Emotions: The Unexplored Fuel of Fake News on Social Media | 0 | 0.34 | 2021 |
Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model | 0 | 0.34 | 2021 |
If Practice Makes Perfect, Where do we Stand? | 0 | 0.34 | 2019 |
Predicting the intent of sponsored search users: An exploratory user session-level analysis | 0 | 0.34 | 2019 |
Digital Borders, Location Recognition, and Experience Attribution within a Digital Geography. | 0 | 0.34 | 2019 |
Bridging a Bridge: Bringing Two HCI Communities Together. | 0 | 0.34 | 2018 |
Goals, Values, and Expectations of the AIS Family of Journals. | 0 | 0.34 | 2017 |
It's complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis. | 4 | 0.41 | 2017 |
Here we go again! The impact of website ad repetition on recall, intrusiveness, attitudes, and site revisit intentions. | 4 | 0.47 | 2017 |
Lost in Cyberspace: The Impact of Information Scent and Time Constraints on Stress, Performance, and Attitudes Online. | 9 | 0.48 | 2015 |
Creating Greater Synergy Between HCI Academia and Practice | 0 | 0.34 | 2015 |
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors | 54 | 0.95 | 2015 |
When trust and distrust collide online: The engenderment and role of consumer ambivalence in online consumer behavior | 11 | 0.44 | 2014 |
Evaluating Journal Quality and the Association for Information Systems Senior Scholars' Journal Basket Via Bibliometric Measures: Do Expert Journal Assessments Add Value? | 30 | 0.84 | 2013 |
The Drivers in the Use of Online Whistle-Blowing Reporting Systems. | 22 | 0.61 | 2013 |
Development of Smart Phone Usability Benchmarking Tasks | 1 | 0.37 | 2013 |
Examining the Potential for Tablet Use in a Higher Education Context. | 3 | 0.45 | 2013 |
Explaining the Engenderment and Role of Consumer Ambivalence in E-Commerce. | 0 | 0.34 | 2013 |
Keyword Search Patterns in Sponsored Link Advertisements. | 0 | 0.34 | 2012 |
A Rational Choice Theory Approach towards a Causal Model of Online Advertising Intrusiveness and irritation. | 1 | 0.37 | 2012 |
Conceptualizing Knowledge Use: A Theoretical Framework and Empirical Study | 0 | 0.34 | 2012 |
The antecedents of the use of continuous auditing in the internal auditing context | 5 | 0.45 | 2012 |
Factors Influencing The Planned Adoption Of Continuous Monitoring Technology | 8 | 0.55 | 2012 |
Intrusiveness of Online Video Advertising and Its Effects on Marketing Outcomes. | 0 | 0.34 | 2011 |
Which Phish Get Caught? An Exploratory Study of Individual Susceptibility to Phishing. | 6 | 0.42 | 2011 |
Research Note---Knowledge Exploration and Exploitation: The Impacts of Psychological Climate and Knowledge Management System Access | 35 | 0.87 | 2011 |
Panel: Encircling the Globe: How can an Association of Information Systems Academics be Truly International? | 0 | 0.34 | 2008 |
An Experimental Study Of Antecedents And Consequences Of Online Ad Intrusiveness | 19 | 1.15 | 2008 |
Sharing knowledge | 2 | 0.47 | 2008 |
I'm Losing Patience with your Site: The Impact of Information Scent and Time Constraints on Effort, Performance, and Attitudes. | 2 | 0.36 | 2008 |
Applying TAM across cultures: the need for caution | 71 | 1.57 | 2007 |
Does Our Web Site Stress You Out? Information Foraging and the Psychophysiology of Online Navigation. | 1 | 0.36 | 2007 |
The effects of online advertising | 62 | 3.92 | 2007 |
Online Ad Intrusiveness | 0 | 0.34 | 2007 |
Consumer Perceptions and Willingness to Pay for Intrinsically Motivated Online Content | 25 | 1.14 | 2006 |
When the Wait Isnt So Bad: The Interacting Effects of Website Delay, Familiarity, and Breadth | 53 | 2.44 | 2006 |
The Slippery Slope of MIS Academia: A Discussion of the Strive for Relevance in our Discipline. | 3 | 0.41 | 2006 |
A Dyadic Analysis of Media Synchronicity and Task in Live Chat Online Customer Service (LCOCS). | 0 | 0.34 | 2006 |
Toward an Adaptive Structuration Model of International Cyber-Crime. | 0 | 0.34 | 2006 |
The Slippery Slope Of Mis Academia: A Discussion Of The Quest For Relevance In Our Discipline | 8 | 0.49 | 2006 |
How Presentation Flaws Affect Perceived Site Quality, Trust, and Intention to Purchase from an Online Store | 124 | 6.31 | 2006 |
Integrating National Culture into IS Research: The Need for Current Individual Level Measures | 50 | 1.75 | 2005 |
Proceedings of the International Conference on Information Systems, ICIS 2005, December 11-14, 2005, Las Vegas, NV, USA | 85 | 13.46 | 2005 |
AIS SIGHCI position paper | 4 | 0.62 | 2005 |
Does spell-checking software need a warning label? | 11 | 0.83 | 2005 |
Building systems that users want to use | 50 | 2.78 | 2004 |
Web Site Delays: How Tolerant are Users? | 53 | 2.61 | 2004 |
The Role of Organizational Climate in the Use of Knowledge Management Systems to Support Problem Solving. | 2 | 0.36 | 2004 |
The Influence of the Meaning of Pictures and Words on Web Page Recognition Performance | 0 | 0.34 | 2003 |
Software Piracy in the Workplace: A Model and Empirical Test | 124 | 4.78 | 2003 |