reporting Data},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {149--166},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-18-002},
  doi          = {10.2308/ISYS-18-002},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/DameriGR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DebrecenyFSS20,
  author       = {Roger S. Debreceny and
                  Stephanie M. Farewell and
                  Audrey N. Scarlata and
                  Dan N. Stone},
  title        = {Knowledge and Skills in Complex Assurance Engagements: The Case of
                  {XBRL}},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {1},
  pages        = {21--45},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52461},
  doi          = {10.2308/ISYS-52461},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DebrecenyFSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DurkinRT20,
  author       = {Mary P. Durkin and
                  Jacob M. Rose and
                  Jay C. Thibodeau},
  title        = {Can Simple Metaphors Be Used as Decision Aids to Promote Professional
                  Skepticism?},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {1},
  pages        = {47--60},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52380},
  doi          = {10.2308/ISYS-52380},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/DurkinRT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HaislipKLP20,
  author       = {Jacob Z. Haislip and
                  Khondkar E. Karim and
                  Karen Jingrong Lin and
                  Robert E. Pinsker},
  title        = {The Influences of {CEO} {IT} Expertise and Board-Level Technology
                  Committees on Form 8-K Disclosure Timeliness},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {167--185},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52530},
  doi          = {10.2308/ISYS-52530},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/HaislipKLP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HeFP20,
  author       = {Chris Zhijian He and
                  Tracie Frost and
                  Robert E. Pinsker},
  title        = {The Impact of Reported Cybersecurity Breaches on Firm Innovation},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {187--209},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-18-053},
  doi          = {10.2308/ISYS-18-053},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HeFP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Hirsch20,
  author       = {Rina M. Hirsch},
  title        = {The Effect of Spatial Distance and Domain Knowledge Distinctiveness
                  on Auditor Reliance on {IT} Specialists},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {1},
  pages        = {81--103},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52456},
  doi          = {10.2308/ISYS-52456},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/Hirsch20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/JanvrinML20,
  author       = {Diane J. Janvrin and
                  Maureen Francis Mascha and
                  Melvin A. Lamboy{-}Ruiz},
  title        = {{SOX} 404(b) Audits: Evidence from Auditing the Financial Close Process
                  of the Accounting System},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {3},
  pages        = {77--103},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-18-055},
  doi          = {10.2308/ISYS-18-055},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/JanvrinML20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Johnston20,
  author       = {Joseph Johnston},
  title        = {Extended {XBRL} Tags and Financial Analysts' Forecast Error and Dispersion},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {3},
  pages        = {105--131},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-16-013},
  doi          = {10.2308/ISYS-16-013},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/Johnston20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KeltonP20,
  author       = {Andrea Seaton Kelton and
                  Robin R. Pennington},
  title        = {If You Tweet, They Will Follow: {CEO} Tweets, Social Capital, and
                  Investor Say-on-Pay Judgments},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {1},
  pages        = {105--122},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52449},
  doi          = {10.2308/ISYS-52449},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KeltonP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KeltonP20a,
  author       = {Andrea Seaton Kelton and
                  Robin R. Pennington},
  title        = {Do Voluntary Disclosures Mitigate the Cybersecurity Breach Contagion
                  Effect?},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {3},
  pages        = {133--157},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52628},
  doi          = {10.2308/ISYS-52628},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/KeltonP20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LeeB20,
  author       = {Lorraine S. Lee and
                  William D. Brink},
  title        = {Trust in Cloud-Based Services: {A} Framework for Consumer Adoption
                  of Software as a Service},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {65--85},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52626},
  doi          = {10.2308/ISYS-52626},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/LeeB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LiCWC20,
  author       = {Hsing{-}Jung Li and
                  She{-}I Chang and
                  Tawei Wang and
                  Li{-}Min Chang},
  title        = {Information Technology Internal Control Items for the Post-Implementation
                  Phase of Enterprise Resource Planning Systems},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {3},
  pages        = {159--197},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52615},
  doi          = {10.2308/ISYS-52615},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LiCWC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MalimageRTCB20,
  author       = {Kalana Malimage and
                  Nirmalee I. Raddatz and
                  Brad S. Trinkle and
                  Robert E. Crossler and
                  Rebecca Baaske},
  title        = {Impact of Deterrence and Inertia on Information Security Policy Changes},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {1},
  pages        = {123--134},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52400},
  doi          = {10.2308/ISYS-52400},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/MalimageRTCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MurthySWZ20,
  author       = {Uday S. Murthy and
                  Thomas J. Smith and
                  James D. Whitworth and
                  Yiyang Zhang},
  title        = {The Effects of Information Systems Compatibility on Firm Performance
                  following Mergers and Acquisitions},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {211--233},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-18-004},
  doi          = {10.2308/ISYS-18-004},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/MurthySWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/RaddatzCT20,
  author       = {Nirmalee I. Raddatz and
                  Joshua G. Coyne and
                  Brad S. Trinkle},
  title        = {Internal Motivators for the Protection of Organizational Data},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {3},
  pages        = {199--211},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-18-067},
  doi          = {10.2308/ISYS-18-067},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/RaddatzCT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/RaddatzMT20,
  author       = {Nirmalee I. Raddatz and
                  Kent Marett and
                  Brad S. Trinkle},
  title        = {The Impact of Awareness of Being Monitored on Computer Usage Policy
                  Compliance: An Agency View},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {1},
  pages        = {135--149},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52246},
  doi          = {10.2308/ISYS-52246},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/RaddatzMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/RaddatzSSW20,
  author       = {Nirmalee I. Raddatz and
                  Thomas F. Stafford and
                  Craig Van Slyke and
                  Merrill Warkentin},
  title        = {Grassroots Adoption of Cloud-Based Storage Solutions},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {3},
  pages        = {213--232},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-18-066},
  doi          = {10.2308/ISYS-18-066},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/RaddatzSSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/RitchiJMR20,
  author       = {Hamzah Ritchi and
                  Mieke Jans and
                  Jan Mendling and
                  Hajo A. Reijers},
  title        = {The Influence of Business Process Representation on Performance of
                  Different Task Types},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {1},
  pages        = {167--194},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52385},
  doi          = {10.2308/ISYS-52385},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/RitchiJMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/RonkkoA20,
  author       = {Mikko R{\"{o}}nkk{\"{o}} and
                  Miguel I. Aguirre{-}Urreta},
  title        = {Cautionary Note on the Two-Step Transformation to Normality},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {1},
  pages        = {151--166},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52255},
  doi          = {10.2308/ISYS-52255},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/RonkkoA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SchmidtG20,
  author       = {Pamela J. Schmidt and
                  Graham Gal},
  title        = {Editors' Introduction to the Special Section on Cloud Computing and
                  Accounting Information Systems {(JISC} 2018)},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {1--4},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-10726},
  doi          = {10.2308/ISYS-10726},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/SchmidtG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ShoemakerCFK20,
  author       = {Nikki Shoemaker and
                  Mary B. Curtis and
                  Louis Fayard and
                  Marie T. Kelly},
  title        = {What Happens When Formal and Informal Norms Conflict for {IT} Usage?},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {235--256},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52616},
  doi          = {10.2308/ISYS-52616},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/ShoemakerCFK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WangK20,
  author       = {YunSen Wang and
                  Alexander Kogan},
  title        = {Cloud-Based In-Memory Columnar Database Architecture for Continuous
                  Audit Analytics},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {87--107},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52531},
  doi          = {10.2308/ISYS-52531},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/WangK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WilkinC20,
  author       = {Carla L. Wilkin and
                  Robert H. Chenhall},
  title        = {Information Technology Governance: Reflections on the Past and Future
                  Directions},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {257--292},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52632},
  doi          = {10.2308/ISYS-52632},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/WilkinC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Zhang20,
  author       = {Yibo James Zhang},
  title        = {The Impact of Vivid Graphical Presentation of Financial Information
                  in Digital Annual Reports on Investors' Impressions of Management
                  and Firm Performance},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {3},
  pages        = {233--253},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52533},
  doi          = {10.2308/ISYS-52533},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/Zhang20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BankerF19,
  author       = {Rajiv D. Banker and
                  Cecilia (Qian) Feng},
  title        = {The Impact of Information Security Breach Incidents on {CIO} Turnover},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {309--329},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52532},
  doi          = {10.2308/ISYS-52532},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BankerF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BarrickMSW19,
  author       = {John A. Barrick and
                  Nathan W. Mecham and
                  Scott L. Summers and
                  David A. Wood},
  title        = {Ranking Accounting Journals by Topical Area and Methodology},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {2},
  pages        = {1--22},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-51981},
  doi          = {10.2308/ISYS-51981},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/BarrickMSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChenZ19,
  author       = {Gary Chen and
                  Jie Zhou},
  title        = {{XBRL} Adoption and Systematic Information Acquisition via {EDGAR}},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {2},
  pages        = {23--43},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52140},
  doi          = {10.2308/ISYS-52140},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/ChenZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChengW19,
  author       = {Xu (Joyce) Cheng and
                  Stephanie Walton},
  title        = {Do Nonprofessional Investors Care About How and When Data Breaches
                  are Disclosed?},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {163--182},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52410},
  doi          = {10.2308/ISYS-52410},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChengW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CongOS19,
  author       = {Yu Cong and
                  Ayishat Omar and
                  Huey{-}Lian Sun},
  title        = {Does {IT} Outsourcing Affect the Accuracy and Speed of Financial Disclosures?
                  Evidence from Preparer-Side {XBRL} Filing Decisions},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {2},
  pages        = {45--61},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52080},
  doi          = {10.2308/ISYS-52080},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CongOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CurryMCC19,
  author       = {Michael Curry and
                  Byron Marshall and
                  John Correia and
                  Robert E. Crossler},
  title        = {InfoSec Process Action Model {(IPAM):} Targeting Insiders' Weak Password
                  Behavior},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {201--225},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52381},
  doi          = {10.2308/ISYS-52381},
  timestamp    = {Wed, 16 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CurryMCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DebrecenyWZ19,
  author       = {Roger S. Debreceny and
                  Tawei Wang and
                  Mi (Jamie) Zhou},
  title        = {Research in Social Media: Data Sources and Methodologies},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {1},
  pages        = {1--28},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-51984},
  doi          = {10.2308/ISYS-51984},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/DebrecenyWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/FordhamH19,
  author       = {David R. Fordham and
                  Carol W. Hamilton},
  title        = {Accounting Information Technology in Small Businesses: An Inquiry},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {2},
  pages        = {63--75},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-51982},
  doi          = {10.2308/ISYS-51982},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/FordhamH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/FrankGP19,
  author       = {Michele L. Frank and
                  Jonathan H. Grenier and
                  Jonathan S. Pyzoha},
  title        = {How Disclosing a Prior Cyberattack Influences the Efficacy of Cybersecurity
                  Risk Management Reporting and Independent Assurance},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {183--200},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52374},
  doi          = {10.2308/ISYS-52374},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/FrankGP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GaoB19,
  author       = {Lei Gao and
                  Alisa G. Brink},
  title        = {A Content Analysis of the Privacy Policies of Cloud Computing Services},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {93--115},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52188},
  doi          = {10.2308/ISYS-52188},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/GaoB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HoltL19,
  author       = {Travis P. Holt and
                  Tina M. Loraas},
  title        = {Using Qualtrics Panels to Source External Auditors: {A} Replication
                  Study},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {1},
  pages        = {29--41},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-51986},
  doi          = {10.2308/ISYS-51986},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/HoltL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HsiehWA19,
  author       = {Tien{-}Shih Hsieh and
                  Zhihong Wang and
                  Mohammad Abdolmohammadi},
  title        = {Factors Associated with Companies' Choices of {XBRL} Implementation
                  Strategies: Evidence from the {U.S.} Market},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {75--91},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52185},
  doi          = {10.2308/ISYS-52185},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HsiehWA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HuangNV19,
  author       = {Feiqi Huang and
                  Won Gyun No and
                  Miklos A. Vasarhelyi},
  title        = {Do Managers Use Extension Elements Strategically in the SEC's Tagged
                  Data for Financial Statements? Evidence from {XBRL} Complexity},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {61--74},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52162},
  doi          = {10.2308/ISYS-52162},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/HuangNV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HuntS19,
  author       = {Nicholas C. Hunt and
                  Andrea M. Scheetz},
  title        = {Using MTurk to Distribute a Survey or Experiment: Methodological Considerations},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {1},
  pages        = {43--65},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52021},
  doi          = {10.2308/ISYS-52021},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/HuntS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/IonitaWGY19,
  author       = {Dan Ionita and
                  Roel J. Wieringa and
                  Jaap Gordijn and
                  Ahmed Seid Yesuf},
  title        = {Quantitative, Value-Driven Risk Analysis of e-Services},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {45--60},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52150},
  doi          = {10.2308/ISYS-52150},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/IonitaWGY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KarimLPZ19,
  author       = {Khondkar E. Karim and
                  Karen Jingrong Lin and
                  Robert E. Pinsker and
                  Hongwei Zhu},
  title        = {Using Linguistics to Mine Unstructured Data from {FASB} Exposure Drafts},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {1},
  pages        = {67--83},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-51928},
  doi          = {10.2308/ISYS-51928},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/KarimLPZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KippZT19,
  author       = {Peter C. Kipp and
                  Yibo James Zhang and
                  Amanuel F. Tadesse},
  title        = {Can Social Media Interaction and Message Features Influence Nonprofessional
                  Investors' Perceptions of Firms?},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {2},
  pages        = {77--98},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52067},
  doi          = {10.2308/ISYS-52067},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/KippZT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KuF19,
  author       = {Chih Hao Ku and
                  Maryam Firoozi},
  title        = {The Use of Crowdsourcing and Social Media in Accounting Research},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {1},
  pages        = {85--111},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-51978},
  doi          = {10.2308/ISYS-51978},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KuF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Lamboy-RuizNW19,
  author       = {Melvin A. Lamboy{-}Ruiz and
                  Won Gyun No and
                  Olena V. Watanabe},
  title        = {Discrepancies in Hospital Financial Information: Comparison of Financial
                  Data in State Data Repositories and the Healthcare Cost Reporting
                  Information System},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {19--44},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52149},
  doi          = {10.2308/ISYS-52149},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/Lamboy-RuizNW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LeiLL19,
  author       = {Lijun (Gillian) Lei and
                  Yutao Li and
                  Yan Luo},
  title        = {Social Media and Voluntary Nonfinancial Disclosure: Evidence from
                  Twitter Presence and Corporate Political Disclosure},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {2},
  pages        = {99--128},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52189},
  doi          = {10.2308/ISYS-52189},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/LeiLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LenkKJC19,
  author       = {Margarita M. Lenk and
                  John Peter Krahel and
                  Diane J. Janvrin and
                  Brett Considine},
  title        = {Social Technology: An Integrated Strategy and Risk Management Framework},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {2},
  pages        = {129--153},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52065},
  doi          = {10.2308/ISYS-52065},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/LenkKJC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MarleyS19,
  author       = {Robert Marley and
                  Neal M. Snow},
  title        = {An Empirical Investigation on Social Media Users' Demand for Financial
                  Information Distributed via Social Media Platforms},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {2},
  pages        = {155--175},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52068},
  doi          = {10.2308/ISYS-52068},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/MarleyS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/OLeary19,
  author       = {Daniel E. O'Leary},
  title        = {Facilitating Citizens' Voice and Process Reengineering Using a Cloud-Based
                  Mobile App},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {137--162},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52244},
  doi          = {10.2308/ISYS-52244},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/OLeary19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/OLeary19a,
  author       = {Daniel E. O'Leary},
  title        = {What Phishing E-mails Reveal: An Exploratory Analysis of Phishing
                  Attempts Using Text Analysis},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {285--307},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52481},
  doi          = {10.2308/ISYS-52481},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/OLeary19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/OwensH19,
  author       = {Joel Owens and
                  Erin M. Hawkins},
  title        = {Using Online Labor Market Participants for Nonprofessional Investor
                  Research: {A} Comparison of MTurk and Qualtrics Samples},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {1},
  pages        = {113--128},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52036},
  doi          = {10.2308/ISYS-52036},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/OwensH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/RichardsonSW19,
  author       = {Vernon J. Richardson and
                  Rodney E. Smith and
                  Marcia Weidenmier Watson},
  title        = {Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy
                  Breaches},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {227--265},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52379},
  doi          = {10.2308/ISYS-52379},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/RichardsonSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SmithHP19,
  author       = {Thomas J. Smith and
                  Julia L. Higgs and
                  Robert E. Pinsker},
  title        = {Do Auditors Price Breach Risk in Their Audit Fees?},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {2},
  pages        = {177--204},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52241},
  doi          = {10.2308/ISYS-52241},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/SmithHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SmithZK19,
  author       = {Antoinette L. Smith and
                  Yibo James Zhang and
                  Peter C. Kipp},
  title        = {Cloud-Computing Risk Disclosure and {ICFR} Material Weakness: The
                  Moderating Role of Accounting Reporting Complexity},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {1--17},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52134},
  doi          = {10.2308/ISYS-52134},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/SmithZK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ThibodeauWW19,
  author       = {Jay C. Thibodeau and
                  L. Tyler Williams and
                  Annie L. Witte},
  title        = {Point and Click Data: An Assessment of Editorial Perceptions and Recommendations
                  for the Peer-Review Process in the New Data Frontier},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {1},
  pages        = {129--144},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-51980},
  doi          = {10.2308/ISYS-51980},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/ThibodeauWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/VincentHP19,
  author       = {Nishani Edirisinghe Vincent and
                  Julia L. Higgs and
                  Robert E. Pinsker},
  title        = {Board and Management-Level Factors Affecting the Maturity of {IT}
                  Risk Management Practices},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {117--135},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52229},
  doi          = {10.2308/ISYS-52229},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/VincentHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WernerG19,
  author       = {Michael Werner and
                  Nick Gehrke},
  title        = {Identifying the Absence of Effective Internal Controls: An Alternative
                  Approach for Internal Control Audits},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {2},
  pages        = {205--222},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52112},
  doi          = {10.2308/ISYS-52112},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/WernerG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/XuGHP19,
  author       = {Howard Xu and
                  Savannah (Yuanyaun) Guo and
                  Jacob Z. Haislip and
                  Robert E. Pinsker},
  title        = {Earnings Management in Firms with Data Security Breaches},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {267--284},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52480},
  doi          = {10.2308/ISYS-52480},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/XuGHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ZhangSX19,
  author       = {Michael Chuancai Zhang and
                  Dan N. Stone and
                  Hong Xie},
  title        = {Text Data Sources in Archival Accounting Research: Insights and Strategies
                  for Accounting Systems' Scholars},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {1},
  pages        = {145--180},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-51979},
  doi          = {10.2308/ISYS-51979},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ZhangSX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BierstakerHRT18,
  author       = {James Bierstaker and
                  Denise Hanes{-}Downey and
                  Jacob M. Rose and
                  Jay C. Thibodeau},
  title        = {Effects of Stories and Checklist Decision Aids on Knowledge Structure
                  Development and Auditor Judgment},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {2},
  pages        = {1--24},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51913},
  doi          = {10.2308/ISYS-51913},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/BierstakerHRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoritzEL18,
  author       = {J. Efrim Boritz and
                  Jap Efendi and
                  Jee{-}Hae Lim},
  title        = {The Impact of Senior Management Competencies on the Voluntary Adoption
                  of an Innovative Technology},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {2},
  pages        = {25--46},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51685},
  doi          = {10.2308/ISYS-51685},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/BoritzEL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CefarattiL18,
  author       = {Meghann Cefaratti and
                  Hui Lin},
  title        = {Exploring Data Center Migration: {A} Case Study},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {1},
  pages        = {1--17},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51647},
  doi          = {10.2308/ISYS-51647},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CefarattiL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChandraMM18,
  author       = {Akhilesh Chandra and
                  Nirup M. Menon and
                  Birendra K. Mishra},
  title        = {Budget Adjustments and Spending Patterns: {A} Transaction-Cycle View},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {1},
  pages        = {19--43},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51679},
  doi          = {10.2308/ISYS-51679},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChandraMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChenKLZ18,
  author       = {Gary Chen and
                  Jeong{-}Bon Kim and
                  Jee{-}Hae Lim and
                  Jie Zhou},
  title        = {{XBRL} Adoption and Bank Loan Contracting: Early Evidence},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {2},
  pages        = {47--69},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51688},
  doi          = {10.2308/ISYS-51688},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/ChenKLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChenWZ18,
  author       = {Gary Chen and
                  Xiaohong (Sara) Wang and
                  Jie Zhou},
  title        = {What Do the Markets Say? Shareholder Wealth Effects of the {XBRL}
                  Mandate},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {3},
  pages        = {1--21},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51814},
  doi          = {10.2308/ISYS-51814},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChenWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CockrellSW18,
  author       = {R. Cameron Cockrell and
                  Dan N. Stone and
                  Benson Wier},
  title        = {Accounting for Professional Accountants' Dysfunctional Knowledge Sharing:
                  {A} Self-Determination Theory Perspective},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {1},
  pages        = {45--65},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51677},
  doi          = {10.2308/ISYS-51677},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CockrellSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CongDV18,
  author       = {Yu Cong and
                  Hui Du and
                  Miklos A. Vasarhelyi},
  title        = {Are {XBRL} Files Being Accessed? Evidence from the {SEC} {EDGAR} Log
                  File Dataset},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {3},
  pages        = {23--29},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51885},
  doi          = {10.2308/ISYS-51885},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/CongDV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/EulerichK18,
  author       = {Marc Eulerich and
                  Artur Kalinichenko},
  title        = {The Current State and Future Directions of Continuous Auditing Research:
                  An Analysis of the Existing Literature},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {3},
  pages        = {31--51},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51813},
  doi          = {10.2308/ISYS-51813},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/EulerichK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GuanLG18,
  author       = {Jian Guan and
                  Alan S. Levitan and
                  Sandeep Goyal},
  title        = {Text Mining Using Latent Semantic Analysis: An Illustration through
                  Examination of 30 Years of Research at \emph{JIS}},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {1},
  pages        = {67--86},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51625},
  doi          = {10.2308/ISYS-51625},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GuanLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HaislipR18,
  author       = {Jacob Z. Haislip and
                  Vernon J. Richardson},
  title        = {The Effect of {CEO} {IT} Expertise on the Information Environment:
                  Evidence from Earnings Forecasts and Announcements},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {2},
  pages        = {71--94},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51796},
  doi          = {10.2308/ISYS-51796},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/HaislipR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HeningerJK18,
  author       = {William G. Heninger and
                  Eric N. Johnson and
                  John R. Kuhn Jr.},
  title        = {The Association between {IT} Material Weaknesses and Earnings Management},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {3},
  pages        = {53--64},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51884},
  doi          = {10.2308/ISYS-51884},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/HeningerJK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LoweBJJ18,
  author       = {D. Jordan Lowe and
                  James Bierstaker and
                  Diane J. Janvrin and
                  J. Gregory Jenkins},
  title        = {Information Technology in an Audit Context: Have the Big 4 Lost Their
                  Advantage?},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {1},
  pages        = {87--107},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51794},
  doi          = {10.2308/ISYS-51794},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/LoweBJJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MurthyW18,
  author       = {Uday S. Murthy and
                  Patrick R. Wheeler},
  title        = {The Effects of Decision-Aid Design on Auditor Performance in Internal
                  Control Evaluation Tasks},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {2},
  pages        = {95--113},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51739},
  doi          = {10.2308/ISYS-51739},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/MurthyW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/NuttallSSW18,
  author       = {Garrison Nuttall and
                  Neal M. Snow and
                  Scott L. Summers and
                  David A. Wood},
  title        = {Citation-Based Benchmarks and Individual Accounting Faculty Research
                  Rankings by Topical Area and Methodology},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {2},
  pages        = {115--140},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51689},
  doi          = {10.2308/ISYS-51689},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/NuttallSSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ParedesW18,
  author       = {Angel Arturo Pacheco Paredes and
                  Clark M. Wheatley},
  title        = {Do Enterprise Resource Planning Systems (ERPs) Constrain Real Earnings
                  Management?},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {3},
  pages        = {65--89},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51760},
  doi          = {10.2308/ISYS-51760},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/ParedesW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PriceL18,
  author       = {Jean Price and
                  Nancy K. Lankton},
  title        = {A Framework and Guidelines for Assessing and Developing Board-Level
                  Information Technology Committee Charters},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {1},
  pages        = {109--129},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51674},
  doi          = {10.2308/ISYS-51674},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/PriceL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WandW18,
  author       = {Yair Wand and
                  Ron Weber},
  title        = {Limiting the Search Space during Controls Evaluation of a Modified
                  Information System},
  journal      = {J. Inf. Syst.},
  volume       = {32},
  number       = {3},
  pages        = {91--111},
  year         = {2018},
  url          = {https://doi.org/10.2308/isys-51908},
  doi          = {10.2308/ISYS-51908},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WandW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BorthickP17,
  author       = {A. Faye Borthick and
                  Robin R. Pennington},
  title        = {When Data Become Ubiquitous, What Becomes of Accounting and Assurance?},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {3},
  pages        = {1--4},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-10554},
  doi          = {10.2308/ISYS-10554},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BorthickP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BrownMS17,
  author       = {J. Owen Brown and
                  James A. Marcum and
                  Martin T. Stuebs Jr.},
  title        = {Professional Virtue Reinforcements: {A} Necessary Complement to Technological
                  and Policy Reforms},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {2},
  pages        = {5--23},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51664},
  doi          = {10.2308/ISYS-51664},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BrownMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BurneyRW17,
  author       = {Laurie L. Burney and
                  Robin R. Radtke and
                  Sally K. Widener},
  title        = {The Intersection of "Bad Apples, " "Bad Barrels, " and the Enabling
                  Use of Performance Measurement Systems},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {2},
  pages        = {25--48},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51624},
  doi          = {10.2308/ISYS-51624},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BurneyRW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChenGT17,
  author       = {Songsheng Chen and
                  Jun Guo and
                  Xiaoxiao Tong},
  title        = {{XBRL} Implementation and Post-Earnings-Announcement Drift: The Impact
                  of State Ownership in China},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {1},
  pages        = {1--19},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51374},
  doi          = {10.2308/ISYS-51374},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChenGT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CrosslerLLT17,
  author       = {Robert E. Crossler and
                  James H. Long and
                  Tina M. Loraas and
                  Brad S. Trinkle},
  title        = {The Impact of Moral Intensity and Ethical Tone Consistency on Policy
                  Compliance},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {2},
  pages        = {49--64},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51623},
  doi          = {10.2308/ISYS-51623},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/CrosslerLLT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DaiV17,
  author       = {Jun Dai and
                  Miklos A. Vasarhelyi},
  title        = {Toward Blockchain-Based Accounting and Assurance},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {3},
  pages        = {5--21},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51804},
  doi          = {10.2308/ISYS-51804},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DaiV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DebrecenyRW17,
  author       = {Roger S. Debreceny and
                  Asheq Razaur Rahman and
                  Tawei Wang},
  title        = {Corporate Network Centrality Score: Methodologies and Informativeness},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {3},
  pages        = {23--43},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51797},
  doi          = {10.2308/ISYS-51797},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DebrecenyRW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DunnGGB17,
  author       = {Cheryl L. Dunn and
                  Gregory J. Gerard and
                  Severin V. Grabski and
                  Scott R. Boss},
  title        = {Asymmetry in Identification of Multiplicity Errors in Conceptual Models
                  of Business Processes},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {1},
  pages        = {21--39},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51581},
  doi          = {10.2308/ISYS-51581},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DunnGGB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/FarewellHKP17,
  author       = {Stephanie M. Farewell and
                  Lizhong Hao and
                  Vinod Kashyap and
                  Robert E. Pinsker},
  title        = {A Field Study Examining the Indian Ministry of Corporate Affairs'
                  {XBRL} Implementation},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {1},
  pages        = {103--117},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51389},
  doi          = {10.2308/ISYS-51389},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/FarewellHKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GuragaiHNT17,
  author       = {Binod Guragai and
                  Nicholas C. Hunt and
                  Marc P. Neri and
                  Eileen Z. Taylor},
  title        = {Accounting Information Systems and Ethics Research: Review, Synthesis,
                  and the Future},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {2},
  pages        = {65--81},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51265},
  doi          = {10.2308/ISYS-51265},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GuragaiHNT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HamiltonS17,
  author       = {Russ Hamilton and
                  James Stekelberg},
  title        = {The Effect of High-Quality Information Technology on Corporate Tax
                  Avoidance and Tax Risk},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {2},
  pages        = {83--106},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51482},
  doi          = {10.2308/ISYS-51482},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/HamiltonS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HoltLS17,
  author       = {Matthew Holt and
                  Bradley Lang and
                  Steve G. Sutton},
  title        = {Potential Employees' Ethical Perceptions of Active Monitoring: The
                  Dark Side of Data Analytics},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {2},
  pages        = {107--124},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51580},
  doi          = {10.2308/ISYS-51580},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HoltLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HuertaJ17,
  author       = {Esperanza Huerta and
                  Scott Jensen},
  title        = {An Accounting Information Systems Perspective on Data Analytics and
                  Big Data},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {3},
  pages        = {101--114},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51799},
  doi          = {10.2308/ISYS-51799},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HuertaJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KoganW17,
  author       = {Alexander Kogan and
                  Patrick R. Wheeler},
  title        = {Annual Editor Report},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {3},
  pages        = {1--6},
  year         = {2017},
  url          = {https://doi.org/10.2308/iace-10617},
  doi          = {10.2308/IACE-10617},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KoganW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LunardiMBG17,
  author       = {Guilherme Lerch Lunardi and
                  Ant{\^{o}}nio Carlos Gastaud Ma{\c{c}}ada and
                  Jo{\~{a}}o Luiz Becker and
                  Wim Van Grembergen},
  title        = {Antecedents of {IT} Governance Effectiveness: An Empirical Examination
                  in Brazilian Firms},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {1},
  pages        = {41--57},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51626},
  doi          = {10.2308/ISYS-51626},
  timestamp    = {Thu, 17 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/LunardiMBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MurthyG17,
  author       = {Uday S. Murthy and
                  Guido L. Geerts},
  title        = {An {REA} Ontology-Based Model for Mapping Big Data to Accounting Information
                  Systems Elements},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {3},
  pages        = {45--61},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51803},
  doi          = {10.2308/ISYS-51803},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MurthyG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/RichinsSSW17,
  author       = {Greg Richins and
                  Andrea Stapleton and
                  Theophanis C. Stratopoulos and
                  Christopher Wong},
  title        = {Big Data Analytics: Opportunity or Threat for the Accounting Profession?},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {3},
  pages        = {63--79},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51805},
  doi          = {10.2308/ISYS-51805},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/RichinsSSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/RoseRST17,
  author       = {Anna M. Rose and
                  Jacob M. Rose and
                  Kerri{-}Ann Sanderson and
                  Jay C. Thibodeau},
  title        = {When Should Audit Firms Introduce Analyses of Big Data Into the Audit
                  Process?},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {3},
  pages        = {81--99},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51837},
  doi          = {10.2308/ISYS-51837},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/RoseRST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ScherrD17,
  author       = {Elisabeth Scherr and
                  Dominik Ditter},
  title        = {Customization versus Standardization in Electronic Financial Reporting:
                  Early Evidence from the {SEC} {XBRL} Mandate},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {2},
  pages        = {125--148},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51697},
  doi          = {10.2308/ISYS-51697},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ScherrD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/TaylorD17,
  author       = {Eileen Z. Taylor and
                  Ronald J. Daigle},
  title        = {Special Section of \emph{JIS} on {AIS} and Ethics},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {2},
  pages        = {1--3},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-10541},
  doi          = {10.2308/ISYS-10541},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/TaylorD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/TempletonB17,
  author       = {Gary F. Templeton and
                  Laurie L. Burney},
  title        = {Using a Two-Step Transformation to Address Non-Normality from a Business
                  Value of Information Technology Perspective},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {2},
  pages        = {149--164},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51510},
  doi          = {10.2308/ISYS-51510},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/TempletonB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/VincentHP17,
  author       = {Nishani Edirisinghe Vincent and
                  Julia L. Higgs and
                  Robert E. Pinsker},
  title        = {{IT} Governance and the Maturity of {IT} Risk Management Practices},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {1},
  pages        = {59--77},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51365},
  doi          = {10.2308/ISYS-51365},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/VincentHP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ZimmermannRF17,
  author       = {Stephan Zimmermann and
                  Christopher Rentrop and
                  Carsten Felden},
  title        = {A Multiple Case Study on the Nature and Management of Shadow Information
                  Technology},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {1},
  pages        = {79--101},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51579},
  doi          = {10.2308/ISYS-51579},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ZimmermannRF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BaxterHW16,
  author       = {Ryan J. Baxter and
                  D. Kip Holderness Jr. and
                  David A. Wood},
  title        = {Applying Basic Gamification Techniques to {IT} Compliance Training:
                  Evidence from the Lab and Field},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {3},
  pages        = {119--133},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51341},
  doi          = {10.2308/ISYS-51341},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BaxterHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CesareP16,
  author       = {Sergio de Cesare and
                  Chris Partridge},
  title        = {{BORO} as a Foundation to Enterprise Ontology},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {2},
  pages        = {83--112},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51428},
  doi          = {10.2308/ISYS-51428},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CesareP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CramG16,
  author       = {W. Alec Cram and
                  R. Brent Gallupe},
  title        = {A Method to Evaluate Information Systems Control Alignment},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {1},
  pages        = {117--135},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51297},
  doi          = {10.2308/ISYS-51297},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CramG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CurtisD16,
  author       = {Mary B. Curtis and
                  Roger S. Debreceny},
  title        = {The \emph{Journal of Information Systems} at Thirty},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {1},
  pages        = {1--2},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-10482},
  doi          = {10.2308/ISYS-10482},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CurtisD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DzuraninM16,
  author       = {Ann C. Dzuranin and
                  Irina Malaescu},
  title        = {The Current State and Future Direction of {IT} Audit: Challenges and
                  Opportunities},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {1},
  pages        = {7--20},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51315},
  doi          = {10.2308/ISYS-51315},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DzuraninM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/FarkasH16,
  author       = {Maia J. Farkas and
                  Rina M. Hirsch},
  title        = {The Effect of Frequency and Automation of Internal Control Testing
                  on External Auditor Reliance on the Internal Audit Function},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {1},
  pages        = {21--40},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51266},
  doi          = {10.2308/ISYS-51266},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/FarkasH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Geerts16,
  author       = {Guido L. Geerts},
  title        = {Special Section on Enterprise Ontologies},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {2},
  pages        = {1--3},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51419},
  doi          = {10.2308/ISYS-51419},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Geerts16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Gray16,
  author       = {Glen L. Gray},
  title        = {Blogs as Research and Teaching Resources for Accounting Academics},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {2},
  pages        = {183--202},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51348},
  doi          = {10.2308/ISYS-51348},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Gray16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HaislipMRS16,
  author       = {Jacob Z. Haislip and
                  Adi Masli and
                  Vernon J. Richardson and
                  Juan Manuel S{\'{a}}nchez},
  title        = {Repairing Organizational Legitimacy Following Information Technology
                  {(IT)} Material Weaknesses: Executive Turnover, {IT} Expertise, and
                  {IT} System Upgrades},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {1},
  pages        = {41--70},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51294},
  doi          = {10.2308/ISYS-51294},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/HaislipMRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HanRXZ16,
  author       = {Shipeng Han and
                  Zabihollah Rezaee and
                  Ling Xue and
                  Joseph H. Zhang},
  title        = {The Association between Information Technology Investments and Audit
                  Risk},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {1},
  pages        = {93--116},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51317},
  doi          = {10.2308/ISYS-51317},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HanRXZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HendersonBK16,
  author       = {David L. Henderson III and
                  Marianne Bradford and
                  Amr Kotb},
  title        = {Inhibitors and Enablers of {GAS} Usage: Testing the Dual Factor Theory},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {3},
  pages        = {135--155},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51388},
  doi          = {10.2308/ISYS-51388},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HendersonBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HiggsPSY16,
  author       = {Julia L. Higgs and
                  Robert E. Pinsker and
                  Thomas J. Smith and
                  George R. Young},
  title        = {The Relationship between Board-Level Technology Committees and Reported
                  Security Breaches},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {3},
  pages        = {79--98},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51402},
  doi          = {10.2308/ISYS-51402},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HiggsPSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/JanvrinW16,
  author       = {Diane J. Janvrin and
                  David A. Wood},
  title        = {The \emph{Journal of Information Systems} 2015 Conference on Information
                  Technology Audit},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {1},
  pages        = {3--5},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-10483},
  doi          = {10.2308/ISYS-10483},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/JanvrinW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KeltonM16,
  author       = {Andrea Seaton Kelton and
                  Uday S. Murthy},
  title        = {The Effects of Information Disaggregation and Financial Statement
                  Interactivity on Judgments and Decisions of Nonprofessional Investors},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {3},
  pages        = {99--118},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51327},
  doi          = {10.2308/ISYS-51327},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KeltonM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LeeW16,
  author       = {Michael T. Lee and
                  Sally K. Widener},
  title        = {The Performance Effects of Using Business Intelligence Systems for
                  Exploitation and Exploration Learning},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {3},
  pages        = {1--31},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51298},
  doi          = {10.2308/ISYS-51298},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LeeW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LiCK16,
  author       = {Pei Li and
                  David Y. Chan and
                  Alexander Kogan},
  title        = {Exception Prioritization in the Continuous Auditing Environment: {A}
                  Framework and Experimental Evaluation},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {2},
  pages        = {135--157},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51220},
  doi          = {10.2308/ISYS-51220},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LiCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MoffittRSWW16,
  author       = {Kevin C. Moffitt and
                  Vernon J. Richardson and
                  Neal M. Snow and
                  Martin M. Weisner and
                  David A. Wood},
  title        = {Perspectives on Past and Future {AIS} Research as the \emph{Journal
                  of Information Systems} Turns Thirty},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {3},
  pages        = {157--171},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51495},
  doi          = {10.2308/ISYS-51495},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MoffittRSWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Murthy16,
  author       = {Uday S. Murthy},
  title        = {Researching at the Intersection of Accounting and Information Technology:
                  {A} Call for Action},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {2},
  pages        = {159--167},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51413},
  doi          = {10.2308/ISYS-51413},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Murthy16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MyersSSW16,
  author       = {Noah Myers and
                  Neal M. Snow and
                  Scott L. Summers and
                  David A. Wood},
  title        = {Accounting Institution Citation-Based Research Rankings by Topical
                  Area and Methodology},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {3},
  pages        = {33--62},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51343},
  doi          = {10.2308/ISYS-51343},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MyersSSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SchellerH16,
  author       = {Christian Vibe Scheller and
                  Pavel Hruby},
  title        = {Business Process and Value Delivery Modeling Using Possession, Ownership,
                  and Availability {(POA)} in Enterprises and Business Networks},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {2},
  pages        = {5--47},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-50923},
  doi          = {10.2308/ISYS-50923},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SchellerH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SchmidtWG16,
  author       = {Pamela J. Schmidt and
                  Jason T. Wood and
                  Severin V. Grabski},
  title        = {Business in the Cloud: Research Questions on Governance, Audit, and
                  Assurance},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {3},
  pages        = {173--189},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51494},
  doi          = {10.2308/ISYS-51494},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SchmidtWG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SidgmanC16,
  author       = {Juergen Sidgman and
                  Malcolm Crompton},
  title        = {Valuing Personal Data to Foster Privacy: {A} Thought Experiment and
                  Opportunities for Research},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {2},
  pages        = {169--181},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51429},
  doi          = {10.2308/ISYS-51429},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SidgmanC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SnowR16,
  author       = {Neal M. Snow and
                  Jacqueline L. Reck},
  title        = {Developing a Government Reporting Taxonomy},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {2},
  pages        = {49--81},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51373},
  doi          = {10.2308/ISYS-51373},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SnowR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SteinbartRGD16,
  author       = {Paul John Steinbart and
                  Robyn L. Raschke and
                  Graham Gal and
                  William N. Dilla},
  title        = {{SECURQUAL:} An Instrument for Evaluating the Effectiveness of Enterprise
                  Information Security Programs},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {1},
  pages        = {71--92},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51257},
  doi          = {10.2308/ISYS-51257},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/SteinbartRGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/TangEW16,
  author       = {Fengchun Tang and
                  Christopher Kevin Eller and
                  Benson Wier},
  title        = {Reporting Frequency and Presentation Format: Detecting Real Activities
                  Manipulation},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {3},
  pages        = {63--77},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51284},
  doi          = {10.2308/ISYS-51284},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/TangEW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Weber16,
  author       = {Ron Weber},
  title        = {Thirty Years of the \emph{Journal of Information Systems: } Reflections
                  of a Prodigal Son},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {1},
  pages        = {137--146},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51342},
  doi          = {10.2308/ISYS-51342},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Weber16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Weigand16,
  author       = {Hans Weigand},
  title        = {The e3value Ontology for Value Networks: Current State and Future
                  Directions},
  journal      = {J. Inf. Syst.},
  volume       = {30},
  number       = {2},
  pages        = {113--133},
  year         = {2016},
  url          = {https://doi.org/10.2308/isys-51409},
  doi          = {10.2308/ISYS-51409},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Weigand16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BonsonB15,
  author       = {Enrique Bons{\'{o}}n and
                  Michaela Bedn{\'{a}}rov{\'{a}}},
  title        = {YouTube Sustainability Reporting: Empirical Evidence from Eurozone-Listed
                  Companies},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {3},
  pages        = {35--50},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-50993},
  doi          = {10.2308/ISYS-50993},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/BonsonB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoritzH15,
  title        = {Retraction: Investigating the Impact of Auditor-Provided Systems Reliability
                  Assurance on Potential Service Recipients},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {239},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-10441},
  doi          = {10.2308/ISYS-10441},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BoritzH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoritzT15,
  author       = {J. Efrim Boritz and
                  Lev M. Timoshenko},
  title        = {Firm-Specific Characteristics of the Participants in the SEC's {XBRL}
                  Voluntary Filing Program},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {1},
  pages        = {9--36},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-50896},
  doi          = {10.2308/ISYS-50896},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BoritzT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChychylaK15,
  author       = {Roman Chychyla and
                  Alexander Kogan},
  title        = {Using {XBRL} to Conduct a Large-Scale Study of Discrepancies between
                  the Accounting Numbers in Compustat and {SEC} 10-K Filings},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {1},
  pages        = {37--72},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-50922},
  doi          = {10.2308/ISYS-50922},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChychylaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CramBG15,
  author       = {W. Alec Cram and
                  M. Kathryn Brohman and
                  R. Brent Gallupe},
  title        = {Addressing the Control Challenges of the Enterprise Architecture Process},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {161--182},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-50913},
  doi          = {10.2308/ISYS-50913},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CramBG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Debreceny15,
  author       = {Roger S. Debreceny},
  title        = {Social Media, Social Networks, and Accounting},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {1--4},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-10462},
  doi          = {10.2308/ISYS-10462},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Debreceny15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DebrecenyC15,
  author       = {Roger S. Debreceny and
                  Mary B. Curtis},
  title        = {Challenges From and To the Senior Editors of the \emph{Journal of
                  Information Systems}},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {1},
  pages        = {1--8},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-10416},
  doi          = {10.2308/ISYS-10416},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DebrecenyC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DrumSB15,
  author       = {Dawna Drum and
                  Rhetta Standifer and
                  Kristina Bourne},
  title        = {Facing the Consequences: Examining a Workaround Outcomes-Based Model},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {137--159},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-50875},
  doi          = {10.2308/ISYS-50875},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DrumSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DuJ15,
  author       = {Hui Du and
                  Wei Jiang},
  title        = {Do Social Media Matter? Initial Empirical Evidence},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {51--70},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-50995},
  doi          = {10.2308/ISYS-50995},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DuJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/EschenbrennerNT15,
  author       = {Brenda Eschenbrenner and
                  Fiona Fui{-}Hoon Nah and
                  Venkata Rajasekhar Telaprolu},
  title        = {Efficacy of Social Media Utilization by Public Accounting Firms: Findings
                  and Directions for Future Research},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {5--21},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-50894},
  doi          = {10.2308/ISYS-50894},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/EschenbrennerNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GreensteinH15,
  title        = {Retraction: Extending the Accounting Brand to Privacy Services},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {237},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-10440},
  doi          = {10.2308/ISYS-10440},
  timestamp    = {Tue, 08 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GreensteinH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HardyL15,
  author       = {Catherine A. Hardy and
                  Glen Laslett},
  title        = {Continuous Auditing and Monitoring in Practice: Lessons from Metcash's
                  Business Assurance Group},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {183--194},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-50969},
  doi          = {10.2308/ISYS-50969},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HardyL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Hunton15,
  title        = {Retraction: Behavioral Self-Regulation of Telework Locations: Interrupting
                  Interruptions!},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {233},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-10437},
  doi          = {10.2308/ISYS-10437},
  timestamp    = {Tue, 08 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Hunton15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HuntonMW15,
  title        = {Retraction: The Reaction of Financial Analysts to Enterprise Resource
                  Planning {(ERP)} Implementation Plans},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {241},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-10443},
  doi          = {10.2308/ISYS-10443},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HuntonMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HuntonN15,
  title        = {Retraction: The Impact of Alternative Telework Arrangements on Organizational
                  Commitment: Insights from a Longitudinal Field Experiment},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {231},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-10431},
  doi          = {10.2308/ISYS-10431},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HuntonN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HuntonWW15,
  title        = {Retraction: Are Financial Auditors Overconfident in Their Ability
                  to Assess Risks Associated with Enterprise Resource Planning Systems},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {235},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-10439},
  doi          = {10.2308/ISYS-10439},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HuntonWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/JanvrinLP15,
  author       = {Diane J. Janvrin and
                  Jee{-}Hae Lim and
                  Gary F. Peters},
  title        = {The Perceived Impact of \emph{Journal of Information Systems} on Promotion
                  and Tenure},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {1},
  pages        = {73--93},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-50963},
  doi          = {10.2308/ISYS-50963},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/JanvrinLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LeeG15,
  author       = {Lorraine S. Lee and
                  Edmund Green},
  title        = {Systems Thinking and its Implications in Enterprise Risk Management},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {195--210},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-51047},
  doi          = {10.2308/ISYS-51047},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LeeG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LiN15,
  author       = {Shiyou Li and
                  Emeka T. Nwaeze},
  title        = {The Association between Extensions in {XBRL} Disclosures and Financial
                  Information Environment},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {3},
  pages        = {73--99},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-51005},
  doi          = {10.2308/ISYS-51005},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LiN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Limor15,
  author       = {Rina Limor},
  title        = {Knowledge Resources and Book Reviews},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {1},
  pages        = {163--166},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-10419},
  doi          = {10.2308/ISYS-10419},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Limor15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MalaescuS15,
  author       = {Irina Malaescu and
                  Steve G. Sutton},
  title        = {The Reliance of External Auditors on Internal Audit's Use of Continuous
                  Audit},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {1},
  pages        = {95--114},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-50899},
  doi          = {10.2308/ISYS-50899},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MalaescuS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PerdanaRR15,
  author       = {Arif Perdana and
                  D. Alastair Robb and
                  Fiona H. Rohde},
  title        = {An Integrative Review and Synthesis of {XBRL} Research in Academic
                  Journals},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {1},
  pages        = {115--153},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-50884},
  doi          = {10.2308/ISYS-50884},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PerdanaRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PerdanaRR15a,
  author       = {Arif Perdana and
                  D. Alastair Robb and
                  Fiona H. Rohde},
  title        = {{XBRL} Diffusion in Social Media: Discourses and Community Learning},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {71--106},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-50996},
  doi          = {10.2308/ISYS-50996},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PerdanaRR15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PickardC15,
  author       = {Matthew D. Pickard and
                  Gary Cokins},
  title        = {From Bean Counters to Bean Growers: Accountants as Data Analysts -
                  {A} Customer Profitability Example},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {3},
  pages        = {151--164},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-51180},
  doi          = {10.2308/ISYS-51180},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PickardC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PrasadG15,
  author       = {Acklesh Prasad and
                  Peter F. Green},
  title        = {Organizational Competencies and Dynamic Accounting Information System
                  Capability: Impact on {AIS} Processes and Firm Performance},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {3},
  pages        = {123--149},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-51127},
  doi          = {10.2308/ISYS-51127},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PrasadG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Prokofieva15,
  author       = {Maria Prokofieva},
  title        = {Twitter-Based Dissemination of Corporate Disclosure and the Intervening
                  Effects of Firms' Visibility: Evidence from Australian-Listed Companies},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {107--136},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-50994},
  doi          = {10.2308/ISYS-50994},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Prokofieva15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Sidgman15,
  author       = {Juergen Sidgman},
  title        = {Form 4 Electronic Submissions and the Thomson Reuters Insider Filing
                  Data Feed: Discrepancies and Their Impact on Research},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {3},
  pages        = {1--33},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-50981},
  doi          = {10.2308/ISYS-50981},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Sidgman15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SmithBBH15,
  title        = {Retraction: The Dark Side of Online Knowledge Sharing},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {229},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-10429},
  doi          = {10.2308/ISYS-10429},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SmithBBH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Stone15,
  author       = {Dan N. Stone},
  title        = {Post-Hunton: Reclaiming Our Integrity and Literature},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {211--227},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-51094},
  doi          = {10.2308/ISYS-51094},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Stone15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/TrinkleCB15,
  author       = {Brad S. Trinkle and
                  Robert E. Crossler and
                  France B{\'{e}}langer},
  title        = {Voluntary Disclosures via Social Media and the Role of Comments},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {3},
  pages        = {101--121},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-51133},
  doi          = {10.2308/ISYS-51133},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/TrinkleCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WangC15,
  author       = {Tawei Wang and
                  Robert Cuthbertson},
  title        = {Eight Issues on Audit Data Analytics We Would Like Researched},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {1},
  pages        = {155--162},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-50955},
  doi          = {10.2308/ISYS-50955},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WangC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/YenW15,
  author       = {Ju{-}Chun Yen and
                  Tawei Wang},
  title        = {The Association between {XBRL} Adoption and Market Reactions to Earnings
                  Surprises},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {3},
  pages        = {51--71},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-51039},
  doi          = {10.2308/ISYS-51039},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/YenW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ZhouLWFW15,
  author       = {Mi (Jamie) Zhou and
                  Lijun (Gillian) Lei and
                  Jianling Wang and
                  Weiguo (Patrick) Fan and
                  Alan Gang Wang},
  title        = {Social Media Adoption and Corporate Disclosure},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {23--50},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-50961},
  doi          = {10.2308/ISYS-50961},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/ZhouLWFW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ArboreGV14,
  author       = {Alessandro Arbore and
                  Rebecca Graziani and
                  Sergio Venturini},
  title        = {Understanding Personal Mobile Technologies: Decomposing and De-Averaging
                  the Value of a Smartphone},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {167--185},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50668},
  doi          = {10.2308/ISYS-50668},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ArboreGV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ArnoldBHS14,
  author       = {Vicky Arnold and
                  Tanya S. Benford and
                  Clark Hampton and
                  Steve G. Sutton},
  title        = {Enterprise Risk Management: Re-Conceptualizing the Role of Risk and
                  Trust on Information Sharing in Transnational Alliances},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {257--285},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50812},
  doi          = {10.2308/ISYS-50812},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ArnoldBHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BasogluH14,
  author       = {K. Asli Basoglu and
                  Traci J. Hess},
  title        = {Online Business Reporting: {A} Signaling Theory Perspective},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {67--101},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50780},
  doi          = {10.2308/ISYS-50780},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BasogluH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BeckLAW14,
  author       = {Grant M. Beck and
                  Rina Limor and
                  Vairam Arunachalam and
                  Patrick R. Wheeler},
  title        = {The Effect of Changes in Decision Aid Bias on Learning: Evidence of
                  Functional Fixation},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {19--42},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50608},
  doi          = {10.2308/ISYS-50608},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BeckLAW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoritzCA14,
  author       = {J. Efrim Boritz and
                  Carla Carnaghan and
                  Paulo S. C. Alencar},
  title        = {Business Modeling to Improve Auditor Risk Assessment: An Investigation
                  of Alternative Representations},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {231--256},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50809},
  doi          = {10.2308/ISYS-50809},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BoritzCA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChenSCX14,
  author       = {Yunhao Chen and
                  Antoinette L. Smith and
                  Jian Cao and
                  Weidong Xia},
  title        = {Information Technology Capability, Internal Control Effectiveness,
                  and Audit Fees and Delays},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {149--180},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50778},
  doi          = {10.2308/ISYS-50778},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChenSCX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CongHZ14,
  author       = {Yu Cong and
                  Jia Hao and
                  Lin Zou},
  title        = {The Impact of {XBRL} Reporting on Market Efficiency},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {181--207},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50794},
  doi          = {10.2308/ISYS-50794},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CongHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CrosslerLLT14,
  author       = {Robert E. Crossler and
                  James H. Long and
                  Tina M. Loraas and
                  Brad S. Trinkle},
  title        = {Understanding Compliance with Bring Your Own Device Policies Utilizing
                  Protection Motivation Theory: Bridging the Intention-Behavior Gap},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {209--226},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50704},
  doi          = {10.2308/ISYS-50704},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/CrosslerLLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DengW14,
  author       = {Xuefei (Nancy) Deng and
                  Tawei Wang},
  title        = {Understanding Post-Implementation Support for Enterprise Systems:
                  An Empirical Study of {IT} Personnel's Customer-Oriented Citizenship
                  Behaviors},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {17--39},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50743},
  doi          = {10.2308/ISYS-50743},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DengW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GrayNM14,
  author       = {Glen L. Gray and
                  Won Gyun No and
                  David W. Miller},
  title        = {Internal Auditors' Experiences and Opinions Regarding Green {IT:}
                  Assessing the Gap in Normative and Positive Perspectives},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {75--109},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50694},
  doi          = {10.2308/ISYS-50694},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GrayNM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GuffeyH14,
  author       = {Daryl M. Guffey and
                  Nancy L. Harp},
  title        = {Ranking Faculties, Ph.D. Programs, Individual Scholars, and Influential
                  Articles in Accounting Information Systems Based on Citations to Publications
                  in the \emph{Journal of Information Systems}},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {111--144},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50695},
  doi          = {10.2308/ISYS-50695},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GuffeyH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Hardy14,
  author       = {Catherine A. Hardy},
  title        = {The Messy Matters of Continuous Assurance: Findings from Exploratory
                  Research in Australia},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {357--377},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50788},
  doi          = {10.2308/ISYS-50788},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Hardy14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Harrigan14,
  author       = {Fiona Harrigan},
  title        = {Evolution of Accounting Controls in a De-Integrated Project Structure:
                  {A} Case of Hybridization},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {329--355},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50777},
  doi          = {10.2308/ISYS-50777},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Harrigan14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HongVW14,
  author       = {Yuan Hong and
                  Jaideep Vaidya and
                  Shengbin Wang},
  title        = {A Survey of Privacy-Aware Supply Chain Collaboration: From Theory
                  to Applications},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {243--268},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50692},
  doi          = {10.2308/ISYS-50692},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HongVW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/IssaK14,
  author       = {Hussein Issa and
                  Alexander Kogan},
  title        = {A Predictive Ordered Logistic Regression Model as a Tool for Quality
                  Review of Control Risk Assessments},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {209--229},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50808},
  doi          = {10.2308/ISYS-50808},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/IssaK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KimK14,
  author       = {Yongbum Kim and
                  Alexander Kogan},
  title        = {Development of an Anomaly Detection Model for a Bank's Transitory
                  Account System},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {145--165},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50699},
  doi          = {10.2308/ISYS-50699},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KimK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KrahelV14,
  author       = {John Peter Krahel and
                  Miklos A. Vasarhelyi},
  title        = {{AIS} as a Facilitator of Accounting Change: Technology, Practice,
                  and Education},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {1--15},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-10412},
  doi          = {10.2308/ISYS-10412},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KrahelV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Lim14,
  author       = {Weng Marc Lim},
  title        = {Understanding the Influence of Online Flow Elements on Hedonic and
                  Utilitarian Online Shopping Experiences: {A} Case of Online Group
                  Buying},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {287--306},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50773},
  doi          = {10.2308/ISYS-50773},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Lim14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LiuV14,
  author       = {Qi Liu and
                  Miklos A. Vasarhelyi},
  title        = {Big Questions in {AIS} Research: Measurement, Information Processing,
                  Data Analysis, and Reporting},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {1--17},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-10395},
  doi          = {10.2308/ISYS-10395},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LiuV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MasliRSS14,
  author       = {Adi Masli and
                  Vernon J. Richardson and
                  Juan Manuel S{\'{a}}nchez and
                  Rodney E. Smith},
  title        = {The Interrelationships Between Information Technology Spending, {CEO}
                  Equity Incentives, and Firm Value},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {41--65},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50742},
  doi          = {10.2308/ISYS-50742},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MasliRSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MorrisKDT14,
  author       = {Bonnie W. Morris and
                  Virginia Franke Kleist and
                  Richard B. Dull and
                  Cynthia D. Tanner},
  title        = {Secure Information Market: {A} Model to Support Information Sharing,
                  Data Fusion, Privacy, and Decisions},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {269--285},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50705},
  doi          = {10.2308/ISYS-50705},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/MorrisKDT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/NikitkovSM14,
  author       = {Alexey N. Nikitkov and
                  Dan N. Stone and
                  Timothy C. Miller},
  title        = {Internal Controls, Routine Activity Theory (RAT), and Sustained Online
                  Auction Deception: {A} Longitudinal Analysis},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {311--337},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50708},
  doi          = {10.2308/ISYS-50708},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/NikitkovSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/RahmanD14,
  author       = {Asheq Razaur Rahman and
                  Roger S. Debreceny},
  title        = {Institutionalized Online Access to Corporate Information and Cost
                  of Equity Capital: {A} Cross-Country Analysis},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {43--74},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50653},
  doi          = {10.2308/ISYS-50653},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/RahmanD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/RaschkeKK14,
  author       = {Robyn L. Raschke and
                  Anjala S. Krishen and
                  Pushkin Kachroo},
  title        = {Understanding the Components of Information Privacy Threats for Location-Based
                  Services},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {227--242},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50696},
  doi          = {10.2308/ISYS-50696},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/RaschkeKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SchauppB14,
  author       = {Ludwig Christian Schaupp and
                  France B{\'{e}}langer},
  title        = {The Value of Social Media for Small Businesses},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {187--207},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50674},
  doi          = {10.2308/ISYS-50674},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SchauppB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SinghBBB14,
  author       = {Kishore Singh and
                  Peter J. Best and
                  Mario Bojilov and
                  Catherine Blunt},
  title        = {Continuous Auditing and Continuous Monitoring in {ERP} Environments:
                  Case Studies of Application Implementations},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {287--310},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50679},
  doi          = {10.2308/ISYS-50679},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SinghBBB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/TrinkleCW14,
  author       = {Brad S. Trinkle and
                  Robert E. Crossler and
                  Merrill Warkentin},
  title        = {I'm Game, are You? Reducing Real-World Security Threats by Managing
                  Employee Activity in Online Social Networks},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {307--327},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50776},
  doi          = {10.2308/ISYS-50776},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/TrinkleCW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/TuttleTW14,
  author       = {Brad Tuttle and
                  Mark H. Taylor and
                  Yi{-}Jing Wu},
  title        = {Overcoming the Reluctance to Convey Negative Project Information during
                  an Information Systems Pre-Implementation Review},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {103--125},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50767},
  doi          = {10.2308/ISYS-50767},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/TuttleTW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WangS14,
  author       = {Tawei Wang and
                  Jia{-}Lang Seng},
  title        = {Mandatory Adoption of {XBRL} and Foreign Institutional Investors'
                  Holdings: Evidence from China},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {127--147},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50789},
  doi          = {10.2308/ISYS-50789},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WangS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AliGR13,
  author       = {Syaiful Ali and
                  Peter F. Green and
                  D. Alastair Robb},
  title        = {Measuring Top Management's {IT} Governance Knowledge Absorptive Capacity},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {137--155},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50325},
  doi          = {10.2308/ISYS-50325},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/AliGR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CaoNB13,
  author       = {Jian Cao and
                  Andreas I. Nicolaou and
                  Somnath Bhattacharya},
  title        = {A Longitudinal Examination of Enterprise Resource Planning System
                  Post-Implementation Enhancements},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {13--39},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50398},
  doi          = {10.2308/ISYS-50398},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CaoNB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Chakraborty13,
  author       = {Vasundhara Chakraborty},
  title        = {Book Review},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {333--335},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-10334},
  doi          = {10.2308/ISYS-10334},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Chakraborty13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CongR13,
  author       = {Yu Cong and
                  Jorge Romero},
  title        = {On Information Systems Complexity and Vulnerability},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {51--64},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50562},
  doi          = {10.2308/ISYS-50562},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CongR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DavidsonDG13,
  author       = {Bruce I. Davidson and
                  Naman K. Desai and
                  Gregory J. Gerard},
  title        = {The Effect of Continuous Auditing on the Relationship between Internal
                  Audit Sourcing and the External Auditor's Reliance on the Internal
                  Audit Function},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {41--59},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50430},
  doi          = {10.2308/ISYS-50430},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DavidsonDG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Debreceny13,
  author       = {Roger S. Debreceny},
  title        = {Research on {IT} Governance, Risk, and Value: Challenges and Opportunities},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {129--135},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-10339},
  doi          = {10.2308/ISYS-10339},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Debreceny13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DebrecenyG13,
  author       = {Roger S. Debreceny and
                  Glen L. Gray},
  title        = {{IT} Governance and Process Maturity: {A} Multinational Field Study},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {157--188},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50418},
  doi          = {10.2308/ISYS-50418},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DebrecenyG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Dilla13,
  author       = {William N. Dilla},
  title        = {Can Avatars Fight Fraud? How Virtual Business Environments Facilitate
                  Learning More About Fraud Investigation and Prevention},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {127--130},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-10371},
  doi          = {10.2308/ISYS-10371},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/Dilla13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DillaHMJ13,
  author       = {William N. Dilla and
                  Andrew J. Harrison and
                  Brian E. Mennecke and
                  Diane J. Janvrin},
  title        = {The Assets Are Virtual but the Behavior Is Real: An Analysis of Fraud
                  in Virtual Worlds and Its Implications for the Real World},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {131--158},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50571},
  doi          = {10.2308/ISYS-50571},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/DillaHMJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DuVZ13,
  author       = {Hui Du and
                  Miklos A. Vasarhelyi and
                  Xiaochuan Zheng},
  title        = {{XBRL} Mandate: Thousands of Filing Errors and So What?},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {61--78},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50399},
  doi          = {10.2308/ISYS-50399},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DuVZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ElbashirCSDL13,
  author       = {Mohamed Z. Elbashir and
                  Philip A. Collier and
                  Steve G. Sutton and
                  Michael J. Davern and
                  Stewart A. Leech},
  title        = {Enhancing the Business Value of Business Intelligence: The Role of
                  Shared Knowledge and Assimilation},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {87--105},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50563},
  doi          = {10.2308/ISYS-50563},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ElbashirCSDL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GaillyG13,
  author       = {Frederik Gailly and
                  Guido L. Geerts},
  title        = {Ontology-Driven Business Rule Specification},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {79--104},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50428},
  doi          = {10.2308/ISYS-50428},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GaillyG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HaesGD13,
  author       = {Steven De Haes and
                  Wim Van Grembergen and
                  Roger S. Debreceny},
  title        = {{COBIT} 5 and Enterprise Governance of Information Technology: Building
                  Blocks and Research Opportunities},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {307--324},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50422},
  doi          = {10.2308/ISYS-50422},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HaesGD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Heijden13,
  author       = {Hans van der Heijden},
  title        = {Evaluating Dual Performance Measures on Information Dashboards: Effects
                  of Anchoring and Presentation Format},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {21--34},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50556},
  doi          = {10.2308/ISYS-50556},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Heijden13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HerouxF13,
  author       = {Sylvie H{\'{e}}roux and
                  Anne Fortin},
  title        = {The Internal Audit Function in Information Technology Governance:
                  {A} Holistic Perspective},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {189--217},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50331},
  doi          = {10.2308/ISYS-50331},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HerouxF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/JanvrinPM13,
  author       = {Diane J. Janvrin and
                  Robert E. Pinsker and
                  Maureen Francis Mascha},
  title        = {XBRL-Enabled, Spreadsheet, or PDF? Factors Influencing Exclusive User
                  Choice of Reporting Technology},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {35--49},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50569},
  doi          = {10.2308/ISYS-50569},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/JanvrinPM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KwonUW13,
  author       = {Juhee Kwon and
                  Jackie Rees Ulmer and
                  Tawei Wang},
  title        = {The Association between Top Management Involvement and Compensation
                  and Information Security Breaches},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {219--236},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50339},
  doi          = {10.2308/ISYS-50339},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KwonUW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MoffittV13,
  author       = {Kevin C. Moffitt and
                  Miklos A. Vasarhelyi},
  title        = {{AIS} in an Age of Big Data},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {1--19},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-10372},
  doi          = {10.2308/ISYS-10372},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MoffittV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PickardBM13,
  author       = {Matthew D. Pickard and
                  Mary B. Burns and
                  Kevin C. Moffitt},
  title        = {A Theoretical Justification for Using Embodied Conversational Agents
                  (ECAs) to Augment Accounting-Related Interviews},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {159--176},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50561},
  doi          = {10.2308/ISYS-50561},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PickardBM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PrasadGH13,
  author       = {Acklesh Prasad and
                  Peter F. Green and
                  Jon Heales},
  title        = {On Governing Collaborative Information Technology {(IT):} {A} Relational
                  Perspective},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {237--259},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50326},
  doi          = {10.2308/ISYS-50326},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PrasadGH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SchobelD13,
  author       = {Kurt B. Schobel and
                  James S. Denford},
  title        = {The Chief Information Officer and Chief Financial Officer Dyad in
                  the Public Sector: How an Effective Relationship Impacts Individual
                  Effectiveness and Strategic Alignment},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {261--281},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50321},
  doi          = {10.2308/ISYS-50321},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SchobelD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SrivastavaRM13,
  author       = {Rajendra P. Srivastava and
                  Sunita S. Rao and
                  Theodore J. Mock},
  title        = {Planning and Evaluation of Assurance Services for Sustainability Reporting:
                  An Evidential Reasoning Approach},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {107--126},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50564},
  doi          = {10.2308/ISYS-50564},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SrivastavaRM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SteinbartRGD13,
  author       = {Paul John Steinbart and
                  Robyn L. Raschke and
                  Graham Gal and
                  William N. Dilla},
  title        = {Information Security Professionals' Perceptions about the Relationship
                  between the Information Security and Internal Audit Functions},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {65--86},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50510},
  doi          = {10.2308/ISYS-50510},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/SteinbartRGD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/TegardenSD13,
  author       = {David P. Tegarden and
                  Ludwig Christian Schaupp and
                  Richard B. Dull},
  title        = {Identifying Ontological Modifications to the Resource-Event-Agent
                  {(REA)} Enterprise Ontology Using a Bunge-Wand-Weber Ontological Evaluation},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {105--128},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50429},
  doi          = {10.2308/ISYS-50429},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/TegardenSD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Titera13,
  author       = {William R. Titera},
  title        = {Updating Audit Standard - Enabling Audit Data Analysis},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {325--331},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50427},
  doi          = {10.2308/ISYS-50427},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Titera13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Vasarhelyi13,
  author       = {Miklos A. Vasarhelyi},
  title        = {Formalization of Standards, Automation, Robots, and {IT} Governance},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {1--11},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-10347},
  doi          = {10.2308/ISYS-10347},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Vasarhelyi13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WatanabeW13,
  author       = {Olena Watanabe and
                  Patrick Wheeler},
  title        = {Book Review},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {177--180},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-10351},
  doi          = {10.2308/ISYS-10351},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WatanabeW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Wilkin0MG13,
  author       = {Carla Wilkin and
                  John Campbell and
                  Stephen Moore and
                  Wim Van Grembergen},
  title        = {Co-Creating Value from {IT} in a Contracted Public Sector Service
                  Environment: Perspectives on {COBIT} and Val {IT}},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {283--306},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50355},
  doi          = {10.2308/ISYS-50355},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Wilkin0MG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AlaliY12,
  author       = {Fatima A. Alali and
                  Chia{-}Lun Yeh},
  title        = {Cloud Computing: Overview and Risk Analysis},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {2},
  pages        = {13--33},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-50229},
  doi          = {10.2308/ISYS-50229},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/AlaliY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AllesG12,
  author       = {Michael G. Alles and
                  Glen L. Gray},
  title        = {A Relative Cost Framework of Demand for External Assurance of {XBRL}
                  Filings},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {1},
  pages        = {103--126},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-10248},
  doi          = {10.2308/ISYS-10248},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/AllesG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ArnoldBHS12,
  author       = {Vicky Arnold and
                  Tanya S. Benford and
                  Clark Hampton and
                  Steve G. Sutton},
  title        = {Enterprise Risk Management as a Strategic Governance Mechanism in
                  B2B-Enabled Transnational Supply Chains},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {1},
  pages        = {51--76},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-10253},
  doi          = {10.2308/ISYS-10253},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ArnoldBHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BauerDS12,
  author       = {Tim D. Bauer and
                  Bruce Dehning and
                  Theophanis C. Stratopoulos},
  title        = {The Financial Performance of Global Information and Communication
                  Technology Companies},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {2},
  pages        = {119--152},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-50215},
  doi          = {10.2308/ISYS-50215},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/BauerDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Borthick12,
  author       = {A. Faye Borthick},
  title        = {Designing Continuous Auditing for a Highly Automated Procure-to-Pay
                  Process},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {2},
  pages        = {153--166},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-50233},
  doi          = {10.2308/ISYS-50233},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Borthick12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CarsonD12,
  author       = {Elizabeth Carson and
                  Carlin Dowling},
  title        = {The Competitive Advantage of Audit Support Systems: The Relationship
                  between Extent of Structure and Audit Pricing},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {1},
  pages        = {35--49},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-10256},
  doi          = {10.2308/ISYS-10256},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CarsonD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Escobar-Rodriguez12,
  author       = {Tom{\'{a}}s Escobar{-}Rodr{\'{\i}}guez and
                  Pedro Monge{-}Lozano and
                  Mercedes Romero{-}Alonso},
  title        = {Acceptance of E-Prescriptions and Automated Medication-Management
                  Systems in Hospitals: An Extension of the Technology Acceptance Model},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {1},
  pages        = {77--96},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-10254},
  doi          = {10.2308/ISYS-10254},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Escobar-Rodriguez12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GonzalezSG12,
  author       = {George C. Gonzalez and
                  Pratyush Nidhi Sharma and
                  Dennis F. Galletta},
  title        = {Factors Influencing the Planned Adoption of Continuous Monitoring
                  Technology},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {2},
  pages        = {53--69},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-50259},
  doi          = {10.2308/ISYS-50259},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GonzalezSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HuertaSLY12,
  author       = {Esperanza Huerta and
                  Stephen B. Salter and
                  Philip A. Lewis and
                  Pamela Yeow},
  title        = {Motivating Employees to Share Their Failures in Knowledge Management
                  Systems: Anonymity and Culture},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {2},
  pages        = {93--117},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-50214},
  doi          = {10.2308/ISYS-50214},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HuertaSLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/JanvrinN12,
  author       = {Diane J. Janvrin and
                  Won Gyun No},
  title        = {{XBRL} Implementation: {A} Field Investigation to Identify Research
                  Opportunities},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {1},
  pages        = {169--197},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-10252},
  doi          = {10.2308/ISYS-10252},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/JanvrinN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/JanvrinPBSC12,
  author       = {Diane J. Janvrin and
                  Elizabeth A. Payne and
                  Paul Byrnes and
                  Gary P. Schneider and
                  Mary B. Curtis},
  title        = {The Updated {COSO} Internal Control - Integrated Framework: Recommendations
                  and Opportunities for Future Research},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {2},
  pages        = {189--213},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-50255},
  doi          = {10.2308/ISYS-50255},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/JanvrinPBSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KimLN12,
  author       = {Joung W. Kim and
                  Jee{-}Hae Lim and
                  Won Gyun No},
  title        = {The Effect of First Wave Mandatory {XBRL} Reporting across the Financial
                  Information Environment},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {1},
  pages        = {127--153},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-10260},
  doi          = {10.2308/ISYS-10260},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KimLN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PerolsM12,
  author       = {Johan L. Perols and
                  Uday S. Murthy},
  title        = {Information Fusion in Continuous Assurance},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {2},
  pages        = {35--52},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-50216},
  doi          = {10.2308/ISYS-50216},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PerolsM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Pinsker12,
  author       = {Robert E. Pinsker},
  title        = {Book Review},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {2},
  pages        = {215--217},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-10307},
  doi          = {10.2308/ISYS-10307},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Pinsker12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PinskerLBGW12,
  author       = {Robert E. Pinsker and
                  Pei Li and
                  Paul Eric Byrnes and
                  Joshua Gunn and
                  Patrick Wheeler},
  title        = {Book Review},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {1},
  pages        = {207--212},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-10247},
  doi          = {10.2308/ISYS-10247},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PinskerLBGW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/RoseMNR12,
  author       = {Jacob M. Rose and
                  Britton A. McKay and
                  Carolyn Strand Norman and
                  Anna M. Rose},
  title        = {Designing Decision Aids to Promote the Development of Expertise},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {1},
  pages        = {7--34},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-10188},
  doi          = {10.2308/ISYS-10188},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/RoseMNR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SrivastavaL12,
  author       = {Rajendra P. Srivastava and
                  Qi Liu},
  title        = {Special Issue of \emph{JIS} on {XBRL}},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {1},
  pages        = {97--101},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-10255},
  doi          = {10.2308/ISYS-10255},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SrivastavaL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SuttonABP12,
  author       = {Steve G. Sutton and
                  Vicky Arnold and
                  Jean C. Bedard and
                  Jillian R. Phillips},
  title        = {Enhancing and Structuring the MD{\&}A to Aid Investors when Using
                  Interactive Data},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {2},
  pages        = {167--188},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-50256},
  doi          = {10.2308/ISYS-50256},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SuttonABP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Vasarhelyi12,
  author       = {Miklos A. Vasarhelyi},
  title        = {{AIS} in a More Rapidly Evolving Era},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {1},
  pages        = {1--5},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-10280},
  doi          = {10.2308/ISYS-10280},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Vasarhelyi12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Vasarhelyi12a,
  author       = {Miklos A. Vasarhelyi},
  title        = {Financial Accounting Standards Should Not Matter: It's Just a Layer},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {2},
  pages        = {1--11},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-10316},
  doi          = {10.2308/ISYS-10316},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Vasarhelyi12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/VasarhelyiCK12,
  author       = {Miklos A. Vasarhelyi and
                  David Y. Chan and
                  John Peter Krahel},
  title        = {Consequences of {XBRL} Standardization on Financial Statement Data},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {1},
  pages        = {155--167},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-10258},
  doi          = {10.2308/ISYS-10258},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/VasarhelyiCK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ZhangPMT12,
  author       = {Li Zhang and
                  Amy R. Pawlicki and
                  Dorothy McQuilken and
                  William R. Titera},
  title        = {The {AICPA} Assurance Services Executive Committee Emerging Assurance
                  Technologies Task Force: The Audit Data Standards {(ADS)} Initiative},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {1},
  pages        = {199--205},
  year         = {2012},
  url          = {https://doi.org/10.2308/isys-10277},
  doi          = {10.2308/ISYS-10277},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ZhangPMT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SmithBBH12,
  title        = {The Dark Side of Online Knowledge Sharing},
  journal      = {J. Inf. Syst.},
  volume       = {26},
  number       = {2},
  pages        = {71--91},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.2308/isys-50244},
  doi          = {10.2308/ISYS-50244},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SmithBBH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BlaskovichM11,
  author       = {Jennifer Blaskovich and
                  Natalia Mintchik},
  title        = {Information Technology Outsourcing: {A} Taxonomy of Prior Studies
                  and Directions for Future Research},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {1},
  pages        = {1--36},
  year         = {2011},
  url          = {https://doi.org/10.2308/jis.2011.25.1.1},
  doi          = {10.2308/JIS.2011.25.1.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BlaskovichM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoritzN11,
  author       = {J. Efrim Boritz and
                  Won Gyun No},
  title        = {E-Commerce and Privacy: Exploring What We Know and Opportunities for
                  Future Discovery},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {2},
  pages        = {11--45},
  year         = {2011},
  url          = {https://doi.org/10.2308/isys-10090},
  doi          = {10.2308/ISYS-10090},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BoritzN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChenLS11,
  author       = {Changling Chen and
                  Jee{-}Hae Lim and
                  Theophanis C. Stratopoulos},
  title        = {{IT} Capability and a Firm's Ability to Recover from Losses: Evidence
                  from the Economic Downturn of the Early 2000s},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {2},
  pages        = {117--144},
  year         = {2011},
  url          = {https://doi.org/10.2308/isys-10108},
  doi          = {10.2308/ISYS-10108},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChenLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CornellEH11,
  author       = {Robert M. Cornell and
                  Martha M. Eining and
                  Paul Jen{-}Hwa Hu},
  title        = {The Effects of Process Accountability on Individuals' Use of a Familiar
                  Technology},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {1},
  pages        = {109--128},
  year         = {2011},
  url          = {https://doi.org/10.2308/jis.2011.25.1.109},
  doi          = {10.2308/JIS.2011.25.1.109},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CornellEH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Debreceny11,
  author       = {Roger S. Debreceny},
  title        = {Betwixt and Between? Bringing Information Systems and Accounting Systems
                  Research Together},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {2},
  pages        = {1--9},
  year         = {2011},
  url          = {https://doi.org/10.2308/isys-10140},
  doi          = {10.2308/ISYS-10140},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Debreceny11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DebrecenyG11,
  author       = {Roger S. Debreceny and
                  Glen L. Gray},
  title        = {Data Mining of Electronic Mail and Auditing: {A} Research Agenda},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {2},
  pages        = {195--226},
  year         = {2011},
  url          = {https://doi.org/10.2308/isys-10167},
  doi          = {10.2308/ISYS-10167},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DebrecenyG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GrabskiLS11,
  author       = {Severin V. Grabski and
                  Stewart A. Leech and
                  Pamela J. Schmidt},
  title        = {A Review of {ERP} Research: {A} Future Agenda for Accounting Information
                  Systems},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {1},
  pages        = {37--78},
  year         = {2011},
  url          = {https://doi.org/10.2308/jis.2011.25.1.37},
  doi          = {10.2308/JIS.2011.25.1.37},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GrabskiLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HrubyB11,
  author       = {Pavel Hruby and
                  Johannes Buder},
  title        = {\emph{Model-Driven Design Using Business Patterns }},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {1},
  pages        = {213--215},
  year         = {2011},
  url          = {https://doi.org/10.2308/jis.2011.25.1.213},
  doi          = {10.2308/JIS.2011.25.1.213},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HrubyB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KauffmanLPS11,
  author       = {Robert J. Kauffman and
                  Yong Jick Lee and
                  Marilyn Prosch and
                  Paul J. Steinbart},
  title        = {A Survey of Consumer Information Privacy from the Accounting Information
                  Systems Perspective},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {2},
  pages        = {47--79},
  year         = {2011},
  url          = {https://doi.org/10.2308/isys-10091},
  doi          = {10.2308/ISYS-10091},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KauffmanLPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LimDRS11,
  author       = {Jee{-}Hae Lim and
                  Bruce Dehning and
                  Vernon J. Richardson and
                  Rodney E. Smith},
  title        = {A Meta-Analysis of the Effects of {IT} Investment on Firm Financial
                  Performance},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {2},
  pages        = {145--169},
  year         = {2011},
  url          = {https://doi.org/10.2308/isys-10125},
  doi          = {10.2308/ISYS-10125},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/LimDRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LoraasD11,
  author       = {Tina M. Loraas and
                  Michelle Chandler Diaz},
  title        = {Learning New Technologies: The Effect of Ease of Learning},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {2},
  pages        = {171--194},
  year         = {2011},
  url          = {https://doi.org/10.2308/isys-10109},
  doi          = {10.2308/ISYS-10109},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LoraasD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MasliRSS11,
  author       = {Adi Masli and
                  Vernon J. Richardson and
                  Juan Manuel S{\'{a}}nchez and
                  Rodney E. Smith},
  title        = {The Business Value of {IT:} {A} Synthesis and Framework of Archival
                  Research},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {2},
  pages        = {81--116},
  year         = {2011},
  url          = {https://doi.org/10.2308/isys-10117},
  doi          = {10.2308/ISYS-10117},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MasliRSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Morris11,
  author       = {John J. Morris},
  title        = {The Impact of Enterprise Resource Planning {(ERP)} Systems on the
                  Effectiveness of Internal Controls over Financial Reporting},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {1},
  pages        = {129--157},
  year         = {2011},
  url          = {https://doi.org/10.2308/jis.2011.25.1.129},
  doi          = {10.2308/JIS.2011.25.1.129},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Morris11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MurthyS11,
  author       = {Uday S. Murthy and
                  Brad A. Schafer},
  title        = {The Effects of Relative Performance Information and Framed Information
                  Systems Feedback on Performance in a Production Task},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {1},
  pages        = {159--184},
  year         = {2011},
  url          = {https://doi.org/10.2308/jis.2011.25.1.159},
  doi          = {10.2308/JIS.2011.25.1.159},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MurthyS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/NeelyC11,
  author       = {M. Pamela Neely and
                  Jack S. Cook},
  title        = {Fifteen Years of Data and Information Quality Literature: Developing
                  a Research Agenda for Accounting},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {1},
  pages        = {79--108},
  year         = {2011},
  url          = {https://doi.org/10.2308/jis.2011.25.1.79},
  doi          = {10.2308/JIS.2011.25.1.79},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/NeelyC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PinskerS11,
  author       = {Robert E. Pinsker and
                  Thomas J. Smith},
  title        = {Book Review},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {2},
  pages        = {227--229},
  year         = {2011},
  url          = {https://doi.org/10.2308/isys-10155},
  doi          = {10.2308/ISYS-10155},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PinskerS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Wallace0C11,
  author       = {Linda G. Wallace and
                  Hui Lin and
                  Meghann Cefaratti},
  title        = {Information Security and Sarbanes-Oxley Compliance: An Exploratory
                  Study},
  journal      = {J. Inf. Syst.},
  volume       = {25},
  number       = {1},
  pages        = {185--211},
  year         = {2011},
  url          = {https://doi.org/10.2308/jis.2011.25.1.185},
  doi          = {10.2308/JIS.2011.25.1.185},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Wallace0C11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AmerR10,
  author       = {T. S. Amer and
                  Sury Ravindran},
  title        = {The Effect of Visual Illusions on the Graphical Display of Information},
  journal      = {J. Inf. Syst.},
  volume       = {24},
  number       = {1},
  pages        = {23--42},
  year         = {2010},
  url          = {https://doi.org/10.2308/jis.2010.24.1.23},
  doi          = {10.2308/JIS.2010.24.1.23},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/AmerR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Barra10,
  author       = {Roberta Ann Barra},
  title        = {The Impact of Internal Controls and Penalties on Fraud},
  journal      = {J. Inf. Syst.},
  volume       = {24},
  number       = {1},
  pages        = {1--21},
  year         = {2010},
  url          = {https://doi.org/10.2308/jis.2010.24.1.1},
  doi          = {10.2308/JIS.2010.24.1.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Barra10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BartT10,
  author       = {Chris K. Bart and
                  Ofir Turel},
  title        = {{IT} and the Board of Directors: An Empirical Investigation into the
                  "Governance Questions" Canadian Board Members Ask about {IT}},
  journal      = {J. Inf. Syst.},
  volume       = {24},
  number       = {2},
  pages        = {147--172},
  year         = {2010},
  url          = {https://doi.org/10.2308/jis.2010.24.2.147},
  doi          = {10.2308/JIS.2010.24.2.147},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BartT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Blaskovich10,
  author       = {Jennifer Blaskovich},
  title        = {I. Ayers: \emph{Super Crunchers: Why Thinking-By-Numbers is the New
                  Way to be Smart}},
  journal      = {J. Inf. Syst.},
  volume       = {24},
  number       = {1},
  pages        = {113--116},
  year         = {2010},
  url          = {https://doi.org/10.2308/jis.2010.24.1.113},
  doi          = {10.2308/JIS.2010.24.1.113},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Blaskovich10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DillaJR10,
  author       = {William N. Dilla and
                  Diane J. Janvrin and
                  Robyn L. Raschke},
  title        = {Interactive Data Visualization: New Directions for Accounting Information
                  Systems Research},
  journal      = {J. Inf. Syst.},
  volume       = {24},
  number       = {2},
  pages        = {1--37},
  year         = {2010},
  url          = {https://doi.org/10.2308/jis.2010.24.2.1},
  doi          = {10.2308/JIS.2010.24.2.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DillaJR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HendersonKRS10,
  author       = {B. Charlene Henderson and
                  Kevin W. Kobelsky and
                  Vernon J. Richardson and
                  Rodney E. Smith},
  title        = {The Relevance of Information Technology Expenditures},
  journal      = {J. Inf. Syst.},
  volume       = {24},
  number       = {2},
  pages        = {39--77},
  year         = {2010},
  url          = {https://doi.org/10.2308/jis.2010.24.2.39},
  doi          = {10.2308/JIS.2010.24.2.39},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HendersonKRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KeltonPT10,
  author       = {Andrea Seaton Kelton and
                  Robin R. Pennington and
                  Brad M. Tuttle},
  title        = {The Effects of Information Presentation Format on Judgment and Decision
                  Making: {A} Review of the Information Systems Research},
  journal      = {J. Inf. Syst.},
  volume       = {24},
  number       = {2},
  pages        = {79--105},
  year         = {2010},
  url          = {https://doi.org/10.2308/jis.2010.24.2.79},
  doi          = {10.2308/JIS.2010.24.2.79},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KeltonPT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KuhnS10,
  author       = {John R. Kuhn Jr. and
                  Steve G. Sutton},
  title        = {Continuous Auditing in {ERP} System Environments: The Current State
                  and Future Directions},
  journal      = {J. Inf. Syst.},
  volume       = {24},
  number       = {1},
  pages        = {91--112},
  year         = {2010},
  url          = {https://doi.org/10.2308/jis.2010.24.1.91},
  doi          = {10.2308/JIS.2010.24.1.91},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KuhnS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MuhannaS10,
  author       = {Waleed A. Muhanna and
                  M. Dale Stoel},
  title        = {How Do Investors Value IT? An Empirical Investigation of the Value
                  Relevance of {IT} Capability and {IT} Spending Across Industries},
  journal      = {J. Inf. Syst.},
  volume       = {24},
  number       = {1},
  pages        = {43--66},
  year         = {2010},
  url          = {https://doi.org/10.2308/jis.2010.24.1.43},
  doi          = {10.2308/JIS.2010.24.1.43},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MuhannaS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WilkinC10,
  author       = {Carla L. Wilkin and
                  Robert H. Chenhall},
  title        = {A Review of {IT} Governance: {A} Taxonomy to Inform Accounting Information
                  Systems},
  journal      = {J. Inf. Syst.},
  volume       = {24},
  number       = {2},
  pages        = {107--146},
  year         = {2010},
  url          = {https://doi.org/10.2308/jis.2010.24.2.107},
  doi          = {10.2308/JIS.2010.24.2.107},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WilkinC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HuntonN10,
  title        = {The Impact of Alternative Telework Arrangements on Organizational
                  Commitment: Insights from a Longitudinal Field Experiment},
  journal      = {J. Inf. Syst.},
  volume       = {24},
  number       = {1},
  pages        = {67--90},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.2308/jis.2010.24.1.67},
  doi          = {10.2308/JIS.2010.24.1.67},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HuntonN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoritzN09,
  author       = {J. Efrim Boritz and
                  Won Gyun No},
  title        = {Assurance on XBRL-Related Documents: The Case of United Technologies
                  Corporation},
  journal      = {J. Inf. Syst.},
  volume       = {23},
  number       = {2},
  pages        = {49--78},
  year         = {2009},
  url          = {https://doi.org/10.2308/jis.2009.23.2.49},
  doi          = {10.2308/JIS.2009.23.2.49},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BoritzN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CallahanGS09,
  author       = {Carolyn M. Callahan and
                  E. Ann Gabriel and
                  Rodney E. Smith},
  title        = {The Effects of Inter-Firm Cost Correlation, {IT} Investment, and Product
                  Cost Accuracy on Production Decisions and Firm Profitability},
  journal      = {J. Inf. Syst.},
  volume       = {23},
  number       = {1},
  pages        = {51--78},
  year         = {2009},
  url          = {https://doi.org/10.2308/jis.2009.23.1.51},
  doi          = {10.2308/JIS.2009.23.1.51},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CallahanGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CurtisJBD09,
  author       = {Mary B. Curtis and
                  J. Gregory Jenkins and
                  Jean C. Bedard and
                  Donald R. Deis},
  title        = {Auditors' Training and Proficiency in Information Systems: {A} Research
                  Synthesis},
  journal      = {J. Inf. Syst.},
  volume       = {23},
  number       = {1},
  pages        = {79--96},
  year         = {2009},
  url          = {https://doi.org/10.2308/jis.2009.23.1.79},
  doi          = {10.2308/JIS.2009.23.1.79},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CurtisJBD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DowSW09,
  author       = {Kevin E. Dow and
                  Vincent J. Shea II and
                  Bobby E. Waldrup},
  title        = {Daytona Dreams Restaurant: Linking Accounting Systems with Business
                  Valuation},
  journal      = {J. Inf. Syst.},
  volume       = {23},
  number       = {1},
  pages        = {119--136},
  year         = {2009},
  url          = {https://doi.org/10.2308/jis.2009.23.1.119},
  doi          = {10.2308/JIS.2009.23.1.119},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DowSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DunnKM09,
  author       = {Kimberly Dunn and
                  Mark Kohlbeck and
                  Matthew Magilke},
  title        = {Future Profitability, Operating Cash Flows, and Market Valuations
                  Associated with Offshoring Arrangements of Technology Jobs},
  journal      = {J. Inf. Syst.},
  volume       = {23},
  number       = {2},
  pages        = {25--47},
  year         = {2009},
  url          = {https://doi.org/10.2308/jis.2009.23.2.25},
  doi          = {10.2308/JIS.2009.23.2.25},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DunnKM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/JanvrinBL09,
  author       = {Diane Janvrin and
                  James Bierstaker and
                  D. Jordan Lowe},
  title        = {An Investigation of Factors Influencing the Use of Computer-Related
                  Audit Procedures},
  journal      = {J. Inf. Syst.},
  volume       = {23},
  number       = {1},
  pages        = {97--118},
  year         = {2009},
  url          = {https://doi.org/10.2308/jis.2009.23.1.97},
  doi          = {10.2308/JIS.2009.23.1.97},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/JanvrinBL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KlammW09,
  author       = {Bonnie K. Klamm and
                  Marcia Weidenmier Watson},
  title        = {{SOX} 404 Reported Internal Control Weaknesses: {A} Test of {COSO}
                  Framework Components and Information Technology},
  journal      = {J. Inf. Syst.},
  volume       = {23},
  number       = {2},
  pages        = {1--23},
  year         = {2009},
  url          = {https://doi.org/10.2308/jis.2009.23.2.1},
  doi          = {10.2308/JIS.2009.23.2.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KlammW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LeeWO09,
  author       = {Chih{-}Chen Lee and
                  Robert B. Welker and
                  Marcus D. Odom},
  title        = {Features of Computer-Mediated, Text-Based Messages that Support Automatable,
                  Linguistics-Based Indicators for Deception Detection},
  journal      = {J. Inf. Syst.},
  volume       = {23},
  number       = {1},
  pages        = {5--24},
  year         = {2009},
  url          = {https://doi.org/10.2308/jis.2009.23.1.24},
  doi          = {10.2308/JIS.2009.23.1.24},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LeeWO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Pinsker09,
  author       = {Robert E. Pinsker},
  title        = {Book Reviews},
  journal      = {J. Inf. Syst.},
  volume       = {23},
  number       = {1},
  pages        = {137--142},
  year         = {2009},
  url          = {https://doi.org/10.2308/jis.2009.23.1.137},
  doi          = {10.2308/JIS.2009.23.1.137},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Pinsker09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Pinsker09a,
  author       = {Robert E. Pinsker},
  title        = {Book Reviews},
  journal      = {J. Inf. Syst.},
  volume       = {23},
  number       = {2},
  pages        = {79--84},
  year         = {2009},
  url          = {https://doi.org/10.2308/jis.2009.23.2.79},
  doi          = {10.2308/JIS.2009.23.2.79},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Pinsker09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PinskerW09,
  author       = {Robert E. Pinsker and
                  Patrick Wheeler},
  title        = {The Effects of Expanded Independent Assurance on the Use of Firm-Initiated
                  Disclosures by Investors with Limited Business Knowledge},
  journal      = {J. Inf. Syst.},
  volume       = {23},
  number       = {1},
  pages        = {25--49},
  year         = {2009},
  url          = {https://doi.org/10.2308/jis.2009.23.1.25},
  doi          = {10.2308/JIS.2009.23.1.25},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PinskerW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Steinbart09,
  author       = {Paul John Steinbart},
  title        = {Thoughts about the Future of the Journal of Information Systems},
  journal      = {J. Inf. Syst.},
  volume       = {23},
  number       = {1},
  pages        = {1--4},
  year         = {2009},
  url          = {https://doi.org/10.2308/jis.2009.23.1.1},
  doi          = {10.2308/JIS.2009.23.1.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Steinbart09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Steinbart09a,
  author       = {Paul John Steinbart},
  title        = {\emph{Journal of Information Systems} Editor's Report},
  journal      = {J. Inf. Syst.},
  volume       = {23},
  number       = {2},
  pages        = {85--89},
  year         = {2009},
  url          = {https://doi.org/10.2308/jis.2009.23.2.85},
  doi          = {10.2308/JIS.2009.23.2.85},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Steinbart09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AllesKV08,
  author       = {Michael G. Alles and
                  Alexander Kogan and
                  Miklos A. Vasarhelyi},
  title        = {Putting Continuous Auditing Theory into Practice: Lessons from Two
                  Pilot Implementations},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {195--214},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.2.195},
  doi          = {10.2308/JIS.2008.22.2.195},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/AllesKV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BajajBC08,
  author       = {Akhilesh Bajaj and
                  Wray Bradley and
                  Karen S. Cravens},
  title        = {{SAAS:} Integrating Systems Analysis with Accounting and Strategy
                  for Ex Ante Evaluation of {IS} Investments},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {1},
  pages        = {97--124},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.1.97},
  doi          = {10.2308/JIS.2008.22.1.97},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BajajBC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Blaskovich08,
  author       = {Jennifer Blaskovich},
  title        = {Exploring the Effect of Distance: An Experimental Investigation of
                  Virtual Collaboration, Social Loafing, and Group Decisions},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {1},
  pages        = {27--46},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.1.27},
  doi          = {10.2308/JIS.2008.22.1.27},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Blaskovich08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BollenHLB08,
  author       = {Laury Bollen and
                  Harold Hassink and
                  Rindert K. de Lange and
                  Saskia D. Buijl},
  title        = {Best Practices in Managing Investor Relations Websites: Directions
                  for Future Research},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {171--194},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.2.171},
  doi          = {10.2308/JIS.2008.22.2.171},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BollenHLB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BorthickB08,
  author       = {A. Faye Borthick and
                  Paul L. Bowen},
  title        = {Auditing System Development: Constructing the Meaning of "Systematic
                  and Rational" in the Context of Legacy Code Migration for Vendor Incentives},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {1},
  pages        = {47--62},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.1.47},
  doi          = {10.2308/JIS.2008.22.1.47},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BorthickB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BorthickBG08,
  author       = {A. Faye Borthick and
                  Paul L. Bowen and
                  Gregory J. Gerard},
  title        = {Modeling a Business Process and Querying the Resulting Database: Analyzing
                  {RFID} Data to Develop Business Intelligence},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {331--350},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.2.331},
  doi          = {10.2308/JIS.2008.22.2.331},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BorthickBG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BorthickC08,
  author       = {A. Faye Borthick and
                  Mary B. Curtis},
  title        = {Due Diligence on Fast-Fashion Inventory through Data Querying},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {1},
  pages        = {77--93},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.1.77},
  doi          = {10.2308/JIS.2008.22.1.77},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BorthickC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BrazelD08,
  author       = {Joseph F. Brazel and
                  Li Dang},
  title        = {The Effect of {ERP} System Implementations on the Management of Earnings
                  and Earnings Release Dates},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {1--21},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.2.1},
  doi          = {10.2308/JIS.2008.22.2.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BrazelD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChurchS08,
  author       = {Kim S. Church and
                  Rodney E. Smith},
  title        = {{REA} Ontology-Based Simulation Models for Enterprise Strategic Planning},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {301--329},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.2.301},
  doi          = {10.2308/JIS.2008.22.2.301},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChurchS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Fordham08,
  author       = {David R. Fordham},
  title        = {A Discovery-Learning Classroom Case on Accounting Data Transmission
                  Systems},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {103--122},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.2.103},
  doi          = {10.2308/JIS.2008.22.2.103},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Fordham08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GaillyLP08,
  author       = {Frederik Gailly and
                  Wim Laurier and
                  Geert Poels},
  title        = {Positioning and Formalizing the {REA} Enterprise Ontology},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {219--248},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.2.219},
  doi          = {10.2308/JIS.2008.22.2.219},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GaillyLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Geerts08,
  author       = {Guido L. Geerts},
  title        = {Introduction to the {REA} 25th Anniversary Special Section},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {215--217},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.2.215},
  doi          = {10.2308/JIS.2008.22.2.215},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Geerts08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GeertsT08,
  author       = {Guido L. Geerts and
                  Kinsun Tam},
  title        = {KaDo: An Advanced Enterprise Modeling, Database Design, Database Implementation,
                  and Information Retrieval Case for the Accounting Information Systems
                  Class},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {141--150},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.2.141},
  doi          = {10.2308/JIS.2008.22.2.141},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GeertsT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GelinasST08,
  author       = {Ulric J. Gelinas Jr. and
                  David L. Schwarzkopf and
                  Jay C. Thibodeau},
  title        = {Introducing Students to the Integrated Audit with "Auditing Alchemy,
                  Inc."},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {151--170},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.2.151},
  doi          = {10.2308/JIS.2008.22.2.151},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GelinasST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LevitanGC08,
  author       = {Alan S. Levitan and
                  Jian Guan and
                  Andrew Cobb},
  title        = {Modeling an Object-Oriented Accounting System with Computer-Aided
                  Software Engineering},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {123--139},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.2.123},
  doi          = {10.2308/JIS.2008.22.2.123},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LevitanGC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LoraasM08,
  author       = {Tina M. Loraas and
                  Jennifer M. Mueller},
  title        = {Bridging the Gap between Spreadsheet Use and Control: An Instructional
                  Case},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {1},
  pages        = {161--172},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.1.161},
  doi          = {10.2308/JIS.2008.22.1.161},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LoraasM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/McCallAS08,
  author       = {Holli McCall and
                  Vicky Arnold and
                  Steve G. Sutton},
  title        = {Use of Knowledge Management Systems and the Impact on the Acquisition
                  of Explicit Knowledge},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {77--101},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.2.77},
  doi          = {10.2308/JIS.2008.22.2.77},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/McCallAS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/RaschkeS08,
  author       = {Robyn L. Raschke and
                  Paul John Steinbart},
  title        = {Mitigating the Effects of Misleading Graphs on Decisions by Educating
                  Users about the Principles of Graph Design},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {23--52},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.2.23},
  doi          = {10.2308/JIS.2008.22.2.23},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/RaschkeS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SavageNL08,
  author       = {Arline Savage and
                  Carolyn Strand Norman and
                  Kathryn A. S. Lancaster},
  title        = {Using a Movie to Study the {COSO} Internal Control Framework: An Instructional
                  Case},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {1},
  pages        = {63--76},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.1.63},
  doi          = {10.2308/JIS.2008.22.1.63},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SavageNL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SedbrookN08,
  author       = {Tod A. Sedbrook and
                  Richard I. Newmark},
  title        = {Automating {REA} Policy Level Specifications with Semantic Web Technologies},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {249--277},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.2.249},
  doi          = {10.2308/JIS.2008.22.2.249},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SedbrookN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WangGWZ08,
  author       = {Li Wang and
                  Kholekile L. Gwebu and
                  Jing Wang and
                  David X. Zhu},
  title        = {The Aftermath of Information Technology Outsourcing: An Empirical
                  Study of Firm Performance Following Outsourcing Decisions},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {1},
  pages        = {125--159},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.1.125},
  doi          = {10.2308/JIS.2008.22.1.125},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WangGWZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WheelerJ08,
  author       = {Patrick Wheeler and
                  Donald R. Jones},
  title        = {The Psychology of Case-Based Reasoning: How Information Produced from
                  Case-Matching Methods Facilitates the Use of Statistically Generated
                  Information},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {1},
  pages        = {1--25},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.1.1},
  doi          = {10.2308/JIS.2008.22.1.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WheelerJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/White08,
  author       = {John H. White},
  title        = {{REA} Modeling of Mining Companies},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {279--299},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.2.279},
  doi          = {10.2308/JIS.2008.22.2.279},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/White08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WolfeD08,
  author       = {Christopher J. Wolfe and
                  Bruce Dehning},
  title        = {Preface to the 2007 Research Forum},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {1},
  pages        = {95},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.1.95},
  doi          = {10.2308/JIS.2008.22.1.95},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WolfeD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WolfeL08,
  author       = {Christopher J. Wolfe and
                  Tina M. Loraas},
  title        = {Knowledge Sharing: The Effects of Incentives, Environment, and Person},
  journal      = {J. Inf. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {53--76},
  year         = {2008},
  url          = {https://doi.org/10.2308/jis.2008.22.2.53},
  doi          = {10.2308/JIS.2008.22.2.53},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WolfeL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AmerM07,
  author       = {T. S. Amer and
                  Jo{-}Mae B. Maris},
  title        = {Signal Words and Signal Icons in Application Control and Information
                  Technology Exception Messages - Hazard Matching and Habituation Effects},
  journal      = {J. Inf. Syst.},
  volume       = {21},
  number       = {2},
  pages        = {1--25},
  year         = {2007},
  url          = {https://doi.org/10.2308/jis.2007.21.2.1},
  doi          = {10.2308/JIS.2007.21.2.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/AmerM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AshkanasyBRW07,
  author       = {Neal Ashkanasy and
                  Paul L. Bowen and
                  Fiona H. Rohde and
                  Chiu Yueh Alice Wu},
  title        = {The Effects of User Characteristics on Query Performance in the Presence
                  of Information Request Ambiguity},
  journal      = {J. Inf. Syst.},
  volume       = {21},
  number       = {1},
  pages        = {53--82},
  year         = {2007},
  url          = {https://doi.org/10.2308/jis.2007.21.1.53},
  doi          = {10.2308/JIS.2007.21.1.53},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/AshkanasyBRW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Ben-MenachemG07,
  author       = {Mordechai Ben{-}Menachem and
                  Ilanit Gavious},
  title        = {Accounting Software Assets: {A} Valuation Model for Software},
  journal      = {J. Inf. Syst.},
  volume       = {21},
  number       = {2},
  pages        = {117--132},
  year         = {2007},
  url          = {https://doi.org/10.2308/jis.2007.21.2.117},
  doi          = {10.2308/JIS.2007.21.2.117},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Ben-MenachemG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BorthickJ07,
  author       = {A. Faye Borthick and
                  Donald R. Jones},
  title        = {Creating a Business Process Diagram and Database Queries to Detect
                  Billing Errors and Analyze Calling Patterns for Cell Phone Service},
  journal      = {J. Inf. Syst.},
  volume       = {21},
  number       = {1},
  pages        = {107--122},
  year         = {2007},
  url          = {https://doi.org/10.2308/jis.2007.21.1.107},
  doi          = {10.2308/JIS.2007.21.1.107},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BorthickJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BradfordRR07,
  author       = {Marianne Bradford and
                  Sandra B. Richtermeyer and
                  Douglas F. Roberts},
  title        = {System Diagramming Techniques: An Analysis of Methods Used in Accounting
                  Education and Practice},
  journal      = {J. Inf. Syst.},
  volume       = {21},
  number       = {1},
  pages        = {173--212},
  year         = {2007},
  url          = {https://doi.org/10.2308/jis.2007.21.1.173},
  doi          = {10.2308/JIS.2007.21.1.173},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BradfordRR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BurneyM07,
  author       = {Laurie L. Burney and
                  Michele Matherly},
  title        = {Examining Performance Measurement from an Integrated Perspective},
  journal      = {J. Inf. Syst.},
  volume       = {21},
  number       = {2},
  pages        = {49--68},
  year         = {2007},
  url          = {https://doi.org/10.2308/jis.2007.21.2.49},
  doi          = {10.2308/JIS.2007.21.2.49},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BurneyM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChanW07,
  author       = {Siew H. Chan and
                  Sally Wright},
  title        = {Feasibility of More Frequent Reporting: {A} Field Study Informed Survey
                  of In-Company Accounting and {IT} Professionals},
  journal      = {J. Inf. Syst.},
  volume       = {21},
  number       = {2},
  pages        = {99--115},
  year         = {2007},
  url          = {https://doi.org/10.2308/jis.2007.21.2.99},
  doi          = {10.2308/JIS.2007.21.2.99},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChanW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChurchS07,
  author       = {Kim S. Church and
                  Rodney E. Smith},
  title        = {An Extension of the {REA} Framework to Support Balanced Scorecard
                  Information Requirements},
  journal      = {J. Inf. Syst.},
  volume       = {21},
  number       = {1},
  pages        = {1--25},
  year         = {2007},
  url          = {https://doi.org/10.2308/jis.2007.21.1.1},
  doi          = {10.2308/JIS.2007.21.1.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChurchS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DaigleHH07,
  author       = {Ronald J. Daigle and
                  David C. Hayes and
                  K. E. Hughes II},
  title        = {Assessing Student Learning Outcomes in the Introductory Accounting
                  Information Systems Course Using the AICPA's Core Competency Framework},
  journal      = {J. Inf. Syst.},
  volume       = {21},
  number       = {1},
  pages        = {149--169},
  year         = {2007},
  url          = {https://doi.org/10.2308/jis.2007.21.1.149},
  doi          = {10.2308/JIS.2007.21.1.149},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DaigleHH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Dunn07,
  author       = {Cheryl L. Dunn},
  title        = {Book Review, Cheryl L. Dunn, Editor},
  journal      = {J. Inf. Syst.},
  volume       = {21},
  number       = {1},
  pages        = {213--214},
  year         = {2007},
  url          = {https://doi.org/10.2308/jis.2007.21.1.213},
  doi          = {10.2308/JIS.2007.21.1.213},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Dunn07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KhallafS07,
  author       = {Ashraf Khallaf and
                  Terrance R. Skantz},
  title        = {The Effects of Information Technology Expertise on the Market Value
                  of a Firm},
  journal      = {J. Inf. Syst.},
  volume       = {21},
  number       = {1},
  pages        = {83--105},
  year         = {2007},
  url          = {https://doi.org/10.2308/jis.2007.21.1.83},
  doi          = {10.2308/JIS.2007.21.1.83},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KhallafS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LehmannHN07,
  author       = {Constance M. Lehmann and
                  Cynthia D. Heagy and
                  Carolyn Strand Norman},
  title        = {The Evaluation of Application Controls in Accounting Software: {A}
                  Short Instructional Case},
  journal      = {J. Inf. Syst.},
  volume       = {21},
  number       = {2},
  pages        = {87--98},
  year         = {2007},
  url          = {https://doi.org/10.2308/jis.2007.21.2.87},
  doi          = {10.2308/JIS.2007.21.2.87},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LehmannHN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PengVB07,
  author       = {Jacob Peng and
                  Ralph E. Viator and
                  Steve Buchheit},
  title        = {An Experimental Study of Multidimensional Hierarchical Accounting
                  Data: Drill-Down Paths Can Influence Economic Decisions},
  journal      = {J. Inf. Syst.},
  volume       = {21},
  number       = {2},
  pages        = {69--86},
  year         = {2007},
  url          = {https://doi.org/10.2308/jis.2007.21.2.69},
  doi          = {10.2308/JIS.2007.21.2.69},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PengVB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SmedleyS07,
  author       = {Georgia Smedley and
                  Steve G. Sutton},
  title        = {The Effect of Alternative Procedural Explanation Types on Procedural
                  Knowledge Acquisition during Knowledge-Based Systems Use},
  journal      = {J. Inf. Syst.},
  volume       = {21},
  number       = {1},
  pages        = {27--51},
  year         = {2007},
  url          = {https://doi.org/10.2308/jis.2007.21.1.27},
  doi          = {10.2308/JIS.2007.21.1.27},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SmedleyS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Walters07,
  author       = {L. Melissa Walters},
  title        = {A Draft of an Information Systems Security and Control Course},
  journal      = {J. Inf. Syst.},
  volume       = {21},
  number       = {1},
  pages        = {123--148},
  year         = {2007},
  url          = {https://doi.org/10.2308/jis.2007.21.1.123},
  doi          = {10.2308/JIS.2007.21.1.123},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Walters07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WangA07,
  author       = {Li Wang and
                  Pervaiz Alam},
  title        = {Information Technology Capability: Firm Valuation, Earnings Uncertainty,
                  and Forecast Accuracy},
  journal      = {J. Inf. Syst.},
  volume       = {21},
  number       = {2},
  pages        = {27--48},
  year         = {2007},
  url          = {https://doi.org/10.2308/jis.2007.21.2.27},
  doi          = {10.2308/JIS.2007.21.2.27},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WangA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/0001KR06,
  author       = {Wonseok Oh and
                  Joung W. Kim and
                  Vernon J. Richardson},
  title        = {The Moderating Effect of Context on the Market Reaction to {IT} Investments},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {19--44},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.1.19},
  doi          = {10.2308/JIS.2006.20.1.19},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/0001KR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Abu-Musa06,
  author       = {Ahmad A. Abu{-}Musa},
  title        = {Perceived Security Threats of Computerized Accounting Information
                  Systems in the Egyptian Banking Industry},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {187--203},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.1.187},
  doi          = {10.2308/JIS.2006.20.1.187},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Abu-Musa06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BehnSW06,
  author       = {Bruce Behn and
                  DeWayne Searcy and
                  Jonathan B. Woodroof},
  title        = {A Within Firm Analysis of Current and Expected Future Audit Lag Determinants},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {65--86},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.1.65},
  doi          = {10.2308/JIS.2006.20.1.65},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BehnSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Blankley06,
  author       = {Alan I. Blankley},
  title        = {Using {SQL} to Develop Database Query Proficiency: {A} Follow-Up Note
                  to Borthick, Jones, and Kim {(2001)}},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {117--137},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.1.117},
  doi          = {10.2308/JIS.2006.20.1.117},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Blankley06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CockrellMS06,
  author       = {R. Cameron Cockrell and
                  W. Timothy Mitchell and
                  Dan N. Stone},
  title        = {Negotiating the Emerging "Flat" World},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {2},
  pages        = {143--146},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.2.143},
  doi          = {10.2308/JIS.2006.20.2.143},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CockrellMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Dunn06,
  author       = {Cheryl L. Dunn},
  title        = {Book Review},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {221--223},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.1.221},
  doi          = {10.2308/JIS.2006.20.1.221},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Dunn06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Farewell06,
  author       = {Stephanie M. Farewell},
  title        = {An Introduction to {XBRL} through the Use of Research and Technical
                  Assignments},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {161--185},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.1.161},
  doi          = {10.2308/JIS.2006.20.1.161},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Farewell06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/FisherB06,
  author       = {Ingrid E. Fisher and
                  Marianne Bradford},
  title        = {New York State Agencies: {A} Case Study for Analyzing the Process
                  of Legacy System Migration: Part {II}},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {139--160},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.1.139},
  doi          = {10.2308/JIS.2006.20.1.139},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/FisherB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GeertsM06,
  author       = {Guido L. Geerts and
                  William E. McCarthy},
  title        = {Policy-Level Specifications in {REA} Enterprise Information Systems},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {2},
  pages        = {37--63},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.2.37},
  doi          = {10.2308/JIS.2006.20.2.37},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GeertsM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GelinasG06,
  author       = {Ulric J. Gelinas Jr. and
                  Janis L. Gogan},
  title        = {Accountants and Emerging Technologies: {A} Case Study at the United
                  States Department of the Treasury Bureau of Engraving and Printing},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {2},
  pages        = {93--116},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.2.93},
  doi          = {10.2308/JIS.2006.20.2.93},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GelinasG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GrantC06,
  author       = {Gerry H. Grant and
                  Sumali J. Conlon},
  title        = {{EDGAR} Extraction System: An Automated Approach to Analyze Employee
                  Stock Option Disclosures},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {2},
  pages        = {119--142},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.2.119},
  doi          = {10.2308/JIS.2006.20.2.119},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GrantC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LehmannH06,
  author       = {Constance M. Lehmann and
                  Cynthia D. Heagy},
  title        = {An Introduction to the Clinical Case Representation Paradigm for Information
                  Systems Research},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {87--101},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.1.87},
  doi          = {10.2308/JIS.2006.20.1.87},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LehmannH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LinS06,
  author       = {Pao{-}Chuan (Paul) Lin and
                  L. Murphy Smith},
  title        = {Using a Web-Based Accounting System for Teaching Accounting System
                  Design and Implementation},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {2},
  pages        = {65--79},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.2.65},
  doi          = {10.2308/JIS.2006.20.2.65},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LinS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LoraasW06,
  author       = {Tina M. Loraas and
                  Christopher J. Wolfe},
  title        = {Why Wait? Modeling Factors that Influence the Decision of When to
                  Learn a New Use of Technology},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {2},
  pages        = {1--23},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.2.1},
  doi          = {10.2308/JIS.2006.20.2.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LoraasW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Nikitkov06,
  author       = {Alexey N. Nikitkov},
  title        = {Information Assurance Seals: How They Impact Consumer Purchasing Behavior},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {1--17},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.1.1},
  doi          = {10.2308/JIS.2006.20.1.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Nikitkov06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PenningtonKD06,
  author       = {Robin R. Pennington and
                  Andrea S. Kelton and
                  Delwyn D. DeVries},
  title        = {The Effects of Qualitative Overload on Technology Acceptance},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {2},
  pages        = {25--36},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.2.25},
  doi          = {10.2308/JIS.2006.20.2.25},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PenningtonKD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Reck06,
  author       = {Jacqueline L. Reck},
  title        = {Discussion of The Moderating Effect of Context on the Market Reaction
                  to {IT} Investments},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {45--48},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.1.45},
  doi          = {10.2308/JIS.2006.20.1.45},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Reck06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SinasonN06,
  author       = {David H. Sinason and
                  Carol J. Normand},
  title        = {Omni Furniture Company: {A} Systems Development Life Cycle Case},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {2},
  pages        = {81--91},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.2.81},
  doi          = {10.2308/JIS.2006.20.2.81},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SinasonN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Taylor06,
  author       = {Eileen Z. Taylor},
  title        = {The Effect of Incentives on Knowledge Sharing in Computer-Mediated
                  Communication: An Experimental Investigation},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {103--116},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.1.103},
  doi          = {10.2308/JIS.2006.20.1.103},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Taylor06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WeidenmierR06,
  author       = {Marcia L. Weidenmier and
                  Sridhar Ramamoorti},
  title        = {Research Opportunities in Information Technology and Internal Auditing},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {205--219},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.1.205},
  doi          = {10.2308/JIS.2006.20.1.205},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WeidenmierR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WoolleyE06,
  author       = {Darryl J. Woolley and
                  Martha M. Eining},
  title        = {Software Piracy among Accounting Students: {A} Longitudinal Comparison
                  of Changes and Sensitivity},
  journal      = {J. Inf. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {49--63},
  year         = {2006},
  url          = {https://doi.org/10.2308/jis.2006.20.1.49},
  doi          = {10.2308/JIS.2006.20.1.49},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WoolleyE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Amer05,
  author       = {T. S. Amer},
  title        = {Bias Due to Visual Illusion in the Graphical Presentation of Accounting
                  Information},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {1},
  pages        = {1--18},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.1.1},
  doi          = {10.2308/JIS.2005.19.1.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Amer05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BorthickJ05,
  author       = {A. Faye Borthick and
                  Donald R. Jones},
  title        = {Analyzing a Potential Warranty Call Center Budget Overrun: Using Database
                  Queries to Solve Business Problems},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {1},
  pages        = {97--111},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.1.97},
  doi          = {10.2308/JIS.2005.19.1.97},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BorthickJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoveeKNSV05,
  author       = {Matthew Bovee and
                  Alexander Kogan and
                  Kay M. Nelson and
                  Rajendra P. Srivastava and
                  Miklos A. Vasarhelyi},
  title        = {Financial Reporting and Auditing Agent with Net Knowledge {(FRAANK)}
                  and eXtensible Business Reporting Language {(XBRL)}},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {1},
  pages        = {19--41},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.1.19},
  doi          = {10.2308/JIS.2005.19.1.19},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BoveeKNSV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BrownDM05,
  author       = {Darrell L. Brown and
                  Jesse F. Dillard and
                  R. Scott Marshall},
  title        = {Strategically Informed, Environmentally Conscious Information Requirements
                  for Accounting Information Systems},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {2},
  pages        = {79--103},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.2.79},
  doi          = {10.2308/JIS.2005.19.2.79},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BrownDM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DebrecenyB05,
  author       = {Roger S. Debreceny and
                  Paul L. Bowen},
  title        = {The Effects on End-User Query Performance of Incorporating Object-Oriented
                  Abstractions in Database Accounting Systems},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {1},
  pages        = {43--74},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.1.43},
  doi          = {10.2308/JIS.2005.19.1.43},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DebrecenyB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DebrecenyCCGHHJ05,
  author       = {Roger S. Debreceny and
                  Akhilesh Chandra and
                  John J. Cheh and
                  Denise Guithues{-}Amrhein and
                  Neal J. Hannon and
                  Paul D. Hutchison and
                  Diane Janvrin and
                  Roberta Ann Jones and
                  Barbara Lamberton and
                  Andy Lymer and
                  Maureen Francis Mascha and
                  Robert A. Nehmer and
                  Saeed Roohani and
                  Rajendra P. Srivastava and
                  Samir Trabelsi and
                  Thomas Tribunella and
                  Gerald Trites and
                  Miklos A. Vasarhelyi},
  title        = {Financial Reporting in {XBRL} on the SEC's {EDGAR} System: {A} Critique
                  and Evaluation},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {2},
  pages        = {191--210},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.2.191},
  doi          = {10.2308/JIS.2005.19.2.191},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DebrecenyCCGHHJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DebrecenyGNLY05,
  author       = {Roger S. Debreceny and
                  Glen L. Gray and
                  Joeson Jun{-}Jin Ng and
                  Kevin Siow{-}Ping Lee and
                  Woon{-}Foong Yau},
  title        = {Embedded Audit Modules in Enterprise Resource Planning Systems: Implementation
                  and Functionality},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {2},
  pages        = {7--27},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.2.7},
  doi          = {10.2308/JIS.2005.19.2.7},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DebrecenyGNLY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DillaS05,
  author       = {William N. Dilla and
                  Paul John Steinbart},
  title        = {Using Information Display Characteristics to Provide Decision Guidance
                  in a Choice Task under Conditions of Strict Uncertainty},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {2},
  pages        = {29--55},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.2.29},
  doi          = {10.2308/JIS.2005.19.2.29},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DillaS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Dunn05,
  author       = {Cheryl L. Dunn},
  title        = {Book Reviews},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {1},
  pages        = {155--157},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.1.155},
  doi          = {10.2308/JIS.2005.19.1.155},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Dunn05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Dunn05a,
  author       = {Cherly L. Dunn},
  title        = {Book Review},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {2},
  pages        = {211--212},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.2.211},
  doi          = {10.2308/JIS.2005.19.2.211},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Dunn05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/FisherB05,
  author       = {Ingrid E. Fisher and
                  Marianne Bradford},
  title        = {New York State Agencies: {A} Case Study for Analyzing the Process
                  of Legacy System Migration: Part {I}},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {2},
  pages        = {173--189},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.2.173},
  doi          = {10.2308/JIS.2005.19.2.173},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/FisherB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Fordham05,
  author       = {David R. Fordham},
  title        = {New Roles for {AIS} Courses: {A} Surprising Finding from a Case Study},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {1},
  pages        = {113--129},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.1.113},
  doi          = {10.2308/JIS.2005.19.1.113},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Fordham05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Gerard05,
  author       = {Gregory J. Gerard},
  title        = {The {REA} Pattern, Knowledge Structures, and Conceptual Modeling Performance},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {2},
  pages        = {57--77},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.2.57},
  doi          = {10.2308/JIS.2005.19.2.57},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Gerard05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HayesR05,
  author       = {David C. Hayes and
                  J. Kenneth Reynolds},
  title        = {Caroline's Candy Shop: An In-Class Role-Play of the Revenue Cycle},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {1},
  pages        = {131--154},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.1.131},
  doi          = {10.2308/JIS.2005.19.1.131},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HayesR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/LambertonFR05,
  author       = {Barbara Lamberton and
                  Jane Fedorowicz and
                  Saeed J. Roohani},
  title        = {Tolerance for Ambiguity and {IT} Competency among Accountants},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {1},
  pages        = {75--95},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.1.75},
  doi          = {10.2308/JIS.2005.19.1.75},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/LambertonFR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Lee05,
  author       = {Tanya M. Lee},
  title        = {Discussion of Behavioral Self-Regulation of Telework Locations: Interrupting
                  Interruptions!},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {2},
  pages        = {141--144},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.2.141},
  doi          = {10.2308/JIS.2005.19.2.141},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Lee05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/RoseRN05,
  author       = {Jacob M. Rose and
                  Anna M. Rose and
                  Carolyn Strand Norman},
  title        = {A Service-Learning Course in Accounting Information Systems},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {2},
  pages        = {145--172},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.2.145},
  doi          = {10.2308/JIS.2005.19.2.145},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/RoseRN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Tuttle05,
  author       = {Brad M. Tuttle},
  title        = {Editor's Comments},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {2},
  pages        = {1--5},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.2.1},
  doi          = {10.2308/JIS.2005.19.2.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Tuttle05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Yuthas05,
  author       = {Kristi Yuthas},
  title        = {"Inputting" the Environment: Reconsidering the Environmental Information
                  Matrix},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {2},
  pages        = {105--109},
  year         = {2005},
  url          = {https://doi.org/10.2308/jis.2005.19.2.105},
  doi          = {10.2308/JIS.2005.19.2.105},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Yuthas05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Hunton05,
  title        = {Behavioral Self-Regulation of Telework Locations: Interrupting Interruptions!},
  journal      = {J. Inf. Syst.},
  volume       = {19},
  number       = {2},
  pages        = {111--140},
  year         = {2005},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.2308/jis.2005.19.2.111},
  doi          = {10.2308/JIS.2005.19.2.111},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Hunton05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BagranoffT04,
  author       = {Nancy A. Bagranoff and
                  Leslie D. Turner},
  title        = {Growing a Nontraditional Accounting Firm: Warren and Associates},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {2},
  pages        = {49--56},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.2.49},
  doi          = {10.2308/JIS.2004.18.2.49},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BagranoffT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Daigle04,
  author       = {Ronald J. Daigle},
  title        = {Discussion of: SportsStuff.com: {A} Case Study on {XML} Technologies,
                  e-Business Processes, and Accounting Information Systems},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {2},
  pages        = {75--77},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.2.75},
  doi          = {10.2308/JIS.2004.18.2.75},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Daigle04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Dunn04,
  author       = {Cheryl L. Dunn},
  title        = {Book Reviews},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {1},
  pages        = {127--130},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.1.127},
  doi          = {10.2308/JIS.2004.18.1.127},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Dunn04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Dunn04a,
  author       = {Cheryl L. Dunn},
  title        = {Book Reviews},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {2},
  pages        = {127--131},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.2.127},
  doi          = {10.2308/JIS.2004.18.2.127},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Dunn04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GeertsW04,
  author       = {Guido L. Geerts and
                  Clinton E. White Jr.},
  title        = {SportsStuff.com: {A} Case Study on {XML} Technologies, e-Business
                  Processes, and Accounting Information Systems},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {2},
  pages        = {61--73},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.2.61},
  doi          = {10.2308/JIS.2004.18.2.61},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GeertsW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HutchisonLW04,
  author       = {Paul D. Hutchison and
                  Tanya M. Lee and
                  Craig G. White},
  title        = {Development of the \emph{Journal of Information Systems} from the
                  Editors' Perspectives},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {1},
  pages        = {39--51},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.1.39},
  doi          = {10.2308/JIS.2004.18.1.39},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HutchisonLW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KlammW04,
  author       = {Bonnie K. Klamm and
                  Marcia L. Weidenmier},
  title        = {Linking Business Processes and Transaction Cycles},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {2},
  pages        = {113--125},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.2.113},
  doi          = {10.2308/JIS.2004.18.2.113},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KlammW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Lampe04,
  author       = {James C. Lampe},
  title        = {Alternative Personality Measurements Commentary on Accounting Information
                  Systems Research Opportunities Using Personality Type Theory and the
                  Myers-Briggs Type Indicator},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {1},
  pages        = {21--34},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.1.21},
  doi          = {10.2308/JIS.2004.18.1.21},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Lampe04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Matherly04,
  author       = {Michele Matherly},
  title        = {Discussion of: Growing a Nontraditional Accounting Firm: Warren and
                  Associates},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {2},
  pages        = {57--59},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.2.57},
  doi          = {10.2308/JIS.2004.18.2.57},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Matherly04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Murthy04,
  author       = {Uday S. Murthy},
  title        = {An Analysis of the Effects of Continuous Monitoring Controls on e-Commerce
                  System Performance},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {2},
  pages        = {29--47},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.2.29},
  doi          = {10.2308/JIS.2004.18.2.29},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Murthy04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Nicolaou04,
  author       = {Andreas I. Nicolaou},
  title        = {Firm Performance Effects in Relation to the Implementation and Use
                  of Enterprise Resource Planning Systems},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {2},
  pages        = {79--105},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.2.79},
  doi          = {10.2308/JIS.2004.18.2.79},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Nicolaou04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Nicolaou04a,
  author       = {Andreas I. Nicolaou},
  title        = {Reply to Discussion of: Firm Performance Effects in Relation to the
                  Implementation and Use of Enterprise Resource Planning Systems},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {2},
  pages        = {111--112},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.2.111},
  doi          = {10.2308/JIS.2004.18.2.111},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Nicolaou04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Reck04,
  author       = {Jacqueline L. Reck},
  title        = {Discussion of: Firm Performance Effects in Relation to the Implementation
                  and Use of Enterprise Resource Planning Systems},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {2},
  pages        = {107--110},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.2.107},
  doi          = {10.2308/JIS.2004.18.2.107},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Reck04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/RoseRN04,
  author       = {Jacob M. Rose and
                  Anna M. Rose and
                  Carolyn Strand Norman},
  title        = {The Evaluation of Risky Information Technology Investment Decisions},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {1},
  pages        = {53--66},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.1.53},
  doi          = {10.2308/JIS.2004.18.1.53},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/RoseRN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SavageCP04,
  author       = {Arline Savage and
                  Joseph H. Callaghan and
                  Eileen Peacock},
  title        = {Accounting for the Development Costs of Internal-Use Software},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {1},
  pages        = {111--126},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.1.111},
  doi          = {10.2308/JIS.2004.18.1.111},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SavageCP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WeidenmierH04,
  author       = {Marcia L. Weidenmier and
                  Terri L. Herron},
  title        = {Selecting an Audit Software Package for Classroom Use},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {1},
  pages        = {95--110},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.1.95},
  doi          = {10.2308/JIS.2004.18.1.95},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WeidenmierH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WheelerHB04,
  author       = {Patrick R. Wheeler and
                  James E. Hunton and
                  Stephanie M. Bryant},
  title        = {Accounting Information Systems Research Opportunities Using Personality
                  Type Theory and the Myers-Briggs Type Indicator},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {1},
  pages        = {1--19},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.1.1},
  doi          = {10.2308/JIS.2004.18.1.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WheelerHB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WheelerHB04a,
  author       = {Patrick R. Wheeler and
                  James E. Hunton and
                  Stephanie M. Bryant},
  title        = {Authors' Reply to Commentary on Accounting Information Systems ResearchOpportunities
                  Using Personality Type Theory and the Myers-Briggs Type Indicator},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {1},
  pages        = {35--38},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.1.35},
  doi          = {10.2308/JIS.2004.18.1.35},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WheelerHB04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WrightJT04,
  author       = {William F. Wright and
                  Niramol Jindanuwat and
                  John Todd},
  title        = {Computational Models as a Knowledge Management Tool: {A} Process Model
                  of the Critical Judgments Made during Audit Planning},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {1},
  pages        = {67--94},
  year         = {2004},
  url          = {https://doi.org/10.2308/jis.2004.18.1.67},
  doi          = {10.2308/JIS.2004.18.1.67},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WrightJT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HuntonWW04,
  title        = {Are Financial Auditors Overconfident in Their Ability to Assess Risks
                  Associated with Enterprise Resource Planning Systems?},
  journal      = {J. Inf. Syst.},
  volume       = {18},
  number       = {2},
  pages        = {7--28},
  year         = {2004},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.2308/jis.2004.18.2.7},
  doi          = {10.2308/JIS.2004.18.2.7},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HuntonWW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Asthana03,
  author       = {Sharad Asthana},
  title        = {Impact of Information Technology on Post-Earnings Announcement Drift},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {1},
  pages        = {1--17},
  year         = {2003},
  url          = {https://doi.org/10.2308/jis.2003.17.1.1},
  doi          = {10.2308/JIS.2003.17.1.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Asthana03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BagranoffB03,
  author       = {Nancy A. Bagranoff and
                  Peter C. Brewer},
  title        = {{PMB} Investments: An Enterprise System Implementation},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {1},
  pages        = {85--106},
  year         = {2003},
  url          = {https://doi.org/10.2308/jis.2003.17.1.85},
  doi          = {10.2308/JIS.2003.17.1.85},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BagranoffB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BorthickJW03,
  author       = {A. Faye Borthick and
                  Donald R. Jones and
                  Sara Wakai},
  title        = {Designing Learning Experiences within Learners' Zones of Proximal
                  Development (ZPDs): Enabling Collaborative Learning On-Site and Online},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {1},
  pages        = {107--134},
  year         = {2003},
  url          = {https://doi.org/10.2308/jis.2003.17.1.107},
  doi          = {10.2308/JIS.2003.17.1.107},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BorthickJW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ChandraC03,
  author       = {Akhilesh Chandra and
                  Thomas G. Calderon},
  title        = {Toward a Biometric Security Layer in Accounting Systems},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {2},
  pages        = {51--70},
  year         = {2003},
  url          = {https://doi.org/10.2308/jis.2003.17.2.51},
  doi          = {10.2308/JIS.2003.17.2.51},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ChandraC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/David03,
  author       = {Julie Smith David},
  title        = {Discussion of Information Transfer among Internet Firms: The Case
                  of Hacker Attacks},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {2},
  pages        = {83--86},
  year         = {2003},
  url          = {https://doi.org/10.2308/jis.2003.17.2.83},
  doi          = {10.2308/JIS.2003.17.2.83},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/David03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Dillard03,
  author       = {Jesse F. Dillard},
  title        = {Professional Services, IBM, and the Holocaust},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {2},
  pages        = {1--16},
  year         = {2003},
  url          = {https://doi.org/10.2308/jis.2003.17.2.1},
  doi          = {10.2308/JIS.2003.17.2.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Dillard03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Dunn03,
  author       = {Cheryl L. Dunn},
  title        = {Book Reviews},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {2},
  pages        = {133--137},
  year         = {2003},
  url          = {https://doi.org/10.2308/jis.2003.17.2.133},
  doi          = {10.2308/JIS.2003.17.2.133},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Dunn03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/EttredgeR03,
  author       = {Michael L. Ettredge and
                  Vernon J. Richardson},
  title        = {Information Transfer among Internet Firms: The Case of Hacker Attacks},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {2},
  pages        = {71--82},
  year         = {2003},
  url          = {https://doi.org/10.2308/jis.2003.17.2.71},
  doi          = {10.2308/JIS.2003.17.2.71},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/EttredgeR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/IngramL03,
  author       = {Robert W. Ingram and
                  Dale L. Lunsford},
  title        = {Developing an e-Commerce System Using Active Server Pages},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {1},
  pages        = {135--156},
  year         = {2003},
  url          = {https://doi.org/10.2308/jis.2003.17.1.135},
  doi          = {10.2308/JIS.2003.17.1.135},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/IngramL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Janvrin03,
  author       = {Diane J. Janvrin},
  title        = {St. Patrick Company: Using Role Play to Examine Internal Control and
                  Fraud Detection Concepts},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {2},
  pages        = {17--39},
  year         = {2003},
  url          = {https://doi.org/10.2308/jis.2003.17.2.17},
  doi          = {10.2308/JIS.2003.17.2.17},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Janvrin03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Malone03,
  author       = {J. David Malone},
  title        = {Shooting the Past: An Instructional Case for Knowledge Management},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {2},
  pages        = {41--49},
  year         = {2003},
  url          = {https://doi.org/10.2308/jis.2003.17.2.41},
  doi          = {10.2308/JIS.2003.17.2.41},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Malone03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Mauldin03,
  author       = {Elaine G. Mauldin},
  title        = {An Experimental Examination of Information Technology and Compensation
                  Structure Complementarities in an Expert System Context},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {1},
  pages        = {19--41},
  year         = {2003},
  url          = {https://doi.org/10.2308/jis.2003.17.1.19},
  doi          = {10.2308/JIS.2003.17.1.19},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Mauldin03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Vandervelde03,
  author       = {Scott D. Vandervelde},
  title        = {Discussion of Extending the Accounting Brand to Privacy Services},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {2},
  pages        = {111--114},
  year         = {2003},
  url          = {https://doi.org/10.2308/jis.2003.17.2.111},
  doi          = {10.2308/JIS.2003.17.2.111},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Vandervelde03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Verdaasdonk03,
  author       = {Peter Verdaasdonk},
  title        = {An Object-Oriented Model for Ex Ante Accounting Information},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {1},
  pages        = {43--61},
  year         = {2003},
  url          = {https://doi.org/10.2308/jis.2003.17.1.43},
  doi          = {10.2308/JIS.2003.17.1.43},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Verdaasdonk03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WaltersN03,
  author       = {L. Melissa Walters and
                  Carol J. Normand},
  title        = {The Posh Hairdo Salon Case},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {2},
  pages        = {115--132},
  year         = {2003},
  url          = {https://doi.org/10.2308/jis.2003.17.2.115},
  doi          = {10.2308/JIS.2003.17.2.115},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WaltersN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WheelerJ03,
  author       = {Patrick R. Wheeler and
                  Donald R. Jones},
  title        = {The Effects of Exclusive User Choice of Decision Aid Features on Decision
                  Making},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {1},
  pages        = {63--83},
  year         = {2003},
  url          = {https://doi.org/10.2308/jis.2003.17.1.63},
  doi          = {10.2308/JIS.2003.17.1.63},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WheelerJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GreensteinH03,
  title        = {Extending the Accounting Brand to Privacy Services},
  journal      = {J. Inf. Syst.},
  volume       = {17},
  number       = {2},
  pages        = {87--110},
  year         = {2003},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.2308/jis.2003.17.2.87},
  doi          = {10.2308/JIS.2003.17.2.87},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GreensteinH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/AldhizerTS02,
  author       = {George R. Aldhizer III and
                  Leslie D. Turner and
                  Matthew D. Shank},
  title        = {Determinants of Consulting Service Quality for Accounting and Nonaccounting
                  Service Providers},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {1},
  pages        = {61--74},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.1.61},
  doi          = {10.2308/JIS.2002.16.1.61},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/AldhizerTS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ArunachalamPS02,
  author       = {Vairam Arunachalam and
                  Buck K. W. Pei and
                  Paul John Steinbart},
  title        = {Impression Management with Graphs: Effects on Choices},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {183--202},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.2.183},
  doi          = {10.2308/JIS.2002.16.2.183},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ArunachalamPS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ArunachalamPS02a,
  author       = {Vairam Arunachalam and
                  Buck K. W. Pei and
                  Paul John Steinbart},
  title        = {Reply to Discussion of Impression Management with Graphs: Effects
                  on Choices},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {207--208},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.2.207},
  doi          = {10.2308/JIS.2002.16.2.207},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ArunachalamPS02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BainBS02,
  author       = {Craig E. Bain and
                  Alan I. Blankley and
                  L. Murphy Smith},
  title        = {An Examination of Topical Coverage for the First Accounting Information
                  Systems Course},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {143--164},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.2.143},
  doi          = {10.2308/JIS.2002.16.2.143},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BainBS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BankerCK02,
  author       = {Rajiv D. Banker and
                  Hsihui Chang and
                  Yi{-}Ching Kao},
  title        = {Impact of Information Technology on Public Accounting Firm Productivity},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {209--222},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.2.209},
  doi          = {10.2308/JIS.2002.16.2.209},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BankerCK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BankerCK02a,
  author       = {Rajiv D. Banker and
                  Hsihui Chang and
                  Yi{-}Ching Kao},
  title        = {Reply to Discussion of Impact of Information Technology on Public
                  Accounting Firm Productivity},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {227--229},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.2.227},
  doi          = {10.2308/JIS.2002.16.2.227},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BankerCK02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoritzH02a,
  author       = {J. Efrim Boritz and
                  James E. Hunton},
  title        = {Reply to Discussions of Investigating the Impact of Auditor-Provided
                  Systems Reliability Assurance on Potential Service Recipients},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {s-1},
  pages        = {97--98},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.s-1.97},
  doi          = {10.2308/JIS.2002.16.S-1.97},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BoritzH02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoveeESV02,
  author       = {Matthew Bovee and
                  Michael L. Ettredge and
                  Rajendra P. Srivastava and
                  Miklos A. Vasarhelyi},
  title        = {Does the Year 2000 {XBRL} Taxonomy Accommodate Current Business Financial-Reporting
                  Practice?},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {165--182},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.2.165},
  doi          = {10.2308/JIS.2002.16.2.165},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BoveeESV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Carnaghan02,
  author       = {Carla Carnaghan},
  title        = {Discussion of Holistic, Continuous Assurance Integration: e-Business
                  Opportunities and Challenges},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {s-1},
  pages        = {25--27},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.s-1.25},
  doi          = {10.2308/JIS.2002.16.S-1.25},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Carnaghan02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Dehning02,
  author       = {Bruce Dehning},
  title        = {Discussion of Impact of Information Technology on Public Accounting
                  Firm Productivity},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {223--226},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.2.223},
  doi          = {10.2308/JIS.2002.16.2.223},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Dehning02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DehningR02,
  author       = {Bruce Dehning and
                  Vernon J. Richardson},
  title        = {Returns on Investments in Information Technology: {A} Research Synthesis},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {1},
  pages        = {7--30},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.1.7},
  doi          = {10.2308/JIS.2002.16.1.7},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DehningR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GeertsWW02,
  author       = {Guido L. Geerts and
                  Barbara A. Waddington and
                  Clinton E. White},
  title        = {Stevie: {A} Dynamic, Between-Instructor Collaborative Internet Tool
                  for Learning Cardinalities},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {1},
  pages        = {75--89},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.1.75},
  doi          = {10.2308/JIS.2002.16.1.75},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GeertsWW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GerardG02,
  author       = {Gregory J. Gerard and
                  Severin V. Grabski},
  title        = {International Lumberyards, Inc.: An Information System Consulting
                  Case},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {117--141},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.2.117},
  doi          = {10.2308/JIS.2002.16.2.117},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GerardG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Gray02,
  author       = {Glen L. Gray},
  title        = {Discussion of Investigating the Impact of Auditor-Provided Systems
                  Reliability Assurance on Potential Service Recipients},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {s-1},
  pages        = {91--95},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.s-1.91},
  doi          = {10.2308/JIS.2002.16.S-1.91},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Gray02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GreensteinR02,
  author       = {Marilyn M. Greenstein and
                  Amy W. Ray},
  title        = {Holistic, Continuous Assurance Integration: e-Business Opportunities
                  and Challenges},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {s-1},
  pages        = {1--20},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.s-1.1},
  doi          = {10.2308/JIS.2002.16.S-1.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GreensteinR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GreensteinR02a,
  author       = {Marilyn M. Greenstein and
                  Amy W. Ray},
  title        = {Reply to Discussions of Holistic, Continuous Assurance Integration:
                  e-Business Opportunities and Challenges},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {s-1},
  pages        = {29--32},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.s-1.29},
  doi          = {10.2308/JIS.2002.16.S-1.29},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GreensteinR02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Johnson02,
  author       = {Everett C. Johnson},
  title        = {Discussion of Holistic, Continuous Assurance Integration: e-Business
                  Opportunities and Challenges},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {s-1},
  pages        = {21--24},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.s-1.21},
  doi          = {10.2308/JIS.2002.16.S-1.21},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Johnson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Kovar02,
  author       = {Stacy E. Kovar},
  title        = {Discussion of An Experimental Examination of Alternative Forms of
                  Web Assurance for Business-to-Consumer e-Commerce},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {s-1},
  pages        = {59--63},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.s-1.59},
  doi          = {10.2308/JIS.2002.16.S-1.59},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Kovar02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Mauldin02,
  author       = {Elaine G. Mauldin},
  title        = {Discussion of Web Assurance Seals: How and Why They Influence Consumers'
                  Decisions},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {251--254},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.2.251},
  doi          = {10.2308/JIS.2002.16.2.251},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Mauldin02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MauldinA02,
  author       = {Elaine G. Mauldin and
                  Vairam Arunachalam},
  title        = {An Experimental Examination of Alternative Forms of Web Assurance
                  for Business-to-Consumer e-Commerce},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {s-1},
  pages        = {33--54},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.s-1.33},
  doi          = {10.2308/JIS.2002.16.S-1.33},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MauldinA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MauldinA02a,
  author       = {Elaine G. Mauldin and
                  Vairam Arunachalam},
  title        = {Reply to Discussions of An Experimental Examination of Alternative
                  Forms of Web Assurance for Business-to-Consumer e-Commerce},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {s-1},
  pages        = {65--67},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.s-1.65},
  doi          = {10.2308/JIS.2002.16.S-1.65},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MauldinA02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MurthyW02,
  author       = {Uday S. Murthy and
                  Casper E. Wiggins Jr.},
  title        = {Why Manuscripts Are Rejected: An Analysis of \emph{JIS} Rejections},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {1},
  pages        = {41--48},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.1.41},
  doi          = {10.2308/JIS.2002.16.1.41},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MurthyW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/OLeary02,
  author       = {Daniel E. O'Leary},
  title        = {Discussion of Information System Assurance for Enterprise Resource
                  Planning Systems: Unique Risk Considerations},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {s-1},
  pages        = {115--126},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.s-1.115},
  doi          = {10.2308/JIS.2002.16.S-1.115},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/OLeary02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/OdomKS02,
  author       = {Marcus D. Odom and
                  Anand Kumar and
                  Laura Saunders},
  title        = {Web Assurance Seals: How and Why They Influence Consumers' Decisions},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {231--250},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.2.231},
  doi          = {10.2308/JIS.2002.16.2.231},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/OdomKS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/OdomKS02a,
  author       = {Marcus D. Odom and
                  Anand Kumar and
                  Laura Saunders},
  title        = {Reply to Discussion of Web Assurance Seals: How and Why They Influence
                  Consumers' Decisions},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {255--257},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.2.255},
  doi          = {10.2308/JIS.2002.16.2.255},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/OdomKS02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Plumlee02,
  author       = {R. David Plumlee},
  title        = {Discussion of Impression Management with Graphs: Effects on Choices},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {203--206},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.2.203},
  doi          = {10.2308/JIS.2002.16.2.203},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Plumlee02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Ragones02,
  author       = {Emil J. Ragones},
  title        = {Discussion of Investigating the Impact of Auditor-Provided Systems
                  Reliability Assurance on Potential Service Recipients},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {s-1},
  pages        = {89},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.s-1.89},
  doi          = {10.2308/JIS.2002.16.S-1.89},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Ragones02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SamuelsS02,
  author       = {Janet A. Samuels and
                  Paul John Steinbart},
  title        = {The Journal of Information Systems: {A} Review of the First 15 Years},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {97--116},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.2.97},
  doi          = {10.2308/JIS.2002.16.2.97},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SamuelsS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Sheehy02,
  author       = {Donald E. Sheehy},
  title        = {Discussion of An Experimental Examination of Alternative Forms of
                  Web Assurance for Business-to-Consumer e-Commerce},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {s-1},
  pages        = {55--57},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.s-1.55},
  doi          = {10.2308/JIS.2002.16.S-1.55},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Sheehy02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Stone02,
  author       = {Dan N. Stone},
  title        = {Researching the Revolution: Prospects and Possibilities for the \emph{Journal
                  of Information Systems}},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {1},
  pages        = {1--6},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.1.1},
  doi          = {10.2308/JIS.2002.16.1.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Stone02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WrightW02,
  author       = {Sally Wright and
                  Arnold M. Wright},
  title        = {Information System Assurance for Enterprise Resource Planning Systems:
                  Unique Risk Considerations},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {s-1},
  pages        = {99--113},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.s-1.99},
  doi          = {10.2308/JIS.2002.16.S-1.99},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WrightW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WrightW02a,
  author       = {Sally Wright and
                  Arnold M. Wright},
  title        = {Reply to Discussion of Information System Assurance for Enterprise
                  Resource Planning Systems: Unique Risk Considerations},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {s-1},
  pages        = {127--129},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.s-1.127},
  doi          = {10.2308/JIS.2002.16.S-1.127},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WrightW02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/YostH02,
  author       = {Jeffrey A. Yost and
                  W. Ken Harmon},
  title        = {Contracting for Information System Outsourcing with Multiple Bidders},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {1},
  pages        = {49--59},
  year         = {2002},
  url          = {https://doi.org/10.2308/jis.2002.16.1.49},
  doi          = {10.2308/JIS.2002.16.1.49},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/YostH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoritzH02,
  title        = {Investigating the Impact of Auditor-Provided Systems Reliability Assurance
                  on Potential Service Recipients},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {s-1},
  pages        = {69--87},
  year         = {2002},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.2308/jis.2002.16.s-1.69},
  doi          = {10.2308/JIS.2002.16.S-1.69},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BoritzH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HuntonMW02,
  title        = {The Reaction of Financial Analysts to Enterprise Resource Planning
                  {(ERP)} Implementation Plans},
  journal      = {J. Inf. Syst.},
  volume       = {16},
  number       = {1},
  pages        = {31--40},
  year         = {2002},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.2308/jis.2002.16.1.31},
  doi          = {10.2308/JIS.2002.16.1.31},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HuntonMW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BorthickJK01,
  author       = {A. Faye Borthick and
                  Donald R. Jones and
                  Ryan Kim},
  title        = {Developing Database Query Proficiency: Assuring Compliance for Responses
                  to Web Site Referrals},
  journal      = {J. Inf. Syst.},
  volume       = {15},
  number       = {1},
  pages        = {35--56},
  year         = {2001},
  url          = {https://doi.org/10.2308/jis.2001.15.1.35},
  doi          = {10.2308/JIS.2001.15.1.35},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BorthickJK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Bryant01,
  author       = {Stephanie M. Bryant},
  title        = {A Blueprint for an {AIS} Consulting Course},
  journal      = {J. Inf. Syst.},
  volume       = {15},
  number       = {1},
  pages        = {19--34},
  year         = {2001},
  url          = {https://doi.org/10.2308/jis.2001.15.1.19},
  doi          = {10.2308/JIS.2001.15.1.19},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Bryant01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BurtonLT01,
  author       = {F. Greg Burton and
                  Robert A. Leitch and
                  Brad M. Tuttle},
  title        = {A User's Willingness to Adopt a New Information System: The Influence
                  of the Decision-Making Improvements and Performance-Monitoring Dimensions
                  of the System},
  journal      = {J. Inf. Syst.},
  volume       = {15},
  number       = {2},
  pages        = {61--79},
  year         = {2001},
  url          = {https://doi.org/10.2308/jis.2001.15.2.61},
  doi          = {10.2308/JIS.2001.15.2.61},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BurtonLT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HayesHR01,
  author       = {David C. Hayes and
                  James E. Hunton and
                  Jacqueline L. Reck},
  title        = {Market Reaction to {ERP} Implementation Announcements},
  journal      = {J. Inf. Syst.},
  volume       = {15},
  number       = {1},
  pages        = {3--18},
  year         = {2001},
  url          = {https://doi.org/10.2308/jis.2001.15.1.3},
  doi          = {10.2308/JIS.2001.15.1.3},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HayesHR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MurthyW01,
  author       = {Uday S. Murthy and
                  Casper E. Wiggins Jr.},
  title        = {The Sections of the \emph{Journal}},
  journal      = {J. Inf. Syst.},
  volume       = {15},
  number       = {1},
  pages        = {1--2},
  year         = {2001},
  url          = {https://doi.org/10.2308/jis.2001.15.1.1},
  doi          = {10.2308/JIS.2001.15.1.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MurthyW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/TuttleH01,
  author       = {Brad M. Tuttle and
                  Adrian M. Harrell},
  title        = {The Impact of Unit Goal Priorities, Economic Incentives, and Interim
                  Feedback on the Planned Effort of Information Systems Professionals},
  journal      = {J. Inf. Syst.},
  volume       = {15},
  number       = {2},
  pages        = {81--98},
  year         = {2001},
  url          = {https://doi.org/10.2308/jis.2001.15.2.81},
  doi          = {10.2308/JIS.2001.15.2.81},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/TuttleH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Viator01,
  author       = {Ralph E. Viator},
  title        = {The Relevance of Transformational Leadership to Nontraditional Accounting
                  Services: Information Systems Assurance and Business Consulting},
  journal      = {J. Inf. Syst.},
  volume       = {15},
  number       = {2},
  pages        = {99--125},
  year         = {2001},
  url          = {https://doi.org/10.2308/jis.2001.15.2.99},
  doi          = {10.2308/JIS.2001.15.2.99},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Viator01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Viator01a,
  author       = {Ralph E. Viator},
  title        = {Accounting Information Systems Doctoral Dissertations: 2000},
  journal      = {J. Inf. Syst.},
  volume       = {15},
  number       = {2},
  pages        = {127--129},
  year         = {2001},
  url          = {https://doi.org/10.2308/jis.2001.15.2.127},
  doi          = {10.2308/JIS.2001.15.2.127},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Viator01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ArnoldLMS00,
  author       = {Vicky Arnold and
                  James C. Lampe and
                  John J. Masselli and
                  Steve G. Sutton},
  title        = {An Analysis of the Market for Systems Reliability Assurance Services},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {65--82},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.65},
  doi          = {10.2308/JIS.2000.14.S-1.65},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ArnoldLMS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ArnoldLMS00a,
  author       = {Vicky Arnold and
                  James C. Lampe and
                  John J. Masselli and
                  Steve G. Sutton},
  title        = {Reply to Discussion of An Analysis of the Market for Systems Reliability
                  Assurance Services},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {91--95},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.91},
  doi          = {10.2308/JIS.2000.14.S-1.91},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ArnoldLMS00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Bailey00,
  author       = {Andrew D. Bailey Jr.},
  title        = {Discussion of {AICPA/CICA} SYSTRUST{\texttrademark} Principles and
                  Criteria},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {9--16},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.9},
  doi          = {10.2308/JIS.2000.14.S-1.9},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Bailey00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Bloom00,
  author       = {Leon J. Bloom},
  title        = {Discussion of An Analysis of the Market for Systems Reliability Assurance
                  Services},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {87--89},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.87},
  doi          = {10.2308/JIS.2000.14.S-1.87},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Bloom00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/BoritzK00,
  author       = {J. Efrim Boritz and
                  J. H. Kearns},
  title        = {1999 Symposium on {IS} Assurance Panel Discussion on SysTrust},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {163--176},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.163},
  doi          = {10.2308/JIS.2000.14.S-1.163},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/BoritzK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Borthick00,
  author       = {A. Faye Borthick},
  title        = {Analysis of Design from a Community of Practice Dialogue: Negotiating
                  the Meaning of Auditing Information System Development},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {133--147},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.133},
  doi          = {10.2308/JIS.2000.14.S-1.133},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Borthick00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Burton00,
  author       = {Richard N. Burton},
  title        = {Discussion of Information Technology-Related Activities of Internal
                  Auditors},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {57--60},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.57},
  doi          = {10.2308/JIS.2000.14.S-1.57},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Burton00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Carnaghan00,
  author       = {Carla Carnaghan},
  title        = {Discussion of An Analysis of the Group Dynamics Surrounding Internal
                  Control Assessment in Information Systems Audit and Assurance Domains},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {117--121},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.117},
  doi          = {10.2308/JIS.2000.14.S-1.117},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Carnaghan00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ClementsW00,
  author       = {Curtis E. Clements and
                  Christopher J. Wolfe},
  title        = {Reporting Financial Results with the Video Medium: An Experimental
                  Analysis},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {2},
  pages        = {79--94},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.2.79},
  doi          = {10.2308/JIS.2000.14.2.79},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ClementsW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GeertsM00,
  author       = {Guido L. Geerts and
                  William E. McCarthy},
  title        = {Augmented Intensional Reasoning in Knowledge-Based Accounting Systems},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {2},
  pages        = {127--150},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.2.127},
  doi          = {10.2308/JIS.2000.14.2.127},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GeertsM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GeertsW00,
  author       = {Guido L. Geerts and
                  Barbara A. Waddington},
  title        = {The Belgian Chocolate Company: {A} Dynamic Data Modeling and Database
                  Design Case for the Accounting Information Systems Class},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {1},
  pages        = {53--74},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.1.53},
  doi          = {10.2308/JIS.2000.14.1.53},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GeertsW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HayesHR00,
  author       = {David C. Hayes and
                  James E. Hunton and
                  Jacqueline L. Reck},
  title        = {Information Systems Outsourcing Announcements: Investigating the Impact
                  on the Market Value of Contract-Granting Firms},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {2},
  pages        = {109--125},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.2.109},
  doi          = {10.2308/JIS.2000.14.2.109},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HayesHR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HermansonHI00,
  author       = {Dana R. Hermanson and
                  Mary Callahan Hill and
                  Daniel M. Ivancevich},
  title        = {Information Technology-Related Activities of Internal Auditors},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {39--53},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.39},
  doi          = {10.2308/JIS.2000.14.S-1.39},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HermansonHI00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HermansonHI00a,
  author       = {Dana R. Hermanson and
                  Mary Callahan Hill and
                  Daniel M. Ivancevich},
  title        = {Reply to Discussions of Information Technology-Related Activities
                  of Internal Auditors},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {61--63},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.61},
  doi          = {10.2308/JIS.2000.14.S-1.61},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HermansonHI00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Holstrum00,
  author       = {Gary L. Holstrum},
  title        = {Discussion of Analysis of Design from a Community of Practice Dialogue:
                  Negotiating the Meaning of Auditing Information System Development},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {149--157},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.149},
  doi          = {10.2308/JIS.2000.14.S-1.149},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Holstrum00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Hunton00,
  author       = {James E. Hunton},
  title        = {Discussant's Comments on Presentations by John Lainhart and Gerald
                  Trites},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {33--35},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.33},
  doi          = {10.2308/JIS.2000.14.S-1.33},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Hunton00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Jackson00,
  author       = {Cynthia Jackson},
  title        = {Discussion of Information Technology-Related Activities of Internal
                  Auditors},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {55--56},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.55},
  doi          = {10.2308/JIS.2000.14.S-1.55},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Jackson00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KovarBK00,
  author       = {Stacy E. Kovar and
                  Kimberly Gladden Burke and
                  Brian R. Kovar},
  title        = {Consumer Responses to the {CPA} WEBTRUST{\texttrademark} Assurance},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {1},
  pages        = {17--35},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.1.17},
  doi          = {10.2308/JIS.2000.14.1.17},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KovarBK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KrishnanS00,
  author       = {Gopal V. Krishnan and
                  Ram S. Sriram},
  title        = {An Examination of the Effect of {IT} Investments on Firm Value: The
                  Case of Y2K-Compliance Costs},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {2},
  pages        = {95--108},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.2.95},
  doi          = {10.2308/JIS.2000.14.2.95},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KrishnanS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Lainhart00,
  author       = {John W. Lainhart IV},
  title        = {COBIT{\texttrademark}: {A} Methodology for Managing and Controlling
                  Information and Information Technology Risks and Vulnerabilities},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {21--25},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.21},
  doi          = {10.2308/JIS.2000.14.S-1.21},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Lainhart00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Leader00,
  author       = {Brian Leader},
  title        = {Discussion of Analysis of Design from a Community of Practice Dialogue:
                  Negotiating the Meaning of Auditing Information System Development},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {159--162},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.159},
  doi          = {10.2308/JIS.2000.14.S-1.159},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Leader00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Leech00,
  author       = {Tim J. Leech},
  title        = {Discussion of An Analysis of the Group Dynamics Surrounding Internal
                  Control Assessment in Information Systems Audit and Assurance Domains},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {123--125},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.123},
  doi          = {10.2308/JIS.2000.14.S-1.123},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Leech00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/McCracken00,
  author       = {Susan A. McCracken},
  title        = {Discussion of An Analysis of the Market for Systems Reliability Assurance
                  Services},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {83--85},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.83},
  doi          = {10.2308/JIS.2000.14.S-1.83},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/McCracken00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/McPhie00,
  author       = {Doug McPhie},
  title        = {{AICPA/CICA} SYSTRUST{\texttrademark} Principles and Criteria},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {1--7},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.1},
  doi          = {10.2308/JIS.2000.14.S-1.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/McPhie00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ODonnellAS00,
  author       = {Ed O'Donnell and
                  Vicky Arnold and
                  Steve G. Sutton},
  title        = {An Analysis of the Group Dynamics Surrounding Internal Control Assessment
                  in Information Systems Audit and Assurance Domains},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {97--116},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.97},
  doi          = {10.2308/JIS.2000.14.S-1.97},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ODonnellAS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ODonnellAS00a,
  author       = {Ed O'Donnell and
                  Vicky Arnold and
                  Steve G. Sutton},
  title        = {Reply to Discussion of An Analysis of the Group Dynamics Surrounding
                  Internal Control Assessment in Information Systems Audit and Assurance
                  Domains},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {127--131},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.127},
  doi          = {10.2308/JIS.2000.14.S-1.127},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ODonnellAS00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SriramAI00,
  author       = {Ram S. Sriram and
                  Vairam Arunachalam and
                  Daniel M. Ivancevich},
  title        = {{EDI} Adoption and Implementation: An Examination of Perceived Operational
                  and Strategic Benefits, and Controls},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {1},
  pages        = {37--52},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.1.37},
  doi          = {10.2308/JIS.2000.14.1.37},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SriramAI00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SummersSW00,
  author       = {Scott L. Summers and
                  John T. Sweeney and
                  Carel M. Wolk},
  title        = {Problem-Solving Style and Fit in Consulting and Auditing},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {1},
  pages        = {1--15},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.1.1},
  doi          = {10.2308/JIS.2000.14.1.1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SummersSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Trites00,
  author       = {Gerald Trites},
  title        = {Overview of CICA's Information Technology Control Guidelines},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {s-1},
  pages        = {27--32},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.s-1.27},
  doi          = {10.2308/JIS.2000.14.S-1.27},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Trites00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Viator00,
  author       = {Ralph E. Viator},
  title        = {Accounting Information Systems Doctoral Dissertations: 1999},
  journal      = {J. Inf. Syst.},
  volume       = {14},
  number       = {2},
  pages        = {151--154},
  year         = {2000},
  url          = {https://doi.org/10.2308/jis.2000.14.2.151},
  doi          = {10.2308/JIS.2000.14.2.151},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Viator00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CoalterHP99,
  author       = {Terry M. Coalter and
                  James E. Hunton and
                  Kenneth H. Price},
  title        = {Collective User Participation in Specifying Requirements of an Information
                  System: Minimizing Differences Between Minority and Majority Voting
                  Subgroups},
  journal      = {J. Inf. Syst.},
  volume       = {13},
  number       = {1},
  pages        = {31--48},
  year         = {1999},
  url          = {https://doi.org/10.2308/jis.1999.13.1.31},
  doi          = {10.2308/JIS.1999.13.1.31},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CoalterHP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CurtisB99,
  author       = {Mary B. Curtis and
                  A. Faye Borthick},
  title        = {Evaluation of Internal Control from a Control Objective Narrative},
  journal      = {J. Inf. Syst.},
  volume       = {13},
  number       = {1},
  pages        = {63--81},
  year         = {1999},
  url          = {https://doi.org/10.2308/jis.1999.13.1.63},
  doi          = {10.2308/JIS.1999.13.1.63},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CurtisB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DavidDMP99,
  author       = {Julie Smith David and
                  Cheryl L. Dunn and
                  William E. McCarthy and
                  Robin S. Poston},
  title        = {The Research Pyramid: {A} Framework for Accounting Information Systems
                  Research},
  journal      = {J. Inf. Syst.},
  volume       = {13},
  number       = {1},
  pages        = {7--30},
  year         = {1999},
  url          = {https://doi.org/10.2308/jis.1999.13.1.7},
  doi          = {10.2308/JIS.1999.13.1.7},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DavidDMP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DullT99,
  author       = {Richard B. Dull and
                  David P. Tegarden},
  title        = {A Comparison of Three Visual Representations of Complex Multidimensional
                  Accounting Information},
  journal      = {J. Inf. Syst.},
  volume       = {13},
  number       = {2},
  pages        = {117--131},
  year         = {1999},
  url          = {https://doi.org/10.2308/jis.1999.13.2.117},
  doi          = {10.2308/JIS.1999.13.2.117},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/DullT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KoganSV99,
  author       = {Alexander Kogan and
                  Ephraim F. Sudit and
                  Miklos A. Vasarhelyi},
  title        = {Continuous Online Auditing: {A} Program of Research},
  journal      = {J. Inf. Syst.},
  volume       = {13},
  number       = {2},
  pages        = {87--103},
  year         = {1999},
  url          = {https://doi.org/10.2308/jis.1999.13.2.87},
  doi          = {10.2308/JIS.1999.13.2.87},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KoganSV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MurthyW99,
  author       = {Uday S. Murthy and
                  Casper E. Wiggins Jr.},
  title        = {A Perspective on Accounting Information Systems Research},
  journal      = {J. Inf. Syst.},
  volume       = {13},
  number       = {1},
  pages        = {3--6},
  year         = {1999},
  url          = {https://doi.org/10.2308/jis.1999.13.1.3},
  doi          = {10.2308/JIS.1999.13.1.3},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MurthyW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/OLeary99,
  author       = {Daniel E. O'Leary},
  title        = {{REAL-D:} {A} Schema for Data Warehouses},
  journal      = {J. Inf. Syst.},
  volume       = {13},
  number       = {1},
  pages        = {49--62},
  year         = {1999},
  url          = {https://doi.org/10.2308/jis.1999.13.1.49},
  doi          = {10.2308/JIS.1999.13.1.49},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/OLeary99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/OLeary99a,
  author       = {Daniel E. O'Leary},
  title        = {The Impact of the Euro on Information Systems},
  journal      = {J. Inf. Syst.},
  volume       = {13},
  number       = {2},
  pages        = {105--116},
  year         = {1999},
  url          = {https://doi.org/10.2308/jis.1999.13.2.105},
  doi          = {10.2308/JIS.1999.13.2.105},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/OLeary99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Viator99,
  author       = {Ralph E. Viator},
  title        = {Accounting Information Systems Doctoral Dissertations: 1998},
  journal      = {J. Inf. Syst.},
  volume       = {13},
  number       = {2},
  pages        = {133--136},
  year         = {1999},
  url          = {https://doi.org/10.2308/jis.1999.13.2.133},
  doi          = {10.2308/JIS.1999.13.2.133},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Viator99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}