JAIS is pleased to provide the accepted version of forthcoming papers. These have not yet gone through the copy-editing and proofing process. The final published version of these papers will be available in the JAIS e-Library in due course.

Follow

PDF

Knowing What to Acquire in the Digital Technology Industry: Balancing Exploitation and Exploration for Superior Performance, Nikhil R. Bandodkar, Varun Grover, and Renu Singh

PDF

The Role of Dissonant Relational Multiplexity in Information System Implementation Failures: Insights from a Grounded Theory Approach, Sutirtha Chatterjee, Suranjan Chakraborty, Kevin Fulk, and Paul Benjamin Lowry

PDF

How Does Big Data Analytics Shape Human Heuristics Adaptation in Strategic Decision-Making? A Perspective of Environmental Uncertainty Contingencies, Jin Chen, Cheng-Suang Heng, Yan Li, and Xi Chen

PDF

Towards an Understanding of Gig Work Risks and Worker Agency on Different Digital Labor Platforms, Xuefei (Nancy) Deng and Robert D. Galliers

PDF

Effective Intervention in User Adaptation: A 2x2 Coping Framework Entailing Implementation and Contextual Factors, Katherine Yue Feng, Nadia Yin Yu, Kar Yan Tam, and Michael C. Lai

PDF

Inverse Transparency and the Quest for Empowerment through the Design of Digital Workplace Technologies, Maren Gierlich-Joas, Abayomi Baiyere, and Thomas Hess

PDF

Understanding the Role of Lead Organizational Donor Types in Civic Crowdfunding, Ghazwan Hassna, Gordon Burtch, and J Leon Zhao

PDF

Using a Process Philosophy Perspective in Information Systems Research: Principles of Creative Evolution, David Kreps and Frantz Rowe

PDF

Contextual Integrity and Personal Health Information Sharing on Online Social Networks, Han Li, Xin Luo, Rathindra Sarathy, and Heng Xu

PDF

Doxing on Social Networking Sites: An Extension of the Social Cognitive Theory of Moral Thought and Action, Yang-Jun Li, Christy M.K Cheung, Xiao-Liang Shen, and Matthew K O Lee

PDF

“Dialogue of Forces”: The Dialogical Constitution of Organizational Transformation in the Digital Age, Kaveh Mohajeri and Aurélie Leclercq-Vandelannoitte

PDF

Designing Information Systems for Infectious Disease Management VUCA Situation: Insights from a Design Archaeology Analysis of COVIDSafe, Alemayehu Molla, Leona Chandra Kruse, Stan Karanasios, Christopher Cheong, and Giang Hoang

PDF

A Typology and Model of Privacy- and Security-Concerned Users’ Attitudes towards Digital Footprints and Consequent Influence on their Social Media Adaptation, Syed Sardar Muhammad, Bidit L. Dey, Hillol Bala, Sharifah Faridah Syed Alwi, and Yousra Asaad

PDF

An Empirical Investigation of The Unintended Consequences of Vulnerability Assessments Leading to Betrayal, Daniel Pienta, Jason Bennett Thatcher, Ryan T. Wright, and Philip L. Roth

PDF

Social Network Integration and Online Review Helpfulness: An Empirical Investigation, Zheyuan Pu, Shengli Li, Jiaxuan Wu, and Yipeng Liu

PDF

Advice utilization in combined human-algorithm decision making: An analysis of preferences and behaviors, Panda Kumar Sachin and Aaron Schecter

PDF

Unraveling Grievance Formation in Online Movement Research: Insights from the Amnesty Sex Worker Policy Protest, Lisen Selander and Sirkka Jarvenpaa

PDF

Power as ‘present-in-actions’ in mundane information systems work, Boyka Simeonova, Paul R. Kelly, Stan Karanasios, and Robert D. Galliers

PDF

Time to Talk About It: Neurodiversity of Information Systems Users in Leisure Settings, Ofir Turel and Antoine Bechara

PDF

Agile Project Management Styles and Control Ambidexterity in Agile Information Systems Development Projects: An Exploratory Case Study, Peter Virag, Edward W.N. Bernroider, and Ulrich Remus

PDF

Actual Private Information Disclosure in Online Social Networking Sites: A Reflective–Impulsive Model, Jingzhi Zhang, Weiquan Wang, Lara Khansa, and Sung S. Kim

PDF

Human-Centered Design and Evaluation of a NeuroIS Tool for Flow Support, Marc T.P. Adam, Lukas Bonenberger, Henner Gimpel, and Julia Lanzl

PDF

Feedback loops in machine learning: A study on the interplay of continuous updating and human discrimination, Kevin Bauer, Rebecca Heigl, Oliver Hinz, and Michael Kosfeld

PDF

The influence of political skill and community capabilities on microtask worker hourly wage: A mixed-methods study of Mechanical Turk, Paul Di Gangi, Jack L. Howard, Charn P. McAllister, and Jason Bennett Thatcher

PDF

Roles of Feedback and Phishing Characteristics in Antiphishing Training Performance: Perspectives of Goal-Setting and Skill Acquisition, Shihe Pan, Dong-Heon Kwak, Jungwon Kuem, and Sung Kim

PDF

Consumers’ Opinion Orientations and Their Credit Risk: An Econometric Analysis Enhanced by Multimodal Analytics, Qiping Wang, Raymond Yiu-Keung Lau, Eric W. T. Ngai, Jason Bennett Thatcher, and Wei Xu

PDF

Towards Theoretical Rigor in Ethical Analysis: The Case of Algorithmic Decision-Making Systems, Uri Gal, Sean W. Hansen, and Allen S. Lee

PDF

Too Drained from Being Agile? The Self-Regulatory Effects of Agile ISD Practices Use and their Consequences for Turnover Intention, Lea Mueller and Alexander Benlian