Downloadable PDF Files

Issue #*Forthcoming
(download all files)
Issue #43:4 December 2019
(download all files)
#43.4.02 Shared or Dedicated Infrastructures: On the Impact of Reprovisioning Ability by Roch Guerin, Kartik Hosanagar, Xinxin Li, and Soumya Sen (download)
#43.4.03 Governance and ICT4D Initiative Success: A Longitudinal Field Study of Ten Villages in Rural India by Viswanath Venkatesh, Tracy Ann Sykes, Arun Rai, and Pankaj Setia (download)
#43.4.04 Using Eye Tracking to Expose Cognitive Processes in Understanding Conceptual Models by Palash Bera, Pnina Sofer, and Jeffrey Parsons (download)
#43.4.06 Do Search Engines Influence Media Piracy? Evidence from a Randomized Study by Liron Sivan, Michael D. Smith, and Rahul Telang (download)
#43.4.09 Holistic Archetypes of IT Outsourcing Strategy: A Contingency Fit and Configurational Approach by Jae-Nam Lee, YoungKi Park, Detmar W. Straub, and Yunmo Koo (download)
#43.4.12 Theorizing the Digital Object by Philip Faulkner and Jochen Runde (download)
#43.4.13 Followership in an Open-Source Software Project and its Significance in Code Reuse by Qiqi Jiang, Chuan-Hoo Tan, Choon Ling Sia, and Kwok-Kee Wei (download)
#43.4.15 Fake News on Social Media: People Believe What They Want to Believe When it Makes No Sense At All by Patricia L. Moravec, Randall K. Minas, and Anal R. Dennis (download)
Issue #43:3 September 2019
(download all files)
#43.3.01 The Sociotechnical Axis of Cohesion for the IS Discipline: Its Historical Legacy and its Continued Relevance by Suprateek Sarker, Sutirtha Chatterjee, Xiao Xiao, and Amany Elbanna (download)
#43.3.02 Designing Real-Time Feedback for Bidder in Homogeneous-Item Continuous Combinatorial Auctions by Gediminas Adomavicius, Alok Gupta, and Mochen Yang (download)
#43.3.04 The Right Music at the Right Time: Adaptive Personalized Playlists Based on Sequence Modeling by Elad Liebman, Maytal Saar-Tsechansky, and Peter Stone (download)
#43.3.05 Optimal Market Entry Timing for Successive Generations of Technological Innovations by Zhengrui Jiang, Xinxue (Shawn) Qu, and Dipak C. Jain (download)
#43.3.06 Using Polynomial Modeling to Understand Service Quality in E-Government Websites by Rohit Nishant, Shirish C. Srivastava, and Thompson S. H. Teo (download)
#43.3.07 Mobile App Recommendation: An Involvement-Enhanced Approach by Jiangning He, Xiao Fang, Hongyan Liu, and Xindan Li (download)
#43.3.08 An fMRI Exploration of Information Processing in Electronic Networks of Practice by Thomas O. Meservy, Kelly J. Fadel, C. Brock Kirwan, and Rayman D. Meservy (download)
#43.3.09 Institutional Logics and Pluralistic Responses to Enterprise System Implementation: A Qualitative Meta-Analysis by Nicholas Berente, Kalle Lyytinen, Youngjin Yoo and Chris Maurer (download)
#43.3.14 Technology as Routine Capability by E. Burton Swanson (download)
#43.4.14 Reducing Recommender System Biases: An Investigation of Rating Display Designs by Gediminas Adomavicius, Jesse C. Bockstedt, Shawn P. Curley, and Jingjing Zhang (download)
Issue #43:2 June 2019
(download all files)
#43.2.02 What Users Do Besides Problem-Focused Coping When Facing IT Security Threats: An Emotion-Focused Coping Perspective by Huigang Liang, Yajiong Xue, Alain Pinsonneault, and Yu "Andy" Wu (download)
#43.2.03 Sharing Is Caring: Social Support Provision and Companionsihp Activities in Healthcare Virtual Support Communities by Kuang-Yuan Huang, InduShobha Chengalur-Smith, and Alain Pinsonneault (download)
#43.2.04 Nurturing Online Communities: An Empirical Investigation by Sofia Bapna, Mary J. Benner, and Liangfei Qiu (download)
#43.2.07 Using Retweets When Shaping Our Online Persona: Topic Modeling Approach by Hilah Geva, Gal Oestreicher-Singer, and Maytal Saar-Tsechansky (download)
#43.2.09 High Reliability in Digital Organizing: Mindlessness, the Frame Problem, and Digital Operations by Antti Salovaara, Kalle Lyytinen, and Esko Penttinen (download)
#43.2.10 Is Best Answer Really the Best Answer? The Politeness Bias by Shun-Yang Lee, Huaxia Rui, and Andrew B. Whinston (download)
#43.2.12 Expecting the Unexpected: Effects of Data Collection Design Choices on the Quality of Crowdsourced User-Generated Content by Roman Lukyanenko, Jeffrey Parsons, Yolanda F. Wiersma, and Madeh Maddah (download)
#43.2.13 Mutual Understanding in Information Systems Development: Changes Within and Across Projects by Tracy A. Jenkin, Yolande E. Chan, and Rajiv Sabherwal (download)
#43.2.14 Adoption of Sustainable Technologies: A Mixed-Methods Study of German Households by Philipp Wunderlich, Daniel J. Veit, and Saonee Sarker (download)
Issue #43:1 March 2019
(download all files)
#43.1.01 DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics by Victor Benjamin, Joseph S. Valacich, and Hsinchun Chen (download)
#43.1.02 Digitization of Music: Consumer Adoption Amidst Piracy, Unbundling, and Rebundling by Byungwan Koh, Il-Horn Hann, and Srinivasan Raghunathan (download)
#43.1.03 Love Unshackled: Identifying the Effect of Mobile App Adoption in Onine Dating by JaeHwuen Jung, Ravi Bapna, Jui Ramaprasad, and Akhmed Umyarov (download)
#43.1.04 See No Evil, Hear No Evil? Dissecting the Impact of Online Hacker Forums by Wei T. Yue, Qiu-Hong Wang, and Kai-Lung Hui (download)
#43.1.06 Capitalizing on Health Information Technology to Enable Digital Advantage in U.S. Hospitals by Elena Karahanna, Adela Chen, Qianqian Ben Liu, and Christina Serrano (download)
#43.1.07 Intensifying to Cease: Unpacking the Process of Information Systems Discontinuance by Mohammad Hosein Rezazade Mehrizi, Joan Rodon Modol and Milad Zafar Nezhad (download)
#43.1.08 Synthetic Knowing: The Politics of the Internet of Things by Eric Monteiro and Elena Parmiggiani (download)
#43.1.09 How Do Adopters Transition Between New and Incumbent Channels by Eric Overby and Sam Ransbotham (download)
#43.1.10 Platform-Based Function Repertoire, Reputation, and Sales Performance of E-Marketplace Sellers by Huifang Li, Yulan Fang, Kai H. Lim, and Youwei Wang (download)
#43.1.12 Modeling Multichannel Advertising Attribution Across Competitors by Yiyi Li, Ying Xie, and Zhiqiang (Eric) Zheng (download)
Issue #42:4 December 2018
(download all files)
#42.04.03 The Impact of Ideoloby Misfit on Open Source Software Communities and Companies by Sherae L. Daniel, Likoebe M. Maruping, Marcelo Cataldo, and Jim Herbsleb (download)
#42.04.04 Neural Correlates of Multidimensional Visualizations: An fMRI Comparison of Bubble and Three-Dimensional Surface Graphs Using Evolutionary Theory by Eric Walden, Gabriel S. Cogo, David J. Lucus, Elshan Moradiabadi, and Roozmehr Safi (download)
#42.04.07 Single-Sourcing Versus Multisourcing: The Roles of Output Verifiability on Task Modularity by Shantanu Bhattacharya, Alok Gupta, and Sameer Hasija (download)
#42.04.10 IT Consumerization and the Transformation of IT Governance by Robert Wayne Gregory, Evgeny Kaganer, Ola Henfridsson, and Thierry Jean Ruch (download)
#42.04.12 Collective Information System Use: A Typological Theory by Bogdan Negoita, Liette Lapointe, and Suzanne Rivard (download)
Issue #42:3 September 2018
(download all files)
#42.03.02 Monetizing Freemium Communities: Does Paying for Premium Increase Social Engagement by Ravi Bapna, Jui Ramaprasad, and Akhmed Umyarov (download)
#42.03.03 The Needs–Affordances–Features Perspective for the Use of Social Media by Elena Karahanna. Sean Xin Xu, Yan Xu, and Nan (Andy) Zhang (download)
#42.03.07 Mindfulness in Information Technology Use: Definitions, Distinctions, and a New Measure by Jason Bennett Thatcher, Ryan T. Wright, Heshan Sun, Thomas J. Zagenczyk, and Richard Klein (download)
#42.03.08 Network Structure and Patterns of Information Diversity on Twitter by Jesse Shore, Jiye Baek, and Chrysanthos Dellarocas (download)
#42.03.10 The Interaction Between Microblog Sentiment and Stock Returns: An Empirical Examination by Shoyuan Deng, Zhijian (James) Huang, Atish P. Sinha, and Huimin Zhao (download)
#43.3.10 Children's Internet Addiction, Family-to-Work Conflict, and Job Outcomes: A Study of Parent-Chiod Dyads by Viswanath Venkatesh, Tracy Ann Sykes, Frank K. Y. Chan, James Y. L. Thong, and Paul Jen-Hwa Hu (download)
#42.03.11 Know When to Run: Recommendations in Crowdsourcing Contests by Jiahui Mo, Sumit Sarkar, and Syam Menon (download)
#42.03.13 Technology Support and Post-Adoption IT Service Use: Evidence from the Cloud by German F. Retana, Chris Forman, Sridhar Narasimhan, Marius Florin Niculescu, and D. J. Wu (download)
#42.03.15 Statistical Inference with PLSc Using Bootstrap Confidence Intervals by Miguel I. Aguirre-Urreta and Mikko Rönkkö (download)
Issue #42:2 June 2018
(download all files)
#42.2.01 Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments by Anthony Vance, Jeffrey L. Jenkins, Bonnie Brinton Anderson, Daniel K. Bjornn, and C. Brock Kirwan (download)
#42.2.04 Text Analytics to Support Sense-Making in Social Media: A Language-Action Perspective by Ahmed Abbasi, Yilu Zhou, Shasha Deng, and Pengzhu Zhang (download)
#42.2.05 Beyond the Privacy Paradox: Objectiv Versus Relative Risk in Privacy Decision Making by Idris Adjerid, Eyal Peer, and Alessandro Acquisti (download)
#42.2.07 The Value of Reciprocity in Online Barter Markets: An Empirical Investigation by Shun Ye, Siva Viswanathan, and Il-Horn Hann (download)
#42.2.08 The Effects of Communication Media and Culture on Deception Detection Accuracy by Joey F. George, Manjul Gupta, Gabriel Giordano, Annette M. Mills, Vanesa M. Tennant, and Carmen C. Lewis (download)
#42.2.09 Identity Management and Tradable Reputation by Hong Xu, Jianqing Chen, and Andrew B. Whinston (download)
#42.2.10 Economic Experiments in Information Systems by Alok Gupta, Karthik Kannan, and Pallab Sanyal (download)
#42.2.11 The Sustainability of Polycentric Information Commons by Vitali Mindel, Lars Mathiassen, and Arun Rai (download)
Issue #42:1 March 2018
(download all files)
#42.1.01 Re-representation as Work Design in Outsourcing: A Semiotic View by Ilan Oshri, Ola Henfridsson, and Julia Kotlarsky (download)
#42.1.03 Governance of Corporate Takeovers: Time for Say-on-Takeovers? by Joseph Vithayathil and Vidyanand Choudhary (download)
#42.1.04 Top Persuader Prediction for Social Networks by Xiao Fang and Paul Jen-Hwa Hu (download)
#42.1.05 Engaging Voluntary Contributions in Online Communities: A Hidden Markov Model by Wei Chen, Xiahua Wei, and Kevin Xiaoguo Zhu (download)
#42.1.08 How Much to Share with Third Parties? User Privacy Concerns and Website Dilemmas by Ram D. Gopal, Hooman Hidaji, Raymond A. Patterson, Erik Roland, and Dmitry Zhdanov (download)
#42.1.12 Making Rigorous Research Relevant: Innovating Statistical Action Research by Alexandra Durcikova, Allen S. Lee, and Susan A. Brown (download)
#42.1.14 Toward a Unified Model of Information Security Compliance by Gregory D. Moody, Mikko Siponen, and Seppo Pahnila (download)
Issue #41:4 December 2017
(download all files)
#41.4.04 The Impact of Health Information Sharing on Duplicate Testing by Sezgin Ayabakan, Indranil Bardhan, Zhiqiang (Eric) Zheng, and Kirk Kirksey (download)
#41.4.05 Extracting Representative Information on Intra-Organizational Blogging Platforms by Xunhua Guo, Qiang Wei, Guoqing Chen, Jin Zhang, and Dandan Qiao (download)
#41.4.06 Antecedents of Information Systems Sourcing Strategies in U.S. Hospitals: A Longitudinal Study by Corey M. Angst, Kaitlin D. Wowak, Sean M. Handley, and Ken Kelley (download)
#41.4.07 Through the Eyes of Others: How Onlookers Shape the Use of Technology at Work by Anastasia Sergeeva, Marleen Huysman, Maura Soekijad, and Bart van den Hooff (download)
#41.4.10 Drawing a Line in the Sand: Commitment Problem in Ending Software Support by Abhijeet Ghoshal, Atanu Lahiri, and Debabrata Dey (download)
#41.4.13 Assessing Representation Theory with a Framework for Pursuing Success and Failure by Andrew Burton-Jones, Jan Recker, Marta Indulska, Peter Green, and Ron Weber (download)
Issue #41:3 September 2017
(download all files)
#41.3.02 Grounded Theory Methodology in Information Systems Research by Manuel Wiesche, Marlen C. Jurisch, Philip W. Yetton, and Helmut Krcmar (download)
#41.3.03 User Compensation as a Data Breach Recovery Action: An Investigation of the Sony PlayStation Network Breach by Sigi Goode, Hartmut Hoehle, Viswanath Venkatesh, and Susan A. Brown (download)
#41.3.05 Platform or Wholesale? A Strategic Tool for Online Retailers to Benefit from Third-Party Information by Young Kwark, Jianqing Chen, and Srinivasan Raghunathan (download)
#41.3.06 On the Role of Fairness and Social Distance in Designing Effective Social Referral Systems by Yili Hong, Paul A. Pavlou, Nan Shi, and Kanliang Wan (download)
#41.3.09 Sequentiality of Product Review Information Provision: An Information Foraging Perspective by Mengxiang Li, Chuan-Hoo Tan, Kwok-Kee Wei, and Kanliang Wang (download)
#41.3.13 Information Technology Outsourcing: Asset Transfer and the Role of Contract by Young Bong Chang, Vijay Gurbaxani, and Kiron Ravindran (download)
Issue #41:2 June 2017
(download all files)
#41.2.01 Creating High-Value Real-World Impact through Systematic Programs of Research by Jay F. Nunamaker, Nathan W. Twyman, Justin Scott Giboney, and Robert O. Briggs (download)
#41.2.02 Effects of Competition among Internet Service Providers and Content Providers on the Net Neutrality Debate by Hong Guo, Subhajyoti Bandyopadhyay, Arthur Lim, Yu-Chen Yang, and Hsing Kenneth Cheng (download)
#41.2.03 Expert Blogs and Consumer Perceptions of Competing Brands by Xueming Luo, Bin Gu, Jie Zhang, and Chee Wei Phang (download)
#41.2.06 On Self-Selection Biases in Online Product Reviews by Nan Hu, Paul A. Pavlou, and Jie Zhang (download)
#41.2.07 Healthcare Predictive Analytics for Risk Profiling in Chronic Care: A Bayesian Multitask Learning Approach by Yu-Kai Lin, Hsinchun Chen, Randall A. Brown, Shu-Hsing Li, and Hung-Jen Yang (download)
#41.2.09 Person–Organization and Person–Job Fit Perceptions of New IT Employees: Work Outcomes and Gender Differences by Viswanath Venkatesh, Jaime B. Windeler, Kathryn M. Bartol, and Ian O. Williamson (download)
#41.2.11 Consumer Pseudo-Showrooming and Omni-Channel Placement Strategies by Zheyin (Jane) Gu and Giri Kumar Tayi (download)
#41.2.14 Modeling Fixed Odds Betting for Future Event Prediction by Weiyun Chen, Xin Li, and Daniel Zeng (download)
Issue #41:1 March 2017
(download all files)
#41:1.02 Editor's Comments by Arun Rai (download)
#41:1.03 Digital Innovation Management: Reinventing Innovation Management Research in a Digital World by Satish Nambisan, Kalle Lyytinen, Ann Majchrzak, and Michael Song (download)
#41.1.01 How Is Your User Feeling? Inferring Emotion Through Human-Computer Interaction Devices by Martin Hibbeln, Jeffrey L. Jenkins, Christoph Schneider, Joseph S. Valacich, and Markus Weinmann (download)
#41.1.02 Is Voluntary Profiling Welfare Enhancing? by Byungwan Koh, Srinivasan Raghunathan, and Barrie R. Nault (download)
#41.1.03 A Configural Approach to Coordinating Expertise in Software Development Teams by Srinivas Kudaravalli, Samer Faraj, and Steven L. Johnson (download)
#41.1.04 Using Forum and Search Data for Sales Prediction of High-Involvement Products by Tomer Geva, Gal Oestreicher-Singer, Niv Efron, and Yair Shimshoni (download)
#41.1.06 Trust and the Strength of Ties in Online Social Networks: An Exploratory Field Experiment by Ravi Bapna, Alok Gupta, Sarah Rice, and Arun Sundararajan (download)
#41.1.09 A Data Envelopment Analysis Approach to Estimate IT-Enabled Production Capability by Sezgin Ayabakan, Indranil R. Bardhan, and Zhiqiang (Eric) Zheng (download)
#41.1.10 Is Oprah Contagious? The Depth of Diffusion of Demand Shocks in a Product Network by Eyal Carmi, Gal Oestreicher-Singer, Uriel Stettner, and Arun Sundararajan (download)
#41.1.12 Embracing Digital Innovation in Incumbent Firms: How Volvo Cars Managed Competing Concerns by Fredrik Svahn, Lars Mathiassen, and Rikard Lindgren (download)
#41.1.13 Platform Ecosystems: How Developers Invert the Firm by Geoffrey Parker, Marshall Van Alstyne, and Xiaoyue Jiang (download)
#41.1.15 External Knowledge and Information Technology: Implications for Process Innovation Performance by Konstantinos Trantopoulos, Georg von Krogh, Martin W. Wallin and Martin Woerter (download)
#41.1.16 Growing on Steroids: Rapidly Scaling the User Base of Digital Ventures Through Digital Innovation by Jimmy Huang, Ola Henfridsson, Martin J. Liu, and Sue Newell (download)
#41.1.17 Knowledge Reuse for Customization: Metamodels in an Open Design Community for 3D Printing by Harris Kyriakou, Jeffrey V. Nickerson, and Gaurav Sabnis (download)
Issue #40:4 December 2016
(download all files)
#40:4.02 Editor's Comments by Arun Rai (download)
#40:4.03 Transformational Issues of Big Data and Analytics in Networked Business by Bart Baesens, Ravi Bapna, James R. Marsden, Jan Vanthienen, and J. Leon Zhao (download)
#40:4.06 Reviewers (download)
#40.4.03 Large-Scale Network Analysis for Online Social Brand Advertising by Kunpeng Zhang, Siddhartha Bhattacharyya, and Sudha Ram (download)
#40.4.04 Mining Massive Fine-Grained Behavior Data to Improve Predictive Analytics by David Martens, Foster Provost, Jessica Clark, and Enric Junqué de Fortuny (download)
#40.4.07 Crowd-Squared: Amplifying the Predictive Power of Search Trend Data by Eric Brynjolfsson, Tomer Geva, and Shachar Reichman (download)
#40.4.09 Mobile App Analytics: A Multiple Discrete-Continuous Choice Framework by Sang Pil Han, Sungho Park, and Wonseok Oh (download)
#40.4.10 Comprehensible Predictive Models for Business Processes by Dominic Breuker, Martin Matzner, Patrick Delfmann, and Jörg Becker (download)
#40.4.11 Toward a Better Measure of Business Proximity: Topic Modeling for Industry Intelligence by Zhan (Michael) Shi, Gene Moo Lee, and Andrew B. Whinston (download)
#40.4.12 Competitive Benchmarking: An IS Research Approach to Address Wicked Problems with Big Data and Analytics by Wolfgang Ketter, Markus Peters, John Collins, and Alok Gupta (download)
Issue #40:3 September 2016
(download all files)
#40.3.03 Advertising Versus Brokerage Model forOnline Trading Platforms by Jianqing Chen, Ming Fan, and Mingzhe Li (download)
#40.3.05 TV's Dirty Little Secret: The Negative Effect of Popular TV on Online Auction Sales by Oliver Hinz, Shawndra Hill, and Ju-Young Kim (download)
#40.3.06 Exploring Bidder Heterogeneity in Multichannel Sequential B2B Auctions by Yixin Lu, Alok Gupta, Wolfgang Ketter, and Eric van Heck (download)
#40.3.07 Capturing the Complexity of Malleable IT Use: Adaptive Structuration Theory for Individuals by Kurt W. Schmitz, James T. C. Teng, and Kimberly J. Webb (download)
#40.3.08 Senior Executives' IT Management Responsibilities: Serious IT-Related Deficiencies and CEO/CFO Turnover by Adi Masli, Vernon J. Richardson, Marcia Weidenmier Watson, and Robert W. Zmud (download)
#40.3.10 The Making of a Good Impression: Information Hiding in Ad Exchanges by Zhen Sun, Milind Dawande, Ganesh Janakiraman, and Vijay Mookerjee (download)
Issue #40:2 June 2016
(download all files)
#40.2.03 Digital Action Repertories and Transforming a Social Movement Organization by Lisen Selander and Sirkka L. Jarvenpaa (download)
#40.2.04 Combating Infant Mortality in Rural India: Evidence from a Field Study of eHealth Kiosk Implementations by Visawanath Venkatesh, Arun Rai, Tracy Ann Sykes, and Ruba Alajafari (download)
#40.2.05 The Internet and Racial Hate Crime: Offline Spillovers from Online Access by Jason Chan, Anindya Ghose, and Robert Seamans (download)
#40.2.08 The Evolution of an ICT Platform-Enabled Ecosystem for Poverty Alleviation: The Case of eKutir by Srivardhini K.Jha, Alain Pinsonneault, and Laurette Dubé (download)
#40.2.09 A Multiagent Competitive Gaming Platform to Address Societal Challenges by Wolfgang Ketter, Markus Peters, John Collins, and Alok Gupta (download)
#40.2.10 Multiplex Appropriation in Complex Systems Implementation: The Case of Brazil's Correspondent Banking System by Paul M. Leonardi, Diane E. Bailey, Eduardo H. Diniz, Dan Sholler, and Bonnie Nardi (download)
#40.2.14 You Can't Bribe a Computer: Dealing with the Societal Challenge of Corruption Through ICT by Shirish C. Srivastava, Thompson S. H. Teo, and Sarv Devara (download)
Issue #40:1 March 2016
(download all files)
#40.1.01 An Exploratory Study of the Formation and Impact of Electronic Service Failures by Chee-Wee Tan, Izak Benbasat, and Ronald T. Cenfetelli (download)
#40.1.04 Valuing Information Technology Related Intangible Assets by Adam Saunders and Erik Brynjolfsson (download)
#40.1.05 Competitive Bundling in Information Markets: A Seller-Side Analysis by Srinivasan Raghunathan and Sumit Sarkar (download)
#40.1.07 A Temporally Situated Self-Agency Theory of Information Technology Reinvention by Saggi Nevo, Dorit Nevo, and Alain Pinsonneault (download)
Issue #39:4 December 2015
(download all files)
#39:4.05 What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors by Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, Gregory D. Moody, and Peter Polak (download)
#39.4.08 Campus Emergency Notification Systems: An Examination of Factors Affecting Compliance with Alerts by Wencui Han, Serkan Ada, Raj Sharman, and H. Raghav Rao (download)
Issue #39:3 September 2015
(download all files)
#39.3.01 Fairness in the Institutional Valuation of Business Journals by Gary F. Templeton and Bruce R. Lewis (download)
#39.3.02 Genres of Inquiry in Design-Science Research: Justification and Evaluation of Knowledge Production by Richard L. Baskerville, Mala Kaul, and Veda C. Storey (download)
#39.3.03 Vocal Minority and Silent Majority: How Do Online Ratings Reflect Population Perceptions of Quality by Guodong (Gordon) Gao, Brad N. Greenwood, Ritu Agarwal, and Jeffrey S. McCullough (download)
#39.3.06 Organizational Path Constitution in Technological Innovation: Evidence from Rural Telehealth by Rajendra Singh, Lars Mathiassen, and Abhay Mishra (download)
#39.3.07 Comparing Potential and Actual Innovators: An Empirical Study of Mobile Data Services Innovation by Atreyi Kankanhalli, Hua (Jonathan) Ye, and Hock Hai Teo (download)
#39.3.08 Competing for Attention: An Empirical Study of Online Reviewers' Strategic Behavior by Wenqi Shen, Yu Jeffrey Hu, and Jackie Rees Ulmer (download)
#39.3.09 Extending ICT4D Studies: The Value of Critical Research by Cecilia I. C. Lin, Feng-Yang Kuo, and Michael D. Myers (download)
#39.3.10 Exhaustion from Information System Career Experience: Implications for Turn-Away Intention by Deborah J. Armstrong, Nita G. Brooks, and Cynthia K. Riemenschneider (download)
#39.3.11 Friendships in Online Peer-to-Peer Lending: Pipes, Prisms, and Relational Herding by De Liu, Daniel J. Brass, Yong Lu, and Dongyu Chen (download)
Issue #39:2 June 2015
(download all files)
#39.2.02 Consistent Partial Least Squares Path Modeling by Theo K. Dijkstra and Jorg Henseler (download)
#39.2.05 Coping with Information Technology: Mixed Emotions, Vacillation, and Nonconforming Use Patterns by Mari-Klara Stein, Sue Newell, Erica L. Wagner, and Robert D. Galliers (download)
#39.2.06 Leading Collaboration in Online Communities by Samer Faraj, Srinivas Kudaravalli, and Molly Wasko (download)
#39.2.07 Patterns in Information Systems Portfolio Prioritization: Evidence from Decision Tree Induction by Prasanna Karhade, Michael J. Shaw, and Ramanath Subramanyam (download)
#39.2.08 Mobile Application Usability: Conceptualization and Instrument Development by Hartmut Hoehle and Viswanath Venkatesh (download)
Issue #39:1 March 2015
(download all files)
#39.1.01 Motivating Employees to Explore Collaboration Technology in Team Contexts by Likoebe M. Maruping and Massimo Magni (download)
#39.1.07 Service Innovation: A Service-Dominant Logic Perspective by Robert F. Lusch and Satish Nambisan (download)
#39.1.08 The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention by Anne Scherer, Nancy V. Wunderlich, and Florian von Wangenheim (download)
#39.1.10 Distributed Tuning of Boundary Resources: The Case of Apple's iOS Service System by Ben Eaton, Silvia Elaluf-Calderwood, Carsten Sorensen, and Youngjin Yoo (download)
Issue #38:4 December 2014
(download all files)
#38.4.02 Multihoming Users' Preferences for Two-Sided Exchange Networks by Tat Koon Koh and Mark Fichman (download)
#38.4.03 Ontology-Based Evaluation of Natural Disaster Management Websites: A Multistakeholder Perspective by Chen-Huei Chou, Fatemeh Mariam Zahedi, and Huimin Zhao (download)
#38.4.05 Strategic Behavior in Online Reputation Systems: Evidence from Revoking on eBay by Shun Ye, Guodong (Gordon) Gao, and Siva iswanathan (download)
#38.4.06 Information Discovery and the Long Tail of Motion Picture Content by Anuj Kumar, Michael D. Smith, and Rahul Telang (download)
#38.4.08 Peer Influence in the Diffusion of iPhone 3G over a Large Social Network by Miguel Godinho de Matos, Pedro Ferreira, and David Krackhardt (download)
#38.4.10 Looking Toward the Future of IT-Business Strategic Alignment through the Past: A Meta-Analysis by Jennifer E. Gerow, Varun Grover, Jason Thatcher, and Philip L. Roth (download)
#38.4.12 Take Their Word For It: The Symbolic Role of Linguistic Style Matches in User Communities by Stephan Ludwig, Ko de Ryuter, Dominik Mahr, Martin Wetzels, Elizabeth Brüggen, and Tom de Ryuck (download)
Issue #38:3 September 2014
(download all files)
#38:3.2 Big Data and IS Research by Paulo B. Goes (download)
#38:3.3 The Sociomaterialty of Information Systems: Current Status, Future Directions by Dubravka Cecez-Kecmanovic, Robert D. Galliers, Ola Henfridsson, Sue Newell, and Richard Vigden (download)
#38.3.04 An Attraction-Selection-Attrition Theory of Online Community Size and Resilience by Brian S. Butler, Patrick J. Bateman, Peter H. Gray, and E. Ilana Diamant (download)
#38.3.05 Expectation Confirmation in Information Systems Research: A Test of Six Competing Models by Susan A. Brown, Viswanath Venkateshand Sandeep Goyal (download)
#38.3.07 Cultural Differences and Geography as Determinants of Online Prosocial Lending by Gordon Burtch, Anindya Ghose, and Sunil Wattal (download)
#38.3.09 Dynamic Reconfiguration in Planetary Exploration: A Sociomaterial Ethnography by Melissa Mazmanian, Marisa Cohn, and Paul Dourish (download)
#38.3.11 Entanglements in Practice: Performing Anonymity Through Social Media by Susan V. Scott and Wanda J. Orlikowski (download)
Issue #38:2 June 2014
(download all files)
#38.2.01 Digital Innovation as a Fundamental and Powerful Concept in the Information Systems Curriculum by Robert G. Fichman, Brian L. Dos Santos, and Zhiqiang (Eric) Zheng (download)
#38.2.02 Data Collection in the Digital Age: Innovative Alterantives to Student Samples by Zachary R. Steelman, Bryan I. Hammer, and Moez Limayem (download)
#38.2.03 The Nature and Consequences of Trade-Off Transparency in the Context of Recommendation Agents by Jingjun (David) Xu, Izak Benbasat, and Ronald T. Cenfetelli (download)
#38.2.04 Trust, Satisfaction, and Online Repurchase Intention: The Moderating Role of Perceived Effectiveness of E-Commerce Institutional Mechanisms by Yulin Fang, Israr Qureshi, Heshan Sun, Patrick McCole, Elaine Ramsey, and Kai H. Lim (download)
#38.2.11 Reframing Success and Failure of Information Systems: A Performative Perspective by Dubravka Cecez-Kecmanovic, Karlheinz Kautz, and Rebecca Abrahall (download)
#38.2.12 Quality Competition and Market Segmentation in the Security Software Market by Debabrata Dey, Atanu Lahiri, and Guoying Zhang (download)
Issue #38:1 March 2014
(download all files)
#38:1.3 Call for Papers: Information Technology and Innovation by Satish Nambisan, Kalle Lyytinen, Ann Majchrzak, and Michael Song (download)
#38.1.03 Enterprise System Implementation and Employee Job Performance: Understanding the Role of Advice Networks by Tracy Ann Sykes, Viswanath Venkatesh, and Jonathan L. Johnson (download)
#38.1.04 Explaining Data-Driven Document Classifications by David Martens and Foster Provost (download)
#38.1.05 Social Media, Traditional Media, and Music Sales by Sanjeev Dewan and Jui Ramaprasad (download)
#38.1.06 Content Sharing in a Social Broadcasting Environment: Evidence from Twitter by Zhan Shi, Huaxia Rui, and Andrew B. Whinston (download)
#38.1.09 Leveraging Philanthropic Behavior for Customer Support: The Case of User Support Forums by Wael Jabr, Radha Mookerjee, Yong Tan, and Vijay S. Mookerjee (download)
#38.1.10 Swift Guanxi in Online Marketplace: The Role of Computer-Mediated Communication Technologies by Carol Xiaojuan Ou, Paul A. Pavlou, and Robert M. Davison (download)
#38.1.12 Distributed Cognition in Software Design: An Experimental Investigation of the Role of Design Patterns and Collaboration by George Mangalaraj, Sridhar Nerur, RadhaKanta Mahapatra, and Kenneth H. Price (download)
#38.1.13 What's Different about Social Media Networks? A Framework and Research Agenda by Gerald C. Kane, Maryam Alavi, Giuseppe (Joe) Labianca, and Stephen P. Borgatti (download)
Issue #37:4 December 2013
(download all files)
#37.4.1 Evaluating Journal Quality and the Association for Information Systems Senior Scholars' Journal Basket Via Bibliometric Measures: Do Expert Journal Assessments Add Value? by Paul Benjamin Lowry, Gregory D. Moody, James Gaskin, Dennis F. Galletta, Sean L. Humpherys, Jordan B. Barlow, and David W. Wilson (download)
#37.4.4 Talking about Technology: The Emergence of a New Actor Category Through New Media by Emmanuelle Vaast, Elizabeth J. Davidson, and Thomas Mattson (download)
#37.4.9 Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy of Diversity for Protection-Motivated Behaviors by Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Rebecca J. Bennett, and James F. Courtney (download)
#37.4.10 Control Balancing in Information Systems Development Offshoring Projects by Robert Wayne Gregory, Roman Beck, and Mark Keil (download)
#37.4.11 Media Selection as a Strategic Component of Communication by Joey F. George, John R. Carlson, and Joseph S. Valacich (download)
#37.4.12 Inferring App Demand from Publicly Available Data by Rajiv Garg and Rahul Telang (download)
#37.4.15 Motivating Energy-Efficient Behavior with Green IS: An Investigation of Goal Setting and the Role of Defaults by Claire-Michelle Loock, Thorsten Staake, and Frédéric Thiesse (download)
Issue #37:3 September 2013
(download all files)
#37.3.1 Discovering Unobserved Heterogeneity in Structural Equation Models to Avert Validity Threats by Jan-Michael Becker, Arun Rai, Christian M. Ringle, and Franziska Völckner (download)
#37.3.9 Methodological Implications of Critical Realism for Mixed-Methods Research by Markos Zachariadis, Susan Scott, and Michael Barret (download)
#37.3.10 The Broader Context for ICT4D Projects: A Morphogenetic Analysis by James Muranga Njihia and Yasmin Merali (download)
#37.3.11 The Generative Mechanisms of Digital Infrastructure Evolution by Ola Henfridsson and Bendik Bygstad (download)
Issue #37:2 June 2013
(download all files)
#37.2.02 The Ambivalent Ontology of Digital Artifacts by Jannis Kallinikos, Aleksi Aaltonen, and Attila Marton (download)
#37.2.03 Impactful Research on Transformational Information Technology: An Opportunity to Inform New Audiences by Henry C. Lucas, Jr., Ritu Agarwal, Eric K. Clemons, Omar A. El Sawy, and Bruce Weber (download)
#37.2.07 The Impact of Shaping on Knowledge Reuse for Organizational Improvement with Wikis by Ann Majchrzak, Christian Wagner, and Dave Yates (download)
#37.2.10 Design Capital and Design Moves: The Logic of Digital Business Strategy by C. Jason Woodard, Narayan Ramasubbu, F. Ted Tschang, and V. Sambamurthy (download)
#37.2.14 Visions and Voices on Emerging Challenges in Digital Business Strategy by Anandhi Bharadwaj, Omar A. El Sawy, Paul A. Pavlou, and N. Venkatraman (download)
Issue #37:1 March 2013
(download all files)
#37.1.01 Beyond Deterrence: An Expanded View of Employee Computer Abuse by Robert Willison and Merrill Warkentin (download)
#37.1.03 Impact of Information Feedback in Continuous Combinatorial Auctions: An Experimental Study of Economic Performance by Gediminas Adomavicius, Shawn P. Curley, Alok Gupta, and Pallab Sanyal (download)
#37.1.05 Digital Games and Beyond: What Happens When Players Compete? by De Liu, Xun Li, and Radhika Santhanam (download)
#37.1.06 Data Model Develoment for Fire Related Extreme Events: An Activity Theory Approach by Rui Chen, Raj Sharman, H. Raghav Rao, and Shambhu J. Upadhyaya (download)
#37.1.13 Social Influence and Knowledge Management Systems Use: Evidence from Panel Data by Yinglei Wang, Darren B. Meister, and Peter H. Gray (download)
Issue #36:4 December 2012
(download all files)
#36.4.1 Bidding Behavior Evolution in Sequential Auctions: Characterization and Analysis by Paulo B. Goes, Gilbert G. Karuga, and Arvind K. Tripathi (download)
#36.4.3 Impact of User Satisfaction with Mandated RM Use on Employee Service Quality by J. J. Po-An Hsieh, Arun Rai, Stacie Petter, and Ting Zhang (download)
#36.4.9 A Social Network-Based Inference Model for Validating Customer Profile Data by Sung-Hyuk Park, Soon-Young Huh, Wonseok Oh, and Sang Pil Han (download)
#36.4.10 Web 2.0 Environmental Scanning and Adaptive Decision Support for Business Mergers and Acquisitions by Raymond Y. K. Lau, Stephen S. Y. Liao, K. F. Wong, and Dickson K. W. Chiu (download)
#36.4.12 MetaFraud: A Meta-Learning Framework for Detecting Financial Fraud by Ahmed Abbasi, Conan Albrecht, Anthony Vance, and James Hansen (download)
#36.4.13 A Hidden Markov Model for Collaborative Filtering by Nachiketa Sahoo, Param Vir Singh, and Tridas Mukhopadhyay (download)
Issue #36:3 September 2012
(download all files)
#36:3.2 Riding the Wave: Past Trends and Future Directions for Health IT Research by Darryl Romanow, Sunyoung Cho, and Detmar Straub (download)
#36:3.3 Senior Editor Note by Dale L. Goodhue (download)
#36.3.1 On the Use of Neurophysiological Tools in IS Research: Developing a Research Agenda for NeuroIS by Angelika Dimoka, Rajiv D. Banker, Izak Benbasat, Fred D. Davis, Alan R. Dennis, David Gefen, Alok Gupta, Anja Ischebeck, Peter Kenning, Paul A. Pavlou, Gernot Muller-Putz, Rene Riedl, Jan vom Brocke, and Bernd Weber (download)
#36.3.2 Comparing PLS to Regression and LISREL: A Response to Marcolides, Chin, and Saunders by Dale L. Goodhue, William Lewis, and Ron Thompson (download)
#36.3.3 When Imprecise Statistical Statements Become Problematic: A Response to Goodhue, Lewis, and Thompson by George A. Marcoulides, Wynne W. Chin, and Carol Saunders (download)
#36.3.5 Conceptualizing Generalizability: New Contribution and a Reply by Allen S. Lee and Richard L. Baskerville (download)
#36.3.6 The Roles of Theory in Canonical Action Research by Robert M. Davison, Maris G. Martinsons, and Carol X. J. Ou (download)
#36.3.9 Bulding Member Attachment in Online Communities: Applying Theories of Group Identity and Interpersonal Bonds by Yuqing Ren, F. Maxwell Harper, Sara Drenner, Loren Terveen, Sara Kiesler, John Riedl, and Robert E. Kraut (download)
#36.4.11 Network-Based Modeling and Analysis of Systemic Risk in Banking Systems by Daning Hu, J. Leon Zhao, Zhimin Hua, and Michael C. S. Wong (download)
#36.3.12 Standards Competition in the Presence of Digital Conversion Technology: An Empirical Analysis of the Flash Memory Card Market by Charles Zhechao Liu, Chris F. Kemerer, Sandra A. Slaughter, and Michael D. Smith (download)
#36.3.14 The Hole in the Whole: A Response to Allen and March by Graeme Shanks and Ron Weber (download)
#36.3.15 Does PLS Have Advantages for Small Sample Size or Non-Normal Data? by Dale L. Goodhue, William Lewis, and Ron Thompson (download)
#36.3.16 Assessing Common Method Bias: Problems with the ULMC Technique by Wynne W. Chin, Jason Bennett Thatcher, and Ryan T. Wright (download)
Issue #36:2 June 2012
(download all files)
#36:2.2 Does MIS Have Native Theories? by Detmar W. Straub (download)
#36.2.2 Style Composition in Action Research Publication by Lars Mathiassen, Mike Chiasson, and Matt Germonprez (download)
#36.2.4 On Product Uncertainty in Online Markets: Theory and Evidence by Angelika Dimoka, Yili Hong, and Paul A. Pavlou (download)
#36.2.7 A Cost-Based Database Request Distribution Technique for Online e-Commerce Applications by Debra VanderMeer, Kaushik Dutta, and Anindya Datta (download)
#36.2.11 Enacting Clan Control in Complex IT Projects: A Social Capital Perspective by Cecil Eng Huang Chua, Wee-Kiat Lim, Christina Soh, and Siew Kien Sia (download)
#36.2.12 IS Employee Attitudes and Perceptions at Varying Levels of Software Process Maturity by Janet K. Ply, Jo Ellen Moore, Clay K. Williams, and Jason Bennett Thatcher (download)
#36.2.13 Absorptive Capacity and Information Systems Research: Review, Synthesis, and Directions for Future Research by Nicholas Roberts, Pamela S. Galluch, Michael Dinger, and Varun Grover (download)
#36.2.14 Carrots and Rainbows: Motivation and Social Practice in Open Source Software Development by Georg von Krogh, Stefan Haefliger, Sebastian Spaeth, and Martin W. Wallin (download)
Issue #36:1 March 2012
(download all files)
#36:1.2 A Critical Look at the Use of PLS-SEM in MIS Quarterly by Christian M. Ringle, Marko Sarstedt, and Detmar W. Straub (download)
#36.1.01 The Ends of Information Systems Research: A Pragmatic Framework by Panos Constantinides, Mike W. Chiasson, and Lucas D. Introna (download)
#36.1.03 Are Markets for Vulnerabilities Effective? by Sam Ransbotham, Sabayaschi Mitra, and Jon Ramsey (download)
#36.1.04 Recommendation Networks and the Long Tail of Electronic Commerce by Gal Oestreicher-Singer and Arun Sundararajan (download)
#36.1.10 Information Technology and Firm Profitability: Mechanisms and Empirical Evidence by Sunil Mithas, Ali Tafti, Indranil Bardhan, and Jie Mein Goh (download)
#36.1.12 Cocreation of Value in a Platform Ecosystem: The Case of Enterprise Software by Marco Ceccagnoli, Chris Forman, Peng Huang, and D. J. Wu (download)
#36.1.13 Value Cocreation and Wealth Spillover in Open Innovation Alliances by Kunsoo Han, Wonseok Oh, Kun Shin Im, Ray M. Chang, Hyelim Oh, and Alain Pinsonneault (download)
#36.1.14 Exploring Value Cocreation in Relationships Between an ERP Vendor and its Partners: A Revelatory Case Study by Suprateek Sarker, Saonee Sarker, Arvin Sahaym, and Niels Bjørn-Andersen (download)
#36.1.07a The Negative Consequences of Measurement Model Misspecification: A Response to Aguirre-Urreta and Marakas by Cheryl Burke Jarvis, Scott B. MacKenzie, and Philip M. Podsakoff (download)
Issue #35:4 December 2011
(download all files)
#35.4.02 Technostress: Technological Antecedents and Implications by Ramakrishna Ayyagari, Varun Grover, and Russell Purvis (download)
#35.4.04 Guidelines for Designing Visual Ontologies to Support Knowledge Identification by Palash Bera, Andrew Burton-Jones, and Yair Wand (download)
#35.4.05 A Multilevel Model for Measuring Fit Between a Firm's Competitive Strategies and Information Systems Capabilities by Tim S. McLaren, Milena M. Head, Yufei Yuan, and Yolande E. Chan (download)
#35.4.08 Information Privacy Research: An Interdisciplinary Review by H. Jeff Smith, Tamara Dinev, and Heng Xu (download)
#35.4.11 Centrality–IS Proficiency Alignment and Workgroup Performance by Gerald C. Kane and Stephen P. Borgatti (download)
#35.4.12 Virtual Space and Place: Theory and Test by Carol Saunders, Anne F. Rutkowski, Michiel van Genuchten, Doug Vogel, and Julio Molina Orrego (download)
Issue #35:3 September 2011
(download all files)
#35:3.3 Stepping into the Internet: New Ventures in Virtual Worlds by Molly Wasko, Robin Teigland, Dorothy Leidner, and Sirkka Jarvenpaa (download)
#35.3.1 Information Systems Research Behaviors: What Are the Normative Standards? by Gove N. Allen, Nicholas L. Ball, and H. Jeff Smith (download)
#35.3.2 Predictive Analytics in Information Systems Research by Galit Shmueli and Otto R. Koppius (download)
#35.3.4 The Effects of Digital Trading Platforms on Commodity Prices in Agricultural Supply Chains by Rajiv Banker, Sabyaschi Mitra, and V. Sambamurthy (download)
#35.3.6 Innovation Impacts of Using Social Bookmarking Systems by Peter H. Gray, Salvatore Parise, and Bala Iyer (download)
#35.3.8 Design Principles for Virtual Worlds by Alok R. Chaturvedi, Daniel R. Dolk, and Paul L. Drnevich (download)
#35.3.9 Arguing the Value of Virtual Worlds: Patterns of Discursive Sensemaking of an Innovative Technology by Nicholas Berente, Sean Hansen, Jacqueline C. Pike, and Patrick J. Bateman (download)
#35.3.10 What If Your Avatar Looks Like You? Dual-Congruity Perspectives for Avatar Use by Kil-Soo Suh, Hongki Kim, and Eung Kyo Suh (download)
#35.3.11 Enhancing Brand Equity Through Flow and Telepresence: A Comparison of 2D and 3D Virtual Worlds by Fiona Fui-Hoon Nah, Brenda Eschenbrenner, and David DeWester (download)
#35.3.12 From Space to Place: Predicting Users’ Intentions to Return to Virtual Worlds by Lakshmi Goel, Norman A. Johnson, Iris Junglas, and Blake Ives (download)
#35.3.13 Co-Creation in Virtual Worlds: The Design of the User Experience by Thomas Kohler, Johann Fueller, Kurt Matzler, and Daniel Stieger (download)
#35.3.14 An Odyssey into Virtual Worlds: Exploring the Impacts of Technological and Spatial Environments by Animesh Animesh, Alain Pinsonneault, Sung-Byung Yang, and Wonseok Oh (download)
Issue #35:2 June 2011
(download all files)
#35.2.6 Correlated Failures, Diversification, and Information Security Risk Management by Pei-yu Chen, Gaurav Kataria, and Ramayya Krishnan (download)
#35.2.10 CIO Reporting Structure, Strategic Positioning, and Firm Performance by Rajiv D. Banker, Nan Hu, Paul A. Pavlou, and Jerry Luftman (download)
Issue #35:1 March 2011
(download all files)
#35.1.1 Profiling the Research Productivity of Tenured Information Systems Faculty at U.S. Institutions by Douglas L. Dean, Paul Benjamin Lowry, and Sean Humpherys (download)
#35.1.3 Action Design Research by Maung K. Sein, Ola Henfridsson, Sandeep Purao, Matti Rossi, and Rikard Lindgren (download)
#35.1.4 Do Ontological Deficiencies in Modeling Grammars Matter? by Jan Recker, Michael Rosemann, Peter Green, and Marta Indulska (download)
#35.1.6 The Effects of Tree-View Based Presentation Adaptation on Model Web Browsing by Boonlit Adipat, Dongsong Zhang, and Lina Zhou (download)
#35.1.11 How Information Management Capability Influences Firm Performance by Sunil Mithas, Narayan Ramasubbu, and V. Sambamurthy (download)
Issue #34:4 December 2010
(download all files)
#34.4.2 Web 2.0 and Politics: The 2008 U.S. Presidential Election and an E-Politics Research Agenda by Sunil Wattal, David Schuff, Munir Mandviwalla, and Christine B. Williams (download)
Issue #34:3 September 2010 Special Issue: Information Systems Security
(download all files)
Issue #34:2 June 2010
(download all files)
#34:2.3 Introduction to the Special Issue on Trust in Information Systems by Izak Benbasat, David Gefen, and Paul A. Pavlou (download)
Issue #34:1 March 2010
(download all files)
Issue #33:4 December 2009
(download all files)
Issue #33:3 September 2009
(download all files)
#33.3.4 Web Strategies to Promote Internet Shopping: Is Cultural Customization Needed? by Choon Ling Sia, Kai H. Lim, Kwok Leung, Matthew K. O. Lee, Wayne Wei Huang, and Izak Benbasat (download)
#33.3.6 Exploring Human Images in Website Design: A Multi-Method Approach by Dianne Cyr, Milena Head, Hector Larios, and Bing Pan (download)
#36.3.10 A Knowledge-Based Model of Radical Innovation in Small Software Firms by Jessica Luo Carlo, Kalle Lyytinen, and Gregory M. Rose (download)
Issue #33:2 June 2009
(download all files)
Issue #33:1 March 2009
(download all files)
#33.1.5 Are Two Heads Better than One for Software Development? The Productivity Paradox of Pair Programming by VenuGopal Balijepally, RadhaKanta Mahapatra, Sridhar Nerur, and Kenneth H. Price (download)
#33.1.9 Using PLS Path Modeling for Assessing Hierarchial Construct Models: Guidelines and Impirical Illustration by Martin Wetzels, Gaby Odekerken-Schroder, and Claudia van Oppen (download)
Issue #32:4 December 2008
(download all files)
Issue #32:3 September 2008
(download all files)
#32.3.1 Uncovering the Intellectual Core of the Information Systems Discipline by Anna Sidorova, Nicholas Evangelopoulos, Joseph S. Valacich, and Thiagarajan Ramakrishnan (download)
#32.3.4 Business Familiarity as Risk Mitigation in Software Development Outsourcing Contracts by David Gefen, Simon Wyss, and Yossi Lichtenstein (download)
#32.3.5 Representing Part-Whole Relations in Conceptual Modeling: An Empirical Evaluation by Graeme Shanks, Elizabeth Tansley, Jasmina Nuredini, Daniel Tobin, and Ron Weber (download)
#32.3.6 Media, Tasks, and Communication Processes: A Theory of Media Synchronicity by Alan R. Dennis, Robert M. Fuller, and Joseph S. Valacich (download)
#32.3.8 Emotional Dissonance and the Information Technology Professional by Paige S. Rutner, Bill C. Hardgrave, and D. Harrison McKnight (download)
Issue #32:2 June 2008
(download all files)
#32.2.3 Two-Stage Offshoring: An Investigation of the Irish Bridge by Helena Holmstrom Olsson, Eoin O Conchuir, Par J. Agerfalk, and Brian Fitzgerald (download)
#32.2.6 Explaining Variations in Client Extra Costs Between Software Projects Offshored to India by Jens Dibbern, Jessica Winkler, and Armin Heinzl (download)
#32.2.10 Work Dispersion, Process-Based Learning, and Offshore Software Development Performance by Narayan Ramasubbu, Sunil Mithas, M. S. Krishnan, and Chris F. Kemerer (download)
Issue #32:1 March 2008
(download all files)
Issue #31:4 December 2007
(download all files)
#31.4.1 Specifying Formative Constructs in Information Systems Research by Stacie Petter, Detmar Straub, and Arun Rai (download)
#31.4.4 How Habit Limits the Predictive Power of Intention: The Case of Information Systems Continuance by Moez Limayem, Sabine Gabriele Hirt, and Christy M. K. Cheung (download)
#31.4.6 The Role of Online Trading Communities in Managing Internet Auction Fraud by Cecil Eng Huang Chua, Jonathan Wareham, and Daniel Robey (download)
#31.4.7 The Impact of Knowledge Coordination on Virtual Team Performance Over Time by Prasert Kanawattanachai and Youngjin Yoo (download)
#31.4.8 Dispositional Factors in Internet Use: Personality Versus Cognitive Style by James C. McElroy, Anthony R. Hendrickson, Anthony M. Townsend, and Samuel M. DeMarie (download)
Issue #31:2 June 2007
(download all files)
Issue #30:4 December 2006
(download all files)
#30.4.1 Reconceptualizing Compatability Beliefs in Technology Acceptance Research by Elena Karahanna, Ritu Agarwal, and Corey M. Angst (download)
#30.4.5 Aligning Software Processes with Strategy by Sandra K. Slaughter, Linda Levine, Balasubramaniam Ramesh, Jan Pries-Heje, and Richard Baskerville (download)
Issue #30:1 March 2006
(download all files)
#30.1.1 Research Standards for Promotion and Tenure in Information Systems by Alan R. Dennis, Joseph S. Valacich, Mark A. Fuller, and Christoph Schneider (download)
#30.1.5 The Differential Use and Effect of Knowledge-Based System Explanations in Novice and Expert Judgement Decisions by Vicky Arnold, Nicole Clark, Philip A. Collier, Stewart A. Leech, and Steve G. Sutton (download)
Issue #29:4 December 2005
(download all files)
Issue #27:3 September 2003
(download all files)
#27.3.4 User Acceptance of Information Technology: Toward a Unified View by Viswanath Venkatesh, Michael G. Morris, Gordon B. Davis, and Fred D. Davis (download)
#27.3.5 In Pursuit of Moderation: Nine Common Errors and Teir Solutions by Traci A. Carte and Craig J. Russell (download)
Issue #26:1 March 2002
(download all files)
#26.1.1 Information Systems as a Reference Discipline by Richard L. Baskerville and Michael D. Myers (download)
Issue #24:2 June 2000
(download all files)
#24.2.2 Options Analysis of Software Platform Decisions: A Case Study by Alfred Taudes, Markus Feurstein, and Andreas Mild (download)
#24.2.5 A Cross-Cultural Study on Escalation of Commitment Behavior in Software Projects by Mark Keil, Bernard C. Y. Tan, Kwok-Kee Wei, Timo Saarinen, Virpi Tuunainen, and Arjen Wassenaar (download)
#24.2.6 Aligning the IT Human Resource with Business Vision: The Leadership Initiative at 3M by Robert Roepke, Ritu Agarwal, and Thomas W. Ferratt (download)
Issue #21:3 September 1997
(download all files)
#21.3.1 Developing an Historical Tradition in MIS Research by Richard O. Mason, James L. McKenney, and Duncan G. Copeland (download)
#21.3.2 Personal Computing Acceptance Factors in Small Firms: A Structural Equation Model by Magid Igbaria, Nancy Zinatelli, Paul Cragg, and Angele L. M. Cavaye (download)
#21.3.3 An Historical Method for MIS Research: Steps and Assumptions by Richard O. Mason, James L. McKenney, and Duncan G. Copeland (download)
#21.3.4 Bank of America: The Crest and Trough of Technological Leadership by James L. McKenney, Richard O. Mason, and Duncan G. Copeland (download)
Issue #20:2 June 1996
(download all files)
#20.2.3 Information Privacy: Measuring Individuals' Concerns About Organizational Practices by H. Jeff Smith, Sandra J. Milberg, and Sandra J. Burke (download)
#20.2.4 Information Technology for Local Administration Support: The Governorates Project in Egypt by Sarma R. Nidumolu, Seymour E. Goodman, Douglas R. Vogel, and Ann K. Danowitz (download)
#20.2.5 Key Issues in Information Systems Management: 1994-95 SIM Delphi Results by James C. Brancheau, Brian D. Janz, and James C. Wetherbe (download)
Issue #19:3 September 1995
(download all files)
#19.3.2 Using IT to Reengineer Business Education: An Exploratory Investigation of Collaborative Telelearning by Maryam Alavi, Bradley C. Wheeler, and Joseph S. Valacich (download)
#19.3.4 IS'95: Guideline for Undergraduate IS Curriculum by J. Daniel Couger, Gordon B. Davis, Dorothy G. Dologite, David L. Feinstein, John T. Gorgone, A. Milton Jenkins, George M. Kasper, Joyce Currie Little, Herbert E. Longenecker, Jr., and Joseph S. Valacich (download)
#19.3.5 The Information Technology Interaction Model: A Foundation for the MBA Core Course by Mark S. Silver, M. Lynne Markus, and Cynthia Mathis Beath (download)
#19.3.6 Inside an Integrated MBA: An Information Systems View by Jill Smith Slater, Donald J. McCubbrey, and Richard A. Scudder (download)
Issue #19:2 June 1995
(download all files)
#19.2.1 Business Value of Information Technology: A Study of Electronic Data Interchange by Tridas Mukhopadhyay, Sunder Kekre, and Suresh Kalathur (download)
#19.2.3 Service Quality: A Measure of Information Systems Effectiveness by Leland F. Pitt, Richard T. Watson, and C. Bruce Kavan (download)
#19.2.4 Computer Self-Efficacy: Development of a Measure and Initial Test by Deborah R. Compeau and Christopher A. Higgins (download)
#19.2.5 Task-Technology Fit and Individual Performance by Dale L. Goodhue and Ronald L. Thompson (download)
Issue #16:4 December 1992
(download all files)
#16.4.2 Understanding the CEO/CIO Relationship by David F. Feeny, Brian R. Edwards, and Keppel M. Simpson (download)
#16.4.3 Executive or Functional Manager? The Nature of the CIO's Job by Charlotte S. Stephens, William N. Ledbetter, Amitava Mitra, and F. Nelson Ford (download)
#16.4.4 New Information Systems Leaders: A Changing Role in a Changing World by Lynda M. Applegate and Joyce J. Elam (download)
#16.4.5 Empowerment: Key to IS World-Class Quality by Harvey R. Shrednick, Richard J. Shutt, and Madeline Weiss (download)
#16.4.7 Toward a Better Understanding of Information Technology Organization: A Comparative Case Study by J. Ellis Blanton, Hugh J. Watson, and Janette Moody (download)
Issue #15:2 June 1991
(download all files)
#15.2.1 Career Orientations of MIS Employees: An Empirical Analysis by Magid Igbaria, Jeffrey H. Greenhaus, and Saroj Parasuraman (download)
#15.2.2 Key Information Systems Management Issues for the Public Sector by Sharon L. Caudle, Wilpen L. Gorr, and Kathryn E. Newcomer (download)
#15.2.3 Is Office Productivity Stagnant? by Raymond R. Panko (download)
#15.2.6 A Model for Measuring Information Systems Size by Clive D. Wrigley and Albert S. Dexter (download)
Issue #14:4 December 1990
(download all files)
#14.4.1 TELCOT: An Application of Information Technology for Competitive Advantage in the Cotton Industry by Darryl Lindsey, Paul H. Cheney, George M. Kasper, and Blake Ives (download)
#14.4.3 Implementing Electronic Meeting Systems at IBM: Lessons Learned and Success Factors by Ron Grohowski, Chris McGroff, Doug Vogel, Ben Mautz, and Jay Nunamaker (download)
#14.4.4 A Principles-Based Enterprise Architecture: Lessons from Texaco and Star Enterprise by Gary L. Richardson, Brad M. Jackson, and Gray W. Dickson (download)
#14.4.6 Reusability-Based Strategy for Development of Information Systems by Uday Apte, Chetan S. Sankar, Meru Thakur, and Joel E. Turner (download)
#14.4.7 EIS: It Can Work in the Public Sector by Lakshmi Mohan, William K. Holstein, and Robert B. Adams (download)
Issue #13:1 March 1989
(download all files)
#13.1.2 Assessing the Value of a Quality Assurance Certificate for Software: An Exploratory Investigation by David Jobber, John Saunders, Brian Gilding, Graham Hooley, and Jon Hatton-Smooker (download)
#13.1.4 Rethinking the Concept of User Involvement by Henri Barki and Jon Hartwick (download)
#13.1.6 The Problem of Statistical Power in MIS Research by Jack J. Baroudi and Wanda J. Orlikowski (download)
Issue #12:4 December 1988
(download all files)
#12.4.2 Convincing Top Management of the Strategic Potential of Information Systems by Albert L. Lederer and Aubrey L. Mendelow (download)
#12.4.3 Implementing Packaged Software by Henry C. Lucas, Jr., Eric J. Walton, and Michael J. Ginzberg (download)
#12.4.4 Issue-Based Decision Support Systems for the Egyptian Cabinet by Hisham El Sherif and Omar A. El Sawy (download)
#12.4.6 Information Technology to Support Electronic Meetings by Alan R. Dennis, Joey F. George, Len M. Jessup, Jay F. Nunamaker, Jr., and Douglas R. Vogel (download)
#12.4.7 A Study of Influence in Computer-Mediated Group Decision Making by Ilze Zigurs, M. Scott Poole, and Gerardine L. DeSanctis (download)
#12.4.8 Computer Support for Meetings of Groups Working on Unstructured Problems: A Field Experiment by Sirkka L. Jarvenpaa, V. Srinivasan Rao, and George P. Huber (download)
Issue #12:3 September 1988
(download all files)
#12.3.1 Airline Reservations Systems: Lessons from History by Duncan G. Copeland and James L. McKenney (download)
#12.3.2 Managing the Data Resources: A Contingency Perspective by Dale L. Goodhue, Judith A. Quillard, and John F. Rockart (download)
#12.3.4 Critical Success Factors for Information Center Managers by Simha R. Magal, Houston J. Carr, and Hugh J. Watson (download)
#12.3.7 Using a GDSS to Facilitate Group Consensus: Some Intended and Unintended Consequences by Richard T. Watson, Gerardine DeSanctis, and Marshall Scott Poole (download)
#12.3.8 Dialogue Management: Support for Dialogue Independence by Feng-Yang Kuo and Benn Konsynski (download)
Issue #12:2 June 1988
(download all files)
#12.2.1 Creating Competitive Advantage with Interorganizational Information Systems by H. Russell Johnston and Michael R. Vitale (download)
#12.2.4 A Framework for Comparing Information Engineering Methods by Richard D. Hackathorn and Jahangir Karimi (download)
#12.2.7 The Measurement of End-User Computing Satisfaction by William J. Doll and Gholamreza Torkzadeh (download)
#12.2.8 Computer-Based Support for Group Problem-Finding: An Experimental Investigation by R. Brent Gallupe, Gerardine DeSanctis, and Gary W. Dickson (download)
#12.2.9 An Information Systems Keyword Classification Scheme by Henri Barki, Suzanne Rivard, and Jean Talbot (download)
Issue #11:1 March 1987
(download all files)
#11.1.2 Mapping Chargeback Systems to Organizational Environments by William P. McKinnon and Ernest A. Kallman (download)
#11.1.3 Key Issues in Information Sytems -- 1986 by James Brancheau and James C. Wetherbe (download)
#11.1.6 Information Intensive Modeling by Levent Orman (download)
#11.1.7 A Framework for Office Automation by Raymond McLeod, Jr., and Jack William Jones (download)
Issue #10:3 September 1986
(download all files)
#10.3.1 The Application Profile by John L. Batiste (download)
#10.3.5 The Effects of 3D Imagery on Managerial Data Interpretation by Jong Min Lee, James MacLachlan, and William A. Wallace (download)
Issue #10:1 March 1986
(download all files)