•  
  •  
 

Articles

PDF

Shadow Systems, Risk, and Shifting Power Relations in Organizations
Daniel Furstenau, Hannes Rothe, and Matthias Sandner

PDF

Social Media Exploitation by Covert Networks: A Case Study of ISIS
Lee Freeman, Robert Schroeder, and Sean F. Everton

PDF

Global Ranking of Management- and Clinical-centered E-health Journals
Alexander Serenko, Michael S. Dohan, and Joseph Tan

PDF

The World IT Project: History, Trials, Tribulations, Lessons, and Recommendations
Prashant Palvia, Tim Jacks, Jaideep Gosh, Paul Licker, Celia Romm-Livermore, Alexander Serenko, and Aykut H. Turan

PDF

Analyzing Crisis Response through Actor-network Theory: The Case of Kathmandu Living Labs
Devinder Thapa, Nama Raj Budhathoki, and Bjørn Erik Munkvold

PDF

Delivering Disruption in an Emergent Access Economy: A Case Study of an E-hailing Platform
Felix Ter Chian Tan, Barney Tan, Anthony Lu, and Lesley Land

PDF

Information Systems: A House Divided?
Alex Stewart, John L. Cotton, and Monica Adya

Editorials

PDF

Goals, Values, and Expectations of the AIS Family of Journals
Carol Saunders, Susan A. Brown, Bendik Bygstad, Alan R. Dennis, Carlos Ferran, Dennis Galletta, Ting-Peng Liang, Paul Benjamin Lowry, Jan Recker, and Suprateek Sarker

Panel Report

PDF

Contemporary Issues of Open Data in Information Systems Research: Considerations and Recommendations
Georg J.P. Link, Kevin Lumbard, Kieran Conboy, Michael Feldman, Joseph Feller, Jordana George, Matt Germonprez, Sean Goggins, Debora Jeske, Gaye Kiely, Kristen Schuster, and Matt Willis

Response or Comment

Teaching Cases

PDF

A Bring-your-own-device Case for Use in the Classroom
Janice C. Sipior, James Bierstaker, Q. Chung, and Johnny Lee

Tutorials

PDF

Using Mechanical Turk Data in IS Research: Risks, Rewards, and Recommendations
Ronnie Jia, Zachary R. Steelman, and Blaize Horner Reich