| Using MTurk to Distribute a Survey or Experiment: Methodological Considerations |
6 |
| Information Technology in an Audit Context: Have the Big 4 Lost Their Advantage? |
5 |
| The Current State and Future Directions of Continuous Auditing Research: An Analysis of the Existing Literature |
5 |
| XBRL Adoption and Bank Loan Contracting: Early Evidence |
4 |
| Cloud-Computing Risk Disclosure and ICFR Material Weakness: The Moderating Role of Accounting Reporting Complexity |
4 |
| A Content Analysis of the Privacy Policies of Cloud Computing Services |
4 |
| Do Auditors Price Breach Risk in Their Audit Fees? |
4 |
| Using Online Labor Market Participants for Nonprofessional Investor Research: A Comparison of MTurk and Qualtrics Samples |
4 |
| Research in Social Media: Data Sources and Methodologies |
3 |
| Can Social Media Interaction and Message Features Influence Nonprofessional Investors' Perceptions of Firms? |
3 |
| XBRL Adoption and Systematic Information Acquisition via EDGAR |
3 |
| Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches |
3 |
| Effects of Stories and Checklist Decision Aids on Knowledge Structure Development and Auditor Judgment |
3 |
| The Impact of Senior Management Competencies on the Voluntary Adoption of an Innovative Technology |
3 |
| Are XBRL Files Being Accessed? Evidence from the SEC EDGAR Log File Dataset |
3 |
| What Do the Markets Say? Shareholder Wealth Effects of the XBRL Mandate |
3 |
| Citation-Based Benchmarks and Individual Accounting Faculty Research Rankings by Topical Area and Methodology |
2 |
| Discrepancies in Hospital Financial Information: Comparison of Financial Data in State Data Repositories and the Healthcare Cost Reporting Information System |
2 |
| What Phishing E-mails Reveal: An Exploratory Analysis of Phishing Attempts Using Text Analysis |
2 |
| Ranking Accounting Journals by Topical Area and Methodology |
2 |
| Social Technology: An Integrated Strategy and Risk Management Framework |
2 |
| Social Media and Voluntary Nonfinancial Disclosure: Evidence from Twitter Presence and Corporate Political Disclosure |
2 |
| Using Qualtrics Panels to Source External Auditors: A Replication Study |
2 |
| Point and Click Data: An Assessment of Editorial Perceptions and Recommendations for the Peer-Review Process in the New Data Frontier |
2 |
| The Effect of CEO IT Expertise on the Information Environment: Evidence from Earnings Forecasts and Announcements |
1 |
| Facilitating Citizens' Voice and Process Reengineering Using a Cloud-Based Mobile App |
1 |
| The Impact of Information Security Breach Incidents on CIO Turnover |
1 |
| Earnings Management in Firms with Data Security Breaches |
1 |
| Do Enterprise Resource Planning Systems (ERPs) Constrain Real Earnings Management? |
1 |
| Limiting the Search Space during Controls Evaluation of a Modified Information System |
0 |
| The Association between IT Material Weaknesses and Earnings Management |
0 |
| Text Data Sources in Archival Accounting Research: Insights and Strategies for Accounting Systems' Scholars |
0 |
| The Use of Crowdsourcing and Social Media in Accounting Research |
0 |
| Using Linguistics to Mine Unstructured Data from FASB Exposure Drafts |
0 |
| An Empirical Investigation on Social Media Users' Demand for Financial Information Distributed via Social Media Platforms |
0 |
| Does IT Outsourcing Affect the Accuracy and Speed of Financial Disclosures? Evidence from Preparer-Side XBRL Filing Decisions |
0 |
| Accounting Information Technology in Small Businesses: An Inquiry |
0 |
| InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior |
0 |
| How Disclosing a Prior Cyberattack Influences the Efficacy of Cybersecurity Risk Management Reporting and Independent Assurance |
0 |
| Board and Management-Level Factors Affecting the Maturity of IT Risk Management Practices |
0 |
| Factors Associated with Companies' Choices of XBRL Implementation Strategies: Evidence from the U.S. Market |
0 |
| Do Nonprofessional Investors Care About How and When Data Breaches are Disclosed? |
0 |
| Do Managers Use Extension Elements Strategically in the SEC's Tagged Data for Financial Statements? Evidence from XBRL Complexity |
0 |
| Quantitative, Value-Driven Risk Analysis of e-Services |
0 |
| The Effects of Decision-Aid Design on Auditor Performance in Internal Control Evaluation Tasks |
0 |
| Text Mining Using Latent Semantic Analysis: An Illustration through Examination of 30 Years of Research a JIS |
0 |
| A Framework and Guidelines for Assessing and Developing Board-Level Information Technology Committee Charters |
0 |
| Accounting for Professional Accountants' Dysfunctional Knowledge Sharing: A Self-Determination Theory Perspective |
0 |
| Budget Adjustments and Spending Patterns: A Transaction-Cycle View |
0 |
| Exploring Data Center Migration: A Case Study |
0 |