| Will enterprise social networking systems promote knowledge management and organizational learning? An empirical study |
14 |
| Ontology-based approach for identifying the credibility domain in social Big Data |
7 |
| How differences in eWOM platforms impact consumers' perceptions and decision-making |
7 |
| Building an active semantic data warehouse for precision dairy farming |
5 |
| The diffusion of e-participation in public administrations: A systematic literature review |
4 |
| Violators versus non-violators of information security measures in organizations-A study of distinguishing factors |
4 |
| Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks |
4 |
| Interorganizational processes in buyer-supplier dyads: An information intensity perspective |
3 |
| A morphological review of enterprise social media literature |
3 |
| Spear phishing in a barrel: Insights from a targeted phishing campaign |
3 |
| From traditional interorganisational systems to cloud-based solutions: The impact on supply chain flexibility |
3 |
| Trust and experience in online auctions |
3 |
| Investigating the factors influencing small online vendors' intention to continue engaging in social commerce |
3 |
| Cloud computing capability: its technological root and business impact |
2 |
| Survival of the fittest: understanding the effectiveness of update speed in the ecosystem of software platforms |
2 |
| Factors predicting attitude toward disclosing personal data online |
2 |
| Implementation of an Additional Factor for Secure Authentication in Online Transactions |
2 |
| USERS' SOCIOCULTURAL ORIENTATION AND SMART SYSTEMS ACCEPTANCE LINK: DO DEMOGRAPHICS MATTER? |
2 |
| Factors Affecting the Offshore Deployment of Interorganizational Systems in China: A Case Study Analysis |
1 |
| The upside of showrooming: How online information creates positive spill-over for the brick-and-mortar retailer |
1 |
| Introduction to the Special Issue - Social Computing and Service Innovation: A Framework for Research |
1 |
| Detection of financial rumors using big data analytics: the case of the Bombay Stock Exchange |
1 |
| Comparing consumer-produced product reviews across multiple websites with sentiment classification |
1 |
| Application of the Information Bottleneck method to discover user profiles in a Web store |
1 |
| From an information consumer to an information author: a new approach to business intelligence |
1 |
| Enterprise cybersecurity training and awareness programs: Recommendations for success |
1 |
| Exploring SME cybersecurity practices in developing countries |
1 |
| Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD) - A Persuasion and Cognitive Elaboration Perspective |
1 |
| Virtual customer environment design and organizational innovation: An exploration-exploitation perspective |
1 |
| An empirical study on the effects of an enterprise fan page |
0 |
| The evolution of social media and its impact on organizations and leaders |
0 |
| Negotiation protocol based on ordered weighted averaging and Fuzzy metrics |
0 |
| Systems theoretic process analysis of information security: the case of aadhaar |
0 |
| A new direction to better understand post-adoption behavior: The theory of need for information systems |
0 |
| Effective use of analytic DSS and job performance: Looking beyond technology acceptance |
0 |