default search action
Information & Management, Volume 52
Volume 52, Number 1, January 2015
- Lucian L. Visinescu, Anna Sidorova, Mary C. Jones, Victor R. Prybutok:
The influence of website dimensionality on customer experiences, perceptions and behavioral intentions: An exploration of 2D vs. 3D web design. 1-17 - Varol Onur Kayhan:
The nature, dimensionality, and effects of perceptions of community governance. 18-29 - Shih-Wei Chou, Angsana A. Techatassanasoontorn, I. H. Hung:
Understanding commitment in business process outsourcing relationships. 30-43 - John Ingham, Jean Cadieux, Abdelouahab Mekki Berrada:
e-Shopping acceptance: A qualitative and meta-analytic review. 44-60 - Yonggang Pan, Yunjie Calvin Xu, Xiaolun Wang, Chenghong Zhang, Hong Ling, Jie Lin:
Integrating social networking support for dyadic knowledge exchange: A study in a virtual community of practice. 61-70 - Fang Wang, Xiao-Ping (Steven) Zhang:
The role of the Internet in changing industry competition. 71-81 - Shahla Ghobadi:
What drives knowledge sharing in software development teams: A literature review and classification framework. 82-97 - Hua (Jonathan) Ye, Atreyi Kankanhalli:
Investigating the antecedents of organizational task crowdsourcing. 98-110 - John Qi Dong, Chia-Han Yang:
Information technology and organizational learning in knowledge alliances and networks: Evidence from U.S. pharmaceutical industry. 111-122 - Derek L. Nazareth, Jae Choi:
A system dynamics model for information security management. 123-134
Volume 52, Number 2, March 2015
- Muhammad Mustafa Kamal, Alinaghi Ziaee Bigdeli, Marinos Themistocleous, Vincenzo Morabito:
Investigating factors influencing local government decision makers while adopting integration technologies (IntTech). 135-150 - Wen Guang Qu, Alain Pinsonneault, Daniel Tomiuk, Shaoqing Wang, Yuan Liu:
The impacts of social trust on open and closed B2B e-commerce: A Europe-based study. 151-159 - Candy K. Y. Ho, Weiling Ke, Hefu Liu:
Choice decision of e-learning system: Implications from construal level theory. 160-169 - Jeremy Glassman, Marilyn Prosch, Benjamin B. M. Shao:
To monitor or not to monitor: Effectiveness of a cyberloafing countermeasure. 170-182 - Guy Paré, Marie-Claude Trudel, Mirou Jaana, Spyros Kitsiou:
Synthesizing information systems knowledge: A typology of literature reviews. 183-199 - Miao Cui, Shan L. Pan:
Developing focal capabilities for e-commerce adoption: A resource orchestration perspective. 200-209 - Ali Reza Montazemi, Hamed Qahri-Saremi:
Factors affecting adoption of online banking: A meta-analytic structural equation modeling study. 210-226 - Indranil Bose, Xi Chen:
Detecting the migration of mobile service customers using fuzzy clustering. 227-238 - Hock Chuan Chan, Varsha Guness, Hee-Woong Kim:
A method for identifying journals in a discipline: An application to information systems. 239-246 - Ali E. Akgün, Halit Keskin, A. Yavuz Cebecioglu, Derya Dogan:
Antecedents and consequences of collective empathy in software development project teams. 247-259
Volume 52, Number 3, 2015
- Kai Wang:
Determinants of mobile value-added service continuance: The mediating role of service experience. 261-274 - Bo Xu, Dahui Li:
An empirical study of the motivations for content contribution and community participation in Wikipedia. 275-286 - Mark de Reuver, Harry Bouwman:
Dealing with self-report bias in mobile Internet acceptance and usage studies. 287-294 - Dongwon Lee, Junghoon Moon, YongJin Kim, Mun Yong Yi:
Antecedents and consequences of mobile phone usability: Linking simplicity and interactivity to satisfaction, trust, and brand loyalty. 295-304 - Chuan Luo, Xin (Robert) Luo, Yun Xu, Merrill Warkentin, Choon-Ling Sia:
Examining the moderating role of sense of membership in online review evaluations. 305-316 - Srikanth Parameswaran, Rajiv Kishore, Jessica Pu Li:
Within-study measurement invariance of the UTAUT instrument: An assessment with user technology engagement variables. 317-336 - Oliver Hinz, Michael Nofer, Dirk Schiereck, Julian Trillig:
The influence of data theft on the share prices and systematic risk of consumer electronics companies. 337-347 - Tingru Cui, Hua (Jonathan) Ye, Hock-Hai Teo, Jizhen Li:
Information technology and open innovation: A strategic alignment perspective. 348-358 - Enrique Mu, Laurie J. Kirsch, Brian S. Butler:
The assimilation of enterprise information system: An interpretation systems perspective. 359-370 - Tung-Ching Lin, Jack Shih-Chieh Hsu, Hsiang-Lan Cheng, Chao-Min Chiu:
Exploring the relationship between receiving and offering online social support: A dual social support model. 371-383
Volume 52, Number 4, 2015
- Huseyin Cavusoglu, Hasan Cavusoglu, Jai-Yeol Son, Izak Benbasat:
Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources. 385-400 - Gary S. C. Pan, Shan-Ling Pan, Chu-Yeong Lim:
Examining how firms leverage IT to achieve firm productivity: RBV and dynamic capabilities perspectives. 401-412 - Zach W. Y. Lee, Christy M. K. Cheung, Tommy K. H. Chan:
Massively multiplayer online game addiction: Instrument development and validation. 413-430 - Le Chen, Patrick S. W. Fong:
Evaluation of knowledge management performance: An organic approach. 431-453 - Zhenbin Yang, Atreyi Kankanhalli, Boon-Yuen Ng, Justin Tuang Yong Lim:
Examining the pre-adoption stages of healthcare IT: A case study of vital signs monitoring systems. 454-467 - Hong Zhang, Yaobin Lu, Bin Wang, Sibin Wu:
The impacts of technological environments and co-creation experiences on customer participation. 468-482 - Henri Barki, Jacques Robert, Alina Dulipovici:
Reconceptualizing trust: A non-linear Boolean model. 483-495 - Chul Woo Yoo, Yong Jin Kim, G. Lawrence Sanders:
The impact of interactivity of electronic word of mouth systems and E-Quality on decision support in the context of the e-marketplace. 496-505 - Zhiling Tu, Ofir Turel, Yufei Yuan, Norman P. Archer:
Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination. 506-517 - Sherah Kurnia, Reyner Jovian Karnali, Md. Mahbubur Rahim:
A qualitative study of business-to-business electronic commerce adoption within the Indonesian grocery industry: A multi-theory perspective. 518-536
Volume 52, Number 5, 2015
- Jen-Ruei Fu, Jessica Hsiaofen Chen:
Career commitment of information technology professionals: The investment model perspective. 537-549 - Jahyun Goo, C. Derrick Huang, Chulmo Koo:
Learning for healthy outcomes: Exploration and exploitation with electronic medical records. 550-562 - Raluca Bunduchi, Alison U. Smart, Kathryn Charles, Lorna McKee, Augusto Azuara-Blanco:
When innovation fails: An institutional perspective of the (non)adoption of boundary spanning IT innovation. 563-576 - Yonggui Wang, Shuang (Sara) Ma, Dahui Li:
Customer participation in virtual brand communities: The self-construal perspective. 577-587 - Tong Che, Zeyu Peng, Kai Hin Lim, Zhongsheng Hua:
Antecedents of consumers' intention to revisit an online group-buying website: A transaction cost perspective. 588-598 - Mumin Abubakre, M. N. Ravishankar, Crispin R. Coombs:
The role of formal controls in facilitating information system diffusion. 599-609
Volume 52, Number 6, September 2015
- Julia Kroenung, Andreas Eckhardt:
The attitude cube - A three-dimensional model of situational factors in IS adoption and their impact on the attitude-behavior relationship. 611-627 - Jie Wei, Paul Benjamin Lowry, Stefan Seedorf:
The assimilation of RFID technology by Chinese companies: A technology diffusion perspective. 628-642 - Yang Chen, Yi Wang, Saggi Nevo, Jose Benitez-Amado, Gang Kou:
IT capabilities and product innovation performance: The roles of corporate entrepreneurship and competitive intensity. 643-657 - Hanpeng Zhang, Xin (Robert) Luo, Qinyu Liao, Lifang Peng:
Does IT team climate matter? An empirical study of the impact of co-workers and the Confucian work ethic on deviance behavior. 658-667 - Anil Bilgihan, Khaldoon Nusair, Fevzi Okumus, Cihan Cobanoglu:
Applying flow theory to booking experiences: An integrated model in an online service context. 668-678 - Zhen Zhu, Jing Zhao, Xinlin Tang, Yao Zhang:
Leveraging e-business process for business value: A layered structure perspective. 679-691 - Chul Woo Yoo, Srikanth Parameswaran, Rajiv Kishore:
Knowing about your food from the farm to the table: Using information systems that reduce information asymmetry and health risks in retail contexts. 692-709 - Mary Tate, Joerg Evermann, Guy Gable:
An integrated framework for theories of individual attitudes toward technology. 710-727 - Baofeng Huo, Cheng Zhang, Xiande Zhao:
The effect of IT and relationship commitment on supply chain coordination: A contingency and configuration approach. 728-740 - Caroline Lancelot Miltgen, H. Jeff Smith:
Exploring information privacy regulation, risks, trust, and behavior. 741-759
Volume 52, Number 7, November 2015
- Weiguo Fan, Xiangbin Yan:
Novel applications of social media analytics. 761-763 - Qian Liu, Mi Zhou, Xin Zhao:
Understanding News 2.0: A framework for explaining the number of comments from readers on online news. 764-776 - Weihui Dai, Dongmei Han, Yonghui Dai, Dongrong Xu:
Emotion recognition and affective computing on vocal social media. 777-788 - Haoyuan Feng, Jin Tian, Harry Jiannan Wang, Minqiang Li:
Personalized recommendations based on time-weighted overlapping community detection. 789-800 - Wu He, Harris Wu, Gongjun Yan, Vasudeva Akula, Jiancheng Shen:
A novel social media competitive analytics framework with sentiment benchmarks. 801-812 - Ji Wu, Liqiang Huang, Jianliang Leon Zhao, Zhongsheng Hua:
The deeper, the better? Effect of online brand community activity on customer purchase frequency. 813-823 - Marten Risius, Roman Beck:
Effectiveness of corporate social media activities in increasing relational outcomes. 824-839 - Jiahua Jin, Yijun Li, Xiaojia Zhong, Li Zhai:
Why users contribute knowledge to online communities: An empirical study of an online social Q&A community. 840-849 - Zhijun Yan, Meiming Xing, Dongsong Zhang, Baizhang Ma:
EXPRS: An extended pagerank method for product feature extraction from online consumer reviews. 850-858 - Jiayin Qi, Xiangling Fu, Ge Zhu:
Subjective well-being measurement based on Chinese grassroots blog text sentiment analysis. 859-869 - Naichen Li, Xunhua Guo, Guoqing Chen, Nianlong Luo:
Reading behavior on intra-organizational blogging systems: A group-level analysis through the lens of social capital theory. 870-881 - Kai Li, Zhangxi Lin, Xiaowen Wang:
An empirical analysis of users' privacy disclosure behaviors on social network sites. 882-891
Volume 52, Number 8, December 2015
- Tabitha L. James, Merrill Warkentin, Stéphane E. Collignon:
A dual privacy decision model for online social networks. 893-908 - Michael T. Lee, Kit Scott:
Leveraging IT resources, embeddedness, and dependence: A supplier's perspective on appropriating benefits with powerful buyers. 909-924 - Pei-Fang Hsu, HsiuJu Rebecca Yen, Jung-Ching Chung:
Assessing ERP post-implementation success at the individual level: Revisiting the role of service quality. 925-942 - Xinping Shi, Ziqi Liao:
Inter-firm dependence, inter-firm trust, and operational performance: The mediating effect of e-business integration. 943-950 - Hsin-Hsuan Meg Lee, Willemijn van Dolen:
Creative participation: Collective sentiment in online co-creation communities. 951-964 - Maryam Ghasemaghaei, Khaled Hassanein:
Online information quality and consumer satisfaction: The moderating roles of contextual factors - A meta-analysis. 965-981 - Lien-Fa Lin, Yung-Ming Li, Wen-Hsiang Wu:
A social endorsing mechanism for target advertisement diffusion. 982-997 - Sungjune Park, Antonis C. Stylianou, Chandrasekar Subramaniam, Yuan Niu:
Information technology and interorganizational learning: An investigation of knowledge exploration and exploitation processes. 998-1011 - Hadrian Geri Djajadikerta, Saiyidi Mat Roni, Terri Trireksani:
Dysfunctional information system behaviors are not all created the same: Challenges to the generalizability of security-based research. 1012-1024 - Caroline Cuny, Marianela Fornerino, Agnès Helme-Guizon:
Can music improve e-behavioral intentions by enhancing consumers' immersion and experience? 1025-1034
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.