Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Information Systems, Volume 33
Volume 33, Number 1, Spring 2019
- Roger S. Debreceny, Tawei Wang, Mi (Jamie) Zhou:
Research in Social Media: Data Sources and Methodologies. 1-28 - Travis P. Holt, Tina M. Loraas:
Using Qualtrics Panels to Source External Auditors: A Replication Study. 29-41 - Nicholas C. Hunt, Andrea M. Scheetz:
Using MTurk to Distribute a Survey or Experiment: Methodological Considerations. 43-65 - Khondkar E. Karim, Karen Jingrong Lin, Robert E. Pinsker, Hongwei Zhu:
Using Linguistics to Mine Unstructured Data from FASB Exposure Drafts. 67-83 - Chih Hao Ku, Maryam Firoozi:
The Use of Crowdsourcing and Social Media in Accounting Research. 85-111 - Joel Owens, Erin M. Hawkins:
Using Online Labor Market Participants for Nonprofessional Investor Research: A Comparison of MTurk and Qualtrics Samples. 113-128 - Jay C. Thibodeau, L. Tyler Williams, Annie L. Witte:
Point and Click Data: An Assessment of Editorial Perceptions and Recommendations for the Peer-Review Process in the New Data Frontier. 129-144 - Michael Chuancai Zhang, Dan N. Stone, Hong Xie:
Text Data Sources in Archival Accounting Research: Insights and Strategies for Accounting Systems' Scholars. 145-180
Volume 33, Number 2, June 2019
- John A. Barrick, Nathan W. Mecham, Scott L. Summers, David A. Wood:
Ranking Accounting Journals by Topical Area and Methodology. 1-22 - Gary Chen, Jie Zhou:
XBRL Adoption and Systematic Information Acquisition via EDGAR. 23-43 - Yu Cong, Ayishat Omar, Huey-Lian Sun:
Does IT Outsourcing Affect the Accuracy and Speed of Financial Disclosures? Evidence from Preparer-Side XBRL Filing Decisions. 45-61 - David R. Fordham, Carol W. Hamilton:
Accounting Information Technology in Small Businesses: An Inquiry. 63-75 - Peter C. Kipp, Yibo James Zhang, Amanuel F. Tadesse:
Can Social Media Interaction and Message Features Influence Nonprofessional Investors' Perceptions of Firms? 77-98 - Lijun (Gillian) Lei, Yutao Li, Yan Luo:
Social Media and Voluntary Nonfinancial Disclosure: Evidence from Twitter Presence and Corporate Political Disclosure. 99-128 - Margarita M. Lenk, John Peter Krahel, Diane J. Janvrin, Brett Considine:
Social Technology: An Integrated Strategy and Risk Management Framework. 129-153 - Robert Marley, Neal M. Snow:
An Empirical Investigation on Social Media Users' Demand for Financial Information Distributed via Social Media Platforms. 155-175 - Thomas J. Smith, Julia L. Higgs, Robert E. Pinsker:
Do Auditors Price Breach Risk in Their Audit Fees? 177-204 - Michael Werner, Nick Gehrke:
Identifying the Absence of Effective Internal Controls: An Alternative Approach for Internal Control Audits. 205-222
Volume 33, Number 3, Fall 2019
- Antoinette L. Smith, Yibo James Zhang, Peter C. Kipp:
Cloud-Computing Risk Disclosure and ICFR Material Weakness: The Moderating Role of Accounting Reporting Complexity. 1-17 - Melvin A. Lamboy-Ruiz, Won Gyun No, Olena V. Watanabe:
Discrepancies in Hospital Financial Information: Comparison of Financial Data in State Data Repositories and the Healthcare Cost Reporting Information System. 19-44 - Dan Ionita, Roel J. Wieringa, Jaap Gordijn, Ahmed Seid Yesuf:
Quantitative, Value-Driven Risk Analysis of e-Services. 45-60 - Feiqi Huang, Won Gyun No, Miklos A. Vasarhelyi:
Do Managers Use Extension Elements Strategically in the SEC's Tagged Data for Financial Statements? Evidence from XBRL Complexity. 61-74 - Tien-Shih Hsieh, Zhihong Wang, Mohammad Abdolmohammadi:
Factors Associated with Companies' Choices of XBRL Implementation Strategies: Evidence from the U.S. Market. 75-91 - Lei Gao, Alisa G. Brink:
A Content Analysis of the Privacy Policies of Cloud Computing Services. 93-115 - Nishani Edirisinghe Vincent, Julia L. Higgs, Robert E. Pinsker:
Board and Management-Level Factors Affecting the Maturity of IT Risk Management Practices. 117-135 - Daniel E. O'Leary:
Facilitating Citizens' Voice and Process Reengineering Using a Cloud-Based Mobile App. 137-162 - Xu (Joyce) Cheng, Stephanie Walton:
Do Nonprofessional Investors Care About How and When Data Breaches are Disclosed? 163-182 - Michele L. Frank, Jonathan H. Grenier, Jonathan S. Pyzoha:
How Disclosing a Prior Cyberattack Influences the Efficacy of Cybersecurity Risk Management Reporting and Independent Assurance. 183-200 - Michael Curry, Byron Marshall, John Correia, Robert E. Crossler:
InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior. 201-225 - Vernon J. Richardson, Rodney E. Smith, Marcia Weidenmier Watson:
Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches. 227-265 - Howard Xu, Savannah (Yuanyaun) Guo, Jacob Z. Haislip, Robert E. Pinsker:
Earnings Management in Firms with Data Security Breaches. 267-284 - Daniel E. O'Leary:
What Phishing E-mails Reveal: An Exploratory Analysis of Phishing Attempts Using Text Analysis. 285-307 - Rajiv D. Banker, Cecilia (Qian) Feng:
The Impact of Information Security Breach Incidents on CIO Turnover. 309-329
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.