default search action
Joey F. George
Person information
- affiliation: Iowa State University, Ames, IA, USA
- affiliation: Florida State University, Tallahassee, FL, USA
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j73]Inmyung Choi, David E. Cantor, Kunsoo Han, Joey F. George:
Dual Pathways of Value Creation from Digital Strategic Posture: Contingent Effects of Competitive Actions and Environmental Uncertainty. MIS Q. 48(1): 409-426 (2024) - [c47]Joey F. George, Sophia Mannina:
Why Are People Duped by Healthcare Disinformation Campaigns? HICSS 2024: 136-145 - 2023
- [j72]Akmal Mirsadikov, Joey F. George:
Can you see me lying? Investigating the role of deception on gaze behavior. Int. J. Hum. Comput. Stud. 174: 103010 (2023) - [j71]Joey F. George, Manjul Gupta, Gabriel A. Giordano, Annette Mills, Vanesa Tennant, Carmen C. Lewis:
Publishing the Data from "The Effects of Communication Mode and Culture on Deception Detection Accuracy". J. Inf. Syst. 37(2): 129-136 (2023) - [j70]Joey F. George, Annette M. Mills, Gabriel A. Giordano, Manjul Gupta, Vanesa Monique Tennant, Carmen C. Lewis:
Toward a Greater Understanding of the Use of Nonverbal Cues To Deception in Computer-Mediated Communication. IEEE Trans. Prof. Commun. 66(2): 131-149 (2023) - 2022
- [j69]Alaa Nehme, Joey F. George:
Approaching IT Security & Avoiding Threats in the Smart Home Context. J. Manag. Inf. Syst. 39(4): 1184-1214 (2022) - [c46]Joey F. George, Akmal Mirsadikov, Misty Nabors, Kent Marett:
What do Users Actually Look at During 'Zoom' Meetings? Discovery Research on Attention, Gender and Distraction Effects. HICSS 2022: 1-9 - 2021
- [c45]Argha Ray, Joey F. George:
Online Hate and its Routes to Aggression: A Research Agenda. HICSS 2021: 1-11 - 2020
- [j68]Maomao Chi, Rui Huang, Joey F. George:
Collaboration in demand-driven supply chain: Based on a perspective of governance and IT-business strategic alignment. Int. J. Inf. Manag. 52: 102062 (2020) - [c44]Alaa Nehme, Joey F. George:
Taking It Out on IT: A Mechanistic Model of Abusive Supervision and Computer Abuse. HICSS 2020: 1-9 - [c43]Brian Fitzgerald, Joey F. George, Souren Paul, Rahul De':
ICIS 2020 Closing & AIS Awards Presentation. ICIS 2020 - [c42]Joey F. George, Brian Fitzgerald, Souren Paul, Narayana Murthy, Cynthia Mathis Beath, Varun Grover, Elena Karahanna, Jae Kyu Lee:
ICIS 2020 Welcome, Keynote, LEOs and Fellow Awards. ICIS 2020 - [c41]Joey F. George, Souren Paul, Elena Karahanna, Suprateek Sarker, Gal Östreicher-Singer, Narayana Murthy:
ICIS 2020 Best Paper Awards and AIS Leadership Excellence Award (LEA). ICIS 2020 - [e1]Joey F. George, Souren Paul, Rahul De', Elena Karahanna, Suprateek Sarker, Gal Oestreicher-Singer:
Proceedings of the 41st International Conference on Information Systems, ICIS 2020, Making Digital Inclusive: Blending the Locak and the Global, Hyderabad, India, December 13-16, 2020. Association for Information Systems 2020, ISBN 978-1-7336325-5-3 [contents]
2010 – 2019
- 2019
- [j67]Joey F. George:
Journal Lists are Not Going Away: A Response to Fitzgerald et al. Commun. Assoc. Inf. Syst. 45: 8 (2019) - [j66]Manjul Gupta, Joey F. George, Weidong Xia:
Relationships between IT department culture and agile software development practices: An empirical investigation. Int. J. Inf. Manag. 44: 13-24 (2019) - [j65]Joey F. George, Kent Marett:
Invited Paper: The Times they are a Changin': How Non-Technology Factors have Affected IS Curriculum over Time. J. Inf. Syst. Educ. 30(4): 222-231 (2019) - [c40]Argha Ray, Joey F. George:
Online Disinformation and the Psychological Bases of Prejudice and Political Conservatism. HICSS 2019: 1-11 - [c39]Abhay Mishra, Chengxin Cao, Joey F. George:
IT-Induced Employment Irregularities and Deskilling: Impacts on Temporary Worker Welfare. ICIS 2019 - 2018
- [j64]Joey F. George, Emily J. Kohnke:
Personal Health Record Systems as Boundary Objects. Commun. Assoc. Inf. Syst. 42: 2 (2018) - [j63]Alan R. Dennis, Joey F. George, K. D. Joshi, Jan Recker, Jason Thatcher:
Celebrating HICSS50: The Past, Present, and Future of HICSS. Commun. Assoc. Inf. Syst. 43: 38 (2018) - [j62]Roger McHaney, Joey F. George, Manjul Gupta:
An Exploration of Deception Detection: Are Groups More Effective Than Individuals? Commun. Res. 45(8) (2018) - [j61]Maomao Chi, Weijun Wang, Xinyuan Lu, Joey F. George:
Antecedents and outcomes of collaborative innovation capabilities on the platform collaboration environment. Int. J. Inf. Manag. 43: 273-283 (2018) - [j60]Dirk Hovorka, Jason Bennett Thatcher, Alan R. Dennis, Joey F. George:
Informing Research: Celebrating 50 Years of Ideas and Science at HICSS. J. Assoc. Inf. Syst. 19(10): 6 (2018) - [j59]Joey F. George, Kevin P. Scheibe, Anthony M. Townsend, Brian E. Mennecke:
The amorphous nature of agile: no one size fits all. J. Syst. Inf. Technol. 20(2): 241-260 (2018) - [j58]Joey F. George, Manjul Gupta, Gabriel A. Giordano, Annette M. Mills, Vanesa Monique Tennant, Carmen C. Lewis:
The Effects of Communication Media and Culture on Deception Detection Accuracy. MIS Q. 42(2) (2018) - [c38]Siddharth Baswani, Joey F. George, Anthony M. Townsend:
Connected Homes and Online Retail: The Case of IoT Enabled Online Shopping. AMCIS 2018 - [c37]Alaa Nehme, Joey F. George:
Behind Cyber Doors: Securing the Internet of Self. AMCIS 2018 - [c36]Alaa Nehme, Joey F. George:
Iterating the Cybernetic Loops in Anti-Phishing Behavior: A Theoretical Integration. AMCIS 2018 - [c35]Daniel A. Pienta, Jason Thatcher, Heshan Sun, Joey F. George:
Information Systems Betrayal: When Cybersecurity Systems Shift from Agents of Protection to Agents of Harm. PACIS 2018: 175 - 2017
- [j57]Kent Marett, Joey F. George, Carmen C. Lewis, Manjul Gupta, Gabriel A. Giordano:
Beware the dark side: Cultural preferences for lying online. Comput. Hum. Behav. 75: 834-844 (2017) - [j56]Maomao Chi, Jing Zhao, Joey F. George, Yanhui Li, Shanshan Zhai:
The influence of inter-firm IT governance strategies on relational performance: The moderation effect of information technology ambidexterity. Int. J. Inf. Manag. 37(2): 43-53 (2017) - [c34]Inmyung Choi, David Edward Cantor, Joey F. George:
Does IT Capability and Competitive Actions Shape Firm Profitability? ICIS 2017 - 2016
- [j55]Joey F. George, Akmal Mirsadikov, Brian E. Mennecke:
Website Credibility Assessment: An Empirical - Investigation of Prominence-interpretation Theory. AIS Trans. Hum. Comput. Interact. 8(2): 1 (2016) - [j54]Inmyung Choi, Joey F. George:
One Question, Two Answers Mixed Findings of Information Technology Capability and Firm Performance and Their Implications. AIS Trans. Replication Res. 2: 3 (2016) - [j53]Joey F. George, Gabriel A. Giordano, Patti Tilley:
Website credibility and deceiver credibility: Expanding Prominence-Interpretation Theory. Comput. Hum. Behav. 54: 83-93 (2016) - [j52]Manjul Gupta, Joey F. George:
Toward the development of a big data analytics capability. Inf. Manag. 53(8): 1049-1064 (2016) - [c33]Inmyung Choi, Joey F. George:
Mixed Findings on IT Capability and Firm Performance and their Implications. AMCIS 2016 - [c32]Joey F. George, Douglas C. Derrick, Andrew J. Harrison, Kent Marett, Jason Bennett Thatcher:
The Dark Internet: Without Darkness There is No Light. AMCIS 2016 - 2015
- [j51]Maomao Chi, Jing Zhao, Joey F. George:
Mediation and time-lag analyses of e-alignment and e-collaboration capabilities. Ind. Manag. Data Syst. 115(6): 1113-1131 (2015) - [j50]Munir Mandviwalla, Bruce Fadem, Michael Goul, Joey F. George, David P. Hale:
Achieving Academic-Industry Collaboration with Departmental Advisory Boards. MIS Q. Executive 14(1): 4 (2015) - [c31]David Edward Cantor, Inmyung Choi, Joey F. George:
How Does the Rivalry between Firms Explain the IT Capability Gap, Leanness, and Performance of Firms? AMCIS 2015 - 2014
- [j49]Wen-Lung Shiau, Joey F. George:
A Grounded Theory Approach to Information Technology Adoption. Commun. Assoc. Inf. Syst. 34: 81 (2014) - [j48]Joey F. George, Patti Tilley, Gabriel A. Giordano:
Sender credibility and deception detection. Comput. Hum. Behav. 35: 1-11 (2014) - [j47]Fang Ding, Dong Li, Joey F. George:
Investigating the effects of IS strategic leadership on organizational benefits from the perspective of CIO strategic roles. Inf. Manag. 51(7): 865-879 (2014) - [c30]Brian E. Mennecke, Heng Xu, Chuan-Hoo Tan, H. Jeff Smith, Marie Shroff, Malcolm Crompton, Joey F. George:
Privacy in the Age of Big Data: The Challenges and Opportunities for Privacy Research. ICIS 2014 - [p4]Joey F. George:
From Waterfall to Agile: A Review of Approaches to Systems Analysis and Design. Computing Handbook, 3rd ed. (2) 2014: 28: 1-16 - 2013
- [j46]Tom E. Yoon, Joey F. George:
Why aren't organizations adopting virtual worlds? Comput. Hum. Behav. 29(3): 772-790 (2013) - [j45]John R. Carlson, Dawn S. Carlson, Emily M. Hunter, Randal L. Vaughn, Joey F. George:
Virtual Team Effectiveness: Investigating the Moderating Role of Experience with Computer-Mediated Communication on the Impact of Team Cohesion and Openness. J. Organ. End User Comput. 25(2): 1-18 (2013) - [j44]Joey F. George, John R. Carlson, Joseph S. Valacich:
Media Selection as a Strategic Component of Communication. MIS Q. 37(4): 1233-1251 (2013) - [j43]Gabriel A. Giordano, Joey F. George:
The Effects of Task Complexity and Group Member Experience on Computer-Mediated Groups Facing Deception. IEEE Trans. Prof. Commun. 56(3): 210-225 (2013) - [c29]Manjul Gupta, Joey F. George:
The Effects of Fictitious Customer Testimonials across Different Cultures. AMCIS 2013 - [c28]Niels Bjørn-Andersen, Joey F. George, John Leslie King, Hock-Hai Teo:
MOOCs and Beyond. ICIS 2013 - 2012
- [j42]Jason Thatcher, Michael Dinger, Joey F. George:
Information Technology Worker Recruitment: An Empirical Examination of Entry-Level IT Job Seekers' Labor Market. Commun. Assoc. Inf. Syst. 31: 1 (2012) - [j41]Christopher P. Furner, Joey F. George:
Cultural determinants of media choice for deception. Comput. Hum. Behav. 28(4): 1427-1438 (2012) - 2011
- [j40]Albert L. Harris, Joey F. George, Mary Granger, Geoffrey N. Dick:
Faculty Exchanges as a Way to Increase Globalization in the IS Curriculum. Commun. Assoc. Inf. Syst. 28: 3 (2011) - [j39]Jongsoo Yoon, Tom E. Yoon, Joey F. George:
Anticipating information needs for senior portal contents. Comput. Hum. Behav. 27(2): 1012-1020 (2011) - [c27]Michelle Carter, Jeffrey A. Clements, Jason Bennett Thatcher, Joey F. George:
Unraveling the "paradox of the active user": Determinants of individuals' innovation with it-based work routines. AMCIS 2011 - [c26]David Gomillion, Joey F. George:
Perceived Organizational Readiness Study on EHR Implementation. AMCIS 2011 - 2010
- [j38]Joey F. George, John R. Carlson:
Lying at Work: A Deceiver's View of Media Characteristics. Commun. Assoc. Inf. Syst. 27: 44 (2010)
2000 – 2009
- 2009
- [c25]Christopher P. Furner, Joey F. George:
Making it Hard to Lie: Cultural Determinants of Media Choice for Deception. HICSS 2009: 1-11 - [c24]Carmen C. Lewis, Joey F. George, Gabriel A. Giordano:
A Cross-Cultural Comparison of Computer-Mediated Deceptive Communication. PACIS 2009: 21 - 2008
- [j37]Joey F. George:
Three Years as Editor-in-Chief of Communications of the Association for Information Systems. Commun. Assoc. Inf. Syst. 23: 36 (2008) - [j36]Carmen C. Lewis, Joey F. George:
Cross-cultural deception in social networking sites and face-to-face communication. Comput. Hum. Behav. 24(6): 2945-2964 (2008) - [j35]Randall J. Boyle, Charles J. Kacmar, Joey F. George:
Distributed Deception: An Investigation of the Effectiveness of Deceptive Communication in a Computer-Mediated Environment. Int. J. e Collab. 4(3): 14-39 (2008) - [j34]Joey F. George, Kent Marett, Gabriel A. Giordano:
Deception: Toward an Individualistic View of Group Support Systems. J. Assoc. Inf. Syst. 9(10): 3 (2008) - [j33]Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker Jr., Janna M. Crews, Jinwei Cao, Kent Marett, Mark Adkins, John Kruse, Ming Lin:
The Role of E-Training in Protecting Information Assets Against Deception Attacks. MIS Q. Executive 7(2): 5 (2008) - [c23]Gabriel A. Giordano, Joey F. George, Kent Marett, Bryan Keane:
Detecting Deception in Computer-Mediated Interviewing. ECIS 2008: 1826-1834 - [p3]Gabriel A. Giordano, Jason S. Stoner, Robyn L. Brouer, Joey F. George:
Computer Mediated Negotiations and Deception. Handbook of Research on Computer Mediated Communication 2008: 220-229 - [p2]Joey F. George, Kent Marett:
Deceptive Communication in E-Collaboration. Handbook of Research on Computer Mediated Communication 2008: 297-307 - 2007
- [j32]Gabriel A. Giordano, Jason S. Stoner, Robyn L. Brouer, Joey F. George:
The Influences of Deception and Computer-Mediation on Dyadic Negotiations. J. Comput. Mediat. Commun. 12(2): 362-383 (2007) - [j31]Manju K. Ahuja, Katherine M. Chudoba, Charles J. Kacmar, D. Harrison McKnight, Joey F. George:
IT Road Warriors: Balancing Work--Family Conflict, Job Autonomy, and Work Overload to Mitigate Turnover Intentions. MIS Q. 31(1): 1-17 (2007) - [c22]Joey F. George:
The Gap Between Small Group Theory and Group Support System Research. CRIWG 2007: 1-14 - 2006
- [c21]Joey F. George:
Researching life in e-society with diary studies. ECIS 2006: 1182-1193 - 2005
- [j30]Joey F. George, Joseph S. Valacich, Josep Valor:
Does Information Systems Still Matter? Lessons for a Maturing Discipline. Commun. Assoc. Inf. Syst. 16: 8 (2005) - [j29]Joey F. George, Kent Marett:
Deception: The Dark Side of E-Collaboration. Int. J. e Collab. 1(4): 24-37 (2005) - [j28]David P. Biros, Joey F. George, Robert W. Zmud:
Inside the Fence: Sensitizing Decision Makers to the Possibility of Deception in the Data They Use. MIS Q. Executive 4(1): 6 (2005) - [c20]John G. Mooney, Mark W. S. Chun, Anat Hovav, Joey F. George, Charla Griffy-Brown:
Are Prevailing Theories and Practices of IS Security Management Adequate? An Evaluation and Call to Action. AMCIS 2005: 400 - [c19]David P. Biros, Jachin Sakamoto, Joey F. George, Mark Adkins, John Kruse, Judee K. Burgoon, Jay F. Nunamaker Jr.:
A Quasi-experiment to Determine the Impact of a Computer Based Deception Detection Training System: The Use of Agent99 Trainer in the U.S. Military. HICSS 2005 - [c18]Joey F. George, John R. Carlson:
Media Selection for Deceptive Communication. HICSS 2005 - [c17]Gabriel A. Giordano, Joey F. George:
Task Complexity and Deception Detection in a Collaborative Group Setting. HICSS 2005 - [c16]Kent Marett, Joey F. George:
Group Deception in Computer-Supported Environments. HICSS 2005 - [c15]Patti Tilley, Joey F. George, Kent Marett:
Gender Differences in Deception and Its Detection Under Varying Electronic Media Conditions. HICSS 2005 - 2004
- [j27]Joey F. George:
The theory of planned behavior and Internet purchasing. Internet Res. 14(3): 198-212 (2004) - [j26]Jason Bennett Thatcher, Joey F. George:
Commitment, Trust, and Social Involvement: An Exploratory Study of Antecedents to Web Shopper Loyalty. J. Organ. Comput. Electron. Commer. 14(4): 243-268 (2004) - [c14]Joey F. George, Kent Marett:
Inhibiting Deception and Its Detection. HICSS 2004 - [c13]Joey F. George, Kent Marett, Judee K. Burgoon, Janna M. Crews, Jinwei Cao, Ming Lin, David P. Biros:
Training to Detect Deception: An Experimental Investigation. HICSS 2004 - [c12]Joey F. George, Kent Marett, Patti Tilley:
Deception Detection under Varying Electronic Media and Warning Conditions. HICSS 2004 - [c11]Joey F. George, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Testing Various Modes of Computer-Based Training for Deception Detection. ISI 2004: 411-417 - 2003
- [j25]Joey F. George, Robert M. Davison, Jon Heales, Malcolm Munro:
Report of the Ad Hoc Committee on Member Misconduct to the AIS Council. Commun. Assoc. Inf. Syst. 11: 2 (2003) - [c10]Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Training Professionals to Detect Deception. ISI 2003: 366-370 - 2002
- [j24]Craig K. Tyran, Joey F. George:
Improving software inspections with group process support. Commun. ACM 45(9): 87-92 (2002) - [j23]Blake Ives, Joseph S. Valacich, Richard T. Watson, Robert W. Zmud, Maryam Alavi, Richard L. Baskerville, Jack J. Baroudi, Cynthia Beath, Thomas Clark, Eric K. Clemons, Gordon B. Davis, Fred D. Davis, Alan R. Dennis, Omar A. El Sawy, Jane Fedorowicz, Robert D. Galliers, Joey F. George, Paul Gray, Rudy Hirschheim, Sirkka Jarvenpaa, Len Jessup, Chris F. Kemerer, John L. King, Benn R. Konsynski, Kenneth L. Kraemer, Jerry N. Luftman, Salvatore T. March, M. Lynne Markus, Richard O. Mason, F. Warren McFarlan, Ephraim R. McLean, Lorne Olfman, Margrethe H. Olson, John F. Rockart, Vallabh Sambamurthy, Peter A. Todd, Michael Vitale, Ron Weber, Andrew B. Whinston:
What Every Business Student Needs to Know About Information Systems. Commun. Assoc. Inf. Syst. 9: 30 (2002) - [j22]Joey F. George:
Influences on the intent to make Internet purchases. Internet Res. 12(2): 165-180 (2002) - [j21]David P. Biros, Joey F. George, Robert W. Zmud:
Inducing Sensitivity to Deception in Order to Improve Decision Making Performance: A Field Study. MIS Q. 26(2): 119-144 (2002) - [c9]Manju Ahuja, Katherine M. Chudoba, Joey F. George, Chuck Kacmar, D. Harrison McKnight:
Overworked and Isolated? Predicting the Effect of Work-Family Conflict, Autonomy, and Workload on Organizational Commitment and Turnover of Virtual Workers. HICSS 2002: 271 - [p1]Joey F. George:
Groupware. Encyclopedia of Information Systems 2002: 509-518 - 2000
- [j20]Joey F. George, Kevin Duffy, Manju Ahuja:
Countering the anchoring and adjustment bias with decision support systems. Decis. Support Syst. 29(2): 195-206 (2000) - [j19]Radhika Santhanam, Tor Guimaraes, Joey F. George:
An empirical investigation of ODSS impact on individuals and organizations. Decis. Support Syst. 30(1): 51-72 (2000) - [c8]Joey F. George:
The Effects of Internet Experience and Attitudes Toward Privacy and Security on Internet Purchasing. ECIS 2000: 1053-1058
1990 – 1999
- 1999
- [c7]Joey F. George, John R. Carlson:
Group Support Systems and Deceptive Communication. HICSS 1999 - 1997
- [j18]Joey F. George, Leonard M. Jessup:
Groups over time: what are we really studying? Int. J. Hum. Comput. Stud. 47(3): 497-511 (1997) - 1996
- [j17]Joey F. George:
Computer-Based Monitoring: Common Perceptions and Empirical Results. MIS Q. 20(4): 459-480 (1996) - [c6]Joey F. George, Mary J. Culnan, H. Jeff Smith, Martin Abrams:
Panel 15 Researching Privacy: From Computerized Workplaces to the Marketspace. ICIS 1996: 73 - 1995
- [j16]Chandra S. Amaravadi, Joey F. George, Olivia R. Liu Sheng, Jay F. Nunamaker Jr.:
The Adequacy of Office Models. Adv. Comput. 40: 181-253 (1995) - [j15]Joline Morrison, Joey F. George:
Exploring the Software Engineering Component in MIS Research. Commun. ACM 38(7): 80-91 (1995) - [j14]Dien D. Phan, Joey F. George, Douglas R. Vogel:
Managing software quality in a very large development project. Inf. Manag. 29(5): 277-283 (1995) - 1993
- [j13]Erran Carmel, Randall D. Whitaker, Joey F. George:
PD and Joint Application Design: A Transatlantic Comparison. Commun. ACM 36(6): 40-48 (1993) - [j12]Craig K. Tyran, Joey F. George:
The Implementation of Expert Systems: A Survey of Successful Implementations. Data Base 24(1): 5-15 (1993) - [c5]Dirk Baldwin, Joey F. George, Ramayya Krishnan, Jay F. Nunamaker Jr., Joel Stroup:
Systems Development: Vital MIS Research Method or Medicine Show? ICIS 1993: 407 - 1992
- [j11]Joey F. George, Jay F. Nunamaker Jr., Joseph S. Valacich:
Information technology for organizational change. Decis. Support Syst. 8(4): 307-315 (1992) - [j10]Joey F. George, Jay F. Nunamaker Jr., Joseph S. Valacich:
Electronic meeting systems as innovation: A study of the innovation process. Inf. Manag. 22(3): 187-195 (1992) - [j9]Joey F. George:
An examination of four GDSS experiments. J. Inf. Sci. 18(2): 149-158 (1992) - [j8]Joey F. George:
The Conceptualization and Development of Organizational Decision Support Systems. J. Manag. Inf. Syst. 8(3): 109-126 (1992) - [j7]Chandra S. Amaravadi, Olivia R. Liu Sheng, Joey F. George, Jay F. Nunamaker Jr.:
AEI: A Knowledge-Based Approach to Integrated Office Systems. J. Manag. Inf. Syst. 9(1): 133-164 (1992) - [c4]Erran Carmel, Joey F. George, Jay F. Nunamaker Jr.:
Supporting Joint Application Development (JAD) with Electronic Meeting Systems: A Field Study. ICIS 1992: 223-232 - 1991
- [j6]Jay F. Nunamaker Jr., Alan R. Dennis, Joseph S. Valacich, Douglas R. Vogel, Joey F. George:
Electronic Meeting Systems To Support Group Work. Commun. ACM 34(7): 40-61 (1991) - [j5]Joey F. George, John Leslie King:
Examining the Computing and Centralization Debate. Commun. ACM 34(7): 62-72 (1991) - [j4]Joey F. George, James W. Theis:
Microcomputer Training: Do Trained Users Differ from Nontrained User? Data Base 22(1&2): 1-10 (1991) - 1990
- [j3]Joey F. George, George K. Easton, Jay F. Nunamaker Jr., Gregory B. Northcraft:
A Study of Collaborative Group Work With and Without Computer-Based Support. Inf. Syst. Res. 1(4): 394-415 (1990) - [j2]George K. Easton, Joey F. George, Jay F. Nunamaker Jr., Mark Pendergast:
Using Two Different Electronic Meeting System Tools for the Same Task: An Experimental Comparison. J. Manag. Inf. Syst. 7(1): 85-100 (1990) - [c3]Joey F. George, Joseph S. Valacich, Jay F. Nunamaker Jr.:
The organizational implementation of an electronic meeting system: an analysis of the innovation process. CHI 1990: 361-368 - [c2]Mary Zmuidzinas, Rob Kling, Joey F. George:
Desktop Computerization as a Continuing Process. ICIS 1990: 31
1980 – 1989
- 1989
- [c1]S. J. Lepore, Rob Kling, Suzanne Iacono, Joey F. George:
Implementing desktop computing, infrastructure, and quality of worklife. ICIS 1989: 223-235 - 1988
- [j1]Alan R. Dennis, Joey F. George, Leonard M. Jessup, Jay F. Nunamaker Jr., Douglas R. Vogel:
Information Technology to Support Electronic Meetings. MIS Q. 12(4): 591-624 (1988)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint