Works matching IS 08887985 AND DT 2014 AND VI 28 AND IP 2
Results: 15
Enterprise Risk Management: Re-Conceptualizing the Role of Risk and Trust on Information Sharing in Transnational Alliances.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 2, p. 257, doi. 10.2308/isys-50812
- By:
- Publication type:
- Article
Business Modeling to Improve Auditor Risk Assessment: An Investigation of Alternative Representations.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 2, p. 231, doi. 10.2308/isys-50809
- By:
- Publication type:
- Article
A Predictive Ordered Logistic Regression Model as a Tool for Quality Review of Control Risk Assessments.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 2, p. 209, doi. 10.2308/isys-50808
- By:
- Publication type:
- Article
The Impact of XBRL Reporting on Market Efficiency.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 2, p. 181, doi. 10.2308/isys-50794
- By:
- Publication type:
- Article
Mandatory Adoption of XBRL and Foreign Institutional Investors' Holdings: Evidence from China.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 2, p. 127, doi. 10.2308/isys-50789
- By:
- Publication type:
- Article
The Messy Matters of Continuous Assurance: Findings from Exploratory Research in Australia.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 2, p. 357, doi. 10.2308/isys-50788
- By:
- Publication type:
- Article
Online Business Reporting: A Signaling Theory Perspective.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 2, p. 67, doi. 10.2308/isys-50780
- By:
- Publication type:
- Article
Information Technology Capability, Internal Control Effectiveness, and Audit Fees and Delays.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 2, p. 149, doi. 10.2308/isys-50778
- By:
- Publication type:
- Article
Evolution of Accounting Controls in a De-Integrated Project Structure: A Case of Hybridization.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 2, p. 329, doi. 10.2308/isys-50777
- By:
- Publication type:
- Article
I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 2, p. 307, doi. 10.2308/isys-50776
- By:
- Publication type:
- Article
Understanding the Influence of Online Flow Elements on Hedonic and Utilitarian Online Shopping Experiences: A Case of Online Group Buying.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 2, p. 287, doi. 10.2308/isys-50773
- By:
- Publication type:
- Article
Overcoming the Reluctance to Convey Negative Project Information during an Information Systems Pre-Implementation Review.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 2, p. 103, doi. 10.2308/isys-50767
- By:
- Publication type:
- Article
Understanding Post-Implementation Support for Enterprise Systems: An Empirical Study of IT Personnel's Customer-Oriented Citizenship Behaviors.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 2, p. 17, doi. 10.2308/isys-50743
- By:
- Publication type:
- Article
The Interrelationships Between Information Technology Spending, CEO Equity Incentives, and Firm Value.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 2, p. 41, doi. 10.2308/isys-50742
- By:
- Publication type:
- Article
AIS as a Facilitator of Accounting Change: Technology, Practice, and Education.
- Published in:
- 2014
- By:
- Publication type:
- Editorial