default search action
MIS Quarterly, Volume 33
Volume 33, Number 1, March 2009
- Gerald C. Kane, Robert G. Fichman:
The Shoemaker's Children: Using Wikis for Information Systems Teaching, Research, and Publication. 1-17
- Wenjing Duan, Bin Gu, Andrew B. Whinston:
Informational Cascades and Software Adoption on the Internet: An Empirical Investigation. 23-48 - Sung S. Kim, Jai-Yeol Son:
Out of Dedication or Constraint? A Dual Model of Post-Adoption Phenomena and its Empirical Test in the Context of Online Services. 49-70 - Huigang Liang, Yajiong Xue:
Avoidance of Information Technology Threats: A Theoretical Perspective. 71-90 - Venugopal Balijepally, RadhaKanta Mahapatra, Sridhar P. Nerur, Kenneth H. Price:
Are Two Heads Better than One for Software Development? The Productivity Paradox of Pair Programming. 91-118 - Jahyun Goo, Rajiv Kishore, H. Raghav Rao, Kichan Nam:
The Role of Service Level Agreements in Relational Management of Information Technology Outsourcing: An Empirical Study. 119-145 - Norman A. Johnson, Randolph B. Cooper:
Power and Concession in Computer-Mediated Negotiations: An Examination of First Offers. 147-170
- Martin Wetzels, Gaby Odekerken-Schröder, Claudia van Oppen:
Using PLS Path Modeling for Assessing Hierarchial Construct Models: Guidelines and Impirical Illustration. 177-195 - Israr Qureshi, Deborah Compeau:
Assessing Between-Group Differences in Information Systems Research: A Comparison of Covariance-and Component-Based SEM. 197-214
Volume 33, Number 2, June 2009
- Grandon Gill, Anol Bhattacherjee:
Whom Are We Informing? Issues and Recommendations for MIS Research from an Informing Science Perspective. 217-235
- Allen S. Lee, Geoffrey S. Hubona:
A Scientific Basis for Rigor in Information Systems Research. 237-262
- Anindya Ghose:
Internet Exchanges for Used Goods: An Empirical Analysis of Trade Patterns and Adverse Selection. 263-291 - Weiquan Wang, Izak Benbasat:
Interactive Decision Aids for Consumer Decision Making in E-Commerce: The Influence of Perceived Strategy Restrictiveness. 203-320 - Michael D. Smith, Rahul Telang:
Competing with Free: The Impact of Movie Broadcasts on DVD Sales and Internet Piracy. 321-338 - Corey M. Angst, Ritu Agarwal:
Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion. 339-370 - Tracy Ann Sykes, Viswanath Venkatesh, Sanjay Gosain:
Model of Acceptance with Peer Support: A Social Network Perspective to Understand Employees' System Use. 371-393
- Jiming Wu, Albert L. Lederer:
A Meta-Analysis of the Role of Environment-Based Voluntariness in Information Technology Acceptance. 419-432
- Ned Kock:
Information Systems Theorizing Based on Evolutionary Psychology: An Interdisciplinary Review and Theory Integration Framework. 395-418
Volume 33, Number 4, December 2009
- Richard L. Baskerville, Michael D. Myers:
Fashion Waves in Information Systems Research and Practice. 647-662 - Mary J. Culnan, Cynthia Clark Williams:
How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches. 673-687
- Ronald T. Cenfetelli, Geneviève Bassellier:
Interpretation of Formative Measurement in Information Systems Research. 689-708
- Ping Wang, Neil C. Ramiller:
Community Learning in Information Technology Innovation. 709-734 - Richard Klein, Arun Rai:
Interfirm Strategic Information Flows in Logistics Supply Chain Relationships. 735-762 - Ravi Bapna, Seokjoo Andrew Chang, Paulo B. Góes, Alok Gupta:
Overlapping Online Auctions: Empirical Characterization of Bidder Strategies and Auction Prices. 763-783 - Charalambos L. Iacovou, Ronald L. Thompson, H. Jeff Smith:
Selective Status Reporting in Information Systems Projects: A Dyadic-Level Investigation. 785-810
- Gary Klein, James J. Jiang, Paul H. Cheney:
Resolving Difference Score Issues in Information Systems Research. 811-826 - Ryad Titah, Henri Barki:
Nonlinearities Between Attitude and Subjective Norms in Information Technology Acceptance: A Negative Synergy? 827-844
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.