| Minimum sample size estimation in PLS-SEM: The inverse square root and gamma-exponential methods |
74 |
| The technostress trifecta - techno eustress, techno distress and design: Theoretical directions and an agenda for research |
29 |
| Digital transformation by SME entrepreneurs: A capability perspective |
26 |
| Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study |
22 |
| Digital innovation: A review and synthesis |
21 |
| Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives |
21 |
| Digitally enabled affordances for community-driven environmental movement in rural Malaysia |
18 |
| Mobile health technology adoption across generations: Narrowing the digital divide |
17 |
| To sell or not to sell: Exploring sellers' trust and risk of chargeback fraud in cross-border electronic commerce |
13 |
| From composites to factors: Bridging the gap between PLS and covariance-based structural equation modelling |
12 |
| Physiolytics at the workplace: Affordances and constraints of wearables use from an employee's perspective |
12 |
| Will cloud computing make the Information Technology (IT) department obsolete? |
11 |
| From a marketplace of electronics to a digital entrepreneurial ecosystem (DEE): The emergence of a meta-organization in Zhongguancun, China |
11 |
| Agility in responding to disruptive digital innovation: Case study of an SME |
11 |
| Technostress and social networking services: Explaining users' concentration, sleep, identity, and social relation problems |
10 |
| Sponsor's cocreation and psychological ownership in reward-based crowdfunding |
10 |
| Transactive memory systems and Web 2.0 in knowledge sharing: A conceptual model based on activity theory and critical realism |
9 |
| Network effects on crowdfunding platforms: Exploring the implications of relaxing input control |
9 |
| Rethinking the concept of the IS organization |
9 |
| Linking information systems and entrepreneurship: A review and agenda for IT-associated and digital entrepreneurship research |
9 |
| The impact of leadership on employees' intended information security behaviour: An examination of the full-range leadership theory |
9 |
| Using ICT for social good: Cultural identity restoration through emancipatory pedagogy |
8 |
| Knowledge boundaries in enterprise software platform development: Antecedents and consequences for platform governance |
8 |
| Trajectory of Affordances: Insights from a case of telemedicine in Nepal |
7 |
| Joining the crowd: The career anchors of information technology workers participating in crowdsourcing |
7 |
| Multiple social media in the workplace: Contradictions and congruencies |
7 |
| The effect of role conflict on self-disclosure in social network sites: An integrated perspective of boundary regulation and dual process model |
6 |
| Innovation at work: The relative advantage of using consumer IT in the workplace |
6 |
| Trust in sharing encounters among millennials |
6 |
| Poverty alleviation through government-led e-commerce development in rural China: An activity theory perspective |
6 |
| Conceptualising the link between information systems and resilience: A developing country field study |
6 |
| Achieving IT-based synergies through regulation-oriented and consensus-oriented IT governance capabilities |
6 |
| Entrepreneurial impact sourcing: a conceptual framework of social and commercial institutional logics |
5 |
| The roles of social identity and dynamic salient group formations for ERP program management success in a postmerger context |
5 |
| The advancement and persistence of women in the information technology profession: An extension of Ahuja's gendered theory of IT career stages |
5 |
| Improving the retention of women in the IT workforce: An investigation of gender diversity interventions in the USA |
5 |
| How infrastructures anchor open entrepreneurship: The case of Bitcoin and stigma |
5 |
| Deliberate storytelling in big data analytics adoption |
5 |
| Diffusion of knowledge in social media networks: effects of reputation mechanisms and distribution of knowledge roles |
5 |
| Email adaptation for conflict handling: A case study of cross-border inter-organisational partnership in East Asia |
5 |
| Distilling a body of knowledge for information systems development |
4 |
| Metaphors in managerial and employee sensemaking in an information systems project |
4 |
| A storyteller's guide to problem-based learning for information systems management education |
4 |
| Ethical norms and issues in crowdsourcing practices: A Habermasian analysis |
4 |
| An interactional view of social presence: Making the virtual other real |
4 |
| Using structural technology acceptance models to segment intended users of a new technology: Propositions and an empirical illustration |
4 |
| Violations of health information privacy: The role of attributions and anticipated regret in shaping whistle-blowing intentions |
4 |
| IT-mediated social interactions and knowledge sharing: Role of competence-based trust and background heterogeneity |
4 |
| Exclusions in social inclusion projects: Struggles in involving children in digital technology development |
4 |
| The pastoral crowd: Exploring self-hosted crowdfunding using activity theory and social capital |
3 |