Found: 48
Select item for more details and to access through your institution.
User Privacy, Surveillance and Public Health during COVID-19 – An Examination of Twitterverse.
- Published in:
- Information Systems Frontiers, 2023, v. 25, n. 5, p. 1667, doi. 10.1007/s10796-022-10247-8
- By:
- Publication type:
- Article
TECHNOLOGICAL ENTITLEMENT: IT'S MY TECHNOLOGY AND I'LL (AB)USE IT HOW I WANT TO.
- Published in:
- MIS Quarterly, 2022, v. 46, n. 3, p. 1395, doi. 10.25300/MISQ/2022/15499
- By:
- Publication type:
- Article
THE OPM DATA BREACH: AN INVESTIGATION OF SHARED EMOTIONAL REACTIONS ON TWITTER.
- Published in:
- MIS Quarterly, 2022, v. 46, n. 2, p. 881, doi. 10.25300/MISQ/2022/15596
- By:
- Publication type:
- Article
Health-Related Misinformation Harm during the COVID-19 Pandemic: An Investigation of Non-comparative and Comparative Harm Perceptions.
- Published in:
- AIS Transactions on Human-Computer Interaction, 2022, v. 14, n. 2, p. 186, doi. 10.17705/1thci.00166
- By:
- Publication type:
- Article
Call for Papers—Special Issue of Information Systems Research—Unleashing the Power of Information Technology for Strategic Management of Disasters.
- Published in:
- Information Systems Research, 2021, v. 32, n. 4, p. 1490, doi. 10.1287/isre.2021.1016
- By:
- Publication type:
- Article
INFLUENCE IN SOCIAL MEDIA: AN INVESTIGATION OF TWEETS SPANNING THE 2011 EGYPTIAN REVOLUTION.
- Published in:
- MIS Quarterly, 2021, v. 45, n. 4, p. 1679, doi. 10.25300/MISQ/2021/15297
- By:
- Publication type:
- Article
An Investigation of Misinformation Harms Related to Social Media during Two Humanitarian Crises.
- Published in:
- Information Systems Frontiers, 2021, v. 23, n. 4, p. 931, doi. 10.1007/s10796-020-10088-3
- By:
- Publication type:
- Article
Is the Convenience Worth the Risk? An Investigation of Mobile Payment Usage.
- Published in:
- Information Systems Frontiers, 2021, v. 23, n. 4, p. 941, doi. 10.1007/s10796-020-10070-z
- By:
- Publication type:
- Article
An Activity Theory Approach to Leak Detection and Mitigation in Patient Health Information (PHI).
- Published in:
- Journal of the Association for Information Systems, 2021, v. 22, n. 4, p. 1007, doi. 10.17705/1jais.00687
- By:
- Publication type:
- Article
IS CYBERSECURITY A TEAM SPORT? A MULTILEVEL EXAMINATION OF WORKGROUP INFORMATION SECURITY EFFECTIVENESS.
- Published in:
- MIS Quarterly, 2020, v. 44, n. 2, p. 907, doi. 10.25300/MISQ/2020/15477
- By:
- Publication type:
- Article
A LONGITUDINAL STUDY OF UNAUTHORIZED ACCESS ATTEMPTS ON INFORMATION SYSTEMS: THE ROLE OF OPPORTUNITY CONTEXTS.
- Published in:
- MIS Quarterly, 2019, v. 43, n. 2, p. 601, doi. 10.25300/MISQ/2019/14751
- By:
- Publication type:
- Article
An Activity Theory Approach to Modeling Dispatch-Mediated Emergency Response.
- Published in:
- Journal of the Association for Information Systems, 2019, v. 20, n. 1, p. 33, doi. 10.17705/1jais.00528
- By:
- Publication type:
- Article
Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests.
- Published in:
- Information Systems Frontiers, 2017, v. 19, n. 3, p. 443, doi. 10.1007/s10796-017-9752-4
- By:
- Publication type:
- Article
Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences.
- Published in:
- Information Systems Research, 2017, v. 28, n. 2, p. 378, doi. 10.1287/isre.2016.0680
- By:
- Publication type:
- Article
Professor Kenneth Arrow and Information Systems Frontiers: In memoriam.
- Published in:
- 2017
- By:
- Publication type:
- Editorial
Overconfidence in Phishing Email Detection.
- Published in:
- Journal of the Association for Information Systems, 2016, v. 17, n. 11, p. 759
- By:
- Publication type:
- Article
The Dynamics of Pre- and Post-purchase Service and Consumer Evaluation of Online Retailers: A Comparative Analysis of Dissonance and Disconfirmation Models.
- Published in:
- Decision Sciences, 2015, v. 46, n. 6, p. 1109, doi. 10.1111/deci.12176
- By:
- Publication type:
- Article
CAMPUS EMERGENCY NOTIFICATION SYSTEMS: AN EXAMINATION OF FACTORS AFFECTING COMPLIANCE WITH ALERTS.
- Published in:
- MIS Quarterly, 2015, v. 39, n. 4, p. 909
- By:
- Publication type:
- Article
An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior.
- Published in:
- Information Systems Research, 2015, v. 26, n. 3, p. 619, doi. 10.1287/isre.2015.0581
- By:
- Publication type:
- Article
DISASTER EXPERIENCE AND HOSPITAL INFORMATION SYSTEMS: AN EXAMINATION OF PERCEIVED INFORMATION ASSURANCE, RISK, RESILIENCE, AND HIS USEFULNESS.
- Published in:
- MIS Quarterly, 2015, v. 39, n. 2, p. 317
- By:
- Publication type:
- Article
INSIDER THREATS IN A FINANCIAL INSTITUTION: ANALYSIS OF ATTACK-PRONENESS OF INFORMATION SYSTEMS APPLICATIONS.
- Published in:
- MIS Quarterly, 2015, v. 39, n. 1, p. 91
- By:
- Publication type:
- Article
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service.
- Published in:
- Information Systems Journal, 2014, v. 24, n. 1, p. 61, doi. 10.1111/j.1365-2575.2012.00420.x
- By:
- Publication type:
- Article
COMMUNITY INTELLIGENCE AND SOCIAL MEDIA SERVICES: A RUMOR THEORETIC ANALYSIS OF TWEETS DURING SOCIAL CRISES.
- Published in:
- MIS Quarterly, 2013, v. 37, n. 2, p. 407
- By:
- Publication type:
- Article
DATA MODEL DEVELOPMENT FOR FIRE RELATED EXTREME EVENTS: AN ACTIVITY THEORY APPROACH1.
- Published in:
- MIS Quarterly, 2013, v. 37, n. 1, p. 125
- By:
- Publication type:
- Article
Audience Gatekeeping in the Twitter Service: An Investigation of Tweets about the 2009 Gaza Conflict.
- Published in:
- AIS Transactions on Human-Computer Interaction, 2012, v. 4, n. 4, p. 212, doi. 10.17705/1thci.00047
- By:
- Publication type:
- Article
Service source and channel choice in G2C service environments: a model comparison in the anti/counter-terrorism domain<sup>1</sup>.
- Published in:
- Information Systems Journal, 2012, v. 22, n. 4, p. 313, doi. 10.1111/j.1365-2575.2011.00388.x
- By:
- Publication type:
- Article
Information control and terrorism: Tracking the Mumbai terrorist attack through twitter.
- Published in:
- Information Systems Frontiers, 2011, v. 13, n. 1, p. 33, doi. 10.1007/s10796-010-9275-8
- By:
- Publication type:
- Article
MOVING TOWARD BLACK HAT RESEARCH IN INFORMATION SYSTEMS SECURITY: AN EDITORIAL INTRODUCTION TO THE SPECIAL ISSUE.
- Published in:
- MIS Quarterly, 2010, v. 34, n. 3, p. 431, doi. 10.2307/25750685
- By:
- Publication type:
- Article
The Information Assurance Practices of Cloud Computing Vendors.
- Published in:
- IT Professional, 2010, v. 12, n. 4, p. 29, doi. 10.1109/MITP.2010.44
- By:
- Publication type:
- Article
An Empirical Examination of IT-Enabled Emergency Response: The Cases of Hurricane Katrina and Hurricane Rita.
- Published in:
- Communications of the Association for Information Systems, 2010, v. 26, p. 141, doi. 10.17705/1CAIS.02608
- By:
- Publication type:
- Article
Anatomy of the Information Security Workforce.
- Published in:
- IT Professional, 2010, v. 12, n. 1, p. 14, doi. 10.1109/MITP.2010.23
- By:
- Publication type:
- Article
Journal Self-Citation VIII: An IS Researcher in the Dual Worlds of Author-Reader and Author-Institution.
- Published in:
- Communications of the Association for Information Systems, 2009, v. 25, p. 73, doi. 10.17705/1CAIS.02508
- By:
- Publication type:
- Article
Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration.
- Published in:
- Information Systems Research, 2009, v. 20, n. 2, p. 237, doi. 10.1287/isre.1080.0188
- By:
- Publication type:
- Article
An Investigation of Lessons Learned from Secondary Information of Katrina and Rita Hurricane Disasters: A First Responder Perspective.
- Published in:
- Journal of Information Science & Technology, 2008, v. 5, n. 1, p. 3
- By:
- Publication type:
- Article
Emergency Response Information System Interoperability: Development of Chemical Incident Response Data Model.
- Published in:
- Journal of the Association for Information Systems, 2008, v. 9, n. 3, p. 200
- By:
- Publication type:
- Article
Market reaction to patent infringement litigations in the information technology industry.
- Published in:
- Information Systems Frontiers, 2008, v. 10, n. 1, p. 61, doi. 10.1007/s10796-007-9036-5
- By:
- Publication type:
- Article
A Value-at-Risk Approach to Information Security Investment.
- Published in:
- Information Systems Research, 2008, v. 19, n. 1, p. 106, doi. 10.1287/isre.1070.0143
- By:
- Publication type:
- Article
An examination of private intermediaries’ roles in software vulnerabilities disclosure.
- Published in:
- Information Systems Frontiers, 2007, v. 9, n. 5, p. 531, doi. 10.1007/s10796-007-9047-2
- By:
- Publication type:
- Article
Private Transactions in Public Places: An Exploration of the Impact of the Computer Environment on Public Transactional Web Site Use.
- Published in:
- Journal of the Association for Information Systems, 2006, v. 7, n. 1, p. 19
- By:
- Publication type:
- Article
KNOWLEDGE ACQUISITION VIA THREE LEARNING PROCESSES IN ENTERPRISE INFORMATION PORTALS: LEARNING-BY-INVESTMENT, LEARNING-BY-DOING, AND LEARNING-FROM-OTHERS.
- Published in:
- MIS Quarterly, 2005, v. 29, n. 2, p. 245, doi. 10.2307/25148679
- By:
- Publication type:
- Article
Foreword Information Systems: Modeling and Analysis.
- Published in:
- Information Systems Frontiers, 2002, v. 4, n. 2, p. 147, doi. 10.1023/A:1016041818120
- By:
- Publication type:
- Article
What Companies Are(n't) Doing about Web Site Assurance.
- Published in:
- IT Professional, 2002, v. 4, n. 3, p. 33, doi. 10.1109/MITP.2002.1008535
- By:
- Publication type:
- Article
A knowledge management perspective to evaluation of enterprise information portals.
- Published in:
- Knowledge & Process Management, 2002, v. 9, n. 2, p. 57, doi. 10.1002/kpm.137
- By:
- Publication type:
- Article
Business Process Change: A Coordination Mechanism Approach.
- Published in:
- Knowledge & Process Management, 1998, v. 5, n. 2, p. 87, doi. 10.1002/(SICI)1099-1441(199806)5:2<87::AID-KPM21>3.0.CO;2-0
- By:
- Publication type:
- Article
Information processing for a finite resource allocation mechanism.
- Published in:
- Economic Theory, 1996, v. 8, n. 2, p. 267, doi. 10.1007/BF01211818
- By:
- Publication type:
- Article
Modeling Team Processes: Issues and a Specific Example.
- Published in:
- Information Systems Research, 1995, v. 6, n. 3, p. 255, doi. 10.1287/isre.6.3.255
- By:
- Publication type:
- Article
Hemispheric Specialization, Cognitive Differences, and Their Implications for the Design of Decision Support Systems.
- Published in:
- MIS Quarterly, 1992, v. 16, n. 2, p. 145, doi. 10.2307/249570
- By:
- Publication type:
- Article
Expert Systems in Production and Operations Management: Classification and Prospects.
- Published in:
- Interfaces, 1988, v. 18, n. 6, p. 80, doi. 10.1287/inte.18.6.80
- By:
- Publication type:
- Article