2016 December
A Tree-Based Approach for Addressing Self-Selection in Impact Studies with Big Data
Inbal Yahav, Galit Shmueli, and Deepa Mani (pp. 819-848)
Large-Scale Network Analysis for Online Social Brand Advertising
Kunpeng Zhang, Siddhartha Bhattacharyya, and Sudha Ram (pp. 849-868)
Toward a Digital Attribution Model: Measuring the Impact of Display Advertising on Online Consumer Behavior
Anindya Ghose and Vilma Todri-Adamopoulos (pp. 889-910)
Crowd-Squared: Amplifying the Predictive Power of Search Trend Data
Erik Brynjolfsson, Tomer Geva, and Shachar Reichman (pp. 941-961)
Mobile App Analytics: A Multiple Discrete-Continuous Choice Framework
Sang Pil Han, Sungho Park, and Wonseok Oh (pp. 983-1008)
Comprehensible Predictive Models for Business Processes
Dominic Breuker, Martin Matzner, Patrick Delfmann, and Jörg Becker (pp. 1009-1034)
Toward a Better Measure of Business Proximity: Topic Modeling for Industry Intelligence
Zhan (Michael) Shi, Gene Moo Lee, and Andrew B. Whinston (pp. 1035-1056)
2016 September
A Tool for Addressing Construct Identity in Literature Reviews and Meta-Analyses
Kai R. Larsen and Chih How Bong (pp. 529-551)
Advertising Versus Brokerage Model for Online Trading Platforms
Jianqing Chen, Ming Fan, and Mingzhi Li (pp. 575-596)
The Compensatory Interaction Between User Capabilities and Technology Capabilities in Influencing Task Performance: An Empirical Assessment in Telemedicine Consultations
Christina Serrano and Elena Karahanna (pp. 597-621)
TV’s Dirty Little Secret: The Negative Effect of Popular TV on Online Auction Sales
Oliver Hinz, Shawndra Hill, and Ju-Young Kim (pp. 623-644)
Capturing the Complexity of Malleable IT Use: Adaptive Structuration Theory for Individuals
Kurt W. Schmitz, James T. C. Teng, and Kimberly J. Webb (pp. 663-686)
Senior Executives’ IT Management Responsibilities: Serious IT-Related Deficiencies and CEO/CFO Turnover
Adi Masli, Vernon J. Richardson, Marcia Weidenmier Watson, and Robert W. Zmud (pp. 687-708)
Pirates in the Lab: Using Incentivized Choice Experiments to Explore Preference for (Un)Authorized Content
Piotr Ćwiakowski, Marek Giergiczny, and Michal Krawczk (pp. 709-715)
The Making of a Good Impression: Information Hiding in Ad Exchanges
Zhen Sun, Milind Dawande, Ganesh Janakiraman, and Vijay Mookerjee (pp. 717-739)
Control Configuration and Control Enactment in Information Systems Projects: Review and Expanded Theoretical Framework
Martin Wiener, Magnus Mähring, Ulrich Remus, and Carol Saunders (pp. 741-774)
Revisiting Group-Based Technology Adoption as a Dynamic Process: The Role of Changing Attitude–Rationale Configurations
Petra Saskia Bayerl, Kristina Lauche, and Carolyn Axtell (pp. 775-784)
Participation in Open Knowledge Communities and Job-Hopping: Evidence from Enterprise Software
Peng Huang and Zhongju Zhang (pp. 785-806)
2016 June: Special Issue: ICT and Societal Challenges
The Duality of Empowerment and Marginalization in Microtask Crowdsourcing: Giving Voice to the Less Powerful Through Value Sensitive Design
Xuefei (Nancy) Deng, K. D. Joshi, and Robert D. Galliers (pp. 267-277)
Are Social Media Emancipatory or Hegemonic? Societal Effects of Mass Media Digitization in the Case of the SOPA Discourse
Shaila M. Miranda, Amber Young, and Emre Yetgin (pp. 303-329)
The Internet and Racial Hate Crime: Offline Spillovers from Online Access
Jason Chan, Anindya Ghose, and Robert Seamans (pp. 381-403)
Does Information and Communication Technology Lead to the Well-Being of Nations? A Country-Level Empirical Investigation
Kartik K. Ganju, Paul A. Pavlou, and Rajiv D. Banker (pp. 417-430)
The Emergence of Self-Organizing E-Commerce Ecosystems in Remote Villages in China: A Tale of Digital Empowerment for Rural Development
Carmen Leong, Shan L. Pan, Sue Newell, and Lili Cui (pp. 475-484)
You Can’t Bribe a Computer: Dealing with the Societal Challenge of Corruption Through ICT
Shirish C. Srivastava, Thompson S. H. Teo, and Sarv Devaraj (pp. 511-526)
2016 March
An Exploratory Study of the Formation and Impact of Electronic Service Failures
Chee-Wee Tan, Izak Benbasat, and Ronald T. Cenfetelli (pp. 1-29)
Free Versus For-A-Fee: The Impact of a Paywall on the Pattern and Effectiveness of Word-of-Mouth via Social Media
Hyelim Oh, Animesh Animesh, and Alain Pinsonneault (pp. 31-56)
Competitive Bundling in Information Markets: A Seller-Side Analysis
Srinivasan Raghunathan and Sumit Sarkar (pp. 111-131)
When Does Repository KMS Use Lift Performance? The Role of Alternative Knowledge
Seung Hyun Kim, Tridas Mukhopadhyay, and Robert E. Kraut (pp. 133-156)
A Temporally Situated Self-Agency Theory of Information Technology Reinvention
Saggi Nevo, Dorit Nevo, and Alain Pinsonneault (pp. 157-186)
Individuals’ Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China
Yan Chen and Fatemeh Mariam Zahedi (205-222)