Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jcis/jcis61.bht:"
@article{DBLP:journals/jcis/AasheimKR21, author = {Cheryl Aasheim and Jeffrey P. Kaleta and Paige Rutner}, title = {Assessing {IT} Students' Intentions to Commit Unethical Actions}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {3}, pages = {219--228}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1584544}, doi = {10.1080/08874417.2019.1584544}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/AasheimKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/AlharthiLWH21, author = {Saleh Hamed Alharthi and Yair Levy and Ling Wang and Inkyoung Hur}, title = {Employees' Mobile Cyberslacking and Their Commitment to the Organization}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {2}, pages = {141--153}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1571455}, doi = {10.1080/08874417.2019.1571455}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/AlharthiLWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/AngeloM21, author = {Raymond Angelo and Richard McCarthy}, title = {A Pedagogy to Develop Effective Virtual Teams}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {5}, pages = {450--457}, year = {2021}, url = {https://doi.org/10.1080/08874417.2020.1717396}, doi = {10.1080/08874417.2020.1717396}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/AngeloM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/Asamoah21, author = {Daniel Adomako Asamoah}, title = {Utilizing a Simulation Approach for Data Analytics Pedagogy}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {6}, pages = {581--591}, year = {2021}, url = {https://doi.org/10.1080/08874417.2020.1848482}, doi = {10.1080/08874417.2020.1848482}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/Asamoah21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/Bansal21, author = {Gaurav Bansal}, title = {Restoring Trust after an Insider Breach: Both the Genders Matter - CEOs and Users}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {1}, pages = {11--29}, year = {2021}, url = {https://doi.org/10.1080/08874417.2018.1556132}, doi = {10.1080/08874417.2018.1556132}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/Bansal21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/BesmerTL21, author = {Andrew Besmer and Tyler Thomas and Heather Richter Lipford}, title = {Effects of Privacy Notification Style and Frequency on Phone Usage}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {1}, pages = {30--41}, year = {2021}, url = {https://doi.org/10.1080/08874417.2018.1563008}, doi = {10.1080/08874417.2018.1563008}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/BesmerTL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/Blackwood-Brown21, author = {Carlene Blackwood{-}Brown and Yair Levy and John D'Arcy}, title = {Cybersecurity Awareness and Skills of Senior Citizens: {A} Motivation Perspective}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {3}, pages = {195--206}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1579076}, doi = {10.1080/08874417.2019.1579076}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/Blackwood-Brown21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/CetinUPMN21, author = {Fatih {\c{C}}etin and Tara Urich and Joanna Paliszkiewicz and Magdalena Madra{-}Sawicka and Jeretta Horn Nord}, title = {ICTs, Empowerment, and Success: Women's Perceptions across Eight Countries}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {1}, pages = {1--10}, year = {2021}, url = {https://doi.org/10.1080/08874417.2020.1799452}, doi = {10.1080/08874417.2020.1799452}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/CetinUPMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ChapmanR21, author = {Thomas A. Chapman and Brian J. Reithel}, title = {Perceptions of Cybersecurity Readiness among Workgroup {IT} Managers}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {5}, pages = {438--449}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1703224}, doi = {10.1080/08874417.2019.1703224}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/ChapmanR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ChurchZI21, author = {E. Mitchell Church and Xia Zhao and Lakshmi S. Iyer}, title = {Media-Generating Activities and Follower Growth within Social Networks}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {6}, pages = {551--560}, year = {2021}, url = {https://doi.org/10.1080/08874417.2020.1824597}, doi = {10.1080/08874417.2020.1824597}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/ChurchZI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ClaybaughHCC21, author = {Craig C. Claybaugh and Peter Haried and Yan Chen and Langtao Chen}, title = {{ERP} Vendor Satisfaction: From Communication and {IT} Capability Perspectives}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {1}, pages = {64--75}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1566801}, doi = {10.1080/08874417.2019.1566801}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/ClaybaughHCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/CuellarTC21, author = {Michael J. Cuellar and Manoucheher Tabatabaei and Thomas Case}, title = {Antecedents of Technology Selection for Project Use}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {5}, pages = {395--409}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1650677}, doi = {10.1080/08874417.2019.1650677}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/CuellarTC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/CusackG21, author = {Brian Cusack and Eghbal Ghazizadeh}, title = {Formulating Knowledge-Based Cloud Identity Selection}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {3}, pages = {207--218}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1584067}, doi = {10.1080/08874417.2019.1584067}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/CusackG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/Dang21, author = {Duong Dang}, title = {Institutional Logics and Their Influence on Enterprise Architecture Adoption}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {1}, pages = {42--52}, year = {2021}, url = {https://doi.org/10.1080/08874417.2018.1564632}, doi = {10.1080/08874417.2018.1564632}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/Dang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/DiazPL21, author = {Oswaldo E. Diaz and Mar{\'{\i}}a Gabriela Perez and Jorge Edison Lascano}, title = {Literature Review about Intention Mining in Information Systems}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {4}, pages = {295--304}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1633569}, doi = {10.1080/08874417.2019.1633569}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/DiazPL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ErikssonF21, author = {Marcus Eriksson and Bruce Ferwerda}, title = {Towards a User Experience Framework for Business Intelligence}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {5}, pages = {428--437}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1693936}, doi = {10.1080/08874417.2019.1693936}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/ErikssonF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/EryilmazTAL21, author = {Evren Eryilmaz and Brian Thoms and Zafor Ahmed and Kuo{-}Hao Lee}, title = {Affordances of Recommender Systems for Disorientation in Large Online Conversations}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {3}, pages = {229--239}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1590165}, doi = {10.1080/08874417.2019.1590165}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/EryilmazTAL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/GuW21, author = {Zhongwei Gu and June Wei}, title = {Empirical Study on Initial Trust of Wearable Devices Based on Product Characteristics}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {6}, pages = {520--528}, year = {2021}, url = {https://doi.org/10.1080/08874417.2020.1779150}, doi = {10.1080/08874417.2020.1779150}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/GuW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/HartzelS21, author = {Kathleen S. Hartzel and William E. Spangler}, title = {A High-Reliability Approach to Risk Management in an {IT} Project}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {2}, pages = {130--140}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1568845}, doi = {10.1080/08874417.2019.1568845}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/HartzelS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/HewLOL21, author = {Jun{-}Jie Hew and Voon{-}Hsien Lee and Keng{-}Boon Ooi and Binshan Lin}, title = {Computer Science in {ASEAN:} {A} Ten-Year Bibliometric Analysis {(2009-2018)}}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {3}, pages = {247--255}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1601538}, doi = {10.1080/08874417.2019.1601538}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/HewLOL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/HwangWKK21, author = {Inho Hwang and Robin L. Wakefield and Sanghyun Kim and Taeha Kim}, title = {Security Awareness: The First Step in Information Security Compliance Behavior}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {4}, pages = {345--356}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1650676}, doi = {10.1080/08874417.2019.1650676}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/HwangWKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/JohnsonKW21, author = {Vess L. Johnson and Angelina I. T. Kiser and Richard W. Woolridge}, title = {Factors Affecting Coproduction Resentment within a Self-checkout Environment}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {6}, pages = {529--538}, year = {2021}, url = {https://doi.org/10.1080/08874417.2020.1808866}, doi = {10.1080/08874417.2020.1808866}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/JohnsonKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/JohnsonWB21, author = {Vess Johnson and Richard W. Woolridge and Joseph R. Bell}, title = {The Impact of Consumer Confusion on Mobile Self-Checkout Adoption}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {1}, pages = {76--86}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1566802}, doi = {10.1080/08874417.2019.1566802}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/JohnsonWB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/KaurDCR21, author = {Puneet Kaur and Amandeep Dhir and Sufen Chen and Risto Rajala}, title = {Attitudinal and Behavioral Loyalty Toward Virtual Goods}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {2}, pages = {118--129}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1568844}, doi = {10.1080/08874417.2019.1568844}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/KaurDCR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/KimSBK21, author = {Jong{-}Hyun Kim and Rajiv Sabherwal and Gee{-}Woo Bock and Han{-}Min Kim}, title = {Understanding Social Media Monitoring and Online Rumors}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {6}, pages = {507--519}, year = {2021}, url = {https://doi.org/10.1080/08874417.2020.1762260}, doi = {10.1080/08874417.2020.1762260}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/KimSBK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/KoLKX21, author = {Dong{-}Gil Ko and Gwanhoo Lee and Mark Keil and Weidong Xia}, title = {Project Control, Coordination, and Performance in Complex Information Systems Outsourcing}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {3}, pages = {256--266}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1606687}, doi = {10.1080/08874417.2019.1606687}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/KoLKX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/KockM21, author = {Ned Kock and Murad A. Moqbel}, title = {Social Networking Site Use, Positive Emotions, and Job Performance}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {2}, pages = {163--173}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1571457}, doi = {10.1080/08874417.2019.1571457}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/KockM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/KoohangNSP21, author = {Alex Koohang and Jeretta Horn Nord and Zoroayka V. Sandoval and Joanna Paliszkiewicz}, title = {Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {2}, pages = {99--107}, year = {2021}, url = {https://doi.org/10.1080/08874417.2020.1779151}, doi = {10.1080/08874417.2020.1779151}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/KoohangNSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/LeeBS21, author = {Ji{-}Myoun Lee and Gee{-}Woo Bock and Ayoung Suh}, title = {The Influence of Social Power on Knowledge Utilization}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {6}, pages = {493--506}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1700469}, doi = {10.1080/08874417.2019.1700469}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/LeeBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/LeeCL21, author = {Philip Tin Yun Lee and Michael Chau and Richard Wing Cheung Lui}, title = {The Role of Attitude toward Challenge in Serious Game Design}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {4}, pages = {383--394}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1692258}, doi = {10.1080/08874417.2019.1692258}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/LeeCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/LeeWYI21, author = {Angela Siew{-}Hoong Lee and Shan Wang and William Yeoh and Novita Ikasari}, title = {Understanding the Use of Knowledge Sharing Tools}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {5}, pages = {458--470}, year = {2021}, url = {https://doi.org/10.1080/08874417.2020.1752850}, doi = {10.1080/08874417.2020.1752850}, timestamp = {Fri, 19 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/LeeWYI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/LeonardJ21, author = {Lori N. K. Leonard and Kiku Jones}, title = {Trust in {C2C} Electronic Commerce: Ten Years Later}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {3}, pages = {240--246}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1598829}, doi = {10.1080/08874417.2019.1598829}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/LeonardJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/NazarethC21, author = {Derek L. Nazareth and Jae Choi}, title = {Market Share Strategies for Cloud Computing Providers}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {2}, pages = {182--192}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1576022}, doi = {10.1080/08874417.2019.1576022}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/NazarethC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/NikkhahNHS21, author = {Hamid Reza Nikkhah and Franck Loic Soh Noume and Beverly A. Hodges{-}McDaniel and Rajiv Sabherwal}, title = {Team Performance and Triangle Approach: {A} Longitudinal Study}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {5}, pages = {471--480}, year = {2021}, url = {https://doi.org/10.1080/08874417.2020.1771796}, doi = {10.1080/08874417.2020.1771796}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/NikkhahNHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/OhLZ21, author = {Junyoung Oh and Hwansoo Lee and Hangjung Zo}, title = {The Effect of Leadership and Teamwork on {ISD} Project Success}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {1}, pages = {87--97}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1566804}, doi = {10.1080/08874417.2019.1566804}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/OhLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/OoiLHL21, author = {Keng{-}Boon Ooi and Voon{-}Hsien Lee and Jun{-}Jie Hew and Binshan Lin}, title = {Mobile Social Cyberbullying: Why are Keyboard Warriors Raging?}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {4}, pages = {371--382}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1679685}, doi = {10.1080/08874417.2019.1679685}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/OoiLHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ParkK21, author = {Jong{-}Hyun Park and Yun Bae Kim}, title = {Factors Activating Big Data Adoption by Korean Firms}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {3}, pages = {285--293}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1631133}, doi = {10.1080/08874417.2019.1631133}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/ParkK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/QiaoSW21, author = {Lin Qiao and Mengmeng Song and Nan (Tina) Wang}, title = {Virtual Brand Community Experience, Identification, and Electronic Word-of-mouth}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {4}, pages = {357--370}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1661805}, doi = {10.1080/08874417.2019.1661805}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/QiaoSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ShadbadB21, author = {Forough Nasirpouri Shadbad and David Biros}, title = {Understanding Employee Information Security Policy Compliance from Role Theory Perspective}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {6}, pages = {571--580}, year = {2021}, url = {https://doi.org/10.1080/08874417.2020.1845584}, doi = {10.1080/08874417.2020.1845584}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/ShadbadB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ShahbaznezhadKR21, author = {Hamidreza Shahbaznezhad and Farzan Kolini and Mona Rashidirad}, title = {Employees' Behavior in Phishing Attacks: What Individual, Organizational, and Technological Factors Matter?}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {6}, pages = {539--550}, year = {2021}, url = {https://doi.org/10.1080/08874417.2020.1812134}, doi = {10.1080/08874417.2020.1812134}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/ShahbaznezhadKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/SipiorLG21, author = {Janice C. Sipior and Danielle R. Lombardi and Renata Gabryelczyk}, title = {Information Technology Operational Risk: {A} Teaching Case}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {4}, pages = {328--344}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1647767}, doi = {10.1080/08874417.2019.1647767}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/SipiorLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/StoneC21, author = {Jeffrey A. Stone and S. Hakan Can}, title = {Investigating Factors of Twitter Use among Municipal Governments}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {3}, pages = {267--274}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1628673}, doi = {10.1080/08874417.2019.1628673}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/StoneC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/SunH21, author = {Zhaohao Sun and Yanxia Huo}, title = {The Spectrum of Big Data Analytics}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {2}, pages = {154--162}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1571456}, doi = {10.1080/08874417.2019.1571456}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/SunH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/TavaresKSS21, author = {Breno Gontijo Tavares and Mark Keil and Carlos Eduardo Sanches da Silva and Adler Diniz de Souza}, title = {A Risk Management Tool for Agile Software Development}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {6}, pages = {561--570}, year = {2021}, url = {https://doi.org/10.1080/08874417.2020.1839813}, doi = {10.1080/08874417.2020.1839813}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/TavaresKSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ToskinM21, author = {Katarzyna Toskin and Richard V. McCarthy}, title = {Information Technology Work Value Differences}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {4}, pages = {305--313}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1639567}, doi = {10.1080/08874417.2019.1639567}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/ToskinM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/TroshaniHSA21, author = {Indrit Troshani and Sally Rao Hill and Claire Sherman and Damien Arthur}, title = {Do We Trust in AI? Role of Anthropomorphism and Intelligence}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {5}, pages = {481--491}, year = {2021}, url = {https://doi.org/10.1080/08874417.2020.1788473}, doi = {10.1080/08874417.2020.1788473}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/TroshaniHSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/UlmanMQH21, author = {Milos Ulman and Cristina Galamba Marreiros and Rui Quaresma and Albert L. Harris}, title = {{IT} Ethics Perceptions and Behavior: An International Comparison}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {5}, pages = {418--427}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1688732}, doi = {10.1080/08874417.2019.1688732}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/UlmanMQH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/WangJ21, author = {Lidong Wang and Randy Jones}, title = {Big Data Analytics in Cyber Security: Network Traffic and Attacks}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {5}, pages = {410--417}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1688731}, doi = {10.1080/08874417.2019.1688731}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/WangJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/WangLH21, author = {Xuequn Wang and Xiaolin Lin and Nick Hajli}, title = {Understanding Software Engineers' Skill Development in Software Development}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {2}, pages = {108--117}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1566805}, doi = {10.1080/08874417.2019.1566805}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/WangLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/WangLL21, author = {Xuequn Wang and Xiaolin Lin and Zilong Liu}, title = {Understanding Consumers' Post-Adoption Behavior in Sharing Economy Services}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {3}, pages = {275--284}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1631132}, doi = {10.1080/08874417.2019.1631132}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/WangLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/X21, title = {Retraction: Gender Reputation Differences on Online Programming Q{\&}A Communities}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {2}, pages = {193}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1600347}, doi = {10.1080/08874417.2019.1600347}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/X21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/XiaPAZ21, author = {Huosong Xia and Xiaoting Pan and Wuyue An and Zuopeng Justin Zhang}, title = {Can Online Rating Reflect Authentic Customer Purchase Feelings? Understanding How Customer Dissatisfaction Relates to Negative Reviews}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {4}, pages = {314--327}, year = {2021}, url = {https://doi.org/10.1080/08874417.2019.1647766}, doi = {10.1080/08874417.2019.1647766}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/XiaPAZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ZimbaWC21, author = {Aaron Zimba and Zhaoshun Wang and Mumbi Chishimba}, title = {Addressing Crypto-Ransomware Attacks: Before You Decide whether To-Pay or Not-To}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {1}, pages = {53--63}, year = {2021}, url = {https://doi.org/10.1080/08874417.2018.1564633}, doi = {10.1080/08874417.2018.1564633}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/ZimbaWC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/Wang21, title = {{RETRACTED} {ARTICLE:} Gender Reputation Differences on Online Programming Q{\&}A Communities}, journal = {J. Comput. Inf. Syst.}, volume = {61}, number = {2}, year = {2021}, note = {Withdrawn.}, url = {https://doi.org/10.1080/08874417.2018.1563007}, doi = {10.1080/08874417.2018.1563007}, timestamp = {Mon, 12 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/Wang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.