MISQ Discovery

Survey Instruments in Information Systems [archive]
Peter Newsted, Sid Huff, and Malcolm Munro

Qualitative Research in Information Systems [archive] [updated]
Michael D. Myers

Teledemocracy: Using Information Technology to Enhance Political Work [archive]
Pal Ytterstad, Sigmund Akselsen, Gunnald Svendsen, and Richard T. Watson

Online Supplements





2014 December

Internet’s Dirty Secret: Assessing the Impact of Online Intermediaries on HIV Transmission
Jason Chan and Anindya Ghose (pp. 955-976)

Multihoming Users’ Preferences for Two-Sided Exchange Networks
Tat Koon Koh and Mark Fichman (pp. 977-996)

Ontology-Based Evaluation of Natural Disaster Management Websites: A Multistakeholder Perspective
Chen-Huei Chou, Fatemeh Mariam Zahedi, and Huimin Zhao (pp. 997-1016)

An Analysis of Pricing Models in the Electronic Book Market
Lin Hao and Ming Fan (pp. 1017-1032)

Information Discovery and the Long Tail of Motion Picture Contentt
Anuj Kumar, Michael D. Smith, and Rahul Telang (pp. 1057-1078)

Information Technology and Administrative Efficiency in U.S. State Governments: A Stochastic Frontier Approacht
Min-Seok Pang, Ali Tafti, and M. S. Krishnan (pp. 1079-1101)

Peer Influence in the Diffusion of iPhone 3G over a Large Social Networkt
Miguel Godinho de Matos, Pedro Ferreira, and David Krackhardt (pp. 1103-1133)

Harnessing the Power of Self-Organization in an Online Community During Organizational Crisist
Ning Nan and Yong Lu (pp. 1135-1157)

Beyond Being There: The Symbolic Role of Communication and Identification in Perceptions of Proximity to Geographically Dispersed Colleaguest
Michael Boyer O’Leary, Jeanne M. Wilson, and Anca Metiu (pp. 1219-1243)

2014 September

Know Yourself and Know Your Enemy: An Analysis of Firm Recommendations and Consumer Reviews in a Competitive Environment
Wael Jabr and Zhiqiang (Eric) Zheng (pp. 635-654)

Expectation Confirmation in Information Systems Research: A Test of Six Competing Models
Susan A. Brown, Viswanath Venkatesh, and Sandeep Goyal (pp. 729-756)

Emergence of Power Laws in Online Communities: The Role of Social Mechanisms and Preferential Attachment
Steven L. Johnson, Samer Faraj, and Srinivas Kudaravalli (pp. 795-808)

Toward Generalizable Sociomaterial Inquiry: A Computational Approach for Zooming In and Out of Sociomaterial Routines
James Gaskin, Nicholas Berente, Kalle Lyytinen, and Youngjin Yoo (pp. 849-871)

A Matter of Life and Death: Exploring Conceptualizations of Sociomateriality in the Context of Critical Care
Matthew Jones (pp. 895-925)

A Trichordal Temporal Approach to Digital Coordination: The Sociomaterial Managing of the CERN Grid
Will Venters, Eivor Oborn, and Michael Barrett (Volume 38, Issue 3, pp. 927-949)

2014 June

Digital Innovation as a Fundamental and Powerful Concept in the Information Systems Curriculum
Robert G. Fichman, Brian L. Dos Santos, and Zhiqiang (Eric) Zheng (pp. 329-353)

Data Collection in the Digital Age: Innovative Alternatives to Student Samples
Zachary R. Steelman, Bryan I. Hammer, and Moez Limayem (pp. 355-378)

Trust, Satisfaction, and Online Repurchase Intention: The Moderating Role of Perceived Effectiveness of E-Commerce Institutional Mechanisms
Yulin Fang, Israr Qureshi, Heshan Sun, Patrick McCole, Elaine Ramsey, and Kai H. Lim (pp. 407-427)

An Economic Analysis of Online Advertising Using Behavioral Targeting
Jianqing Chen and Jan Stallaert (pp. 429-449)

Proactive Versus Reactive Security Investments in the Healthcare Sector
Juhee Kwon and M. Eric Johnson (pp. 451-471)

The Effects of Web Personalization on User Attitude and Behavior: An Integration of the Elaboration Likelihood Model and Consumer Search Theory
Shuk Ying Ho and David Bodoff (pp. 497-520)

Nature and Nurture: The Impact of Automaticity and the Structuration of Communication on Virtual Team Behavior and Performance
Valerie L. Bartelt and Alan R. Dennis (pp. 521-538)

Quality Competition and Market Segmentation in the Security Software Market
Debabrata Dey, Atanu Lahiri, and Guoying Zhang (pp. 589-606)

Coordinating Expertise Across Knowledge Boundaries in Offshore-Outsourcing Projects: The Role of Codification
Julia Kotlarsky, Harry Scarbrough, and Ilan Oshri (pp. 607-627)

2014 March

Reliability Generalization of Perceived Ease of Use, Perceived Usefulness, and Behavioral Intentions
Traci J. Hess, Anna L. McNab, and K. Asli Basglu

Collaboration Through Open Superposition: A Theory of the Open Source Way
James Howison and Kevin Crowston

Enterprise System Implementation and Employee Job Performance: Understanding the Role of Advice Networks
Tracy Ann Sykes, Viswanath Venkatesh, and Jonathan L. Johnson

Explaining Data-Driven Document Classifications
David Martens and Foster Provost

Content Sharing in a Social Broadcasting Environment: Evidence from Twitter
ZhanShi, Huaxia Rui, and Andrew B. Whinston

Contribution Behavior in Virtual Communities: Cognitive, Emotional, and Social Influences
Hsien-Tung Tsai and Richard P. Bagozzi

Theorization and Translation in Information Technology Institutionalization: Evidence from Danish Home Care
Jeppe Agger Nielsen, Lars Mathiassen, and Sue Newell

Leveraging Philanthropic Behavior for Customer Support: The Case of User Support Forums
Wael Jabr, Radha Mookerjee, Yong Tan, and Vijay S. Mookerjee

Swift Guanxi in Online Marketplaces: The Role of Computer-Mediated Communication Technologies
Carol Xiaojuan Ou, Paul A. Pavlou, and Robert M. Davison

Complementary Online Services in Competitive Markets: Maintaining Profitability in the Presence of Network Effects
Hila Etzion and Min-Seok Pang

Distributed Cognition in Software Design: An Experimental Investigation of the Role of Design Patterns and Collaboration
George Mangalaraj, Sridhar Nerur, RadhaKanta Mahapatra, and Kenneth H. Price

Information Technology Capability and Firm Performance: Contradictory Findings and Their Possible Causes
Ho-Chang Chae, Chang E. Koh, and Victor R. Prybutok

2013 December

Evaluating Journal Quality and the Association for Information Systems Senior Scholars’ Journal Basket Via Bibliometric Measures: Do Expert Journal Assessments Add Value?
Paul Benjamin Lowry, Gregory D. Moody, James Gaskin, Dennis F. Galletta, Sean L. Humpherys, Jordan B. Barlow, and Davis W. Wilson

A Longitudinal Study of Herd Behavior in the Adoption and Continued Use of Technology
Heshan Sun

Impact of Wikipedia on Market Information Environment: Evidence on Management Disclosure and Investor Reaction
Sean Xin Xu and Xiaoquan (Michael) Zhang

Taking about Technology: The Emergence of a New Actor Category Through New Media
Emmanuelle Vaast, Elizabeth J. Davidson, and Thomas Mattson

Differential Influence of Blogs Across Different Stages of Decision Making: The Case of Venture Capitalists
Rohit Aggarwal and Harpreet Singh

Changes in Employees’ Job Characteristics During an Enterprise System Implementation: A Latent Growth Modeling Perspective
Hillol Bala and Viswanath Venkatesh

Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users
Juliana Sutanto, Elia Palme, Chuan-Hoo Tan, and Chee Wei Phang

An Investigation of Information Systems Use Patterns: Technological Events as Triggers, the Effect of Time, and Consequences for Performance
Anna Ortiz de Guinea and Jane Webster

Insiders’ Protection of Organizational Information Assets: Development of a Systemics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors
Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Rebecca J. Bennett, and James F. Courtney

Control Balancing in Information Systems Development Offshoring Projects
Robert Wayne Gregory, Roman Beck, and Mark Keil

Media Selection as a Strategic Component of Communication
Joey F. George, John R. Carlson, and Joseph S. Valacich

Sensemaking and Sustainable Practicing: Functional Affordances of Information Systems in Green Transformations
Stefan Seidel, Jan Recker, and Jan vom Brocke

Assessing the Effects of Benefits and Institutional Influences on the Continued Use of Environmentally Munificent Bypass Systems in Long-Haul Trucking

Motivating Energy-Efficient Behavior with Green IS: An Investigation of Goal Setting and the Role of Defaults
Claire-Michelle Loock, Thorsten Staake, and Frédéric Thiesse

2013 September

Discovering Unobserved Heterogeneity in Structural Equation Models to Avert Validity Threats
Jan-Michael Becker, Arun Rai, Christian M. Ringle, and Franziska Völkner

Explaining Employee Job Performance: The Role of Online and Offline Workplace Communication Networks

Integrating Service Quality with System and Information Quality: An Empirical Test in the E-Service Context
Jingjun (David) Xu, Izak Benbasat, and Ronald T. Cenfetelli

The Generative Mechanisms of Digital Infrastructure Evolution
Ola Henfridsson and Bendik Bygstad

Causal Explanation in the Coordinating Process: A Critical Realist Case Study of Federated IT Governance Structures
Clay K. Williams and Elena Karahanna

2013 June

Positioning and Presenting Design Science Research for Maximum Impact
Shirley Gregor and Alan R. Hevner

When Filling the Wait Makes it Feel Longer: A Paradigm Shift Perspective for Managing Online Delay
Weiyin Hong, Traci J. Hess, and Andrew Hardin

Knowing What a User Likes: A Design Science Approach to Interfaces that Automatically Adapt to Culture
Katharina Reinecke and Abraham Bernstein

The Impact of Shaping on Knowledge Reuse for Organizational Improvements with Wikis
Ann Majchrzak, Christian Wagner, and Dave Yates

How a Firm’s Competitive Environment and Digital Strategic Posture Influence Digital Business Strategy
Sunil Mithas, Ali Tafti, and Will Mitchell

Leveraging Digital Technologies: How Information Quality Leads to Localized Capabilities and Customer Service Performance
Pankat Setia, Viswanath Venkatesh, and Supreet Joglekar

2013 March

Impact of Information Feedback in Continuous Combinatorial Auctions: An Experimental Study of Economic Performance
Gediminas Adomavicius, Shawn P. Curley, Alok Gupta, and Pallab Sanyal

IT-Mediated Customer Service Content and Delivery in Electronic Governments: An Empirical Investigation of the Antecedents of Service Quality
Chee-Wee Tan, Izak Benbasat, and Ronald T. Cenfetelli

Digital Games and Beyond: What Happens When Players Compete?
De Liu, Xun Li, and Radhika Santhanam

Data Model Development for Fire Related Extreme Events: An Activity Theory Approach
Rui Chen, Raj Sharman, H. Raghav Rao, and Shambhu J. Upadhyaya

Examining the Relational Benefits of Improved Interfirm Information Processing Capability in Buyer–Supplier Dyads
Eric T. G. Wang, Jeffrey C. F. Tai, and Varun Grover

The Embeddedness of Information Systems Habits in Organizational and Individual Level Routines: Development and Disruption
Greta L. Polites and Elena Karahanna

The Affective Response Model: A Theoretical Framework of Affective Concepts and Their Relationships in the ICT Context
Ping Zhang

Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies
Weiyin Hong and James Y. L. Thong

2012 December

Editor’s Comments – Supplement: Software as Surrogate for Human Information Processing
Detmar W. Straub and Manlio del Guidice

Impact of User Satisfaction with Mandated CRM Use on Employee Service Quality
J. J. Po-An Hsieh, Arun Rai, Stacie Petter, and Ting Zhang

Dialectics of Collective Minding: Contradictory Appropriations of Information Technology in a High-Risk Project
Jessica Luo Carlo, Kalle Lyytinen, and Richard J. Boland Jr.

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective
Alok Gupta and Dmitry Zhdanov

The Effectiveness of Online Shopping: Characteristics and Well-Designed Websites on Satisfaction
Jifeng Luo, Sulin Ba, and Han Zhang

Business Intelligence in Blogs: Understanding Consumer Interactions and Communities
Michael Chau and Jennifer Xu

Web 2.0 Environmental Scanning and Adaptive Decision Support for Business Mergers and Acquisitions
Raymond Y. K. Lau, Stephen S. Y. Liao, K. F. Wong, and Dickson K. W.Chiu

MetaFraud: A Meta-Learning Framework for Detecting Financial Fraud
Ahmed Abbasi, Conan Albrecht, Anthony Vance, and James Hansen

A Hidden Markov Model for Collaborative Filtering
Nachiketa Sahoo, Param Vir Singh, and Tridas Mukhopadhyay

2012 September

Editor’s Comments: Riding the Wave: Past Trends and Future Directions for Health IT Research
Darryl Romanow, Sunyoung Cho, and Detmar W. Straub

On the Use of Neurophysiological Tools in IS Research: Developing a Research Agenda for NeuroIS
Angelika Dimoka, Rajiv D. Banker, Izak Benbasat, Fred D. Davis, Alan R. Dennis, David Gefen, Alok Gupta, Anja Ischebeck, Peter H. Kenning, Paul A. Pavlou, Gernot Müller-Putz, René Riedl, Jan vom Brocke, and Berndt Weber

Comparing PLS to Regression and LISREL: A Response to Marcoulides, Chin, and Saunders
Dale L. Goodhue, William Lewis, and Ron Thompson

Conceptualizing Generalizability: New Contributions and a Reply
Allen S. Lee and Richard L. Baskerville

How to Conduct a Functional Magnetic Resonance (fMRI) Study in Social Science Research
Angelika Dimoka

A Knowledge-Based Model of Radical Innovation in Small Software Firms
Jessica Luo Carlo, Kalle Lyytinen, and Gregory M. Rose

Information Technology Implementers’ Responses to User Resistance: Nature and Effects
Suzanne Rivard and Liette Lapointe

Senior Editor Note
Dale L. Goodhue

Research Note on Representing Part–Whole Relations in Conceptual Modeling
Gove N. Allen and Salvatore T. March

Does PLS Have Advantages for Small Sample Size or Non-Normal Data?
Dale L. Goodhue, William Lewis, and Ron Thompson

Assessing Common Method Bias: Problems with the ULMC Technique
Wynne W. Chin, Jason Bennett Thatcher, and Ryan T. Wright

2012 June

Style Composition in Action Research Publication
Laris Mathiassen, Mike Chiasson, and Matt Germonprez (36:2), June 2012

Can Online Wait Be Managed? The Effect of Filler Interfaces and Presentation Modes on Perceived Waiting Time Online
Younghwa Lee, Andrew N. K. Chen, and Virginia Ilie (36:2), June 2012

On Product Uncertainty in Online Markets: Theory and Evidence
Angelika Dimoka, Yili Hong, and Paul A. Pavlov (36:2), June 2012

The Career Paths Less (or More) Traveled: A Sequence Analysis of IT Career Histories, Mobility Patterns, and Career Success
Damien Joseph, Wai Fong Boh, Soon Ang, and Sandra A. Slaughter (36:2), June 2012

Understanding User Revisions When Using Information Systems Features: Adaptive System Use and Triggers
Heshan Sun (36:2), June 2012

Toward a New Theory of the Contribution of the IT Function in Organizations
Manon G. Guillemette and Guy Pare (36:2), June 2012

IS Employee Attitudes and Perceptions at Varying Levels of Software Process Maturity
Janet K. Ply, Jo Ellen Moore, Clay K. Williams, and Jason Bennett Thatcher (36:2), June 2012

Absorptive Capacity and Information Systems Research: Review, Synthesis, and Directions for Future Research
Nicholas Roberts, Pamela S. Galluch, Michael Dinger, and Varun Grover (36:2), June 2012

Carrots and Rainbows: Motivation and Social Practice in Open Source Software Development
Georg von Krogh, Stefan Haefliger, Sebastian Spaeth, and Martin W. Wallin (36:2), June 2012

2012 March

Editor’s Comments: A Critical Look at the Use of PLS-SEM in MIS Quarterly
Christian M. Ringle, Marko Sarstedt, and Detmar W. Straub (36:1), March 2012

Shackled to the Status Quo: The Inhibiting Effects of Incumbent System Habit, Switching Costs, and Inertia on New System Acceptance
Greta L. Polites and Elena Karahanna (36:1), March 2012

Recommendation Networks and the Long Tail of Electronic Commerce
Gal Oestreicher-Singer and Arun Sundararajan (36:1), March 2012

Human Capital Development for Programmers Using Open Source Software
Amit Mehra and Vijay Mookerjee (36:1), March 2012

Revisiting Bias Due to Construct Misspecification: Different Results from Considering Coefficients in Standardized Form
Miguel Aguirre-Urreta and George M. Marakas (36:1), March 2012

Information Technology and Firm Profitability: Mechanisms and Empirical Evidence
Sunil Mithas, Ali Tafti, Indranil Bardhan, and Jie Mein Goh (36:1), March 2012

Interfirm IT Capability Profiles and Communications for Cocreating Relational Value: Evidence from the Logistics Industry
Arun Rai, Paul A. Pavlou, Ghiyoung Im, and Steve Du (36:1), March 2012

2011 December

Editor’s Comments: IT and Entrepreneurism: An On-Again, Off-Again Love Affair or a Marriage?
Manlio Del Giudice and Detmar Straub (35:4), December 2011

Network Effects: The Influence of Structural Social Capital on Open Source Project Success
Param Vir Singh, Yong Tan, and Vijay Mookerjee (35:4), December 2011

Technostress: Technological Antecedents and Implications
Ramakrishna Ayyagari, Varun Grover, and Russell Purvis (35:4), December 2011

The Value of IT-Enabled Retailer Learning: Personalized Product Recommendations and Customer Store Loyalty in Electronic Markets
Tongxiao (Catherine) Zhang, Ritu Agarwal, and Henry C. Lucas, Jr. (35:4), December 2011

Guidelines for Designing Visual Ontologies to Support Knowledge Identification
Palash Bera, Andrew Burton-Jones, and Yair Wand (35:4), December 2011

A Multilevel Model for Measuring Fit Between a Firm’s Competitive Strategies and Information Systems Capabilities
Tim S. McLaren, Milena M. Head, Yufei Yuan, and Yolande E. Chan (35:4), December 2011

Freedom of Choice, Ease of Use, and the Formation of Interface Preferences
Kyle B. Murray and Gerald Häubl (35:4), December 2011

Information Privacy Research: An Interdisciplinary Review
H. Jeff Smith, Tamara Dinev, and Heng Xu (35:4), December 2011

Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
France Belanger and Robert E. Crossler (35:4), December 2011

Integrating Technology Addiction and Use: An Empirical Investigation of Online Auction Users
Ofir Turel, Alexander Serenko, and Paul Giles (35:4), December 2011

Virtual Space and Place: Theory and Test
Carol Saunders, A. F. Rutkowski, Michiel van Genuchten, Doug Vogel, and Julio Molina Orrego (35:4), December 2011

2011 September

Information Systems Research Behavior: What Are the Normative Standards?
Gove N. Allen, Nicholas L. Ball, and H. Jeff Smith (35:3), September 2011

The Effects of Digital Trading Platforms on Commodity Prices in Agricultural Supply Chains
Rajiv Banker, Sabyaschi Mitra, and V. Sambamurthy (35:3), September 2011

What If Your Avatar Looks Like You? Dual-Congruity Perspectives for Avatar Use
Kil-Soo Suh, Hongki Kim, and Eung Kyo Suh (35:3), September 2011

Enhancing Brand Equity Through Flow and Telepresence: A Comparison of 2D and 3D Virtual Worlds
Fiona Fui-Hoon Nah, Brenda Eschenbrenner, and David DeWester (35:3), September 2011

From Space to Place: Predicting Users’ Intentions to Return to Virtual Worlds
Lakshmi Goel, Norman A. Johnson, Iris Junglas, and Blake Ives (pp. 749-771)

An Odyssey into Virtual Worlds: Exploring the Impacts of Technological and Spatial Environments on Intention to Purchase Virtual Products
Animesh Animesh, Alain Pinsonneault, Sung-Byung Yang, and Wonseok Oh (35:3), September 2011

2011 June

Gefen, D., Rigdon, E. E., and Straub, D. Editor’s Comments: An Update and Extension to SEM Guidelines for Administrative Social Science Research (35:2), June 2011

MacKenzie, S. B., Podsakoff, P. M., and Podsakoff, N. P. Construct Measurement and Validation Procedures in MIS and Behavioral Research: Integrating New and Existing Techniques (35:2), June 2011

Diamantopoulos, A. Incorporating Formative Measures into Covariance-Based Equation Models (35:2), June 2011

Wells, J. D., Valacich, J. S., and Hess, T. J. What Signals Are You Sending? How Website Quality Influences Perceptions of Product Quality and Purchase Intentions (35:2), June 2011

Chen, P., Kataria, G., and Krishnan, R. Correlated Failures, Diversification, and Information Security Risk Management (35:2), June 2011

Lee, D-J., Ahn, J-H., and Bang, Y. Managing Consumer Privacy Concerns in Personalization: A Strategic Analysis of Privacy Protection (35:2), June 2011

Aggarwal, N., Dai, Q., and Walden, E. A. The More, the Merrier? How the Number of Partners in a Standard-Setting Initiative Affects Shareholder’s Risk and Return (35:2), June 2011

Nan, N. Capturing Bottom-Up Information Technology Use Processes: A Complex Adaptive Systems Model (35:2), June 2011

2011 March

Errata Note: Sein, M. K., Henfridsson, O., Purao, S., Rossi, M., and Lindgren, R. Action Design Research (35:1), March 2011

Dean, D. L., Lowry, P. B., and Humpherys, S. Profiling the Research Productivity of Tenured Information Systems Faculty at U.S. Institutions (35:1), March 2011

Recker, J., Rosemann, M., Green, P., and Indulska, M. Do Ontological Deficiencies in Modeling Grammars Matter? (35:1), March2011

Hinz, O., Hann, I-H., and Spann, M. Price Discrimination in E-Commerce? An Examination of Dynamic Pricing in Name-Your-Own Price Markets? (35:1), March 2011

Adipat, B., Zhang, D., and Zhou, L. The Effects of Tree-View Based Presentation Adaptation on Model Web Browsing? (35:1), March 2011

Elliot, S. Transdisciplinary Perspectives on Environmental Sustainability: A Resource Base and Framework for IT-Enabled Business Transformation? (35:1), March 2011

Mithas, S., Ramasubbu, N., and Sambamurthy, V. How Information Management Capability Influences Firm Performance? (35:1), March 2011

2010 December

Taylor, H., Dillon, S., and van Wingen, M. Focus and Diversity in Information Systems Research: Meeting the Dual Demands of a Healthy Applied Discipline (34:4), December 2010

Beaudry, A., and Pinsonneault, A. The Other Side of Acceptance: Studying the Direct and Indirect Effects of Emotions on Information Technology Use (34:4), December 2010

Deng, L., and Poole, M. S. Affect in Web Interfaces: A Study of the Impacts of Web Page Visual Complexity and Order (34:4), December 2010

Puhakainen, P., and Siponen, M. Improving Employees’ Compliance Through Information Systems Security Training: An Action Research Study (34:4), December 2010

Sarker, S., and Valacich, J. S. An Alternative to Methodological Individualism: A Non-Reductionist Approach to Studying Technology Adoption by Groups (34:4), December 2010

Li, X., and Hitt, L. M. Price Effects in Online Product Reviews: An Analytical Model and Empirical Analysis (34:4), December 2010

2010 September

Siponen, M., and Vance, A. Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations (34:3), September 2010

Spears, J. L., and Barki, H. User Participation in Information Systems Security Systems De Jure Standard in a Government Organization (34:3), September 2010

Bulgurcu, B., Cavusoglu, H., and Benbasat, I. Information System Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness, (34:3), September 2010

Johnston, A. C., and Warkentin, M. Fear Appeals and Information Security Behaviors: An Empirical Study, (34:3), September 2010

Gordon, L. A., Loeb, M. P., and Sohail, T. Market Value of Voluntary Disclosures Concerning Information Security, (34:3), September 2010

Galbreth, M. R., and Shor, M. The Impact of Malicious Agents on the Enterprise Software Industry, (34:3), September 2010

Anderson, C. L., and Agarwal, R. Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions, (34:3), September 2010

2010 June

Chen, D. Q., Mocker, M., Preston, D. S., and Teubner, A. Information Systems Strategy: Reconceptualization, Measurement, and Implications (34:2), June 2010

Dou, W., Lim, K. H., Su, C., Zhou, N., and Cui, N. Brand Positioning Strategy Using Search Engine Marketing (34:2), June 2010

McKinney, E. H., Jr., and Yoos, C. J., II. Information About A Taxonomy of Views (34:2), June 2010