Workgroup Embeddedness and Professionalism among IT Professionals: Impacts on Work-Life Conflict and Organizational Citizenship. | 0 | 0.34 | 2022 |
Trial-Period Technostress: A Conceptual Definition and Mixed-Methods Investigation | 0 | 0.34 | 2022 |
Can you see opportunity knocking? An examination of technology-based political skill on opportunity recognition in online communities for MTurk workers | 0 | 0.34 | 2022 |
Contextualizing Self-disclosure to the Online Environment: An Assessment of the Literature. | 0 | 0.34 | 2022 |
Improving The Design Of Information Security Messages By Leveraging The Effects Of Temporal Distance And Argument Nature | 0 | 0.34 | 2021 |
The Role of Basic Human Values in Knowledge Sharing: How Values Shape the Postadoptive Use of Electronic Knowledge Repositories | 0 | 0.34 | 2020 |
The Effects Of Business It Strategic Alignment And It Governance On Firm Performance: A Moderated Polynomial Regression Analysis | 0 | 0.34 | 2020 |
Social Media And Selection: Political Issue Similarity, Liking, And The Moderating Effect Of Social Media Platform | 2 | 0.35 | 2020 |
Can Trust be Trusted in Cybersecurity | 0 | 0.34 | 2020 |
Worker stress in the age of mobile technology: The combined effects of perceived interruption overload and worker control. | 0 | 0.34 | 2020 |
The Effectiveness Of Abstract Versus Concrete Fear Appeals In Information Security | 2 | 0.35 | 2020 |
A Great Escape: The Effect of Negative Public Affiliation on Belongingness to Virtual Communities. | 0 | 0.34 | 2020 |
Blockchain Research in Information Systems: Current Trends and an Inclusive Future Research Agenda. | 1 | 0.35 | 2019 |
Getting Information Systems Programs Classified as STEM: A U.S.-based Perspective from an AIS Task Force Study and Panel Discussion | 0 | 0.34 | 2019 |
Revisiting the Impact of System Use on Task Performance: An Exploitative-Explorative System Use Framework | 0 | 0.34 | 2019 |
The IT Identity Threat: A Conceptual Definition and Operational Measure | 0 | 0.34 | 2019 |
Designing Experimental Studies. | 0 | 0.34 | 2019 |
A Field-Based View on Gender in the Information Systems Discipline: Preliminary Evidence and an Agenda for Change. | 0 | 0.34 | 2019 |
Celebrating HICSS50: The Past, Present, and Future of HICSS | 0 | 0.34 | 2018 |
Lab Experiment and Field Experiment in the Digital Age - Friend or Foe? | 0 | 0.34 | 2018 |
How and why trust matters in post-adoptive usage: The mediating roles of internal and external self-efficacy. | 4 | 0.39 | 2018 |
Turning the Negative Affiliation Around - Looking Glass Self in Online Community Platforms. | 0 | 0.34 | 2018 |
Information Systems Betrayal: When Cybersecurity Systems Shift from Agents of Protection to Agents of Harm. | 0 | 0.34 | 2018 |
Leveraging social media to achieve a community policing agenda. | 2 | 0.37 | 2018 |
The Paradoxical Effects of Blockchain Technology on Social Networking Practices. | 0 | 0.34 | 2018 |
Informing Research: Celebrating 50 Years of Ideas and Science at HICSS | 0 | 0.34 | 2018 |
IS Information Systems a (Social) Science | 0 | 0.34 | 2018 |
Mindfulness in information technology use: definitions, distinctions, and a new measure | 1 | 0.34 | 2018 |
Concentration, Competence, Confidence, and Capture: An Experimental Study of Age, Interruption-based Technostress, and Task Performance | 1 | 0.35 | 2018 |
Signaling your Religion: How Strength of Religious Identity Presentation over Social Media Effects Hireability Assessments. | 0 | 0.34 | 2018 |
ICIS 2017 Panel Report: Break Your Shackles! Emancipating Information Systems from the Tyranny of Peer Review | 0 | 0.34 | 2018 |
Can Political Skill Enhance Business and IT Knowledge? | 2 | 0.36 | 2017 |
Break Your Shackles! Emancipating Information Systems From The Tyranny of Peer Review. | 0 | 0.34 | 2017 |
Blockchain Technology in Business and Information Systems Research. | 12 | 0.80 | 2017 |
Implications of Technological Progress for the Measurement of Technology Acceptance Variables: The Case of Self-efficacy. | 0 | 0.34 | 2017 |
Self-Disclosure and SNS Platforms: The Impact of SNS Transparency. | 0 | 0.34 | 2017 |
Training to Mitigate Phishing Attacks Using Mindfulness Techniques. | 6 | 0.42 | 2017 |
Research Note - Using Expectation Disconfirmation Theory and Polynomial Modeling to Understand Trust in Technology. | 3 | 0.38 | 2016 |
Defending against Spear Phishing: Motivating Users through Fear appeal Manipulations. | 1 | 0.35 | 2016 |
Evaluating Tenure Cases for Scholars Active in Emergent or Non-mainstream IS research topics. | 0 | 0.34 | 2016 |
Job Satisfaction in Agile Development Teams: Agile Development as Work Redesign. | 13 | 0.58 | 2016 |
Habitual and Misplaced Trust: The Role of the Dark Side of Trust Between Individual Users and Cybersecurity Systems. | 0 | 0.34 | 2016 |
Six types of IT-business strategic alignment: an investigation of the constructs and their measurement | 28 | 0.69 | 2015 |
Does Professionalism Matter in the IT Workforce? An Empirical Examination of IT Professionals. | 2 | 0.37 | 2015 |
Contextual Factors in Post-adoption: Applying the Model of Proactive Work Behavior to the Study of End-User innovation | 0 | 0.34 | 2015 |
Interrupting the Workplace: Examining Stressors in an Information Technology Context. | 12 | 0.53 | 2015 |
Taxing the development structure of open source communities: An information processing view. | 2 | 0.38 | 2015 |
Beliefs and Attributions toward Computing Technology: The Moderating Role of Social Cues in Interfaces. | 0 | 0.34 | 2015 |
The Influence of Social Aversion and Institution-Based Trust on Computer Self-Efficacy, Computer Anxiety and Antecedents to IT Use | 1 | 0.35 | 2014 |
Social Media and Emergency Management: Exploring State and Local Tweets | 6 | 0.43 | 2014 |