Follow

Submissions from 2011

PDF

The Nature of Adherence to Planning as Criterion for Information System Project Success, Dirk Basten and Ali Sunyaev

PDF

Additional Insights from Applying Multiple Theoretical Lenses: Technology Appropriation by Individuals, Jennie Carroll and Justin Fidock

PDF

Towards a Theory of Information Systems User Competency, Brenda Eschenbrenner and Fiona Fui-Hoon Nah

PDF

Technology Embodiment: The Contribution of Heidegger's Phenomenology, Matt Germonprez, Jessie Pallud, and Emmanuel Monod

PDF

A Guiding Framework for Developing Theories Investigating the Design Drivers of IT Use and Value, Camille Grange and Izak Benbasat

PDF

A Model of the Dynamics of Organizational Communication, Roland Holten

PDF

Towards an Informativity Account of Design Research, Dirk S. Hovorka and Matt Germonprez

PDF

Knowledge Transfer Processes in the IS Offshore Outsourcing Transition: A Conceptual Model, Oliver Krancher and Jens Dibbern

PDF

IT Governance Impact Model: How mature IT Governance affects Business Performance, Miroslav Lazic, Armin Heinzl, and Alexander Neff

PDF

Envisioning the Concept of Emotions for Theory Development and Testing in Information Systems Research: A Study of One Positive Emotion - Enjoyment, Aleck Chao-Hung Lin and Olga Vasilyeva

PDF

Understanding Organizational Traps in Implementing Service-Oriented Architecture, Xitong Li and Stuart Madnick

PDF

Proposing the Affect-Trust Infusion Model (ATIM) to Explain and Predict the Influence of High- and Low-Affect Infusion on Web Vendor Trust, Paul Benjamin Lowry, Jeff Jenkins, Nathan Twyman, and Matthew Pickard

PDF

Why do Healthcare Organizations Choose to Violate Information Technology Privacy Regulations? Proposing the Selective Information Privacy Violations in Healthcare Organizations Model (SIPVHOM), Paul Benjamin Lowry, Jeffrey D. Wall, and James Selfridge

PDF

Social Aspects in Technology Acceptance: Theory Integration and Development, Bjoern Niehaves, Ralf Plattfaut, and Elena Gorbacheva

PDF

Designing Information Systems Security Policy Methods: A Meta-Theoretical Approach, Asheesh Nigam and Mikko Siponen

PDF

Theory Emergence in IS Research: The Grounded Theory Method Applied, Sebastian Olbrich, Benjamin Muller, and Fred Niederman

PDF

Measuring the Impact of Organizational Social WebSite Usage on Work Performance: A MultilevelModel, Philip Raeth, Maurice Kuegler, and Stefan Smolnik

PDF

How Leadership Styles Impact Enterprise Systems Success throughout the Lifecycle: A Theoretical Exploration, Zhen Shao, Yuqiang Feng, and Qing Hu

PDF

Quality in Requirements Engineering (RE) Explained Using Distributed Cognition: A Case of Open Source Development , B Veeresh Thummadi, Kalle Lyytinen, and Sean Hansen