default search action
Search dblp for Publications
export results for "toc:db/journals/jcis/jcis64.bht:"
@article{DBLP:journals/jcis/AfaqM24, author = {Yasir Afaq and Ankush Manocha}, title = {Blockchain and Deep Learning Integration for Various Application: {A} Review}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {1}, pages = {92--105}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2173330}, doi = {10.1080/08874417.2023.2173330}, timestamp = {Mon, 15 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/AfaqM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/AgrawalPSR24, author = {Kalyan Prasad Agrawal and Ashis K. Pani and Anuj Sharma and Nripendra P. Rana}, title = {Process Virtualization Goes Mainstream: Diving into its Normalization}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {3}, pages = {453--468}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2224262}, doi = {10.1080/08874417.2023.2224262}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/AgrawalPSR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/AuHSY24, author = {Cheuk Hang (Allen) Au and Wen Shou Hsu and Po{-}Hsu Shieh and Lin Yue}, title = {Can Stablecoins Foster Cryptocurrencies Adoption?}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {3}, pages = {360--369}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2214103}, doi = {10.1080/08874417.2023.2214103}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/AuHSY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/BansalA24, author = {Gaurav Bansal and Zhuoli Axelton}, title = {Impact of Cybersecurity Disclosures on Stakeholder Intentions}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {1}, pages = {78--91}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2180785}, doi = {10.1080/08874417.2023.2180785}, timestamp = {Mon, 15 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/BansalA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ChamCATLO24, author = {Tat Huei Cham and Boon Liat Cheng and Eugene Cheng{-}Xi Aw and Garry Wei{-}Han Tan and Xiu{-}Ming Loh and Keng{-}Boon Ooi}, title = {Counteracting the Impact of Online Fake News on Brands}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {2}, pages = {245--264}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2191350}, doi = {10.1080/08874417.2023.2191350}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/ChamCATLO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ChangchitCM24, author = {Chuleeporn Changchit and Robert Cutshall and Joseph Mollick}, title = {A Three Country Comparative Study of Social Commerce Adoption}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {1}, pages = {1--16}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2173331}, doi = {10.1080/08874417.2023.2173331}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/ChangchitCM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ChouL24, author = {David C. Chou and Binshan Lin}, title = {Social Entrepreneurship Success: Relevance to Social Mediating Technologies}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {3}, pages = {329--341}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2204822}, doi = {10.1080/08874417.2023.2204822}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/ChouL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/DangeN24, author = {Smita Dange and Prashant Nitnaware}, title = {Secure Share: Optimal Blockchain Integration in IoT Systems}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {2}, pages = {265--277}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2193943}, doi = {10.1080/08874417.2023.2193943}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/DangeN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/DuanDW24, author = {Sophia Xiaoxia Duan and Hepu Deng and Santoso Wibowo}, title = {Technology Affordances for Enhancing Job Performance in Digital Work}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {2}, pages = {232--244}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2188497}, doi = {10.1080/08874417.2023.2188497}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/DuanDW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/FarshadkhahMES24, author = {Sahar Farshadkhah and Michele Maasberg and T. Selwyn Ellis and Craig Van Slyke}, title = {An Empirical Examination of Employee Information Security Advice Sharing}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {1}, pages = {31--46}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2176947}, doi = {10.1080/08874417.2023.2176947}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/FarshadkhahMES24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/GorskaKM24, author = {Anna G{\'{o}}rska and Pawel Korzynski and Grzegorz Mazurek}, title = {The Effects of {USR} and Its Communication on Faculty Satisfaction}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {2}, pages = {289--300}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2195380}, doi = {10.1080/08874417.2023.2195380}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/GorskaKM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/HarrisC24, author = {Amy H. Harris and Carol Clark}, title = {Understanding the Diffusion of Business Analysis Responsibilities}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {2}, pages = {278--288}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2193964}, doi = {10.1080/08874417.2023.2193964}, timestamp = {Mon, 15 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/HarrisC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/KimC24, author = {Dae{-}Kyoo Kim and Yeasun K. Chung}, title = {Addressing Class Imbalances in Software Defect Detection}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {2}, pages = {219--231}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2187483}, doi = {10.1080/08874417.2023.2187483}, timestamp = {Mon, 15 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/KimC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/KleinZ24, author = {Galit Klein and Moti Zwilling}, title = {The Weakest Link: Employee Cyber-Defense Behaviors While Working from Home}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {3}, pages = {408--422}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2221200}, doi = {10.1080/08874417.2023.2221200}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/KleinZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/LiuZ24, author = {Zhunzhun Liu and Ruidong Zhang}, title = {An Empirical Study on Herd Behavior in Cryptocurrency Trading}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {3}, pages = {438--452}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2223175}, doi = {10.1080/08874417.2023.2223175}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/LiuZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/McGregorRBZ24, author = {Richard McGregor and Carmen Reaiche and Stephen Boyle and Graciela Corral de Zubielqui}, title = {Cyberspace and Personal Cyber Insurance: {A} Systematic Review}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {1}, pages = {157--171}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2185551}, doi = {10.1080/08874417.2023.2185551}, timestamp = {Mon, 15 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/McGregorRBZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/MishraRJG24, author = {Neelesh Kumar Mishra and Alok Raj and Anand Jeyaraj and Riya Gupta}, title = {Antecedents and Outcomes of Blockchain Technology Adoption: Meta-Analysis}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {3}, pages = {342--359}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2205370}, doi = {10.1080/08874417.2023.2205370}, timestamp = {Mon, 15 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/MishraRJG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/MungraSSBG24, author = {Yogesh Mungra and Ritu Srivastava and Anuj Sharma and Diptiman Banerji and Neela Gollapudi}, title = {Impact of Digital Competence on Employees' Flourishing Through Basic Psychological Needs Satisfaction}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {1}, pages = {47--61}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2176948}, doi = {10.1080/08874417.2023.2176948}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/MungraSSBG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/NaikNPK24, author = {Purnima Naik and Salomi Nelaballi and Venkata Sai Pusuluri and Dae{-}Kyoo Kim}, title = {Deep Learning-Based Code Refactoring: {A} Review of Current Knowledge}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {2}, pages = {314--328}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2203088}, doi = {10.1080/08874417.2023.2203088}, timestamp = {Mon, 15 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/NaikNPK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/NishaP24, author = {T. N. Nisha and Dhanya Pramod}, title = {Insider Intrusion Detection Techniques: {A} State-of-the-Art Review}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {1}, pages = {106--123}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2175337}, doi = {10.1080/08874417.2023.2175337}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/NishaP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/PalanisamyNK24, author = {Rathika Palanisamy and Azah Anir Norman and Miss Laiha Mat Kiah}, title = {Employees' {BYOD} Security Policy Compliance in the Public Sector}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {1}, pages = {62--77}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2178038}, doi = {10.1080/08874417.2023.2178038}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/PalanisamyNK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/PolisettyCGKP24, author = {Aruna Polisetty and Debarun Chakraborty and Sowmya G and Arpan Kumar Kar and Subhajit Pahari}, title = {What Determines {AI} Adoption in Companies? Mixed-Method Evidence}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {3}, pages = {370--387}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2219668}, doi = {10.1080/08874417.2023.2219668}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/PolisettyCGKP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/RajanV24, author = {Arun Amaithi Rajan and V. Vetriselvi}, title = {Systematic Survey: Secure and Privacy-Preserving Big Data Analytics in Cloud}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {1}, pages = {136--156}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2176946}, doi = {10.1080/08874417.2023.2176946}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/RajanV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/RakshitJP24, author = {Sandip Rakshit and Anand Jeyaraj and Tripti Paul}, title = {{SME} Performance Through Blockchain Technologies}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {2}, pages = {204--218}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2187482}, doi = {10.1080/08874417.2023.2187482}, timestamp = {Mon, 15 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/RakshitJP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/Ram24, author = {Jiwat Ram}, title = {Using Social Media in Projects: Information Management Challenges and Recommendations}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {2}, pages = {187--203}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2187481}, doi = {10.1080/08874417.2023.2187481}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/Ram24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/SargentB24, author = {Carol Springer Sargent and Jennifer L. Breese}, title = {Blockchain Barriers in Supply Chain: {A} Literature Review}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {1}, pages = {124--135}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2175338}, doi = {10.1080/08874417.2023.2175338}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/SargentB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/SassiY24, author = {Sihem Ben Sassi and Nacim Yanes}, title = {Data Science with Semantic Technologies: Application to Information Systems Development}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {3}, pages = {388--407}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2220294}, doi = {10.1080/08874417.2023.2220294}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/SassiY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ShapouriWS24, author = {Fatemeh Shapouri and Kerry Ward and Tenace Setor}, title = {Determinants of Software as a Service (SaaS) Adoption}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {2}, pages = {301--313}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2199270}, doi = {10.1080/08874417.2023.2199270}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/ShapouriWS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/SharmaDMR24, author = {Sujeet Kumar Sharma and Yogesh K. Dwivedi and Santosh K. Misra and Nripendra P. Rana}, title = {Conjoint Analysis of Blockchain Adoption Challenges in Government}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {2}, pages = {173--186}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2185552}, doi = {10.1080/08874417.2023.2185552}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/SharmaDMR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/Smith24, author = {Kane J. Smith}, title = {Bad Employees: Examining Deviant Security Behaviors}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {1}, pages = {17--30}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2175336}, doi = {10.1080/08874417.2023.2175336}, timestamp = {Mon, 15 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/Smith24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/WangZZ24, author = {Nan (Tina) Wang and Weijun Zheng and Wenbo Zhang}, title = {Management Emotion and Firm's Strategic {IT} Investment Propensity}, journal = {J. Comput. Inf. Syst.}, volume = {64}, number = {3}, pages = {423--437}, year = {2024}, url = {https://doi.org/10.1080/08874417.2023.2222085}, doi = {10.1080/08874417.2023.2222085}, timestamp = {Mon, 15 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/WangZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.