Social ties, knowledge sharing and successful collaboration in globally distributed system development projects | 2005/03/01 | English | 192 |
‘Datafication’: making sense of (big) data in a complex world | 2013/07/01 | English | 192 |
Revisiting IS business value research: what we already know, what we still need to know, and how we can get there | 2013/03/01 | English | 190 |
Diversity in information systems action research methods | 1998/06/01 | English | 188 |
Transfer of knowledge in knowledge management systems: unexplored issues and suggested studies | 2001/06/01 | English | 187 |
User experience, satisfaction, and continual usage intention of IT | 2010/02/01 | English | 185 |
Personality traits and concern for privacy: an empirical study in the context of location-based services | 2008/08/01 | English | 184 |
Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software | 2009/04/01 | English | 182 |
Change factors requiring agility and implications for IT | 2006/04/01 | English | 181 |
A methodology for construct development in MIS research | 2005/12/01 | English | 179 |
If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security | 2009/04/01 | English | 178 |
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings | 2011/11/01 | English | 177 |
Pragmatismvsinterpretivism in qualitative information systems research | 2012/03/01 | English | 176 |
Explaining information systems change: a punctuated socio-technical change model | 2008/12/01 | English | 175 |
Using resource-based theory to interpret the successful adoption and use of information systems and technology in manufacturing small and medium-sized enterprises | 2003/06/01 | English | 171 |
Women in the information technology profession: a literature review, synthesis and research agenda | 2002/03/01 | English | 170 |
Explaining employees' Extended Use of complex information systems | 2007/07/01 | English | 166 |
Latent Semantic Analysis: five methodological recommendations | 2012/01/01 | English | 162 |
A unified model of IT continuance: three complementary perspectives and crossover effects | 2015/07/01 | English | 161 |
Perceived critical mass effect on groupware acceptance | 2000/06/01 | English | 161 |
Behavioral and policy issues in information systems security: the insider threat | 2009/04/01 | English | 157 |
Determinants of EDI adoption in the transportation industry | 1997/06/01 | English | 157 |
On theory development in design science research: anatomy of a research project | 2008/10/01 | English | 149 |
SMEs, co-opetition and knowledge sharing: the role of information systems | 2003/03/01 | English | 148 |
Resist, comply or workaround? An examination of different facets of user engagement with information systems | 2006/08/01 | English | 148 |
Applying TAM across cultures: the need for caution | 2007/02/01 | English | 145 |
An exploratory study of radio frequency identification (RFID) adoption in the healthcare industry | 2007/12/01 | English | 145 |
Understanding online customer repurchasing intention and the mediating role of trust – an empirical investigation in two developed countries | 2009/06/01 | English | 144 |
The role of perceived enjoyment and social norm in the adoption of technology with network externalities | 2008/02/01 | English | 138 |
Evaluation and realisation of IS/IT benefits: an empirical study of current practice | 1996/02/01 | English | 137 |