Volume 34
-
Web 2.0 and Politics: The 2008 U.S. Presidential Election and an E-Politics Research Agenda
Year: 2010 / Volume: 34 / Issue: 4
$15.00 -
The Impact of Information Technology and Transactive Memory Systems on Knowledge Sharing, Application, and Team Performance: A Field Study
Year: 2010 / Volume: 34 / Issue: 4
$15.00 -
Toward Ethical Information Systems: The Contribution of Discourse Ethics
Year: 2010 / Volume: 34 / Issue: 4
$15.00 -
Price Effects in Online Product Reviews: An Analytical Model and Empirical Analysis
Year: 2010 / Volume: 34 / Issue: 4
$15.00 -
An Alternative to Methodological Individualism: A Non-Reductionist Approach to Studying Technology Adoption by Groups
Year: 2010 / Volume: 34 / Issue: 4
$15.00 -
Improving Employees’ Compliance Through Information Systems Security Training: An Action Research Study
Year: 2010 / Volume: 34 / Issue: 4
$15.00 -
Understanding Organization–Enterprise System Fit: A Path to Theorizing the Information Technology Artifact
Year: 2010 / Volume: 34 / Issue: 4
$15.00 -
Affect in Web Interfaces: A Study of the Impacts of Web Page Visual Complexity and Order
Year: 2010 / Volume: 34 / Issue: 4
$15.00 -
The Other Side of Acceptance: Studying the Direct and Indirect Effects of Emotions on Information Technology Use
Year: 2010 / Volume: 34 / Issue: 4
$15.00 -
Focus and Diversity in Information Systems Research: Meeting the Dual Demands of a Healthy Applied Discipline
Year: 2010 / Volume: 34 / Issue: 4
$15.00 -
Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
The Impact of Malicious Agents on the Enterprise Software Industry
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Market Value of Voluntary Disclosures Concerning Information Security
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Fear Appeals and Information Security Behaviors: An Empirical Study
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
User Participation in Information Systems Security Risk Management
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Circuits of Power: A Study of Mandated Compliance to an Information Systems Security De Jure Standard in a Government Organization
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Detecting Fake Websites: The Contribution of Statistical Learning Theory
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Are There Neural Gender Differences in Online Trust? An fMRI Study on the Perceived Trustworthiness of eBay Offers
Year: 2010 / Volume: 34 / Issue: 2
$15.00