![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Information Systems, Volume 36
Volume 36, Number 1, March 2022
- Editorial Policy. 219-222
- Marianne Bradford, Eileen Z. Taylor
, Megan Seymore
:
A View from the CISO: Insights from the Data Classification Process. 201-218 - Rajiv D. Banker, Tracie Frost
, Muktak K. Tripathi:
The Determinants of InformationWeek 500 Selection and Its Implications: A Textual Analysis Approach. 81-109 - Odkhishig Ganbold
, Anna M. Rose
, Jacob M. Rose
, Kristian Rotaru:
Increasing Reliance on Financial Advice with Avatars: The Effects of Competence and Complexity on Algorithm Aversion. 7-17 - Chia-Ming Sun
, Yen-Yao Wang, Chen-Bin Yang:
Information Security Assurance and the Role of Security Configuration Management: Substantive and Symbolic Perspectives. 181-199 - Anna M. Rose, Jacob M. Rose
, Kristian Rotaru, Kerri-Ann Sanderson, Jay C. Thibodeau:
Effects of Data Visualization Choices on Psychophysiological Responses, Judgment, and Audit Quality. 53-79 - R. K. Jena
:
Exploring Antecedents of Peoples' Intentions to Use Smart Services in a Smart City Environment: An Extended UTAUT Model. 133-149 - J. Efrim Boritz, Theophanis C. Stratopoulos:
JIS Workshop on Robotic Process Automation (RPA) Research: Views from RPA Industry Leaders and AIS Researchers. 1-5 - Wanying Jiang
, Joseph Legoria
, Kenneth J. Reichelt
, Stephanie Walton
:
Firm Use of Cybersecurity Risk Disclosures. 151-180 - Jared Koreff
:
Are Auditors' Reliance on Conclusions from Data Analytics Impacted by Different Data Analytic Inputs? 19-37 - Covers and Front Matter. i-vi
- Xin Liu
, Bernard Wong-On-Wing:
The Role of Construal Alignment in Enterprise Risk Management. 39-52 - Linda Greene
, Inkyoung Hur
, Yair Levy
, Ling Wang, Keumseok Kang
:
Assessing Effects of Media Affordances and Information Security Awareness on Knowledge-Sharing in Global Software Development. 111-132
Volume 36, Number 2, June 2022
- Xu (Joyce) Cheng
:
The Effect of the Frequency and Source of Instructional Messages on Knowledge Sharing Behavior. 125-140 - Ralf Plattfaut
, Vincent Borghoff
:
Robotic Process Automation: A Literature-Based Research Agenda. 173-191 - Chanyuan (Abigail) Zhang
, Chanta Thomas
, Miklos A. Vasarhelyi
:
Attended Process Automation in Audit: A Framework and A Demonstration. 101-124 - Covers and Front Matter. i-vi
- Hui Du
, Constance M. Lehmann, Victor L. Willson:
Would You Give Me Your Password? 17-52 - Rani Hoitash
, Udi Hoitash:
A Measure of Firm Complexity: Data and Code. 161-172 - Hilda E. Carrillo
, Robin R. Pennington
, Yibo James Zhang:
Is an Emoji Worth a Thousand Words? The Effect of Emoji Usage on Nonprofessional Investors' Perceptions. 1-15 - J. Philipp Klaus
, Kevin Kim, Adi Masli
, Katia Guerra, Leon A. Kappelman
:
Prioritizing IT Management Issues and Business Performance. 83-99 - Editorial Policy. 193-196
- Annie L. Witte
, Christine E. Earley
, Jay C. Thibodeau:
Big Fish, Small Pond: How In-Charge Auditors Engage with Technology-Based Audit Tools to Influence the Audit in Non-Global Network Firms. 141-160 - Ken H. Guo
, Xiaoxiao Yu, Carla Wilkin
:
A Picture is Worth a Thousand Journal Entries: Accounting Graph Topology for Auditing and Fraud Detection. 53-81
Volume 36, Number 3, September 2022
- Oluwakemi Ajayi
, James Zhang:
The Joint Effects of Argument Quality and Interactivity on Nonprofessional Investors' Perceptions of Disclosure Credibility and Investment Decisions. 1-26 - J. Efrim Boritz
, Chan Ge
, Katharine Patterson
:
Factors Affecting Employees' Susceptibility to Cyber-Attacks. 27-60 - Chu Chen, Caroline Hartmann
, Anne Gottfried:
The Impact of Audit Committee IT Expertise on Data Breaches. 61-81 - Zhijian He
, Jiangbo Huangfu, Stephanie Walton
:
Cybersecurity Breaches in the Supply Chain and Earnings Management. 83-113 - Shi-Ming Huang
, Tawei Wang
, Ju-Chun Yen
, Chi-Bei Lee, Yu-Chen Wang, Yi-Ting Yang:
The Use of Geographic Information in Audit Data Analytics for Evidence Gathering: A Design Science Approach. 115-128 - Yuan Li
, Ahmad H. Juma'h
:
The Effect of Technological and Task Considerations on Auditors' Acceptance of Blockchain Technology. 129-151 - Mark D. Sheldon
:
Tracking Tangible Asset Ownership and Provenance with Blockchain. 153-175 - Angela Liew
, Daniel E. O'Leary
, Arif Perdana, Tawei Wang
:
Digital Transformation in Accounting and Auditing: 2021 International Conference of the Journal of Information Systems Panel Discussion. 177-190 - Wu-Po Liu
, Meng-Feng Yen
, Tai-Ying Wu
:
Report Users' Perceived Sentiments of Key Audit Matters and Firm Performance: Evidence from a Deep Learning-Based Natural Language Processing Approach. 191-209 - Yen-Yao Wang:
Python Code and Illustrative Crisis Management Data from Twitter. 211-217 - Marc Eulerich
, Martin Wagener
, David A. Wood:
Evidence on Internal Audit Quality from Transitioning to Remote Audits because of COVID-19. 219-234 - Editorial Policy. 235-239
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.