| Security on Autopilot: Why Current Security Theories Hijack our Thinking and Lead Us Astray |
11 |
| Epistemology in the Era of Fake News: An Exploration of Information Verification Behaviors among Social Networking Site Users |
7 |
| Detecting Common Method Bias: Performance of the Harman's Single-Factor Test |
6 |
| Integration of Information Systems and Cybersecurity Countermeasures: An Exposure to Risk Perspective |
5 |
| Secure Behavior over Time: Perspectives from the Theory of Process Memory |
5 |
| Definition and Multidimensionality of Security Awareness: Close Encounters of the Second Order |
4 |
| Rethinking Media Synchronicity Theory: Examining the Cooperative Assumption |
3 |
| Will Digital Fluency Influence Social Media Use? An Empirical Study of WeChat Users |
3 |
| Rethinking the Prevailing Security Paradigm: Can User Empowerment with Traceability Reduce the Rate of Security Policy Circumvention? |
3 |
| The Philosopher's Corner: The Value of Feyerabend's Anarchic Thinking for Information Systems Research |
3 |
| The Philosopher's Corner: Questioning Assumptions in the Information Systems Discipline |
2 |
| Are Dynamic Capabilities the Missing Link Between the IS Strategy and Performance Relationship? A Model and Exploratory Test at Three Levels of Environmental Dynamism |
2 |
| Influential Users in Social Network Services: The Contingent Value of Connecting User Status and Brokerage |
2 |
| An Ideology of IT Occupational Culture: The ASPIRE Values |
2 |
| Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives |
2 |
| Absorptive Capacity and Enterprise Systems Implementation: The Role of Prior-Related Knowledge |
2 |
| Academic Social Network-Based Recommendation Approach for Knowledge Sharing |
2 |
| It's in the Cloud: Theorizing Context-Specific Factors Influencing the Perception of Mobile Cloud Storage |
2 |
| An Exploration of the Drivers of Non-Adoption Behavior: A Discriminant Analysis Approach |
1 |
| He Said, She Said: Communications Theory of Identity and The Challenges Men Face in The Information Systems Workplace |
1 |
| The Philosopher's Corner: The Value of Philosophical Debate: Paul Feyerabend and his Relevance for IS Research |
1 |
| Organization Improvisational Capability: Scale Development and Validation |
1 |
| The Philosopher's Corner: A Post-Positivist Answering Back. Part 1: Good for You, Karl Popper! |
1 |
| A Revision of Computer Self-Efficacy Conceptualizations in Information Systems |
1 |
| Broadening the Conceptualization of Theory in the Information Systems Discipline: A Meta-Theory Approach |
1 |
| The Philosopher's Corner: Paul Feyerabend and the Art of Epistemological Anarchy - A Discussion of the Basic Tenets of Against Method and an Assessment of Their Potential Usefulness for the Information Systems Field |
1 |
| It's Not You, It's Me: Identity, Self-Verification, and Amazon Reviews |
1 |
| Exploring the Impact of Optimum Stimulation Level on Individual Perceptions of IT Innovations: A Trait Hierarchical Model Perspective |
1 |
| Taking Feyerabend to the Next Level: On Linear Thinking, Indoctrination, and Academic Killer Bees |
1 |
| Embarrassment Products, Web Personalization and Online Buying Behavior: An Experimental Study |
0 |
| Security Organizing: A Framework for Organizational Information Security Mindfulness |
0 |
| An Experimental Study on the Swaying Effect of Web-Personalization |
0 |
| Cognitive Bias in the Peer Review Process: Understanding a Source of Friction between Reviewers and Researchers |
0 |
| Quality Assessment of Peer-Produced Content in Knowledge Repositories Using Big Data and Social Networks: The Case of Implicit Collaboration in Wikipedia |
0 |
| A Time for Everything: Reflections on the Changing Seasons |
0 |
| The Organization Man and the Innovator: Theoretical Archetypes to Inform Behavioral Information Security Research |
0 |
| InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior |
0 |
| SIGMIS (nee SIGBDP) and DATA BASE: A Partial History |
0 |
| Unconventional Editorial Conventions |
0 |
| Author Highlights for the Past 35 Years: An Analysis of the Most- Published Authors and Most-Cited Papers in The DATA BASE for Advances in Information Systems |
0 |
| What Kind of Research Do We Want? Good Research |
0 |
| Blinding Me with Science; or, It's All Digital: The Story of The DATA BASE Taking its Review System Online |
0 |
| Surviving and Thriving in the Evolving Digital Age: A Peek into the Future of IS Research and Practice |
0 |
| 50 Years of The DATA BASE for Advances in Information Systems: Reflections of the Editor in the Middle |
0 |
| On the March of Time and the Meaning of Days: 50 years of MIS Research Publications at The DATA BASE for Advances in Information Systems |
0 |
| Twenty Anecdotes in Search of a Theme: A Brief History of SIGMIS |
0 |
| The Role of Sense of Presence and Irritation in the Context of Mobile Social Network Sites |
0 |
| The Benefit of Being Second: An Event Study of Social Media Adoption |
0 |
| Haters Gonna Hate: PLS and Information Systems Research |
0 |
| Investigating Knowledge Flows between Information Systems and Other Disciplines: Seeking Greater Research Opportunities |
0 |