2023 | Management Information Systems Quarterly | Citations: 0
Authors: Bendig, David; Wagner, Robin; Piening, Erk; Foege, Johann
Abstract: We draw on the attention-based view of the firm to examine whether and when the ... Expand
Semantic filters: personal computer
Topics: Chief Information Officer innovation management digital innovation research and development IT investment
Methods: regression analysis method theory development instrumental variables estimation Compustat descriptive statistic
2023 | International Conference on Information Systems | Citations: 0
Authors: Bodendorf, Frank; Schmidt, Lars; Franke, Jörg
Abstract: Interorganizational information systems (IOIS) are valuable tools providing pla ... Expand
Semantic filters: personal computer
Topics: supply chain management information exchange value creation computer hardware personal computer
Methods: experiment simulation regression analysis method linear regression analysis nonlinear regression analysis
Theories: complex adaptive system
2023 | HICSS | Citations: 0
Authors: Dahya, N.; Arvisais, O.; Ekmekcioglu, C.; Decarpentrie, L.; Badere Bellegie, B.; Mayanga Djafari, F.; Ishimwe, E.; Sasula, K.; Ndabaga, R.; Ndonji, G.
Abstract: This methodological paper discusses the ethical and power-based implications of ... Expand
Semantic filters: personal computer
Topics: technology adoption information system use pandemic human computer interaction usability
Methods: qualitative interview field study personal interview ethnography
Theories: theory of affordance
2023 | Journal of Management Information Systems | Citations: 0
Authors: Figl, Kathrin; Remus, Ulrich
Abstract: Informed by theoretical perspectives on working memory demands and devices' pote ... Expand
Semantic filters: personal computer
Topics: smartphone electronic mail social media decision making laptop computer
Methods: survey within subject experiment longitudinal research experiment hierarchical linear modeling
Theories: dual-system theory cognitive theory
2023 | Information Systems Journal | Citations: 3
Authors: Kirwan, C. Brock; Vance, Anthony; Jenkins, Jeffrey L.; Anderson, Bonnie Brinton
Abstract: NeuroIS—the methods and knowledge of neuroscience applied to the information sys ... Expand
Semantic filters: personal computer
Topics: marketing management Google+ IT security threat personal computer enterprise resource planning
Methods: experiment NeuroIS neurophysiology oculometry functional magnetic resonance imaging
2023 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Lin, Qi; Gan, Wensheng; Wu, Yongdong; Chen, Jiahui; Chen, Chien-Ming
Abstract: Nowadays, the environments of smart systems for Industry 4.0 and Internet of Thi ... Expand
Semantic filters: personal computer
Topics: database system production management smart manufacturing operating system Microsoft Windows
Methods: computational algorithm experiment case study machine learning literature study
2023 | International Journal of Information Management | Citations: 0
Authors: Ruusunen, Nino; Hallikainen, Heli; Laukkanen, Tommi
Abstract: The inability to touch products is a fundamental shortcoming in online shopping ... Expand
Semantic filters: personal computer
Topics: video conference electronic commerce mobile system personal computer marketing management
Methods: survey design survey statistical hypothesis test theoretical contribution descriptive statistic
2023 | International Conference on Information Systems | Citations: 0
Authors: Srinivasan, Karthik; Rao, Sunita; juma, Norma
Abstract: ... Expand
Semantic filters: personal computer
Topics: organizational value organizational productivity logistics management personal computer programming language
Methods: sentiment analysis latent dirichlet allocation deep learning qualitative content analysis machine learning method
Theories: institutional theory
2023 | Communications of the Association for Information Systems | Citations: 2
Authors: Ulrich, Frank; Müller, Sune; Flowers, Stephen
Abstract: Underground hacking has evolved from its early countercultural roots to become ... Expand
Semantic filters: personal computer
Topics: innovation management IT security criminality cyberwarfare IT workforce
Methods: qualitative content analysis theory development synthesis archival research literature study
Theories: management theory
2022 | Information & Management | Citations: 10
Authors: Chen, Yan; Luo, Xin (Robert); Li, Han
Abstract: Extant research seldom focuses on maladaptive security coping behaviors. Applyin ... Expand
Semantic filters: personal computer
Topics: internet technology IT security threat IT security data security self efficacy
Methods: survey PLS tool descriptive statistic partial least squares regression literature study
Theories: extended parallel process model protection motivation theory