default search action
Journal of Management Information Systems, Volume 33
Volume 33, Number 1, 2016
- Vladimir Zwass:
Editorial Introduction. 1-10 - Niek Althuizen, Astrid Reichel:
The Effects of IT-Enabled Cognitive Stimulation Tools on Creative Problem Solving: A Dual Pathway to Creativity. 11-44 - Nicholas H. Roberts, Damon E. Campbell, Leo R. Vijayasarathy:
Using Information Systems to Sense Opportunities for Innovation: Integrating Postadoptive Use Behaviors with the Dynamic Managerial Capability Perspective. 45-69 - Li Zhao, Brian Detlor, Catherine E. Connelly:
Sharing Knowledge in Social Q&A Sites: The Unintended Consequences of Extrinsic Motivation. 70-100 - Amrit Tiwana, Stephen K. Kim:
Concurrent IT Sourcing: Mechanisms and Contingent Advantages. 101-138 - Anjana Susarla, Jeong-ha (Cath) Oh, Yong Tan:
Influentials, Imitables, or Susceptibles? Virality and Word-of-Mouth Conversations in Online Social Networks. 139-170 - Xitong Li:
Could Deal Promotion Improve Merchants' Online Reputations? The Moderating Role of Prior Reviews. 171-201 - Wenqi Zhou, Wenjing Duan:
Do Professional Reviews Affect Online User Choices Through User Reviews? An Empirical Study. 202-228 - Zhenhui Jack Jiang, Weiquan Wang, Bernard C. Y. Tan, Jie Yu:
The Determinants and Impacts of Aesthetics in Users' First Interaction with Websites. 229-259 - Zan Zhang, Guofang Nan, Minqiang Li, Yong Tan:
Duopoly Pricing Strategy for Information Products with Premium Service: Free Product or Bundling? 260-295 - Hong Guo, Hsing Kenneth Cheng, Ken Kelley:
Impact of Network Structure on Malware Propagation: A Growth Curve Perspective. 296-325
Volume 33, Number 2, 2016
- Jay F. Nunamaker Jr., Judee K. Burgoon, Justin Scott Giboney:
Special Issue: Information Systems for Deception Detection. 327-331 - Jeffrey Gainer Proudfoot, Jeffrey L. Jenkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions. 332-360 - Nan Peter Liang, David P. Biros, Andy Luse:
An Empirical Validation of Malicious Insider Characteristics. 361-392 - Shuyuan Mary Ho, Jeffrey T. Hancock, Cheryl Booth, Xiuwen Liu:
Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication. 393-420 - Michael Siering, Jascha-Alexander Koch, Amit V. Deokar:
Detecting Fraudulent Behavior on Crowdfunding Platforms: The Role of Linguistic and Content-Based Cues in Static and Dynamic Contexts. 421-455 - Dongsong Zhang, Lina Zhou, Juan Luo Kehoe, Isil Yakut Kilic:
What Online Reviewer Behaviors Really Matter? Effects of Verbal and Nonverbal Behaviors on Detection of Fake Online Reviews. 456-481 - Victor A. Benjamin, Bin Zhang, Jay F. Nunamaker Jr., Hsinchun Chen:
Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities. 482-510 - Stephan Ludwig, Tom van Laer, Ko de Ruyter, Mike Friedman:
Untangling a Web of Lies: Exploring Automated Detection of Deception in Computer-Mediated Communication. 511-541
- Eric K. Clemons, Rajiv M. Dewan, Robert J. Kauffman, Thomas A. Weber:
Special Section: When Machine Meets Society: Social Impacts of Information and Information Economics. 542-545 - Debabrata Dey, Atanu Lahiri:
Versioning: Go Vertical in a Horizontal Market? 546-572 - Thomas A. Weber:
Product Pricing in a Peer-to-Peer Economy. 573-596 - Josephine Wolff:
Perverse Effects in Defense of Computer Systems: When More Is Less. 597-620
Volume 33, Number 3, 2016
- Vladimir Zwass:
Editorial Introduction. 621-623 - Panos M. Markopoulos, Ravi Aron, Lyle H. Ungar:
Product Information Websites: Are They Good for Consumers? 624-651 - Eun Hee Park, Balasubramaniam Ramesh, Lan Cao:
Emotion in IT Investment Decision Making with A Real Options Perspective: The Intertwining of Cognition and Regret. 652-683 - Jordan B. Barlow, Alan R. Dennis:
Not As Smart As We Think: A Study of Collective Intelligence in Virtual Groups. 684-712 - Bonnie Brinton Anderson, Anthony Vance, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle:
From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It. 713-743 - Weiquan Wang, Izak Benbasat:
Empirical Assessment of Alternative Designs for Enhancing Different Types of Trusting Beliefs in Online Recommendation Agents. 744-775 - Fatemeh Zahedi, Nitin Walia, Hemant K. Jain:
Augmented Virtual Doctor Office: Theory-based Design and Assessment. 776-808 - Jaime Gómez, Idana Salazar, Pilar Vargas:
Firm Boundaries, Information Processing Capacity, and Performance in Manufacturing Firms. 809-842 - Ferdinand Thies, Michael Wessel, Alexander Benlian:
Effects of Social Interaction Dynamics on Platforms. 843-873 - Michael T. Lash, Kang Zhao:
Early Predictions of Movie Success: The Who, What, and When of Profitability. 874-903 - Ben C. F. Choi, Sung S. Kim, Zhenhui Jack Jiang:
Influence of Firm's Recovery Endeavors upon Privacy Breach on Online Customer Behavior. 904-933
Volume 33, Number 4, 2016
- Vladimir Zwass:
Editorial Introduction. 935-937
- Justin Scott Giboney, Robert O. Briggs, Jay F. Nunamaker Jr.:
Special Issue: Designing Tools to Answer Great Information Systems Research Questions. 938-941 - Stefan Henningsson, William J. Kettinger:
Understanding Information Systems Integration Deficiencies in Mergers and Acquisitions: A Configurational Perspective. 942-977 - Xusen Cheng, Shixuan Fu, Douglas A. Druckenmiller:
Trust Development in Globally Distributed Collaboration: A Case of U.S. and Chinese Mixed Teams. 978-1007 - Gene Moo Lee, Liangfei Qiu, Andrew B. Whinston:
A Friend Like Me: Modeling Network Formation in a Location-Based Social Network. 1008-1033 - Manoochehr Ghiassi, David Zimbra, Sean Lee:
Targeted Twitter Sentiment Analysis for Brands Using Supervised Feature Engineering and the Dynamic Architecture for Artificial Neural Networks. 1034-1058 - Weifeng Li, Hsinchun Chen, Jay F. Nunamaker Jr.:
Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System. 1059-1086
- Ofir Turel, Hamed Qahri-Saremi:
Problematic Use of Social Networking Sites: Antecedents and Consequence from a Dual-System Theory Perspective. 1087-1116 - Eric K. Clemons, Joshua S. Wilson, Christian Matt, Thomas Hess, Fei Ren, Fujie Jin, Noi Sian Koh:
Global Differences in Online Shopping Behavior: Understanding Factors Leading to Trust. 1117-1148 - Paul Jen-Hwa Hu, Han-fen Hu, Chih-Ping Wei, Pei-Fang Hsu:
Examining Firms' Green Information Technology Practices: A Hierarchical View of Key Drivers and Their Effects. 1149-1179 - Gregory S. Dawson, James S. Denford, Clay K. Williams, David Preston, Kevin C. Desouza:
An Examination of Effective IT Governance in the Public Sector Using the Legal View of Agency Theory. 1180-1208 - Vincent Siu-king Lai, Fujun Lai, Paul Benjamin Lowry:
Technology Evaluation and Imitation: Do They Have Differential or Dichotomous Effects on ERP Adoption and Assimilation in China? 1209-1251
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.