Search dblp for Publications

export results for "toc:db/journals/jcis/jcis61.bht:"

 download as .bib file

@article{DBLP:journals/jcis/AasheimKR21,
  author       = {Cheryl Aasheim and
                  Jeffrey P. Kaleta and
                  Paige Rutner},
  title        = {Assessing {IT} Students' Intentions to Commit Unethical Actions},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {3},
  pages        = {219--228},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1584544},
  doi          = {10.1080/08874417.2019.1584544},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/AasheimKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/AlharthiLWH21,
  author       = {Saleh Hamed Alharthi and
                  Yair Levy and
                  Ling Wang and
                  Inkyoung Hur},
  title        = {Employees' Mobile Cyberslacking and Their Commitment to the Organization},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {2},
  pages        = {141--153},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1571455},
  doi          = {10.1080/08874417.2019.1571455},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/AlharthiLWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/AngeloM21,
  author       = {Raymond Angelo and
                  Richard McCarthy},
  title        = {A Pedagogy to Develop Effective Virtual Teams},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {5},
  pages        = {450--457},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2020.1717396},
  doi          = {10.1080/08874417.2020.1717396},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/AngeloM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/Asamoah21,
  author       = {Daniel Adomako Asamoah},
  title        = {Utilizing a Simulation Approach for Data Analytics Pedagogy},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {6},
  pages        = {581--591},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2020.1848482},
  doi          = {10.1080/08874417.2020.1848482},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/Asamoah21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/Bansal21,
  author       = {Gaurav Bansal},
  title        = {Restoring Trust after an Insider Breach: Both the Genders Matter -
                  CEOs and Users},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {1},
  pages        = {11--29},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2018.1556132},
  doi          = {10.1080/08874417.2018.1556132},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/Bansal21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/BesmerTL21,
  author       = {Andrew Besmer and
                  Tyler Thomas and
                  Heather Richter Lipford},
  title        = {Effects of Privacy Notification Style and Frequency on Phone Usage},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {1},
  pages        = {30--41},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2018.1563008},
  doi          = {10.1080/08874417.2018.1563008},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/BesmerTL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/Blackwood-Brown21,
  author       = {Carlene Blackwood{-}Brown and
                  Yair Levy and
                  John D'Arcy},
  title        = {Cybersecurity Awareness and Skills of Senior Citizens: {A} Motivation
                  Perspective},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {3},
  pages        = {195--206},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1579076},
  doi          = {10.1080/08874417.2019.1579076},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/Blackwood-Brown21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/CetinUPMN21,
  author       = {Fatih {\c{C}}etin and
                  Tara Urich and
                  Joanna Paliszkiewicz and
                  Magdalena Madra{-}Sawicka and
                  Jeretta Horn Nord},
  title        = {ICTs, Empowerment, and Success: Women's Perceptions across Eight Countries},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {1},
  pages        = {1--10},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2020.1799452},
  doi          = {10.1080/08874417.2020.1799452},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/CetinUPMN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/ChapmanR21,
  author       = {Thomas A. Chapman and
                  Brian J. Reithel},
  title        = {Perceptions of Cybersecurity Readiness among Workgroup {IT} Managers},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {5},
  pages        = {438--449},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1703224},
  doi          = {10.1080/08874417.2019.1703224},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/ChapmanR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/ChurchZI21,
  author       = {E. Mitchell Church and
                  Xia Zhao and
                  Lakshmi S. Iyer},
  title        = {Media-Generating Activities and Follower Growth within Social Networks},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {6},
  pages        = {551--560},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2020.1824597},
  doi          = {10.1080/08874417.2020.1824597},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/ChurchZI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/ClaybaughHCC21,
  author       = {Craig C. Claybaugh and
                  Peter Haried and
                  Yan Chen and
                  Langtao Chen},
  title        = {{ERP} Vendor Satisfaction: From Communication and {IT} Capability
                  Perspectives},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {1},
  pages        = {64--75},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1566801},
  doi          = {10.1080/08874417.2019.1566801},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/ClaybaughHCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/CuellarTC21,
  author       = {Michael J. Cuellar and
                  Manoucheher Tabatabaei and
                  Thomas Case},
  title        = {Antecedents of Technology Selection for Project Use},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {5},
  pages        = {395--409},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1650677},
  doi          = {10.1080/08874417.2019.1650677},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/CuellarTC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/CusackG21,
  author       = {Brian Cusack and
                  Eghbal Ghazizadeh},
  title        = {Formulating Knowledge-Based Cloud Identity Selection},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {3},
  pages        = {207--218},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1584067},
  doi          = {10.1080/08874417.2019.1584067},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/CusackG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/Dang21,
  author       = {Duong Dang},
  title        = {Institutional Logics and Their Influence on Enterprise Architecture
                  Adoption},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {1},
  pages        = {42--52},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2018.1564632},
  doi          = {10.1080/08874417.2018.1564632},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/Dang21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/DiazPL21,
  author       = {Oswaldo E. Diaz and
                  Mar{\'{\i}}a Gabriela Perez and
                  Jorge Edison Lascano},
  title        = {Literature Review about Intention Mining in Information Systems},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {4},
  pages        = {295--304},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1633569},
  doi          = {10.1080/08874417.2019.1633569},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/DiazPL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/ErikssonF21,
  author       = {Marcus Eriksson and
                  Bruce Ferwerda},
  title        = {Towards a User Experience Framework for Business Intelligence},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {5},
  pages        = {428--437},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1693936},
  doi          = {10.1080/08874417.2019.1693936},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/ErikssonF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/EryilmazTAL21,
  author       = {Evren Eryilmaz and
                  Brian Thoms and
                  Zafor Ahmed and
                  Kuo{-}Hao Lee},
  title        = {Affordances of Recommender Systems for Disorientation in Large Online
                  Conversations},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {3},
  pages        = {229--239},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1590165},
  doi          = {10.1080/08874417.2019.1590165},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/EryilmazTAL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/GuW21,
  author       = {Zhongwei Gu and
                  June Wei},
  title        = {Empirical Study on Initial Trust of Wearable Devices Based on Product
                  Characteristics},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {6},
  pages        = {520--528},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2020.1779150},
  doi          = {10.1080/08874417.2020.1779150},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/GuW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/HartzelS21,
  author       = {Kathleen S. Hartzel and
                  William E. Spangler},
  title        = {A High-Reliability Approach to Risk Management in an {IT} Project},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {2},
  pages        = {130--140},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1568845},
  doi          = {10.1080/08874417.2019.1568845},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/HartzelS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/HewLOL21,
  author       = {Jun{-}Jie Hew and
                  Voon{-}Hsien Lee and
                  Keng{-}Boon Ooi and
                  Binshan Lin},
  title        = {Computer Science in {ASEAN:} {A} Ten-Year Bibliometric Analysis {(2009-2018)}},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {3},
  pages        = {247--255},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1601538},
  doi          = {10.1080/08874417.2019.1601538},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/HewLOL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/HwangWKK21,
  author       = {Inho Hwang and
                  Robin L. Wakefield and
                  Sanghyun Kim and
                  Taeha Kim},
  title        = {Security Awareness: The First Step in Information Security Compliance
                  Behavior},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {4},
  pages        = {345--356},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1650676},
  doi          = {10.1080/08874417.2019.1650676},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/HwangWKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/JohnsonKW21,
  author       = {Vess L. Johnson and
                  Angelina I. T. Kiser and
                  Richard W. Woolridge},
  title        = {Factors Affecting Coproduction Resentment within a Self-checkout Environment},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {6},
  pages        = {529--538},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2020.1808866},
  doi          = {10.1080/08874417.2020.1808866},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/JohnsonKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/JohnsonWB21,
  author       = {Vess Johnson and
                  Richard W. Woolridge and
                  Joseph R. Bell},
  title        = {The Impact of Consumer Confusion on Mobile Self-Checkout Adoption},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {1},
  pages        = {76--86},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1566802},
  doi          = {10.1080/08874417.2019.1566802},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/JohnsonWB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/KaurDCR21,
  author       = {Puneet Kaur and
                  Amandeep Dhir and
                  Sufen Chen and
                  Risto Rajala},
  title        = {Attitudinal and Behavioral Loyalty Toward Virtual Goods},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {2},
  pages        = {118--129},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1568844},
  doi          = {10.1080/08874417.2019.1568844},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/KaurDCR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/KimSBK21,
  author       = {Jong{-}Hyun Kim and
                  Rajiv Sabherwal and
                  Gee{-}Woo Bock and
                  Han{-}Min Kim},
  title        = {Understanding Social Media Monitoring and Online Rumors},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {6},
  pages        = {507--519},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2020.1762260},
  doi          = {10.1080/08874417.2020.1762260},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/KimSBK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/KoLKX21,
  author       = {Dong{-}Gil Ko and
                  Gwanhoo Lee and
                  Mark Keil and
                  Weidong Xia},
  title        = {Project Control, Coordination, and Performance in Complex Information
                  Systems Outsourcing},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {3},
  pages        = {256--266},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1606687},
  doi          = {10.1080/08874417.2019.1606687},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/KoLKX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/KockM21,
  author       = {Ned Kock and
                  Murad A. Moqbel},
  title        = {Social Networking Site Use, Positive Emotions, and Job Performance},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {2},
  pages        = {163--173},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1571457},
  doi          = {10.1080/08874417.2019.1571457},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/KockM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/KoohangNSP21,
  author       = {Alex Koohang and
                  Jeretta Horn Nord and
                  Zoroayka V. Sandoval and
                  Joanna Paliszkiewicz},
  title        = {Reliability, Validity, and Strength of a Unified Model for Information
                  Security Policy Compliance},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {2},
  pages        = {99--107},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2020.1779151},
  doi          = {10.1080/08874417.2020.1779151},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/KoohangNSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/LeeBS21,
  author       = {Ji{-}Myoun Lee and
                  Gee{-}Woo Bock and
                  Ayoung Suh},
  title        = {The Influence of Social Power on Knowledge Utilization},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {6},
  pages        = {493--506},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1700469},
  doi          = {10.1080/08874417.2019.1700469},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/LeeBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/LeeCL21,
  author       = {Philip Tin Yun Lee and
                  Michael Chau and
                  Richard Wing Cheung Lui},
  title        = {The Role of Attitude toward Challenge in Serious Game Design},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {4},
  pages        = {383--394},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1692258},
  doi          = {10.1080/08874417.2019.1692258},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/LeeCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/LeeWYI21,
  author       = {Angela Siew{-}Hoong Lee and
                  Shan Wang and
                  William Yeoh and
                  Novita Ikasari},
  title        = {Understanding the Use of Knowledge Sharing Tools},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {5},
  pages        = {458--470},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2020.1752850},
  doi          = {10.1080/08874417.2020.1752850},
  timestamp    = {Fri, 19 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/LeeWYI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/LeonardJ21,
  author       = {Lori N. K. Leonard and
                  Kiku Jones},
  title        = {Trust in {C2C} Electronic Commerce: Ten Years Later},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {3},
  pages        = {240--246},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1598829},
  doi          = {10.1080/08874417.2019.1598829},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/LeonardJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/NazarethC21,
  author       = {Derek L. Nazareth and
                  Jae Choi},
  title        = {Market Share Strategies for Cloud Computing Providers},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {2},
  pages        = {182--192},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1576022},
  doi          = {10.1080/08874417.2019.1576022},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/NazarethC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/NikkhahNHS21,
  author       = {Hamid Reza Nikkhah and
                  Franck Loic Soh Noume and
                  Beverly A. Hodges{-}McDaniel and
                  Rajiv Sabherwal},
  title        = {Team Performance and Triangle Approach: {A} Longitudinal Study},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {5},
  pages        = {471--480},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2020.1771796},
  doi          = {10.1080/08874417.2020.1771796},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/NikkhahNHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/OhLZ21,
  author       = {Junyoung Oh and
                  Hwansoo Lee and
                  Hangjung Zo},
  title        = {The Effect of Leadership and Teamwork on {ISD} Project Success},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {1},
  pages        = {87--97},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1566804},
  doi          = {10.1080/08874417.2019.1566804},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/OhLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/OoiLHL21,
  author       = {Keng{-}Boon Ooi and
                  Voon{-}Hsien Lee and
                  Jun{-}Jie Hew and
                  Binshan Lin},
  title        = {Mobile Social Cyberbullying: Why are Keyboard Warriors Raging?},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {4},
  pages        = {371--382},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1679685},
  doi          = {10.1080/08874417.2019.1679685},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/OoiLHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/ParkK21,
  author       = {Jong{-}Hyun Park and
                  Yun Bae Kim},
  title        = {Factors Activating Big Data Adoption by Korean Firms},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {3},
  pages        = {285--293},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1631133},
  doi          = {10.1080/08874417.2019.1631133},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/ParkK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/QiaoSW21,
  author       = {Lin Qiao and
                  Mengmeng Song and
                  Nan (Tina) Wang},
  title        = {Virtual Brand Community Experience, Identification, and Electronic
                  Word-of-mouth},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {4},
  pages        = {357--370},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1661805},
  doi          = {10.1080/08874417.2019.1661805},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/QiaoSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/ShadbadB21,
  author       = {Forough Nasirpouri Shadbad and
                  David Biros},
  title        = {Understanding Employee Information Security Policy Compliance from
                  Role Theory Perspective},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {6},
  pages        = {571--580},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2020.1845584},
  doi          = {10.1080/08874417.2020.1845584},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/ShadbadB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/ShahbaznezhadKR21,
  author       = {Hamidreza Shahbaznezhad and
                  Farzan Kolini and
                  Mona Rashidirad},
  title        = {Employees' Behavior in Phishing Attacks: What Individual, Organizational,
                  and Technological Factors Matter?},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {6},
  pages        = {539--550},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2020.1812134},
  doi          = {10.1080/08874417.2020.1812134},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/ShahbaznezhadKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/SipiorLG21,
  author       = {Janice C. Sipior and
                  Danielle R. Lombardi and
                  Renata Gabryelczyk},
  title        = {Information Technology Operational Risk: {A} Teaching Case},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {4},
  pages        = {328--344},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1647767},
  doi          = {10.1080/08874417.2019.1647767},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/SipiorLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/StoneC21,
  author       = {Jeffrey A. Stone and
                  S. Hakan Can},
  title        = {Investigating Factors of Twitter Use among Municipal Governments},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {3},
  pages        = {267--274},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1628673},
  doi          = {10.1080/08874417.2019.1628673},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/StoneC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/SunH21,
  author       = {Zhaohao Sun and
                  Yanxia Huo},
  title        = {The Spectrum of Big Data Analytics},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {2},
  pages        = {154--162},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1571456},
  doi          = {10.1080/08874417.2019.1571456},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/SunH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/TavaresKSS21,
  author       = {Breno Gontijo Tavares and
                  Mark Keil and
                  Carlos Eduardo Sanches da Silva and
                  Adler Diniz de Souza},
  title        = {A Risk Management Tool for Agile Software Development},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {6},
  pages        = {561--570},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2020.1839813},
  doi          = {10.1080/08874417.2020.1839813},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/TavaresKSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/ToskinM21,
  author       = {Katarzyna Toskin and
                  Richard V. McCarthy},
  title        = {Information Technology Work Value Differences},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {4},
  pages        = {305--313},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1639567},
  doi          = {10.1080/08874417.2019.1639567},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/ToskinM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/TroshaniHSA21,
  author       = {Indrit Troshani and
                  Sally Rao Hill and
                  Claire Sherman and
                  Damien Arthur},
  title        = {Do We Trust in AI? Role of Anthropomorphism and Intelligence},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {5},
  pages        = {481--491},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2020.1788473},
  doi          = {10.1080/08874417.2020.1788473},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/TroshaniHSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/UlmanMQH21,
  author       = {Milos Ulman and
                  Cristina Galamba Marreiros and
                  Rui Quaresma and
                  Albert L. Harris},
  title        = {{IT} Ethics Perceptions and Behavior: An International Comparison},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {5},
  pages        = {418--427},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1688732},
  doi          = {10.1080/08874417.2019.1688732},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/UlmanMQH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/WangJ21,
  author       = {Lidong Wang and
                  Randy Jones},
  title        = {Big Data Analytics in Cyber Security: Network Traffic and Attacks},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {5},
  pages        = {410--417},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1688731},
  doi          = {10.1080/08874417.2019.1688731},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/WangJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/WangLH21,
  author       = {Xuequn Wang and
                  Xiaolin Lin and
                  Nick Hajli},
  title        = {Understanding Software Engineers' Skill Development in Software Development},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {2},
  pages        = {108--117},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1566805},
  doi          = {10.1080/08874417.2019.1566805},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/WangLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/WangLL21,
  author       = {Xuequn Wang and
                  Xiaolin Lin and
                  Zilong Liu},
  title        = {Understanding Consumers' Post-Adoption Behavior in Sharing Economy
                  Services},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {3},
  pages        = {275--284},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1631132},
  doi          = {10.1080/08874417.2019.1631132},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/WangLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/X21,
  title        = {Retraction: Gender Reputation Differences on Online Programming Q{\&}A
                  Communities},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {2},
  pages        = {193},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1600347},
  doi          = {10.1080/08874417.2019.1600347},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/X21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/XiaPAZ21,
  author       = {Huosong Xia and
                  Xiaoting Pan and
                  Wuyue An and
                  Zuopeng Justin Zhang},
  title        = {Can Online Rating Reflect Authentic Customer Purchase Feelings? Understanding
                  How Customer Dissatisfaction Relates to Negative Reviews},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {4},
  pages        = {314--327},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2019.1647766},
  doi          = {10.1080/08874417.2019.1647766},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/XiaPAZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/ZimbaWC21,
  author       = {Aaron Zimba and
                  Zhaoshun Wang and
                  Mumbi Chishimba},
  title        = {Addressing Crypto-Ransomware Attacks: Before You Decide whether To-Pay
                  or Not-To},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {1},
  pages        = {53--63},
  year         = {2021},
  url          = {https://doi.org/10.1080/08874417.2018.1564633},
  doi          = {10.1080/08874417.2018.1564633},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/ZimbaWC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/Wang21,
  title        = {{RETRACTED} {ARTICLE:} Gender Reputation Differences on Online Programming
                  Q{\&}A Communities},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {61},
  number       = {2},
  year         = {2021},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1080/08874417.2018.1563007},
  doi          = {10.1080/08874417.2018.1563007},
  timestamp    = {Mon, 12 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/Wang21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics