default search action
Search dblp for Publications
export results for "stream:journals/jisys:"
@article{DBLP:journals/jisys/BeerMP24, author = {Christian Beer and Janine Maniora and Christiane Pott}, title = {The Risk of Silence - How the Capital Market Penalizes Social Media Passivity}, journal = {J. Inf. Syst.}, volume = {38}, number = {1}, pages = {5--38}, year = {2024}, url = {https://doi.org/10.2308/isys-2023-059}, doi = {10.2308/ISYS-2023-059}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BeerMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BradfordBA24, author = {Marianne Bradford and Robert A. Bucy and Murat Adivar}, title = {Implementing {ERP} with Maintenance and Support in Mind: Exploring the Efficacy of Application Management Services for the Post-Implementation Phase}, journal = {J. Inf. Syst.}, volume = {38}, number = {2}, pages = {1--27}, year = {2024}, url = {https://doi.org/10.2308/isys-2022-064}, doi = {10.2308/ISYS-2022-064}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BradfordBA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChoHL24, author = {Myojung Cho and Feiqi Huang and Xin Luo}, title = {Retail Investor Attention and Audit Pricing}, journal = {J. Inf. Syst.}, volume = {38}, number = {1}, pages = {39--66}, year = {2024}, url = {https://doi.org/10.2308/isys-2023-017}, doi = {10.2308/ISYS-2023-017}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChoHL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DemersWW24, author = {Elizabeth Demers and Victor Xiaoqi Wang and Kean Wu}, title = {Measuring Corporate Human Capital Disclosures: Lexicon, Data, Code, and Research Opportunities}, journal = {J. Inf. Syst.}, volume = {38}, number = {2}, pages = {163--186}, year = {2024}, url = {https://doi.org/10.2308/isys-2023-023}, doi = {10.2308/ISYS-2023-023}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DemersWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/EulerichWWW24, author = {Marc Eulerich and Nathan Waddoups and Martin Wagener and David A. Wood}, title = {Development of a Framework of Key Internal Control and Governance Principles for Robotic Process Automation {(RPA)}}, journal = {J. Inf. Syst.}, volume = {38}, number = {2}, pages = {29--49}, year = {2024}, url = {https://doi.org/10.2308/isys-2023-067}, doi = {10.2308/ISYS-2023-067}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/EulerichWWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HosseinpourJ24, author = {Marzie Hosseinpour and Mieke Jans}, title = {Auditors' Categorization of Process Deviations}, journal = {J. Inf. Syst.}, volume = {38}, number = {1}, pages = {67--89}, year = {2024}, url = {https://doi.org/10.2308/isys-2023-051}, doi = {10.2308/ISYS-2023-051}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HosseinpourJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HuSVZ24, author = {Hanxin Hu and Ting Sun and Miklos A. Vasarhelyi and Min Zhang}, title = {Measuring Audit Quality with Surprise Scores: Evidence from China and the {U.S}}, journal = {J. Inf. Syst.}, volume = {38}, number = {2}, pages = {51--78}, year = {2024}, url = {https://doi.org/10.2308/isys-2023-027}, doi = {10.2308/ISYS-2023-027}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HuSVZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Jiang24, author = {Wanying Jiang}, title = {Cybersecurity Risk and Audit Pricing - {A} Machine Learning-Based Analysis}, journal = {J. Inf. Syst.}, volume = {38}, number = {1}, pages = {91--117}, year = {2024}, url = {https://doi.org/10.2308/isys-2023-019}, doi = {10.2308/ISYS-2023-019}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Jiang24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/JohnstonRS24, author = {Joseph Johnston and Kenneth J. Reichelt and Pradeep Sapkota}, title = {Measuring Financial Statement Disaggregation Using {XBRL}}, journal = {J. Inf. Syst.}, volume = {38}, number = {1}, pages = {119--147}, year = {2024}, url = {https://doi.org/10.2308/isys-2021-004}, doi = {10.2308/ISYS-2021-004}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/JohnstonRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LaghmouchLMDJ24, author = {Manal Laghmouch and Sebastien Lizin and Jan Mendling and Beno{\^{\i}}t Depaire and Mieke Jans}, title = {Auditors' Risk Perception of Process Control Deficiencies: {A} Discrete Choice Experiment}, journal = {J. Inf. Syst.}, volume = {38}, number = {2}, pages = {79--97}, year = {2024}, url = {https://doi.org/10.2308/isys-2021-039}, doi = {10.2308/ISYS-2021-039}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LaghmouchLMDJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LiCY24, author = {Chang{-}Wei Li and Chi{-}Chun Chou and Ju{-}Chun Yen}, title = {An Accounting Classification System Using Constituency Analysis and Semantic Web Technologies}, journal = {J. Inf. Syst.}, volume = {38}, number = {1}, pages = {149--175}, year = {2024}, url = {https://doi.org/10.2308/isys-2023-005}, doi = {10.2308/ISYS-2023-005}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LiCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LiSH24, author = {He Li and Zhengjie Sun and Feiqi Huang}, title = {The Impact of Audit Office Cybersecurity Experience on Nonbreach Client's Audit Fees and Cybersecurity Risks}, journal = {J. Inf. Syst.}, volume = {38}, number = {1}, pages = {177--206}, year = {2024}, url = {https://doi.org/10.2308/isys-2023-014}, doi = {10.2308/ISYS-2023-014}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LiSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MungaiL24, author = {Ann N. Mungai and Lorraine S. Lee}, title = {Information Technology Capability, Managerial Ability, and Financial Reporting Quality: {A} Research Note}, journal = {J. Inf. Syst.}, volume = {38}, number = {2}, pages = {99--121}, year = {2024}, url = {https://doi.org/10.2308/isys-2022-063}, doi = {10.2308/ISYS-2022-063}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MungaiL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WeiCVT24, author = {Danyang Wei and Soohyun Cho and Miklos A. Vasarhelyi and Liam Te{-}Wierik}, title = {Outlier Detection in Auditing: Integrating Unsupervised Learning within a Multilevel Framework for General Ledger Analysis}, journal = {J. Inf. Syst.}, volume = {38}, number = {2}, pages = {123--142}, year = {2024}, url = {https://doi.org/10.2308/isys-2022-026}, doi = {10.2308/ISYS-2022-026}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WeiCVT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WilkinW24, author = {Carla L. Wilkin and Tawei Wang}, title = {Reflections on the \emph{Journal of Information Systems} and Suggested Future Initiatives}, journal = {J. Inf. Syst.}, volume = {38}, number = {1}, pages = {1--3}, year = {2024}, url = {https://doi.org/10.2308/isys-2024-003}, doi = {10.2308/ISYS-2024-003}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WilkinW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/X24, title = {Covers and Front Matter}, journal = {J. Inf. Syst.}, volume = {38}, number = {1}, pages = {i--iv}, year = {2024}, url = {https://doi.org/10.2308/0888-7985-38.1.i}, doi = {10.2308/0888-7985-38.1.I}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/X24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/X24a, title = {Editorial Policy}, journal = {J. Inf. Syst.}, volume = {38}, number = {1}, year = {2024}, url = {https://doi.org/10.2308/0888-7985-38.1.e}, doi = {10.2308/0888-7985-38.1.E}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/X24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/X24b, title = {Editorial Policy}, journal = {J. Inf. Syst.}, volume = {38}, number = {2}, pages = {187--191}, year = {2024}, url = {https://doi.org/10.2308/0888-7985-38.2.e}, doi = {10.2308/0888-7985-38.2.E}, timestamp = {Sun, 14 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/X24b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/YoonKVP24, author = {Kyunghee Yoon and Alexander Kogan and Miklos A. Vasarhelyi and Tim Pearce}, title = {External Nonfinancial Measures in Substantive Analytical Procedures: Contributions of Weather Information}, journal = {J. Inf. Syst.}, volume = {38}, number = {2}, pages = {143--162}, year = {2024}, url = {https://doi.org/10.2308/isys-2023-066}, doi = {10.2308/ISYS-2023-066}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/YoonKVP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoritzS23, author = {J. Efrim Boritz and Theophanis Stratopoulos}, title = {\emph{Journal of Information Systems} Workshop on Data Value Creation: Views from Industry and Academia}, journal = {J. Inf. Syst.}, volume = {37}, number = {1}, pages = {1--6}, year = {2023}, url = {https://doi.org/10.2308/isys-2023-002}, doi = {10.2308/ISYS-2023-002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BoritzS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoritzS23a, author = {J. Efrim Boritz and Theophanis C. Stratopoulos}, title = {{AI} and the Accounting Profession: Views from Industry and Academia}, journal = {J. Inf. Syst.}, volume = {37}, number = {3}, pages = {1--9}, year = {2023}, url = {https://doi.org/10.2308/isys-2023-054}, doi = {10.2308/ISYS-2023-054}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/BoritzS23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CalderonG23, author = {Thomas G. Calderon and Lei Gao}, title = {Innovative and Novel Research Datasets Related to Cybersecurity Risk Disclosures: {A} Research Note}, journal = {J. Inf. Syst.}, volume = {37}, number = {2}, pages = {123--128}, year = {2023}, url = {https://doi.org/10.2308/isys-2022-065}, doi = {10.2308/ISYS-2022-065}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CalderonG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/FergusonHW23, author = {Daniel P. Ferguson and M. Kathleen Harris and L. Tyler Williams}, title = {Constituent Input on Regulatory Initiatives: {A} Machine-Learning Approach to Efficiently and Effectively Analyze Unstructured Data}, journal = {J. Inf. Syst.}, volume = {37}, number = {3}, pages = {119--138}, year = {2023}, url = {https://doi.org/10.2308/isys-2021-032}, doi = {10.2308/ISYS-2021-032}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/FergusonHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/FrostHNP23, author = {Tracie S. Frost and Chris Zhijian He and Jiwon Nam and Robert E. Pinsker}, title = {The Impact of {CEO} {IT} Ability on Bank Loan Terms}, journal = {J. Inf. Syst.}, volume = {37}, number = {1}, pages = {7--37}, year = {2023}, url = {https://doi.org/10.2308/isys-2021-020}, doi = {10.2308/ISYS-2021-020}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/FrostHNP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GeorgeGGMTL23, author = {Joey F. George and Manjul Gupta and Gabriel A. Giordano and Annette Mills and Vanesa Tennant and Carmen C. Lewis}, title = {Publishing the Data from "The Effects of Communication Mode and Culture on Deception Detection Accuracy"}, journal = {J. Inf. Syst.}, volume = {37}, number = {2}, pages = {129--136}, year = {2023}, url = {https://doi.org/10.2308/isys-2022-025}, doi = {10.2308/ISYS-2022-025}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GeorgeGGMTL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HeHKW23, author = {Chris Zhijian He and Jiangbo Huangfu and Mark Kohlbeck and Lin Wang}, title = {The Impact of Customer-Reported Cybersecurity Breaches on Key Supplier Innovations and Relationship Disruption}, journal = {J. Inf. Syst.}, volume = {37}, number = {2}, pages = {21--49}, year = {2023}, url = {https://doi.org/10.2308/isys-2020-006}, doi = {10.2308/ISYS-2020-006}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HeHKW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HeLP23, author = {Chris Zhijian He and Tianpei Li and Robert E. Pinsker}, title = {Firm-Level Pay Disparity and Breach Risk}, journal = {J. Inf. Syst.}, volume = {37}, number = {3}, pages = {11--32}, year = {2023}, url = {https://doi.org/10.2308/isys-2021-040}, doi = {10.2308/ISYS-2021-040}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/HeLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HutchisonGG23, author = {Paul D. Hutchison and Benjamin T. George and Binod Guragai}, title = {Application of Latent Semantic Analysis in Accounting Research}, journal = {J. Inf. Syst.}, volume = {37}, number = {3}, pages = {139--155}, year = {2023}, url = {https://doi.org/10.2308/isys-2022-013}, doi = {10.2308/ISYS-2022-013}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/HutchisonGG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/JeongL23, author = {Anna Y. Jeong and Jee{-}Hae Lim}, title = {The Impact of Blockchain Technology Adoption Announcements on Firm's Market Value}, journal = {J. Inf. Syst.}, volume = {37}, number = {1}, pages = {39--65}, year = {2023}, url = {https://doi.org/10.2308/isys-2021-038}, doi = {10.2308/ISYS-2021-038}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/JeongL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KhadraO23, author = {Husam A. Abu Khadra and David Olsen}, title = {Toward Automating Shredding Nonprofit {XML} Files: The Case of {IRS} Form 990 Data}, journal = {J. Inf. Syst.}, volume = {37}, number = {1}, pages = {169--188}, year = {2023}, url = {https://doi.org/10.2308/isys-2022-031}, doi = {10.2308/ISYS-2022-031}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KhadraO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KoreffBS23, author = {Jared Koreff and Lisa Baudot and Steve G. Sutton}, title = {Exploring the Impact of Technology Dominance on Audit Professionalism through Data Analytic-Driven Healthcare Audits}, journal = {J. Inf. Syst.}, volume = {37}, number = {3}, pages = {59--80}, year = {2023}, url = {https://doi.org/10.2308/isys-2022-023}, doi = {10.2308/ISYS-2022-023}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/KoreffBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LeeWD23, author = {Heejae Lee and Xinxin Wang and Richard B. Dull}, title = {Designing a Classifying System for Nonprofit Organizations Using Textual Contents from the Mission Statement}, journal = {J. Inf. Syst.}, volume = {37}, number = {3}, pages = {33--58}, year = {2023}, url = {https://doi.org/10.2308/isys-2021-033}, doi = {10.2308/ISYS-2021-033}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/LeeWD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LiW23, author = {Tianpei Li and Stephanie Walton}, title = {Business Strategy and Cybersecurity Breaches}, journal = {J. Inf. Syst.}, volume = {37}, number = {2}, pages = {51--76}, year = {2023}, url = {https://doi.org/10.2308/isys-2022-033}, doi = {10.2308/ISYS-2022-033}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LiW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LimRS23, author = {Jee{-}Hae Lim and Vernon J. Richardson and Rodney E. Smith}, title = {Does {XBRL} Tagging Indicate Disclosure Quality? The Relationship Between {XBRL} Standard and Extension Tags and Stock Return Synchronicity}, journal = {J. Inf. Syst.}, volume = {37}, number = {3}, pages = {81--100}, year = {2023}, url = {https://doi.org/10.2308/isys-2022-027}, doi = {10.2308/ISYS-2022-027}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/LimRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LittTW23, author = {Barri Litt and Paul Tanyi and Marcia Weidenmier Watson}, title = {Cybersecurity Breach at a Big 4 Accounting Firm: Effects on Auditor Reputation}, journal = {J. Inf. Syst.}, volume = {37}, number = {2}, pages = {77--100}, year = {2023}, url = {https://doi.org/10.2308/isys-2022-006}, doi = {10.2308/ISYS-2022-006}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LittTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LombardiSD23, author = {Danielle R. Lombardi and Janice C. Sipior and Steven Dannemiller}, title = {Auditor Judgment Bias Research: {A} 50-Year Trend Analysis and Emerging Technology Use}, journal = {J. Inf. Syst.}, volume = {37}, number = {1}, pages = {109--141}, year = {2023}, url = {https://doi.org/10.2308/isys-2020-079}, doi = {10.2308/ISYS-2020-079}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LombardiSD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MayerLQK23, author = {J{\"{o}}rg H. Mayer and Linus Lischke and Reiner Quick and Friedrich Kalden}, title = {When Cash Is King - An Accounts Receivables App Accommodating Different Use Situations}, journal = {J. Inf. Syst.}, volume = {37}, number = {2}, pages = {101--122}, year = {2023}, url = {https://doi.org/10.2308/isys-2022-022}, doi = {10.2308/ISYS-2022-022}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MayerLQK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/NuijtenKZ23, author = {Arno L. P. Nuijten and Mark Keil and Bert Zwiers}, title = {Internal Auditors' Perceptions of Information Technology-Related Risks: {A} Comparison Between General Auditors and Information Technology Auditors}, journal = {J. Inf. Syst.}, volume = {37}, number = {1}, pages = {67--83}, year = {2023}, url = {https://doi.org/10.2308/isys-2020-040}, doi = {10.2308/ISYS-2020-040}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/NuijtenKZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PitrePDZ23, author = {Terence J. Pitre and Robert E. Pinsker and Ronald J. Daigle and Yibo James Zhang}, title = {{\#}Twitter: Examining the Impact of Earnings Format Choice and Rehashing Prior Positive Information on Market Prices}, journal = {J. Inf. Syst.}, volume = {37}, number = {2}, pages = {1--20}, year = {2023}, url = {https://doi.org/10.2308/isys-2021-034}, doi = {10.2308/ISYS-2021-034}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PitrePDZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SheldonBB23, author = {Mark D. Sheldon and Sudip Bhattacharjee and Reza Barkhi}, title = {The Impact of Persuasive Response Sequence and Consistency When Information Technology Service Providers Address Auditor-Identified Issues in System and Organization Control 2 Reports}, journal = {J. Inf. Syst.}, volume = {37}, number = {1}, pages = {85--107}, year = {2023}, url = {https://doi.org/10.2308/isys-2021-016}, doi = {10.2308/ISYS-2021-016}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SheldonBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ShresthaS23, author = {Anup Shrestha and Minu Saratchandra}, title = {A Conceptual Framework toward Knowledge Ambidexterity Using Information Systems and Knowledge Management}, journal = {J. Inf. Syst.}, volume = {37}, number = {1}, pages = {143--167}, year = {2023}, url = {https://doi.org/10.2308/isys-2021-013}, doi = {10.2308/ISYS-2021-013}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ShresthaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ThiesKKK23, author = {Simon Thies and Marko Kureljusic and Erik Karger and Thilo Kr{\"{a}}mer}, title = {Blockchain-Based Triple-Entry Accounting: {A} Systematic Literature Review and Future Research Agenda}, journal = {J. Inf. Syst.}, volume = {37}, number = {3}, pages = {101--118}, year = {2023}, url = {https://doi.org/10.2308/isys-2022-029}, doi = {10.2308/ISYS-2022-029}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/ThiesKKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/TsangBHAL23, author = {Ronald C. W. Tsang and Amelia A. Baldwin and Joseph F. Hair and Ermanno Affuso and Kyre Dane Lahtinen}, title = {The Informativeness of Sentiment Types in Risk Factor Disclosures: Evidence from Firms with Cybersecurity Breaches}, journal = {J. Inf. Syst.}, volume = {37}, number = {3}, pages = {157--190}, year = {2023}, url = {https://doi.org/10.2308/isys-2022-014}, doi = {10.2308/ISYS-2022-014}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/TsangBHAL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/X23, title = {Covers and Front Matter}, journal = {J. Inf. Syst.}, volume = {37}, number = {1}, pages = {i--iv}, year = {2023}, url = {https://doi.org/10.2308/0888-7985-37.1.i}, doi = {10.2308/0888-7985-37.1.I}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/X23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/X23a, title = {Editorial Policy}, journal = {J. Inf. Syst.}, volume = {37}, number = {1}, year = {2023}, url = {https://doi.org/10.2308/0888-7985-37.1.e}, doi = {10.2308/0888-7985-37.1.E}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/X23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/X23b, title = {Editorial Policy}, journal = {J. Inf. Syst.}, volume = {37}, number = {2}, pages = {137--141}, year = {2023}, url = {https://doi.org/10.2308/0888-7985-37.2.137}, doi = {10.2308/0888-7985-37.2.137}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/X23b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/X23c, title = {Editorial Policy}, journal = {J. Inf. Syst.}, volume = {37}, number = {3}, pages = {191--195}, year = {2023}, url = {https://doi.org/10.2308/0888-7985-37.3.191}, doi = {10.2308/0888-7985-37.3.191}, timestamp = {Sat, 11 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/X23c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AjayiZ22, author = {Oluwakemi Ajayi and James Zhang}, title = {The Joint Effects of Argument Quality and Interactivity on Nonprofessional Investors' Perceptions of Disclosure Credibility and Investment Decisions}, journal = {J. Inf. Syst.}, volume = {36}, number = {3}, pages = {1--26}, year = {2022}, url = {https://doi.org/10.2308/isys-2021-024}, doi = {10.2308/ISYS-2021-024}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/AjayiZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BankerFT22, author = {Rajiv D. Banker and Tracie Frost and Muktak K. Tripathi}, title = {The Determinants of InformationWeek 500 Selection and Its Implications: {A} Textual Analysis Approach}, journal = {J. Inf. Syst.}, volume = {36}, number = {1}, pages = {81--109}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-070}, doi = {10.2308/ISYS-2020-070}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BankerFT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoritzGP22, author = {J. Efrim Boritz and Chan Ge and Katharine Patterson}, title = {Factors Affecting Employees' Susceptibility to Cyber-Attacks}, journal = {J. Inf. Syst.}, volume = {36}, number = {3}, pages = {27--60}, year = {2022}, url = {https://doi.org/10.2308/isys-19-053}, doi = {10.2308/ISYS-19-053}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BoritzGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoritzS22, author = {J. Efrim Boritz and Theophanis C. Stratopoulos}, title = {\emph{JIS} Workshop on Robotic Process Automation {(RPA)} Research: Views from {RPA} Industry Leaders and {AIS} Researchers}, journal = {J. Inf. Syst.}, volume = {36}, number = {1}, pages = {1--5}, year = {2022}, url = {https://doi.org/10.2308/isys-10809}, doi = {10.2308/ISYS-10809}, timestamp = {Thu, 07 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BoritzS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BradfordTS22, author = {Marianne Bradford and Eileen Z. Taylor and Megan Seymore}, title = {A View from the {CISO:} Insights from the Data Classification Process}, journal = {J. Inf. Syst.}, volume = {36}, number = {1}, pages = {201--218}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-054}, doi = {10.2308/ISYS-2020-054}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BradfordTS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CarrilloPZ22, author = {Hilda E. Carrillo and Robin R. Pennington and Yibo James Zhang}, title = {Is an Emoji Worth a Thousand Words? The Effect of Emoji Usage on Nonprofessional Investors' Perceptions}, journal = {J. Inf. Syst.}, volume = {36}, number = {2}, pages = {1--15}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-030}, doi = {10.2308/ISYS-2020-030}, timestamp = {Sun, 17 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CarrilloPZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChenHG22, author = {Chu Chen and Caroline Hartmann and Anne Gottfried}, title = {The Impact of Audit Committee {IT} Expertise on Data Breaches}, journal = {J. Inf. Syst.}, volume = {36}, number = {3}, pages = {61--81}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-076}, doi = {10.2308/ISYS-2020-076}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/ChenHG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Cheng22, author = {Xu (Joyce) Cheng}, title = {The Effect of the Frequency and Source of Instructional Messages on Knowledge Sharing Behavior}, journal = {J. Inf. Syst.}, volume = {36}, number = {2}, pages = {125--140}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-069}, doi = {10.2308/ISYS-2020-069}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Cheng22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DuLW22, author = {Hui Du and Constance M. Lehmann and Victor L. Willson}, title = {Would You Give Me Your Password?}, journal = {J. Inf. Syst.}, volume = {36}, number = {2}, pages = {17--52}, year = {2022}, url = {https://doi.org/10.2308/isys-2021-019}, doi = {10.2308/ISYS-2021-019}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DuLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/EulerichWW22, author = {Marc Eulerich and Martin Wagener and David A. Wood}, title = {Evidence on Internal Audit Quality from Transitioning to Remote Audits because of {COVID-19}}, journal = {J. Inf. Syst.}, volume = {36}, number = {3}, pages = {219--234}, year = {2022}, url = {https://doi.org/10.2308/isys-2021-021}, doi = {10.2308/ISYS-2021-021}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/EulerichWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GanboldRRR22, author = {Odkhishig Ganbold and Anna M. Rose and Jacob M. Rose and Kristian Rotaru}, title = {Increasing Reliance on Financial Advice with Avatars: The Effects of Competence and Complexity on Algorithm Aversion}, journal = {J. Inf. Syst.}, volume = {36}, number = {1}, pages = {7--17}, year = {2022}, url = {https://doi.org/10.2308/isys-2021-002}, doi = {10.2308/ISYS-2021-002}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GanboldRRR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GreeneHLWK22, author = {Linda Greene and Inkyoung Hur and Yair Levy and Ling Wang and Keumseok Kang}, title = {Assessing Effects of Media Affordances and Information Security Awareness on Knowledge-Sharing in Global Software Development}, journal = {J. Inf. Syst.}, volume = {36}, number = {1}, pages = {111--132}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-072}, doi = {10.2308/ISYS-2020-072}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GreeneHLWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GuoYW22, author = {Ken H. Guo and Xiaoxiao Yu and Carla Wilkin}, title = {A Picture is Worth a Thousand Journal Entries: Accounting Graph Topology for Auditing and Fraud Detection}, journal = {J. Inf. Syst.}, volume = {36}, number = {2}, pages = {53--81}, year = {2022}, url = {https://doi.org/10.2308/isys-2021-003}, doi = {10.2308/ISYS-2021-003}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GuoYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HeHW22, author = {Zhijian He and Jiangbo Huangfu and Stephanie Walton}, title = {Cybersecurity Breaches in the Supply Chain and Earnings Management}, journal = {J. Inf. Syst.}, volume = {36}, number = {3}, pages = {83--113}, year = {2022}, url = {https://doi.org/10.2308/isys-2021-042}, doi = {10.2308/ISYS-2021-042}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HeHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HoitashH22, author = {Rani Hoitash and Udi Hoitash}, title = {A Measure of Firm Complexity: Data and Code}, journal = {J. Inf. Syst.}, volume = {36}, number = {2}, pages = {161--172}, year = {2022}, url = {https://doi.org/10.2308/isys-2021-041}, doi = {10.2308/ISYS-2021-041}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HoitashH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HuangWYLWY22, author = {Shi{-}Ming Huang and Tawei Wang and Ju{-}Chun Yen and Chi{-}Bei Lee and Yu{-}Chen Wang and Yi{-}Ting Yang}, title = {The Use of Geographic Information in Audit Data Analytics for Evidence Gathering: {A} Design Science Approach}, journal = {J. Inf. Syst.}, volume = {36}, number = {3}, pages = {115--128}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-045}, doi = {10.2308/ISYS-2020-045}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/HuangWYLWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Jena22, author = {R. K. Jena}, title = {Exploring Antecedents of Peoples' Intentions to Use Smart Services in a Smart City Environment: An Extended {UTAUT} Model}, journal = {J. Inf. Syst.}, volume = {36}, number = {1}, pages = {133--149}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-050}, doi = {10.2308/ISYS-2020-050}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Jena22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/JiangLRW22, author = {Wanying Jiang and Joseph Legoria and Kenneth J. Reichelt and Stephanie Walton}, title = {Firm Use of Cybersecurity Risk Disclosures}, journal = {J. Inf. Syst.}, volume = {36}, number = {1}, pages = {151--180}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-067}, doi = {10.2308/ISYS-2020-067}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/JiangLRW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KlausKMGK22, author = {J. Philipp Klaus and Kevin Kim and Adi Masli and Katia Guerra and Leon A. Kappelman}, title = {Prioritizing {IT} Management Issues and Business Performance}, journal = {J. Inf. Syst.}, volume = {36}, number = {2}, pages = {83--99}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-016}, doi = {10.2308/ISYS-2020-016}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KlausKMGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Koreff22, author = {Jared Koreff}, title = {Are Auditors' Reliance on Conclusions from Data Analytics Impacted by Different Data Analytic Inputs?}, journal = {J. Inf. Syst.}, volume = {36}, number = {1}, pages = {19--37}, year = {2022}, url = {https://doi.org/10.2308/isys-19-051}, doi = {10.2308/ISYS-19-051}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Koreff22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LiJ22, author = {Yuan Li and Ahmad H. Juma'h}, title = {The Effect of Technological and Task Considerations on Auditors' Acceptance of Blockchain Technology}, journal = {J. Inf. Syst.}, volume = {36}, number = {3}, pages = {129--151}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-022}, doi = {10.2308/ISYS-2020-022}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/LiJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LiewOPW22, author = {Angela Liew and Daniel E. O'Leary and Arif Perdana and Tawei Wang}, title = {Digital Transformation in Accounting and Auditing: 2021 International Conference of the Journal of Information Systems Panel Discussion}, journal = {J. Inf. Syst.}, volume = {36}, number = {3}, pages = {177--190}, year = {2022}, url = {https://doi.org/10.2308/isys-2022-008}, doi = {10.2308/ISYS-2022-008}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/LiewOPW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LiuW22, author = {Xin Liu and Bernard Wong{-}On{-}Wing}, title = {The Role of Construal Alignment in Enterprise Risk Management}, journal = {J. Inf. Syst.}, volume = {36}, number = {1}, pages = {39--52}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-003}, doi = {10.2308/ISYS-2020-003}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LiuW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LiuYW22, author = {Wu{-}Po Liu and Meng{-}Feng Yen and Tai{-}Ying Wu}, title = {Report Users' Perceived Sentiments of Key Audit Matters and Firm Performance: Evidence from a Deep Learning-Based Natural Language Processing Approach}, journal = {J. Inf. Syst.}, volume = {36}, number = {3}, pages = {191--209}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-061}, doi = {10.2308/ISYS-2020-061}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LiuYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PlattfautB22, author = {Ralf Plattfaut and Vincent Borghoff}, title = {Robotic Process Automation: {A} Literature-Based Research Agenda}, journal = {J. Inf. Syst.}, volume = {36}, number = {2}, pages = {173--191}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-033}, doi = {10.2308/ISYS-2020-033}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PlattfautB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/RoseRRST22, author = {Anna M. Rose and Jacob M. Rose and Kristian Rotaru and Kerri{-}Ann Sanderson and Jay C. Thibodeau}, title = {Effects of Data Visualization Choices on Psychophysiological Responses, Judgment, and Audit Quality}, journal = {J. Inf. Syst.}, volume = {36}, number = {1}, pages = {53--79}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-046}, doi = {10.2308/ISYS-2020-046}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/RoseRRST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Sheldon22, author = {Mark D. Sheldon}, title = {Tracking Tangible Asset Ownership and Provenance with Blockchain}, journal = {J. Inf. Syst.}, volume = {36}, number = {3}, pages = {153--175}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-042}, doi = {10.2308/ISYS-2020-042}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/Sheldon22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SunWY22, author = {Chia{-}Ming Sun and Yen{-}Yao Wang and Chen{-}Bin Yang}, title = {Information Security Assurance and the Role of Security Configuration Management: Substantive and Symbolic Perspectives}, journal = {J. Inf. Syst.}, volume = {36}, number = {1}, pages = {181--199}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-065}, doi = {10.2308/ISYS-2020-065}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SunWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Wang22, author = {Yen{-}Yao Wang}, title = {Python Code and Illustrative Crisis Management Data from Twitter}, journal = {J. Inf. Syst.}, volume = {36}, number = {3}, pages = {211--217}, year = {2022}, url = {https://doi.org/10.2308/isys-2022-011}, doi = {10.2308/ISYS-2022-011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Wang22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WitteET22, author = {Annie L. Witte and Christine E. Earley and Jay C. Thibodeau}, title = {Big Fish, Small Pond: How In-Charge Auditors Engage with Technology-Based Audit Tools to Influence the Audit in Non-Global Network Firms}, journal = {J. Inf. Syst.}, volume = {36}, number = {2}, pages = {141--160}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-047}, doi = {10.2308/ISYS-2020-047}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WitteET22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/X22, title = {Editorial Policy}, journal = {J. Inf. Syst.}, volume = {36}, number = {1}, pages = {219--222}, year = {2022}, url = {https://doi.org/10.2308/1558-7959-36.1.219}, doi = {10.2308/1558-7959-36.1.219}, timestamp = {Thu, 07 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/X22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/X22a, title = {Covers and Front Matter}, journal = {J. Inf. Syst.}, volume = {36}, number = {1}, pages = {i--vi}, year = {2022}, url = {https://doi.org/10.2308/1558-7959-36.1.i}, doi = {10.2308/1558-7959-36.1.I}, timestamp = {Thu, 07 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/X22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/X22b, title = {Covers and Front Matter}, journal = {J. Inf. Syst.}, volume = {36}, number = {2}, pages = {i--vi}, year = {2022}, url = {https://doi.org/10.2308/1558-7959-36.2.i}, doi = {10.2308/1558-7959-36.2.I}, timestamp = {Wed, 12 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/X22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/X22c, title = {Editorial Policy}, journal = {J. Inf. Syst.}, volume = {36}, number = {2}, pages = {193--196}, year = {2022}, url = {https://doi.org/10.2308/1558-7959-36.2.193}, doi = {10.2308/1558-7959-36.2.193}, timestamp = {Wed, 12 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/X22c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/X22d, title = {Editorial Policy}, journal = {J. Inf. Syst.}, volume = {36}, number = {3}, pages = {235--239}, year = {2022}, url = {https://doi.org/10.2308/1558-7959-36.3.235}, doi = {10.2308/1558-7959-36.3.235}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/X22d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ZhangTV22, author = {Chanyuan (Abigail) Zhang and Chanta Thomas and Miklos A. Vasarhelyi}, title = {Attended Process Automation in Audit: {A} Framework and {A} Demonstration}, journal = {J. Inf. Syst.}, volume = {36}, number = {2}, pages = {101--124}, year = {2022}, url = {https://doi.org/10.2308/isys-2020-073}, doi = {10.2308/ISYS-2020-073}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ZhangTV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AlbizriA21, author = {Abdullah Albizri and Deniz Appelbaum}, title = {Trust but Verify: The Oracle Paradox of Blockchain Smart Contracts}, journal = {J. Inf. Syst.}, volume = {35}, number = {2}, pages = {1--16}, year = {2021}, url = {https://doi.org/10.2308/isys-19-024}, doi = {10.2308/ISYS-19-024}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/AlbizriA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AllenOQS21, author = {Eric Allen and Daniel E. O'Leary and Hao Qu and Charles W. Swenson}, title = {Tax Specific versus Generic Accounting-Based Textual Analysis and the Relationship with Effective Tax Rates: Building Context}, journal = {J. Inf. Syst.}, volume = {35}, number = {2}, pages = {115--147}, year = {2021}, url = {https://doi.org/10.2308/isys-2020-018}, doi = {10.2308/ISYS-2020-018}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/AllenOQS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AlzamilAGV21, author = {Zamil S. Alzamil and Deniz Appelbaum and William Glasgall and Miklos A. Vasarhelyi}, title = {Applications of Data Analytics: Cluster Analysis of Not-for-Profit Data}, journal = {J. Inf. Syst.}, volume = {35}, number = {3}, pages = {199--221}, year = {2021}, url = {https://doi.org/10.2308/isys-2020-025}, doi = {10.2308/ISYS-2020-025}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/AlzamilAGV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CasterEJ21, author = {Paul Caster and Randal J. Elder and Diane J. Janvrin}, title = {An Exploration of Bank Confirmation Process Automation: {A} Longitudinal Study}, journal = {J. Inf. Syst.}, volume = {35}, number = {3}, pages = {1--16}, year = {2021}, url = {https://doi.org/10.2308/isys-19-038}, doi = {10.2308/ISYS-19-038}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/CasterEJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChangKKR21, author = {Hyun Woong (Daniel) Chang and Steven Kaszak and Peter C. Kipp and Jesse C. Robertson}, title = {The Effect of iXBRL Formatted Financial Statements on the Effectiveness of Managers' Decisions When Making Inter-Firm Comparisons}, journal = {J. Inf. Syst.}, volume = {35}, number = {2}, pages = {149--177}, year = {2021}, url = {https://doi.org/10.2308/isys-2020-011}, doi = {10.2308/ISYS-2020-011}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChangKKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChengHPY21, author = {Xin Cheng and Feiqi Huang and Dan Palmon and Cheng Yin}, title = {How Does Information Processing Efficiency Relate to Investment Efficiency? Evidence from {XBRL} Adoption}, journal = {J. Inf. Syst.}, volume = {35}, number = {1}, pages = {1--25}, year = {2021}, url = {https://doi.org/10.2308/isys-18-063}, doi = {10.2308/ISYS-18-063}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChengHPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CheongYCN21, author = {Arion Cheong and Kyunghee Yoon and Soohyun Cho and Won Gyun No}, title = {Classifying the Contents of Cybersecurity Risk Disclosure through Textual Analysis and Factor Analysis}, journal = {J. Inf. Syst.}, volume = {35}, number = {2}, pages = {179--194}, year = {2021}, url = {https://doi.org/10.2308/isys-2020-031}, doi = {10.2308/ISYS-2020-031}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/CheongYCN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChouHSWLW21, author = {Chi{-}Chun Chou and Nen{-}Chen Richard Hwang and Gary P. Schneider and Tawei Wang and Chang{-}Wei Li and William Wei}, title = {Using Smart Contracts to Establish Decentralized Accounting Contracts: An Example of Revenue Recognition}, journal = {J. Inf. Syst.}, volume = {35}, number = {3}, pages = {17--52}, year = {2021}, url = {https://doi.org/10.2308/isys-19-009}, doi = {10.2308/ISYS-19-009}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChouHSWLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChuCL21, author = {K. C. Kenneth Chu and Sipeng Chen and Tommy Leung}, title = {A Novel Algorithm for Generating a {GVKEY-CIK} Link Table}, journal = {J. Inf. Syst.}, volume = {35}, number = {1}, pages = {27--46}, year = {2021}, url = {https://doi.org/10.2308/isys-18-068}, doi = {10.2308/ISYS-18-068}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChuCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CongDV21, author = {Yu Cong and Hui Du and Miklos A. Vasarhelyi}, title = {Cloud Computing Start-ups and Emerging Technologies: From Private Investors' Perspectives}, journal = {J. Inf. Syst.}, volume = {35}, number = {1}, pages = {47--64}, year = {2021}, url = {https://doi.org/10.2308/isys-17-040}, doi = {10.2308/ISYS-17-040}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CongDV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DebrecenyRW21, author = {Roger S. Debreceny and Asheq Razaur Rahman and Tawei Wang}, title = {Is User-Generated Twittersphere Activity Associated with Stock Market Reactions to 8-K Filings?}, journal = {J. Inf. Syst.}, volume = {35}, number = {2}, pages = {195--217}, year = {2021}, url = {https://doi.org/10.2308/isys-2020-034}, doi = {10.2308/ISYS-2020-034}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DebrecenyRW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/FengK21, author = {Cecilia (Qian) Feng and Chansog (Francis) Kim}, title = {Information Processing Costs and Firms' Investment Efficiency: An Examination of Channels of the {XBRL} Effect}, journal = {J. Inf. Syst.}, volume = {35}, number = {3}, pages = {53--75}, year = {2021}, url = {https://doi.org/10.2308/isys-2020-077}, doi = {10.2308/ISYS-2020-077}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/FengK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GarrettHO21, author = {Jace B. Garrett and D. Kip Holderness Jr. and Kari Joseph Olsen}, title = {An Experimental Investigation of How Self-Interested Organizational Norms Undermine Prosocial Motivation and Influence Employee Effort}, journal = {J. Inf. Syst.}, volume = {35}, number = {2}, pages = {17--36}, year = {2021}, url = {https://doi.org/10.2308/isys-19-047}, doi = {10.2308/ISYS-19-047}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GarrettHO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GuoLWYZZ21, author = {Feng Guo and Xin Luo and Patrick R. Wheeler and Liu (leo) Yang and Xinlei Zhao and Yiyang Ian Zhang}, title = {Enterprise Resource Planning Systems and {XBRL} Reporting Quality}, journal = {J. Inf. Syst.}, volume = {35}, number = {3}, pages = {77--106}, year = {2021}, url = {https://doi.org/10.2308/isys-2020-007}, doi = {10.2308/ISYS-2020-007}, timestamp = {Sat, 11 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/GuoLWYZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GuoWWZ21, author = {Feng Guo and Stephanie Walton and Patrick R. Wheeler and Yiyang Ian Zhang}, title = {Early Disruptors: Examining the Determinants and Consequences of Blockchain Early Adoption}, journal = {J. Inf. Syst.}, volume = {35}, number = {2}, pages = {219--242}, year = {2021}, url = {https://doi.org/10.2308/isys-2020-004}, doi = {10.2308/ISYS-2020-004}, timestamp = {Sat, 11 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/GuoWWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HamptonSAK21, author = {Clark Hampton and Steve G. Sutton and Vicky Arnold and Deepak Khazanchi}, title = {Cyber Supply Chain Risk Management: Toward an Understanding of the Antecedents to Demand for Assurance}, journal = {J. Inf. Syst.}, volume = {35}, number = {2}, pages = {37--60}, year = {2021}, url = {https://doi.org/10.2308/isys-19-050}, doi = {10.2308/ISYS-19-050}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HamptonSAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HayesB21, author = {Louise Hayes and J. Efrim Boritz}, title = {Classifying Restatements: An Application of Machine Learning and Textual Analytics}, journal = {J. Inf. Syst.}, volume = {35}, number = {3}, pages = {107--131}, year = {2021}, url = {https://doi.org/10.2308/isys-19-003}, doi = {10.2308/ISYS-19-003}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/HayesB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HowardZ21, author = {Jennifer Howard and Jie Zhou}, title = {The Timeliness of {XBRL} Filings: An Empirical Examination}, journal = {J. Inf. Syst.}, volume = {35}, number = {1}, pages = {65--77}, year = {2021}, url = {https://doi.org/10.2308/isys-19-034}, doi = {10.2308/ISYS-19-034}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HowardZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/JohnstonZ21, author = {Joseph Johnston and Joseph H. Zhang}, title = {Auditor Style and Financial Reporting Similarity}, journal = {J. Inf. Syst.}, volume = {35}, number = {1}, pages = {79--99}, year = {2021}, url = {https://doi.org/10.2308/isys-18-046}, doi = {10.2308/ISYS-18-046}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/JohnstonZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KoganY21, author = {Alexander Kogan and Cheng Yin}, title = {Privacy-Preserving Information Sharing within an Audit Firm}, journal = {J. Inf. Syst.}, volume = {35}, number = {2}, pages = {243--268}, year = {2021}, url = {https://doi.org/10.2308/isys-2020-017}, doi = {10.2308/ISYS-2020-017}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KoganY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LanktonPK21, author = {Nancy K. Lankton and Jean Price and Mohammad Karim}, title = {Cybersecurity Breaches and the Role of Information Technology Governance in Audit Committee Charters}, journal = {J. Inf. Syst.}, volume = {35}, number = {1}, pages = {101--119}, year = {2021}, url = {https://doi.org/10.2308/isys-18-071}, doi = {10.2308/ISYS-18-071}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LanktonPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LaurierHS21, author = {Wim Laurier and Satoshi Horiuchi and Monique Snoeck}, title = {An Executable Axiomatization of the {REA2} Ontology}, journal = {J. Inf. Syst.}, volume = {35}, number = {3}, pages = {133--154}, year = {2021}, url = {https://doi.org/10.2308/isys-19-026}, doi = {10.2308/ISYS-19-026}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/LaurierHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/NormanRRSX21, author = {Carolyn Strand Norman and Anna M. Rose and Jacob M. Rose and Ikseon Suh and Xinning Xiao}, title = {An Investigation of the Effects of Allegation Sources and Consequences on Corporate Directors' Responses to Whistleblowing Allegations}, journal = {J. Inf. Syst.}, volume = {35}, number = {3}, pages = {223--232}, year = {2021}, url = {https://doi.org/10.2308/isys-2020-049}, doi = {10.2308/ISYS-2020-049}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/NormanRRSX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PimentelBEC21, author = {Erica Pimentel and Emilio Boulianne and Shayan Eskandari and Jeremy Clark}, title = {Systemizing the Challenges of Auditing Blockchain-Based Assets}, journal = {J. Inf. Syst.}, volume = {35}, number = {2}, pages = {61--75}, year = {2021}, url = {https://doi.org/10.2308/isys-19-007}, doi = {10.2308/ISYS-19-007}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PimentelBEC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Sheldon21, author = {Mark D. Sheldon}, title = {Auditing the Blockchain Oracle Problem}, journal = {J. Inf. Syst.}, volume = {35}, number = {1}, pages = {121--133}, year = {2021}, url = {https://doi.org/10.2308/isys-19-049}, doi = {10.2308/ISYS-19-049}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Sheldon21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SidgmanBB21, author = {Juergen Sidgman and Veena L. Brown and Joseph F. Brazel}, title = {The Multitasking Audit Environment: The Effect of Alternative Modes of Communication on Team Performance}, journal = {J. Inf. Syst.}, volume = {35}, number = {3}, pages = {155--175}, year = {2021}, url = {https://doi.org/10.2308/isys-2020-019}, doi = {10.2308/ISYS-2020-019}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/SidgmanBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/StoelH21, author = {M. Dale Stoel and Douglas Havelka}, title = {Information Technology Audit Quality: An Investigation of the Impact of Individual and Organizational Factors}, journal = {J. Inf. Syst.}, volume = {35}, number = {1}, pages = {135--154}, year = {2021}, url = {https://doi.org/10.2308/isys-18-043}, doi = {10.2308/ISYS-18-043}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/StoelH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/TangEC21, author = {Fengchun Tang and Christopher Kevin Eller and Sandra J. Cereola}, title = {How Do Reporting Frequency and Analyst Perceptions of Real Activities Manipulation {(RAM)} Influence Managers' {RAM} Behavior?}, journal = {J. Inf. Syst.}, volume = {35}, number = {2}, pages = {77--90}, year = {2021}, url = {https://doi.org/10.2308/isys-19-030}, doi = {10.2308/ISYS-19-030}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/TangEC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WaltonWZZ21, author = {Stephanie Walton and Patrick R. Wheeler and Yiyang Ian Zhang and Xinlei Ray Zhao}, title = {An Integrative Review and Analysis of Cybersecurity Research: Current State and Future Directions}, journal = {J. Inf. Syst.}, volume = {35}, number = {1}, pages = {155--186}, year = {2021}, url = {https://doi.org/10.2308/isys-19-033}, doi = {10.2308/ISYS-19-033}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WaltonWZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WaltonYZ21, author = {Stephanie Walton and Liu (leo) Yang and Yiyang Ian Zhang}, title = {{XBRL} Tag Extensions and Tax Accrual Quality}, journal = {J. Inf. Syst.}, volume = {35}, number = {2}, pages = {91--114}, year = {2021}, url = {https://doi.org/10.2308/isys-19-054}, doi = {10.2308/ISYS-19-054}, timestamp = {Sat, 11 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/WaltonYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/X21, title = {Covers and Front Matter}, journal = {J. Inf. Syst.}, volume = {35}, number = {1}, pages = {i--vi}, year = {2021}, url = {https://doi.org/10.2308/1558-7959-35.1.i}, doi = {10.2308/1558-7959-35.1.I}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/X21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/X21a, title = {Covers and Front Matter}, journal = {J. Inf. Syst.}, volume = {35}, number = {2}, pages = {i--vi}, year = {2021}, url = {https://doi.org/10.2308/1558-7959-35.2.i}, doi = {10.2308/1558-7959-35.2.I}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/X21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/X21b, title = {Covers and Front Matter}, journal = {J. Inf. Syst.}, volume = {35}, number = {3}, pages = {i--vi}, year = {2021}, url = {https://doi.org/10.2308/1558-7959-35.3.i}, doi = {10.2308/1558-7959-35.3.I}, timestamp = {Fri, 17 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/X21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/X21c, title = {Editorial Policy}, journal = {J. Inf. Syst.}, volume = {35}, number = {3}, pages = {233--236}, year = {2021}, url = {https://doi.org/10.2308/2380-4505-35.3.233}, doi = {10.2308/2380-4505-35.3.233}, timestamp = {Fri, 17 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/X21c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Yen21, author = {Ju{-}Chun Yen}, title = {The Effect of Legal Entity Identifiers on Audit Fee Changes}, journal = {J. Inf. Syst.}, volume = {35}, number = {3}, pages = {177--197}, year = {2021}, url = {https://doi.org/10.2308/isys-2020-056}, doi = {10.2308/ISYS-2020-056}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/Yen21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/YoonNGR21, author = {Kyunghee Yoon and Won Gyun No and Glen L. Gray and Peter J. Roebuck}, title = {Green {IT} Perceptions and Activities of Internal Auditors in Australia, Canada, and the United States}, journal = {J. Inf. Syst.}, volume = {35}, number = {1}, pages = {187--211}, year = {2021}, url = {https://doi.org/10.2308/isys-17-061}, doi = {10.2308/ISYS-17-061}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/YoonNGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/0001DM20, author = {Andrew J. Harrison and William N. Dilla and Brian E. Mennecke}, title = {Relationships within the Fraud Diamond: The Decision Processes That Influence Fraudulent Intentions in Online Consumer Fraud}, journal = {J. Inf. Syst.}, volume = {34}, number = {1}, pages = {61--80}, year = {2020}, url = {https://doi.org/10.2308/isys-52627}, doi = {10.2308/ISYS-52627}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/0001DM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AbernathyBDR20, author = {John L. Abernathy and Brooke Beyer and Jimmy F. Downes and Eric T. Rapley}, title = {High-Quality Information Technology and Capital Investment Decisions}, journal = {J. Inf. Syst.}, volume = {34}, number = {3}, pages = {1--29}, year = {2020}, url = {https://doi.org/10.2308/isys-52634}, doi = {10.2308/ISYS-52634}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/AbernathyBDR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AddyB20, author = {Noel D. Addy and Nathan R. Berglund}, title = {Determinants of Timely Adoption of the 2013 {COSO} Integrated Framework}, journal = {J. Inf. Syst.}, volume = {34}, number = {1}, pages = {1--20}, year = {2020}, url = {https://doi.org/10.2308/isys-52378}, doi = {10.2308/ISYS-52378}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/AddyB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AlaminW0W20, author = {Adel Alamin and Carla L. Wilkin and William Yeoh and Matthew J. Warren}, title = {The Impact of Self-Efficacy on Accountants' Behavioral Intention to Adopt and Use Accounting Information Systems}, journal = {J. Inf. Syst.}, volume = {34}, number = {3}, pages = {31--46}, year = {2020}, url = {https://doi.org/10.2308/isys-52617}, doi = {10.2308/ISYS-52617}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/AlaminW0W20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AllesG20, author = {Michael G. Alles and Glen L. Gray}, title = {Will the Medium Become the Message? {A} Framework for Understanding the Coming Automation of the Audit Process}, journal = {J. Inf. Syst.}, volume = {34}, number = {2}, pages = {109--130}, year = {2020}, url = {https://doi.org/10.2308/isys-52633}, doi = {10.2308/ISYS-52633}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/AllesG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AppelbaumN20, author = {Deniz Appelbaum and Robert A. Nehmer}, title = {Auditing Cloud-Based Blockchain Accounting Systems}, journal = {J. Inf. Syst.}, volume = {34}, number = {2}, pages = {5--21}, year = {2020}, url = {https://doi.org/10.2308/isys-52660}, doi = {10.2308/ISYS-52660}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/AppelbaumN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoritzN20, author = {J. Efrim Boritz and Won Gyun No}, title = {How Significant are the Differences in Financial Data Provided by Key Data Sources? {A} Comparison of XBRL, Compustat, Yahoo! Finance, and Google Finance}, journal = {J. Inf. Syst.}, volume = {34}, number = {3}, pages = {47--75}, year = {2020}, url = {https://doi.org/10.2308/isys-52618}, doi = {10.2308/ISYS-52618}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/BoritzN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CanadaH20, author = {Joseph Canada and Erica E. Harris}, title = {The Role of Web Assurance Seals in Nonprofit Giving}, journal = {J. Inf. Syst.}, volume = {34}, number = {2}, pages = {131--148}, year = {2020}, url = {https://doi.org/10.2308/isys-52614}, doi = {10.2308/ISYS-52614}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/CanadaH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChurchSA20, author = {Kim S. Church and Pamela J. Schmidt and Kemi Ajayi}, title = {Forecast Cloudy - Fair or Stormy Weather: Cloud Computing Insights and Issues}, journal = {J. Inf. Syst.}, volume = {34}, number = {2}, pages = {23--46}, year = {2020}, url = {https://doi.org/10.2308/isys-18-037}, doi = {10.2308/ISYS-18-037}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChurchSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CossD20, author = {David Lewis Coss and Gurpreet Dhillon}, title = {A Framework for Auditing and Strategizing to Ensure Cloud Privacy}, journal = {J. Inf. Syst.}, volume = {34}, number = {2}, pages = {47--63}, year = {2020}, url = {https://doi.org/10.2308/isys-17-046}, doi = {10.2308/ISYS-17-046}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CossD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DameriGR20, author = {Renata Paola Dameri and Roberto Garelli and Marina Resta}, title = {Neural Networks in Accounting: Clustering Firm Performance Using Financial Reporting Data}, journal = {J. Inf. Syst.}, volume = {34}, number = {2}, pages = {149--166}, year = {2020}, url = {https://doi.org/10.2308/isys-18-002}, doi = {10.2308/ISYS-18-002}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/DameriGR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DebrecenyFSS20, author = {Roger S. Debreceny and Stephanie M. Farewell and Audrey N. Scarlata and Dan N. Stone}, title = {Knowledge and Skills in Complex Assurance Engagements: The Case of {XBRL}}, journal = {J. Inf. Syst.}, volume = {34}, number = {1}, pages = {21--45}, year = {2020}, url = {https://doi.org/10.2308/isys-52461}, doi = {10.2308/ISYS-52461}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DebrecenyFSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DurkinRT20, author = {Mary P. Durkin and Jacob M. Rose and Jay C. Thibodeau}, title = {Can Simple Metaphors Be Used as Decision Aids to Promote Professional Skepticism?}, journal = {J. Inf. Syst.}, volume = {34}, number = {1}, pages = {47--60}, year = {2020}, url = {https://doi.org/10.2308/isys-52380}, doi = {10.2308/ISYS-52380}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/DurkinRT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HaislipKLP20, author = {Jacob Z. Haislip and Khondkar E. Karim and Karen Jingrong Lin and Robert E. Pinsker}, title = {The Influences of {CEO} {IT} Expertise and Board-Level Technology Committees on Form 8-K Disclosure Timeliness}, journal = {J. Inf. Syst.}, volume = {34}, number = {2}, pages = {167--185}, year = {2020}, url = {https://doi.org/10.2308/isys-52530}, doi = {10.2308/ISYS-52530}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/HaislipKLP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HeFP20, author = {Chris Zhijian He and Tracie Frost and Robert E. Pinsker}, title = {The Impact of Reported Cybersecurity Breaches on Firm Innovation}, journal = {J. Inf. Syst.}, volume = {34}, number = {2}, pages = {187--209}, year = {2020}, url = {https://doi.org/10.2308/isys-18-053}, doi = {10.2308/ISYS-18-053}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HeFP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Hirsch20, author = {Rina M. Hirsch}, title = {The Effect of Spatial Distance and Domain Knowledge Distinctiveness on Auditor Reliance on {IT} Specialists}, journal = {J. Inf. Syst.}, volume = {34}, number = {1}, pages = {81--103}, year = {2020}, url = {https://doi.org/10.2308/isys-52456}, doi = {10.2308/ISYS-52456}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/Hirsch20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/JanvrinML20, author = {Diane J. Janvrin and Maureen Francis Mascha and Melvin A. Lamboy{-}Ruiz}, title = {{SOX} 404(b) Audits: Evidence from Auditing the Financial Close Process of the Accounting System}, journal = {J. Inf. Syst.}, volume = {34}, number = {3}, pages = {77--103}, year = {2020}, url = {https://doi.org/10.2308/isys-18-055}, doi = {10.2308/ISYS-18-055}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/JanvrinML20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Johnston20, author = {Joseph Johnston}, title = {Extended {XBRL} Tags and Financial Analysts' Forecast Error and Dispersion}, journal = {J. Inf. Syst.}, volume = {34}, number = {3}, pages = {105--131}, year = {2020}, url = {https://doi.org/10.2308/isys-16-013}, doi = {10.2308/ISYS-16-013}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/Johnston20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KeltonP20, author = {Andrea Seaton Kelton and Robin R. Pennington}, title = {If You Tweet, They Will Follow: {CEO} Tweets, Social Capital, and Investor Say-on-Pay Judgments}, journal = {J. Inf. Syst.}, volume = {34}, number = {1}, pages = {105--122}, year = {2020}, url = {https://doi.org/10.2308/isys-52449}, doi = {10.2308/ISYS-52449}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KeltonP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KeltonP20a, author = {Andrea Seaton Kelton and Robin R. Pennington}, title = {Do Voluntary Disclosures Mitigate the Cybersecurity Breach Contagion Effect?}, journal = {J. Inf. Syst.}, volume = {34}, number = {3}, pages = {133--157}, year = {2020}, url = {https://doi.org/10.2308/isys-52628}, doi = {10.2308/ISYS-52628}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/KeltonP20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LeeB20, author = {Lorraine S. Lee and William D. Brink}, title = {Trust in Cloud-Based Services: {A} Framework for Consumer Adoption of Software as a Service}, journal = {J. Inf. Syst.}, volume = {34}, number = {2}, pages = {65--85}, year = {2020}, url = {https://doi.org/10.2308/isys-52626}, doi = {10.2308/ISYS-52626}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/LeeB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LiCWC20, author = {Hsing{-}Jung Li and She{-}I Chang and Tawei Wang and Li{-}Min Chang}, title = {Information Technology Internal Control Items for the Post-Implementation Phase of Enterprise Resource Planning Systems}, journal = {J. Inf. Syst.}, volume = {34}, number = {3}, pages = {159--197}, year = {2020}, url = {https://doi.org/10.2308/isys-52615}, doi = {10.2308/ISYS-52615}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LiCWC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MalimageRTCB20, author = {Kalana Malimage and Nirmalee I. Raddatz and Brad S. Trinkle and Robert E. Crossler and Rebecca Baaske}, title = {Impact of Deterrence and Inertia on Information Security Policy Changes}, journal = {J. Inf. Syst.}, volume = {34}, number = {1}, pages = {123--134}, year = {2020}, url = {https://doi.org/10.2308/isys-52400}, doi = {10.2308/ISYS-52400}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/MalimageRTCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MurthySWZ20, author = {Uday S. Murthy and Thomas J. Smith and James D. Whitworth and Yiyang Zhang}, title = {The Effects of Information Systems Compatibility on Firm Performance following Mergers and Acquisitions}, journal = {J. Inf. Syst.}, volume = {34}, number = {2}, pages = {211--233}, year = {2020}, url = {https://doi.org/10.2308/isys-18-004}, doi = {10.2308/ISYS-18-004}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/MurthySWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/RaddatzCT20, author = {Nirmalee I. Raddatz and Joshua G. Coyne and Brad S. Trinkle}, title = {Internal Motivators for the Protection of Organizational Data}, journal = {J. Inf. Syst.}, volume = {34}, number = {3}, pages = {199--211}, year = {2020}, url = {https://doi.org/10.2308/isys-18-067}, doi = {10.2308/ISYS-18-067}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/RaddatzCT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/RaddatzMT20, author = {Nirmalee I. Raddatz and Kent Marett and Brad S. Trinkle}, title = {The Impact of Awareness of Being Monitored on Computer Usage Policy Compliance: An Agency View}, journal = {J. Inf. Syst.}, volume = {34}, number = {1}, pages = {135--149}, year = {2020}, url = {https://doi.org/10.2308/isys-52246}, doi = {10.2308/ISYS-52246}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/RaddatzMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/RaddatzSSW20, author = {Nirmalee I. Raddatz and Thomas F. Stafford and Craig Van Slyke and Merrill Warkentin}, title = {Grassroots Adoption of Cloud-Based Storage Solutions}, journal = {J. Inf. Syst.}, volume = {34}, number = {3}, pages = {213--232}, year = {2020}, url = {https://doi.org/10.2308/isys-18-066}, doi = {10.2308/ISYS-18-066}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/RaddatzSSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/RitchiJMR20, author = {Hamzah Ritchi and Mieke Jans and Jan Mendling and Hajo A. Reijers}, title = {The Influence of Business Process Representation on Performance of Different Task Types}, journal = {J. Inf. Syst.}, volume = {34}, number = {1}, pages = {167--194}, year = {2020}, url = {https://doi.org/10.2308/isys-52385}, doi = {10.2308/ISYS-52385}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/RitchiJMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/RonkkoA20, author = {Mikko R{\"{o}}nkk{\"{o}} and Miguel I. Aguirre{-}Urreta}, title = {Cautionary Note on the Two-Step Transformation to Normality}, journal = {J. Inf. Syst.}, volume = {34}, number = {1}, pages = {151--166}, year = {2020}, url = {https://doi.org/10.2308/isys-52255}, doi = {10.2308/ISYS-52255}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/RonkkoA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SchmidtG20, author = {Pamela J. Schmidt and Graham Gal}, title = {Editors' Introduction to the Special Section on Cloud Computing and Accounting Information Systems {(JISC} 2018)}, journal = {J. Inf. Syst.}, volume = {34}, number = {2}, pages = {1--4}, year = {2020}, url = {https://doi.org/10.2308/isys-10726}, doi = {10.2308/ISYS-10726}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/SchmidtG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ShoemakerCFK20, author = {Nikki Shoemaker and Mary B. Curtis and Louis Fayard and Marie T. Kelly}, title = {What Happens When Formal and Informal Norms Conflict for {IT} Usage?}, journal = {J. Inf. Syst.}, volume = {34}, number = {2}, pages = {235--256}, year = {2020}, url = {https://doi.org/10.2308/isys-52616}, doi = {10.2308/ISYS-52616}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/ShoemakerCFK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WangK20, author = {YunSen Wang and Alexander Kogan}, title = {Cloud-Based In-Memory Columnar Database Architecture for Continuous Audit Analytics}, journal = {J. Inf. Syst.}, volume = {34}, number = {2}, pages = {87--107}, year = {2020}, url = {https://doi.org/10.2308/isys-52531}, doi = {10.2308/ISYS-52531}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/WangK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WilkinC20, author = {Carla L. Wilkin and Robert H. Chenhall}, title = {Information Technology Governance: Reflections on the Past and Future Directions}, journal = {J. Inf. Syst.}, volume = {34}, number = {2}, pages = {257--292}, year = {2020}, url = {https://doi.org/10.2308/isys-52632}, doi = {10.2308/ISYS-52632}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/WilkinC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Zhang20, author = {Yibo James Zhang}, title = {The Impact of Vivid Graphical Presentation of Financial Information in Digital Annual Reports on Investors' Impressions of Management and Firm Performance}, journal = {J. Inf. Syst.}, volume = {34}, number = {3}, pages = {233--253}, year = {2020}, url = {https://doi.org/10.2308/isys-52533}, doi = {10.2308/ISYS-52533}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/Zhang20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BankerF19, author = {Rajiv D. Banker and Cecilia (Qian) Feng}, title = {The Impact of Information Security Breach Incidents on {CIO} Turnover}, journal = {J. Inf. Syst.}, volume = {33}, number = {3}, pages = {309--329}, year = {2019}, url = {https://doi.org/10.2308/isys-52532}, doi = {10.2308/ISYS-52532}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BankerF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BarrickMSW19, author = {John A. Barrick and Nathan W. Mecham and Scott L. Summers and David A. Wood}, title = {Ranking Accounting Journals by Topical Area and Methodology}, journal = {J. Inf. Syst.}, volume = {33}, number = {2}, pages = {1--22}, year = {2019}, url = {https://doi.org/10.2308/isys-51981}, doi = {10.2308/ISYS-51981}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/BarrickMSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChenZ19, author = {Gary Chen and Jie Zhou}, title = {{XBRL} Adoption and Systematic Information Acquisition via {EDGAR}}, journal = {J. Inf. Syst.}, volume = {33}, number = {2}, pages = {23--43}, year = {2019}, url = {https://doi.org/10.2308/isys-52140}, doi = {10.2308/ISYS-52140}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/ChenZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChengW19, author = {Xu (Joyce) Cheng and Stephanie Walton}, title = {Do Nonprofessional Investors Care About How and When Data Breaches are Disclosed?}, journal = {J. Inf. Syst.}, volume = {33}, number = {3}, pages = {163--182}, year = {2019}, url = {https://doi.org/10.2308/isys-52410}, doi = {10.2308/ISYS-52410}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChengW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CongOS19, author = {Yu Cong and Ayishat Omar and Huey{-}Lian Sun}, title = {Does {IT} Outsourcing Affect the Accuracy and Speed of Financial Disclosures? Evidence from Preparer-Side {XBRL} Filing Decisions}, journal = {J. Inf. Syst.}, volume = {33}, number = {2}, pages = {45--61}, year = {2019}, url = {https://doi.org/10.2308/isys-52080}, doi = {10.2308/ISYS-52080}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CongOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CurryMCC19, author = {Michael Curry and Byron Marshall and John Correia and Robert E. Crossler}, title = {InfoSec Process Action Model {(IPAM):} Targeting Insiders' Weak Password Behavior}, journal = {J. Inf. Syst.}, volume = {33}, number = {3}, pages = {201--225}, year = {2019}, url = {https://doi.org/10.2308/isys-52381}, doi = {10.2308/ISYS-52381}, timestamp = {Wed, 16 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CurryMCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DebrecenyWZ19, author = {Roger S. Debreceny and Tawei Wang and Mi (Jamie) Zhou}, title = {Research in Social Media: Data Sources and Methodologies}, journal = {J. Inf. Syst.}, volume = {33}, number = {1}, pages = {1--28}, year = {2019}, url = {https://doi.org/10.2308/isys-51984}, doi = {10.2308/ISYS-51984}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/DebrecenyWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/FordhamH19, author = {David R. Fordham and Carol W. Hamilton}, title = {Accounting Information Technology in Small Businesses: An Inquiry}, journal = {J. Inf. Syst.}, volume = {33}, number = {2}, pages = {63--75}, year = {2019}, url = {https://doi.org/10.2308/isys-51982}, doi = {10.2308/ISYS-51982}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/FordhamH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/FrankGP19, author = {Michele L. Frank and Jonathan H. Grenier and Jonathan S. Pyzoha}, title = {How Disclosing a Prior Cyberattack Influences the Efficacy of Cybersecurity Risk Management Reporting and Independent Assurance}, journal = {J. Inf. Syst.}, volume = {33}, number = {3}, pages = {183--200}, year = {2019}, url = {https://doi.org/10.2308/isys-52374}, doi = {10.2308/ISYS-52374}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/FrankGP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GaoB19, author = {Lei Gao and Alisa G. Brink}, title = {A Content Analysis of the Privacy Policies of Cloud Computing Services}, journal = {J. Inf. Syst.}, volume = {33}, number = {3}, pages = {93--115}, year = {2019}, url = {https://doi.org/10.2308/isys-52188}, doi = {10.2308/ISYS-52188}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/GaoB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HoltL19, author = {Travis P. Holt and Tina M. Loraas}, title = {Using Qualtrics Panels to Source External Auditors: {A} Replication Study}, journal = {J. Inf. Syst.}, volume = {33}, number = {1}, pages = {29--41}, year = {2019}, url = {https://doi.org/10.2308/isys-51986}, doi = {10.2308/ISYS-51986}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/HoltL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HsiehWA19, author = {Tien{-}Shih Hsieh and Zhihong Wang and Mohammad Abdolmohammadi}, title = {Factors Associated with Companies' Choices of {XBRL} Implementation Strategies: Evidence from the {U.S.} Market}, journal = {J. Inf. Syst.}, volume = {33}, number = {3}, pages = {75--91}, year = {2019}, url = {https://doi.org/10.2308/isys-52185}, doi = {10.2308/ISYS-52185}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HsiehWA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HuangNV19, author = {Feiqi Huang and Won Gyun No and Miklos A. Vasarhelyi}, title = {Do Managers Use Extension Elements Strategically in the SEC's Tagged Data for Financial Statements? Evidence from {XBRL} Complexity}, journal = {J. Inf. Syst.}, volume = {33}, number = {3}, pages = {61--74}, year = {2019}, url = {https://doi.org/10.2308/isys-52162}, doi = {10.2308/ISYS-52162}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/HuangNV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HuntS19, author = {Nicholas C. Hunt and Andrea M. Scheetz}, title = {Using MTurk to Distribute a Survey or Experiment: Methodological Considerations}, journal = {J. Inf. Syst.}, volume = {33}, number = {1}, pages = {43--65}, year = {2019}, url = {https://doi.org/10.2308/isys-52021}, doi = {10.2308/ISYS-52021}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/HuntS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/IonitaWGY19, author = {Dan Ionita and Roel J. Wieringa and Jaap Gordijn and Ahmed Seid Yesuf}, title = {Quantitative, Value-Driven Risk Analysis of e-Services}, journal = {J. Inf. Syst.}, volume = {33}, number = {3}, pages = {45--60}, year = {2019}, url = {https://doi.org/10.2308/isys-52150}, doi = {10.2308/ISYS-52150}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/IonitaWGY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KarimLPZ19, author = {Khondkar E. Karim and Karen Jingrong Lin and Robert E. Pinsker and Hongwei Zhu}, title = {Using Linguistics to Mine Unstructured Data from {FASB} Exposure Drafts}, journal = {J. Inf. Syst.}, volume = {33}, number = {1}, pages = {67--83}, year = {2019}, url = {https://doi.org/10.2308/isys-51928}, doi = {10.2308/ISYS-51928}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/KarimLPZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KippZT19, author = {Peter C. Kipp and Yibo James Zhang and Amanuel F. Tadesse}, title = {Can Social Media Interaction and Message Features Influence Nonprofessional Investors' Perceptions of Firms?}, journal = {J. Inf. Syst.}, volume = {33}, number = {2}, pages = {77--98}, year = {2019}, url = {https://doi.org/10.2308/isys-52067}, doi = {10.2308/ISYS-52067}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/KippZT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KuF19, author = {Chih Hao Ku and Maryam Firoozi}, title = {The Use of Crowdsourcing and Social Media in Accounting Research}, journal = {J. Inf. Syst.}, volume = {33}, number = {1}, pages = {85--111}, year = {2019}, url = {https://doi.org/10.2308/isys-51978}, doi = {10.2308/ISYS-51978}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KuF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Lamboy-RuizNW19, author = {Melvin A. Lamboy{-}Ruiz and Won Gyun No and Olena V. Watanabe}, title = {Discrepancies in Hospital Financial Information: Comparison of Financial Data in State Data Repositories and the Healthcare Cost Reporting Information System}, journal = {J. Inf. Syst.}, volume = {33}, number = {3}, pages = {19--44}, year = {2019}, url = {https://doi.org/10.2308/isys-52149}, doi = {10.2308/ISYS-52149}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/Lamboy-RuizNW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LeiLL19, author = {Lijun (Gillian) Lei and Yutao Li and Yan Luo}, title = {Social Media and Voluntary Nonfinancial Disclosure: Evidence from Twitter Presence and Corporate Political Disclosure}, journal = {J. Inf. Syst.}, volume = {33}, number = {2}, pages = {99--128}, year = {2019}, url = {https://doi.org/10.2308/isys-52189}, doi = {10.2308/ISYS-52189}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/LeiLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LenkKJC19, author = {Margarita M. Lenk and John Peter Krahel and Diane J. Janvrin and Brett Considine}, title = {Social Technology: An Integrated Strategy and Risk Management Framework}, journal = {J. Inf. Syst.}, volume = {33}, number = {2}, pages = {129--153}, year = {2019}, url = {https://doi.org/10.2308/isys-52065}, doi = {10.2308/ISYS-52065}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/LenkKJC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MarleyS19, author = {Robert Marley and Neal M. Snow}, title = {An Empirical Investigation on Social Media Users' Demand for Financial Information Distributed via Social Media Platforms}, journal = {J. Inf. Syst.}, volume = {33}, number = {2}, pages = {155--175}, year = {2019}, url = {https://doi.org/10.2308/isys-52068}, doi = {10.2308/ISYS-52068}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/MarleyS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/OLeary19, author = {Daniel E. O'Leary}, title = {Facilitating Citizens' Voice and Process Reengineering Using a Cloud-Based Mobile App}, journal = {J. Inf. Syst.}, volume = {33}, number = {3}, pages = {137--162}, year = {2019}, url = {https://doi.org/10.2308/isys-52244}, doi = {10.2308/ISYS-52244}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/OLeary19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/OLeary19a, author = {Daniel E. O'Leary}, title = {What Phishing E-mails Reveal: An Exploratory Analysis of Phishing Attempts Using Text Analysis}, journal = {J. Inf. Syst.}, volume = {33}, number = {3}, pages = {285--307}, year = {2019}, url = {https://doi.org/10.2308/isys-52481}, doi = {10.2308/ISYS-52481}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/OLeary19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/OwensH19, author = {Joel Owens and Erin M. Hawkins}, title = {Using Online Labor Market Participants for Nonprofessional Investor Research: {A} Comparison of MTurk and Qualtrics Samples}, journal = {J. Inf. Syst.}, volume = {33}, number = {1}, pages = {113--128}, year = {2019}, url = {https://doi.org/10.2308/isys-52036}, doi = {10.2308/ISYS-52036}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/OwensH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/RichardsonSW19, author = {Vernon J. Richardson and Rodney E. Smith and Marcia Weidenmier Watson}, title = {Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches}, journal = {J. Inf. Syst.}, volume = {33}, number = {3}, pages = {227--265}, year = {2019}, url = {https://doi.org/10.2308/isys-52379}, doi = {10.2308/ISYS-52379}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/RichardsonSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SmithHP19, author = {Thomas J. Smith and Julia L. Higgs and Robert E. Pinsker}, title = {Do Auditors Price Breach Risk in Their Audit Fees?}, journal = {J. Inf. Syst.}, volume = {33}, number = {2}, pages = {177--204}, year = {2019}, url = {https://doi.org/10.2308/isys-52241}, doi = {10.2308/ISYS-52241}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/SmithHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SmithZK19, author = {Antoinette L. Smith and Yibo James Zhang and Peter C. Kipp}, title = {Cloud-Computing Risk Disclosure and {ICFR} Material Weakness: The Moderating Role of Accounting Reporting Complexity}, journal = {J. Inf. Syst.}, volume = {33}, number = {3}, pages = {1--17}, year = {2019}, url = {https://doi.org/10.2308/isys-52134}, doi = {10.2308/ISYS-52134}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/SmithZK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ThibodeauWW19, author = {Jay C. Thibodeau and L. Tyler Williams and Annie L. Witte}, title = {Point and Click Data: An Assessment of Editorial Perceptions and Recommendations for the Peer-Review Process in the New Data Frontier}, journal = {J. Inf. Syst.}, volume = {33}, number = {1}, pages = {129--144}, year = {2019}, url = {https://doi.org/10.2308/isys-51980}, doi = {10.2308/ISYS-51980}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/ThibodeauWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/VincentHP19, author = {Nishani Edirisinghe Vincent and Julia L. Higgs and Robert E. Pinsker}, title = {Board and Management-Level Factors Affecting the Maturity of {IT} Risk Management Practices}, journal = {J. Inf. Syst.}, volume = {33}, number = {3}, pages = {117--135}, year = {2019}, url = {https://doi.org/10.2308/isys-52229}, doi = {10.2308/ISYS-52229}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/VincentHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WernerG19, author = {Michael Werner and Nick Gehrke}, title = {Identifying the Absence of Effective Internal Controls: An Alternative Approach for Internal Control Audits}, journal = {J. Inf. Syst.}, volume = {33}, number = {2}, pages = {205--222}, year = {2019}, url = {https://doi.org/10.2308/isys-52112}, doi = {10.2308/ISYS-52112}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/WernerG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/XuGHP19, author = {Howard Xu and Savannah (Yuanyaun) Guo and Jacob Z. Haislip and Robert E. Pinsker}, title = {Earnings Management in Firms with Data Security Breaches}, journal = {J. Inf. Syst.}, volume = {33}, number = {3}, pages = {267--284}, year = {2019}, url = {https://doi.org/10.2308/isys-52480}, doi = {10.2308/ISYS-52480}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/XuGHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ZhangSX19, author = {Michael Chuancai Zhang and Dan N. Stone and Hong Xie}, title = {Text Data Sources in Archival Accounting Research: Insights and Strategies for Accounting Systems' Scholars}, journal = {J. Inf. Syst.}, volume = {33}, number = {1}, pages = {145--180}, year = {2019}, url = {https://doi.org/10.2308/isys-51979}, doi = {10.2308/ISYS-51979}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ZhangSX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BierstakerHRT18, author = {James Bierstaker and Denise Hanes{-}Downey and Jacob M. Rose and Jay C. Thibodeau}, title = {Effects of Stories and Checklist Decision Aids on Knowledge Structure Development and Auditor Judgment}, journal = {J. Inf. Syst.}, volume = {32}, number = {2}, pages = {1--24}, year = {2018}, url = {https://doi.org/10.2308/isys-51913}, doi = {10.2308/ISYS-51913}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/BierstakerHRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoritzEL18, author = {J. Efrim Boritz and Jap Efendi and Jee{-}Hae Lim}, title = {The Impact of Senior Management Competencies on the Voluntary Adoption of an Innovative Technology}, journal = {J. Inf. Syst.}, volume = {32}, number = {2}, pages = {25--46}, year = {2018}, url = {https://doi.org/10.2308/isys-51685}, doi = {10.2308/ISYS-51685}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/BoritzEL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CefarattiL18, author = {Meghann Cefaratti and Hui Lin}, title = {Exploring Data Center Migration: {A} Case Study}, journal = {J. Inf. Syst.}, volume = {32}, number = {1}, pages = {1--17}, year = {2018}, url = {https://doi.org/10.2308/isys-51647}, doi = {10.2308/ISYS-51647}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CefarattiL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChandraMM18, author = {Akhilesh Chandra and Nirup M. Menon and Birendra K. Mishra}, title = {Budget Adjustments and Spending Patterns: {A} Transaction-Cycle View}, journal = {J. Inf. Syst.}, volume = {32}, number = {1}, pages = {19--43}, year = {2018}, url = {https://doi.org/10.2308/isys-51679}, doi = {10.2308/ISYS-51679}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChandraMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChenKLZ18, author = {Gary Chen and Jeong{-}Bon Kim and Jee{-}Hae Lim and Jie Zhou}, title = {{XBRL} Adoption and Bank Loan Contracting: Early Evidence}, journal = {J. Inf. Syst.}, volume = {32}, number = {2}, pages = {47--69}, year = {2018}, url = {https://doi.org/10.2308/isys-51688}, doi = {10.2308/ISYS-51688}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/ChenKLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChenWZ18, author = {Gary Chen and Xiaohong (Sara) Wang and Jie Zhou}, title = {What Do the Markets Say? Shareholder Wealth Effects of the {XBRL} Mandate}, journal = {J. Inf. Syst.}, volume = {32}, number = {3}, pages = {1--21}, year = {2018}, url = {https://doi.org/10.2308/isys-51814}, doi = {10.2308/ISYS-51814}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChenWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CockrellSW18, author = {R. Cameron Cockrell and Dan N. Stone and Benson Wier}, title = {Accounting for Professional Accountants' Dysfunctional Knowledge Sharing: {A} Self-Determination Theory Perspective}, journal = {J. Inf. Syst.}, volume = {32}, number = {1}, pages = {45--65}, year = {2018}, url = {https://doi.org/10.2308/isys-51677}, doi = {10.2308/ISYS-51677}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CockrellSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CongDV18, author = {Yu Cong and Hui Du and Miklos A. Vasarhelyi}, title = {Are {XBRL} Files Being Accessed? Evidence from the {SEC} {EDGAR} Log File Dataset}, journal = {J. Inf. Syst.}, volume = {32}, number = {3}, pages = {23--29}, year = {2018}, url = {https://doi.org/10.2308/isys-51885}, doi = {10.2308/ISYS-51885}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/CongDV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/EulerichK18, author = {Marc Eulerich and Artur Kalinichenko}, title = {The Current State and Future Directions of Continuous Auditing Research: An Analysis of the Existing Literature}, journal = {J. Inf. Syst.}, volume = {32}, number = {3}, pages = {31--51}, year = {2018}, url = {https://doi.org/10.2308/isys-51813}, doi = {10.2308/ISYS-51813}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/EulerichK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GuanLG18, author = {Jian Guan and Alan S. Levitan and Sandeep Goyal}, title = {Text Mining Using Latent Semantic Analysis: An Illustration through Examination of 30 Years of Research at \emph{JIS}}, journal = {J. Inf. Syst.}, volume = {32}, number = {1}, pages = {67--86}, year = {2018}, url = {https://doi.org/10.2308/isys-51625}, doi = {10.2308/ISYS-51625}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GuanLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HaislipR18, author = {Jacob Z. Haislip and Vernon J. Richardson}, title = {The Effect of {CEO} {IT} Expertise on the Information Environment: Evidence from Earnings Forecasts and Announcements}, journal = {J. Inf. Syst.}, volume = {32}, number = {2}, pages = {71--94}, year = {2018}, url = {https://doi.org/10.2308/isys-51796}, doi = {10.2308/ISYS-51796}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/HaislipR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HeningerJK18, author = {William G. Heninger and Eric N. Johnson and John R. Kuhn Jr.}, title = {The Association between {IT} Material Weaknesses and Earnings Management}, journal = {J. Inf. Syst.}, volume = {32}, number = {3}, pages = {53--64}, year = {2018}, url = {https://doi.org/10.2308/isys-51884}, doi = {10.2308/ISYS-51884}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/HeningerJK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LoweBJJ18, author = {D. Jordan Lowe and James Bierstaker and Diane J. Janvrin and J. Gregory Jenkins}, title = {Information Technology in an Audit Context: Have the Big 4 Lost Their Advantage?}, journal = {J. Inf. Syst.}, volume = {32}, number = {1}, pages = {87--107}, year = {2018}, url = {https://doi.org/10.2308/isys-51794}, doi = {10.2308/ISYS-51794}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/LoweBJJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MurthyW18, author = {Uday S. Murthy and Patrick R. Wheeler}, title = {The Effects of Decision-Aid Design on Auditor Performance in Internal Control Evaluation Tasks}, journal = {J. Inf. Syst.}, volume = {32}, number = {2}, pages = {95--113}, year = {2018}, url = {https://doi.org/10.2308/isys-51739}, doi = {10.2308/ISYS-51739}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/MurthyW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/NuttallSSW18, author = {Garrison Nuttall and Neal M. Snow and Scott L. Summers and David A. Wood}, title = {Citation-Based Benchmarks and Individual Accounting Faculty Research Rankings by Topical Area and Methodology}, journal = {J. Inf. Syst.}, volume = {32}, number = {2}, pages = {115--140}, year = {2018}, url = {https://doi.org/10.2308/isys-51689}, doi = {10.2308/ISYS-51689}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/NuttallSSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ParedesW18, author = {Angel Arturo Pacheco Paredes and Clark M. Wheatley}, title = {Do Enterprise Resource Planning Systems (ERPs) Constrain Real Earnings Management?}, journal = {J. Inf. Syst.}, volume = {32}, number = {3}, pages = {65--89}, year = {2018}, url = {https://doi.org/10.2308/isys-51760}, doi = {10.2308/ISYS-51760}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/ParedesW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PriceL18, author = {Jean Price and Nancy K. Lankton}, title = {A Framework and Guidelines for Assessing and Developing Board-Level Information Technology Committee Charters}, journal = {J. Inf. Syst.}, volume = {32}, number = {1}, pages = {109--129}, year = {2018}, url = {https://doi.org/10.2308/isys-51674}, doi = {10.2308/ISYS-51674}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/PriceL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WandW18, author = {Yair Wand and Ron Weber}, title = {Limiting the Search Space during Controls Evaluation of a Modified Information System}, journal = {J. Inf. Syst.}, volume = {32}, number = {3}, pages = {91--111}, year = {2018}, url = {https://doi.org/10.2308/isys-51908}, doi = {10.2308/ISYS-51908}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WandW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BorthickP17, author = {A. Faye Borthick and Robin R. Pennington}, title = {When Data Become Ubiquitous, What Becomes of Accounting and Assurance?}, journal = {J. Inf. Syst.}, volume = {31}, number = {3}, pages = {1--4}, year = {2017}, url = {https://doi.org/10.2308/isys-10554}, doi = {10.2308/ISYS-10554}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BorthickP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BrownMS17, author = {J. Owen Brown and James A. Marcum and Martin T. Stuebs Jr.}, title = {Professional Virtue Reinforcements: {A} Necessary Complement to Technological and Policy Reforms}, journal = {J. Inf. Syst.}, volume = {31}, number = {2}, pages = {5--23}, year = {2017}, url = {https://doi.org/10.2308/isys-51664}, doi = {10.2308/ISYS-51664}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BrownMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BurneyRW17, author = {Laurie L. Burney and Robin R. Radtke and Sally K. Widener}, title = {The Intersection of "Bad Apples, " "Bad Barrels, " and the Enabling Use of Performance Measurement Systems}, journal = {J. Inf. Syst.}, volume = {31}, number = {2}, pages = {25--48}, year = {2017}, url = {https://doi.org/10.2308/isys-51624}, doi = {10.2308/ISYS-51624}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BurneyRW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChenGT17, author = {Songsheng Chen and Jun Guo and Xiaoxiao Tong}, title = {{XBRL} Implementation and Post-Earnings-Announcement Drift: The Impact of State Ownership in China}, journal = {J. Inf. Syst.}, volume = {31}, number = {1}, pages = {1--19}, year = {2017}, url = {https://doi.org/10.2308/isys-51374}, doi = {10.2308/ISYS-51374}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChenGT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CrosslerLLT17, author = {Robert E. Crossler and James H. Long and Tina M. Loraas and Brad S. Trinkle}, title = {The Impact of Moral Intensity and Ethical Tone Consistency on Policy Compliance}, journal = {J. Inf. Syst.}, volume = {31}, number = {2}, pages = {49--64}, year = {2017}, url = {https://doi.org/10.2308/isys-51623}, doi = {10.2308/ISYS-51623}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/CrosslerLLT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DaiV17, author = {Jun Dai and Miklos A. Vasarhelyi}, title = {Toward Blockchain-Based Accounting and Assurance}, journal = {J. Inf. Syst.}, volume = {31}, number = {3}, pages = {5--21}, year = {2017}, url = {https://doi.org/10.2308/isys-51804}, doi = {10.2308/ISYS-51804}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DaiV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DebrecenyRW17, author = {Roger S. Debreceny and Asheq Razaur Rahman and Tawei Wang}, title = {Corporate Network Centrality Score: Methodologies and Informativeness}, journal = {J. Inf. Syst.}, volume = {31}, number = {3}, pages = {23--43}, year = {2017}, url = {https://doi.org/10.2308/isys-51797}, doi = {10.2308/ISYS-51797}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DebrecenyRW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DunnGGB17, author = {Cheryl L. Dunn and Gregory J. Gerard and Severin V. Grabski and Scott R. Boss}, title = {Asymmetry in Identification of Multiplicity Errors in Conceptual Models of Business Processes}, journal = {J. Inf. Syst.}, volume = {31}, number = {1}, pages = {21--39}, year = {2017}, url = {https://doi.org/10.2308/isys-51581}, doi = {10.2308/ISYS-51581}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DunnGGB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/FarewellHKP17, author = {Stephanie M. Farewell and Lizhong Hao and Vinod Kashyap and Robert E. Pinsker}, title = {A Field Study Examining the Indian Ministry of Corporate Affairs' {XBRL} Implementation}, journal = {J. Inf. Syst.}, volume = {31}, number = {1}, pages = {103--117}, year = {2017}, url = {https://doi.org/10.2308/isys-51389}, doi = {10.2308/ISYS-51389}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/FarewellHKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GuragaiHNT17, author = {Binod Guragai and Nicholas C. Hunt and Marc P. Neri and Eileen Z. Taylor}, title = {Accounting Information Systems and Ethics Research: Review, Synthesis, and the Future}, journal = {J. Inf. Syst.}, volume = {31}, number = {2}, pages = {65--81}, year = {2017}, url = {https://doi.org/10.2308/isys-51265}, doi = {10.2308/ISYS-51265}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GuragaiHNT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HamiltonS17, author = {Russ Hamilton and James Stekelberg}, title = {The Effect of High-Quality Information Technology on Corporate Tax Avoidance and Tax Risk}, journal = {J. Inf. Syst.}, volume = {31}, number = {2}, pages = {83--106}, year = {2017}, url = {https://doi.org/10.2308/isys-51482}, doi = {10.2308/ISYS-51482}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/HamiltonS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HoltLS17, author = {Matthew Holt and Bradley Lang and Steve G. Sutton}, title = {Potential Employees' Ethical Perceptions of Active Monitoring: The Dark Side of Data Analytics}, journal = {J. Inf. Syst.}, volume = {31}, number = {2}, pages = {107--124}, year = {2017}, url = {https://doi.org/10.2308/isys-51580}, doi = {10.2308/ISYS-51580}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HoltLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HuertaJ17, author = {Esperanza Huerta and Scott Jensen}, title = {An Accounting Information Systems Perspective on Data Analytics and Big Data}, journal = {J. Inf. Syst.}, volume = {31}, number = {3}, pages = {101--114}, year = {2017}, url = {https://doi.org/10.2308/isys-51799}, doi = {10.2308/ISYS-51799}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HuertaJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KoganW17, author = {Alexander Kogan and Patrick R. Wheeler}, title = {Annual Editor Report}, journal = {J. Inf. Syst.}, volume = {31}, number = {3}, pages = {1--6}, year = {2017}, url = {https://doi.org/10.2308/iace-10617}, doi = {10.2308/IACE-10617}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KoganW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LunardiMBG17, author = {Guilherme Lerch Lunardi and Ant{\^{o}}nio Carlos Gastaud Ma{\c{c}}ada and Jo{\~{a}}o Luiz Becker and Wim Van Grembergen}, title = {Antecedents of {IT} Governance Effectiveness: An Empirical Examination in Brazilian Firms}, journal = {J. Inf. Syst.}, volume = {31}, number = {1}, pages = {41--57}, year = {2017}, url = {https://doi.org/10.2308/isys-51626}, doi = {10.2308/ISYS-51626}, timestamp = {Thu, 17 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/LunardiMBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MurthyG17, author = {Uday S. Murthy and Guido L. Geerts}, title = {An {REA} Ontology-Based Model for Mapping Big Data to Accounting Information Systems Elements}, journal = {J. Inf. Syst.}, volume = {31}, number = {3}, pages = {45--61}, year = {2017}, url = {https://doi.org/10.2308/isys-51803}, doi = {10.2308/ISYS-51803}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MurthyG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/RichinsSSW17, author = {Greg Richins and Andrea Stapleton and Theophanis C. Stratopoulos and Christopher Wong}, title = {Big Data Analytics: Opportunity or Threat for the Accounting Profession?}, journal = {J. Inf. Syst.}, volume = {31}, number = {3}, pages = {63--79}, year = {2017}, url = {https://doi.org/10.2308/isys-51805}, doi = {10.2308/ISYS-51805}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/RichinsSSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/RoseRST17, author = {Anna M. Rose and Jacob M. Rose and Kerri{-}Ann Sanderson and Jay C. Thibodeau}, title = {When Should Audit Firms Introduce Analyses of Big Data Into the Audit Process?}, journal = {J. Inf. Syst.}, volume = {31}, number = {3}, pages = {81--99}, year = {2017}, url = {https://doi.org/10.2308/isys-51837}, doi = {10.2308/ISYS-51837}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/RoseRST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ScherrD17, author = {Elisabeth Scherr and Dominik Ditter}, title = {Customization versus Standardization in Electronic Financial Reporting: Early Evidence from the {SEC} {XBRL} Mandate}, journal = {J. Inf. Syst.}, volume = {31}, number = {2}, pages = {125--148}, year = {2017}, url = {https://doi.org/10.2308/isys-51697}, doi = {10.2308/ISYS-51697}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ScherrD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/TaylorD17, author = {Eileen Z. Taylor and Ronald J. Daigle}, title = {Special Section of \emph{JIS} on {AIS} and Ethics}, journal = {J. Inf. Syst.}, volume = {31}, number = {2}, pages = {1--3}, year = {2017}, url = {https://doi.org/10.2308/isys-10541}, doi = {10.2308/ISYS-10541}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/TaylorD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/TempletonB17, author = {Gary F. Templeton and Laurie L. Burney}, title = {Using a Two-Step Transformation to Address Non-Normality from a Business Value of Information Technology Perspective}, journal = {J. Inf. Syst.}, volume = {31}, number = {2}, pages = {149--164}, year = {2017}, url = {https://doi.org/10.2308/isys-51510}, doi = {10.2308/ISYS-51510}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/TempletonB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/VincentHP17, author = {Nishani Edirisinghe Vincent and Julia L. Higgs and Robert E. Pinsker}, title = {{IT} Governance and the Maturity of {IT} Risk Management Practices}, journal = {J. Inf. Syst.}, volume = {31}, number = {1}, pages = {59--77}, year = {2017}, url = {https://doi.org/10.2308/isys-51365}, doi = {10.2308/ISYS-51365}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/VincentHP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ZimmermannRF17, author = {Stephan Zimmermann and Christopher Rentrop and Carsten Felden}, title = {A Multiple Case Study on the Nature and Management of Shadow Information Technology}, journal = {J. Inf. Syst.}, volume = {31}, number = {1}, pages = {79--101}, year = {2017}, url = {https://doi.org/10.2308/isys-51579}, doi = {10.2308/ISYS-51579}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ZimmermannRF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BaxterHW16, author = {Ryan J. Baxter and D. Kip Holderness Jr. and David A. Wood}, title = {Applying Basic Gamification Techniques to {IT} Compliance Training: Evidence from the Lab and Field}, journal = {J. Inf. Syst.}, volume = {30}, number = {3}, pages = {119--133}, year = {2016}, url = {https://doi.org/10.2308/isys-51341}, doi = {10.2308/ISYS-51341}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BaxterHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CesareP16, author = {Sergio de Cesare and Chris Partridge}, title = {{BORO} as a Foundation to Enterprise Ontology}, journal = {J. Inf. Syst.}, volume = {30}, number = {2}, pages = {83--112}, year = {2016}, url = {https://doi.org/10.2308/isys-51428}, doi = {10.2308/ISYS-51428}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CesareP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CramG16, author = {W. Alec Cram and R. Brent Gallupe}, title = {A Method to Evaluate Information Systems Control Alignment}, journal = {J. Inf. Syst.}, volume = {30}, number = {1}, pages = {117--135}, year = {2016}, url = {https://doi.org/10.2308/isys-51297}, doi = {10.2308/ISYS-51297}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CramG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CurtisD16, author = {Mary B. Curtis and Roger S. Debreceny}, title = {The \emph{Journal of Information Systems} at Thirty}, journal = {J. Inf. Syst.}, volume = {30}, number = {1}, pages = {1--2}, year = {2016}, url = {https://doi.org/10.2308/isys-10482}, doi = {10.2308/ISYS-10482}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CurtisD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DzuraninM16, author = {Ann C. Dzuranin and Irina Malaescu}, title = {The Current State and Future Direction of {IT} Audit: Challenges and Opportunities}, journal = {J. Inf. Syst.}, volume = {30}, number = {1}, pages = {7--20}, year = {2016}, url = {https://doi.org/10.2308/isys-51315}, doi = {10.2308/ISYS-51315}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DzuraninM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/FarkasH16, author = {Maia J. Farkas and Rina M. Hirsch}, title = {The Effect of Frequency and Automation of Internal Control Testing on External Auditor Reliance on the Internal Audit Function}, journal = {J. Inf. Syst.}, volume = {30}, number = {1}, pages = {21--40}, year = {2016}, url = {https://doi.org/10.2308/isys-51266}, doi = {10.2308/ISYS-51266}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/FarkasH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Geerts16, author = {Guido L. Geerts}, title = {Special Section on Enterprise Ontologies}, journal = {J. Inf. Syst.}, volume = {30}, number = {2}, pages = {1--3}, year = {2016}, url = {https://doi.org/10.2308/isys-51419}, doi = {10.2308/ISYS-51419}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Geerts16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Gray16, author = {Glen L. Gray}, title = {Blogs as Research and Teaching Resources for Accounting Academics}, journal = {J. Inf. Syst.}, volume = {30}, number = {2}, pages = {183--202}, year = {2016}, url = {https://doi.org/10.2308/isys-51348}, doi = {10.2308/ISYS-51348}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Gray16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HaislipMRS16, author = {Jacob Z. Haislip and Adi Masli and Vernon J. Richardson and Juan Manuel S{\'{a}}nchez}, title = {Repairing Organizational Legitimacy Following Information Technology {(IT)} Material Weaknesses: Executive Turnover, {IT} Expertise, and {IT} System Upgrades}, journal = {J. Inf. Syst.}, volume = {30}, number = {1}, pages = {41--70}, year = {2016}, url = {https://doi.org/10.2308/isys-51294}, doi = {10.2308/ISYS-51294}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/HaislipMRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HanRXZ16, author = {Shipeng Han and Zabihollah Rezaee and Ling Xue and Joseph H. Zhang}, title = {The Association between Information Technology Investments and Audit Risk}, journal = {J. Inf. Syst.}, volume = {30}, number = {1}, pages = {93--116}, year = {2016}, url = {https://doi.org/10.2308/isys-51317}, doi = {10.2308/ISYS-51317}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HanRXZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HendersonBK16, author = {David L. Henderson III and Marianne Bradford and Amr Kotb}, title = {Inhibitors and Enablers of {GAS} Usage: Testing the Dual Factor Theory}, journal = {J. Inf. Syst.}, volume = {30}, number = {3}, pages = {135--155}, year = {2016}, url = {https://doi.org/10.2308/isys-51388}, doi = {10.2308/ISYS-51388}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HendersonBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HiggsPSY16, author = {Julia L. Higgs and Robert E. Pinsker and Thomas J. Smith and George R. Young}, title = {The Relationship between Board-Level Technology Committees and Reported Security Breaches}, journal = {J. Inf. Syst.}, volume = {30}, number = {3}, pages = {79--98}, year = {2016}, url = {https://doi.org/10.2308/isys-51402}, doi = {10.2308/ISYS-51402}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HiggsPSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/JanvrinW16, author = {Diane J. Janvrin and David A. Wood}, title = {The \emph{Journal of Information Systems} 2015 Conference on Information Technology Audit}, journal = {J. Inf. Syst.}, volume = {30}, number = {1}, pages = {3--5}, year = {2016}, url = {https://doi.org/10.2308/isys-10483}, doi = {10.2308/ISYS-10483}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/JanvrinW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KeltonM16, author = {Andrea Seaton Kelton and Uday S. Murthy}, title = {The Effects of Information Disaggregation and Financial Statement Interactivity on Judgments and Decisions of Nonprofessional Investors}, journal = {J. Inf. Syst.}, volume = {30}, number = {3}, pages = {99--118}, year = {2016}, url = {https://doi.org/10.2308/isys-51327}, doi = {10.2308/ISYS-51327}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KeltonM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LeeW16, author = {Michael T. Lee and Sally K. Widener}, title = {The Performance Effects of Using Business Intelligence Systems for Exploitation and Exploration Learning}, journal = {J. Inf. Syst.}, volume = {30}, number = {3}, pages = {1--31}, year = {2016}, url = {https://doi.org/10.2308/isys-51298}, doi = {10.2308/ISYS-51298}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LeeW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LiCK16, author = {Pei Li and David Y. Chan and Alexander Kogan}, title = {Exception Prioritization in the Continuous Auditing Environment: {A} Framework and Experimental Evaluation}, journal = {J. Inf. Syst.}, volume = {30}, number = {2}, pages = {135--157}, year = {2016}, url = {https://doi.org/10.2308/isys-51220}, doi = {10.2308/ISYS-51220}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LiCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MoffittRSWW16, author = {Kevin C. Moffitt and Vernon J. Richardson and Neal M. Snow and Martin M. Weisner and David A. Wood}, title = {Perspectives on Past and Future {AIS} Research as the \emph{Journal of Information Systems} Turns Thirty}, journal = {J. Inf. Syst.}, volume = {30}, number = {3}, pages = {157--171}, year = {2016}, url = {https://doi.org/10.2308/isys-51495}, doi = {10.2308/ISYS-51495}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MoffittRSWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Murthy16, author = {Uday S. Murthy}, title = {Researching at the Intersection of Accounting and Information Technology: {A} Call for Action}, journal = {J. Inf. Syst.}, volume = {30}, number = {2}, pages = {159--167}, year = {2016}, url = {https://doi.org/10.2308/isys-51413}, doi = {10.2308/ISYS-51413}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Murthy16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MyersSSW16, author = {Noah Myers and Neal M. Snow and Scott L. Summers and David A. Wood}, title = {Accounting Institution Citation-Based Research Rankings by Topical Area and Methodology}, journal = {J. Inf. Syst.}, volume = {30}, number = {3}, pages = {33--62}, year = {2016}, url = {https://doi.org/10.2308/isys-51343}, doi = {10.2308/ISYS-51343}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MyersSSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SchellerH16, author = {Christian Vibe Scheller and Pavel Hruby}, title = {Business Process and Value Delivery Modeling Using Possession, Ownership, and Availability {(POA)} in Enterprises and Business Networks}, journal = {J. Inf. Syst.}, volume = {30}, number = {2}, pages = {5--47}, year = {2016}, url = {https://doi.org/10.2308/isys-50923}, doi = {10.2308/ISYS-50923}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SchellerH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SchmidtWG16, author = {Pamela J. Schmidt and Jason T. Wood and Severin V. Grabski}, title = {Business in the Cloud: Research Questions on Governance, Audit, and Assurance}, journal = {J. Inf. Syst.}, volume = {30}, number = {3}, pages = {173--189}, year = {2016}, url = {https://doi.org/10.2308/isys-51494}, doi = {10.2308/ISYS-51494}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SchmidtWG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SidgmanC16, author = {Juergen Sidgman and Malcolm Crompton}, title = {Valuing Personal Data to Foster Privacy: {A} Thought Experiment and Opportunities for Research}, journal = {J. Inf. Syst.}, volume = {30}, number = {2}, pages = {169--181}, year = {2016}, url = {https://doi.org/10.2308/isys-51429}, doi = {10.2308/ISYS-51429}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SidgmanC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SnowR16, author = {Neal M. Snow and Jacqueline L. Reck}, title = {Developing a Government Reporting Taxonomy}, journal = {J. Inf. Syst.}, volume = {30}, number = {2}, pages = {49--81}, year = {2016}, url = {https://doi.org/10.2308/isys-51373}, doi = {10.2308/ISYS-51373}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SnowR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SteinbartRGD16, author = {Paul John Steinbart and Robyn L. Raschke and Graham Gal and William N. Dilla}, title = {{SECURQUAL:} An Instrument for Evaluating the Effectiveness of Enterprise Information Security Programs}, journal = {J. Inf. Syst.}, volume = {30}, number = {1}, pages = {71--92}, year = {2016}, url = {https://doi.org/10.2308/isys-51257}, doi = {10.2308/ISYS-51257}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/SteinbartRGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/TangEW16, author = {Fengchun Tang and Christopher Kevin Eller and Benson Wier}, title = {Reporting Frequency and Presentation Format: Detecting Real Activities Manipulation}, journal = {J. Inf. Syst.}, volume = {30}, number = {3}, pages = {63--77}, year = {2016}, url = {https://doi.org/10.2308/isys-51284}, doi = {10.2308/ISYS-51284}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/TangEW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Weber16, author = {Ron Weber}, title = {Thirty Years of the \emph{Journal of Information Systems: } Reflections of a Prodigal Son}, journal = {J. Inf. Syst.}, volume = {30}, number = {1}, pages = {137--146}, year = {2016}, url = {https://doi.org/10.2308/isys-51342}, doi = {10.2308/ISYS-51342}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Weber16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Weigand16, author = {Hans Weigand}, title = {The e3value Ontology for Value Networks: Current State and Future Directions}, journal = {J. Inf. Syst.}, volume = {30}, number = {2}, pages = {113--133}, year = {2016}, url = {https://doi.org/10.2308/isys-51409}, doi = {10.2308/ISYS-51409}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Weigand16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BonsonB15, author = {Enrique Bons{\'{o}}n and Michaela Bedn{\'{a}}rov{\'{a}}}, title = {YouTube Sustainability Reporting: Empirical Evidence from Eurozone-Listed Companies}, journal = {J. Inf. Syst.}, volume = {29}, number = {3}, pages = {35--50}, year = {2015}, url = {https://doi.org/10.2308/isys-50993}, doi = {10.2308/ISYS-50993}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/BonsonB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoritzH15, title = {Retraction: Investigating the Impact of Auditor-Provided Systems Reliability Assurance on Potential Service Recipients}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {239}, year = {2015}, url = {https://doi.org/10.2308/isys-10441}, doi = {10.2308/ISYS-10441}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BoritzH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoritzT15, author = {J. Efrim Boritz and Lev M. Timoshenko}, title = {Firm-Specific Characteristics of the Participants in the SEC's {XBRL} Voluntary Filing Program}, journal = {J. Inf. Syst.}, volume = {29}, number = {1}, pages = {9--36}, year = {2015}, url = {https://doi.org/10.2308/isys-50896}, doi = {10.2308/ISYS-50896}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BoritzT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChychylaK15, author = {Roman Chychyla and Alexander Kogan}, title = {Using {XBRL} to Conduct a Large-Scale Study of Discrepancies between the Accounting Numbers in Compustat and {SEC} 10-K Filings}, journal = {J. Inf. Syst.}, volume = {29}, number = {1}, pages = {37--72}, year = {2015}, url = {https://doi.org/10.2308/isys-50922}, doi = {10.2308/ISYS-50922}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChychylaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CramBG15, author = {W. Alec Cram and M. Kathryn Brohman and R. Brent Gallupe}, title = {Addressing the Control Challenges of the Enterprise Architecture Process}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {161--182}, year = {2015}, url = {https://doi.org/10.2308/isys-50913}, doi = {10.2308/ISYS-50913}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CramBG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Debreceny15, author = {Roger S. Debreceny}, title = {Social Media, Social Networks, and Accounting}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {1--4}, year = {2015}, url = {https://doi.org/10.2308/isys-10462}, doi = {10.2308/ISYS-10462}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Debreceny15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DebrecenyC15, author = {Roger S. Debreceny and Mary B. Curtis}, title = {Challenges From and To the Senior Editors of the \emph{Journal of Information Systems}}, journal = {J. Inf. Syst.}, volume = {29}, number = {1}, pages = {1--8}, year = {2015}, url = {https://doi.org/10.2308/isys-10416}, doi = {10.2308/ISYS-10416}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DebrecenyC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DrumSB15, author = {Dawna Drum and Rhetta Standifer and Kristina Bourne}, title = {Facing the Consequences: Examining a Workaround Outcomes-Based Model}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {137--159}, year = {2015}, url = {https://doi.org/10.2308/isys-50875}, doi = {10.2308/ISYS-50875}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DrumSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DuJ15, author = {Hui Du and Wei Jiang}, title = {Do Social Media Matter? Initial Empirical Evidence}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {51--70}, year = {2015}, url = {https://doi.org/10.2308/isys-50995}, doi = {10.2308/ISYS-50995}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DuJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/EschenbrennerNT15, author = {Brenda Eschenbrenner and Fiona Fui{-}Hoon Nah and Venkata Rajasekhar Telaprolu}, title = {Efficacy of Social Media Utilization by Public Accounting Firms: Findings and Directions for Future Research}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {5--21}, year = {2015}, url = {https://doi.org/10.2308/isys-50894}, doi = {10.2308/ISYS-50894}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/EschenbrennerNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GreensteinH15, title = {Retraction: Extending the Accounting Brand to Privacy Services}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {237}, year = {2015}, url = {https://doi.org/10.2308/isys-10440}, doi = {10.2308/ISYS-10440}, timestamp = {Tue, 08 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GreensteinH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HardyL15, author = {Catherine A. Hardy and Glen Laslett}, title = {Continuous Auditing and Monitoring in Practice: Lessons from Metcash's Business Assurance Group}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {183--194}, year = {2015}, url = {https://doi.org/10.2308/isys-50969}, doi = {10.2308/ISYS-50969}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HardyL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Hunton15, title = {Retraction: Behavioral Self-Regulation of Telework Locations: Interrupting Interruptions!}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {233}, year = {2015}, url = {https://doi.org/10.2308/isys-10437}, doi = {10.2308/ISYS-10437}, timestamp = {Tue, 08 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Hunton15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HuntonMW15, title = {Retraction: The Reaction of Financial Analysts to Enterprise Resource Planning {(ERP)} Implementation Plans}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {241}, year = {2015}, url = {https://doi.org/10.2308/isys-10443}, doi = {10.2308/ISYS-10443}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HuntonMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HuntonN15, title = {Retraction: The Impact of Alternative Telework Arrangements on Organizational Commitment: Insights from a Longitudinal Field Experiment}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {231}, year = {2015}, url = {https://doi.org/10.2308/isys-10431}, doi = {10.2308/ISYS-10431}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HuntonN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HuntonWW15, title = {Retraction: Are Financial Auditors Overconfident in Their Ability to Assess Risks Associated with Enterprise Resource Planning Systems}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {235}, year = {2015}, url = {https://doi.org/10.2308/isys-10439}, doi = {10.2308/ISYS-10439}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HuntonWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/JanvrinLP15, author = {Diane J. Janvrin and Jee{-}Hae Lim and Gary F. Peters}, title = {The Perceived Impact of \emph{Journal of Information Systems} on Promotion and Tenure}, journal = {J. Inf. Syst.}, volume = {29}, number = {1}, pages = {73--93}, year = {2015}, url = {https://doi.org/10.2308/isys-50963}, doi = {10.2308/ISYS-50963}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/JanvrinLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LeeG15, author = {Lorraine S. Lee and Edmund Green}, title = {Systems Thinking and its Implications in Enterprise Risk Management}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {195--210}, year = {2015}, url = {https://doi.org/10.2308/isys-51047}, doi = {10.2308/ISYS-51047}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LeeG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LiN15, author = {Shiyou Li and Emeka T. Nwaeze}, title = {The Association between Extensions in {XBRL} Disclosures and Financial Information Environment}, journal = {J. Inf. Syst.}, volume = {29}, number = {3}, pages = {73--99}, year = {2015}, url = {https://doi.org/10.2308/isys-51005}, doi = {10.2308/ISYS-51005}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LiN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Limor15, author = {Rina Limor}, title = {Knowledge Resources and Book Reviews}, journal = {J. Inf. Syst.}, volume = {29}, number = {1}, pages = {163--166}, year = {2015}, url = {https://doi.org/10.2308/isys-10419}, doi = {10.2308/ISYS-10419}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Limor15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MalaescuS15, author = {Irina Malaescu and Steve G. Sutton}, title = {The Reliance of External Auditors on Internal Audit's Use of Continuous Audit}, journal = {J. Inf. Syst.}, volume = {29}, number = {1}, pages = {95--114}, year = {2015}, url = {https://doi.org/10.2308/isys-50899}, doi = {10.2308/ISYS-50899}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MalaescuS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PerdanaRR15, author = {Arif Perdana and D. Alastair Robb and Fiona H. Rohde}, title = {An Integrative Review and Synthesis of {XBRL} Research in Academic Journals}, journal = {J. Inf. Syst.}, volume = {29}, number = {1}, pages = {115--153}, year = {2015}, url = {https://doi.org/10.2308/isys-50884}, doi = {10.2308/ISYS-50884}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PerdanaRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PerdanaRR15a, author = {Arif Perdana and D. Alastair Robb and Fiona H. Rohde}, title = {{XBRL} Diffusion in Social Media: Discourses and Community Learning}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {71--106}, year = {2015}, url = {https://doi.org/10.2308/isys-50996}, doi = {10.2308/ISYS-50996}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PerdanaRR15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PickardC15, author = {Matthew D. Pickard and Gary Cokins}, title = {From Bean Counters to Bean Growers: Accountants as Data Analysts - {A} Customer Profitability Example}, journal = {J. Inf. Syst.}, volume = {29}, number = {3}, pages = {151--164}, year = {2015}, url = {https://doi.org/10.2308/isys-51180}, doi = {10.2308/ISYS-51180}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PickardC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PrasadG15, author = {Acklesh Prasad and Peter F. Green}, title = {Organizational Competencies and Dynamic Accounting Information System Capability: Impact on {AIS} Processes and Firm Performance}, journal = {J. Inf. Syst.}, volume = {29}, number = {3}, pages = {123--149}, year = {2015}, url = {https://doi.org/10.2308/isys-51127}, doi = {10.2308/ISYS-51127}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PrasadG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Prokofieva15, author = {Maria Prokofieva}, title = {Twitter-Based Dissemination of Corporate Disclosure and the Intervening Effects of Firms' Visibility: Evidence from Australian-Listed Companies}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {107--136}, year = {2015}, url = {https://doi.org/10.2308/isys-50994}, doi = {10.2308/ISYS-50994}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Prokofieva15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Sidgman15, author = {Juergen Sidgman}, title = {Form 4 Electronic Submissions and the Thomson Reuters Insider Filing Data Feed: Discrepancies and Their Impact on Research}, journal = {J. Inf. Syst.}, volume = {29}, number = {3}, pages = {1--33}, year = {2015}, url = {https://doi.org/10.2308/isys-50981}, doi = {10.2308/ISYS-50981}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Sidgman15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SmithBBH15, title = {Retraction: The Dark Side of Online Knowledge Sharing}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {229}, year = {2015}, url = {https://doi.org/10.2308/isys-10429}, doi = {10.2308/ISYS-10429}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SmithBBH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Stone15, author = {Dan N. Stone}, title = {Post-Hunton: Reclaiming Our Integrity and Literature}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {211--227}, year = {2015}, url = {https://doi.org/10.2308/isys-51094}, doi = {10.2308/ISYS-51094}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Stone15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/TrinkleCB15, author = {Brad S. Trinkle and Robert E. Crossler and France B{\'{e}}langer}, title = {Voluntary Disclosures via Social Media and the Role of Comments}, journal = {J. Inf. Syst.}, volume = {29}, number = {3}, pages = {101--121}, year = {2015}, url = {https://doi.org/10.2308/isys-51133}, doi = {10.2308/ISYS-51133}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/TrinkleCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WangC15, author = {Tawei Wang and Robert Cuthbertson}, title = {Eight Issues on Audit Data Analytics We Would Like Researched}, journal = {J. Inf. Syst.}, volume = {29}, number = {1}, pages = {155--162}, year = {2015}, url = {https://doi.org/10.2308/isys-50955}, doi = {10.2308/ISYS-50955}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WangC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/YenW15, author = {Ju{-}Chun Yen and Tawei Wang}, title = {The Association between {XBRL} Adoption and Market Reactions to Earnings Surprises}, journal = {J. Inf. Syst.}, volume = {29}, number = {3}, pages = {51--71}, year = {2015}, url = {https://doi.org/10.2308/isys-51039}, doi = {10.2308/ISYS-51039}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/YenW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ZhouLWFW15, author = {Mi (Jamie) Zhou and Lijun (Gillian) Lei and Jianling Wang and Weiguo (Patrick) Fan and Alan Gang Wang}, title = {Social Media Adoption and Corporate Disclosure}, journal = {J. Inf. Syst.}, volume = {29}, number = {2}, pages = {23--50}, year = {2015}, url = {https://doi.org/10.2308/isys-50961}, doi = {10.2308/ISYS-50961}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/ZhouLWFW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ArboreGV14, author = {Alessandro Arbore and Rebecca Graziani and Sergio Venturini}, title = {Understanding Personal Mobile Technologies: Decomposing and De-Averaging the Value of a Smartphone}, journal = {J. Inf. Syst.}, volume = {28}, number = {1}, pages = {167--185}, year = {2014}, url = {https://doi.org/10.2308/isys-50668}, doi = {10.2308/ISYS-50668}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ArboreGV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ArnoldBHS14, author = {Vicky Arnold and Tanya S. Benford and Clark Hampton and Steve G. Sutton}, title = {Enterprise Risk Management: Re-Conceptualizing the Role of Risk and Trust on Information Sharing in Transnational Alliances}, journal = {J. Inf. Syst.}, volume = {28}, number = {2}, pages = {257--285}, year = {2014}, url = {https://doi.org/10.2308/isys-50812}, doi = {10.2308/ISYS-50812}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ArnoldBHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BasogluH14, author = {K. Asli Basoglu and Traci J. Hess}, title = {Online Business Reporting: {A} Signaling Theory Perspective}, journal = {J. Inf. Syst.}, volume = {28}, number = {2}, pages = {67--101}, year = {2014}, url = {https://doi.org/10.2308/isys-50780}, doi = {10.2308/ISYS-50780}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BasogluH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BeckLAW14, author = {Grant M. Beck and Rina Limor and Vairam Arunachalam and Patrick R. Wheeler}, title = {The Effect of Changes in Decision Aid Bias on Learning: Evidence of Functional Fixation}, journal = {J. Inf. Syst.}, volume = {28}, number = {1}, pages = {19--42}, year = {2014}, url = {https://doi.org/10.2308/isys-50608}, doi = {10.2308/ISYS-50608}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BeckLAW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoritzCA14, author = {J. Efrim Boritz and Carla Carnaghan and Paulo S. C. Alencar}, title = {Business Modeling to Improve Auditor Risk Assessment: An Investigation of Alternative Representations}, journal = {J. Inf. Syst.}, volume = {28}, number = {2}, pages = {231--256}, year = {2014}, url = {https://doi.org/10.2308/isys-50809}, doi = {10.2308/ISYS-50809}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BoritzCA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChenSCX14, author = {Yunhao Chen and Antoinette L. Smith and Jian Cao and Weidong Xia}, title = {Information Technology Capability, Internal Control Effectiveness, and Audit Fees and Delays}, journal = {J. Inf. Syst.}, volume = {28}, number = {2}, pages = {149--180}, year = {2014}, url = {https://doi.org/10.2308/isys-50778}, doi = {10.2308/ISYS-50778}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChenSCX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CongHZ14, author = {Yu Cong and Jia Hao and Lin Zou}, title = {The Impact of {XBRL} Reporting on Market Efficiency}, journal = {J. Inf. Syst.}, volume = {28}, number = {2}, pages = {181--207}, year = {2014}, url = {https://doi.org/10.2308/isys-50794}, doi = {10.2308/ISYS-50794}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CongHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CrosslerLLT14, author = {Robert E. Crossler and James H. Long and Tina M. Loraas and Brad S. Trinkle}, title = {Understanding Compliance with Bring Your Own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap}, journal = {J. Inf. Syst.}, volume = {28}, number = {1}, pages = {209--226}, year = {2014}, url = {https://doi.org/10.2308/isys-50704}, doi = {10.2308/ISYS-50704}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/CrosslerLLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DengW14, author = {Xuefei (Nancy) Deng and Tawei Wang}, title = {Understanding Post-Implementation Support for Enterprise Systems: An Empirical Study of {IT} Personnel's Customer-Oriented Citizenship Behaviors}, journal = {J. Inf. Syst.}, volume = {28}, number = {2}, pages = {17--39}, year = {2014}, url = {https://doi.org/10.2308/isys-50743}, doi = {10.2308/ISYS-50743}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DengW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GrayNM14, author = {Glen L. Gray and Won Gyun No and David W. Miller}, title = {Internal Auditors' Experiences and Opinions Regarding Green {IT:} Assessing the Gap in Normative and Positive Perspectives}, journal = {J. Inf. Syst.}, volume = {28}, number = {1}, pages = {75--109}, year = {2014}, url = {https://doi.org/10.2308/isys-50694}, doi = {10.2308/ISYS-50694}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GrayNM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GuffeyH14, author = {Daryl M. Guffey and Nancy L. Harp}, title = {Ranking Faculties, Ph.D. Programs, Individual Scholars, and Influential Articles in Accounting Information Systems Based on Citations to Publications in the \emph{Journal of Information Systems}}, journal = {J. Inf. Syst.}, volume = {28}, number = {1}, pages = {111--144}, year = {2014}, url = {https://doi.org/10.2308/isys-50695}, doi = {10.2308/ISYS-50695}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GuffeyH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Hardy14, author = {Catherine A. Hardy}, title = {The Messy Matters of Continuous Assurance: Findings from Exploratory Research in Australia}, journal = {J. Inf. Syst.}, volume = {28}, number = {2}, pages = {357--377}, year = {2014}, url = {https://doi.org/10.2308/isys-50788}, doi = {10.2308/ISYS-50788}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Hardy14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Harrigan14, author = {Fiona Harrigan}, title = {Evolution of Accounting Controls in a De-Integrated Project Structure: {A} Case of Hybridization}, journal = {J. Inf. Syst.}, volume = {28}, number = {2}, pages = {329--355}, year = {2014}, url = {https://doi.org/10.2308/isys-50777}, doi = {10.2308/ISYS-50777}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Harrigan14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HongVW14, author = {Yuan Hong and Jaideep Vaidya and Shengbin Wang}, title = {A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications}, journal = {J. Inf. Syst.}, volume = {28}, number = {1}, pages = {243--268}, year = {2014}, url = {https://doi.org/10.2308/isys-50692}, doi = {10.2308/ISYS-50692}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HongVW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/IssaK14, author = {Hussein Issa and Alexander Kogan}, title = {A Predictive Ordered Logistic Regression Model as a Tool for Quality Review of Control Risk Assessments}, journal = {J. Inf. Syst.}, volume = {28}, number = {2}, pages = {209--229}, year = {2014}, url = {https://doi.org/10.2308/isys-50808}, doi = {10.2308/ISYS-50808}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/IssaK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KimK14, author = {Yongbum Kim and Alexander Kogan}, title = {Development of an Anomaly Detection Model for a Bank's Transitory Account System}, journal = {J. Inf. Syst.}, volume = {28}, number = {1}, pages = {145--165}, year = {2014}, url = {https://doi.org/10.2308/isys-50699}, doi = {10.2308/ISYS-50699}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KimK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KrahelV14, author = {John Peter Krahel and Miklos A. Vasarhelyi}, title = {{AIS} as a Facilitator of Accounting Change: Technology, Practice, and Education}, journal = {J. Inf. Syst.}, volume = {28}, number = {2}, pages = {1--15}, year = {2014}, url = {https://doi.org/10.2308/isys-10412}, doi = {10.2308/ISYS-10412}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KrahelV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Lim14, author = {Weng Marc Lim}, title = {Understanding the Influence of Online Flow Elements on Hedonic and Utilitarian Online Shopping Experiences: {A} Case of Online Group Buying}, journal = {J. Inf. Syst.}, volume = {28}, number = {2}, pages = {287--306}, year = {2014}, url = {https://doi.org/10.2308/isys-50773}, doi = {10.2308/ISYS-50773}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Lim14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LiuV14, author = {Qi Liu and Miklos A. Vasarhelyi}, title = {Big Questions in {AIS} Research: Measurement, Information Processing, Data Analysis, and Reporting}, journal = {J. Inf. Syst.}, volume = {28}, number = {1}, pages = {1--17}, year = {2014}, url = {https://doi.org/10.2308/isys-10395}, doi = {10.2308/ISYS-10395}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LiuV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MasliRSS14, author = {Adi Masli and Vernon J. Richardson and Juan Manuel S{\'{a}}nchez and Rodney E. Smith}, title = {The Interrelationships Between Information Technology Spending, {CEO} Equity Incentives, and Firm Value}, journal = {J. Inf. Syst.}, volume = {28}, number = {2}, pages = {41--65}, year = {2014}, url = {https://doi.org/10.2308/isys-50742}, doi = {10.2308/ISYS-50742}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MasliRSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MorrisKDT14, author = {Bonnie W. Morris and Virginia Franke Kleist and Richard B. Dull and Cynthia D. Tanner}, title = {Secure Information Market: {A} Model to Support Information Sharing, Data Fusion, Privacy, and Decisions}, journal = {J. Inf. Syst.}, volume = {28}, number = {1}, pages = {269--285}, year = {2014}, url = {https://doi.org/10.2308/isys-50705}, doi = {10.2308/ISYS-50705}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/MorrisKDT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/NikitkovSM14, author = {Alexey N. Nikitkov and Dan N. Stone and Timothy C. Miller}, title = {Internal Controls, Routine Activity Theory (RAT), and Sustained Online Auction Deception: {A} Longitudinal Analysis}, journal = {J. Inf. Syst.}, volume = {28}, number = {1}, pages = {311--337}, year = {2014}, url = {https://doi.org/10.2308/isys-50708}, doi = {10.2308/ISYS-50708}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/NikitkovSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/RahmanD14, author = {Asheq Razaur Rahman and Roger S. Debreceny}, title = {Institutionalized Online Access to Corporate Information and Cost of Equity Capital: {A} Cross-Country Analysis}, journal = {J. Inf. Syst.}, volume = {28}, number = {1}, pages = {43--74}, year = {2014}, url = {https://doi.org/10.2308/isys-50653}, doi = {10.2308/ISYS-50653}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/RahmanD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/RaschkeKK14, author = {Robyn L. Raschke and Anjala S. Krishen and Pushkin Kachroo}, title = {Understanding the Components of Information Privacy Threats for Location-Based Services}, journal = {J. Inf. Syst.}, volume = {28}, number = {1}, pages = {227--242}, year = {2014}, url = {https://doi.org/10.2308/isys-50696}, doi = {10.2308/ISYS-50696}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/RaschkeKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SchauppB14, author = {Ludwig Christian Schaupp and France B{\'{e}}langer}, title = {The Value of Social Media for Small Businesses}, journal = {J. Inf. Syst.}, volume = {28}, number = {1}, pages = {187--207}, year = {2014}, url = {https://doi.org/10.2308/isys-50674}, doi = {10.2308/ISYS-50674}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SchauppB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SinghBBB14, author = {Kishore Singh and Peter J. Best and Mario Bojilov and Catherine Blunt}, title = {Continuous Auditing and Continuous Monitoring in {ERP} Environments: Case Studies of Application Implementations}, journal = {J. Inf. Syst.}, volume = {28}, number = {1}, pages = {287--310}, year = {2014}, url = {https://doi.org/10.2308/isys-50679}, doi = {10.2308/ISYS-50679}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SinghBBB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/TrinkleCW14, author = {Brad S. Trinkle and Robert E. Crossler and Merrill Warkentin}, title = {I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks}, journal = {J. Inf. Syst.}, volume = {28}, number = {2}, pages = {307--327}, year = {2014}, url = {https://doi.org/10.2308/isys-50776}, doi = {10.2308/ISYS-50776}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/TrinkleCW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/TuttleTW14, author = {Brad Tuttle and Mark H. Taylor and Yi{-}Jing Wu}, title = {Overcoming the Reluctance to Convey Negative Project Information during an Information Systems Pre-Implementation Review}, journal = {J. Inf. Syst.}, volume = {28}, number = {2}, pages = {103--125}, year = {2014}, url = {https://doi.org/10.2308/isys-50767}, doi = {10.2308/ISYS-50767}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/TuttleTW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WangS14, author = {Tawei Wang and Jia{-}Lang Seng}, title = {Mandatory Adoption of {XBRL} and Foreign Institutional Investors' Holdings: Evidence from China}, journal = {J. Inf. Syst.}, volume = {28}, number = {2}, pages = {127--147}, year = {2014}, url = {https://doi.org/10.2308/isys-50789}, doi = {10.2308/ISYS-50789}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WangS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AliGR13, author = {Syaiful Ali and Peter F. Green and D. Alastair Robb}, title = {Measuring Top Management's {IT} Governance Knowledge Absorptive Capacity}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {137--155}, year = {2013}, url = {https://doi.org/10.2308/isys-50325}, doi = {10.2308/ISYS-50325}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/AliGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CaoNB13, author = {Jian Cao and Andreas I. Nicolaou and Somnath Bhattacharya}, title = {A Longitudinal Examination of Enterprise Resource Planning System Post-Implementation Enhancements}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {13--39}, year = {2013}, url = {https://doi.org/10.2308/isys-50398}, doi = {10.2308/ISYS-50398}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CaoNB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Chakraborty13, author = {Vasundhara Chakraborty}, title = {Book Review}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {333--335}, year = {2013}, url = {https://doi.org/10.2308/isys-10334}, doi = {10.2308/ISYS-10334}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Chakraborty13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CongR13, author = {Yu Cong and Jorge Romero}, title = {On Information Systems Complexity and Vulnerability}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {51--64}, year = {2013}, url = {https://doi.org/10.2308/isys-50562}, doi = {10.2308/ISYS-50562}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CongR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DavidsonDG13, author = {Bruce I. Davidson and Naman K. Desai and Gregory J. Gerard}, title = {The Effect of Continuous Auditing on the Relationship between Internal Audit Sourcing and the External Auditor's Reliance on the Internal Audit Function}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {41--59}, year = {2013}, url = {https://doi.org/10.2308/isys-50430}, doi = {10.2308/ISYS-50430}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DavidsonDG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Debreceny13, author = {Roger S. Debreceny}, title = {Research on {IT} Governance, Risk, and Value: Challenges and Opportunities}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {129--135}, year = {2013}, url = {https://doi.org/10.2308/isys-10339}, doi = {10.2308/ISYS-10339}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Debreceny13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DebrecenyG13, author = {Roger S. Debreceny and Glen L. Gray}, title = {{IT} Governance and Process Maturity: {A} Multinational Field Study}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {157--188}, year = {2013}, url = {https://doi.org/10.2308/isys-50418}, doi = {10.2308/ISYS-50418}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DebrecenyG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Dilla13, author = {William N. Dilla}, title = {Can Avatars Fight Fraud? How Virtual Business Environments Facilitate Learning More About Fraud Investigation and Prevention}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {127--130}, year = {2013}, url = {https://doi.org/10.2308/isys-10371}, doi = {10.2308/ISYS-10371}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/Dilla13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DillaHMJ13, author = {William N. Dilla and Andrew J. Harrison and Brian E. Mennecke and Diane J. Janvrin}, title = {The Assets Are Virtual but the Behavior Is Real: An Analysis of Fraud in Virtual Worlds and Its Implications for the Real World}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {131--158}, year = {2013}, url = {https://doi.org/10.2308/isys-50571}, doi = {10.2308/ISYS-50571}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/DillaHMJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DuVZ13, author = {Hui Du and Miklos A. Vasarhelyi and Xiaochuan Zheng}, title = {{XBRL} Mandate: Thousands of Filing Errors and So What?}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {61--78}, year = {2013}, url = {https://doi.org/10.2308/isys-50399}, doi = {10.2308/ISYS-50399}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DuVZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ElbashirCSDL13, author = {Mohamed Z. Elbashir and Philip A. Collier and Steve G. Sutton and Michael J. Davern and Stewart A. Leech}, title = {Enhancing the Business Value of Business Intelligence: The Role of Shared Knowledge and Assimilation}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {87--105}, year = {2013}, url = {https://doi.org/10.2308/isys-50563}, doi = {10.2308/ISYS-50563}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ElbashirCSDL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GaillyG13, author = {Frederik Gailly and Guido L. Geerts}, title = {Ontology-Driven Business Rule Specification}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {79--104}, year = {2013}, url = {https://doi.org/10.2308/isys-50428}, doi = {10.2308/ISYS-50428}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GaillyG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HaesGD13, author = {Steven De Haes and Wim Van Grembergen and Roger S. Debreceny}, title = {{COBIT} 5 and Enterprise Governance of Information Technology: Building Blocks and Research Opportunities}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {307--324}, year = {2013}, url = {https://doi.org/10.2308/isys-50422}, doi = {10.2308/ISYS-50422}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HaesGD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Heijden13, author = {Hans van der Heijden}, title = {Evaluating Dual Performance Measures on Information Dashboards: Effects of Anchoring and Presentation Format}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {21--34}, year = {2013}, url = {https://doi.org/10.2308/isys-50556}, doi = {10.2308/ISYS-50556}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Heijden13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HerouxF13, author = {Sylvie H{\'{e}}roux and Anne Fortin}, title = {The Internal Audit Function in Information Technology Governance: {A} Holistic Perspective}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {189--217}, year = {2013}, url = {https://doi.org/10.2308/isys-50331}, doi = {10.2308/ISYS-50331}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HerouxF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/JanvrinPM13, author = {Diane J. Janvrin and Robert E. Pinsker and Maureen Francis Mascha}, title = {XBRL-Enabled, Spreadsheet, or PDF? Factors Influencing Exclusive User Choice of Reporting Technology}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {35--49}, year = {2013}, url = {https://doi.org/10.2308/isys-50569}, doi = {10.2308/ISYS-50569}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/JanvrinPM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KwonUW13, author = {Juhee Kwon and Jackie Rees Ulmer and Tawei Wang}, title = {The Association between Top Management Involvement and Compensation and Information Security Breaches}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {219--236}, year = {2013}, url = {https://doi.org/10.2308/isys-50339}, doi = {10.2308/ISYS-50339}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KwonUW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MoffittV13, author = {Kevin C. Moffitt and Miklos A. Vasarhelyi}, title = {{AIS} in an Age of Big Data}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {1--19}, year = {2013}, url = {https://doi.org/10.2308/isys-10372}, doi = {10.2308/ISYS-10372}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MoffittV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PickardBM13, author = {Matthew D. Pickard and Mary B. Burns and Kevin C. Moffitt}, title = {A Theoretical Justification for Using Embodied Conversational Agents (ECAs) to Augment Accounting-Related Interviews}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {159--176}, year = {2013}, url = {https://doi.org/10.2308/isys-50561}, doi = {10.2308/ISYS-50561}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PickardBM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PrasadGH13, author = {Acklesh Prasad and Peter F. Green and Jon Heales}, title = {On Governing Collaborative Information Technology {(IT):} {A} Relational Perspective}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {237--259}, year = {2013}, url = {https://doi.org/10.2308/isys-50326}, doi = {10.2308/ISYS-50326}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PrasadGH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SchobelD13, author = {Kurt B. Schobel and James S. Denford}, title = {The Chief Information Officer and Chief Financial Officer Dyad in the Public Sector: How an Effective Relationship Impacts Individual Effectiveness and Strategic Alignment}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {261--281}, year = {2013}, url = {https://doi.org/10.2308/isys-50321}, doi = {10.2308/ISYS-50321}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SchobelD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SrivastavaRM13, author = {Rajendra P. Srivastava and Sunita S. Rao and Theodore J. Mock}, title = {Planning and Evaluation of Assurance Services for Sustainability Reporting: An Evidential Reasoning Approach}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {107--126}, year = {2013}, url = {https://doi.org/10.2308/isys-50564}, doi = {10.2308/ISYS-50564}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SrivastavaRM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SteinbartRGD13, author = {Paul John Steinbart and Robyn L. Raschke and Graham Gal and William N. Dilla}, title = {Information Security Professionals' Perceptions about the Relationship between the Information Security and Internal Audit Functions}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {65--86}, year = {2013}, url = {https://doi.org/10.2308/isys-50510}, doi = {10.2308/ISYS-50510}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/SteinbartRGD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/TegardenSD13, author = {David P. Tegarden and Ludwig Christian Schaupp and Richard B. Dull}, title = {Identifying Ontological Modifications to the Resource-Event-Agent {(REA)} Enterprise Ontology Using a Bunge-Wand-Weber Ontological Evaluation}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {105--128}, year = {2013}, url = {https://doi.org/10.2308/isys-50429}, doi = {10.2308/ISYS-50429}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/TegardenSD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Titera13, author = {William R. Titera}, title = {Updating Audit Standard - Enabling Audit Data Analysis}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {325--331}, year = {2013}, url = {https://doi.org/10.2308/isys-50427}, doi = {10.2308/ISYS-50427}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Titera13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Vasarhelyi13, author = {Miklos A. Vasarhelyi}, title = {Formalization of Standards, Automation, Robots, and {IT} Governance}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {1--11}, year = {2013}, url = {https://doi.org/10.2308/isys-10347}, doi = {10.2308/ISYS-10347}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Vasarhelyi13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WatanabeW13, author = {Olena Watanabe and Patrick Wheeler}, title = {Book Review}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {177--180}, year = {2013}, url = {https://doi.org/10.2308/isys-10351}, doi = {10.2308/ISYS-10351}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WatanabeW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Wilkin0MG13, author = {Carla Wilkin and John Campbell and Stephen Moore and Wim Van Grembergen}, title = {Co-Creating Value from {IT} in a Contracted Public Sector Service Environment: Perspectives on {COBIT} and Val {IT}}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {283--306}, year = {2013}, url = {https://doi.org/10.2308/isys-50355}, doi = {10.2308/ISYS-50355}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Wilkin0MG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AlaliY12, author = {Fatima A. Alali and Chia{-}Lun Yeh}, title = {Cloud Computing: Overview and Risk Analysis}, journal = {J. Inf. Syst.}, volume = {26}, number = {2}, pages = {13--33}, year = {2012}, url = {https://doi.org/10.2308/isys-50229}, doi = {10.2308/ISYS-50229}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/AlaliY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AllesG12, author = {Michael G. Alles and Glen L. Gray}, title = {A Relative Cost Framework of Demand for External Assurance of {XBRL} Filings}, journal = {J. Inf. Syst.}, volume = {26}, number = {1}, pages = {103--126}, year = {2012}, url = {https://doi.org/10.2308/isys-10248}, doi = {10.2308/ISYS-10248}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/AllesG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ArnoldBHS12, author = {Vicky Arnold and Tanya S. Benford and Clark Hampton and Steve G. Sutton}, title = {Enterprise Risk Management as a Strategic Governance Mechanism in B2B-Enabled Transnational Supply Chains}, journal = {J. Inf. Syst.}, volume = {26}, number = {1}, pages = {51--76}, year = {2012}, url = {https://doi.org/10.2308/isys-10253}, doi = {10.2308/ISYS-10253}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ArnoldBHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BauerDS12, author = {Tim D. Bauer and Bruce Dehning and Theophanis C. Stratopoulos}, title = {The Financial Performance of Global Information and Communication Technology Companies}, journal = {J. Inf. Syst.}, volume = {26}, number = {2}, pages = {119--152}, year = {2012}, url = {https://doi.org/10.2308/isys-50215}, doi = {10.2308/ISYS-50215}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/BauerDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Borthick12, author = {A. Faye Borthick}, title = {Designing Continuous Auditing for a Highly Automated Procure-to-Pay Process}, journal = {J. Inf. Syst.}, volume = {26}, number = {2}, pages = {153--166}, year = {2012}, url = {https://doi.org/10.2308/isys-50233}, doi = {10.2308/ISYS-50233}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Borthick12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CarsonD12, author = {Elizabeth Carson and Carlin Dowling}, title = {The Competitive Advantage of Audit Support Systems: The Relationship between Extent of Structure and Audit Pricing}, journal = {J. Inf. Syst.}, volume = {26}, number = {1}, pages = {35--49}, year = {2012}, url = {https://doi.org/10.2308/isys-10256}, doi = {10.2308/ISYS-10256}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CarsonD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Escobar-Rodriguez12, author = {Tom{\'{a}}s Escobar{-}Rodr{\'{\i}}guez and Pedro Monge{-}Lozano and Mercedes Romero{-}Alonso}, title = {Acceptance of E-Prescriptions and Automated Medication-Management Systems in Hospitals: An Extension of the Technology Acceptance Model}, journal = {J. Inf. Syst.}, volume = {26}, number = {1}, pages = {77--96}, year = {2012}, url = {https://doi.org/10.2308/isys-10254}, doi = {10.2308/ISYS-10254}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Escobar-Rodriguez12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GonzalezSG12, author = {George C. Gonzalez and Pratyush Nidhi Sharma and Dennis F. Galletta}, title = {Factors Influencing the Planned Adoption of Continuous Monitoring Technology}, journal = {J. Inf. Syst.}, volume = {26}, number = {2}, pages = {53--69}, year = {2012}, url = {https://doi.org/10.2308/isys-50259}, doi = {10.2308/ISYS-50259}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GonzalezSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HuertaSLY12, author = {Esperanza Huerta and Stephen B. Salter and Philip A. Lewis and Pamela Yeow}, title = {Motivating Employees to Share Their Failures in Knowledge Management Systems: Anonymity and Culture}, journal = {J. Inf. Syst.}, volume = {26}, number = {2}, pages = {93--117}, year = {2012}, url = {https://doi.org/10.2308/isys-50214}, doi = {10.2308/ISYS-50214}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HuertaSLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/JanvrinN12, author = {Diane J. Janvrin and Won Gyun No}, title = {{XBRL} Implementation: {A} Field Investigation to Identify Research Opportunities}, journal = {J. Inf. Syst.}, volume = {26}, number = {1}, pages = {169--197}, year = {2012}, url = {https://doi.org/10.2308/isys-10252}, doi = {10.2308/ISYS-10252}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/JanvrinN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/JanvrinPBSC12, author = {Diane J. Janvrin and Elizabeth A. Payne and Paul Byrnes and Gary P. Schneider and Mary B. Curtis}, title = {The Updated {COSO} Internal Control - Integrated Framework: Recommendations and Opportunities for Future Research}, journal = {J. Inf. Syst.}, volume = {26}, number = {2}, pages = {189--213}, year = {2012}, url = {https://doi.org/10.2308/isys-50255}, doi = {10.2308/ISYS-50255}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/JanvrinPBSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KimLN12, author = {Joung W. Kim and Jee{-}Hae Lim and Won Gyun No}, title = {The Effect of First Wave Mandatory {XBRL} Reporting across the Financial Information Environment}, journal = {J. Inf. Syst.}, volume = {26}, number = {1}, pages = {127--153}, year = {2012}, url = {https://doi.org/10.2308/isys-10260}, doi = {10.2308/ISYS-10260}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KimLN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PerolsM12, author = {Johan L. Perols and Uday S. Murthy}, title = {Information Fusion in Continuous Assurance}, journal = {J. Inf. Syst.}, volume = {26}, number = {2}, pages = {35--52}, year = {2012}, url = {https://doi.org/10.2308/isys-50216}, doi = {10.2308/ISYS-50216}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PerolsM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Pinsker12, author = {Robert E. Pinsker}, title = {Book Review}, journal = {J. Inf. Syst.}, volume = {26}, number = {2}, pages = {215--217}, year = {2012}, url = {https://doi.org/10.2308/isys-10307}, doi = {10.2308/ISYS-10307}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Pinsker12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PinskerLBGW12, author = {Robert E. Pinsker and Pei Li and Paul Eric Byrnes and Joshua Gunn and Patrick Wheeler}, title = {Book Review}, journal = {J. Inf. Syst.}, volume = {26}, number = {1}, pages = {207--212}, year = {2012}, url = {https://doi.org/10.2308/isys-10247}, doi = {10.2308/ISYS-10247}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PinskerLBGW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/RoseMNR12, author = {Jacob M. Rose and Britton A. McKay and Carolyn Strand Norman and Anna M. Rose}, title = {Designing Decision Aids to Promote the Development of Expertise}, journal = {J. Inf. Syst.}, volume = {26}, number = {1}, pages = {7--34}, year = {2012}, url = {https://doi.org/10.2308/isys-10188}, doi = {10.2308/ISYS-10188}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/RoseMNR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SrivastavaL12, author = {Rajendra P. Srivastava and Qi Liu}, title = {Special Issue of \emph{JIS} on {XBRL}}, journal = {J. Inf. Syst.}, volume = {26}, number = {1}, pages = {97--101}, year = {2012}, url = {https://doi.org/10.2308/isys-10255}, doi = {10.2308/ISYS-10255}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SrivastavaL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SuttonABP12, author = {Steve G. Sutton and Vicky Arnold and Jean C. Bedard and Jillian R. Phillips}, title = {Enhancing and Structuring the MD{\&}A to Aid Investors when Using Interactive Data}, journal = {J. Inf. Syst.}, volume = {26}, number = {2}, pages = {167--188}, year = {2012}, url = {https://doi.org/10.2308/isys-50256}, doi = {10.2308/ISYS-50256}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SuttonABP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Vasarhelyi12, author = {Miklos A. Vasarhelyi}, title = {{AIS} in a More Rapidly Evolving Era}, journal = {J. Inf. Syst.}, volume = {26}, number = {1}, pages = {1--5}, year = {2012}, url = {https://doi.org/10.2308/isys-10280}, doi = {10.2308/ISYS-10280}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Vasarhelyi12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Vasarhelyi12a, author = {Miklos A. Vasarhelyi}, title = {Financial Accounting Standards Should Not Matter: It's Just a Layer}, journal = {J. Inf. Syst.}, volume = {26}, number = {2}, pages = {1--11}, year = {2012}, url = {https://doi.org/10.2308/isys-10316}, doi = {10.2308/ISYS-10316}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Vasarhelyi12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/VasarhelyiCK12, author = {Miklos A. Vasarhelyi and David Y. Chan and John Peter Krahel}, title = {Consequences of {XBRL} Standardization on Financial Statement Data}, journal = {J. Inf. Syst.}, volume = {26}, number = {1}, pages = {155--167}, year = {2012}, url = {https://doi.org/10.2308/isys-10258}, doi = {10.2308/ISYS-10258}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/VasarhelyiCK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ZhangPMT12, author = {Li Zhang and Amy R. Pawlicki and Dorothy McQuilken and William R. Titera}, title = {The {AICPA} Assurance Services Executive Committee Emerging Assurance Technologies Task Force: The Audit Data Standards {(ADS)} Initiative}, journal = {J. Inf. Syst.}, volume = {26}, number = {1}, pages = {199--205}, year = {2012}, url = {https://doi.org/10.2308/isys-10277}, doi = {10.2308/ISYS-10277}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ZhangPMT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SmithBBH12, title = {The Dark Side of Online Knowledge Sharing}, journal = {J. Inf. Syst.}, volume = {26}, number = {2}, pages = {71--91}, year = {2012}, note = {Withdrawn.}, url = {https://doi.org/10.2308/isys-50244}, doi = {10.2308/ISYS-50244}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SmithBBH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BlaskovichM11, author = {Jennifer Blaskovich and Natalia Mintchik}, title = {Information Technology Outsourcing: {A} Taxonomy of Prior Studies and Directions for Future Research}, journal = {J. Inf. Syst.}, volume = {25}, number = {1}, pages = {1--36}, year = {2011}, url = {https://doi.org/10.2308/jis.2011.25.1.1}, doi = {10.2308/JIS.2011.25.1.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BlaskovichM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoritzN11, author = {J. Efrim Boritz and Won Gyun No}, title = {E-Commerce and Privacy: Exploring What We Know and Opportunities for Future Discovery}, journal = {J. Inf. Syst.}, volume = {25}, number = {2}, pages = {11--45}, year = {2011}, url = {https://doi.org/10.2308/isys-10090}, doi = {10.2308/ISYS-10090}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BoritzN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChenLS11, author = {Changling Chen and Jee{-}Hae Lim and Theophanis C. Stratopoulos}, title = {{IT} Capability and a Firm's Ability to Recover from Losses: Evidence from the Economic Downturn of the Early 2000s}, journal = {J. Inf. Syst.}, volume = {25}, number = {2}, pages = {117--144}, year = {2011}, url = {https://doi.org/10.2308/isys-10108}, doi = {10.2308/ISYS-10108}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChenLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CornellEH11, author = {Robert M. Cornell and Martha M. Eining and Paul Jen{-}Hwa Hu}, title = {The Effects of Process Accountability on Individuals' Use of a Familiar Technology}, journal = {J. Inf. Syst.}, volume = {25}, number = {1}, pages = {109--128}, year = {2011}, url = {https://doi.org/10.2308/jis.2011.25.1.109}, doi = {10.2308/JIS.2011.25.1.109}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CornellEH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Debreceny11, author = {Roger S. Debreceny}, title = {Betwixt and Between? Bringing Information Systems and Accounting Systems Research Together}, journal = {J. Inf. Syst.}, volume = {25}, number = {2}, pages = {1--9}, year = {2011}, url = {https://doi.org/10.2308/isys-10140}, doi = {10.2308/ISYS-10140}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Debreceny11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DebrecenyG11, author = {Roger S. Debreceny and Glen L. Gray}, title = {Data Mining of Electronic Mail and Auditing: {A} Research Agenda}, journal = {J. Inf. Syst.}, volume = {25}, number = {2}, pages = {195--226}, year = {2011}, url = {https://doi.org/10.2308/isys-10167}, doi = {10.2308/ISYS-10167}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DebrecenyG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GrabskiLS11, author = {Severin V. Grabski and Stewart A. Leech and Pamela J. Schmidt}, title = {A Review of {ERP} Research: {A} Future Agenda for Accounting Information Systems}, journal = {J. Inf. Syst.}, volume = {25}, number = {1}, pages = {37--78}, year = {2011}, url = {https://doi.org/10.2308/jis.2011.25.1.37}, doi = {10.2308/JIS.2011.25.1.37}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GrabskiLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HrubyB11, author = {Pavel Hruby and Johannes Buder}, title = {\emph{Model-Driven Design Using Business Patterns }}, journal = {J. Inf. Syst.}, volume = {25}, number = {1}, pages = {213--215}, year = {2011}, url = {https://doi.org/10.2308/jis.2011.25.1.213}, doi = {10.2308/JIS.2011.25.1.213}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HrubyB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KauffmanLPS11, author = {Robert J. Kauffman and Yong Jick Lee and Marilyn Prosch and Paul J. Steinbart}, title = {A Survey of Consumer Information Privacy from the Accounting Information Systems Perspective}, journal = {J. Inf. Syst.}, volume = {25}, number = {2}, pages = {47--79}, year = {2011}, url = {https://doi.org/10.2308/isys-10091}, doi = {10.2308/ISYS-10091}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KauffmanLPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LimDRS11, author = {Jee{-}Hae Lim and Bruce Dehning and Vernon J. Richardson and Rodney E. Smith}, title = {A Meta-Analysis of the Effects of {IT} Investment on Firm Financial Performance}, journal = {J. Inf. Syst.}, volume = {25}, number = {2}, pages = {145--169}, year = {2011}, url = {https://doi.org/10.2308/isys-10125}, doi = {10.2308/ISYS-10125}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/LimDRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LoraasD11, author = {Tina M. Loraas and Michelle Chandler Diaz}, title = {Learning New Technologies: The Effect of Ease of Learning}, journal = {J. Inf. Syst.}, volume = {25}, number = {2}, pages = {171--194}, year = {2011}, url = {https://doi.org/10.2308/isys-10109}, doi = {10.2308/ISYS-10109}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LoraasD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MasliRSS11, author = {Adi Masli and Vernon J. Richardson and Juan Manuel S{\'{a}}nchez and Rodney E. Smith}, title = {The Business Value of {IT:} {A} Synthesis and Framework of Archival Research}, journal = {J. Inf. Syst.}, volume = {25}, number = {2}, pages = {81--116}, year = {2011}, url = {https://doi.org/10.2308/isys-10117}, doi = {10.2308/ISYS-10117}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MasliRSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Morris11, author = {John J. Morris}, title = {The Impact of Enterprise Resource Planning {(ERP)} Systems on the Effectiveness of Internal Controls over Financial Reporting}, journal = {J. Inf. Syst.}, volume = {25}, number = {1}, pages = {129--157}, year = {2011}, url = {https://doi.org/10.2308/jis.2011.25.1.129}, doi = {10.2308/JIS.2011.25.1.129}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Morris11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MurthyS11, author = {Uday S. Murthy and Brad A. Schafer}, title = {The Effects of Relative Performance Information and Framed Information Systems Feedback on Performance in a Production Task}, journal = {J. Inf. Syst.}, volume = {25}, number = {1}, pages = {159--184}, year = {2011}, url = {https://doi.org/10.2308/jis.2011.25.1.159}, doi = {10.2308/JIS.2011.25.1.159}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MurthyS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/NeelyC11, author = {M. Pamela Neely and Jack S. Cook}, title = {Fifteen Years of Data and Information Quality Literature: Developing a Research Agenda for Accounting}, journal = {J. Inf. Syst.}, volume = {25}, number = {1}, pages = {79--108}, year = {2011}, url = {https://doi.org/10.2308/jis.2011.25.1.79}, doi = {10.2308/JIS.2011.25.1.79}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/NeelyC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PinskerS11, author = {Robert E. Pinsker and Thomas J. Smith}, title = {Book Review}, journal = {J. Inf. Syst.}, volume = {25}, number = {2}, pages = {227--229}, year = {2011}, url = {https://doi.org/10.2308/isys-10155}, doi = {10.2308/ISYS-10155}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PinskerS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Wallace0C11, author = {Linda G. Wallace and Hui Lin and Meghann Cefaratti}, title = {Information Security and Sarbanes-Oxley Compliance: An Exploratory Study}, journal = {J. Inf. Syst.}, volume = {25}, number = {1}, pages = {185--211}, year = {2011}, url = {https://doi.org/10.2308/jis.2011.25.1.185}, doi = {10.2308/JIS.2011.25.1.185}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Wallace0C11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AmerR10, author = {T. S. Amer and Sury Ravindran}, title = {The Effect of Visual Illusions on the Graphical Display of Information}, journal = {J. Inf. Syst.}, volume = {24}, number = {1}, pages = {23--42}, year = {2010}, url = {https://doi.org/10.2308/jis.2010.24.1.23}, doi = {10.2308/JIS.2010.24.1.23}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/AmerR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Barra10, author = {Roberta Ann Barra}, title = {The Impact of Internal Controls and Penalties on Fraud}, journal = {J. Inf. Syst.}, volume = {24}, number = {1}, pages = {1--21}, year = {2010}, url = {https://doi.org/10.2308/jis.2010.24.1.1}, doi = {10.2308/JIS.2010.24.1.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Barra10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BartT10, author = {Chris K. Bart and Ofir Turel}, title = {{IT} and the Board of Directors: An Empirical Investigation into the "Governance Questions" Canadian Board Members Ask about {IT}}, journal = {J. Inf. Syst.}, volume = {24}, number = {2}, pages = {147--172}, year = {2010}, url = {https://doi.org/10.2308/jis.2010.24.2.147}, doi = {10.2308/JIS.2010.24.2.147}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BartT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Blaskovich10, author = {Jennifer Blaskovich}, title = {I. Ayers: \emph{Super Crunchers: Why Thinking-By-Numbers is the New Way to be Smart}}, journal = {J. Inf. Syst.}, volume = {24}, number = {1}, pages = {113--116}, year = {2010}, url = {https://doi.org/10.2308/jis.2010.24.1.113}, doi = {10.2308/JIS.2010.24.1.113}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Blaskovich10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DillaJR10, author = {William N. Dilla and Diane J. Janvrin and Robyn L. Raschke}, title = {Interactive Data Visualization: New Directions for Accounting Information Systems Research}, journal = {J. Inf. Syst.}, volume = {24}, number = {2}, pages = {1--37}, year = {2010}, url = {https://doi.org/10.2308/jis.2010.24.2.1}, doi = {10.2308/JIS.2010.24.2.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DillaJR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HendersonKRS10, author = {B. Charlene Henderson and Kevin W. Kobelsky and Vernon J. Richardson and Rodney E. Smith}, title = {The Relevance of Information Technology Expenditures}, journal = {J. Inf. Syst.}, volume = {24}, number = {2}, pages = {39--77}, year = {2010}, url = {https://doi.org/10.2308/jis.2010.24.2.39}, doi = {10.2308/JIS.2010.24.2.39}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HendersonKRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KeltonPT10, author = {Andrea Seaton Kelton and Robin R. Pennington and Brad M. Tuttle}, title = {The Effects of Information Presentation Format on Judgment and Decision Making: {A} Review of the Information Systems Research}, journal = {J. Inf. Syst.}, volume = {24}, number = {2}, pages = {79--105}, year = {2010}, url = {https://doi.org/10.2308/jis.2010.24.2.79}, doi = {10.2308/JIS.2010.24.2.79}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KeltonPT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KuhnS10, author = {John R. Kuhn Jr. and Steve G. Sutton}, title = {Continuous Auditing in {ERP} System Environments: The Current State and Future Directions}, journal = {J. Inf. Syst.}, volume = {24}, number = {1}, pages = {91--112}, year = {2010}, url = {https://doi.org/10.2308/jis.2010.24.1.91}, doi = {10.2308/JIS.2010.24.1.91}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KuhnS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MuhannaS10, author = {Waleed A. Muhanna and M. Dale Stoel}, title = {How Do Investors Value IT? An Empirical Investigation of the Value Relevance of {IT} Capability and {IT} Spending Across Industries}, journal = {J. Inf. Syst.}, volume = {24}, number = {1}, pages = {43--66}, year = {2010}, url = {https://doi.org/10.2308/jis.2010.24.1.43}, doi = {10.2308/JIS.2010.24.1.43}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MuhannaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WilkinC10, author = {Carla L. Wilkin and Robert H. Chenhall}, title = {A Review of {IT} Governance: {A} Taxonomy to Inform Accounting Information Systems}, journal = {J. Inf. Syst.}, volume = {24}, number = {2}, pages = {107--146}, year = {2010}, url = {https://doi.org/10.2308/jis.2010.24.2.107}, doi = {10.2308/JIS.2010.24.2.107}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WilkinC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HuntonN10, title = {The Impact of Alternative Telework Arrangements on Organizational Commitment: Insights from a Longitudinal Field Experiment}, journal = {J. Inf. Syst.}, volume = {24}, number = {1}, pages = {67--90}, year = {2010}, note = {Withdrawn.}, url = {https://doi.org/10.2308/jis.2010.24.1.67}, doi = {10.2308/JIS.2010.24.1.67}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HuntonN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoritzN09, author = {J. Efrim Boritz and Won Gyun No}, title = {Assurance on XBRL-Related Documents: The Case of United Technologies Corporation}, journal = {J. Inf. Syst.}, volume = {23}, number = {2}, pages = {49--78}, year = {2009}, url = {https://doi.org/10.2308/jis.2009.23.2.49}, doi = {10.2308/JIS.2009.23.2.49}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BoritzN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CallahanGS09, author = {Carolyn M. Callahan and E. Ann Gabriel and Rodney E. Smith}, title = {The Effects of Inter-Firm Cost Correlation, {IT} Investment, and Product Cost Accuracy on Production Decisions and Firm Profitability}, journal = {J. Inf. Syst.}, volume = {23}, number = {1}, pages = {51--78}, year = {2009}, url = {https://doi.org/10.2308/jis.2009.23.1.51}, doi = {10.2308/JIS.2009.23.1.51}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CallahanGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CurtisJBD09, author = {Mary B. Curtis and J. Gregory Jenkins and Jean C. Bedard and Donald R. Deis}, title = {Auditors' Training and Proficiency in Information Systems: {A} Research Synthesis}, journal = {J. Inf. Syst.}, volume = {23}, number = {1}, pages = {79--96}, year = {2009}, url = {https://doi.org/10.2308/jis.2009.23.1.79}, doi = {10.2308/JIS.2009.23.1.79}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CurtisJBD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DowSW09, author = {Kevin E. Dow and Vincent J. Shea II and Bobby E. Waldrup}, title = {Daytona Dreams Restaurant: Linking Accounting Systems with Business Valuation}, journal = {J. Inf. Syst.}, volume = {23}, number = {1}, pages = {119--136}, year = {2009}, url = {https://doi.org/10.2308/jis.2009.23.1.119}, doi = {10.2308/JIS.2009.23.1.119}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DowSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DunnKM09, author = {Kimberly Dunn and Mark Kohlbeck and Matthew Magilke}, title = {Future Profitability, Operating Cash Flows, and Market Valuations Associated with Offshoring Arrangements of Technology Jobs}, journal = {J. Inf. Syst.}, volume = {23}, number = {2}, pages = {25--47}, year = {2009}, url = {https://doi.org/10.2308/jis.2009.23.2.25}, doi = {10.2308/JIS.2009.23.2.25}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DunnKM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/JanvrinBL09, author = {Diane Janvrin and James Bierstaker and D. Jordan Lowe}, title = {An Investigation of Factors Influencing the Use of Computer-Related Audit Procedures}, journal = {J. Inf. Syst.}, volume = {23}, number = {1}, pages = {97--118}, year = {2009}, url = {https://doi.org/10.2308/jis.2009.23.1.97}, doi = {10.2308/JIS.2009.23.1.97}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/JanvrinBL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KlammW09, author = {Bonnie K. Klamm and Marcia Weidenmier Watson}, title = {{SOX} 404 Reported Internal Control Weaknesses: {A} Test of {COSO} Framework Components and Information Technology}, journal = {J. Inf. Syst.}, volume = {23}, number = {2}, pages = {1--23}, year = {2009}, url = {https://doi.org/10.2308/jis.2009.23.2.1}, doi = {10.2308/JIS.2009.23.2.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KlammW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LeeWO09, author = {Chih{-}Chen Lee and Robert B. Welker and Marcus D. Odom}, title = {Features of Computer-Mediated, Text-Based Messages that Support Automatable, Linguistics-Based Indicators for Deception Detection}, journal = {J. Inf. Syst.}, volume = {23}, number = {1}, pages = {5--24}, year = {2009}, url = {https://doi.org/10.2308/jis.2009.23.1.24}, doi = {10.2308/JIS.2009.23.1.24}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LeeWO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Pinsker09, author = {Robert E. Pinsker}, title = {Book Reviews}, journal = {J. Inf. Syst.}, volume = {23}, number = {1}, pages = {137--142}, year = {2009}, url = {https://doi.org/10.2308/jis.2009.23.1.137}, doi = {10.2308/JIS.2009.23.1.137}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Pinsker09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Pinsker09a, author = {Robert E. Pinsker}, title = {Book Reviews}, journal = {J. Inf. Syst.}, volume = {23}, number = {2}, pages = {79--84}, year = {2009}, url = {https://doi.org/10.2308/jis.2009.23.2.79}, doi = {10.2308/JIS.2009.23.2.79}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Pinsker09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PinskerW09, author = {Robert E. Pinsker and Patrick Wheeler}, title = {The Effects of Expanded Independent Assurance on the Use of Firm-Initiated Disclosures by Investors with Limited Business Knowledge}, journal = {J. Inf. Syst.}, volume = {23}, number = {1}, pages = {25--49}, year = {2009}, url = {https://doi.org/10.2308/jis.2009.23.1.25}, doi = {10.2308/JIS.2009.23.1.25}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PinskerW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Steinbart09, author = {Paul John Steinbart}, title = {Thoughts about the Future of the Journal of Information Systems}, journal = {J. Inf. Syst.}, volume = {23}, number = {1}, pages = {1--4}, year = {2009}, url = {https://doi.org/10.2308/jis.2009.23.1.1}, doi = {10.2308/JIS.2009.23.1.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Steinbart09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Steinbart09a, author = {Paul John Steinbart}, title = {\emph{Journal of Information Systems} Editor's Report}, journal = {J. Inf. Syst.}, volume = {23}, number = {2}, pages = {85--89}, year = {2009}, url = {https://doi.org/10.2308/jis.2009.23.2.85}, doi = {10.2308/JIS.2009.23.2.85}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Steinbart09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AllesKV08, author = {Michael G. Alles and Alexander Kogan and Miklos A. Vasarhelyi}, title = {Putting Continuous Auditing Theory into Practice: Lessons from Two Pilot Implementations}, journal = {J. Inf. Syst.}, volume = {22}, number = {2}, pages = {195--214}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.2.195}, doi = {10.2308/JIS.2008.22.2.195}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/AllesKV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BajajBC08, author = {Akhilesh Bajaj and Wray Bradley and Karen S. Cravens}, title = {{SAAS:} Integrating Systems Analysis with Accounting and Strategy for Ex Ante Evaluation of {IS} Investments}, journal = {J. Inf. Syst.}, volume = {22}, number = {1}, pages = {97--124}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.1.97}, doi = {10.2308/JIS.2008.22.1.97}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BajajBC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Blaskovich08, author = {Jennifer Blaskovich}, title = {Exploring the Effect of Distance: An Experimental Investigation of Virtual Collaboration, Social Loafing, and Group Decisions}, journal = {J. Inf. Syst.}, volume = {22}, number = {1}, pages = {27--46}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.1.27}, doi = {10.2308/JIS.2008.22.1.27}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Blaskovich08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BollenHLB08, author = {Laury Bollen and Harold Hassink and Rindert K. de Lange and Saskia D. Buijl}, title = {Best Practices in Managing Investor Relations Websites: Directions for Future Research}, journal = {J. Inf. Syst.}, volume = {22}, number = {2}, pages = {171--194}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.2.171}, doi = {10.2308/JIS.2008.22.2.171}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BollenHLB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BorthickB08, author = {A. Faye Borthick and Paul L. Bowen}, title = {Auditing System Development: Constructing the Meaning of "Systematic and Rational" in the Context of Legacy Code Migration for Vendor Incentives}, journal = {J. Inf. Syst.}, volume = {22}, number = {1}, pages = {47--62}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.1.47}, doi = {10.2308/JIS.2008.22.1.47}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BorthickB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BorthickBG08, author = {A. Faye Borthick and Paul L. Bowen and Gregory J. Gerard}, title = {Modeling a Business Process and Querying the Resulting Database: Analyzing {RFID} Data to Develop Business Intelligence}, journal = {J. Inf. Syst.}, volume = {22}, number = {2}, pages = {331--350}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.2.331}, doi = {10.2308/JIS.2008.22.2.331}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BorthickBG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BorthickC08, author = {A. Faye Borthick and Mary B. Curtis}, title = {Due Diligence on Fast-Fashion Inventory through Data Querying}, journal = {J. Inf. Syst.}, volume = {22}, number = {1}, pages = {77--93}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.1.77}, doi = {10.2308/JIS.2008.22.1.77}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BorthickC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BrazelD08, author = {Joseph F. Brazel and Li Dang}, title = {The Effect of {ERP} System Implementations on the Management of Earnings and Earnings Release Dates}, journal = {J. Inf. Syst.}, volume = {22}, number = {2}, pages = {1--21}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.2.1}, doi = {10.2308/JIS.2008.22.2.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BrazelD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChurchS08, author = {Kim S. Church and Rodney E. Smith}, title = {{REA} Ontology-Based Simulation Models for Enterprise Strategic Planning}, journal = {J. Inf. Syst.}, volume = {22}, number = {2}, pages = {301--329}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.2.301}, doi = {10.2308/JIS.2008.22.2.301}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChurchS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Fordham08, author = {David R. Fordham}, title = {A Discovery-Learning Classroom Case on Accounting Data Transmission Systems}, journal = {J. Inf. Syst.}, volume = {22}, number = {2}, pages = {103--122}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.2.103}, doi = {10.2308/JIS.2008.22.2.103}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Fordham08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GaillyLP08, author = {Frederik Gailly and Wim Laurier and Geert Poels}, title = {Positioning and Formalizing the {REA} Enterprise Ontology}, journal = {J. Inf. Syst.}, volume = {22}, number = {2}, pages = {219--248}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.2.219}, doi = {10.2308/JIS.2008.22.2.219}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GaillyLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Geerts08, author = {Guido L. Geerts}, title = {Introduction to the {REA} 25th Anniversary Special Section}, journal = {J. Inf. Syst.}, volume = {22}, number = {2}, pages = {215--217}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.2.215}, doi = {10.2308/JIS.2008.22.2.215}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Geerts08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GeertsT08, author = {Guido L. Geerts and Kinsun Tam}, title = {KaDo: An Advanced Enterprise Modeling, Database Design, Database Implementation, and Information Retrieval Case for the Accounting Information Systems Class}, journal = {J. Inf. Syst.}, volume = {22}, number = {2}, pages = {141--150}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.2.141}, doi = {10.2308/JIS.2008.22.2.141}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GeertsT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GelinasST08, author = {Ulric J. Gelinas Jr. and David L. Schwarzkopf and Jay C. Thibodeau}, title = {Introducing Students to the Integrated Audit with "Auditing Alchemy, Inc."}, journal = {J. Inf. Syst.}, volume = {22}, number = {2}, pages = {151--170}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.2.151}, doi = {10.2308/JIS.2008.22.2.151}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GelinasST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LevitanGC08, author = {Alan S. Levitan and Jian Guan and Andrew Cobb}, title = {Modeling an Object-Oriented Accounting System with Computer-Aided Software Engineering}, journal = {J. Inf. Syst.}, volume = {22}, number = {2}, pages = {123--139}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.2.123}, doi = {10.2308/JIS.2008.22.2.123}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LevitanGC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LoraasM08, author = {Tina M. Loraas and Jennifer M. Mueller}, title = {Bridging the Gap between Spreadsheet Use and Control: An Instructional Case}, journal = {J. Inf. Syst.}, volume = {22}, number = {1}, pages = {161--172}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.1.161}, doi = {10.2308/JIS.2008.22.1.161}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LoraasM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/McCallAS08, author = {Holli McCall and Vicky Arnold and Steve G. Sutton}, title = {Use of Knowledge Management Systems and the Impact on the Acquisition of Explicit Knowledge}, journal = {J. Inf. Syst.}, volume = {22}, number = {2}, pages = {77--101}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.2.77}, doi = {10.2308/JIS.2008.22.2.77}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/McCallAS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/RaschkeS08, author = {Robyn L. Raschke and Paul John Steinbart}, title = {Mitigating the Effects of Misleading Graphs on Decisions by Educating Users about the Principles of Graph Design}, journal = {J. Inf. Syst.}, volume = {22}, number = {2}, pages = {23--52}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.2.23}, doi = {10.2308/JIS.2008.22.2.23}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/RaschkeS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SavageNL08, author = {Arline Savage and Carolyn Strand Norman and Kathryn A. S. Lancaster}, title = {Using a Movie to Study the {COSO} Internal Control Framework: An Instructional Case}, journal = {J. Inf. Syst.}, volume = {22}, number = {1}, pages = {63--76}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.1.63}, doi = {10.2308/JIS.2008.22.1.63}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SavageNL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SedbrookN08, author = {Tod A. Sedbrook and Richard I. Newmark}, title = {Automating {REA} Policy Level Specifications with Semantic Web Technologies}, journal = {J. Inf. Syst.}, volume = {22}, number = {2}, pages = {249--277}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.2.249}, doi = {10.2308/JIS.2008.22.2.249}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SedbrookN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WangGWZ08, author = {Li Wang and Kholekile L. Gwebu and Jing Wang and David X. Zhu}, title = {The Aftermath of Information Technology Outsourcing: An Empirical Study of Firm Performance Following Outsourcing Decisions}, journal = {J. Inf. Syst.}, volume = {22}, number = {1}, pages = {125--159}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.1.125}, doi = {10.2308/JIS.2008.22.1.125}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WangGWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WheelerJ08, author = {Patrick Wheeler and Donald R. Jones}, title = {The Psychology of Case-Based Reasoning: How Information Produced from Case-Matching Methods Facilitates the Use of Statistically Generated Information}, journal = {J. Inf. Syst.}, volume = {22}, number = {1}, pages = {1--25}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.1.1}, doi = {10.2308/JIS.2008.22.1.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WheelerJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/White08, author = {John H. White}, title = {{REA} Modeling of Mining Companies}, journal = {J. Inf. Syst.}, volume = {22}, number = {2}, pages = {279--299}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.2.279}, doi = {10.2308/JIS.2008.22.2.279}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/White08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WolfeD08, author = {Christopher J. Wolfe and Bruce Dehning}, title = {Preface to the 2007 Research Forum}, journal = {J. Inf. Syst.}, volume = {22}, number = {1}, pages = {95}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.1.95}, doi = {10.2308/JIS.2008.22.1.95}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WolfeD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WolfeL08, author = {Christopher J. Wolfe and Tina M. Loraas}, title = {Knowledge Sharing: The Effects of Incentives, Environment, and Person}, journal = {J. Inf. Syst.}, volume = {22}, number = {2}, pages = {53--76}, year = {2008}, url = {https://doi.org/10.2308/jis.2008.22.2.53}, doi = {10.2308/JIS.2008.22.2.53}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WolfeL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AmerM07, author = {T. S. Amer and Jo{-}Mae B. Maris}, title = {Signal Words and Signal Icons in Application Control and Information Technology Exception Messages - Hazard Matching and Habituation Effects}, journal = {J. Inf. Syst.}, volume = {21}, number = {2}, pages = {1--25}, year = {2007}, url = {https://doi.org/10.2308/jis.2007.21.2.1}, doi = {10.2308/JIS.2007.21.2.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/AmerM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AshkanasyBRW07, author = {Neal Ashkanasy and Paul L. Bowen and Fiona H. Rohde and Chiu Yueh Alice Wu}, title = {The Effects of User Characteristics on Query Performance in the Presence of Information Request Ambiguity}, journal = {J. Inf. Syst.}, volume = {21}, number = {1}, pages = {53--82}, year = {2007}, url = {https://doi.org/10.2308/jis.2007.21.1.53}, doi = {10.2308/JIS.2007.21.1.53}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/AshkanasyBRW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Ben-MenachemG07, author = {Mordechai Ben{-}Menachem and Ilanit Gavious}, title = {Accounting Software Assets: {A} Valuation Model for Software}, journal = {J. Inf. Syst.}, volume = {21}, number = {2}, pages = {117--132}, year = {2007}, url = {https://doi.org/10.2308/jis.2007.21.2.117}, doi = {10.2308/JIS.2007.21.2.117}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Ben-MenachemG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BorthickJ07, author = {A. Faye Borthick and Donald R. Jones}, title = {Creating a Business Process Diagram and Database Queries to Detect Billing Errors and Analyze Calling Patterns for Cell Phone Service}, journal = {J. Inf. Syst.}, volume = {21}, number = {1}, pages = {107--122}, year = {2007}, url = {https://doi.org/10.2308/jis.2007.21.1.107}, doi = {10.2308/JIS.2007.21.1.107}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BorthickJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BradfordRR07, author = {Marianne Bradford and Sandra B. Richtermeyer and Douglas F. Roberts}, title = {System Diagramming Techniques: An Analysis of Methods Used in Accounting Education and Practice}, journal = {J. Inf. Syst.}, volume = {21}, number = {1}, pages = {173--212}, year = {2007}, url = {https://doi.org/10.2308/jis.2007.21.1.173}, doi = {10.2308/JIS.2007.21.1.173}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BradfordRR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BurneyM07, author = {Laurie L. Burney and Michele Matherly}, title = {Examining Performance Measurement from an Integrated Perspective}, journal = {J. Inf. Syst.}, volume = {21}, number = {2}, pages = {49--68}, year = {2007}, url = {https://doi.org/10.2308/jis.2007.21.2.49}, doi = {10.2308/JIS.2007.21.2.49}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BurneyM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChanW07, author = {Siew H. Chan and Sally Wright}, title = {Feasibility of More Frequent Reporting: {A} Field Study Informed Survey of In-Company Accounting and {IT} Professionals}, journal = {J. Inf. Syst.}, volume = {21}, number = {2}, pages = {99--115}, year = {2007}, url = {https://doi.org/10.2308/jis.2007.21.2.99}, doi = {10.2308/JIS.2007.21.2.99}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChanW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChurchS07, author = {Kim S. Church and Rodney E. Smith}, title = {An Extension of the {REA} Framework to Support Balanced Scorecard Information Requirements}, journal = {J. Inf. Syst.}, volume = {21}, number = {1}, pages = {1--25}, year = {2007}, url = {https://doi.org/10.2308/jis.2007.21.1.1}, doi = {10.2308/JIS.2007.21.1.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChurchS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DaigleHH07, author = {Ronald J. Daigle and David C. Hayes and K. E. Hughes II}, title = {Assessing Student Learning Outcomes in the Introductory Accounting Information Systems Course Using the AICPA's Core Competency Framework}, journal = {J. Inf. Syst.}, volume = {21}, number = {1}, pages = {149--169}, year = {2007}, url = {https://doi.org/10.2308/jis.2007.21.1.149}, doi = {10.2308/JIS.2007.21.1.149}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DaigleHH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Dunn07, author = {Cheryl L. Dunn}, title = {Book Review, Cheryl L. Dunn, Editor}, journal = {J. Inf. Syst.}, volume = {21}, number = {1}, pages = {213--214}, year = {2007}, url = {https://doi.org/10.2308/jis.2007.21.1.213}, doi = {10.2308/JIS.2007.21.1.213}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Dunn07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KhallafS07, author = {Ashraf Khallaf and Terrance R. Skantz}, title = {The Effects of Information Technology Expertise on the Market Value of a Firm}, journal = {J. Inf. Syst.}, volume = {21}, number = {1}, pages = {83--105}, year = {2007}, url = {https://doi.org/10.2308/jis.2007.21.1.83}, doi = {10.2308/JIS.2007.21.1.83}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KhallafS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LehmannHN07, author = {Constance M. Lehmann and Cynthia D. Heagy and Carolyn Strand Norman}, title = {The Evaluation of Application Controls in Accounting Software: {A} Short Instructional Case}, journal = {J. Inf. Syst.}, volume = {21}, number = {2}, pages = {87--98}, year = {2007}, url = {https://doi.org/10.2308/jis.2007.21.2.87}, doi = {10.2308/JIS.2007.21.2.87}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LehmannHN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PengVB07, author = {Jacob Peng and Ralph E. Viator and Steve Buchheit}, title = {An Experimental Study of Multidimensional Hierarchical Accounting Data: Drill-Down Paths Can Influence Economic Decisions}, journal = {J. Inf. Syst.}, volume = {21}, number = {2}, pages = {69--86}, year = {2007}, url = {https://doi.org/10.2308/jis.2007.21.2.69}, doi = {10.2308/JIS.2007.21.2.69}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PengVB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SmedleyS07, author = {Georgia Smedley and Steve G. Sutton}, title = {The Effect of Alternative Procedural Explanation Types on Procedural Knowledge Acquisition during Knowledge-Based Systems Use}, journal = {J. Inf. Syst.}, volume = {21}, number = {1}, pages = {27--51}, year = {2007}, url = {https://doi.org/10.2308/jis.2007.21.1.27}, doi = {10.2308/JIS.2007.21.1.27}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SmedleyS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Walters07, author = {L. Melissa Walters}, title = {A Draft of an Information Systems Security and Control Course}, journal = {J. Inf. Syst.}, volume = {21}, number = {1}, pages = {123--148}, year = {2007}, url = {https://doi.org/10.2308/jis.2007.21.1.123}, doi = {10.2308/JIS.2007.21.1.123}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Walters07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WangA07, author = {Li Wang and Pervaiz Alam}, title = {Information Technology Capability: Firm Valuation, Earnings Uncertainty, and Forecast Accuracy}, journal = {J. Inf. Syst.}, volume = {21}, number = {2}, pages = {27--48}, year = {2007}, url = {https://doi.org/10.2308/jis.2007.21.2.27}, doi = {10.2308/JIS.2007.21.2.27}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WangA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/0001KR06, author = {Wonseok Oh and Joung W. Kim and Vernon J. Richardson}, title = {The Moderating Effect of Context on the Market Reaction to {IT} Investments}, journal = {J. Inf. Syst.}, volume = {20}, number = {1}, pages = {19--44}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.1.19}, doi = {10.2308/JIS.2006.20.1.19}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/0001KR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Abu-Musa06, author = {Ahmad A. Abu{-}Musa}, title = {Perceived Security Threats of Computerized Accounting Information Systems in the Egyptian Banking Industry}, journal = {J. Inf. Syst.}, volume = {20}, number = {1}, pages = {187--203}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.1.187}, doi = {10.2308/JIS.2006.20.1.187}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Abu-Musa06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BehnSW06, author = {Bruce Behn and DeWayne Searcy and Jonathan B. Woodroof}, title = {A Within Firm Analysis of Current and Expected Future Audit Lag Determinants}, journal = {J. Inf. Syst.}, volume = {20}, number = {1}, pages = {65--86}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.1.65}, doi = {10.2308/JIS.2006.20.1.65}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BehnSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Blankley06, author = {Alan I. Blankley}, title = {Using {SQL} to Develop Database Query Proficiency: {A} Follow-Up Note to Borthick, Jones, and Kim {(2001)}}, journal = {J. Inf. Syst.}, volume = {20}, number = {1}, pages = {117--137}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.1.117}, doi = {10.2308/JIS.2006.20.1.117}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Blankley06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CockrellMS06, author = {R. Cameron Cockrell and W. Timothy Mitchell and Dan N. Stone}, title = {Negotiating the Emerging "Flat" World}, journal = {J. Inf. Syst.}, volume = {20}, number = {2}, pages = {143--146}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.2.143}, doi = {10.2308/JIS.2006.20.2.143}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CockrellMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Dunn06, author = {Cheryl L. Dunn}, title = {Book Review}, journal = {J. Inf. Syst.}, volume = {20}, number = {1}, pages = {221--223}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.1.221}, doi = {10.2308/JIS.2006.20.1.221}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Dunn06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Farewell06, author = {Stephanie M. Farewell}, title = {An Introduction to {XBRL} through the Use of Research and Technical Assignments}, journal = {J. Inf. Syst.}, volume = {20}, number = {1}, pages = {161--185}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.1.161}, doi = {10.2308/JIS.2006.20.1.161}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Farewell06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/FisherB06, author = {Ingrid E. Fisher and Marianne Bradford}, title = {New York State Agencies: {A} Case Study for Analyzing the Process of Legacy System Migration: Part {II}}, journal = {J. Inf. Syst.}, volume = {20}, number = {1}, pages = {139--160}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.1.139}, doi = {10.2308/JIS.2006.20.1.139}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/FisherB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GeertsM06, author = {Guido L. Geerts and William E. McCarthy}, title = {Policy-Level Specifications in {REA} Enterprise Information Systems}, journal = {J. Inf. Syst.}, volume = {20}, number = {2}, pages = {37--63}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.2.37}, doi = {10.2308/JIS.2006.20.2.37}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GeertsM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GelinasG06, author = {Ulric J. Gelinas Jr. and Janis L. Gogan}, title = {Accountants and Emerging Technologies: {A} Case Study at the United States Department of the Treasury Bureau of Engraving and Printing}, journal = {J. Inf. Syst.}, volume = {20}, number = {2}, pages = {93--116}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.2.93}, doi = {10.2308/JIS.2006.20.2.93}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GelinasG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GrantC06, author = {Gerry H. Grant and Sumali J. Conlon}, title = {{EDGAR} Extraction System: An Automated Approach to Analyze Employee Stock Option Disclosures}, journal = {J. Inf. Syst.}, volume = {20}, number = {2}, pages = {119--142}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.2.119}, doi = {10.2308/JIS.2006.20.2.119}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GrantC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LehmannH06, author = {Constance M. Lehmann and Cynthia D. Heagy}, title = {An Introduction to the Clinical Case Representation Paradigm for Information Systems Research}, journal = {J. Inf. Syst.}, volume = {20}, number = {1}, pages = {87--101}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.1.87}, doi = {10.2308/JIS.2006.20.1.87}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LehmannH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LinS06, author = {Pao{-}Chuan (Paul) Lin and L. Murphy Smith}, title = {Using a Web-Based Accounting System for Teaching Accounting System Design and Implementation}, journal = {J. Inf. Syst.}, volume = {20}, number = {2}, pages = {65--79}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.2.65}, doi = {10.2308/JIS.2006.20.2.65}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LinS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LoraasW06, author = {Tina M. Loraas and Christopher J. Wolfe}, title = {Why Wait? Modeling Factors that Influence the Decision of When to Learn a New Use of Technology}, journal = {J. Inf. Syst.}, volume = {20}, number = {2}, pages = {1--23}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.2.1}, doi = {10.2308/JIS.2006.20.2.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LoraasW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Nikitkov06, author = {Alexey N. Nikitkov}, title = {Information Assurance Seals: How They Impact Consumer Purchasing Behavior}, journal = {J. Inf. Syst.}, volume = {20}, number = {1}, pages = {1--17}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.1.1}, doi = {10.2308/JIS.2006.20.1.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Nikitkov06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PenningtonKD06, author = {Robin R. Pennington and Andrea S. Kelton and Delwyn D. DeVries}, title = {The Effects of Qualitative Overload on Technology Acceptance}, journal = {J. Inf. Syst.}, volume = {20}, number = {2}, pages = {25--36}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.2.25}, doi = {10.2308/JIS.2006.20.2.25}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PenningtonKD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Reck06, author = {Jacqueline L. Reck}, title = {Discussion of The Moderating Effect of Context on the Market Reaction to {IT} Investments}, journal = {J. Inf. Syst.}, volume = {20}, number = {1}, pages = {45--48}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.1.45}, doi = {10.2308/JIS.2006.20.1.45}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Reck06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SinasonN06, author = {David H. Sinason and Carol J. Normand}, title = {Omni Furniture Company: {A} Systems Development Life Cycle Case}, journal = {J. Inf. Syst.}, volume = {20}, number = {2}, pages = {81--91}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.2.81}, doi = {10.2308/JIS.2006.20.2.81}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SinasonN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Taylor06, author = {Eileen Z. Taylor}, title = {The Effect of Incentives on Knowledge Sharing in Computer-Mediated Communication: An Experimental Investigation}, journal = {J. Inf. Syst.}, volume = {20}, number = {1}, pages = {103--116}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.1.103}, doi = {10.2308/JIS.2006.20.1.103}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Taylor06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WeidenmierR06, author = {Marcia L. Weidenmier and Sridhar Ramamoorti}, title = {Research Opportunities in Information Technology and Internal Auditing}, journal = {J. Inf. Syst.}, volume = {20}, number = {1}, pages = {205--219}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.1.205}, doi = {10.2308/JIS.2006.20.1.205}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WeidenmierR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WoolleyE06, author = {Darryl J. Woolley and Martha M. Eining}, title = {Software Piracy among Accounting Students: {A} Longitudinal Comparison of Changes and Sensitivity}, journal = {J. Inf. Syst.}, volume = {20}, number = {1}, pages = {49--63}, year = {2006}, url = {https://doi.org/10.2308/jis.2006.20.1.49}, doi = {10.2308/JIS.2006.20.1.49}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WoolleyE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Amer05, author = {T. S. Amer}, title = {Bias Due to Visual Illusion in the Graphical Presentation of Accounting Information}, journal = {J. Inf. Syst.}, volume = {19}, number = {1}, pages = {1--18}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.1.1}, doi = {10.2308/JIS.2005.19.1.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Amer05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BorthickJ05, author = {A. Faye Borthick and Donald R. Jones}, title = {Analyzing a Potential Warranty Call Center Budget Overrun: Using Database Queries to Solve Business Problems}, journal = {J. Inf. Syst.}, volume = {19}, number = {1}, pages = {97--111}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.1.97}, doi = {10.2308/JIS.2005.19.1.97}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BorthickJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoveeKNSV05, author = {Matthew Bovee and Alexander Kogan and Kay M. Nelson and Rajendra P. Srivastava and Miklos A. Vasarhelyi}, title = {Financial Reporting and Auditing Agent with Net Knowledge {(FRAANK)} and eXtensible Business Reporting Language {(XBRL)}}, journal = {J. Inf. Syst.}, volume = {19}, number = {1}, pages = {19--41}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.1.19}, doi = {10.2308/JIS.2005.19.1.19}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BoveeKNSV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BrownDM05, author = {Darrell L. Brown and Jesse F. Dillard and R. Scott Marshall}, title = {Strategically Informed, Environmentally Conscious Information Requirements for Accounting Information Systems}, journal = {J. Inf. Syst.}, volume = {19}, number = {2}, pages = {79--103}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.2.79}, doi = {10.2308/JIS.2005.19.2.79}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BrownDM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DebrecenyB05, author = {Roger S. Debreceny and Paul L. Bowen}, title = {The Effects on End-User Query Performance of Incorporating Object-Oriented Abstractions in Database Accounting Systems}, journal = {J. Inf. Syst.}, volume = {19}, number = {1}, pages = {43--74}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.1.43}, doi = {10.2308/JIS.2005.19.1.43}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DebrecenyB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DebrecenyCCGHHJ05, author = {Roger S. Debreceny and Akhilesh Chandra and John J. Cheh and Denise Guithues{-}Amrhein and Neal J. Hannon and Paul D. Hutchison and Diane Janvrin and Roberta Ann Jones and Barbara Lamberton and Andy Lymer and Maureen Francis Mascha and Robert A. Nehmer and Saeed Roohani and Rajendra P. Srivastava and Samir Trabelsi and Thomas Tribunella and Gerald Trites and Miklos A. Vasarhelyi}, title = {Financial Reporting in {XBRL} on the SEC's {EDGAR} System: {A} Critique and Evaluation}, journal = {J. Inf. Syst.}, volume = {19}, number = {2}, pages = {191--210}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.2.191}, doi = {10.2308/JIS.2005.19.2.191}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DebrecenyCCGHHJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DebrecenyGNLY05, author = {Roger S. Debreceny and Glen L. Gray and Joeson Jun{-}Jin Ng and Kevin Siow{-}Ping Lee and Woon{-}Foong Yau}, title = {Embedded Audit Modules in Enterprise Resource Planning Systems: Implementation and Functionality}, journal = {J. Inf. Syst.}, volume = {19}, number = {2}, pages = {7--27}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.2.7}, doi = {10.2308/JIS.2005.19.2.7}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DebrecenyGNLY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DillaS05, author = {William N. Dilla and Paul John Steinbart}, title = {Using Information Display Characteristics to Provide Decision Guidance in a Choice Task under Conditions of Strict Uncertainty}, journal = {J. Inf. Syst.}, volume = {19}, number = {2}, pages = {29--55}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.2.29}, doi = {10.2308/JIS.2005.19.2.29}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DillaS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Dunn05, author = {Cheryl L. Dunn}, title = {Book Reviews}, journal = {J. Inf. Syst.}, volume = {19}, number = {1}, pages = {155--157}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.1.155}, doi = {10.2308/JIS.2005.19.1.155}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Dunn05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Dunn05a, author = {Cherly L. Dunn}, title = {Book Review}, journal = {J. Inf. Syst.}, volume = {19}, number = {2}, pages = {211--212}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.2.211}, doi = {10.2308/JIS.2005.19.2.211}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Dunn05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/FisherB05, author = {Ingrid E. Fisher and Marianne Bradford}, title = {New York State Agencies: {A} Case Study for Analyzing the Process of Legacy System Migration: Part {I}}, journal = {J. Inf. Syst.}, volume = {19}, number = {2}, pages = {173--189}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.2.173}, doi = {10.2308/JIS.2005.19.2.173}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/FisherB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Fordham05, author = {David R. Fordham}, title = {New Roles for {AIS} Courses: {A} Surprising Finding from a Case Study}, journal = {J. Inf. Syst.}, volume = {19}, number = {1}, pages = {113--129}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.1.113}, doi = {10.2308/JIS.2005.19.1.113}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Fordham05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Gerard05, author = {Gregory J. Gerard}, title = {The {REA} Pattern, Knowledge Structures, and Conceptual Modeling Performance}, journal = {J. Inf. Syst.}, volume = {19}, number = {2}, pages = {57--77}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.2.57}, doi = {10.2308/JIS.2005.19.2.57}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Gerard05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HayesR05, author = {David C. Hayes and J. Kenneth Reynolds}, title = {Caroline's Candy Shop: An In-Class Role-Play of the Revenue Cycle}, journal = {J. Inf. Syst.}, volume = {19}, number = {1}, pages = {131--154}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.1.131}, doi = {10.2308/JIS.2005.19.1.131}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HayesR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/LambertonFR05, author = {Barbara Lamberton and Jane Fedorowicz and Saeed J. Roohani}, title = {Tolerance for Ambiguity and {IT} Competency among Accountants}, journal = {J. Inf. Syst.}, volume = {19}, number = {1}, pages = {75--95}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.1.75}, doi = {10.2308/JIS.2005.19.1.75}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/LambertonFR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Lee05, author = {Tanya M. Lee}, title = {Discussion of Behavioral Self-Regulation of Telework Locations: Interrupting Interruptions!}, journal = {J. Inf. Syst.}, volume = {19}, number = {2}, pages = {141--144}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.2.141}, doi = {10.2308/JIS.2005.19.2.141}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Lee05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/RoseRN05, author = {Jacob M. Rose and Anna M. Rose and Carolyn Strand Norman}, title = {A Service-Learning Course in Accounting Information Systems}, journal = {J. Inf. Syst.}, volume = {19}, number = {2}, pages = {145--172}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.2.145}, doi = {10.2308/JIS.2005.19.2.145}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/RoseRN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Tuttle05, author = {Brad M. Tuttle}, title = {Editor's Comments}, journal = {J. Inf. Syst.}, volume = {19}, number = {2}, pages = {1--5}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.2.1}, doi = {10.2308/JIS.2005.19.2.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Tuttle05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Yuthas05, author = {Kristi Yuthas}, title = {"Inputting" the Environment: Reconsidering the Environmental Information Matrix}, journal = {J. Inf. Syst.}, volume = {19}, number = {2}, pages = {105--109}, year = {2005}, url = {https://doi.org/10.2308/jis.2005.19.2.105}, doi = {10.2308/JIS.2005.19.2.105}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Yuthas05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Hunton05, title = {Behavioral Self-Regulation of Telework Locations: Interrupting Interruptions!}, journal = {J. Inf. Syst.}, volume = {19}, number = {2}, pages = {111--140}, year = {2005}, note = {Withdrawn.}, url = {https://doi.org/10.2308/jis.2005.19.2.111}, doi = {10.2308/JIS.2005.19.2.111}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Hunton05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BagranoffT04, author = {Nancy A. Bagranoff and Leslie D. Turner}, title = {Growing a Nontraditional Accounting Firm: Warren and Associates}, journal = {J. Inf. Syst.}, volume = {18}, number = {2}, pages = {49--56}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.2.49}, doi = {10.2308/JIS.2004.18.2.49}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BagranoffT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Daigle04, author = {Ronald J. Daigle}, title = {Discussion of: SportsStuff.com: {A} Case Study on {XML} Technologies, e-Business Processes, and Accounting Information Systems}, journal = {J. Inf. Syst.}, volume = {18}, number = {2}, pages = {75--77}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.2.75}, doi = {10.2308/JIS.2004.18.2.75}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Daigle04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Dunn04, author = {Cheryl L. Dunn}, title = {Book Reviews}, journal = {J. Inf. Syst.}, volume = {18}, number = {1}, pages = {127--130}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.1.127}, doi = {10.2308/JIS.2004.18.1.127}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Dunn04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Dunn04a, author = {Cheryl L. Dunn}, title = {Book Reviews}, journal = {J. Inf. Syst.}, volume = {18}, number = {2}, pages = {127--131}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.2.127}, doi = {10.2308/JIS.2004.18.2.127}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Dunn04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GeertsW04, author = {Guido L. Geerts and Clinton E. White Jr.}, title = {SportsStuff.com: {A} Case Study on {XML} Technologies, e-Business Processes, and Accounting Information Systems}, journal = {J. Inf. Syst.}, volume = {18}, number = {2}, pages = {61--73}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.2.61}, doi = {10.2308/JIS.2004.18.2.61}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GeertsW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HutchisonLW04, author = {Paul D. Hutchison and Tanya M. Lee and Craig G. White}, title = {Development of the \emph{Journal of Information Systems} from the Editors' Perspectives}, journal = {J. Inf. Syst.}, volume = {18}, number = {1}, pages = {39--51}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.1.39}, doi = {10.2308/JIS.2004.18.1.39}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HutchisonLW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KlammW04, author = {Bonnie K. Klamm and Marcia L. Weidenmier}, title = {Linking Business Processes and Transaction Cycles}, journal = {J. Inf. Syst.}, volume = {18}, number = {2}, pages = {113--125}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.2.113}, doi = {10.2308/JIS.2004.18.2.113}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KlammW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Lampe04, author = {James C. Lampe}, title = {Alternative Personality Measurements Commentary on Accounting Information Systems Research Opportunities Using Personality Type Theory and the Myers-Briggs Type Indicator}, journal = {J. Inf. Syst.}, volume = {18}, number = {1}, pages = {21--34}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.1.21}, doi = {10.2308/JIS.2004.18.1.21}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Lampe04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Matherly04, author = {Michele Matherly}, title = {Discussion of: Growing a Nontraditional Accounting Firm: Warren and Associates}, journal = {J. Inf. Syst.}, volume = {18}, number = {2}, pages = {57--59}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.2.57}, doi = {10.2308/JIS.2004.18.2.57}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Matherly04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Murthy04, author = {Uday S. Murthy}, title = {An Analysis of the Effects of Continuous Monitoring Controls on e-Commerce System Performance}, journal = {J. Inf. Syst.}, volume = {18}, number = {2}, pages = {29--47}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.2.29}, doi = {10.2308/JIS.2004.18.2.29}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Murthy04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Nicolaou04, author = {Andreas I. Nicolaou}, title = {Firm Performance Effects in Relation to the Implementation and Use of Enterprise Resource Planning Systems}, journal = {J. Inf. Syst.}, volume = {18}, number = {2}, pages = {79--105}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.2.79}, doi = {10.2308/JIS.2004.18.2.79}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Nicolaou04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Nicolaou04a, author = {Andreas I. Nicolaou}, title = {Reply to Discussion of: Firm Performance Effects in Relation to the Implementation and Use of Enterprise Resource Planning Systems}, journal = {J. Inf. Syst.}, volume = {18}, number = {2}, pages = {111--112}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.2.111}, doi = {10.2308/JIS.2004.18.2.111}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Nicolaou04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Reck04, author = {Jacqueline L. Reck}, title = {Discussion of: Firm Performance Effects in Relation to the Implementation and Use of Enterprise Resource Planning Systems}, journal = {J. Inf. Syst.}, volume = {18}, number = {2}, pages = {107--110}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.2.107}, doi = {10.2308/JIS.2004.18.2.107}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Reck04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/RoseRN04, author = {Jacob M. Rose and Anna M. Rose and Carolyn Strand Norman}, title = {The Evaluation of Risky Information Technology Investment Decisions}, journal = {J. Inf. Syst.}, volume = {18}, number = {1}, pages = {53--66}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.1.53}, doi = {10.2308/JIS.2004.18.1.53}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/RoseRN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SavageCP04, author = {Arline Savage and Joseph H. Callaghan and Eileen Peacock}, title = {Accounting for the Development Costs of Internal-Use Software}, journal = {J. Inf. Syst.}, volume = {18}, number = {1}, pages = {111--126}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.1.111}, doi = {10.2308/JIS.2004.18.1.111}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SavageCP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WeidenmierH04, author = {Marcia L. Weidenmier and Terri L. Herron}, title = {Selecting an Audit Software Package for Classroom Use}, journal = {J. Inf. Syst.}, volume = {18}, number = {1}, pages = {95--110}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.1.95}, doi = {10.2308/JIS.2004.18.1.95}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WeidenmierH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WheelerHB04, author = {Patrick R. Wheeler and James E. Hunton and Stephanie M. Bryant}, title = {Accounting Information Systems Research Opportunities Using Personality Type Theory and the Myers-Briggs Type Indicator}, journal = {J. Inf. Syst.}, volume = {18}, number = {1}, pages = {1--19}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.1.1}, doi = {10.2308/JIS.2004.18.1.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WheelerHB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WheelerHB04a, author = {Patrick R. Wheeler and James E. Hunton and Stephanie M. Bryant}, title = {Authors' Reply to Commentary on Accounting Information Systems ResearchOpportunities Using Personality Type Theory and the Myers-Briggs Type Indicator}, journal = {J. Inf. Syst.}, volume = {18}, number = {1}, pages = {35--38}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.1.35}, doi = {10.2308/JIS.2004.18.1.35}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WheelerHB04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WrightJT04, author = {William F. Wright and Niramol Jindanuwat and John Todd}, title = {Computational Models as a Knowledge Management Tool: {A} Process Model of the Critical Judgments Made during Audit Planning}, journal = {J. Inf. Syst.}, volume = {18}, number = {1}, pages = {67--94}, year = {2004}, url = {https://doi.org/10.2308/jis.2004.18.1.67}, doi = {10.2308/JIS.2004.18.1.67}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WrightJT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HuntonWW04, title = {Are Financial Auditors Overconfident in Their Ability to Assess Risks Associated with Enterprise Resource Planning Systems?}, journal = {J. Inf. Syst.}, volume = {18}, number = {2}, pages = {7--28}, year = {2004}, note = {Withdrawn.}, url = {https://doi.org/10.2308/jis.2004.18.2.7}, doi = {10.2308/JIS.2004.18.2.7}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HuntonWW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Asthana03, author = {Sharad Asthana}, title = {Impact of Information Technology on Post-Earnings Announcement Drift}, journal = {J. Inf. Syst.}, volume = {17}, number = {1}, pages = {1--17}, year = {2003}, url = {https://doi.org/10.2308/jis.2003.17.1.1}, doi = {10.2308/JIS.2003.17.1.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Asthana03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BagranoffB03, author = {Nancy A. Bagranoff and Peter C. Brewer}, title = {{PMB} Investments: An Enterprise System Implementation}, journal = {J. Inf. Syst.}, volume = {17}, number = {1}, pages = {85--106}, year = {2003}, url = {https://doi.org/10.2308/jis.2003.17.1.85}, doi = {10.2308/JIS.2003.17.1.85}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BagranoffB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BorthickJW03, author = {A. Faye Borthick and Donald R. Jones and Sara Wakai}, title = {Designing Learning Experiences within Learners' Zones of Proximal Development (ZPDs): Enabling Collaborative Learning On-Site and Online}, journal = {J. Inf. Syst.}, volume = {17}, number = {1}, pages = {107--134}, year = {2003}, url = {https://doi.org/10.2308/jis.2003.17.1.107}, doi = {10.2308/JIS.2003.17.1.107}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BorthickJW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ChandraC03, author = {Akhilesh Chandra and Thomas G. Calderon}, title = {Toward a Biometric Security Layer in Accounting Systems}, journal = {J. Inf. Syst.}, volume = {17}, number = {2}, pages = {51--70}, year = {2003}, url = {https://doi.org/10.2308/jis.2003.17.2.51}, doi = {10.2308/JIS.2003.17.2.51}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ChandraC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/David03, author = {Julie Smith David}, title = {Discussion of Information Transfer among Internet Firms: The Case of Hacker Attacks}, journal = {J. Inf. Syst.}, volume = {17}, number = {2}, pages = {83--86}, year = {2003}, url = {https://doi.org/10.2308/jis.2003.17.2.83}, doi = {10.2308/JIS.2003.17.2.83}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/David03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Dillard03, author = {Jesse F. Dillard}, title = {Professional Services, IBM, and the Holocaust}, journal = {J. Inf. Syst.}, volume = {17}, number = {2}, pages = {1--16}, year = {2003}, url = {https://doi.org/10.2308/jis.2003.17.2.1}, doi = {10.2308/JIS.2003.17.2.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Dillard03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Dunn03, author = {Cheryl L. Dunn}, title = {Book Reviews}, journal = {J. Inf. Syst.}, volume = {17}, number = {2}, pages = {133--137}, year = {2003}, url = {https://doi.org/10.2308/jis.2003.17.2.133}, doi = {10.2308/JIS.2003.17.2.133}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Dunn03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/EttredgeR03, author = {Michael L. Ettredge and Vernon J. Richardson}, title = {Information Transfer among Internet Firms: The Case of Hacker Attacks}, journal = {J. Inf. Syst.}, volume = {17}, number = {2}, pages = {71--82}, year = {2003}, url = {https://doi.org/10.2308/jis.2003.17.2.71}, doi = {10.2308/JIS.2003.17.2.71}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/EttredgeR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/IngramL03, author = {Robert W. Ingram and Dale L. Lunsford}, title = {Developing an e-Commerce System Using Active Server Pages}, journal = {J. Inf. Syst.}, volume = {17}, number = {1}, pages = {135--156}, year = {2003}, url = {https://doi.org/10.2308/jis.2003.17.1.135}, doi = {10.2308/JIS.2003.17.1.135}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/IngramL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Janvrin03, author = {Diane J. Janvrin}, title = {St. Patrick Company: Using Role Play to Examine Internal Control and Fraud Detection Concepts}, journal = {J. Inf. Syst.}, volume = {17}, number = {2}, pages = {17--39}, year = {2003}, url = {https://doi.org/10.2308/jis.2003.17.2.17}, doi = {10.2308/JIS.2003.17.2.17}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Janvrin03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Malone03, author = {J. David Malone}, title = {Shooting the Past: An Instructional Case for Knowledge Management}, journal = {J. Inf. Syst.}, volume = {17}, number = {2}, pages = {41--49}, year = {2003}, url = {https://doi.org/10.2308/jis.2003.17.2.41}, doi = {10.2308/JIS.2003.17.2.41}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Malone03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Mauldin03, author = {Elaine G. Mauldin}, title = {An Experimental Examination of Information Technology and Compensation Structure Complementarities in an Expert System Context}, journal = {J. Inf. Syst.}, volume = {17}, number = {1}, pages = {19--41}, year = {2003}, url = {https://doi.org/10.2308/jis.2003.17.1.19}, doi = {10.2308/JIS.2003.17.1.19}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Mauldin03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Vandervelde03, author = {Scott D. Vandervelde}, title = {Discussion of Extending the Accounting Brand to Privacy Services}, journal = {J. Inf. Syst.}, volume = {17}, number = {2}, pages = {111--114}, year = {2003}, url = {https://doi.org/10.2308/jis.2003.17.2.111}, doi = {10.2308/JIS.2003.17.2.111}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Vandervelde03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Verdaasdonk03, author = {Peter Verdaasdonk}, title = {An Object-Oriented Model for Ex Ante Accounting Information}, journal = {J. Inf. Syst.}, volume = {17}, number = {1}, pages = {43--61}, year = {2003}, url = {https://doi.org/10.2308/jis.2003.17.1.43}, doi = {10.2308/JIS.2003.17.1.43}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Verdaasdonk03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WaltersN03, author = {L. Melissa Walters and Carol J. Normand}, title = {The Posh Hairdo Salon Case}, journal = {J. Inf. Syst.}, volume = {17}, number = {2}, pages = {115--132}, year = {2003}, url = {https://doi.org/10.2308/jis.2003.17.2.115}, doi = {10.2308/JIS.2003.17.2.115}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WaltersN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WheelerJ03, author = {Patrick R. Wheeler and Donald R. Jones}, title = {The Effects of Exclusive User Choice of Decision Aid Features on Decision Making}, journal = {J. Inf. Syst.}, volume = {17}, number = {1}, pages = {63--83}, year = {2003}, url = {https://doi.org/10.2308/jis.2003.17.1.63}, doi = {10.2308/JIS.2003.17.1.63}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WheelerJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GreensteinH03, title = {Extending the Accounting Brand to Privacy Services}, journal = {J. Inf. Syst.}, volume = {17}, number = {2}, pages = {87--110}, year = {2003}, note = {Withdrawn.}, url = {https://doi.org/10.2308/jis.2003.17.2.87}, doi = {10.2308/JIS.2003.17.2.87}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GreensteinH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/AldhizerTS02, author = {George R. Aldhizer III and Leslie D. Turner and Matthew D. Shank}, title = {Determinants of Consulting Service Quality for Accounting and Nonaccounting Service Providers}, journal = {J. Inf. Syst.}, volume = {16}, number = {1}, pages = {61--74}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.1.61}, doi = {10.2308/JIS.2002.16.1.61}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/AldhizerTS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ArunachalamPS02, author = {Vairam Arunachalam and Buck K. W. Pei and Paul John Steinbart}, title = {Impression Management with Graphs: Effects on Choices}, journal = {J. Inf. Syst.}, volume = {16}, number = {2}, pages = {183--202}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.2.183}, doi = {10.2308/JIS.2002.16.2.183}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ArunachalamPS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ArunachalamPS02a, author = {Vairam Arunachalam and Buck K. W. Pei and Paul John Steinbart}, title = {Reply to Discussion of Impression Management with Graphs: Effects on Choices}, journal = {J. Inf. Syst.}, volume = {16}, number = {2}, pages = {207--208}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.2.207}, doi = {10.2308/JIS.2002.16.2.207}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ArunachalamPS02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BainBS02, author = {Craig E. Bain and Alan I. Blankley and L. Murphy Smith}, title = {An Examination of Topical Coverage for the First Accounting Information Systems Course}, journal = {J. Inf. Syst.}, volume = {16}, number = {2}, pages = {143--164}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.2.143}, doi = {10.2308/JIS.2002.16.2.143}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BainBS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BankerCK02, author = {Rajiv D. Banker and Hsihui Chang and Yi{-}Ching Kao}, title = {Impact of Information Technology on Public Accounting Firm Productivity}, journal = {J. Inf. Syst.}, volume = {16}, number = {2}, pages = {209--222}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.2.209}, doi = {10.2308/JIS.2002.16.2.209}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BankerCK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BankerCK02a, author = {Rajiv D. Banker and Hsihui Chang and Yi{-}Ching Kao}, title = {Reply to Discussion of Impact of Information Technology on Public Accounting Firm Productivity}, journal = {J. Inf. Syst.}, volume = {16}, number = {2}, pages = {227--229}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.2.227}, doi = {10.2308/JIS.2002.16.2.227}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BankerCK02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoritzH02a, author = {J. Efrim Boritz and James E. Hunton}, title = {Reply to Discussions of Investigating the Impact of Auditor-Provided Systems Reliability Assurance on Potential Service Recipients}, journal = {J. Inf. Syst.}, volume = {16}, number = {s-1}, pages = {97--98}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.s-1.97}, doi = {10.2308/JIS.2002.16.S-1.97}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BoritzH02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoveeESV02, author = {Matthew Bovee and Michael L. Ettredge and Rajendra P. Srivastava and Miklos A. Vasarhelyi}, title = {Does the Year 2000 {XBRL} Taxonomy Accommodate Current Business Financial-Reporting Practice?}, journal = {J. Inf. Syst.}, volume = {16}, number = {2}, pages = {165--182}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.2.165}, doi = {10.2308/JIS.2002.16.2.165}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BoveeESV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Carnaghan02, author = {Carla Carnaghan}, title = {Discussion of Holistic, Continuous Assurance Integration: e-Business Opportunities and Challenges}, journal = {J. Inf. Syst.}, volume = {16}, number = {s-1}, pages = {25--27}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.s-1.25}, doi = {10.2308/JIS.2002.16.S-1.25}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Carnaghan02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Dehning02, author = {Bruce Dehning}, title = {Discussion of Impact of Information Technology on Public Accounting Firm Productivity}, journal = {J. Inf. Syst.}, volume = {16}, number = {2}, pages = {223--226}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.2.223}, doi = {10.2308/JIS.2002.16.2.223}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Dehning02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DehningR02, author = {Bruce Dehning and Vernon J. Richardson}, title = {Returns on Investments in Information Technology: {A} Research Synthesis}, journal = {J. Inf. Syst.}, volume = {16}, number = {1}, pages = {7--30}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.1.7}, doi = {10.2308/JIS.2002.16.1.7}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DehningR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GeertsWW02, author = {Guido L. Geerts and Barbara A. Waddington and Clinton E. White}, title = {Stevie: {A} Dynamic, Between-Instructor Collaborative Internet Tool for Learning Cardinalities}, journal = {J. Inf. Syst.}, volume = {16}, number = {1}, pages = {75--89}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.1.75}, doi = {10.2308/JIS.2002.16.1.75}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GeertsWW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GerardG02, author = {Gregory J. Gerard and Severin V. Grabski}, title = {International Lumberyards, Inc.: An Information System Consulting Case}, journal = {J. Inf. Syst.}, volume = {16}, number = {2}, pages = {117--141}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.2.117}, doi = {10.2308/JIS.2002.16.2.117}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GerardG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Gray02, author = {Glen L. Gray}, title = {Discussion of Investigating the Impact of Auditor-Provided Systems Reliability Assurance on Potential Service Recipients}, journal = {J. Inf. Syst.}, volume = {16}, number = {s-1}, pages = {91--95}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.s-1.91}, doi = {10.2308/JIS.2002.16.S-1.91}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Gray02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GreensteinR02, author = {Marilyn M. Greenstein and Amy W. Ray}, title = {Holistic, Continuous Assurance Integration: e-Business Opportunities and Challenges}, journal = {J. Inf. Syst.}, volume = {16}, number = {s-1}, pages = {1--20}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.s-1.1}, doi = {10.2308/JIS.2002.16.S-1.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GreensteinR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GreensteinR02a, author = {Marilyn M. Greenstein and Amy W. Ray}, title = {Reply to Discussions of Holistic, Continuous Assurance Integration: e-Business Opportunities and Challenges}, journal = {J. Inf. Syst.}, volume = {16}, number = {s-1}, pages = {29--32}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.s-1.29}, doi = {10.2308/JIS.2002.16.S-1.29}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GreensteinR02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Johnson02, author = {Everett C. Johnson}, title = {Discussion of Holistic, Continuous Assurance Integration: e-Business Opportunities and Challenges}, journal = {J. Inf. Syst.}, volume = {16}, number = {s-1}, pages = {21--24}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.s-1.21}, doi = {10.2308/JIS.2002.16.S-1.21}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Johnson02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Kovar02, author = {Stacy E. Kovar}, title = {Discussion of An Experimental Examination of Alternative Forms of Web Assurance for Business-to-Consumer e-Commerce}, journal = {J. Inf. Syst.}, volume = {16}, number = {s-1}, pages = {59--63}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.s-1.59}, doi = {10.2308/JIS.2002.16.S-1.59}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Kovar02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Mauldin02, author = {Elaine G. Mauldin}, title = {Discussion of Web Assurance Seals: How and Why They Influence Consumers' Decisions}, journal = {J. Inf. Syst.}, volume = {16}, number = {2}, pages = {251--254}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.2.251}, doi = {10.2308/JIS.2002.16.2.251}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Mauldin02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MauldinA02, author = {Elaine G. Mauldin and Vairam Arunachalam}, title = {An Experimental Examination of Alternative Forms of Web Assurance for Business-to-Consumer e-Commerce}, journal = {J. Inf. Syst.}, volume = {16}, number = {s-1}, pages = {33--54}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.s-1.33}, doi = {10.2308/JIS.2002.16.S-1.33}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MauldinA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MauldinA02a, author = {Elaine G. Mauldin and Vairam Arunachalam}, title = {Reply to Discussions of An Experimental Examination of Alternative Forms of Web Assurance for Business-to-Consumer e-Commerce}, journal = {J. Inf. Syst.}, volume = {16}, number = {s-1}, pages = {65--67}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.s-1.65}, doi = {10.2308/JIS.2002.16.S-1.65}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MauldinA02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MurthyW02, author = {Uday S. Murthy and Casper E. Wiggins Jr.}, title = {Why Manuscripts Are Rejected: An Analysis of \emph{JIS} Rejections}, journal = {J. Inf. Syst.}, volume = {16}, number = {1}, pages = {41--48}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.1.41}, doi = {10.2308/JIS.2002.16.1.41}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MurthyW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/OLeary02, author = {Daniel E. O'Leary}, title = {Discussion of Information System Assurance for Enterprise Resource Planning Systems: Unique Risk Considerations}, journal = {J. Inf. Syst.}, volume = {16}, number = {s-1}, pages = {115--126}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.s-1.115}, doi = {10.2308/JIS.2002.16.S-1.115}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/OLeary02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/OdomKS02, author = {Marcus D. Odom and Anand Kumar and Laura Saunders}, title = {Web Assurance Seals: How and Why They Influence Consumers' Decisions}, journal = {J. Inf. Syst.}, volume = {16}, number = {2}, pages = {231--250}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.2.231}, doi = {10.2308/JIS.2002.16.2.231}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/OdomKS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/OdomKS02a, author = {Marcus D. Odom and Anand Kumar and Laura Saunders}, title = {Reply to Discussion of Web Assurance Seals: How and Why They Influence Consumers' Decisions}, journal = {J. Inf. Syst.}, volume = {16}, number = {2}, pages = {255--257}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.2.255}, doi = {10.2308/JIS.2002.16.2.255}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/OdomKS02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Plumlee02, author = {R. David Plumlee}, title = {Discussion of Impression Management with Graphs: Effects on Choices}, journal = {J. Inf. Syst.}, volume = {16}, number = {2}, pages = {203--206}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.2.203}, doi = {10.2308/JIS.2002.16.2.203}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Plumlee02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Ragones02, author = {Emil J. Ragones}, title = {Discussion of Investigating the Impact of Auditor-Provided Systems Reliability Assurance on Potential Service Recipients}, journal = {J. Inf. Syst.}, volume = {16}, number = {s-1}, pages = {89}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.s-1.89}, doi = {10.2308/JIS.2002.16.S-1.89}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Ragones02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SamuelsS02, author = {Janet A. Samuels and Paul John Steinbart}, title = {The Journal of Information Systems: {A} Review of the First 15 Years}, journal = {J. Inf. Syst.}, volume = {16}, number = {2}, pages = {97--116}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.2.97}, doi = {10.2308/JIS.2002.16.2.97}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SamuelsS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Sheehy02, author = {Donald E. Sheehy}, title = {Discussion of An Experimental Examination of Alternative Forms of Web Assurance for Business-to-Consumer e-Commerce}, journal = {J. Inf. Syst.}, volume = {16}, number = {s-1}, pages = {55--57}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.s-1.55}, doi = {10.2308/JIS.2002.16.S-1.55}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Sheehy02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Stone02, author = {Dan N. Stone}, title = {Researching the Revolution: Prospects and Possibilities for the \emph{Journal of Information Systems}}, journal = {J. Inf. Syst.}, volume = {16}, number = {1}, pages = {1--6}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.1.1}, doi = {10.2308/JIS.2002.16.1.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Stone02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WrightW02, author = {Sally Wright and Arnold M. Wright}, title = {Information System Assurance for Enterprise Resource Planning Systems: Unique Risk Considerations}, journal = {J. Inf. Syst.}, volume = {16}, number = {s-1}, pages = {99--113}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.s-1.99}, doi = {10.2308/JIS.2002.16.S-1.99}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WrightW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WrightW02a, author = {Sally Wright and Arnold M. Wright}, title = {Reply to Discussion of Information System Assurance for Enterprise Resource Planning Systems: Unique Risk Considerations}, journal = {J. Inf. Syst.}, volume = {16}, number = {s-1}, pages = {127--129}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.s-1.127}, doi = {10.2308/JIS.2002.16.S-1.127}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WrightW02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/YostH02, author = {Jeffrey A. Yost and W. Ken Harmon}, title = {Contracting for Information System Outsourcing with Multiple Bidders}, journal = {J. Inf. Syst.}, volume = {16}, number = {1}, pages = {49--59}, year = {2002}, url = {https://doi.org/10.2308/jis.2002.16.1.49}, doi = {10.2308/JIS.2002.16.1.49}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/YostH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoritzH02, title = {Investigating the Impact of Auditor-Provided Systems Reliability Assurance on Potential Service Recipients}, journal = {J. Inf. Syst.}, volume = {16}, number = {s-1}, pages = {69--87}, year = {2002}, note = {Withdrawn.}, url = {https://doi.org/10.2308/jis.2002.16.s-1.69}, doi = {10.2308/JIS.2002.16.S-1.69}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BoritzH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HuntonMW02, title = {The Reaction of Financial Analysts to Enterprise Resource Planning {(ERP)} Implementation Plans}, journal = {J. Inf. Syst.}, volume = {16}, number = {1}, pages = {31--40}, year = {2002}, note = {Withdrawn.}, url = {https://doi.org/10.2308/jis.2002.16.1.31}, doi = {10.2308/JIS.2002.16.1.31}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HuntonMW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BorthickJK01, author = {A. Faye Borthick and Donald R. Jones and Ryan Kim}, title = {Developing Database Query Proficiency: Assuring Compliance for Responses to Web Site Referrals}, journal = {J. Inf. Syst.}, volume = {15}, number = {1}, pages = {35--56}, year = {2001}, url = {https://doi.org/10.2308/jis.2001.15.1.35}, doi = {10.2308/JIS.2001.15.1.35}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BorthickJK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Bryant01, author = {Stephanie M. Bryant}, title = {A Blueprint for an {AIS} Consulting Course}, journal = {J. Inf. Syst.}, volume = {15}, number = {1}, pages = {19--34}, year = {2001}, url = {https://doi.org/10.2308/jis.2001.15.1.19}, doi = {10.2308/JIS.2001.15.1.19}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Bryant01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BurtonLT01, author = {F. Greg Burton and Robert A. Leitch and Brad M. Tuttle}, title = {A User's Willingness to Adopt a New Information System: The Influence of the Decision-Making Improvements and Performance-Monitoring Dimensions of the System}, journal = {J. Inf. Syst.}, volume = {15}, number = {2}, pages = {61--79}, year = {2001}, url = {https://doi.org/10.2308/jis.2001.15.2.61}, doi = {10.2308/JIS.2001.15.2.61}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BurtonLT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HayesHR01, author = {David C. Hayes and James E. Hunton and Jacqueline L. Reck}, title = {Market Reaction to {ERP} Implementation Announcements}, journal = {J. Inf. Syst.}, volume = {15}, number = {1}, pages = {3--18}, year = {2001}, url = {https://doi.org/10.2308/jis.2001.15.1.3}, doi = {10.2308/JIS.2001.15.1.3}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HayesHR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MurthyW01, author = {Uday S. Murthy and Casper E. Wiggins Jr.}, title = {The Sections of the \emph{Journal}}, journal = {J. Inf. Syst.}, volume = {15}, number = {1}, pages = {1--2}, year = {2001}, url = {https://doi.org/10.2308/jis.2001.15.1.1}, doi = {10.2308/JIS.2001.15.1.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MurthyW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/TuttleH01, author = {Brad M. Tuttle and Adrian M. Harrell}, title = {The Impact of Unit Goal Priorities, Economic Incentives, and Interim Feedback on the Planned Effort of Information Systems Professionals}, journal = {J. Inf. Syst.}, volume = {15}, number = {2}, pages = {81--98}, year = {2001}, url = {https://doi.org/10.2308/jis.2001.15.2.81}, doi = {10.2308/JIS.2001.15.2.81}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/TuttleH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Viator01, author = {Ralph E. Viator}, title = {The Relevance of Transformational Leadership to Nontraditional Accounting Services: Information Systems Assurance and Business Consulting}, journal = {J. Inf. Syst.}, volume = {15}, number = {2}, pages = {99--125}, year = {2001}, url = {https://doi.org/10.2308/jis.2001.15.2.99}, doi = {10.2308/JIS.2001.15.2.99}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Viator01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Viator01a, author = {Ralph E. Viator}, title = {Accounting Information Systems Doctoral Dissertations: 2000}, journal = {J. Inf. Syst.}, volume = {15}, number = {2}, pages = {127--129}, year = {2001}, url = {https://doi.org/10.2308/jis.2001.15.2.127}, doi = {10.2308/JIS.2001.15.2.127}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Viator01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ArnoldLMS00, author = {Vicky Arnold and James C. Lampe and John J. Masselli and Steve G. Sutton}, title = {An Analysis of the Market for Systems Reliability Assurance Services}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {65--82}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.65}, doi = {10.2308/JIS.2000.14.S-1.65}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ArnoldLMS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ArnoldLMS00a, author = {Vicky Arnold and James C. Lampe and John J. Masselli and Steve G. Sutton}, title = {Reply to Discussion of An Analysis of the Market for Systems Reliability Assurance Services}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {91--95}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.91}, doi = {10.2308/JIS.2000.14.S-1.91}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ArnoldLMS00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Bailey00, author = {Andrew D. Bailey Jr.}, title = {Discussion of {AICPA/CICA} SYSTRUST{\texttrademark} Principles and Criteria}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {9--16}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.9}, doi = {10.2308/JIS.2000.14.S-1.9}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Bailey00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Bloom00, author = {Leon J. Bloom}, title = {Discussion of An Analysis of the Market for Systems Reliability Assurance Services}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {87--89}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.87}, doi = {10.2308/JIS.2000.14.S-1.87}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Bloom00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/BoritzK00, author = {J. Efrim Boritz and J. H. Kearns}, title = {1999 Symposium on {IS} Assurance Panel Discussion on SysTrust}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {163--176}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.163}, doi = {10.2308/JIS.2000.14.S-1.163}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/BoritzK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Borthick00, author = {A. Faye Borthick}, title = {Analysis of Design from a Community of Practice Dialogue: Negotiating the Meaning of Auditing Information System Development}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {133--147}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.133}, doi = {10.2308/JIS.2000.14.S-1.133}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Borthick00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Burton00, author = {Richard N. Burton}, title = {Discussion of Information Technology-Related Activities of Internal Auditors}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {57--60}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.57}, doi = {10.2308/JIS.2000.14.S-1.57}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Burton00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Carnaghan00, author = {Carla Carnaghan}, title = {Discussion of An Analysis of the Group Dynamics Surrounding Internal Control Assessment in Information Systems Audit and Assurance Domains}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {117--121}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.117}, doi = {10.2308/JIS.2000.14.S-1.117}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Carnaghan00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ClementsW00, author = {Curtis E. Clements and Christopher J. Wolfe}, title = {Reporting Financial Results with the Video Medium: An Experimental Analysis}, journal = {J. Inf. Syst.}, volume = {14}, number = {2}, pages = {79--94}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.2.79}, doi = {10.2308/JIS.2000.14.2.79}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ClementsW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GeertsM00, author = {Guido L. Geerts and William E. McCarthy}, title = {Augmented Intensional Reasoning in Knowledge-Based Accounting Systems}, journal = {J. Inf. Syst.}, volume = {14}, number = {2}, pages = {127--150}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.2.127}, doi = {10.2308/JIS.2000.14.2.127}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GeertsM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GeertsW00, author = {Guido L. Geerts and Barbara A. Waddington}, title = {The Belgian Chocolate Company: {A} Dynamic Data Modeling and Database Design Case for the Accounting Information Systems Class}, journal = {J. Inf. Syst.}, volume = {14}, number = {1}, pages = {53--74}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.1.53}, doi = {10.2308/JIS.2000.14.1.53}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GeertsW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HayesHR00, author = {David C. Hayes and James E. Hunton and Jacqueline L. Reck}, title = {Information Systems Outsourcing Announcements: Investigating the Impact on the Market Value of Contract-Granting Firms}, journal = {J. Inf. Syst.}, volume = {14}, number = {2}, pages = {109--125}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.2.109}, doi = {10.2308/JIS.2000.14.2.109}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HayesHR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HermansonHI00, author = {Dana R. Hermanson and Mary Callahan Hill and Daniel M. Ivancevich}, title = {Information Technology-Related Activities of Internal Auditors}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {39--53}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.39}, doi = {10.2308/JIS.2000.14.S-1.39}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HermansonHI00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HermansonHI00a, author = {Dana R. Hermanson and Mary Callahan Hill and Daniel M. Ivancevich}, title = {Reply to Discussions of Information Technology-Related Activities of Internal Auditors}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {61--63}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.61}, doi = {10.2308/JIS.2000.14.S-1.61}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HermansonHI00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Holstrum00, author = {Gary L. Holstrum}, title = {Discussion of Analysis of Design from a Community of Practice Dialogue: Negotiating the Meaning of Auditing Information System Development}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {149--157}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.149}, doi = {10.2308/JIS.2000.14.S-1.149}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Holstrum00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Hunton00, author = {James E. Hunton}, title = {Discussant's Comments on Presentations by John Lainhart and Gerald Trites}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {33--35}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.33}, doi = {10.2308/JIS.2000.14.S-1.33}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Hunton00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Jackson00, author = {Cynthia Jackson}, title = {Discussion of Information Technology-Related Activities of Internal Auditors}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {55--56}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.55}, doi = {10.2308/JIS.2000.14.S-1.55}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Jackson00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KovarBK00, author = {Stacy E. Kovar and Kimberly Gladden Burke and Brian R. Kovar}, title = {Consumer Responses to the {CPA} WEBTRUST{\texttrademark} Assurance}, journal = {J. Inf. Syst.}, volume = {14}, number = {1}, pages = {17--35}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.1.17}, doi = {10.2308/JIS.2000.14.1.17}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KovarBK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KrishnanS00, author = {Gopal V. Krishnan and Ram S. Sriram}, title = {An Examination of the Effect of {IT} Investments on Firm Value: The Case of Y2K-Compliance Costs}, journal = {J. Inf. Syst.}, volume = {14}, number = {2}, pages = {95--108}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.2.95}, doi = {10.2308/JIS.2000.14.2.95}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KrishnanS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Lainhart00, author = {John W. Lainhart IV}, title = {COBIT{\texttrademark}: {A} Methodology for Managing and Controlling Information and Information Technology Risks and Vulnerabilities}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {21--25}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.21}, doi = {10.2308/JIS.2000.14.S-1.21}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Lainhart00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Leader00, author = {Brian Leader}, title = {Discussion of Analysis of Design from a Community of Practice Dialogue: Negotiating the Meaning of Auditing Information System Development}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {159--162}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.159}, doi = {10.2308/JIS.2000.14.S-1.159}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Leader00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Leech00, author = {Tim J. Leech}, title = {Discussion of An Analysis of the Group Dynamics Surrounding Internal Control Assessment in Information Systems Audit and Assurance Domains}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {123--125}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.123}, doi = {10.2308/JIS.2000.14.S-1.123}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Leech00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/McCracken00, author = {Susan A. McCracken}, title = {Discussion of An Analysis of the Market for Systems Reliability Assurance Services}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {83--85}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.83}, doi = {10.2308/JIS.2000.14.S-1.83}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/McCracken00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/McPhie00, author = {Doug McPhie}, title = {{AICPA/CICA} SYSTRUST{\texttrademark} Principles and Criteria}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {1--7}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.1}, doi = {10.2308/JIS.2000.14.S-1.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/McPhie00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ODonnellAS00, author = {Ed O'Donnell and Vicky Arnold and Steve G. Sutton}, title = {An Analysis of the Group Dynamics Surrounding Internal Control Assessment in Information Systems Audit and Assurance Domains}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {97--116}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.97}, doi = {10.2308/JIS.2000.14.S-1.97}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ODonnellAS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ODonnellAS00a, author = {Ed O'Donnell and Vicky Arnold and Steve G. Sutton}, title = {Reply to Discussion of An Analysis of the Group Dynamics Surrounding Internal Control Assessment in Information Systems Audit and Assurance Domains}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {127--131}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.127}, doi = {10.2308/JIS.2000.14.S-1.127}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ODonnellAS00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SriramAI00, author = {Ram S. Sriram and Vairam Arunachalam and Daniel M. Ivancevich}, title = {{EDI} Adoption and Implementation: An Examination of Perceived Operational and Strategic Benefits, and Controls}, journal = {J. Inf. Syst.}, volume = {14}, number = {1}, pages = {37--52}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.1.37}, doi = {10.2308/JIS.2000.14.1.37}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SriramAI00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SummersSW00, author = {Scott L. Summers and John T. Sweeney and Carel M. Wolk}, title = {Problem-Solving Style and Fit in Consulting and Auditing}, journal = {J. Inf. Syst.}, volume = {14}, number = {1}, pages = {1--15}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.1.1}, doi = {10.2308/JIS.2000.14.1.1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SummersSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Trites00, author = {Gerald Trites}, title = {Overview of CICA's Information Technology Control Guidelines}, journal = {J. Inf. Syst.}, volume = {14}, number = {s-1}, pages = {27--32}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.s-1.27}, doi = {10.2308/JIS.2000.14.S-1.27}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Trites00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Viator00, author = {Ralph E. Viator}, title = {Accounting Information Systems Doctoral Dissertations: 1999}, journal = {J. Inf. Syst.}, volume = {14}, number = {2}, pages = {151--154}, year = {2000}, url = {https://doi.org/10.2308/jis.2000.14.2.151}, doi = {10.2308/JIS.2000.14.2.151}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Viator00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CoalterHP99, author = {Terry M. Coalter and James E. Hunton and Kenneth H. Price}, title = {Collective User Participation in Specifying Requirements of an Information System: Minimizing Differences Between Minority and Majority Voting Subgroups}, journal = {J. Inf. Syst.}, volume = {13}, number = {1}, pages = {31--48}, year = {1999}, url = {https://doi.org/10.2308/jis.1999.13.1.31}, doi = {10.2308/JIS.1999.13.1.31}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CoalterHP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CurtisB99, author = {Mary B. Curtis and A. Faye Borthick}, title = {Evaluation of Internal Control from a Control Objective Narrative}, journal = {J. Inf. Syst.}, volume = {13}, number = {1}, pages = {63--81}, year = {1999}, url = {https://doi.org/10.2308/jis.1999.13.1.63}, doi = {10.2308/JIS.1999.13.1.63}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CurtisB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DavidDMP99, author = {Julie Smith David and Cheryl L. Dunn and William E. McCarthy and Robin S. Poston}, title = {The Research Pyramid: {A} Framework for Accounting Information Systems Research}, journal = {J. Inf. Syst.}, volume = {13}, number = {1}, pages = {7--30}, year = {1999}, url = {https://doi.org/10.2308/jis.1999.13.1.7}, doi = {10.2308/JIS.1999.13.1.7}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DavidDMP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DullT99, author = {Richard B. Dull and David P. Tegarden}, title = {A Comparison of Three Visual Representations of Complex Multidimensional Accounting Information}, journal = {J. Inf. Syst.}, volume = {13}, number = {2}, pages = {117--131}, year = {1999}, url = {https://doi.org/10.2308/jis.1999.13.2.117}, doi = {10.2308/JIS.1999.13.2.117}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/DullT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KoganSV99, author = {Alexander Kogan and Ephraim F. Sudit and Miklos A. Vasarhelyi}, title = {Continuous Online Auditing: {A} Program of Research}, journal = {J. Inf. Syst.}, volume = {13}, number = {2}, pages = {87--103}, year = {1999}, url = {https://doi.org/10.2308/jis.1999.13.2.87}, doi = {10.2308/JIS.1999.13.2.87}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KoganSV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MurthyW99, author = {Uday S. Murthy and Casper E. Wiggins Jr.}, title = {A Perspective on Accounting Information Systems Research}, journal = {J. Inf. Syst.}, volume = {13}, number = {1}, pages = {3--6}, year = {1999}, url = {https://doi.org/10.2308/jis.1999.13.1.3}, doi = {10.2308/JIS.1999.13.1.3}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MurthyW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/OLeary99, author = {Daniel E. O'Leary}, title = {{REAL-D:} {A} Schema for Data Warehouses}, journal = {J. Inf. Syst.}, volume = {13}, number = {1}, pages = {49--62}, year = {1999}, url = {https://doi.org/10.2308/jis.1999.13.1.49}, doi = {10.2308/JIS.1999.13.1.49}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/OLeary99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/OLeary99a, author = {Daniel E. O'Leary}, title = {The Impact of the Euro on Information Systems}, journal = {J. Inf. Syst.}, volume = {13}, number = {2}, pages = {105--116}, year = {1999}, url = {https://doi.org/10.2308/jis.1999.13.2.105}, doi = {10.2308/JIS.1999.13.2.105}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/OLeary99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Viator99, author = {Ralph E. Viator}, title = {Accounting Information Systems Doctoral Dissertations: 1998}, journal = {J. Inf. Syst.}, volume = {13}, number = {2}, pages = {133--136}, year = {1999}, url = {https://doi.org/10.2308/jis.1999.13.2.133}, doi = {10.2308/JIS.1999.13.2.133}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Viator99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.