Journal Contents: Journal of Organizational and End User Computing (JOEUC)

View the Journal of Organizational and End User Computing (JOEUC) home page for complete details.
Volume 35 (2023)
Issue 1
Article 2
The Signaling Mechanism of Fairness Concern in E-CLSC (pages 1-35)
Yanhong Qin (Chongqing University of Technology, China), Shaojie Wang (Chongqing University of Technology, China), Neng Gao (Chongqing University of Technology, China), Guirong Liu (Chongqing College of Mobile Communication, China)
Article 3
Research on the Impact of Loyalty Program Information Transparency on Customer Participation Intention with Digital Information: The Moderating Role of Reward Redemption Channels (pages 1-27)
Biyan Xiao (Weifang University of Science and Technology, China), Yitong Liu (Weifang University of Science and Technology, China), Guofeng Piao (Yan'an University, China), Qingli Liu (Weifang University of Science and Technology, China)
Article 6
The Analysis of Key Success Factors Affecting the Satisfaction of Agricultural Organizational Information Systems: The Mediation Role of Information Quality (pages 1-14)
Yingli Wu (School of Business Management, Jiaxing Nanhu University, China), Qingquan Liu (College of Entrepreneurship, Jiaxing University, China), Shengjin Zhou (School of Economics and Management, Northeast Forestry University, China), Mingming Zhou (Economics College, Jiaxing University, China), Xin Li (Economics College, Jiaxing University, China & Yangtze River Delta Financial Technology Research Institute, China)
Article 7
Differential Effects of Renqing and System on Employee Work Quality (pages 1-18)
Bijun Xie (Graduate School of Business, Universiti Kebangsaan Malaysia, Malaysia), Sue Lin Ngan (Universiti Kebangsaan Malaysia, Malaysia), Min Li (Jiangxi University of Finance and Economics, China), Fangbin Xiao (Gannan Medical University, China)
Article 7
The UTAUT Model in the Adoption of E-Learning Technology: An Empirical Study Using China's Banking Industry (pages 1-17)
Jin Qiu (Guangdong University of Science and Technology, China)
Article 11
Article 17
Examining Toxic Leadership Nexus With Employee Cyberloafing Behavior via Mediating Role of Emotional Exhaustion (pages 1-23)
Tianyu Fan (University of Sheffield, UK), Jawad Khan (Iqra National University, Peshawar, Pakistan), Osama Khassawneh (The Emirates Academy of Hospitality Management, Dubai, UAE), Tamara Mohammad (American University in the Emirates, Dubai, UAE)
Article 19
Factors Influencing the Behavioural Intention to Use AI-Generated Images in Business: A UTAUT2 Perspective With Moderators (pages 1-32)
Catalin Ioan Maican (Transilvania University of Brasov, Romania), Silvia Sumedrea (Transilvania University of Brasov, Romania), Alina Tecau (Transilvania University of Brasov, Romania), Eliza Nichifor (Transilvania University of Brasov, Romania), Ioana Bianca Chitu (Transilvania University of Brasov, Romania), Radu Lixandroiu (Transilvania University of Brasov, Romania), Gabriel Bratucu (Transilvania University of Brasov, Romania)
Article 20
Factors Influencing the Willingness to Accept Health Behavior and Psychological Monitoring Systems in the Milieu of Information Management Technology (pages 1-19)
Na Li (Dalian Medical University, China), Chongyuan Guan (Dalian Medical University, China), Xuefeng Huang (Dalian Medical University, China), Qinfang Zhen (Dalian Medical University, China), Anni Wang (Dalian Medical University, China), Xin Dai (Dalian Medical University, China), Yuanyuan Zhang (Dalian Medical University, China)
Article 26
The Influence of Knowledge Worker Salary Satisfaction on Employee Job Performance (pages 1-17)
Lina Zeng (Capital University of Economics and Business, China)
Article 28
Propaganda Information of Internet Celebrity Influence: Young Adult Purchase Intention by Big Data Analysis (pages 1-18)
Fei Meng (Zhejiang Police College, China), Shiqi Jiang (Shanghai Institute of Technology, China), Kmena Moses (Zhejiang Gongshang University, China), Jianliang Wei (Zhejiang Gongshang University, China)
Article 34
The Application of Big Data and Artificial Intelligence Technology in Enterprise Information Security Management and Risk Assessment (pages 1-15)
Qi Wang (School of Management, Hefei University of Technology, China & Faculty of Mathematics and Statistics, Suzhou University, China), Bangfeng Zong (School of Mechanical and Electronic Engineering, Suzhou University, China), Yong Lin (Faculty of Mathematics and Statistics, Suzhou University, China), Zhuangzhuang Li (Faculty of Mathematics and Statistics, Suzhou University, China), Xv Luo (Suzhou Bangcai Education Technology Co., Ltd., China)
Article 35
Blockchain Tokens for Enterprise Knowledge Sharing: Characteristics, Economic Ecology, and Implications (pages 1-20)
Kangning Zheng (Zhejiang Wanli University, China), Justin Zuopeng Zhang (University of North Florida, USA), Taowen Le (Weber State University, USA)
Article 38
A Text-Based Competition Network: The Perspective of Information Disclosure (pages 1-24)
Wei Wang (Chongqing University, China), Fengzhang Chen (Chongqing University, China), Zewei Long (Chongqing University, China), Fengwen Chen (Chongqing University, China), Fu-Sheng Tsai (North China University of Water Resources and Electric Power, China & Department of Business Administration, Center for Environmental Toxin and Emerging-Contaminant Research, China & Super Micro Mass Research and Technology Center, Cheng Shiu University (CSU), Taiwan)
Article 47
A Two-Stage Emotion Generation Model Combining CGAN and pix2pix (pages 1-21)
Yuanqing Wang (Zhoukou Normal University, China & City University, Malaysia), Dahlan Abdul Ghani (Malaysian Institute of Information Technology, University Kuala Lumpur, China), Bingqian Zhou (Zhoukou Normal University, China & Universiti Malaysia Sarawak, Malaysia)
Article 49
A Study on the Influence of Technology Products Introduced Into Green Hotels (pages 1-20)
Chih-Hung Pai (School of Hospitality Management, Zhejiang Yuexiu University, China), Yunfeng Shang (School of Hospitality Management, Zhejiang Yuexiu University, China), Long Wang (School of International Business, Zhejiang Yuexiu University, China), Yin Zhang (School of Tourism, Ningbo City College of Vocational Technology, China)
Article 49
The Impact of E-Commerce on Urban Green Innovation Development: Evidence From Chinese Cities (pages 1-21)
Bingbing Wang (Shanghai University of Political Science and Law, China), Liang Zhang (Jilin University, China), Dingqing Wang (Jilin University, China), Guoliang Jiang (Jilin University, China)
Article 49
Energy Financial Risk Management in China Using Complex Network Analysis (pages 1-29)
Guobin Fang (School of Statistics and Applied Mathematics, Anhui University of Finance and Economics, China), Yaoxun Deng (School of Statistics and Applied Mathematics, Anhui University of Finance and Economics, China), Huimin Ma (School of Statistics and Applied Mathematics, Anhui University of Finance and Economics, China), Jun Zhang (School of Economics,Anhui University of Finance and Economics, China), Li Pan (Faculty of Engineering, Technology, and Built Environment, UCSI University, Malaysia)
Article 51
Understanding the Developments in the Business Perspective of Cloud Computing: A Multidimensional Scaling Analysis (pages 1-36)
Harsh Parekh (Louisiana State University, USA), Huai-Tzu Cheng (University of Massachusetts, Amherst, USA), Andrew Schwarz (Louisiana State University, USA)
Article 56
Does Servant Leadership Enhance Employee Creativity and Performance?: Mediating Role of Knowledge Sharing and Moderating the Role of Self-Efficacy (pages 1-24)
Shagufta Zada (Henan University, Kaifeng, China), Jawad Khan (Iqra National University, Peshawar, Pakistan), Muhammad Zada (Universidad Autónoma de Chile, Santiago, Chile), Imran Saeed (The University of Agriculture, Peshawar, Pakistan), Zhang Yong Jun (Henan University, Kaifeng, China)
Article 59
A Low-Complexity Channel Estimation in Internet of Vehicles in Intelligent Transportation Systems for 5G Communication (pages 1-21)
Lichao Yan (School of Intelligent Engineering, Zhengzhou University of Aeronautics, China)
Article 62
Research on Monitoring Method of Stock Market Systematic Crash Based on Market Transaction Data (pages 1-17)
Yan Li (Dongguan University of Technology, China), Zhan Li (Dongguan University of Technology, China)
Article 66
How Is Paradoxical Leadership Linked to Exploratory Innovation?: The Mediating Role of Knowledge Sharing and the Moderating Role of Environmental Dynamism (pages 1-14)
Xiao Deng (China University of Political Science and Law, China), Jiayu Li (China University of Political Science and Law, China), Yaying Huang (China University of Political Science and Law, China), Linlin Wang (Communication University of China, China)
Article 68
Consumers' Cognitive Dimension of International Corporate Social Responsibility and Its Correlation With Purchasing Tendency (pages 1-17)
Na Qi (School of Philosophy and Sociology, Jilin University, China & Department of Life Culture, Beijing College of Social Administration, China), Yunfan Zhang (Graduate School of International and Area Studies, Hankuk University of Foreign Studies, South Korea), Xiao Lin (The International Exchange College, Shandong College of Arts, China & Department of Digital Image, Sangmyung University, South Korea), Shengchen Chen (Business Administration School, Gyeongsang National University, South Korea)
Article 72
The Robustness and Vulnerability of a Complex Adaptive System With Co-Evolving Agent Behavior and Local Structure (pages 1-27)
Xiaojing Zheng (Weifang University of Science and Technology, China)
Article 78
Uncovering the Dark Side of Artificial Intelligence in Electronic Markets: A Systematic Literature Review (pages 1-25)
Yunfei Xing (Jilin University, China), Lu Yu (Zhejiang University, China), Justin Z. Zhang (University of North Florida, USA), Leven J. Zheng (Hong Kong Metropolitan University, Hong Kong)
Article 78
The Design of a Compound Neural Network-Based Economic Management Model for Advancing the Digital Economy (pages 1-15)
Ke Shang (School of Economics and Finance, Xi'an Jiaotong University, Xi'an, China), Muhammad Asif (National Textile University, Faisalabad, Pakistan)
Article 81
Factors Influencing Member Satisfaction With Cooperation in an Agro-Industrialized Union (pages 1-18)
Hanyue Li (Hebei Agricultural University, China), Runqing Zhang (Hebei Agricultural University, China)
Article 82
A Semantic Matching Method of E-Government Information Resources Knowledge Fusion Service Driven by User Decisions (pages 1-17)
Xinping Huang (School of Business and Management, Jilin University, China), Siyuan Zhu (School of Business and Management, Jilin University, China), Yue Ren (School of Business and Management, Jilin University, China)
Article 87
The Driving Factors Analysis of Live Streamers' Characteristics and Perceived Value for Consumer Repurchase Intention on Live Streaming Platforms (pages 1-24)
Zhaoyang Meng (Fujian Jiangxia University, China), Mengyi Lin (Fujian Jiangxia University, China)
Article 89
Determinants Affecting Consumer Trust in Communication With AI Chatbots: The Moderating Effect of Privacy Concerns (pages 1-24)
Jinjie Li (School of Journalism and Communication, Guangzhou University, Guangzhou, China), Lianren Wu (Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China), Jiayin Qi (Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China), Yuxin Zhang (Institute of Artificial Intelligence and Change Management, Shanghai University of International Business and Economics, Shanghai, China), Zhiyan Wu (School of Business, Shanghai University of International Business and Economics, Shanghai, China), Shuaibo Hu (Institute of Artificial Intelligence and Change Management, Shanghai University of International Business and Economics, Shanghai, China)
Article 90
Research on the Effect of E-Leadership on Employee Innovation Behavior in the Context of “Self” and “Relationship” (pages 1-20)
Min Li (Jiangxi University of Finance and Economics, China), Weihao Xiao (Jiangxi University of Finance and Economics, China)
Issue 2
Article 65
The Enterprise's Willingness to Use Remote Monitoring Technology Under the Background of Green Operation and Service-Oriented Manufacturing (pages 1-14)
Zhe Zhang (Shandong University of Finance and Economics, China), Jin Chen (University of International Business and Economics, China)
Article 69
Artificial Neural Network Dual Hesitant Fermatean Fuzzy Implementation in Transportation of COVID-19 Vaccine (pages 1-23)
Liang Zhou (Jiading District Central Hospital Affiliated Shanghai University of Medicine and Health Sciences, Shanghai, China & Tongren Hospital, Shanghai Jiao Tong University School of Medicine, Shanghai, China), Sadhna Chaudhary (Department of Mathematics, Chaudhary Charan Singh University, India), Mukesh Kumar Sharma (Department of Mathematics, Chaudhary Charan Singh University, India), Arvind Dhaka (Manipal University Jaipur, India & Shanghai University of Medicine and Health Sciences, Shanghai, China), Amita Nandal (Manipal University Jaipur, India)
Issue 3
Article 8
Trust, Perceived Benefits, and Purchase Intention in C2C E-Commerce: An Empirical Testing in China (pages 1-15)
Xingchen Pan (Business School, Gansu University of Political Science and Law, China), Weijian Xiong (Waikato Management School, The University of Waikato, New Zealand), Shengchao Pu (Business School, Gansu University of Political Science and Law, China), Fanshen Han (Graduate School, Gachon University, South Korea), Anqi Zhang (School of Management, Shanghai University of International Business and Economics, China)
Article 13
Analysis of the Configuration and Path of Factors Influencing the Performance of High-Tech Industries (pages 1-21)
Wenwan Wei (Hubei University, China & Hubei Open Economy Research Center, China), Xinyu Yang (Hubei University, China), Wan Chen (Hubei University of Science and Technology, China)
Article 14
Supply Chain Practices, Dynamic Capabilities, and Performance: The Moderating Role of Big Data Analytics (pages 1-26)
Xiaoyi Zhang (Jilin University, China), Xinying He (Jilin University, China), Xiaomin Du (Hainan University, China), Ao Zhang (Jilin University of Finance and Economics, China), Yueqi Dong (Jilin University, China)
Article 17
The Social Media Big Data Analysis for Demand Forecasting in the Context of Globalization: Development and Case Implementation of Innovative Frameworks (pages 1-15)
Yifang Gao (College of Art Design, Shanghai Jian Qiao University, China), Junwei Wang (School of Media and Law, NingboTech University, China), Zhi Li (School of Media and Law, NingboTech University, China), Zengjun Peng (School of Media and Law, NingboTech University, China)
Article 19
Research on the Impact of Green Technology Innovation on Enterprise Financial Information Management Based on Compound Neural Network (pages 1-13)
Si Sun (Henan Polytechnic University, China), Xuandong Zhang (Silla University, South Korea), Li Dong (Dankook University, South Korea), Lu Fan (Henan Polytechnic University, China), Xiaojing Liu (Henan Polytechnic University, China)
Article 30
Digital Transformation in Measuring Social Determinants of Health: A Systematic Review (pages 1-21)
Chen Liu (University of Waikato, New Zealand), William Yu Chung Wang (University of Waikato, New Zealand), Gohar Khan (University of Waikato, New Zealand)
Article 32
The Path Choice of Manufacturing Enterprises to Enhance Competitiveness: Service Transformation or Product Innovation? (pages 1-25)
Xiekui Zhang (Guangxi University, China), Yihan Huang (Guangxi University, China), Yiting Li (Guangxi University, China)
Article 34
The Duality Determinants of Adoption Intention in Digital Transformation Implementation (pages 1-28)
Cheng-Kui Huang (National Chung Cheng University, Taiwan), Chueh-An Lee (National Chiayi University, Taiwan), Ying-Ni Chen (National Chung Cheng University, Taiwan)
Article 38
Language Expression and Economic Value: An Empirical Study on Stock Index Prediction Based on Multi-Feature Emotional Analysis of Financial Discourse (pages 1-15)
Geyang Hu (Central University of Finance and Economics, China), Yifang Liu (Central University of Finance and Economics, China)
Article 39
The Impact of Improving Employee Psychological Empowerment and Job Performance Based on Deep Learning and Artificial Intelligence (pages 1-14)
Xiaoxue Fan (Semyung University, South Korea), Shulang Zhao (Beijing University of Technology, China), Xuan Zhang (Monroe College, USA), Lingchai Meng (Qingdao Hengxing University of Science and Technology, China)
Article 53
The Use of an Internet of Things Data Management System Using Data Mining Association Algorithm in an E-Commerce Platform (pages 1-19)
Guan Wang (Macao University of Science and Technology, Macao), Xuan Zhang (Monroe College, USA), Yifan Gao (University of Wisconsin-Madison, USA), Austin Lin Yee (Peking University, China), Xue Wang (Nanning College of Technology, China)
Article 57
How Long Will It Delay?: An Empirical Study on Iterative Growth of Internet Word-of-Mouth (IWOM) (pages 1-25)
Junfeng Liao (South China University of Technology, China), Rundong Li (South China University of Technology, China), Yongyu Liao (South China University of Technology, China), Xu Guo (Sun Yat-sen University, China)
Article 57
How Attachment Influences Users' Decisions in Mobile Social Commerce Context From a Socio-Technical Systems Perspective (pages 1-23)
Qiongwei Ye (Yunnan University of Finance and Economics, China), Yumei Luo (Yunnan University, China), Changlin Cao (Guangzhou Institute for Modern Industrial Development in Greater Bay Area, China), YaWen Zhong (Guangzhou Institute for Modern Industrial Development in Greater Bay Area, China)
Article 65
Digitalization of the Business Environment and Innovation Efficiency of Chinese ICT Firms (pages 1-25)
Jian Ding (University of Malaya, Malaysia), Baoliu Liu (Beijing University of Technology, China), Jiaxin Wang (Zhongnan University of Economics and Law, China), Ping Qiao (Politecnico di Milano, Italy), Zhaowei Zhu (Zhongnan University of Economics and Law, China)
Article 71
The Use of the Analytic Hierarchy Process in Improving Psychological Empowerment and Employee Performance (pages 1-22)
Qianying Gao (School of Management, Hefei University of Technology, China), Jing Xu (School of Humanity and Law, Hefei University of Technology, China), Qi Wang (School of Management, Hefei University of Technology, China), Cisheng Wu (School of Management, Hefei University of Technology, China)
Article 73
Research on the Impact of Enterprise Innovation and Government Organization Innovation on Regional Collaborative Innovation (pages 1-15)
Yingjing Chu (Zhengzhou University, China), Liyuan Pang (Zhengzhou University, China), Fairtown Zhou Ayoungman (Zhengzhou University, China)
Article 74
The Optimization of Supply Chain Financing for Bank Green Credit Using Stackelberg Game Theory in Digital Economy Under Internet of Things (pages 1-16)
Hui Zhang (Pai Chai University, South Korea), Fengrui Zhang (Sichuan Agricultural University, China), Bing Gong (Tsinghua University, China), Xuan Zhang (Monroe College, USA), Yifan Zhu (The University of Queensland, Australia)
Article 78
Optimization of Digital Information Management of Financial Services Based on Artificial Intelligence in the Digital Financial Environment (pages 1-17)
Xin Li (Economics College, Jiaxing University, China), Jianxiang Zhang (Foshan University, China), Huizhen Long (Hong Kong Polytechnic University, Hong Kong), Yangfen Chen (Tianyuan College, China), Anqi Zhang (Shanghai University of International Business and Economics, China)
Article 79
On the Use of ICT by Enterprises to Activate Industrial Heritage: A Case Study of Taoxichuan in China (pages 1-21)
Zebo Ni (Beihang University, China), Taohua Ouyang (Beihang University, China)
Article 92
Application of Internet of Things and Blockchain in Information Security and Privacy Protection of Global Organizations (pages 1-16)
Shuya Fang (Zhoukou Normal University, China), Qingquan Liu (Jiaxing University, China), Fengrui Zhang (Sichuan Agricultural University, China), Ningyan Chen (University of Aberdeen, UK), Xin Li (Jiaxing University, China)
Article 96
The Shape of Workbreaks to Come: Reframing Cyberslacking With Bossware and Artificial Intelligence (pages 1-17)
Jo Ann Oravec (University of Wisconsin at Whitewater, USA)
Article 97
An Empirical Analysis of Trust, Perceived Benefit, and Purchase Intention in C2C Electronic Commerce in China (pages 1-16)
Zijian Zhao (The Catholic University of Korea, Republic of Korea; Lyceum of the Philippines University- Batangas, Philippines; Graduate School of Chinese Academy of Social Sciences, China; Akademia Jagiellońska, Poland; University of San Miguel, Mexico), Yantao Yang (Lyceum of the Philippines University- Batangas, Philippines & China University of Political Science and Law, China & Luoyang Normal University, China), Jin Liang (University of Zaragoza, Spain & Jilin University, China & Hunan University, China & Chinese Psychological Society, China & Chinese Association of Social Psychology, China), Javier Garcia-Campayo (University of Zaragoza, Spain & Hospital Universitario Miguel Servet, Spain), Zhongwei Wang (The University of Sheffield, UK & Coventry University, UK), Hector Monzales Perez (Republic of the Philippines Professional Regulation Commission, Philippines), Huaqiang Li (Fudan University, China), Luis Borao (University of Zaragoza, Spain)
Volume 34 (2022)
Issue 1
Article 2
The Impact of Virtual Integration on Innovation Speed: On the View of Organizational Information Processing Theory (pages 1-20)
Yan Tang (South China University of Technology, China), Ping Zhang (South China University of Technology, China)
Article 13
Supportive Leadership and Post-Adoption Use of MOOCs: The Mediating Role of Innovative Work Behavior (pages 1-23)
Fawad Ahmed (Xi'an Jiaotong-Liverpool University, China), Naveed Ahmad Faraz (Hunan University, China), Nisar Ahmad (University of Science and Technology of China, China), Muhammad Khalid Iqbal (University of Management and Technology, Sialkot, Pakistan)
Article 14
Smart Health: Intelligent Healthcare Systems in the Metaverse, Artificial Intelligence, and Data Science Era (pages 1-14)
Yin Yang (West China Hospital, Sichuan University, China), Keng Siau (City University of Hong Kong, China), Wen Xie (West China Hospital, Sichuan University, China), Yan Sun (Nanyang Technological University, Singapore)
Article 24
The Multimodal Sentiment Analysis of Online Product Marketing Information Using Text Mining and Big Data (pages 1-19)
Zhuo Fang (Changchun University of Finance and Economics, China), Yufeng Qian (Hubei University of Technology, China), Chang Su (University of Cambridge, UK), Yurong Miao (Beijing Jiaotong University, China), Yanmin Li (Ningbo University, China)
Article 25
Intelligent Information Network Security Management Strategy for Service Innovation of Manufacturing Enterprises Under Blockchain (pages 1-17)
Zhe Zhang (Shandong University of Finance and Economics, China), Chengcheng Li (Beijing Jiaotong University, China)
Article 55
Technology-Enabled Mobilization in the Emergence of a Value Co-Creating Ecosystem (pages 1-17)
Hsin-Hui Chou (National Cheng Kung University, Taiwan), Fu-Sheng Tsai (Center for Environmental Toxin and Emerging-Contaminant Research, Super Micro Mass Research and Technology Center, Cheng Shiu University (CSU), Taiwan)
Article 65
Social Commerce Intention, Social Interaction, and Social Support: Moderating Role of Social Anxiety (pages 1-23)
Chih-Lun Wu (National Taichung University of Science and Technology, Taiwan), Shwu-Min Horng (National Chengchi University, Taiwan)
Article 67
Consumer Engagement on Social Networking Sites: The Antecedents and Mediating Mechanism (pages 1-20)
Shizhen Bai (Harbin University of Commerce, China), Yue Yin (Harbin University of Commerce, China), Ye Wu (Shanghai Customs College, China), Justin Zuopeng Zhang (University of North Florida, USA), Yubing Yu (Zhejiang Wanli University, China), Sajjad M. Jasimuddin (Kedge Business School, France)
Article 68
An Empirical Study on Selection, Evaluation, and Management Strategies of Green Suppliers in Manufacturing Enterprises (pages 1-18)
Chia-Huei Wu (Minghsin University of Science and Technology, Taiwan)
Article 88
Medical Crowdfunding Campaign Sharing Behaviour on Mobile Social Media: The Social Influence Perspective (pages 1-35)
Jingyi Zhou (Hainan University, China), Yuexin Yao (Hainan University, China), Yiran Li (Zhejiang University of Technology, China and Macquarie University, Australia), Jiawen Wu (Hainan University, China), Qihua Liu (Hainan University, China)
Article 89
A Study of the Influence of Entrepreneurs' Geographic and Academic Relationships on Corporate Innovation (pages 1-20)
Fairtown Zhou Ayoungman (Zhengzhou University, China), Liyuan Pang (Zhengzhou University, China), Yingjing Chu (Zhengzhou University, China)
Article 94
A Hierarchical Clustering Federated Learning System Based on Industry 4.0 (pages 1-16)
Chun-Yi Jiunn-Yin Lu (National Penghu University of Science and Technology, Taiwan), Hsin-Te Wu (National Ilan University, Taiwan)
Issue 2
Article 1
Application of CSK Encryption Algorithm in Video Synergic Command Systems (pages 1-18)
Lele Qin (School of Economics and Management, Hebei University of Science and Technology, Shijiazhuang, China), Guojuan Zhang (Department of Industrial Basic Education, Hebei College of Industry and Technology, Shijiazhuang, China), Li You (Department of Economics and Trade, Hebei College of Industry and Technology, Shijiazhuang, China)
Article 23
Deconstructing Online Hospitality Review Systems: User Quality Experience Toward Design Features (pages 1-17)
Quan Xiao (Jiangxi University of Finance and Economics, China), Shun Li (Nanjing University of Science and Technology, China), Xing Zhang (Wuhan Textile University, China), Fuguo Zhang (Jiangxi University of Finance and Economics, China), Qi Yue (Jiangxi University of Finance and Economics, China), Shanshan Wan (Jiangxi University of Finance and Economics, China)
Article 59
A Comparative Study of Energy Big Data Analysis for Product Management in a Smart Factory (pages 1-17)
Rahman A. B. M. Salman (Sunchon National University, South Korea), Lee Myeongbae (Sunchon National University, South Korea), Lim Jonghyun (Sunchon National University, South Korea), Yongyun Cho (Sunchon National University, South Korea), Shin Changsun (Sunchon National University, South Korea)
Article 93
Text Similarity Measurement Method and Application of Online Medical Community Based on Density Peak Clustering (pages 1-25)
Mingyang Li (School of Management, Jilin University, China), Xinhua Bi (School of Management, Jilin University, China), Limin Wang (Information Science School, Guangdong University of Finance and Economics, China), Xuming Han (College of Information Science and Technology, Jinan University, China), Lin Wang (School of Management, Jilin University, China), Wei Zhou (School of Computer Science and Technology, Changchun University of Science and Technology, China)
Issue 3
Article 1
Measurement Method and Application of a Deep Learning Digital Economy Scale Based on a Big Data Cloud Platform (pages 1-17)
Yanmei Zhao (Northeast Normal University, Changchun, China & ChangChun Finance College, Changchun, China), Yixin Zhou (Shanghai Business School, Shanghai, China)
Article 1
Topic Modelling and Sentiment Analysis of Global Warming Tweets: Evidence From Big Data Analysis (pages 1-18)
Fang Qiao (Xi'an International Studies University, China), Jago Williams (Bangor University, UK)
Article 2
Global Multi-Source Information Fusion Management and Deep Learning Optimization for Tourism: Personalized Location-Based Service (pages 1-21)
Xue Yu (School of Economics and Management, China University of Mining and Technology & School of Art, Anhui University of Finance and Economics, China)
Article 5
The Study of Para-Social Interaction With E-Word-of-Mouth for Influencer Marketing by Complex Computing (pages 1-15)
Yu-Hsi Yuan (Chinese Culture University, Taiwan), Yi-Cheng Yeh (Jiangsu University of Technology, China), Chia-Huei Wu (Minghsin University of Science and Technology, Taiwan), Cheng-Yong Liu (Jimei University, China), Hsin-Hao Chen (Southern Taiwan University of Science and Technology, Taiwan), Chien-Wen Chen (Yuanpei University of Medical Technology, Taiwan)
Article 11
Implementation of Data Mining Technology in Bonded Warehouse Inbound and Outbound Goods Trade (pages 1-18)
Yanan Song (Macau University of Science and Technology, China), Xiaolong Hua (Inner Mongolia University of Finance and Economics, China)
Article 22
Application of Improved Convolution Neural Network in Financial Forecasting (pages 1-16)
Wensheng Dai (China Financial Policy Research Center, International Monetary Institute, Renmin University of China, China)
Article 23
Research on the Risk of Social Stability of Enterprise Credit Supervision Mechanism Based on Big Data (pages 1-16)
Tao Meng (International Business College, Dongbei University of Finance and Economics, China), Qi Li (School of Business Administration, Dongbei University of Finance and Economics, China), Zheng Dong (School of Business Administration, Dongbei University of Finance and Economics, China), Feifei Zhao (School of Business Administration, Dongbei University of Finance and Economics, China)
Article 25
Accounting Information Quality, Financing Constraints, and Company Innovation Investment Efficiency by Big Data Analysis (pages 1-21)
Zhen Lei (Hunan University & Hunan International Economic University, China), Guangming Gong (Hunan University, China), Taosheng Wang (Hunan International Economic University, China), Wanjin Li (Hunan University, China)
Article 61
Improved Artificial Bee Colony Algorithm for Multimodal Optimization Based on Crowding Method (pages 1-18)
Shijing Ma (Northeast Normal University, China), Yunhe Wang (Hebei University of Technology, China), Shouwei Zhang (Northeast Normal University, China)
Article 61
The Agglomeration Mechanism of Network Emerging E-Eommerce Industry Based on Social Science (pages 1-16)
Jiali Wang (Xi'an Jiaotong University, China & Xi'an Eurasia University, China), Yixin Dai (Nanjing University, China)
Article 62
Research on the Influence Maximization Problem in Social Networks Based on the Multi-Functional Complex Networks Model (pages 1-17)
Sheng Bin (Qingdao University, China), Gengxin Sun (Qingdao University, China)
Article 70
Machine Learning Algorithms for Big Data Applications With Policy Implementation (pages 1-13)
Jianzu Wu (School of Management, Lanzhou University, China), Kunxin Zhang (School of Management, Lanzhou University, China)
Article 71
Analysis of the Application of Information Technology in the Management of Rural Population Return Based on the Era of Big Data (pages 1-15)
Zheng Cai (School of Public Administration and Law, Northeast Agricultural University, Harbin, China)
Article 92
The Influence of E-Book Teaching on the Motivation and Effectiveness of Learning Law by Using Data Mining Analysis (pages 1-17)
Shouzheng Zhao (Shanghai International Studies University, China), Jielei Chen (Tongji University, China)
Issue 4
Special Issue of E-Health and M-Health Management
Guest Editorial Preface
Wen-Lung Shiau (School of Management, Zhejiang University of Technology, Zhejiang, China), Haijing Hao (Department of Computer Information Systems, Bentley University, USA), Joanna Paliszkiewicz (Management Institute, Warsaw University of Life Sciences, Poland), Yujing Xu (School of Management, Zhejiang University of Technology, China)
Article 10
Factors Affecting Customer Intention to Adopt a Mobile Chronic Disease Management Service: Differentiating Age Effect From Experiential Distance Perspective (pages 1-23)
Zhangxiang Zhu (Hunan Normal University, China), Yongmei Liu (Central South University, China), Xianye Cao (Hunan University of Technology and Business, China), Wei Dong (Central South University, China)
Article 24
A Two-Echelon Responsive Health Analytic Model for Triggering Care Plan Revision in Geriatric Care Management (pages 1-29)
Valerie Tang (The Hang Seng University of Hong Kong, Hong Kong), H. Y. Lam (The Hang Seng University of Hong Kong, Hong Kong), C. H. Wu (The Hang Seng University of Hong Kong, Hong Kong), G. T. S. Ho (The Hang Seng University of Hong Kong, Hong Kong)
Article 33
An Investigation of Patient Decisions to Use eHealth: A View of Multichannel Services (pages 1-24)
Suli Zheng (China Jiliang University, China), Po-Ya Chang (National Taipei University of Nursing and Health Sciences, Taiwan), Jiahe Chen (Western Sydney University, Australia), Yu-Wei Chang (National Taichung University of Science and Technology, Taiwan), Hueng-Chuen Fan (Tungs' Taichung Metroharbor Hospital, Taiwan & National Chung Hsing University, China & Jen-Teh Junior College of Medicine, Taiwan)
Article 34
Theory-Based Problem Formulation and Ideation in mHealth: Analysis and Recommendations (pages 1-21)
Coquessa Jones (Curtin University, Australia), John R. Venable (Curtin University, Australia)
Article 35
An Efficient Emergency Patient Monitoring Based on Mobile Ad Hoc Networks (pages 1-12)
Kahkashan Tabassum (Princess Nourah Bint Abdulrahman University, Saudi Arabia), Hadil Shaiba (Princess Nourah Bint Abdulrahman University, Saudi Arabia), Nada Ahmed Essa (Princess Nourah Bint Abdulrahman University, Saudi Arabia), Hafiza A. Elbadie (Princess Nourah Bint Abdulrahman University, Saudi Arabia)
Article 50
Chronic Patients' Emotions Toward Self-Managing Care IT: The Role of Health Centrality and Dependence on IT (pages 1-14)
Azadeh Savoli (IESEG School of Management, France), Mamta Bhatt (IESEG School of Management, France)
Article 51
An Action Design Research to Facilitate the Adoption of Personal Health Records: The Case of Digital Allergy Cards (pages 1-18)
Rhode Ghislaine Nguewo Ngassam (University of Montpellier, France), Linnea Ung (University of Montpellier, France), Roxana Ologeanu-Taddei (Toulouse Business School, France), Jorick Lartigau (Pikcio Services, France), Pascal Demoly (University Hospital of Montpellier, France), Isabelle Bourdon (University of Montpellier, France), nicolas Molinari (IDESP, France), Anca Mirela Chiriac (University Hospital of Montpellier, France)
Article 71
Predicting Patients' Satisfaction With Doctors in Online Medical Communities: An Approach Based on XGBoost Algorithm (pages 1-17)
Yunhong Xu (Kunming University of Science and Technology, China), Guangyu Wu (Kunming University of Science and Technology, China), Yu Chen (Kunming University of Science and Technology, China)
Article 71
A Study of Health Insurance Fraud in China and Recommendations for Fraud Detection and Prevention (pages 1-19)
Jie Li (Hebei University of Technology, China), Qiaoling Lan (Tianjin University, China), Enya Zhu (Brown University, USA), Yong Xu (Hebei University of Technology, China), Dan Zhu (Iowa State University, USA)
Article 72
Factors Influencing Donation Intention to Personal Medical Crowdfunding Projects Appearing on MSNS (pages 1-26)
Qihua Liu (Hainan University, China), Li Wang (Hainan University, China), Jingyi Zhou (Hainan University, China), Wei Wu (Huanghuai University, China & Hainan University, China), Yiran Li (Zhejiang University of Technology, China)
Article 73
Making Mobile Health Information Advice Persuasive: An Elaboration Likelihood Model Perspective (pages 1-22)
Jinjin Song (Harbin Institute of Technology, China), Yan Li (Harbin Institute of Technology, China), Xitong Guo (Harbin Institute of Technology, China), Kathy Ning Shen (United Arab Emirates University, UAE), Xiaofeng Ju (Harbin Institute of Technology, China)
Article 74
An Application of Deep Belief Networks in Early Warning for Cerebrovascular Disease Risk (pages 1-14)
Qiuli Qin (Beijing Jiaotong University, China), Xing Yang (China Unicom Research Institute, China), Runtong Zhang (Beijing Jiaotong University, China), Manlu Liu (Rochester Institute of Technology, USA), Yuhan Ma (Beijing Jiaotong University, China)
Issue 5
Issue 6
Article 18
Mediating Effects of Attitudes, Risk Perceptions, and Negative Emotions on Coping Behaviors: Evidence From a Survey of Older Chinese Adults (pages 1-22)
Wei Zhang (Central University of Finance and Economics, China), Luyao Li (Central University of Finance and Economics, China), Jian Mou (School of Business, Pusan National University, South Korea), Mei Zhang (Central University of Finance and Economics, China), Xusen Cheng (Renmin University of China, China), Hongwei Xia (Chinese Center for Disease Control and Prevention, China)
Article 19
How to Promote Public Engagement and Enhance Sentiment Through Government Social Media During the COVID-19 Crisis: A Public Value Management Perspective (pages 1-24)
Lianren Wu (Shanghai University of International Business and Economics, China), Jinjie Li (Shanghai Normal University, China), Jiayin Qi (Shanghai University of International Business and Economics, China), Nan Shi (Shanghai University of International Business and Economics, China), Hongmiao Zhu (Shanghai University of International Business and Economics, China)
Article 20
How COVID-19 Affects the Willingness of the Elderly to Continue to Use the Online Health Community: A Longitudinal Survey (pages 1-17)
Yiming Ma (Hefei University of Technology, China, & School of Health Management Anhui Medical University, China), Yadi Gu (Center for Mental Health Education, University of Shanghai for Science and Technology, China), Wenjia Hong (Hefei University of Technology, China), Zhao Shu Ping (Hefei University of Technology, China), Changyong Liang (Hefei University of Technology, China), Dongxiao Gu (Hefei University of Technology, China)
Article 26
The Restorative Effects of Virtual Reality Forests on Elderly Individuals During the COVID-19 Lockdown (pages 1-22)
Shaofeng Yuan (Liaoning University, China), Futai Tao (Wuhan University, China), Ying Li (Liaoning University, China)
Article 65
Understanding the E-Banking Channel Selection Behavior of Elderly Customers: A Small-World Network Perspective (pages 1-21)
Xiaolei Cui (Harbin Engineering University, China), Jianzhong Xu (Harbin Engineering University, China)
Article 66
Predicting User Satisfaction of Mobile Healthcare Services Using Machine Learning: Confronting the COVID-19 Pandemic (pages 1-17)
Haein Lee (Department of Applied Artificial Intelligence, Sungkyunkwan University, South Korea), Seon Hong Lee (Department of Applied Artificial Intelligence, Sungkyunkwan University, South Korea), Dongyan Nan (Department of Human-Artificial Intelligence Interaction, Sungkyunkwan University, South Korea), Jang Hyun Kim (Department of Human-Artificial Intelligence Interaction, Sungkyunkwan University, South Korea)
Issue 7
Special Issue on Technology Use and Acceptance Behavior of Enterprises and Individuals in the Context of Digital Transformation
Guest Editorial Preface
Wenqing Wu (Tianjin University, China), Yizhe Dong (University of Edinburgh, UK), Xinchun Wang (West Virginia University, USA), Charlotte Huang (University of Leeds, UK), Cheng-Yong Liu (Jimei University, China)
Article 16
Digital Technology Search and New Venture Performance in Dynamic Environments: The Mediating Role of Competitive Advantage (pages 1-22)
Hongxin Wang (Tianjin University, China), Chundong Zheng (Tianjin University, China), Jiayue Liu (Tianjin University, China), Xin Jiang (Tianjin University, China)
Article 17
Measuring Enterprise Mutual Information Based on the Helix Model (pages 1-17)
Wei Wang (Shanghai Academy of Development and Reform, School of Economics of Fudan University, China), Xucheng Huang (Shanghai Lixin University of Accounting and Finance, China), Shougui Luo (Shanghai Jiao Tong University, China)
Article 37
Digital Transformation: A Bibliometric Analysis (pages 1-20)
Lin Shi (Huaqiao University, China), Yingping Mai (Huaqiao University, China), Yenchun Jim Wu (National Taipei University of Education, Taiwan & Graduate Institute of Global Business and Strategy, National Taiwan Normal University, Taiwan)
Article 51
Individual Decision Model for Using Technology of Health Crowdsensing in the Digital Era (pages 1-21)
Li Li (School of Computer and Information Engineering, Henan University, China), Xuliang Cai (YiHe (Shenzhou) Center of Life and Health Sciences, China), Xin He (International Joint Laboratory of Intelligent Network Theory and Key Technology, School of Software, Henan University, China), Xi Yu (School of Computer and Information Engineering, Henan University, China), Haoran Li (School of Software, Henan University, China), Yanhong Liu (School of Software, Henan University, China)
Article 56
Does Digital Transformation Promote Enterprise Development?: Evidence From Chinese A-Share Listed Enterprises (pages 1-18)
Chao Liu (Beijing University of Technology, China), Wei Zhang (Beijing University of Technology, China), Xiangyu Zhu (Beijing University of Technology, China)
Article 80
Control Supply Chain Risks in Digital Transformation: A New Way to Improve Supply Chain Resilience (pages 1-18)
Yang Gao (Hainan University, China), Yubing Leng (Dalian University of Technology, China), Biaoan Shan (Jilin University, China)
Article 91
Maximum-Entropy-Based Decision-Making Trial and Evaluation Laboratory and Its Application in Emergency Management (pages 1-16)
Yuelin Che (University of Electronic Science and Technology of China, China), Yong Deng (University of Electronic Science and Technology of China, China), Yu-Hsi Yuan (Chinese Culture University, Taiwan)
Article 92
Continuance Intention of Online Healthcare Communities: The Mediation Mechanism of Social Interaction Ties (pages 1-25)
Jinxin Yang (Hefei University of Technology, China), Biao Luo (Hefei University of Technology, China*), Fu-Sheng Tsai (Cheng Shiu University, Taiwan*)
Issue 8
Article 15
Research on Decision-Making Based on the Three-Party Evolutionary Game of Tourists, Scenic Spots, and Government (pages 1-23)
Xincai Ye (Huaqiao University, China), Lin Miao (Liming Vocational University, China)
Article 20
An Empirical Study on the Influence of Mobile Games and Mobile Devices for Contemporary Students' Education and Learning Behavior (pages 1-25)
Yujia Lin (Sichuan International Studies University, China), Yuzhi Liu (Sichuan International Studies University, China)
Article 23
Advanced Artificial Intelligence Model for Financial Accounting Transformation Based on Enterprise Unstructured Text Data (pages 1-15)
Lin Wei (Dongbei University of Finance and Economics, China), Hanyue Yu (Dongbei University of Finance and Economics, China), Bin Li (Dongbei University of Finance and Economics, China)
Article 38
Does the Agenda-Setting Effect Always Work?: The Moderating Role of Institution Informatization (pages 1-14)
Yingbo Xu (Qingdao University, China), Wei Liu (Qingdao University, China), Jinfeng Zhou (China Biodiversity Conservation and Green Development Foundation, China), Linda Wong (China Biodiversity Conservation and Green Development Foundation, China), Xiao-Guang Yue (China Biodiversity Conservation and Green Development Foundation, China)
Article 45
Digital Technology Adoption and Sustainable Development Performance of Strategic Emerging Industries: The Mediating Role of Digital Technology Capability and the Moderating Role of Digital Strategy (pages 1-18)
Xing Li (Jiangsu Normal University, China), Ting Wu (Anyang University, China), Hongjuan Zhang (Wuhan University of Science and Technology, China), Deyan Yang (Jiangsu Normal University, China)
Article 48
The Transfer Strategy of Digital Information Technology for Heterogeneous Manufacturers (pages 1-22)
Xianglong Li (Qingdao University, China), Qingjin Wang (Qingdao University, China), Shuai Huang (Qingdao University, China), Renbo Shi (Qingdao University, China), Changlin Han (Qingdao University, China), Yang Gao (Qingdao University, China)
Article 51
Big Data in Entrepreneurship (pages 1-19)
Biaoan Shan (Jilin University, China), Xiaoju Liu (Jilin University, China), Yang Gao (Hainan University, China), Xifeng Lu (Jilin University of Finance and Economics, China)
Article 61
Sustainable Reuse Strategies of Enterprise Financial Management Model Following Deep Learning Under Big Data (pages 1-18)
Na Ta (Peking University, China), Bo Gao (Communication University of China, China)
Article 62
The Analysis of Global RMB Exchange Rate Forecasting and Risk Early Warning Using ARIMA and CNN Model (pages 1-25)
Feng Liang (Institute of Chinese Financial Studies, Southwestern University of Finance and Economics, China), Feng Liang (Southwestern University of Finance and Economics, China), Hongxia Zhang (School of Business, University of International Business and Economy, China), Hongxia Zhang (University of International Business and Economy, China), Yuantao Fang (Department of Finance, Shanghai Lixin University of Accounting and Finance, China), Yuantao Fang (Shanghai Lixin University of Accounting and Finance, China)
Article 63
An Empirical Study on Impact of Management Capabilities for the Multinational Company's Sustainable Competitive Advantage (pages 1-23)
Ke Zong (Taishan University, China), Zheng Wang* (Xuzhou University of Technology, China)
Article 64
Do Listed Companies' Technological Innovations Make Institutional Investors' “Group Holdings” More Favorable?: Based on Network-Clustering (pages 1-27)
Jia Liu (Shandong University of Finance and Economics, China), Qingru Li (Chinese Academy of Social Sciences, China), Chunyan Lin (Shandong University of Finance and Economics, China)
Article 70
The Impact of SIPOC on Process Reengineering and Sustainability of Enterprise Procurement Management in E-Commerce Environments Using Deep Learning (pages 1-17)
Hui Zhang (Pai Chai University, Daejeon, South Korea), Lijun Fan (School of Business Administration, Hunan University of Technology and Business, Changsha, China), Min Chen (School of Business, Wenzhou University, Wenzhou, China), Chen Qiu (School of Economics and Management, Wuhan University, Wuhan, China)
Article 86
Multimodal Sentiment Analysis of Online Product Information Based on Text Mining Under the Influence of Social Media (pages 1-18)
Xiao Zeng (Huazhong University of Science and Technology, China), Ziqi Zhong (The London School of Economics and Political Science, UK)
Article 87
Do Institutional Group Holding Anomalies Drive Broad Market Trends?: Based on Shannon Entropy in Network Systems (pages 1-31)
Jia Liu (Shandong University of Finance and Economics, China), Wenqiang Li (Shandong University of Finance and Economics, China), Qingru Li (Chinese Academy of Social Sciences, China)
Article 93
Analysis of the Critical Role of a Smart Agricultural Internet of Things System in Industrial Benefit Evaluation (pages 1-14)
Jinshun Wu (College of Economics and Management, East China Jiaotong University, Nanchang, China)
Issue 9
Article 77
Constructing Technology Commercialization Capability: The Critical Role of User Engagement and Big Data Analytics Capability (pages 1-21)
Li Cai (Jilin University, China), Shan Lu (Jilin University, China), Biao Chen (Zhengzhou University, China)
Issue 10
Article 35
An Evaluation System Based on User Big Data Management and Artificial Intelligence for Automatic Vehicles (pages 1-21)
Pei Shanshan (Macau University of Science and Technology, China), Ma Chao (Macau University of Science and Technology, China), Zhu Haitao (Beijing Smarter Eye Technology Co., Ltd., China), Luo Kun (Hisilicon (Shanghai) Technologies Co., Ltd., China)
Article 52
An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model (pages 1-17)
Yun Luo (State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, China), Yuling Chen (State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, China), Tao Li (State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, China), Yilei Wang (School of Computer Science, Qufu Normal University, Rizhao, China), Yixian Yang (School of Cyberspace Security, Beijing University of Posts and Telecommnuications, Beijing, China), Xiaomei Yu (School of Information Science and Engineering, Shandong Normal University, Jinan, China)
Article 66
Research and Analysis of Influence Maximization Techniques in Online Network Communities Based on Social Big Data (pages 1-23)
Jun Hou (Nanjing Vocational University of Industry Technology, China), Shiyu Chen (Nanjing University of Science and Technology, China), Huaqiu Long (Wuyi University, China), Qianmu Li (Nanjing University of Science and Technology, China)
Volume 33 (2021)
Issue 1
Organization and User Computing and Risk Control Under Social Network
Editorial Preface
Sang-Bing Tsai (Regional Green Economy Development Research Center, School of Business, Wuyi University, China)
Article 2
Taxonomy on EEG Artifacts Removal Methods, Issues, and Healthcare Applications (pages 19-46)
Vandana Roy (Hitkarini College of Engineering and Technology, India), Prashant Kumar Shukla (Jagran Lakecity University, India), Amit Kumar Gupta (KIET Group of Institutions, India), Vikas Goel (KIET Group of Institutions, India), Piyush Kumar Shukla (University Institute of Technology RGPV, India), Shailja Shukla (Jabalpur Engineering College, India)
Article 3
A Bio-Inspired Defensive Rumor Confinement Strategy in Online Social Networks (pages 47-70)
Santhoshkumar Srinivasan (Vellore Institute of Technology, Vellore, India), Dhinesh Babu L. D. (Vellore Institute of Technology, Vellore, India)
Article 4
What Attracts Followers?: Exploring Factors Contributing to Brand Twitter Follower Counts (pages 71-91)
Yu-Qian Zhu (Department of Information Management, National Taiwan University of Science and Technology, Taiwan), Bo Hsiao (Department of Information Management, Chang Jung Christian University, Taiwan)
Article 5
Double-Layer Learning, Leaders' Forgetting, and Knowledge Performance in Online Work Community Organizations (pages 92-117)
Wenqing Wu (College of Management and Economics, Tianjin University, China), Saixiang Ma (College of Management and Economics, Tianjin University, China), Yuzheng Su (College of Management and Economics, Tianjin University, China), Chia-Huei Wu (Institute of Service Industries and Management, Minghsin University of Science Technology, Taiwan)
Issue 2
Mobile Terminal Technology and User Behavior
Editorial Preface
Sang-Bing Tsai (Regional Green Economy Development Research Center, School of Business, Wuyi University, China)
Article 1
A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server (pages 1-16)
Brij B. Gupta (National Institute of Technology, Kurukshetra, India & Asia University, Taiwan & Macquarie University, Australia), Shaifali Narayan (National Institute of Technology, Kurukshetra, India)
Article 2
Placement for Intercommunicating Virtual Machines in Autoscaling Cloud Infrastructure: Autoscaling and Intercommunication Aware Task Placement (pages 17-35)
Sridharan R. (National Institute of Technology, Tiruchirappalli, India), Domnic S. (National Institute of Technology, Tiruchirappalli, India)
Article 3
The Role of User Resistance and Social Influences on the Adoption of Smartphone: Moderating Effect of Age (pages 36-58)
Jaeheung Yoo (Software Policy and Research Institute, South Korea), Saesol Choi (Electronics and Telecommunications Research Institute, South Korea), Yujong Hwang (DePaul University, USA & Kyung Hee University, South Korea), Mun Y. Yi (Korea Advanced Institute of Science and Technology, South Korea)
Article 4
The Effect of Use, Overuse, and Appeal of Mobile Game App on Add-Ons Purchases and Players Recruitment (pages 59-84)
Carmen Camarero (University of Valladolid, Spain), Rebeca San José (University of Valladolid, Spain), Nadia Jiménez (University of Burgos, Spain), Sonia San-Martín (University of Burgos, Spain)
Article 5
Seeing is Believing: The Effects of Images on Trust and Purchase Intent in eWOM for Hedonic and Utilitarian Products (pages 85-104)
Robert Zinko (Texas A&M University – Central Texas, USA), Helene de Burgh-Woodman (Institut Mines Telecom Business School, France), Zhan Zhang Furner (East Carolina University, USA), Soo Jung Kim (Texas A&M University – Central Texas, USA)
Issue 3
Special Issue on User-Centric Service Recommendation in Internet of Things
Guest Editorial Preface
Lianyong Qi (Qufu Normal University, Jining, China), Xuyun Zhang (The University of Auckland, Auckland, New Zealand)
Article 1
A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications (pages 1-18)
Mengxia Shuai (University of Science and Technology of China, Anhui, China), Nenghai Yu (University of Science and Technology of China, Anhui, China), Hongxia Wang (Southwest Jiaotong University, Chengdu, China), Ling Xiong (Xihua University, Chengdu, China), Yue Li (Southwest Jiaotong University, Chengdu, China)
Article 2
Time-Aware CF and Temporal Association Rule-Based Personalized Hybrid Recommender System (pages 19-34)
Dan Yang (University of Science and Technology LiaoNing, Anshan, China), Zheng Tie Nie (Northeastern University, Shenyang, China), Fajun Yang (Nanyang Technological University, Jurong West, Singapore)
Article 3
Towards Smart Transportation System: A Case Study on the Rebalancing Problem of Bike Sharing System Based on Reinforcement Learning (pages 35-49)
Guofu Li (Ping An Asset Management, Shanghai, China), Ning Cao (University College Dublin, Dublin, Ireland), Pengjia Zhu (State Street Corp., Zhejiang, China), Yanwu Zhang (Qingdao Binhai University, Qingdao, China), Yingying Zhang (University of Shanghai for Science and Technology, Shanghai, China), Lei Li (Qingdao Binhai University, Qingdao, China), Qingyuan Li (Qingdao Binhai University, Qingdao, China), Yu Zhang (Qingdao Binhai University, Qingdao, China)
Article 4
A Top-K QoS-Optimal Service Composition Approach Based on Service Dependency Graph (pages 50-68)
Baili Zhang (School of Computer Science and Engineering, Southeast University, Jiangsu, China), Kejie Wen (Research Center for Judicial Big Data, Supreme Court of China, Jiangsu, China), Jianhua Lu (Key Laboratory of Computer Network and Information Integration, Ministry of Education, Jiangsu, China), Mingjun Zhong (University of Lincoln, Lincolnshire, UK)
Article 5
Impact of Mobile Ad Wearout on Consumer Irritation, Perceived Intrusiveness, Engagement, and Loyalty: A PLS-SEM Analysis (pages 69-84)
Ahmad A.M. Alwreikat (Cyprus International University, Nicosia, Cyprus), Husam Rjoub (Cyprus International University, Nicosia, Cyprus)
Issue 4
User-Oriented Organizational Collaboration, Analyses, and Optimization
Editorial Preface
Sang-Bing Tsai (Regional Green Economy Development Research Center, School of Business, Wuyi University, China)
Article 1
The Moderating Effects of Leader-Member Exchange for Technology Acceptance: An Empirical Study Within Organizations (pages 1-27)
Yujong Hwang (DePaul University, USA & Kyung Hee University, South Korea), Soyean Kim (Kyung Hee University, South Korea), Kamel Rouibah (College of Business Administration, Kuwait University, Kuwait), Donghee Shin (Zayed University, UAE)
Article 2
The Effects of Openness on Managerial Innovation in Cameroonian Companies (pages 28-43)
Joel Stephan Tagne (University of Ngaoundere, Cameroon), Paul Ningaye (University of Dschang, Cameroon), Georges Kobou (University of Yaounde II, Cameroon)
Article 3
Security Threat Modelling With Bayesian Networks and Sensitivity Analysis for IAAS Virtualization Stack (pages 44-69)
Asvija B. (Centre for Development of Advanced Computing (C-DAC), India), Eswari R. (National Institute of Technology, Tiruchirappalli, India), Bijoy M. B. (Centre for Development of Advanced Computing (C-DAC), India)
Article 4
Buying Through Social Platforms: Perceived Risks and Trust (pages 70-93)
Francisco J. Martínez-López (University of Granada, Granada, Spain & EAE Business School, Barcelona, Spain), Yangchun Li (University of Granada, Spain), Changyuan Feng (University of Granada, Spain), David López-López (ESADE Business School, Spain)
Article 5
Exploring the Factors Influencing the Use of Communication and Collaboration Applications (pages 94-124)
Catalin Maican (Transilvania University of Brasov, Romania), Ana-Maria Cazan (Transilvania University of Brasov, Romania), Radu Lixandroiu (Transilvania University of Brasov, Romania), Lavinia Dovleac (Transilvania University of Brasov, Romania), Maria Anca Maican (Transilvania University of Brasov, Romania)
Article 6
Assessing Public Opinions of Products Through Sentiment Analysis: Product Satisfaction Assessment by Sentiment Analysis (pages 125-141)
C. Y. Ng (Lee Shau Kee School of Business and Administration, The Open University of Hong Kong, Hong Kong), Kris M. Y. Law (School of Engineering, Deakin University, Australia), Andrew W. H. Ip (Department of Mechanical Engineering, University of Saskatchewan, Canada)
Article 7
Modeling and Solution Algorithm for Optimization Integration of Express Terminal Nodes With a Joint Distribution Mode (pages 142-166)
Fanchao Meng (School of Computer Science and Technology, Harbin Institute of Technology at Weihai, China), Qingran Ji (School of Computer Science and Technology, Harbin Institute of Technology at Weihai, China), Hongzhen Zheng (School of Computer Science and Technology, Harbin Institute of Technology at Weihai, China), Huihui Wang (School of Computer Science and Technology, Harbin Institute of Technology at Weihai, China), Dianhui Chu (School of Computer Science and Technology, Harbin Institute of Technology at Weihai, China)
Article 8
Review of Consumer-to-Consumer E-Commerce Research Collaboration (pages 167-184)
Chih-Hung Yuan (School of Economics and Commerce, University of Electronic Science and Technology of China, Zhongshan Institute, China), Chia-Huei Wu (Institute of Service Industries and Management, Minghsin University of Science and Technology, Taiwan), Dajiang Wang (College of Entrepreneurship, Wenzhou University Oujiang College, China), Shiyun Yao (School of Economics and Commerce, University of Electronic Science and Technology of China, Zhongshan Institute, China), Yingying Feng (School of Economics and Commerce, University of Electronic Science and Technology of China, Zhongshan Institute, China)
Article 9
Factors Influencing Security Incidents on Personal Computing Devices (pages 185-208)
Barbara Hewitt (Texas State University, San Marcos, USA), Garry White (Texas State University, San Marcos, USA)
Article 10
Application of Artificial Intelligence in Precision Marketing (pages 209-219)
Xue Yang (North China University of Water Resources and Electric Power, China), Haowen Li (School of Management and Economics, North China University of Water Resources and Electric Power, China), Likun Ni (School of Management and Economics, North China University of Water Resources and Electric Power, China), Teng Li (School of Management engineering, Zhengzhou University, China)
Issue 5
When Business Decision-Making Meets Novel Computational Intelligence
Editorial Preface
Sang-Bing Tsai (Regional Green Economy Development Research Center, School of Business, Wuyi University, China)
Article 1
Emotions and Spillover Effects of Social Networks Affective Well Being (pages 1-24)
Eran Rubin (California State University Fresno, Craig School of Business, USA), Frederik Beuk (University of Akron, College of Business, USA)
Article 2
Evaluation of Tourism E-Commerce User Satisfaction (pages 25-41)
Guanghai Tang (Yangtze Normal University, Chongqing, China & Shaanxi Normal University, Xi‘an, China), Hui Zeng (Yangtze Normal University, Chongqing, China)
Article 4
Customer Involvement Facets Stimulating Customers' Intention to Use Internet-Only Bank Services in China: The Extension of Perceived Risk-Value Model (pages 74-97)
Mei-Lan Li (Sanming University, Sanming, China), Shu-Ping Lin (CTBC Business School, Tainan, Taiwan), Ya-Hui Chan (CTBC Business School, Tainan, Taiwan), Chia-Huei Wu (Minghsin University of Science Technology, Xinfeng, Taiwan)
Article 5
Research on Risk Analysis and Countermeasures of Micro Store Operation Model (pages 98-110)
Wei Li (Shandong University, China), Li Zhang (Beijing Jiaotong University, Beijing, China), Changgen Han (Beijing Jiaotong University, Beijing, China)
Article 6
Congestion Control for NDN-Based MANETs: Recent Advances, Enabling Technologies, and Open Challenges (pages 111-134)
Dimitris N. Kanellopoulos (University of Patras, Patras, Greece)
Article 7
Adaptive Fault Tolerant Resource Allocation Scheme for Cloud Computing Environments (pages 135-152)
Sathiyamoorthi V. (Sona College of Technology, Salem, India), Keerthika P. (Kongu Engineering College, Erode, India), Suresh P. (Kongu Engineering College, Erode, India), Zuopeng (Justin) Zhang (University of North Florida, USA), Adiraju Prasanth Rao (Anurag Group of Institutions, Majarguda, India), Logeswaran K. (Kongu Engineering College, Erode, India)
Article 8
Efficient VM Selection Strategies in Cloud Datacenter Using Fuzzy Soft Set (pages 153-179)
Nithiya Baskaran (National Institute of Technology, Tiruchirappalli, India), Eswari R. (National Institute of Technology, Tiruchirappalli, India)
Article 9
Understanding the Health Information Sharing Behavior of Social Media Users: An Empirical Study on WeChat (pages 180-203)
Ying Hong (Beijing Technology and Business University, Beijing, China), Meng Wan (Beijing Technology and Business University, Beijing, China), Zheng Li (China Tower Group, China)
Article 10
Deep Neural Network and Time Series Approach for Finance Systems: Predicting the Movement of the Indian Stock Market (pages 204-226)
Praveen Ranjan Srivastava (Indian Institute of Management, Rohtak, India), Zuopeng (Justin) Zhang (University of North Florida, USA), Prajwal Eachempati (Indian Institute of Management, Rohtak, India)
Issue 6
Article 1
Revisiting How Perceived Uncertainty and Herd Behavior Influence Technology Choice (pages 1-19)
Ali Vedadi (Middle Tennessee State University, USA), Timothy H. Greer (Middle Tennessee State University, USA)
Article 2
Mobile Payment and Mobile Application (App) Behavior for Online Recommendations (pages 1-26)
Shu-Hsien Liao (Tamkang University, New Taipei City, Republic of China), Chu-Hung Ho (Tamkang University, New Taipei City, Republic of China)
Article 3
Mining Express Service Innovation Opportunity From Online Reviews (pages 1-15)
Ning Zhang (Qingdao University, Qingdao, China), Rui Zhang (Qingdao University, Qingdao, China), Zhiliang Pang (Qingdao University, Qingdao, China), Xue Liu (Qingdao University, Qingdao, China), Wenfei Zhao (Qingdao University, Qingdao, China)
Article 4
Construction of a New Financial E-Commerce Model for Small and Medium-Sized Enterprise Financing Based on Multiple Linear Logistic Regression (pages 1-18)
Ping Wang (School of Economics and Management, Weifang University of Science and Technology, Shouguang, China), Wei Han (Henan Agricultural University, Zhengzhou, China & Southwest Jiaotong University, Chengdu, China)
Article 5
Research and Analysis of a Real Estate Virtual E-Commerce Model Based on Big Data Under the Background of COVID-19 (pages 1-16)
Delong Zhu (Anhui Institute of Information Technology, Wuhu, China)
Article 6
A Survey of Semantic Construction and Application of Satellite Remote Sensing Images and Data (pages 1-20)
Hui Lu (Nanjing University of Information Science and Technology, Nanjing, China), Qi Liu (Nanjing University of Information Science and Technology, Nanjing, China), Xiaodong Liu (Edinburgh Napier University, Edinburgh, UK), Yonghong Zhang (Nanjing University of Information Science and Technology, Nanjing, China)
Article 7
The Online Social Network and User Innovation in the Context of an Online Innovation Platform (pages 1-27)
Jiali Chen (School of Management Engineering, Shandong Jianzhu University, Jinan, China), Yikai Liang (School of Management Science and Engineering, Shandong University of Finance and Economics, Jinan, China), Jiacheng Zhang (School of Management, Shandong University, Jinan, China), Guijie Qi (School of Management, Shandong University, Jinan, China)
Article 8
Dynamic Measurement and Evaluation of Hotel Customer Satisfaction Through Sentiment Analysis on Online Reviews (pages 1-27)
Zhou Gang (Chongqing University, Chongqing, China & Chongqing Normal University, Chongqing, China), Liao Chenglin (Chongqing University, Chongqing, China)
Article 8
Autonomous Motivation and Self-Disclosure Intention: An ISS Perspective (pages 1-27)
Wei-Tsong Wang (National Cheng Kung University, Taiwan), Wei-Ming Ou (National Taitung Junior College, Taiwan), Wei-Chi Chiu (National Cheng Kung University, Taiwan)
Article 9
Autonomous Motivation and Information Security Policy Compliance: Role of Job Satisfaction, Responsibility, and Deterrence (pages 1-17)
Yuxiang Hong (Hangzhou Dianzi University, Hangzhou, China), Mengyi Xu (Anglia Ruskin University, Cambridge, UK)
Article 10
Trust in the Ride Hailing Service of the Sharing Economy: The Roles of Legitimacy and Process Transparency (pages 1-24)
Mohammad S. Najjar (The University of Memphis, USA), Laila Dahabiyeh (The University of Jordan, Amman, Jordan)
Article 10
Agility and Resilience in Information Systems Research: A Thematic Analysis (pages 1-17)
Lakshmi Goel (University of North Florida, USA), Rahul W. Kale (University of North Florida, USA), Justin Zuopeng Zhang (University of North Florida, USA), Deepak Arora (Crowley Maritime Corporation, USA)
Article 11
Robust Security With Strong Authentication in Mobile Cloud Computing Based on Trefoil Congruity Framework (pages 1-28)
Jerald Nirmal Kumar S. (St. Anne's College of Engineering and Technology, India), Ravimaran S. (MAM College of Engineering, Tiruchirappalli, India), Sathish A. (MAM College of Engineering, Tiruchirappalli, India)
Article 12
Novel Classification of IoT Devices Based on Traffic Flow Features (pages 1-20)
Ivan Cvitić (Faculty of Transport and Traffic Sciences, University of Zagreb, Croatia), Dragan Peraković (Faculty of Transport and Traffic Sciences, University of Zagreb, Croatia), Marko Periša (Faculty of Transport and Traffic Sciences, University of Zagreb, Croatia), Mirjana D. Stojanović (Faculty of Transport and Traffic Engineering, University of Belgrade, Serbia)
Article 13
An Enhanced Cascading Model for E-Commerce Consumer Credit Default Prediction (pages 1-18)
Jun Hou (School of Social Science, Nanjing Vocational University of Industry Technology, Nanjing, China), Qianmu Li (School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China), Yaozong Liu (Intelligent Manufacturing Department, Wuyi University, Wuyi, China), Sainan Zhang (School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China)
Article 14
Research on the Impact of the Coronavirus Disease 2019 (COVID-19) Pandemic on the Global Trade Economy Based on Big Data Analysis (pages 1-18)
Jianfei Li (School of Marxism, Xi'an Jiaotong University, Xi'an, China), Juxing Li (School of Journalism and New Media, Xi'an Jiaotong University, Xi'an, China), Jin Ji (School of Marxism, Xi'an Jiaotong University, Xi'an, China), Shengjun Meng (School of Journalism and New Media, Xi'an Jiaotong University, Xi'an, China)
Article 15
Research and Analysis of an Enterprise E-Commerce Marketing System Under the Big Data Environment (pages 1-19)
Linze Li (Management Engineering School, Capital University of Economics and Business, Beijing, China), Jun Zhang (Management Engineering School, Capital University of Economics and Business, Beijing, China)
Article 17
Do Social Networking Fan Page Posts Matter for Corporate Image?: Modified Elaboration Likelihood Model Perspective (pages 1-23)
Soo Il Shin (Kennesaw State University, USA), Dianne J. Hall (Auburn University, USA), Sumin Han (Auburn University, USA), David Paradice (Auburn University, USA), Teresa Lang (Auburn University at Montgomery, USA)
Article 18
Empirical Comparative Study of Wearable Service Trust Based on User Clustering (pages 1-16)
Zhongwei Gu (Shanghai Dianji University, China), Hongjun Xiong (Shanghai Dianji University, China), Wei Hu (Shanghai University of Electric Power, China)
Article 19
Understanding Customer Motivation to Share Information in Social Commerce (pages 1-26)
Yen-Hao Hsieh (National Formosa University, Taiwan), Ya-Ting Lo (Tamkang University, Taiwan)
Article 20
Decorative Art Pattern Mining and Discovery Based on Group User Intelligence (pages 1-12)
Kangning Shen (Taizhou College, Nanjing Normal University, China), Rongrong Tu (Nanjing Normal University, China), Rongju Yao (Weifang University of Science and Technology, China), Sifeng Wang (Qufu Normal University, China), Ashish K. Luhach (The PNG University of Technology, Papua New Guinea)
Article 24
Research on the Mediating Effect of Corporate Governance Behavior Between GEM and Governance Performance of Listed Companies on the Growth Enterprise (pages 1-20)
Wenming Sun (Anhui Open University, China), Leilei Jiang (Anhui Open University, China), Ke Dong (Anhui Open University, China)
Article 25
Using Computer Cognitive Atlas to Improve Students' Divergent Thinking Ability (pages 1-16)
Na Man (School of Information Engineering, Harbin University, China), Kechao Wang (School of Information Engineering, Harbin University, China), Lin Liu (School of Information Engineering, Harbin University, China)
Article 26
A Basic Framework for Privacy Protection in Personalized Information Retrieval: An Effective Framework for User Privacy Protection (pages 1-26)
Zongda Wu (Shaoxing University, China), Shigen Shen (Shaoxing University, China), Huxiong Li (Shaoxing University, China), Haiping Zhou (Shaoxing University, China), Chenglang Lu (Zhejiang Institute of Mechanical and Electrical Engineering, China)
Article 26
Impact of Self-Directed Learning and Educational Technology Readiness on Synchronous E-Learning (pages 1-20)
Ka Yin Chau (Faculty of Business, City Univeristy of Macau, Macao), Kris M. Y. Law (Deakin University, Australia), Yuk Ming Tang (Department of Industrial and Systems Engineering, The Hong Kong Polytechnic University, Hong Kong)
Article 27
Determinants of Individual Knowledge Innovation Behavior: A Perspective of Emotion, Knowledge Sharing, and Trust (pages 1-24)
Sihua Chen (Jiangxi University of Finance and Economics, China), Hua Xiao (Jiangxi University of Finance and Economics, China), Wei He (Jiangxi University of Finance and Economics, China), Jian Mou (Pusan National University, South Korea), Mikko Siponen (University of Jyvaskyla, Finland), Han Qiu (Jiangxi University of Finance and Economics, China), Feng Xu (Tianjin University, China)
Article 28
Self-Organized Network Management and Computing of Intelligent Solutions to Information Security (pages 1-16)
Xiaomeng Zhu (School of Public Administration, China Hohai University, China)
Article 29
Information Usefulness and Attitude Formation a Double-Dependent Variable Model (DDV) to Examine the Impacts of Online Reviews on Consumers (pages 1-22)
Jinting Lu (School of Journalism and Communication, Xiamen University, Xiamen, China), Haiqing Bai (School of Journalism and Communication, Xiamen University, Xiamen, China)
Article 49
An End-to-End Bidirectional Authentication System for Pallet Pooling Management Through Blockchain Internet of Things (BIoT) (pages 1-25)
Wen Long (Hunan Modern Logistics College, China), C. H. Wu (The Hang Seng University of Hong Kong, Hong Kong), Y. P. Tsang (The Hong Kong Polytechnic University, Hong Kong), Qiyang Chen (Montclair State University, USA)
Article 65
Multi-Dimensional Sport Physique Evaluation and Ranking for Healthcare Based on TOPSIS (pages 1-9)
Changqing Zhuo (The Engineering & Technical College of Chengdu University of Technology, China), Qiyun Zhang (Shandong Provincial University Laboratory for Protected Horticulture, Weifang University of Science and Technology, Shouguang, China), Qin Xie (Sichuan Staff University of Science and Technology, China), Yinping Lin (No. 1 Middle School of Pidu Chengdu, China), Chengxin Xu (School of Computer Science, Qufu Normal University, China), Lina Wang (School of Computer Science, Qufu Normal University, China), Sifeng Wang (School of Computer Science, Qufu Normal University, China)
Article 66
Comprehension, Perception, and Projection: The Role of Situation Awareness in User Decision Autonomy When Providing eConsent (pages 1-31)
Wendy Rowan (University College Cork, Ireland), Yvonne O'Connor (University College Cork, Ireland), Laura Lynch (University College Cork, Ireland), Ciara Heavin (University College Cork, Ireland)
Article 67
An Empirical Analysis of Psychological Factors Based on EEG Characteristics of Online Shopping Addiction in E-Commerce (pages 1-17)
Jinke Yang (Intellectual Property Institute, Henan University, China)
Article 69
Quality Improvement Incentive Strategy in Agricultural Products Supply Chain Under Social Preference (pages 1-26)
Yanhong Qin (Chongqing University of Technology, China), Kai Jing Guo (Chongqing University of Technology, China)
Article 73
Analyzing the Omni-Channel Shopper Journey Configuration of Generations Y and Z (pages 1-18)
Wei-Lun Chang (National Taipei University of Technology, Taiwan), Li-Ming Chen (National Chengchi University, Taiwan)
Article 79
Does Cloud Computing Influence Enterprise Performance? (pages 1-15)
I-Cheng Chang (National Dong Hwa University, Taiwan), Chuang-Chun Liu (National Chung Cheng University, Taiwan), Tsai-Ling Wu (National Dong Hwa University, Taiwan)
Article 80
A BERT-Based Hybrid Short Text Classification Model Incorporating CNN and Attention-Based BiGRU (pages 1-21)
Tong Bao (Information Center, Jiangsu Academy of Agricultural Sciences & Institute of Science and Technology Information, Jiangsu University, China), Ni Ren (Information Center, Jiangsu Academy of Agricultural Sciences & Institute of Science and Technology Information, Jiangsu University, China), Rui Luo (Information Center, Jiangsu Academy of Agricultural Sciences, China), Baojia Wang (Information Center, Jiangsu Academy of Agricultural Sciences, China), Gengyu Shen (Information Center, Jiangsu Academy of Agricultural Sciences, China), Ting Guo (Information Center, Jiangsu Academy of Agricultural Sciences, China)
Article 89
Mining Potential Requirements by Calculation of User Operations (pages 1-14)
Yanqun Huang (Tianjin University, China), Gaofeng Pan (Tianjin Tianduan Press Co. Ltd., China), Xu Li (Tianjin Polytechnic University, China), Zhe Sun (Tianjin University, China), Shinichi Koyama (University of Tsukuba, Japan), Yanqun Yang (Fuzhou University, China)
Volume 32 (2020)
Issue 1
Article 1
The Effect of Information Quality on Social Networking Site (SNS)-Based Commerce: From the Perspective of Malaysian SNS Users (pages 1-18)
Jongchang Ahn (Hanyang University, Seoul, South Korea), Suaini Sura (Universiti Malaysia Sabah, Kota Kinabalu, Malaysia)
Article 2
User's Segmentation on Continued Knowledge Management System Use in the Public Sector (pages 19-40)
Chi-Cheng Huang (Aletheia University, Taipei, Taiwan)
Article 3
E-Revenue Adoption in State Internal Revenue Service: Interrogating the Institutional Factors (pages 41-61)
Aderonke A. Oni (Covenant University, Ota, Nigeria), Ugbedeojo Musa (Federal Polytechnic Idah, Idah, Nigeria), Samuel Oni (Covenant University, Ota, Nigeria)
Article 4
The Effect of Customer Value on User Satisfaction With Dialogue Characteristics of Apple's Intelligent Agent Siri (pages 62-74)
Hye Rin Shim (Yonsei University, Seoul, South Korea), Byoung Gwan Kim (Yonsei University, Seoul, South Korea)
Article 5
The Nature and Role of User Beliefs Regarding a Website's Design Quality (pages 75-96)
Camille Grange (HEC Montreal, Montreal, Canada), Henri Barki (HEC Montreal, Montreal, Canada)
Issue 2
RENEWED CALL FOR A SINGLE CITATION STYLE
Editorial Preface
Steven Walczak (School of Information & Florida Center for Cybersecurity, University of South Florida, Tampa, USA)
Article 1
Technology Addictions and Technostress: An Examination of the U.S. and China (pages 1-19)
Stoney Brooks (Middle Tennessee State University, Murfreesboro, USA), Xuequn Wang (Murdoch University, Perth, Australia), Christoph Schneider (City University of Hong Kong, Kowloon Tong, Hong Kong)
Article 2
A Contingent Approach to Facilitating Conflict Resolution in Software Development Outsourcing Projects (pages 20-41)
Donghwan Cho (Gyeongnam National University of Science and Technology, Gyeongnam, South Korea)
Article 3
Unsupervised Model for Detecting Plagiarism in Internet-based Handwritten Arabic Documents (pages 42-66)
Mahmoud Zaher (Faculty of Computers and Information, Mansoura University, Mansoura, Egypt), Abdulaziz Shehab (Faculty of Computers and Information, Mansoura University, Mansoura, Egypt), Mohamed Elhoseny (Faculty of Computers and Information, Mansoura University, Mansoura, Egypt), Farahat Farag Farahat (Sadat Academy, Cairo, Egypt)
Article 4
A Machine Learning Method with Threshold Based Parallel Feature Fusion and Feature Selection for Automated Gait Recognition (pages 67-92)
Muhammad Sharif (Department of CS, COMSATS University Islamabad, Wah Campus, Wah Cantt, Pakistan), Muhammad Attique (Department of Computer Science, HITEC University, Museum Road Taxila, Pakistan), Muhammad Zeeshan Tahir (Department of CS, COMSATS University Islamabad, Wah Campus, Wah Cantt, Pakistan), Mussarat Yasmim (Department of CS, COMSATS University Islamabad, Wah Campus, Wah Cantt, Pakistan), Tanzila Saba (Artificial Intelligence & Data Analytics (AIDA) Lab, CCIS Prince Sultan University, Riyadh, Saudi Arabia), Urcun John Tanik (Texas A&M University-Commerce, Commerce, USA)
Article 5
Medication Use and the Risk of Newly Diagnosed Diabetes in Patients with Epilepsy: A Data Mining Application on a Healthcare Database (pages 93-108)
Sheng-Feng Sung (Ditmanson Medical Foundation Chiayi Christian Hospital, Chiayi, Taiwan & National Chung Cheng University, Minxiong, Taiwan), Pei-Ju Lee (National Chung Cheng University, Minxiong, Taiwan), Cheng-Yang Hsieh (Tainan Sin Lau Hospital and National Cheng Kung University Hospital and College of Medicine, Tainan, Taiwan), Wan-Lun Zheng (National Chung Cheng University, Minxiong, Taiwan)
Issue 3
Special Issue on Security and Privacy in Cloud Computing
Editorial Preface
Sang-Bing Tsai (Regional Green Economy Development Research Center, School of Business, Wuyi University, China & Research Center for Environment and Sustainable Development of the China Civil Aviation, China)
Article 1
A Novel Trust Model for Secure Group Communication in Distributed Computing (pages 1-14)
Naresh Ramu (SRM Institute of Science and Technology, India), Vijayakumar Pandi (University College of Engineering, Tindivanam, India), Jegatha Deborah Lazarus (University College of Engineering, Tindivanam, India), Sivakumar Radhakrishnan (University College of Engineering, Tindivanam, India)
Article 2
Security-Aware Autonomic Allocation of Cloud Resources: A Model, Research Trends, and Future Directions (pages 15-22)
Sukhpal Singh Gill (Queen Mary University of London, UK), Arash Shaghaghi (Deakin University, Australia)
Article 3
An Efficient Cloud Data Center Allocation to the Source of Requests (pages 23-36)
Kanniga Devi R. (Kalasalingam University, India), Murugaboopathi Gurusamy (Kalasalingam University, India), Vijayakumar P. (University College of Engineering, Tindivanam, India)
Article 4
A Risk Analysis Framework for Social Engineering Attack Based on User Profiling (pages 37-49)
Ziwei Ye (State Key Laboratory of Mathematical Engineering and Advanced Computing, China), Yuanbo Guo (State Key Laboratory of Mathematical Engineering and Advanced Computing, China), Ankang Ju (State Key Laboratory of Mathematical Engineering and Advanced Computing, China), Fushan Wei (State Key Laboratory of Mathematical Engineering and Advanced Computing, China), Ruijie Zhang (State Key Laboratory of Mathematical Engineering and Advanced Computing, China), Jun Ma (State Key Laboratory of Mathematical Engineering and Advanced Computing, China)
Article 5
Android Botnets: A Proof-of-Concept Using Hybrid Analysis Approach (pages 50-67)
Ahmad Karim (Bahauddin Zakariya University, Pakistan), Victor Chang (Aston University, UK), Ahmad Firdaus (Faculty of Computer Systems and Software Engineering, Malaysia)
Issue 4
Make a Good Decision with the Right Method
Editorial Preface
Sang-Bing Tsai (School of Business, Wuyi University, China, & Research Center for Environment and Sustainable Development of the China Civil Aviation, Civil Aviation University of China, China)
Article 1
How Does Social Identification Moderate the Repurchase Intention?: From the Perspect of OGB (pages 1-25)
Shwu-Min Horng (National Chengchi University, Taiwan)
Article 2
Assessing the Role of Simplicity in the Continuous Use of Mobile Apps (pages 26-42)
Silas Formunyuy Verkijika (University of the Free State, South Africa)
Article 3
A Predictive Analytics Approach to Building a Decision Support System for Improving Graduation Rates at a Four-Year College (pages 43-62)
Xuan Wang (University of Texas Rio Grande Valley, USA), Helmut Schneider (Louisiana State University, USA), Kenneth R. Walsh (The University of New Orleans, USA)
Article 4
Screening Job Candidates With Social Media: A Manipulation of Disclosure Requests (pages 63-84)
John R. Drake (East Carolina University, USA), Christopher P. Furner (East Carolina University, USA)
Article 5
Designing a XSS Defensive Framework for Web Servers Deployed in the Existing Smart City Infrastructure (pages 85-111)
Brij B. Gupta (National Institute of Technology, Kurukshetra, India & Asia University, Taiwan & Macquarie University, Australia), Pooja Chaudhary (National Institute of Technology, Kurukshetra, India), Shashank Gupta (Birla Institute of Technology and Science, Pilani, India)
Article 6
Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud (pages 112-137)
Mamta (National Institute of Technology, Kurukshetra, India), Brij B. Gupta (National Institute of Technology, Kurukshetra, India & Asia University, Taiwan & Macquarie University, Australia)
Article 7
Business Analytics/Business Intelligence and IT Infrastructure: Impact on Organizational Agility (pages 138-161)
Xiaofeng Chen (Western Washington University, USA), Keng Siau (City University of Hong Kong, Hong Kong SAR)
Article 8
Lucky Reply Effect: How a Company's Online Replies to Consumers' Online Comments Affect Consumers' Predictions of Randomly Determined Associated Rewards (pages 162-174)
Ming Chen (Nanjing University of Finance and Economics, China), Yidan Huang (Huaqiao University, China), Shih-Heng Yu (National United University, Taiwan), Chia-Huei Wu (Minghsin University of Science Technology, Taiwan)
Volume 31 (2019)
Issue 1
Article 1
Protective Measures and Security Policy Non-Compliance Intention: IT Vision Conflict as a Moderator (pages 1-21)
Kuo-Chung Chang (Yuan Ze University, Taoyuan, Taiwan), Yoke May Seow (Yuan Ze University, Taoyuan, Taiwan)
Article 2
An Empirical Study of Gamification Frameworks (pages 22-38)
Patrick Buckley (University of Limerick, Limerick, Ireland), Seamus Noonan (University of Limerick, Limerick, Ireland), Conor Geary (University of Limerick, Limerick, Ireland), Thomas Mackessy (University of Limerick, Limerick, Ireland), Eoghan Nagle (University of Limerick, Limerick, Ireland)
Article 3
How to Engineer Gamification: The Consensus, the Best Practice and the Grey Areas (pages 39-60)
Alimohammad Shahri (Bournemouth University, Poole, UK), Mahmood Hosseini (Bournemouth University, Poole, UK), Keith Phalp (Bournemouth University, Poole, UK), Jacqui Taylor (Bournemouth University, Poole, UK), Raian Ali (Bournemouth University, Poole, UK)
Article 4
IT Application Maturity, Management Institutional Capability and Process Management Capability (pages 61-85)
Jianping Peng (Sun Yat-sen Business School, Sun Yat-sen University, Guangzhou, China), Jing Quan (Salisbury University, Salisbury, USA), Le Peng (Krannert School of Management, Purdue University, West Lafayette, USA)
Article 5
Exploring Signaling Roles of Service Providers' Reputation and Competence in Influencing Perceptions of Service Quality and Outsourcing Intentions (pages 86-109)
Chung-Lun Wei (National Chung Hsing University, Taichung City, Taiwan), Chien-Ta Ho (National Chung Hsing University, Taichung City, Taiwan)
Issue 2
Article 1
Dynamic Capability and Organizational Performance: Is Social Networking Site a Missing Link? (pages 1-21)
Ly Minh Thi Pham (Faculty of Business Administration, Ton Duc Thang University, Ho Chi Minh City, Vietnam), Lobel Trong Thuy Tran (Faculty of Business Administration, Ton Duc Thang University, Ho Chi Minh City, Vietnam), Phanee Thipwong (Department of Business Administration, Asia University, Taichung, Taiwan), Wan Tran Huang (Department of Business Administration, Asia University, Taichung, Taiwan)
Article 2
Pragmatic Sensory Data Semantics With Service-Oriented Computing (pages 22-36)
Robin Singh Bhadoria (Indian Institute of Technology Indore, Gwalior, India), Narendra S. Chaudhari (Visvesvaraya National Institute of Technology, Nagpur, India)
Article 3
The Shift to Socio-Organizational Drivers of Business Intelligence and Analytics Acceptance (pages 37-64)
Tanja Grublješič (Faculty of Economics, University of Ljubljana, Ljubljana, Slovenia), Pedro Simoes Coelho (NOVA Information Management School, Lisbon, Portugal), Jurij Jaklič (Faculty of Economics, University of Ljubljana, Ljubljana, Slovenia)
Article 4
Role of Perceived Value in Acceptance of “Bring Your Own Device” Policy (pages 65-82)
Lixuan Zhang Zhang (Weber State University, Ogden, USA), Matthew Mouritsen (Weber State University, Ogden, USA), Jeffrey R. Miller (Sam Houston State University, Huntsville, USA)
Article 5
Measuring E-Learners' Perceptions of Service Quality (pages 83-104)
Silvester Ivanaj (ICN Business School, Nancy, France), Grâce-Blache Nganmini (Data Analytics and Insights, TD bank Group, Montreal, Canada), Alain Antoine (ISAM IAE - Université de Lorraine, Nancy, France)
Issue 3
Special Issue on Service-Oriented Computing
Guest Editorial Preface
Shanchen Pang (College of Computer and Communication Engineering, China University of Petroleum, Qingdao, China), Shudong Wang (College of Computer and Communication Engineering, China University of Petroleum, Qingdao, China), Tao Song (College of Computer and Communication Engineering, China University of Petroleum, Qingdao, China), Xun Wang (College of Computer and Communication Engineering, China University of Petroleum, Qingdao, China), Pan Zheng (Information Systems Group, University of Canterbury, Christchurch, New Zealand)
Article 1
A Web Service Composition Approach Based on Planning Graph and Propositional Logic (pages 1-16)
ShiYang Deng (Shandong University of Science and Technology, Qingdao, China), YuYue Du (Shandong University of Science and technology, Qingdao, China), Liang Qi (New Jersey Institute of Technology, Newark, USA)
Article 2
Exploring Relationship Quality of User's Cloud Service: The Case Study of SaaS CRM (pages 17-36)
Tung-Hsiang Chou (National Kaohsiung University of Science and Technology, Kaohsiung City, Taiwan)
Article 3
Recent Progress on QoS Scheduling for Mobile Ad Hoc Networks (pages 37-66)
Dimitris N. Kanellopoulos (University of Patras, Patras, Greece)
Article 4
A Node-Oriented Discrete Event Scheduling Algorithm Based on Finite Resource Model (pages 67-82)
Yu Huang (Peking University, Beijing, China), Wanxing Sheng (China Electric Power Research Institute, Beijing, China), Peipei Jin (Peking University, Beijing, China), Baicuan Nie (Peking University, Beijing, China), Meikang Qiu (Pace University, New York City, USA), Guangquan Xu (Tianjin University, Tianjin, China)
Article 5
Aggregated Handover Authentication for Machine Type Communication (pages 83-96)
Xin Chen (BISTU, Beijing, China), ZhiQiang Liu (BISTU, Beijing, China), Jianxiong Wan (Nara Institute of Science and Technology (NAIST), Ikoma, Japan), Zhuo Li (BISTU, Beijing, China)
Article 6
A Study on Satisfaction Level Among Amateur Web Application Developers Towards Pigeon-Table as Nano Web Development Framework (pages 97-112)
Ong Chin Ann (Swinburne University of Technology, Kuching, Malaysia), Fu Swee Tee (Swinburne University of Technology, Kuching, Malaysia), Voon Yang Nen (Swinburne University of Technology, Kuching, Malaysia)
Issue 4
The Closing of the Year and a Call for a Single Citation Format
Editorial Preface
Steven Walczak (University of South Florida, Tampa, USA)
Article 1
Caching Resource Sharing for Network Slicing in 5G Core Network: A Game Theoretic Approach (pages 1-18)
Qingmin Jia (Beijing University of Posts and Telecommunications, Beijing, China), RenChao Xie (Beijing University of Posts and Telecommunications, Beijing, China), Tao Huang (Beijing University of Posts and Telecommunications, Beijing, China), Jiang Liu (Beijing University of Posts and Telecommunications, Beijing, China), Yunjie Liu (Beijing University of Posts and Telecommunications, Beijing, China)
Article 2
Determinants of Self-Service Analytics Adoption Intention: The Effect of Task-Technology Fit, Compatibility, and User Empowerment (pages 19-45)
Mohammad Daradkeh (Department of Management Information Systems, Faculty of Information Technology and Computer Sciences, Yarmouk University, Irbid, Jordan)
Article 3
Search Engine Advertising Perceived Effectiveness: A Resource-Based Approach on the Role of Advertisers' Competencies (pages 46-73)
Hamed Jafarzadeh (School of Management, Massey Business School, Massey University, Auckland, New Zealand), Babak Abedin (University of Technology Sydney, Ultimo, Australia), Aybüke Aurum (Aurum Academia, Sydney, Australia), John D'Ambra (University of New South Wales, Sydney, Australia)
Article 4
Comparative Analysis of Flight Search Representations (pages 74-88)
Aimal Tariq Rextin (COMSATS University, Islamabad, Pakistan), Fatima Iftekhar (Barani Institute of Management Sciences, Rawalpindi, Pakistan), Muhammad Muddasir Malik (NUST School of Electrical Engineering and Computer Science, Islamabad, Pakistan), Faheem Abbas (NUST School of Electrical Engineering and Computer Science, Islamabad, Pakistan)
Article 5
Personality Traits as Predictor of M-Payment Systems: A SEM-Neural Networks Approach (pages 89-110)
Ali Nawaz Khan (School of Economics and Management, Tongji University Shanghai, China), Xiongfei Cao (School of Management Hefei University of Technology, Hefei, China), Abdul Hameed Pitafi (School of Management, Hefei University of Technology, Hefei, China)
Volume 30 (2018)
Issue 1
Health Information Security: Paper Records May Still Be a Good Thing
Editorial Preface
Steven Walczak (School of Information and Florida Center for Cybersecurity, University of South Florida, Tampa, FL, USA)
Article 1
Seeking Health Information on Social Media: A Perspective of Trust, Self-Determination, and Social Support (pages 1-22)
Yibai Li (Unversity of Scranton, Scranton, PA, USA), Xuequn Wang (Murdoch University, Perth, Australia)
Article 2
Running with the Pack: The Impact of Middle-Status Conformity on the Post-Adoption Organizational Use of Twitter (pages 23-43)
Thomas Mattson (University of Richmond, Richmond, VA, USA), Salvatore Aurigemma (Collins College of Business, University of Tulsa, Tulsa, OK, USA)
Article 3
Consumption Value and Social Capital on Sense of Virtual Community Toward Value of Co-Created Information (pages 44-65)
Hsin Hsin Chang (National Cheng Kung University, Tainan City, Taiwan), Kit Hong Wong (National Cheng Kung University, Tainan City, Taiwan), Cheng Joo Eng (Min-Hwei College of Health Care Management, Tainan City, Taiwan), Shu-Hui Chen (National Cheng Kung University, Tainan City, Taiwan)
Article 4
Validating the EUCS Model to Measure the Level of Satisfaction of Internet Users in Local Banks in Italy (pages 66-81)
Rubens Pauluzzo (Department of Economic and Statistical Sciences, University of Udine, Udine, Italy), Enrico Fioravante Geretto (University of Udine, Udine, Italy)
Article 5
Second Order Interactive End User Development Appropriation in the Public Sector: Application Development Using Spreadsheet Programs (pages 82-106)
Anders Avdic (Örebro University, Örebro, Sweden & Dalarna University, Falun, Sweden)
Issue 2
Preface
Editorial Preface
Steven Walczak (School of Information & Florida Center for Cybersecurity, University of South Florida, Tampa, FL, USA)
Article 1
Personality Traits and Negotiation Style Effects on Negotiators' Perceptions in a Web-Based Negotiation (pages 1-19)
Jadielson Alves de Moura (Universidade Federal de Pernambuco, Recife, Brazil), Ana Paula Cabral Seixas Costa (Universidade Federal de Pernambuco, Recife, Brazil)
Article 2
Spreadsheet Error Types and Their Prevalence in a Healthcare Context (pages 20-42)
Elaine Dobell (Saolta University Health Care Group, Galway, Ireland & University of Limerick, Limerick, Ireland), Sebastian Herold (Department of Mathematics and Computer Science, Karlstad University, Karlstad, Sweden), Jim Buckley (CSIS / Lero – The Irish Software Research Centre, University of Limerick, Limerick, Ireland)
Article 3
Business Intelligence Systems Adoption Model: An Empirical Investigation (pages 43-70)
Saeed Rouhani (Faculty of Management, University of Tehran, Tehran, Iran), Amir Ashrafi (Allameh Tabataba'i University, Tehran, Iran), Ahad Zare Ravasan (Department of Information Technology Management, Mehralborz Institute of Higher Education, Tehran, Iran), Samira Afshari (Allameh Tabataba'i University, Tehran, Iran)
Article 4
Communication Processes of Information Technology Executives in Higher Education (pages 71-87)
Angela K. Hollman (University of Nebraska at Kearney, Kearney, NE, USA), Sonja H. Bickford (University of Nebraska at Kearney, Kearney, NE, USA), Janet L. Lear (University of Nebraska at Kearney, Kearney, NE, USA)
Article 5
The Impact of Firm Characteristics and IT Governance on IT Material Weaknesses (pages 88-111)
Peiqin Zhang (McCoy College of Business Administration, Texas State University, San Marcos, TX, USA), Kexin Zhao (Belk College of Business, University of North Carolina at Charlotte, Charlotte, NC, USA), Ram L. Kumar (Belk College of Business, University of North Carolina at Charlotte, Charlotte, NC, USA)
Issue 3
Special Issue on Information Management in Internet of Things
Guest Editorial Preface
Kim Huang (The Maharaja Sayajirao University of Baroda, Vadodara, India)
Article 1
Anomaly Detection Using RFID-Based Information Management in an IoT Context (pages 1-23)
Raúl Parada (Dipartimento di Ingegneria dell'Informazione, Università degli Studi di Padova, Padova, Italy), Joan Melià-Seguí (Estudis d'Informàtica, Multimèdia i Telecomunicació, Internet Interdisciplinary Institute (IN3), Universitat Oberta de Catalunya (UOC), Barcelona, Spain), Rafael Pous (Departament de Tecnologies de la Informació i les Comunicacions, Universitat Pompeu Fabra, Barcelona, Spain)
Article 2
The Role of the Internet of Things in the Improvement and Expansion of Business (pages 24-44)
Hodjat Hamidi (Department of Information Technology, Faculty of Industrial Engineering, K. N. Toosi University of Technology, Tehran, Iran), Maryam Jahanshahifard (Department of Information Technology, Faculty of Industrial Engineering, K. N. Toosi University of Technology, Tehran, Iran)
Article 3
Smart Vehicular System based on the Internet of Things (pages 45-62)
Midde Ranjit Reddy (Jawaharlal Nehru Technological University Anantapur, Andhra Pradesh, India), K. G Srinivasa (Ch. Bramh Prakash Government Engineering College, New Delhi, India), B. Eswara Reddy (Jawaharlal Nehru Technological University Anantapur, Andhra Pradesh, India)
Article 4
Impact of Information Technology on Information Search Channel Selection for Consumers (pages 63-80)
Gaurav Khatwani (Indian Institute of Management, Rohtak, India), Praveen Ranjan Srivastava (Indian Institute of Management, Rohtak, India)
Issue 4
Special Issue on Internet of Things: Issues, Challenges, and Opportunities
Guest Editorial Preface
Ganesh Chandra Deka (Directorate General of Training, Ministry of Skill Development and Entrepreneurship, New Delhi, India)
Article 1
Web Service Usability Analysis Based on User Preferences (pages 1-13)
Luiza Fabisiak (West Pomeranian University of Technology, Szczecin, Poland)
Article 2
PpBAC: Popularity Based Access Control Model for Cloud Computing (pages 14-31)
Suyel Namasudra (Galgotias University, Uttar Pradesh, India), Pinki Roy (National Institute of Technology, Silchar, India)
Article 3
A Customer Centric Best Connected Channel Model for Heterogeneous and IoT Networks (pages 32-50)
Pushpa Singh (Department of Information Technology, Accurate Institute of Management and Technology, Greater Noida, India), Rajeev Agrawal (Department of Electronics and Communication Engineering, G.L. Bajaj Institute of Technology and Management, Greater Noida, India)
Article 4
Factors that Influence the Acceptance of Internet of Things Services by Customers of Telecommunication Companies in Jordan (pages 51-63)
Adai Mohammad Al-Momani (College of Computer Science and IT, Universiti Tenaga Nasional, Kajang, Malaysia), Moamin A Mahmoud (College of Computer Science and IT, Universiti Tenaga Nasional, Kajang, Malaysia), Mohd Sharifuddin Ahmad (College of Information Technology, Universiti Tenaga Nasional, Kajang, Malaysia)
Article 5
Smart Agricultural Enterprise System Based on Integration of Internet of Things and Agent Technology (pages 64-82)
Ilham Kitouni (Department of Computer Science, Constantine 2 University, MISC Laboratory, Constantine, Algeria), Djamel Benmerzoug (Constantine 2 University, LIRE Laboratory, Constantine, Algeria), Fouzi Lezzar (Constantine 2 University, LIRE Laboratory, Constantine, Algeria)
Article 6
Data Analytics Assisted Internet of Things Towards Building Intelligent Healthcare Monitoring Systems: IoT for Healthcare (pages 83-103)
Srinivasa K G (CBP Government Engineering College, New Delhi, India), Sowmya BJ (MSRIT, Bangalore, India), Abhinav Shikhar (MSRIT, Bangalore, India), Ritu Utkarsha (RIET, Faridabad, India), Aahan Singh (MSRIT, Bangalore, India)
Article 7
A Hybrid Case Based Reasoning Model for Classification in Internet of Things (IoT) Environment (pages 104-122)
Saroj Kr Biswas (NIT Silchar, India), Debashree Devi (NIT Silchar, India), Manomita Chakraborty (NIT Silchar, India)
Volume 29 (2017)
Issue 1
Globalization and Theoretical and Applied Research
Editorial Preface
Steven Walczak (School of Information & Florida Center for Cybersecurity, University of South Florida, Tampa, FL, USA)
Article 1
A Cultural Model of Online Banking Adoption: Long-Term Orientation Perspective (pages 1-22)
Leelien Ken Huang (Feng Chia University, Taichung City, Taiwan)
Article 2
Factors Influence Intention to Adopt Internet Medical Information on Bulletin Boards: A Heuristic-Systematic Perspective (pages 23-41)
Ying Chieh Liu (Chaoyang University of Technology, Taichung City, Taiwan), Yu-An Huang (National Chi Nan University, Nantou, Taiwan)
Article 3
Cellular Automata: Elementary Cellular Automata (pages 42-50)
Rupali Bhardwaj (School of Mathematics and Computer Applications, Thapar University, Patiala, India), Anil Upadhyay (Department of Mathematics, Bipin Chandra Tripathi Kumaon Engineering College, Dwarahat, India)
Article 4
A Model for Impact of Organizational Project Benefits Management and its Impact on End User (pages 51-65)
Hodjat Hamidi (Information Technology Engineering Group, Department of Industrial Engineering, K.N. Toosi University of Technology, Tehran, Iran)
Issue 2
Article 1
User Acceptance of Technologies in Their Infancy: The Case of 3D Printing Business Models (pages 1-24)
Timo Hartmann (Maastricht University, Maastricht, The Netherlands), Evelyne Vanpoucke (Université Libre de Bruxelles, Brussels, Belgium)
Article 2
Error Trapping and Metamorphic Testing for Spreadsheet Failure Detection (pages 25-42)
Pak-Lok Poon (RMIT University, Melbourne, Australia), Huai Liu (RMIT University, Melbourne, Australia), Tsong Yueh Chen (Swinburne University of Technology, Melbourne, Australia)
Article 3
Developers, Quality Control and Download Volume in Open Source Software (OSS) Projects (pages 43-66)
Geoffrey Hill (University of Central Arkansas, Conway, AR, USA), Pratim Datta (Kent State University, Kent, OH, USA and University of Johannesburg, Johannesburg, South Africa), Candice Vander Weerdt (Kent State University, Kent, OH, USA)
Article 4
The Adoption Drivers of Web-Based B2B Systems: A Comparison between Durable and Nondurable Goods-Producing Industries (pages 67-81)
Khaled Saleh Al-Omoush (Al-Zaytoonah University of Jordan, Amman, Jordan)
Issue 3
Article 1
Users' Perspectives on Using Wikis for Managing Knowledge: Benefits and Challenges (pages 1-23)
Fayez Hussain Alqahtani (Computer Science Department, King Saud University, Riyadh, Saudi Arabia)
Article 2
WPKT: Work Process Knowledge Template for Codification of Organizational Process Knowledge (pages 24-48)
Akhilesh Bajaj (University of Tulsa, Tulsa, OK, USA), Meredith Bates-Thornton (Verizon, Tulsa, OK, USA)
Article 3
Student Resistance to a Mandatory Learning Management System in Online Supply Chain Courses (pages 49-67)
Kenneth David Strang (State University of New York Plattsburgh at Queensbury, Queensbury, NY, USA), Narasimha Rao Vajjhala (American University of Nigeria, Yola, Nigeria)
Article 4
Using Social Media to Support Presentation Skill Development in Traditional Classroom Environments (pages 68-91)
Paul M. Di Gangi (Management, Information Systems, and Quantitative Methods Department, University of Alabama at Birmingham, Birmingham, AL, USA), Samuel H. Goh (Department of Business Informatics, Northern Kentucky University, Highland Heights, KY, USA), Carmen C. Lewis (Department of Information Systems and Quantitative Methods, Troy University, Dothan, AL, USA)
Issue 4
Special Issue on Bigdata Analytics in Practice
Guest Editorial Preface
Ganesh Chandra Deka (Ministry of Skill Development and Entrepreneurship, Directorate General of Training, Shram Shakti Bhawan, Room N-329, New Delhi, India), Steven Walczak (School of Information, University of South Florida, Tampa, FL, USA)
Article 1
IoT Based Agriculture as a Cloud and Big Data Service: The Beginning of Digital India (pages 1-23)
Sukhpal Singh Gill (CLOUDS Lab, School of Computing and Information Systems, University of Melbourne, Melbourne, Australia), Inderveer Chana (Computer Science and Engineering Department, Thapar University, Patiala, India), Rajkumar Buyya (CLOUDS Lab, School of Computing and Information Systems, University of Melbourne, Melbourne, Australia)
Article 2
Balance Resource Utilization (BRU) Approach for the Dynamic Load Balancing in Cloud Environment by Using AR Prediction Model (pages 24-50)
Rajeev Kumar Gupta (Maulana Azad National Institute of Technology (MANIT), Bhopal, India), Rajesh Kumar Pateriya (Maulana Azad National Institute of Technology (MANIT), Bhopal, India)
Article 3
Sentiment Analysis of Tweets for Estimating Criticality and Security of Events (pages 51-71)
V. Subramaniyaswamy (School of Computing, SASTRA University, Thanjavur, India), R. Logesh (School of Computing, SASTRA University, Thanjavur, India), M. Abejith (School of Computing, SASTRA University, Thanjavur, India), Sunil Umasankar (School of Computing, SASTRA University, Thanjavur, India), A. Umamakeswari (School of Computing, SASTRA University, Thanjavur, India)
Article 4
Internet of Things (IOT) Solution for Increasing the Quality of Life of Physically Challenged People (pages 72-83)
G. M. Siddesh (Department of Information Science and Engineering, Ramaiah Institute of Technology, Bangalore, India), K. G. Srinivasa (Department of Information Technology, Ch. Brahm Prakash Government Engineering College, New Delhi, India), Siddharth Kaushik (Ramaiah Institute of Technology, Bangalore, India), S. V. Varun (Ramaiah Institute of Technology, Bangalore, India), Vidhatri Subramanyam (Ramaiah Institute of Technology, Bangalore, India), Vinay M. Patil (Ramaiah Institute of Technology, Bangalore, India)
Article 5
A Methodical Healthcare Model to Eliminate Motion Artifacts from Big EEG Data (pages 84-102)
Vandana Roy (Research Scholar, Jabalpur Engineering College, Jabalpur, India), Shailja Shukla (Department of Computer Science, Jabalpur Engineering College, Jabalpur, India)
Volume 28 (2016)
Issue 1
Article 1
Unsuccessful Performance and Future Computer Self-Efficacy Estimations: Attributions and Generalization to Other Software Applications (pages 1-14)
Richard D. Johnson (Department of Management, University at Albany, Albany, NY, USA), Yuzhu Li (University of Massachusetts Dartmouth, North Dartmouth, MA, USA), James H. Dulebohn (Michigan State University, East Lansing, MI, USA)
Article 2
Social Media Use in the Workplace: A Study of Dual Effects (pages 15-31)
John R. Carlson (Department of Information Systems, Baylor University, Waco, TX, USA), Suzanne Zivnuska (California State University, Chico, Chico, CA, USA), Ranida B. Harris (Indiana University Southeast, New Albany, IN, USA), Kenneth J. Harris (Indiana University Southeast, New Albany, IN, USA), Dawn S. Carlson (Department of Management, Baylor University, Waco, TX, USA)
Article 3
A User-Centric Typology of Information System Requirements (pages 32-55)
Adarsh Satindarlal Kakar (Alabama State University, Montgomery, AL, USA)
Article 4
Diffusion of Adoption of Facebook for Customer Relationship Management in Australia: An Exploratory Study (pages 56-72)
Babak Abedin (Faculty of Engineering and IT, University of Technology Sydney (UTS), Sydney, Australia)
Issue 2
Unveiling the Impact of Social Media: Importance of the Co-Creation of Business Value during the Adoption and Use Process (Part A)
Guest Editorial Preface
Samuel Fosso Wamba (NEOMA Business School, Mont-Saint-Aignan, France), Shahriar Akter (University of Wollongong, Wollongong, Australia), Mithu Bhattacharya (College of Business Administration, University of Detroit Mercy, Detroit, MI, USA)
Article 1
The Primer of Social Media Analytics (pages 1-12)
Samuel Fosso Wamba (NEOMA Business School, Mont-Saint-Aignan, France), Shahriar Akter (University of Wollongong, Wollongong, Australia), Hyunjin Kang (Department of Marketing, George Washington University, Washington D.C., USA), Mithu Bhattacharya (College of Business Administration, University of Detroit Mercy, Detroit, MI, USA), Mohammed Upal (WebHawks IT, Tokyo, Japan)
Article 2
Design and Development of Intelligent Decision Support Prototype System for Social Media Competitive Analysis in Fashion Industry (pages 13-32)
Eric W.T. Ngai (Department of Management and Marketing, The Hong Kong Polytechnic University, Hong Kong), S.S. Lam (Lee Shau Kee School of Business & Administration, The Open University of Hong Kong, Hong Kong), J.K.L. Poon (Hong Kong Community College, The Hong Kong Polytechnic University, Hong Kong), Bin Shen (Glorious Sun School of Business & Management, Donghua University, Shanghai, China), Karen K.L. Moon (Department of Clothing and Textiles/Research Institute of Human Ecology, Seoul National University, Seoul, South Korea)
Article 3
The Influence of Social Presence, Social Exchange and Feedback Features on SNS Continuous Use: The Facebook Context (pages 33-52)
Mustapha Cheikh-Ammar (Ivey Business School, University of Western Ontario, London, Canada), Henri Barki (HEC Montreal, Montreal, Canada)
Article 4
Social Media Engagement Theory: Exploring the Influence of User Engagement on Social Media Usage (pages 53-73)
Paul M. Di Gangi (University of Alabama at Birmingham, Birmingham, AL, USA), Molly M. Wasko (Department of Management, Information Systems and Quantitative Methods, University of Alabama at Birmingham, Birmingham, AL, USA)
Article 5
Social Media-Based Forecasting: A Case Study of Tweets and Stock Prices in the Financial Services Industry (pages 74-91)
Wu He (Department of Information Technology and Decision Sciences,Old Dominion University, Norfolk, VA, USA), Lin Guo (University of New Hampshire, Durham, NH, USA), Jiancheng Shen (Old Dominion University, Norfolk, VA, USA), Vasudeva Akula (VOZIQ, Ashburn, VA, USA)
Article 6
Virtual Space Co-Creation: The Perspective of User Innovation (pages 92-106)
Yonggui Wang (Business School and Collaborative Innovation Center, University of International Business and Economics, Beijing, China), Dahui Li (Labovitz School of Business and Economics, University of Minnesota Duluth, Duluth, MN, USA)
Article 7
Article 8
Separating the Wheat from the Chaff: Extracting Business Value from Feature Requests Posted in User Forums (pages 124-141)
Adarsh Kumar Kakar (Alabama State University, Montgomery, AL, USA)
Issue 3
Unveiling the Impact of Social Media: Importance of the Co-Creation of Business Value during the Adoption and Use Process (Part B)
Guest Editorial Preface
Samuel Fosso Wamba (NEOMA Business School, Mont-Saint-Aignan, France), Shahriar Akter (University of Wollongong, Wollongong, Australia), Mithu Bhattacharyya (University of Detroit Mercy, Detroit, MI, USA)
Article 1
How does Social Media Analytics Create Value? (pages 1-9)
Shahriar Akter (University of Wollongong, Wollongong, Australia), Mithu Bhattacharyya (University of Detroit Mercy, Detroit, MI, USA), Samuel Fosso Wamba (NEOMA Business School, Mont-Saint-Aignan, France), Sutapa Aditya (Long Island University, Brookville, NY, USA)
Article 2
Twitter Predicting the 2012 US Presidential Election?: Lessons Learned from an Unconscious Value Co-Creation Platform (pages 10-30)
Miguel Maldonado (ESAN University, Lima, Peru), Vicenta Sierra (ESADE – Ramon Llull University, Sant Cugat, Spain)
Article 3
Participating in the Enterprise Web 2.0 Platform: The Influence of Trust (pages 31-48)
Fayez Hussain Alqahtani (Computer Science Department, King Saud University, Riyadh, Saudi Arabia), Ibrahim Abunadi (College of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia)
Article 4
Social Commerce Benefits for Small Businesses: An Organizational Level Study (pages 49-66)
Ludwig Christian Schaupp (Department of Accounting, College of Business & Economics West Virginia University, Morgantown, WV, USA), France Bélanger (Virginia Tech, Blacksburg, VA, USA)
Article 5
Catch a Fad or Capture a Value?: Social Media Leverage in SMEs (pages 67-81)
Xiaoyun He (Auburn University at Montgomery, Montgomery, AL, USA), Haibing Lu (Santa Clara University, Santa Clara, CA, USA)
Article 6
Determinants of Social Media Impact in Local Government (pages 82-103)
Mohd Hisham Mohd Sharif (University of Adelaide, Adelaide, Australia), Indrit Troshani (BusinessSchool, University of Adelaide, Adelaide, Australia), Robyn Davidson (University of Adelaide, Adelaide, Australia)
Article 7
Implementation of Social Media Concepts for e-Government: Case Study of a Social Media Tool for Value Co-Creation and Citizen Participation (pages 104-121)
Raimundo Díaz-Díaz (Universidad de Cantabria, Santander, Spain), Daniel Pérez-González (Universidad de Cantabria, Santander, Spain)
Article 8
Use of Social Media for Disaster Management: A Prescriptive Framework (pages 122-140)
Louis Ngamassi (Prairie View A&M University, Prairie View, TX, USA), Thiagarajan Ramakrishnan (Prairie View A&M University, Prairie View, TX, USA), Shahedur Rahman (Prairie View A&M University, Prairie View, TX, USA)
Article 9
A Multimethod Study of Enterprise Social Media Implementation and Use: Mitigating the Gap between Theory and Practice (pages 141-162)
Hillol Bala (Indiana University, Bloomington, IN, USA), Anne P. Massey (Indiana University, Bloomington, IN, USA), Christine J. Hsieh (Indiana University, Bloomington, IN, USA)
Issue 4
Editorial Note
Editorial Preface
Steven Walczak (School of Information & Florida Center for Cybersecurity, University of South Florida, Tampa, FL, USA)
Article 1
Responsibility and Skills Requirements for Entry Level Analytics Professionals (pages 1-14)
Wenhong Luo (Villanova University, Villanova, PA, USA)
Article 2
Influences of Organizational Culture on Knowledge Sharing in an Online Virtual Community: Interactive Effects of Trust, Communication and Leadership (pages 15-32)
Chaoyun Liang (Department of Bio-Industry Communication and Development, National Taiwan University, Taipei, Taiwan), Chi-Cheng Chang (National Taiwan Normal University, Taipei, Taiwan), William Rothwell (Pennsylvania State University, University Park, PA, USA), Kuen-Ming Shu (Department of Mechanical and Computer-Aided Engineering, National Formosa University, Huwei, Taiwan)
Article 3
Exploring Portuguese Academics' Understanding of Ownership and Intellectual Property of Online Educational Materials (pages 33-54)
Jorge Tiago Martins (Information School, Sheffield University, Sheffield, UK), Miguel Baptista Nunes (School of Information Management, Sun Yat-sen University, Guangzhou, China)
Article 4
The Implications of Social Influence Theory on Continuance Intention for Social Networking Among Chinese University Students (pages 55-72)
Xuan Xiao (Harbin Institute of Technology, Harbin, China), Tienan Wang (Harbin Institute of Technology, Harbin, China)
Article 5
An Empirical Investigation of Decision Making in IT-Related Dilemmas: Impact of Positive and Negative Consequence Information (pages 73-90)
Chen Zhang (University of Memphis, Memphis, TN, USA), Judith C. Simon (University of Memphis, Memphis, TN, USA), Euntae “Ted” Lee (University of Memphis, Memphis, TN, USA)
Volume 27 (2015)
Issue 1
Article 1
B2B E-Commerce Success among Small and Medium-Sized Enterprises: A Business Network Perspective (pages 1-32)
Morteza Ghobakhloo (Department of Mechanical and Manufacturing Engineering, Universiti Putra Malaysia, Selangor, Malaysia), Tang Sai Hong (Department of Mechanical and Manufacturing Engineering, Universiti Putra Malaysia, Selangor, Malaysia), Craig Standing (Centre for Innovative Practice, Edith Cowan University, Joondalup, Australia)
Article 2
Introducing a Taxonomy for Classifying Qualitative Spreadsheet Errors (pages 33-56)
Linda Leon (Department of Finance and Computer Information Systems, Loyola Marymount University, Los Angeles, CA, USA), Zbigniew H. Przasnyski (Department of Finance and Computer Information Systems, Loyola Marymount University, Los Angeles, CA, USA), Kala Chand Seal (Department of Finance and Computer Information Systems, Loyola Marymount University, Los Angeles, CA, USA)
Article 3
User Resistance Behaviors and Management Strategies in IT-Enabled Change (pages 57-76)
Tim Klaus (College of Business, Texas A&M University, Corpus Christi, TX, USA), J. Ellis Blanton (College of Business, University of South Florida, Tampa, FL, USA), Stephen C. Wingreen (University of Canterbury in Christchurch, Christchurch, New Zealand)
Article 4
Investigation on the Factors Determining Consumers' Use of Online Intermediated Shopping (OIS): A Behavioral Intention Perspective (pages 77-97)
Wei Zhang (Department of Internal Control, SuZhou New District Economic Development Group Corporation, Suzhou, Jiangsu, China), Xue Yang (Department of Marketing and Electronic Business, Nanjing University, Nanjing, Jiangsu, China), Quansheng Wang (Department of Marketing and Electronic Business, Nanjing University, Nanjing, Jiangsu, China), Chengde Zheng (Department of Marketing and Electronic Business, Nanjing University, Nanjing, Jiangsu, China), Choon Ling Sia (Department of Information Systems, City University of Hong Kong, Hong Kong, China)
Issue 2
Article 1
Strategic Information System Planning in Healthcare Organizations (pages 1-31)
Theresa Lee (University of Toronto, Toronto, Canada), Amir Hossein Ghapanchi (School of Information and Communication Technology, Griffith University, Southport, Queensland, Australia, and Institute for Integrated and Intelligent Systems, Gold Coast, Queensland, Australia), Amir Talaei-Khoei (School of Systems, Management and Leadership, University of Technology, Sydney, Australia), Pradeep Ray (Asia Pacific ubiquitous Healthcare Research Centre (APuHC), UNSW, Sydney, Australia)
Article 2
The Impact of On-Line Consumer Reviews on Value Perception: The Dual-Process Theory and Uncertainty Reduction (pages 32-57)
Hsin Hsin Chang (National Cheng Kung University, Tainan City, Taiwan), Po Wen Fang (National Cheng Kung University, Tainan City, Taiwan), Chien Hao Huang (National Cheng Kung University, Tainan City, Taiwan)
Article 3
Knowledge Sharing, Social Relationships, and Contextual Performance: The Moderating Influence of Information Technology Competence (pages 58-73)
Jianping Peng (Sun Yat-sen Business School, Sun Yat-sen University, Guangzhou, China), Jing Quan (Franklin P. Perdue School of Business, Salisbury University, Salisbury, MD, USA), Guoying Zhang (Dillard College of Business Administration, Midwestern State University, Wichita Falls, TX, USA), Alan J. Dubinsky (Dillard College of Business Administration, Midwestern State University, Wichita Falls, TX, USA & Purdue University West Lafayette, IN, USA)
Issue 3
Article 1
Explaining Online Customer Repurchase Intentions from a Relationship-Marketing Perspective: An Integration of the 4Rs Marketing Strategy and Customer Trust (pages 1-26)
Mei-Ju Lin (Department of Industrial and Information Management, National Cheng Kung University, Tainan, Taiwan), Wei-Tsong Wang (Department of Industrial and Information Management, National Cheng Kung University, Tainan, Taiwan)
Article 2
Beliefs and Attributions toward Computing Technology: The Moderating Role of Social Cues in Interfaces (pages 27-54)
Richard D. Johnson (Department of Management, University at Albany, State University of New York, Albany, NY, USA), Natasha Veltri (Information & Technology Management, University of Tampa, Tampa, FL, USA), Jason B. Thatcher (College of Business and Behavioral Science, Clemson University, Clemson, SC, USA)
Article 3
The Relationship between User Satisfaction, System Attributes and the Motivating Potential of System Use (pages 55-79)
Jason F. Cohen (University of the Witwatersrand, Johannesburg, South Africa), James Matheri Kangethe (University of the Witwatersrand, Johannesburg, South Africa)
Issue 4
Article 1
IT Enabled Organisational Agility: Evidence from Chinese Firms (pages 1-24)
Yunshi Mao (Business School of Sun Yat-Sen University, Guangzhou, China), Jing Quan (Department of Information and Decision Sciences, Perdue School of Business, Salisbury University, Salisbury, MD, USA)
Article 2
Influence of SMS Advertising on Consumer Behavioral Intention (pages 25-42)
Hongyan Lin (Xiamen University of Technology, Xiamen, China), Zhankui Chen (Xiamen University of Technology, Xiamen, China)
Article 3
Information Systems Project Management Risk: Does it Matter for Firm Performance? (pages 43-60)
Stefan Tams (Department of Information Technologies, HEC Montreal, Montreal, Canada), Kevin Hill (Department of Human Resources Management, HEC Montreal, Montreal, Canada)
Volume 26 (2014)
Issue 1
Article 1
The Influence of Social Aversion and Institution-Based Trust on Computer Self-Efficacy, Computer Anxiety and Antecedents to IT Use (pages 1-26)
Elizabeth White Baker (Cameron School of Business, University of North Carolina - Wilmington, Wilmington, NC, USA), Jason Bennett Thatcher (College of Business and Behavioral Science, Clemson University, Clemson, SC, USA), Michael Gundlach (College of Business, California State University, Chico, CA, USA), D. Harrison McKnight (Eli Broad College of Business, Michigan State University, East Lansing, MI, USA)
Article 2
Information Security Program Effectiveness in Organizations: The Moderating Role of Task Interdependence (pages 27-46)
Kenneth J. Knapp (University of Tampa, Tampa, FL, USA), Claudia J. Ferrante (USAF, United States Air Force Academy, Colorado Springs, CO, USA)
Article 3
Evaluating the Effectiveness of Static Analysis Programs Versus Manual Inspection in the Detection of Natural Spreadsheet Errors (pages 47-65)
Salvatore Aurigemma (Collins College of Business, University of Tulsa, Tulsa, OK, USA), Ray Panko (Department of IT Management, University of Hawaii at Manoa, Honolulu, HI, USA)
Article 4
The Impact of Software Testing Governance Choices (pages 66-85)
Xihui Zhang (University of North Alabama, Florence, AL, USA), Colin G. Onita (University of Akron, Akron, OH, USA), Jasbir S. Dhaliwal (University of Memphis, Memphis, TN, USA)
Issue 2
Article 1
Social Media Tools Adoption and Use by SMES: An Empirical Study (pages 1-17)
Samuel Fosso Wamba (NEOMA Business School, Mont-Saint-Aignan, Rouen, France), Lemuria Carter (School of Business and Economics, Department of Accounting and Finance, North Carolina A & T State University, Greensboro, NC, USA)
Article 2
Investigating the Motives of Customers' Continuance Intentions towards Online Reservation: The Role of E-Service Quality (pages 18-40)
Samar Mouakket (College of Business Administration, University of Sharjah, Sharjah, United Arab Emirates)
Article 3
How Can Secure Websites Improve Buying Intention?: Usable Versus Non Usable Contexts? (pages 41-59)
Natalia Vila (Facultad de Economia, Universidad de Valencia, Valencia, Spain), Inés Kuster (Facultad de Economia, Universidad de Valencia, Valencia, Spain)
Article 4
Do I Matter?: The Impact of Individual Differences on a Technology-Mediated End User Training Process (pages 60-79)
Saurabh Gupta (Department of Management, University of North Florida, Jacksonville, FL, USA), Rob Anson (College of Business and Economics, Boise State University, Boise, ID, USA)
Issue 3
Article 1
E-SERVCON and E-Commerce Success: Applying the DeLone & McLean Model (pages 1-22)
Jung-Yu Lai (National Chung Hsing University, Taichung, Taiwan)
Article 2
Explaining Users' Security Behaviors with the Security Belief Model (pages 23-46)
Clay K. Williams (Southern Illinois University Edwardsville, Edwardsville, IL, USA), Donald Wynn (University of Dayton, Dayton, OH, USA), Ramana Madupalli (Southern Illinois University Edwardsville, Edwardsville, IL, USA), Elena Karahanna (Terry College of Business, University of Georgia, Athens, GA, USA), Barbara K. Duncan (Southern Illinois University Edwardsville, Edwardsville, IL, USA)
Article 3
Overreliance on Mathematical Accuracy of Computer Output: An Issue for IT Educators (pages 47-64)
Ian Sims (Department of International Business and Asian Studies, Griffith University, Gold Coast, Australia), Conor O'Leary (Department of Accounting, Finance and Economics, Griffith Business School, Griffith University, Brisbane, Australia), Pran Boolaky (Department of Accounting, Finance and Economics, Griffith Business School, Griffith University, Brisbane, Australia)
Article 4
The Effect of Trust on Customers' Online Repurchase Intention in Consumer-to-Consumer Electronic Commerce (pages 65-86)
Lin Jia (Department of Information Systems and Supply Chain Management, Harbert College of Business, Auburn University, Auburn, AL, USA), Casey Cegielski (Department of Information Systems and Supply Chain Management, Harbert College of Business, Auburn University, Auburn, AL, USA), Qinsheng Zhang (Department of Management, College of Management, Ocean University of China, Qingdao, China)
Issue 4
Article 1
Habit: How Does It Develop, and Affect Continued Usage of Chinese Users on Social Networking Websites? (pages 1-22)
Guopeng Yin (School of Information Technology & Management, University of International Business and Economics, Beijing, China), Ling Zhu (College of Management, Long Island University Post, Brookville, NY, USA)
Article 2
Explaining Cyberloafing through a Theoretical Integration of Theory of Interpersonal Behavior and Theory of Organizational Justice (pages 23-42)
Teresa K. Betts (College of Business, Murray State University, Murray, KY, USA), Andrew J. Setterstrom (Department of Operations Management and Information Systems, Northern Illinois University, DeKalb, IL, USA), John Michael Pearson (Department of Management, Southern Illinois University, Carbondale, IL, USA), Stephanie Totty (Department of Management, Marketing and Business Administration, Murray State University, Murray, KY, USA)
Article 3
Investigating Privacy Perception and Behavior on Weibo (pages 43-56)
Clinton Amos (John B. Goddard School of Business and Economics, Weber State University, Ogden, UT, USA), Lixuan Zhang (John B. Goddard School of Business and Economics, Weber State University, Ogden, UT, USA), Iryna Pentina (Department of Marketing and International Business, University of Toledo, Toledo, OH, USA)
Article 4
To Adopt or Not to Adopt: A Perception-Based Model of the EMR Technology Adoption Decision Utilizing the Technology-Organization-Environment Framework (pages 57-79)
Colleen Schwarz (Department of Management, University of Louisiana at Lafayette, Lafayette, LA, USA), Andrew Schwarz (Information Systems & Decision Sciences Department (ISDS), Louisiana State University, Baton Rouge, LA, USA)
Volume 25 (2013)
Issue 1
Article 1
Engaging Remote Employees: The Moderating Role of “Remote” Status in Determining Employee Information Security Policy Awareness (pages 1-23)
Allen C. Johnston (School of Business, University of Alabama at Birmingham, Birmingham, AL, USA), Barbara Wech (School of Business, University of Alabama at Birmingham, Birmingham, AL, USA), Eric Jack (School of Business, University of Alabama at Birmingham, Birmingham, AL, USA)
Article 2
A Social-Feedback Enriched Interface for Software Download (pages 24-42)
Gianluca Dini (Dipartimento di Ingegneria dell’Informazione, Università di Pisa, Pisa, Tuscany, Italy), Pierfrancesco Foglia (Dipartimento di Ingegneria dell’Informazione, Università di Pisa, Pisa, Tuscany, Italy), C. Antonio Prete (Dipartimento di Ingegneria dell’Informazione, Università di Pisa, Pisa, Tuscany, Italy), Michele Zanda (Dipartimento di Ingegneria dell’Informazione, Università di Pisa, Pisa, Tuscany, Italy)
Article 3
Are Mobile Spreadsheet Applications Usable? (pages 43-63)
Derek Flood (Department of Computing and Communication Technologies, Oxford Brookes University, Oxford, UK), Rachel Harrison (Department of Computing and Communication Technologies, Oxford Brookes University, Oxford, UK), Claudia Iacob (Department of Computing and Communication Technologies, Oxford Brookes University, Oxford, UK), Ann Nosseir (Oxford Brookes University, Oxford, UK), Kevin McDaid (Software Technology Research Centre, Dundalk Institute of Technology, Dundalk, County Louth, Ireland)
Issue 2
Article 1
Virtual Team Effectiveness: Investigating the Moderating Role of Experience with Computer-Mediated Communication on the Impact of Team Cohesion and Openness (pages 1-18)
John R. Carlson (Department of Information Systems, Baylor University, Waco, TX, USA), Dawn S. Carlson (Department of Management, Baylor University, Waco, TX, USA), Emily M. Hunter (Department of Management, Baylor University, Waco, TX, USA), Randal L. Vaughn (Department of Information Systems, Baylor University, Waco, TX, USA), Joey F. George (SCIS Department, Iowa State University, Ames, IA, USA)
Article 2
An Artifact Switching Model for User Acceptance of eBooks (pages 19-40)
Clive Sanford (Department of Information Systems, Hanyang University, Seoul, Korea)
Article 3
Goal Abstraction, Goal Linkage Dependency, and Perceived Utilitarian Value of Information Systems: A Mixed-Method Study (pages 41-58)
Sabine Matook (UQ Business School, The University of Queensland, Brisbane, QLD, Australia), Hans van der Heijden (School of Management, Royal Holloway, University of London, UK)
Article 4
Assessing ERP Learning (Management, Business Process, and Skills) and Attitudes (pages 59-74)
Timothy Paul Cronan (Department of Information Systems, Sam M. Walton College of Business, University of Arkansas, Fayetteville, AR, USA), David E. Douglas (Department of Information Systems, Sam M. Walton College of Business, University of Arkansas, Fayetteville, AR, USA)
Issue 3
Users and Uses Research: Understanding “The Familiar Unknown”
Guest Editorial Preface
Raymond R. Panko (Shidler College of Business Administration, University of Hawaii, Honolulu, HI, USA)
Article 1
End User Computing: The Dark Matter (and Dark Energy) of Corporate IT (pages 1-19)
Raymond R. Panko (Shidler College of Business Administration, University of Hawaii, Honolulu, HI, USA), Daniel N. Port (Department of Information Technology Management, University of Hawaii, Honolulu, HI, USA)
Article 3
A Composite Framework for Behavioral Compliance with Information Security Policies (pages 32-51)
Salvatore Aurigemma (Communication and Information Sciences (CIS) PhD Program, University of Hawaii at Manoa, Honolulu, HI, USA)
Article 4
Simplicity is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior (pages 52-66)
Jeffrey L. Jenkins (Marriott School of Management, Brigham Young University, Provo, UT, USA), Alexandra Durcikova (Price College of Business, The University of Oklahoma, Norman, OK, USA), Mary B. Burns (Jake Jabs College of Business & Entrepreneurship, Montana State University, Bozeman, MT, USA)
Article 5
Involving End Users to Mitigate Risk in IS Development Projects (pages 67-82)
Chintan Amrit (Department of Industrial Engineering and Business Information Systems, School of Management and Governance, University of Twente, Enschede, The Netherlands), Jos van Hillegersberg (Department of Industrial Engineering and Business Information Systems, School of Management and Governance, University of Twente, Enschede, The Netherlands), Bart van Diest (First Consulting B.V., Enschede, The Netherlands)
Issue 4
Article 1
Segmentation of Information Systems Users: The Finite Mixture Partial Least Squares Method (pages 1-26)
Semina Halilovic (School of Economics and Business,University of Sarajevo, Sarajevo, Bosnia and Herzegovina), Muris Cicic (School of Economics and Business, University of Sarajevo, Sarajevo, Bosnia and Herzegovina)
Article 2
Modeling the Impact of Biometric Security on Millennials’ Protection Motivation (pages 27-49)
Benjamin Ngugi (Suffolk University, Boston, MA, USA), Arnold Kamis (Suffolk University, Boston, MA, USA)
Article 3
Information Technology Management Practice: Impacts upon Effectiveness (pages 50-74)
Brandis Phillips (North Carolina A & T State University, Greensboro, NC, USA)
Article 4
End User Security Training for Identification and Access Management (pages 75-103)
Tonia San Nicolas-Rocca (School of Library and Information Science, San Jose State University, San Jose, CA, USA), Lorne Olfman (Center for Information Systems and Technology, Claremont Graduate University, Claremont, CA, USA)
Volume 24 (2012)
Issue 1
Article 1
Post-Acceptance Intentions and Behaviors: An Empirical Investigation of Information Technology Use and Innovation (pages 1-20)
Pamela E. Carter (North Carolina A&T State University, USA), Jason Bennett Thatcher (Clemson University, USA), Katherine M. Chudoba (Utah State University, USA), Kent Marett (Mississippi State University, USA)
Article 2
IS Security Policy Violations: A Rational Choice Perspective (pages 21-41)
Anthony Vance (Brigham Young University, USA), Mikko T. Siponen (University of Oulu, Finland)
Article 3
Typing Biometric Keypads: Combining Keystroke Time and Pressure Features to Improve Authentication (pages 42-63)
Benjamin Ngugi (Suffolk University, USA), Peter Tarasewich (Northeastern University, USA), Michael Recce (Jersey Institute of Technology, USA)
Article 4
Technology-Mediated Collaboration, Shared Mental Model and Task Performance (pages 64-81)
Hayward P. Andres (North Carolina A&T State University, USA)
Article 5
Exploring Choice as an Antecedent to Behavior: Incorporating Alternatives into the Technology Acceptance Process (pages 82-107)
Miguel I. Aguirre-Urreta (DePaul University, USA), George M. Marakas (University of Kansas, USA)
Issue 2
Article 1
The Role of IT Governance Practices in Creating Business Value in SMEs (pages 1-17)
Carla Wilkin (Monash University, Australia)
Article 2
Does Technology Trust Substitute Interpersonal Trust?: Examining Technology Trust’s Influence on Individual Decision-Making (pages 18-38)
Xin Li (University of South Florida St. Petersburg, USA), Guang Rong (Clemson University, USA), Jason Bennett Thatcher (Clemson University, USA)
Article 3
The Impact of Information Technology Internal Controls on Firm Performance (pages 39-49)
Lemuria D. Carter (North Carolina A&T State University, USA), Brandis Phillips (North Carolina A&T State University, USA), Porche Millington (North Carolina A&T State University, USA)
Article 4
Information Systems Service Quality, Zone of Tolerance, and User Satisfaction (pages 50-73)
Narasimhaiah Gorla (American University of Sharjah, UAE)
Issue 3
Article 1
Internet Voting Usefulness: An Empirical Analysis of Trust, Convenience and Accessibility (pages 1-17)
Lemuria Carter (North Carolina Agricultural and Technical State University, USA), Ronald Campbell (North Carolina Agricultural and Technical State University, USA)
Article 2
Developing an Instrument for E-Public Services’ Acceptance Using Confirmatory Factor Analysis: Middle East Context (pages 18-44)
Ahmed Alzahrani (King Saud University, Saudi Arabia), Bernd Carsten Stahl (De Montfort University, UK), Mary Prior (De Montfort University, UK)
Article 3
Inhibitors and Enablers of Public E-Services in Lebanon (pages 45-68)
Antoine Harfouche (University of Tours, France), Alice Robbin (Indiana University Bloomington, USA)
Article 4
The Role of End User in E-Government Application Development: A Conceptual Model in the Agricultural Context (pages 69-85)
Shah Jahan Miah (University of the Sunshine Coast, Australia)
Issue 4
Article 1
End User Adoption of Enterprise Systems in Eastern and Western Cultures (pages 1-17)
Yujong Hwang (School of Accountancy and MIS, DePaul University, Chicago, USA & College of International Studies, Kyung Hee University, Seoul, Korea)
Article 2
The Role of Appraisal in Adapting to Information Systems (pages 18-40)
Kelly J. Fadel (Department of Management Information Systems, Jon M. Huntsman School of Business, Utah State University, Logan, UT, USA)
Article 3
A Study of Help Requested Online by Spreadsheet Users (pages 41-53)
Chris Chambers (School of Electrical Engineering and Computer Science, Oregon State University, Corvallis, OR, USA), Zachary Sommers (School of Electrical Engineering and Computer Science, Oregon State University, Corvallis, OR, USA), Christopher Scaffidi (School of Electrical Engineering and Computer Science, Oregon State University, Corvallis, OR, USA)
Article 4
Computer Self-Efficacy: A Meta-Analysis (pages 54-80)
Rex Karsten (Department of Management, College of Business Administration, University of Northern Iowa, Cedar Falls, IA, USA), Atul Mitra (College of Business Administration, University of Northern Iowa, Cedar Falls, IA, USA), Dennis Schmidt (College of Business Administration, University of Northern Iowa, Cedar Falls, IA, USA)
Volume 23 (2011)
Issue 1
Article 1
Evaluation of Information Strategy Implementation: A Critical Approach (pages 1-17)
Yongmei Bentley (University of Bedfordshire Business School, UK), Steve Clarke (University of Hull Business School, UK)
Article 2
The Value of TAM Antecedents in Global IS Development and Research (pages 18-37)
Chad S. Anderson (Georgia State University, USA), Said Al-Gahtani (King Khalid University, Saudi Arabia), Geoffrey Hubona (Virginia Commonwealth University, USA)
Article 3
Construct Validity Assessment in IS Research: Methods and Case Example of User Satisfaction Scale (pages 38-63)
Dewi Rooslani Tojib (Monash University, Australia), Ly-Fie Sugianto (Monash University, Australia)
Article 4
A Social Capital Perspective on IT Professionals’ Work Behavior and Attitude (pages 64-78)
Lixuan Zhang (Augusta State University, USA), Mary C. Jones (University of North Texas, USA)
Article 5
Gender Differences in E-Learning: Communication, Social Presence, and Learning Outcomes (pages 79-94)
Richard D. Johnson (University at Albany – SUNY, USA)
Issue 2
Article 1
Developers, Decision Makers, Strategists or Just End-users? Redefining End-User Computing for the 21st Century: A Case Study (pages 1-14)
Sandra Barker (University of South Australia, Australia), Brenton Fiedler (University of South Australia, Australia)
Article 2
Participation in ICT-Enabled Meetings (pages 15-36)
Katherine M. Chudoba (Utah State University, USA), Mary Beth Watson-Manheim (University of Illinois, Chicago, USA), Kevin Crowston (Syracuse University, USA), Chei Sian Lee (Nanyang Technological University, Singapore)
Article 3
In or Out: An Integrated Model of Individual Knowledge Source Choice (pages 37-56)
Yinglei Wang (Acadia University, Canada), Darren Meister (The University of Western Ontario, Canada), Peter H. Gray (University of Virginia, USA)
Article 4
Expert and Novice End-User Spreadsheet Debugging: A Comparative Study of Performance and Behaviour (pages 57-80)
Brian Bishop (Dundalk Institute of Technology, Ireland), Kevin McDaid (Dundalk Institute of Technology, Ireland)
Issue 3
Article 1
Understanding User Dissatisfaction: Exploring the Role of Fairness in IT-Enabled Change (pages 1-25)
Tim Klaus (Texas A&M University – Corpus Christi, USA)
Article 2
Antecedents of Improvisation in IT-Enabled Engineering Work (pages 26-47)
William J. Doll (The University of Toledo, USA), Xiaodong Deng (Oakland University, USA)
Article 3
Exploring the Dimensions and Effects of Computer Software Similarities in Computer Skills Transfer (pages 48-66)
Yuan Li (Columbia College, USA), Kuo-Chung Chang (Yuan Ze University, Taiwan)
Article 4
Preparing IS Students for Real-World Interaction with End Users Through Service Learning: A Proposed Organizational Model (pages 67-80)
Laura L. Hall (University of Texas at El Paso, USA), Roy D. Johnson (University of Pretoria, South Africa)
Article 5
The Role of Computer Attitudes in Enhancing Computer Competence in Training (pages 81-100)
James P. Downey (University of Central Arkansas, USA), Lloyd A. Smith (Missouri State University, USA)
Issue 4
Article 1
Development of a Mesh Generation Code with a Graphical Front-End: A Case Study (pages 1-16)
Jeffrey Carver (University of Alabama, USA)
Article 2
Characterizing Data Discovery and End-User Computing Needs in Clinical Translational Science (pages 17-30)
Parmit K. Chilana (University of Washington, USA), Elishema Fishman (University of Washington, USA), Estella M. Geraghty (University of California, Davis, USA), Peter Tarczy-Hornoch (University of Washington, USA), Fredric M. Wolf (University of Washington, USA), Nick R. Anderson (University of Washington, USA)
Article 3
Computational Engineering in the Cloud: Benefits and Challenges (pages 31-50)
Lorin Hochstein (USC Information Sciences Institute, USA), Brian Schott (Nimbis Services, USA), Robert B. Graybill (USC Information Sciences Institute, USA)
Article 4
Scientific End-User Developers and Barriers to User/Customer Engagement (pages 51-63)
Judith Segal (The Open University, UK), Chris Morris (STFC Daresbury Laboratory, UK)
Article 5
An Analysis of Process Characteristics for Developing Scientific Software (pages 64-79)
Diane Kelly (Royal Military College of Canada, Canada)
Volume 22 (2010)
Issue 1
Article 1
End-User Software Engineering and Why it Matters (pages 1-22)
Margaret Burnett (Oregon State University, USA)
Article 2
Studying the Documentation of an API for Enterprise Service-Oriented Architecture (pages 23-51)
Brad A. Myers (Carnegie Mellon University, USA), Sae Young Jeong (Carnegie Mellon University, USA), Yingyu Xie (Carnegie Mellon University, USA), Jack Beaton (Nokia, Inc., USA), Jeff Stylos (Carnegie Mellon University, USA), Ralf Ehret (SAP AG, Germany), Jan Karstens (SAP AG, Germany), Arkin Efeoglu (SAP AG, Germany), Daniela K. Busse (SAP Labs LLC, USA)
Article 3
End User Development and Meta-Design: Foundations for Cultures of Participation (pages 52-82)
Gerhard Fischer (University of Colorado, USA)
Issue 2
Article 1
WOAD: A Framework to Enable the End-User Development of Coordination-Oriented Functionalities (pages 1-20)
Federico Cabitza (Università degli Studi di Milano-Bicocca, Italy), Carla Simone (Università degli Studi di Milano-Bicocca, Italy)
Article 2
Entering the Clubhouse: Case Studies of Young Programmers Joining the Online Scratch Communities (pages 21-35)
Yasmin B. Kafai (University of Pennsylvania, USA), Deborah A Fields (University of California, Los Angeles, USA), William Q. Burke (University of Pennsylvania, USA)
Article 3
Mutual Development: The Software Engineering Context of End-User Development (pages 36-57)
Anders I. Mørch (University of Oslo, Norway), Renate Andersen (University of Oslo, Norway)
Article 4
Appropriation Infrastructure: Mediating Appropriation and Production Work (pages 58-81)
Gunnar Stevens (University of Siegen and Fraunhofer FIT, Germany), Volkmar Pipek (University of Siegen and Fraunhofer FIT, Germany), Volker Wulf (University of Siegen and Fraunhofer FIT, Germany)
Issue 3
Article 1
The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions (pages 1-21)
Allen C. Johnston (University of Alabama Birmingham, USA), Merrill Warkentin (Mississippi State University, USA)
Article 2
Enterprise Systems Training Strategies: Knowledge Levels and User Understanding (pages 22-39)
Tony Coulson (California State University, San Bernardino, USA), Lorne Olfman (Claremont Graduate University, USA), Terry Ryan (Claremont Graduate University, USA), Conrad Shayo (California State University, San Bernardino, USA)
Article 4
A Model of System Re-Configurability and Pedagogical Usability in an E-Learning Context: A Faculty Perspective (pages 66-81)
Jianfeng Wang (Mansfield University of Pennsylvania, USA), William J. Doll (The University of Toledo, USA), Xiaodong Deng (Oakland University, USA)
Article 5
A Path Analysis of the Impact of Application-Specific Perceptions of Computer Self-Efficacy and Anxiety on Technology Acceptance (pages 82-95)
Bassam Hasan (The University of Toledo, USA), Mesbah U. Ahmed (The University of Toledo, USA)
Issue 4
Article 1
Contrasting IT Capability and Organizational Types: Implications for Firm Performance (pages 1-23)
Terry Anthony Byrd (Auburn University, USA), Linda W. Byrd (Auburn University, USA)
Article 2
Utilization and Perceived Benefit for Diverse Users of Communities of Practice in a Healthcare Organization (pages 24-50)
Steven Walczak (University of Colorado Denver, USA), Richard Mann (Cardinal Health, USA)
Article 3
Self-Determined Adoption of an ICT System in a Work Organization (pages 51-69)
Eija Korpelainen (Helsinki University of Technology, Finland), Matti Vartiainen (Helsinki University of Technology, Finland), Mari Kira (Helsinki University of Technology, Finland)
Article 4
Investigating Technology Commitment in Instant Messaging Application Users (pages 70-94)
Y. Ken Wang (University of Pittsburgh at Bradford, USA), Pratim Datta (Kent State University, USA)
Article 5
Organizing End-User Training: A Case Study of an E-Bank and its Elderly Customers (pages 95-112)
Harri Oinas-Kukkonen (University of Oulu,Finland), Sari Hohtari (Kemi-Tornio University of Applied Sciences, Finland), Samuli Pekkola (Tampere University of Technology, Finland)
Volume 21 (2009)
Issue 1
Article 1
An Examination of the Impacts of Brand Equity, Security, and Personalization on Trust Processes in an E Commerce Environment (pages 1-36)
Catharina Stoecklin-Serino (Florida State University, USA), David Paradice (Florida State University, USA)
Article 2
Exploring Online Transaction Self-Efficacy in Trust Building in B2C E-Commerce (pages 37-59)
Young Hoon Kim (Rutgers University, USA), Dan J. Kim (University of Houstin Clear Lake, USA), Yujong Hwang (DePaul University, USA)
Article 3
Rebuilding Post-Violation Trust in B2C Electronic Commerce (pages 60-74)
Qinyu Liao (The University of Texas at Brownsville and Texas Southmost College, USA), Xin Luo (The University of New Mexico, USA), Anil Gurung (Neuamann College, USA)
Article 4
An Exploratory Study Into Delivery and Payment Choice Restriction (pages 75-87)
Kevin J. Shanahan (New Mexico State University, USA), Barbara Ross-Wooldridge (The University of Texas at Tyler, USA), Charles M. Hermans (Missouri State University, USA)
Article 5
Swift Trust in Web Vendors: The Role of Appearance and Functionality (pages 88-108)
Xin Li (University of North Carolina at PemBrook, USA), Guang Rong (Clemson University, USA), Jason B. Thatcher (Clemson University, USA)
Issue 2
Article 1
Using Metaphors for Making Sense of End-User Attitudes and Behavior during Information Systems Development (pages 1-27)
Zahid Hussain (University of Bradford, UK), Khalid Hafeez (The University of York, UK)
Article 2
End User Authentication (EUA) Model and Password for Security (pages 28-43)
George S. Oreku (Harbin Institute of Technology, China), Jianzhong Li (Harbin Institute of Technology and Heilongjiang University, China)
Article 3
A Model of the Relationship among Consumer Trust, Web Design and User Attributes (pages 44-66)
Xiaoni Zhang (Northern Kentucky University, USA), Victor R. Prybutok (University of North Texas, USA), Sherry Ryan (University of North Texas, USA), Robert Pavur (University of North Texas, USA)
Article 4
Capturing and Comprehending the Behavioral/Dynamical Interactions within an ERP Implementation (pages 67-89)
James R. Burns (Texas Tech University, USA), Don G. Jung (MyongJi University, Korea), James J. Hoffman (Texas Tech University, USA)
Issue 3
Article 1
An Empirical Study of Computer Self-Efficacy and the Technology Acceptance Model in the Military: A Case of a U.S. Navy Combat Information System (pages 1-23)
Yair Levy (Nova Southeastern University, USA), Bruce D. Green (The GBS Group, USA)
Article 2
Errors in Operational Spreadsheets (pages 24-36)
Stephen G. Powell (Dartmouth College, USA), Kenneth R. Baker (Dartmouth College, USA), Barry Lawson (Dartmouth College, USA)
Article 3
Organizational Factors and Information Technology Use: Tying Perceptions of the Organization to Perceptions of IT (pages 37-59)
Riza Ergun Arsal (Clemson University, USA), Jason Bennett Thatcher (Clemson University, USA), Thomas J. Zagenczyk (Clemson University, USA), D. Harrison McKnight (Michigan State University, USA), Manju K. Ahuja (University of Louisville, USA)
Article 4
An Investigation of Liking of Computers, Help Received, and Job Outcomes for Computer Workers (pages 60-79)
Ranida B. Harris (Indiana University Southeast, USA), Kent Marett (Mississippi State University, USA)
Article 5
Analysis of User Involvement and Participation on the Quality of IS Planning Projects: An Exploratory Study (pages 80-98)
Varadharajan Sridhar (Management Development Institute, India), Dhruv Nath (Management Development Institute, India), Amit Malik (Management Development Institute, India)
Issue 4
Article 1
Investigating the Effects of Distractions and Task Complexity on Knowledge Worker Productivity in the Context of Mobile Computing Environments (pages 1-20)
Darren B. Nicholson (Rowan University, USA), Jennifer A. Nicholson (Rowan University, USA), D. Veena Parboteeah (Eastern New Mexico University, USA), Joseph S. Valacich (Washington State University, USA)
Article 2
Accurately Determining Self-Efficacy for Computer Application Domains: An Empirical Comparison of Two Methodologies (pages 21-40)
James P. Downey (University of Central Arkansas, USA), R. Kelly Rainer Jr. (Auburn University, USA)
Article 3
A Theoretical Investigation and Extension of a Model of Information Technology Architecture Maturity (pages 41-62)
Randy V. Bradley (The University of Tennessee, USA), Terry Anthony Byrd (Auburn University, USA)
Article 4
Pervasive or Invasive? A Strategic Approach to IT-Enabled Access and Immediacy (pages 63-72)
Linda L. Brennan (Mercer University, USA)
Volume 20 (2008)
Issue 1
Article 1
Knowledge Management Systems Usage: Rating Scheme Validity and the Effort-Accuracy Trade-Off (pages 1-16)
Robin Poston (University of Memphis, USA), Cheri Speier (Michigan State University, USA)
Article 2
Knowledge Appraisal and Knowledge Management Systems: Judging What We Know (pages 17-34)
Hannah Standing Rasmussen (University of Western Ontario, Canada), Nicole Haggerty (University of Western Ontario, Canada)
Article 3
Rewarding End-Users for Participating in Organizational KM: A Case Study (pages 35-49)
M. N. Ravishankar (School of Business and Economics, Loughborough University, Loughborough, UK)
Article 4
Exploring System Use as a Measure of Knowledge Management Success (pages 50-63)
Murray E. Jennex (San Diego State University, USA)
Article 5
A Call for Change in the Call Center (pages 64-75)
Debbie Richards (Macquarie University, Australia)
Issue 2
Article 1
Diffusing Management Information for Legal Compliance: The Role of the IS Organization Within the Sarbanes-Oxley Act (pages 1-24)
Ashley Braganza (Cranfield University, UK), Ray Hackney (Brunel University, UK)
Article 3
End User Types: An Instrument to Clarify Users Based on the User Cube (pages 61-81)
Chittibabu Govindarajulu (Delaware State University, USA), Bay Arinze (Drexel University, USA)
Issue 3
Article 1
Social and Usage-Process Motivations for Consumer Internet Access (pages 1-21)
Thomas F. Stafford (University of Memphis, USA)
Article 2
Explicating Computer Self-Efficacy Relationships: Generality and the Overstated Case of Specificity Matching (pages 22-40)
James P. Downey Jr. (University of Central Arkansas, USA), R. Kelly Rainer (Auburn University, USA), Summer E. Bartczak (Air Force Institute of Technology, USA)
Article 3
Design of the PromoPad: An Automated Augmented-Reality Shopping Assistant (pages 41-56)
Wei Zhu (Michigan State University, USA), Charles B. Owen (Cheil Communications, Korea)
Article 4
Thinking Outside of the Ballot Box: Examining Public Trust in E-Voting Technology (pages 57-80)
Susan K. Lippert (Drexel University, USA), Ekundayo B. Ojumu (IBM Global Services, USA)
Issue 4
Article 1
Looking at Behavioral Innovativeness: A Rasch Analysis (pages 1-22)
Geoffrey N. Soutar (University of Western Australia, Australia), Steven Ward (Murdoch University, Australia)
Article 2
The Role of Media Richness in Information Technology-Supported Communication in Group Cohesion, Agreeability, and Performance (pages 23-44)
Michael B. Knight (Texas A&M University - Kingsville, USA), J. Michael Pearson (Southern Illinois University at Carbondale, USA), D. Scott Hunsinger (Appalachian State University, USA)
Article 3
Ratings Scheme Bias in E-Commerce: Preliminary Insights (pages 45-73)
Robin S. Poston (University of Memphis, USA), Marla B. Royne (University of Memphis, USA)
Article 4
Validating the End-User Computing Satisfaction Instrument for Online Shopping Systems (pages 74-96)
Chung-Tzer Liu (Soochow University, Taiwan), Yi Maggie Guo (University of Michigan – Dearborn, USA)
Volume 19 (2007)
Issue 1
Article 1
Two Experiments in Reducing Overconfidence in Spreadsheet Development (pages 1-23)
Raymond R. Panko (University of Hawai`i, USA)
Article 2
User Acceptance of Voice Recognition Technology: An Empirical Extension of the Technology Acceptance Model (pages 24-50)
Steven John Simon (Mercer University, USA), David Paper (Utah State University, USA)
Article 3
Educating Our Students in Computer Application Concepts: A Case for Problem-Based Learning (pages 51-61)
Peter P. Mykytyn (Southern Illinois University, USA)
Article 4
Covert End User Development: A Study of Success (pages 62-71)
Elaine H. Ferneley (University of Salford, UK)
Issue 2
Article 1
Are Information Systems' Success and Failure Factors Related? An Exploratory Study (pages 1-22)
Jeremy J. Fowler (La Trobe University, Australia), Pat Horan (La Trobe University, Australia)
Article 2
When Technology Does Not Support Learning: Conflicts Between Epistemological Beliefs and Technology Support in Virtual Learning Environments (pages 23-46)
Steven Hornik (University of Central Florida, USA), Richard D. Johnson (University of South Florida, USA), Yu Wu (University of Central Florida, USA)
Article 3
Combining Tailoring and Evolutionary Software Development for Rapidly Changing Business Systems (pages 47-64)
Jeanette Eriksson (Blekinge Institute of Technology, Sweden), Yvonne Dittrich (IT-University of Copenhagen, Denmark)
Issue 3
Article 1
Spreadsheet Errors and Decision Making: Evidence from Field Interviews (pages 1-23)
Jonathan P. Caulkins (Carnegie Mellon University Heinz School of Public Policy and Management & Qatar Campus, USA), Erica Layne Morrison (IBM Global Services, USA), Timothy Weidemann (Fairweather Consulting, USA)
Article 2
Inhibitors of Two Illegal Behaviors: Hacking and Shoplifting (pages 24-42)
Lixuan Zhang (College of Charleston, USA), Randall Young (University of North Texas, USA), Victor Prybutok (University of North Texas, USA)
Article 3
The Development and Empirical Validation of the B2E Portal User Satisfaction (B2EPUS) Scale (pages 43-63)
Dewi Rooslani Tojib (Monash University, Australia), Ly Fie Sugianto (Monash University, Australia)
Issue 4
Article 1
A Theoretical Model and Framework for Understanding Knowledge Management System Implementation (pages 1-21)
Tom Butler (University College Cork, Ireland), Ciara Heavin (University College Cork, Ireland), Finbarr O’Donovan (University College Cork, Ireland)
Article 2
The Role of Fit in Knowledge Management Systems: Tentative Propositions of the KMS Design (pages 22-41)
Peter Baloh (University of Ljubljana, Slovenia)
Article 3
Users as Developers: A Field Study of Call Centre Knowledge Work (pages 42-56)
Beryl Burns (University of Salford, UK), Ben Light (University of Salford, UK)
Article 4
Exploring the Factors Influencing End Users' Acceptance of Knowledge Management Systems: Development of a Research Model of Adoption and Continued Use (pages 57-79)
Jun Xu (Southern Cross University, Australia), Mohammed Quaddus (Curtin University of Technology, Australia)
Volume 18 (2006)
Issue 1
Article 1
Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users (pages 1-22)
J. Drennan (University of Technology, Australia), G. Sullivan (Griffith University, Australia), J. Previte (The University of Queensland, Australia)
Article 2
Privacy Statements as a Means of Uncertainty Reduction in WWW Interactions (pages 23-49)
Irene Pollach (Vienna University of Economics and Business Administration, Austria)
Article 3
Effectiveness of Computer Training: The Role of Multilevel Computer Self-Efficacy (pages 50-68)
Bassam Hasan (The University of Toledo, USA)
Issue 2
Article 1
Examining User Perceptions of Third-Party Organizations Credibility and Trust in an E-Retailer (pages 1-19)
Robin L. Wakefield (Hankamer School of Business, Baylor University, USA), Dwayne Whitten (Mays School of Business, Texas A&M University, USA)
Article 3
Evaluating Group Difference in Gender During the Formation of Relationship Quality and Loyalty in ISP Service (pages 38-62)
Chieh-Peng Ling (Vanung University, Taiwan), Cherng G. Ding (National Chiao Tung University, Taiwan)
Issue 3
Article 1
Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model (pages 1-24)
Tabitha James (Virginia Polytechnic Institute & State University, USA), Taner Pirim (Mississippi Center for Supercomputing Research, USA), Katherine Boswell (Middle Tennessee State University, USA), Brian Reithel (University of Mississippi, USA), Reza Barkhi (Virginia Polytechnic Institute & State University, USA)
Article 2
Intentions to Use Information Technologies: An Integrative Model (pages 25-46)
Ron Thompson (Wake Forest University, USA), Deborah Compeau (University of Western Ontario, Canada), Chris Higgins (University of Western Ontario, Canada)
Article 4
End User Computing Ergonomics: Facts or Fads? (pages 66-74)
Carol Clark (Middle Tennessee State University, USA)
Issue 4
Article 1
Super Users and Local Developers: The Organization of End-User Development in an Accounting Company (pages 1-21)
Hege-René Hansen Asand (University of Oslo, Norway), Anders I. Morch (University of Oslo, Norway)
Article 2
End-User Perceptions of the Benefits and Risks of End-User Web Development (pages 22-42)
Tanya McGill (Murdoch University, Australia), Chris Klisc (Murdoch University, Australia)
Article 3
Supporting Work Practice Through End-User Development Environments (pages 43-65)
M. F. Costabile (Universita di Bari, Italy), D. Fogli (Universita di Brescia, Italy), R. Lanzilotti (Universita di Milano, Italy)
Article 4
Semantic Composition of Web Portal Components (pages 66-87)
Jens Jahnke (University of Victoria, Canada), Yury Bychkov (University of Victoria, Canada), D. Dahlem (University of Victoria, Canada), L. Kawasme (University of Victoria, Canada)
Volume 17 (2005)
Issue 1
Article 1
Article 2
Business Software Specifications for Consumers: Toward a Standard Format (pages 23-37)
Shouhong Wang (University of Massachusetts, Dartmouth, USA)
Article 3
The Role of Internet Self-Efficacy in the Acceptance of Web-Based Electronic Medical Records (pages 38-57)
Qingxiong Ma (Central Missouri State University, USA), Liping Liu (University of Akron, USA)
Issue 2
Article 1
Learning to Use IT in the Workplace: Mechanisms and Masters (pages 1-25)
Valerie K. Spitler (University of North Florida, USA)
Article 2
Learning from Patterns During Information Technology Configuration (pages 26-42)
Keith S. Horton (Napier University, UK), Rick G. Dewar (Heriot-Watt University, UK)
Article 3
Impact of Personal Innovativeness on the Use of the Internet Among Employees at Work (pages 43-63)
Tor J. Larsen (Norwegian School of Management, Norway), Øystein Sorebo (Buskerud University College, Norway)
Article 4
User Behaving Badly: Phenomena and Paradoxes from an Investigation into Information System Misfit (pages 64-91)
Panagiotis Kanellis (Athens University of Economics and Business, Greece), Ray J. Paul (Brunel University, UK)
Issue 3
Article 1
A Comparison of Audio-Conferencing and Computer Conferencing in a Dispersed Negotiation Setting: Efficiency Matters! (pages 1-26)
Abbas Foroughi (University of Southern Indiana, USA), William C. Perkins (Indiana University, USA), Leonard M. Jessup (Washington State University, USA)
Article 2
The Effectiveness of Online Task Support vs. Instructor-Led Training (pages 27-46)
Ji-Ye Mao (City University of Hong Kong, Hong Kong), Bradley R. Brown (University of Waterloo, Canada)
Article 3
Issue 4
Article 1
Quality of Use of a Complex Technology: A Learning-Based Model (pages 1-22)
Marie-Claude Boudreau (The University of Georgia, USA), Larry Seligman (The University of Georgia, USA)
Article 2
Assessing Web-Enabled Interactivity: An Audit Tool (pages 23-48)
Barbara Marcolin (University of Calgary, Canada), Nicole Coviello (University of Auckland, New Zealand), Roger Milley (Shell Canada Limited, Canada)
Article 3
The Changing Demographics: The Diminishing Role of Age and Gender in Computer Usage (pages 49-65)
Michael B. Knight (Appalachian State University, USA), J. Michael Pearson (Southern Illinois University at Carbondale, USA)
Volume 16 (2004)
Issue 1
Article 1
Success Factors in the Implementation of a Collaborative Technology, and Resulting Productivity Improvements in a Small Business: An Exploratory Study (pages 1-20)
Nory B. Jones (University of Maine, USA), Thomas R. Kochtanek (University of Missouri, USA)
Article 2
Organizational Knowledge Sharing in ERP Implementation: Lessons from Industry (pages 21-40)
Mary C. Jones (University of North Texas, USA), R. Leon Price (University of Oklahoma, USA)
Article 3
The Effect of End User Development on End User Success (pages 41-58)
Tanya McGill (Murdoch University, Australia)
Article 4
The Technology Acceptance Model: A Meta-Analysis of Empirical Findings (pages 59-72)
Qingxiong Ma (Central Missouri State University, USA), Liping Liu (University of Akron, USA)
Issue 2
Article 1
Supporting the JAD Facilitator with the Nominal Group Technique (pages 1-19)
Evan W. Duggan (University of Alabama, USA), Cherian S. Thachenkary (Georgia State University, USA)
Article 2
Predicting Computer Task Performance: Personal Goal and Self-Efficacy (pages 20-37)
Mun Y. Yi (University of South Carolina, USA), Kun S. Im (Yonsei University, Korea)
Article 3
Perceived Control in Information Systems (pages 38-56)
Steven A. Morris (Middle Tennessee State University, USA), Thomas E. Marshall (Auburn University, USA)
Issue 3
Article 1
Electronic Banking and Information Assurance Issues: Surveys and Synthesis (pages 1-21)
Manish Gupta (State University of New York, USA), Raghav Rao (State University of New York, USA), Shambhu Upadhyaya (State University of New York, USA)
Article 2
Computer Security and Risky Computing Practices: A Rational Choice Perspective (pages 22-40)
Kregg Aytes (Idaho State University, USA), Terry Connolly (University of Arizona, USA)
Article 3
Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security (pages 41-58)
Merrill Warkentin (Mississippi State University, USA), Kimberly Davis (Mississippi State University, USA), Ernst Bekkering (Mississippi State University, USA)
Article 4
Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics? (pages 59-77)
Bernd Carsten Stahl (De Montfort University, UK)
Issue 4
Article 1
Toward a Comprehensive Framework: EUC Research Issues and Trends (1999-2000) (pages 1-16)
James P. Downey (University of Central Arkansas, USA)
Article 2
Testing the Technology-to-Performance Chain Model (pages 17-36)
D. Sandy Staples (Queen’s University, Canada), Peter Seddon (The University of Melbourne, Australia)
Article 3
Asynchronous Learning Using a Hybrid Learning Package: A Teacher Development Strategy in Geography (pages 37-54)
Kalyani Chatterjea (Nanyang Technological University, Singapore)
Article 4
Applying Strategies to Overcome User Resistance in a Group of Clinical Managers to a Business Software Application: A Case Study (pages 55-64)
Barbara Adams (Cyrus Medical Systems, USA), Eta S. Berner (University of Alabama at Birmingham, USA), Joni Rousse Wyatt (Norwood Clinic, Inc., USA)
Volume 15 (2003)
Issue 1
Article 1
Some UK and USA Comparisons of Executive Information Systems in Practice and Theory (pages 1-19)
Xianzhong M. Xu (University of Portsmouth, UK), Brian Lehaney (Coventry University, UK), Steve Clarke (University of Luton, UK), Yanqing Duan (University of Luton, UK)
Article 2
Framework for Cognitive Skill Acquisition and Spreadsheet Training (pages 20-37)
S. E. Kruck (James Madison University, USA), John J. Maher (Virginia Polytechnic Institute & State Univ., USA), Reza Barkhi (Virginia Polytechnic Institute & State Univ., USA)
Article 3
The Roles of Computer Self-Efficacy and Outcome Expectancy in Influencing the Computer End-User's Organizational Commitment (pages 38-53)
Robert W. Stone (University of Idaho, USA), John W. Henry (Georgia Southern University, USA)
Article 4
Internetalization of End-Users (pages 54-56)
A. K. Aggarwal (University of Baltimore, USA)
Issue 2
Article 1
Understanding the Hidden Dissatisfaction of Users toward End-User Computing (pages 1-22)
Nancy Shaw (George Mason University, USA), Joo-Eng Lee-Partridge (Central Connecticut State University, USA), James S. Ang (National University in Singapore, Singapore)
Article 2
The Impact of Computer Processor Speed on End-User Productivity (pages 23-36)
David C. Wierschem (Texas A&M University, USA), Thomas L. Brodnax (Texas A&M University, USA)
Article 3
Article 4
Exploring the Effects of Hardware Performance, Application Design and Cognitive Demands on User Productivity and Perceptions (pages 54-74)
Andrew Sears (University of Maryland Baltimore County, USA), Julie A. Jacko (Georgia Institute of Technology, USA)
Issue 3
Article 1
TAM or Just Plain Habit: A Look at Experienced Online Shoppers (pages 1-13)
David Gefen (Drexel University, USA)
Article 2
Assessing Customer Perceptions of Website Service Quality in Digital Marketing Environments (pages 14-31)
Yi-Shun Wang (National Changhua University of Education, Taiwan), Tzung-I Tang (National Chengchi University, Taiwan)
Article 3
On-Line Retailing: What Drives Success? Evidence from Ireland (pages 32-44)
William Golden (National University of Ireland Galway, Ireland), Marsha Hughes (National University of Ireland Galway, Ireland), Patricia Gallagher (IBM Global Services, Ireland)
Article 4
Website Retailing: Electronic Supply Chain Replenishment (pages 45-55)
Lori N. Leonard (University of Tulsa, USA), Timothy P. Cronan (University of Arkansas Fayetteville, USA)
Issue 4
Article 1
Toward an Integrative Framework for Online Consumer Behavior Research: A Meta-Analysis Approach (pages 1-26)
Khawaja A. Saeed (University of South Carolina, USA), Yujong Hwang (DePaul University, USA), Mun Y. Yi (University of South Carolina, USA)
Article 2
Understanding Web Information Search Behavior: An Exploratory Model (pages 27-48)
Christopher Hodkinson (Griffith University, Australia), Geoffrey Kiel (University of Queensland Business School, Australia)
Article 3
Patient Health Information Search: An Exploratory Model of Web-based Search Behavior (pages 49-61)
Jason E. Lueg (Mississippi State University, USA), Robert S. Moore (Mississippi State University, USA), Merrill Warkentin (Mississippi State University, USA)
Article 4
Customer Perceptions of a Thin-Client Micro-Payment System: Issues and Experiences (pages 62-77)
Xiaoling Dai (University of Auckland, New Zealand), John Grundy (University of Auckland, New Zealand)
Article 5
Virtual Reality, Involvement and the Consumer Interface (pages 78-96)
John Gammack (Griffith University, Australia), Christopher Hodkinson (Griffith University, Australia)
Volume 14 (2002)
Issue 1
Article 1
The Focus of Research in End User Computing: Where Have We Come Since the 1980s? (pages 3-22)
Ann Powell (Southern Illinois University-Edwardsville, USA), Jo E. Moore (Southern Illinois University-Edwardsville, USA)
Article 2
The Role of Trainer Behavior in End User Software Training (pages 23-32)
Deborah Compeau (University of Calgary, Canada)
Article 3
Towards User-Oriented Control of End-User Computing in Large Organizations (pages 33-41)
Neil McBride (DeMontfort University, UK), A. Trevor Wood-Harper (University of Salford, UK)
Issue 2
Article 1
End-User Perspectives on the Uptake of Computer Supported Cooperative Working (pages 3-15)
Phil Turner (Napier University, Scotland), Susan Turner (Napier University, Scotland)
Article 2
How Does Attitude Impact IT Implementation: A Study of Small Business Owners (pages 16-29)
Elaine R. Winston (Hofstra University, USA), Dorothy Dologite (Baruch College, City University of New York, USA)
Article 3
A Three-Tier Technology Training Strategy in a Dynamic Business Environment (pages 30-39)
Albert Huang (University of the Pacific, USA)
Article 4
A Study of Computer Attitudes of Non-Computing Students of Technical Colleges in Brunei Darussalam (pages 40-47)
Afzaal H. Seyal (Institute Technology Brunei, Brunei Darussalam), Mahbubur M. Rahim (Institute Technology Brunei, Brunei Darussalam), M. Noah Rahman (Institute Technology Brunei, Brunei Darussalam)
Issue 3
Article 1
User-Developed Applications: Can End Users Assess Quality? (pages 1-15)
Tanya J. McGill (Murdoch University, Australia)
Article 2
Effectiveness of Systems Analysis and Design Education: An Exploratory Study (pages 16-31)
Rajiv Kohli (University of Notre Dame, USA), Jatinder N. Gupta (University of Alabama in Huntsville, USA)
Article 3
Environmental and Person Antecedents of Telecommuting Outcomes (pages 32-50)
Victor Y. Haines III (University of Sherbrooke, Canada), Silvie St-Onge (Ecole des Hautes Etudes Commerciales, Canada), Martine Archambault (University of Sherbrooke, Canada)
Article 4
A Visual Code Inspection Approach to Reduce Spreadsheet Linking Errors (pages 51-63)
Mike Morrison (University of Wisconsin-Eau Claire, USA), Joline Morrison (University of Wisconsin-Eau Claire, USA), John Melrose (University of Wisconsin-Eau Claire, USA), E. Vance Wilson (Arizona State University, USA)
Issue 4
Article 1
Toward an Understanding of the Behavioral Intention to Use a Groupware Application (pages 1-16)
Yining Chen (Ohio University, USA), Hao Lou (Ohio University, USA)
Article 3
Selecting High-Performing Information Technology Professionals (pages 37-50)
L. A. Witt (University of New Orleans, USA), L. A. Burke (Louisiana State University-Shreveport, USA)
Article 4
An Analysis of IS Professional and End User Causal Attributions for User-System Outcomes (pages 51-73)
Rex Karsten (University of Northern Iowa, USA)
Volume 13 (2001)
Issue 1
Article 1
The Assessment of Software Quality from the User Perspective: Evaluation of a GIS Implementation (pages 3-11)
Brownwyn Huitfeldt (Queensland Department of Natural Resources, Australia), Michael Middleton (Queensland University of Technology, Australia)
Article 2
The Relationship Between User Participation and the Management of Change Surrounding the Development of Information Systems: A European Perspective (pages 12-25)
Tom Butler (University College Cork, Ireland), Brian Fitzgerald (University College Cork, Ireland)
Article 3
Influence of Computer Attitude and Self-Efficacy on IT Usage Behavior (pages 26-33)
Patrick Y. Chau (University of Hong Kong, Hong Kong)
Article 4
VDT Health Hazards: A Guide for End Users and Managers (pages 34-39)
Carol Clark (Middle Tennessee State University, USA)
Issue 2
Article 1
A Study of Remote Workers and Their Differences from Non-Remote Workers (pages 3-14)
D. Sandy Staples (Queen’s University, Canada)
Article 2
A Comparison of Surrogate Success Measures in Ongoing Representation Decision Support Systems: An Extension to Simulation Technology (pages 15-25)
Roger McHaney (Kansas State University, USA), Timothy P. Cronan (University of Arkansas, USA)
Article 3
The Effect of Individual Differences on Computer Attitudes: An Empirical Study (pages 26-39)
Claudia Orr (Northern Michigan University, USA), David Allen (Northern Michigan University, USA), Sandra Poindexter (Northern Michigan University, USA)
Article 4
The Effect of Attitudes, Goal Setting and Self-Efficacy on End User Performance (pages 40-45)
I. M. Jawahar (Illinois State University, USA), B. Elango (Illinois State University, USA)
Issue 3
Article 1
Nursing Staff Requirements for Telemedicine in the Neonatal Intensive Care Unit (pages 5-13)
Tara Qavi (User Centred Design Specialist, UK), Lisa Corley (University of Salford, UK), Steve Kay (University of Salford, UK)
Article 2
Scanning and Image Processing System (SIPS) for Medication Ordering (pages 14-19)
Stephen L. Chan (Hong Kong Baptist University, Hong Kong)
Article 3
Organizational and Implementation Issues of Patient Data Management Systems in an Intensive Care Unit (pages 20-29)
Nathalie Mitev (London School of Economics, UK), Sharon Kerkham (Salford University, UK)
Article 4
Studying the Translations of NHSnet (pages 30-40)
Edgar A. Whitley (London School of Economics and Political Science, UK), Athanasia Pouloudi (Brunel University, UK)
Issue 4
Article 1
The Importance of User Ownership and Positive User Attitudes in the Successful Adoption of Community Information Systems (pages 5-16)
C. R. Coombs (Loughborough University, UK), N. F. Doherty (Loughborough University, UK), J. Loan-Clarke (Loughborough University, UK)
Article 2
Experiences from Health Information System Implementation Projects Reported in Canada Between 1991 and 1997 (pages 17-25)
Francis Lau (University of Alberta, Canada), Marilynne Hebert (University of British Columbia, Canada)
Article 3
Introducing Computer-Based Telemedicine in Three Rural Missouri Counties (pages 26-35)
Kimberly D. Harris (Duquesne University, USA), Joseph F. Donaldson (University of Missouri-Columbia, USA), James D. Campbell (University of Missouri-Columbia, USA)
Volume 12 (2000)
Issue 1
Article 1
The Role of Training in Preparing End Users to Learn Related Software (pages 3-13)
Conrad Shayo (California State University-San Bernardino, USA), Lorne Olfman (Claremont Graduate University, USA)
Article 2
The Impact of Task and Cognitive Style on Decision-making Effectiveness Using a Geographic Information System (pages 14-23)
Martin D. Crossland (Southwest Missouri State University, USA), Richard T. Herschel (St. Joseph’s University, USA), William C. Perkins (Indiana University, USA), Joseph N. Scudder (Northern Illinois University, USA)
Article 3
Schools of Thought in Research into End-User Computing Success (pages 24-34)
Roger W. Harris (Universiti Malaysia Sarawak, Malaysia)
Article 4
Shifting Paradigms: The New Informated Business Architecture (pages 35-43)
Andrew S. Targowski (Western Michigan University, USA), Thomas A. Carey (Western Michigan University, USA)
Issue 2
Article 1
Pricing Strategies and Technologies for On-Line Delivered Content (pages 4-10)
Martin Bichler (Vienna University of Economics and Business Administration, Australia), Claudia Loebbecke (Copenhagen Business School, Denmark)
Article 2
Digital News: Content, Delivery, and Value Propositions for an Intangible Product (pages 11-19)
Jonathan W. Palmer (University of Maryland, USA), Lars B. Eriksen (University of Aalborg, Denmark)
Article 3
Commercialization of Electronic Information (pages 20-31)
Jean-Henry Morin (University of Geneva, Switzerland), Dimitri Konstantas (University of Geneva, Switzerland)
Article 4
Signalling Intentions and Obliging Behavior Online: An Application of Semiotic and Legal Modeling in E-Commerce (pages 33-42)
James Backhouse (London School of Economics, UK), Edward K. Cheng (Harvard Law School, USA)
Article 5
Issue 3
Article 1
End Users as Expert System Developers? (pages 3-13)
Christian Wagner (City University of Hong Kong, Hong Kong)
Article 2
Designing End-User Geographic Information Systems (pages 14-22)
Lawrence A. West (University of Central Florida, USA)
Article 3
An Architecture for Organizational Decision Support Systems that Utilizes a Model Coordination Subsystem (pages 23-34)
Gyeung-Min J. Kim (Morgan State University, USA), James R. Burns (Texas Tech University, USA), Rohae Myung (Morgan State University, USA)
Issue 4
Article 1
Web-User Satisfaction: An Exploratory Study (pages 3-10)
James R. Otto (Villanova University, USA), Mohammad K. Najdawi (Villanova University, USA), Karen M. Caron (Villanova University, USA)
Article 2
The Impact of Gender and Experience on User Confidence in Electronic Mail (pages 11-20)
John A. Hoxmeier (Colorado State University, USA), Winter Nie (American Graduate School of International Management, USA), G. Thomas Purvis (Hewlett-Packard Corporation, USA)
Article 3
Perceived Value and Technology Adoption Across Four End User Groups (pages 21-28)
Jaak Jurison (Fordham University, USA)
Volume 11 (1999)
Issue 1
Article 1
Exploring the Measurement of End User Computing Success (pages 5-14)
Conrad Shayo (CA State University, San Bernardino, USA), Ruth Guthrie (CA Polytechnic University of Pomona, USA), Magid Igbaria (Claremont Graduate University, USA)
Article 2
Constructive Design Environments: Implementing End User Systems Development (pages 15-23)
John G. Gammack (Murdoch University, Australia)
Article 3
Strategies for Managing EUC on the Web (pages 24-31)
R. Ryan Nelson (University of Virginia, USA), Peter Todd (University of Houston, USA)
Article 4
Rethinking End-User Training Strategy: Applying a Hierarchical Knowledge-Level Model (pages 32-39)
Maung Sein (Agder College, Norway), Robert P. Bostrom (University of Georgia, USA), Lorne Olfman (Claremont Graduate University, USA)
Article 5
Knowledge Transfer in Conceptual Modeling by End Users (pages 40-51)
Laku Chidambaram (Indiana University, USA)
Issue 2
Article 1
Strategic Information Systems Planning: Perspectives on the Role of the “End User” Revisited (pages 3-12)
Ray Hackney (Manchester Metropolitan University, UK), John Kawalek (Sheffield Hallam University, UK), Gurpreet Dhillon (University of Nevada, Las Vegas, USA)
Article 2
Copyright, Piracy, Privacy, and Security Issues: Acceptable or Unacceptable Actions for End Users? (pages 13-20)
Jennifer Kreie (University of Arkansas, USA), Timothy Paul Cronan (University of Arkansas, USA)
Article 3
The Relationship Between User Satisfaction and Systems Usage: Empirical Evidence from Egypt (pages 21-28)
Omar E.M. Khalil (University of MA Dartmouth, USA), Manal M. Elkordy (Alexandria University, Egypt)
Issue 3
Article 1
Beyond Backpropagation: Using Simulated Annealing for Training Neural Networks (pages 3-10)
Randall S. Sexton (Ball State University, USA), Robert E. Dorsey (University of Mississippi, USA), John D. Johnson (University of Mississippi, USA)
Article 2
A New Approach to Evaluating Business Ethics: An Artificial Neural Networks Application (pages 11-19)
Mo Adam Mahmood (University of Texas, El Paso, USA), Gary L. Sullivan (University of Texas, El Paso, USA), Ray-Lin Tung (University of Texas, El Paso, USA)
Article 3
DSS Model Usage in Public and Private Sectors: Differences and Implications (pages 20-28)
Anil Aggarwal (University of Baltimore, USA), Rajesh Mirani (University of Baltimore, USA)
Issue 4
Article 1
The Reality of User-Centered Design (pages 5-15)
Susan Gasson (Binghamton University, State Univ NY, USA)
Article 2
Measuring the Impact of Information Systems on Organizational Behavior (pages 16-21)
R. Wayne Headrick (New Mexico State University, USA), George W. Morgan (Southwest Texas State University, USA)
Article 3
What’s in a Name?: Exploring the Metaphorical Implications of Data Warehousing in Concept and Practice (pages 22-32)
Elizabeth J. Davidson (University of Hawaii Manoa, USA)
Article 4
The Human Side of Information Systems Development: A Case of an Intervention at a British Visitor Attraction (pages 33-39)
Brian Lehaney (University of Luton Business School, UK), Steve Clarke (University of Luton Business School, UK), Vikki Kimberlee (University of Luton Business School, UK), Sarah Spencer-Matthews (Swinburne University of Technology, Australia)
Article 5
The Wicked Relationship between Organizations and Information Technology (pages 40-51)
Gill Mallalieu (University of Sunderland, UK), Clare Harvey (University of Sunderland, UK), Colin Hardy (University of Sunderland, UK)
Volume 10 (1998)
Issue 1
Article 1
Communicating Project Drift Through Cost/Benefit Scenarios (pages 5-11)
David Mccomb (First Principles, Inc., USA), Jill Smith Slater (University of Denver, USA)
Article 2
The Soft System Methodology as a Framework for Software Process Improvement (pages 12-19)
Peter D.C. Bennetts (Cheltenham and Gloucester College of Higher Education, UK), A. Trevor Wood-Harper (University of Salford, UK), Stella Mills (Cheltenham and Gloucester College of Higher Education, UK)
Article 3
An Analysis of Excluded IS Processes in the Capability Maturity Model and Their Potential Impact (pages 20-29)
Russell L. Purvis (University of Central Florida, USA), Jose Santiago (University of Central Florida, USA), V. Sambamurthy (Florida State University, USA)
Issue 2
Article 1
The Place of User Enhanceability in User-Oriented Software Development (pages 3-14)
Nikolay Mehandjiev (University of Hull, UK), Leonardo Bottaci (University of Hull, UK)
Article 2
What We Know About Spreadsheet Errors (pages 15-21)
Raymond R. Panko (University of Hawaii, USA)
Article 3
Tailoring Tools for System Development (pages 22-29)
Anders I. Mørch (University of Bergen, Norway)
Article 4
End-User Programming in Three Dimensions (pages 30-37)
Natalia Kowalczyk (University of Gdansk, Poland)
Article 5
Supporting Large-Scale End User Specification of Workflows, Work Coordination and Tool Integration (pages 38-48)
John Grundy (University of Waikato, New Zealand), John Hosking (University of Auckland, New Zealand), Warwick Mugridge (University of Auckland, New Zealand)
Issue 3
Article 1
The Effects of Conceptual Consistency on the End User’s Mental Models of Multiple Applications (pages 3-15)
John W. Satzinger (Southwest Missouri State University, USA)
Article 2
A Survey of Factors Affecting Physical Discomfort at a Computer Workstation (pages 16-26)
Tung Lai Lai (Nanyang Technological University, Singapore), Kyung Kyu Kim (Nanyang Technological University, Singapore), Ang Kah Eng (Nanyang Technological University, Singapore), Neo Aik Keong (Nanyang Technological University, Singapore), Pang Soh Chui (Nanyang Technological University, Singapore)
Article 3
Preparing Future Technology Users (pages 27-31)
Mary J. Granger (George Washington University, USA), Susan K. Lippert (George Washington University, USA)
Issue 4
Article 1
The Effects of Environmental Factors on the Adoption and Diffusion of Telework (pages 5-14)
Cynthia Ruppel (University of Toledo, USA), Geoffry S. Howard (Kent State University, USA)
Article 2
The Work Experiences of Professional Men and Women Who Telecommute: Convergence or Divergence? (pages 15-22)
Donna W. Mccloskey (Widener University, USA), Magid Igbaria (Claremont Graduate University, USA and Tel Aviv University, Israel), Saroj Parasuraman (Drexel University, USA)
Article 3
Managers: A Key Ingredient to Alternative (pages 23-32)
C. Bruce Kavan (University of North Florida, USA), Carol Stoak Saunders (University of Oklahoma, USA)
Article 4
Work Ethic Differences Between Traditional and Telework Employees (pages 33-41)
Ruth A. Guthrie (University of Redlands, USA), James B. Pick (University of Redlands, USA)
Article 5
Family Structure and the Telecommuter’s Quality of Life (pages 42-49)
Terri L. Dixon (Sumitomo Electric Lightwave Corp., USA), Jane Webster (University of Waterloo, Canada)
Volume 9 (1997)
Issue 1
Article 1
Article 2
Article 3
An Information Abstraction Model for End User CASE Support (pages 28-34)
Shirley Becker (American University, USA), Rick Gibson (American University, USA)
Issue 2
Article 1
Assessing User Computing Effectiveness: An Integrated Model (pages 3-15)
Tor Guimaraes (Tennessee Technological University, USA), Magid Igbaria (Claremont Graduate School, USA)
Article 2
Effects of User Characteristics on Computer Attitudes Among Undergraduate Business Students (pages 16-23)
Ibrahim M. Al-Jabri (King Fahd University of Petroleum and Minerals, Saudi Arabia), Muhammad A. Al-Khaldi (King Fahd University of Petroleum and Minerals, Saudi Arabia)
Article 3
Confirmatory Factor Analysis of the End-User Computing Satisfaction Instrument: A Replication (pages 24-31)
William J. Doll (University of Toledo, USA), Weidong Xia (University of Pittsburgh, USA)
Issue 3
Article 1
End User Ability: Impact of Job and Individual Differences (pages 3-13)
Barbara Marcolin (University of Calgary, Canada), Malcolm Munro (University of Calgary, Canada), Kevin Campbell (National Energy Board, Canada)
Article 2
End User Training: An Experimental Comparison of Lecture versus Computer-Based Training (pages 14-27)
George A. Bohlen (University of Dayton, USA), Thomas W. Ferratt (University of Dayton, USA)
Issue 4
Article 1
An Attributional Analysis of the Rejection of Information Technology (pages 3-18)
John W. Henry (Georgia Southern University, USA), Mark J. Martinko (Florida State University, USA)
Article 2
Determinants of Variability in Function Point Estimates (pages 19-28)
Ashok Subramanian (University of Missouri, USA), Mary C. Lacity (University of Missouri, USA)
Article 3
Hierarchy of End User Computing Needs: An Empirical Investigation (pages 29-35)
Mohammed H.A. Tafti (Hofstra University, USA), Ashraf I. Shirani (Hofstra University, USA)
Volume 8 (1996)
Issue 1
Article 1
An Investigation of the Relationship Between Managerial Personality Type and Computer Use (pages 4-12)
Charles H. Mawhinney (Metropolitan State College of Denver, USA), Albert L. Lederer (University of Kentucky, USA)
Article 2
A Study of End User Computing and the Provision of Tool Support to Advance End User Empowerment (pages 13-21)
H.U. Shah (Aston University, UK), D.R. Lawrence (University of Wolverhampton, UK)
Article 3
Office Computer Systems in Healthcare: Use and Assessment (pages 22-30)
Judy L. Wynekoop (University of Texas, San Antonio, USA)
Issue 2
Article 1
Definition and Measurement of End User Computing Sophisticiation (pages 3-13)
Samir Blili (Université du Québec à Trois-Rivières, Canada), Louis Raymond (Université du Québec à Trois-Rivières, Canada), Suzanne Rivard (Ecole des Hautes Etudes Commerciales, Canada)
Article 2
Knowledge Transfer from Expert Systems vs. Traditional Instruction: Do Personality Traits Make a Difference? (pages 14-20)
Marcus D. Odom (University of Southwestern LA, USA), Hamid Pourjalali (University of Southwestern LA, USA)
Article 3
A Methodology for Evaluating EIS Software Packages (pages 21-31)
Dae-Ho Byun (Kyungsung University, South Korea), Eui-Ho Suh (POSTECH, South Korea)
Issue 3
Article 1
A Comparison of Foreign Government Computing Policies (pages 3-10)
Rick Gibson (American University, USA), Mary Alice Mcdonough (Computer Data Systems, USA)
Article 2
Computer Use Patterns (pages 11-14)
Terry D. Lundgren (Eastern Illinois University, USA), Carol A. Lundgren (Eastern Illinois University, USA)
Article 3
The Impact of Decision Support Training on Computer Use: The Effect of Prior Training, Age, and Gender (pages 15-23)
F. Nelson Ford (Auburn University, USA), William N. Ledbetter (Middle Tennessee State University, USA), Tom L. Roberts (Middle Tennessee State University, USA)
Issue 4
Article 1
Determinants of Microcomputer Usage in the Republic of Ireland (pages 3-10)
Marilyn L. Wilkins (Eastern Illinois University, USA)
Article 2
Graduate Business Students as Surrogates for Executives in the Evaluation of Technology (pages 11-19)
Robert Owen Briggs (University of Arizona, USA), Pierre A. Balthazard (University of Arizona, USA), Alan R. Dennis (University of Georgia, USA)
Article 3
A Markup Approach to Surveys and Questionnaires (pages 20-27)
Jeffrey Hsu (Rutgers University, USA), Murray Turoff (New Jersey Institute of Technology, USA)
Volume 7 (1995)
Issue 1
Article 1
Faculty Use of Electronic Communications Before and After a LAN Installation: A Three-Year Analysis (pages 4-12)
Marilyn L. Wilkins (Eastern Illinois University, USA), Karen Nantz (Eastern Illinois University, USA)
Article 2
Examing the Process of Electronic-JAD (pages 13-22)
Erran Carmel (American University, USA), Joey F. George (Florida State University, USA), Jay F. Nunamaker Jr. (University of Arizona, USA)
Issue 2
Article 1
Can DSS Technology Improve Group Decision Performance for End Users?: An Experimental Study (pages 3-11)
David Gundersen (Stephen Austin University, USA), Donald Davis (University of Southern Mississippi, USA), D.F. Davis (University of Southern Mississippi, USA)
Article 2
Teaching End-User Applications with Computer-Based Training: Theory and an Empirical Investigation (pages 12-18)
Brent Bowman (University of Nevada, USA), Fritze Grupe (University of Nevada, USA), Mark G. Simkin (University of Nevada, USA)
Issue 3
Article 1
Supporting Appropriate User-Developed Applications: Guidelines for Managers (pages 3-11)
Laura Lally (Hofstra University, USA)
Article 2
Issue 4
Article 1
Cross-Cultural Teamwork in End User Computing: A Theoretical Model (pages 4-11)
Regina F. Bento (University of Baltimore, USA)
Article 3
Work Perceptions Among Hong Kong and United States I/S Workers: A Cross-Cultural Comparison (pages 22-29)
Norman B. Bryan (University of North Carolina, USA), Ephraim R. Mclean (Georgia State University, USA), Stanley J. Smits (Georgia State University, USA), Janice Burn (Hong Kong Polytechnic, Hong Kong)
Volume 6 (1994)
Issue 1
Article 1
A Foundation for the Use of Hypertext-based Documentation Techniques (pages 4-15)
Julie E. Kendall (Rutgers University-Camden, USA), Pentti Kerola (Oulu University, Finland)
Article 2
Small Business Attitudes Toward Computers (pages 16-25)
Charles M. Ray (Ball State University, USA), Thomas M. Harris (Ball State University, USA), J. Lee Dye (Ball State University, USA)
Issue 2
Article 1
Consistency in Human-Computer Interfaces for End-Users (pages 3-10)
Chang-Tseh Hsieh (University of Southern Mississippi, USA), Ming-Te Lu (Metropolitan State University, USA), Engming Lin (Eastern Kentucky University, USA)
Article 2
The Relationship of Application Risks to Application Controls: A Study of Microcomputer-based Spreadsheet Applications (pages 11-18)
Robert Schultheis (Southern Illinois University, Edwardsville, USA), Mary Sumner (Southern Illinois University, Edwardsville, USA)
Article 3
Computer Virus Folklore (pages 19-23)
Terry D. Lundgren (Eastern Illinois University, USA)
Issue 3
Article 1
The Accountant’s Contribution to Executive Information Systems (pages 3-11)
Mary B. Curtis (University of Kentucky, USA)
Article 2
Groupware at Work: Users’ Experience With Lotus Notes (pages 12-21)
Hao Lou (Ohio University, USA)
Article 3
Health and Stress Issues of Office Automation: A Singapore Study (pages 22-31)
Shailendra Palvia (Nanyang Technological University, Singapore), Lai Lai Tung (Nanyang Technological University (NTU), Singapore)
Issue 4
Article 1
Key Issues in the MIS Implementation Process: An Update Using End User Computing Satisfaction (pages 3-14)
Peggy L. Lane (Indiana University/Purdue University, USA), Jeffrey Palko (Northwestern State University of LA, USA), Timothy Paul Cronan (University of Arkansas, USA)
Article 2
Trends in Information Technology in Small Businesses (pages 15-25)
Georgios I. Doukidis (Athens University of Economics, Greece), Steve Smithson (London School of Economics, UK), Takis Lybereas (Warwick Business School, UK)
Volume 5 (1993)
Issue 1
Article 1
KARTT: A Multimedia Tool to Help Students Learn Knowledge Acquisition (pages 5-17)
Karen Bland (IBM Corporation, USA), Jay Liebowitz (George Washington University, USA)
Article 2
Article 3
Computer Information Satisfaction: A Longitudinal Study of Computing Systems and EUC in a Public Organization (pages 27-36)
Kristy D. Glorfeld (University of Arkansas, USA), Timothy Paul Cronan (University of Arkansas, USA)
Issue 2
Article 1
A 4GL Based Executive Search System (pages 5-17)
Ruediger Mueller (University of Wisconsin-Oshkosh, USA)
Article 2
Structured Techniques for Successful End User Spreadsheets (pages 18-25)
Harry Benham (Montana State University, USA), Michael Delaney (Saint Joseph’s University, USA), Andrew Luzi (California State University, Fullerton, USA)
Article 3
Organizational Impact of Decision Support Technology: What’s Ahead for the ‘90s? (pages 26-30)
Fred K. Augustine (Stetson University, USA), Theordore J. Surynt (Stetson University, USA), Frank A. Dezoort (Stetson University, USA), Daniel K. Rosetti (Stetson University, USA)
Issue 3
Article 1
MCPS—The Multimedia Computing Presentation System (pages 5-16)
Sorel Reisman (California State University, Fullerton, USA)
Article 2
Object-Oriented Cost Accounting System Design (pages 17-25)
John E. Gessford (California State University, Long Beach, USA)
Article 3
Using Innovative Information Technology Architecture for Entrepreneurial Success: The Case of “YCH” Logistics Company (pages 26-33)
Shailendra C. Palvia (Nanyang Technological University (NTU), Singapore), Boon Siong Neo (Nanyang Technological University (NTU), Singapore)
Issue 4
Article 1
An Examination of Sources of Support Preferred By End-User Computing Personnel (pages 4-11)
Brent Bowman (University of Nevada, Reno, USA), Gritz H. Grupe (University of Nevada, Reno, USA), Daulatram Lund (University of Nevada, Reno, USA), Winnie D. Moore (University of Nevada, Reno, USA)
Article 2
Why Microcomputers May Increase the Cost of Doing Business (pages 12-19)
Gary Adna Ames (University of Nebraska-Lincoln, USA)
Volume 4 (1992)
Issue 1
Article 1
A Survey of Micro-Mainframe Links (pages 1-12)
Judith D. Ahrens (Drexel University, USA), Samuel D. Strum (Merck and Co., USA)
Article 2
The Evaluation of Local Area Network Designs Through Simulation (pages 13-23)
Richard G. Born (Northern Illinois University, USA)
Article 3
An Accounting Curriculum Issue: The Importance of Microcomputer Knowledge to the Accounting Practitioner (pages 24-30)
Arthur A. Rasher (University of Tulsa, USA), Warren A. Beatty (University of South Alabama, USA)
Issue 2
Article 1
XMAIL: An Intelligent Electronic Mail System (pages 2-12)
Milam Aiken (University of Mississippi, USA), Luvai F. Motiwalla (University of Hartford, USA)
Article 2
Microcomputer Laboratory Maintenance (pages 13-20)
Norman A. Garrett (Eastern Illinois University, USA), Terry D. Lundgren (Eastern Illinois University, USA)
Article 3
Neurocomputing Approach to Residential Property Valuation (pages 21-30)
Ming-Te Lu (St. Cloud State University, USA), Debra H. Lu (St. Cloud State University, USA)
Issue 3
Article 1
End User Computing Success Factors: Further Evidence from a Developing Nation (pages 4-13)
Abdulla H. Abdul-Gader (King Fahd University of Petroleum and Minerals, Saudi Arabia)
Article 2
Information Resources Management for End User Computing: An Exploratory Study (pages 14-20)
Phillip Ein-Dor (Tel Aviv, Israel), Eli Segev (Tel Aviv University, Israel)
Article 3
Management of the Information Center: The Relationship of Power to End-user Performance and Satisfaction (pages 21-30)
Yong-Kil Cho (University of Wisconsin-Parkside, USA), Kenneth Kendall (Rutgers University, USA)
Issue 4
Article 1
Using End User Characteristics to Facilitate Effective Management of End User Computing (pages 5-16)
Donald L. Amoroso (University of Colorado, Colorado Springs, USA)
Article 2
Article 3
Microcomputer Software Piracy and Prevention Strategies (pages 26-35)
Tom Singleton (University of Mississippi, USA), Milam Aiken (University of Mississippi, USA), Ashraf Shirani (University of Mississippi, USA)
Volume 3 (1991)
Issue 1
Article 1
An Expert System Prototype for Performance Appraisal of Managerial Communication (pages 1-11)
James S. Moore (Indiana University at Fort Wayne, USA)
Article 2
Application Controls for Spreadsheet Development (pages 12-22)
Ming-Te Lu (St. Cloud State University, USA), Charles R. Litecky (University of Missouri-Columbia, USA), Debra H. Lu (St. Cloud State University, USA)
Article 3
Integration of Microcomputers into the Organization: A Human Adaptation Model and the Organizational Response (pages 23-35)
Meg Kletke (Oklahoma State University, USA), James E. Trumbly (Oklahoma State University, USA), Debra L. Nelson (Oklahoma State University, USA)
Issue 2
Article 1
The Administrative Use of Computers in Professional Sport Organizations (pages 2-12)
Terry R. Haggerty (Pennsylvania State University, USA)
Article 2
Implementation of a Token Ring LAN: A Case of a University Business School (pages 13-23)
Linda E. Duxbury (Carleton University, Canada), Anthony Koziol (Supply and Services, Canada)
Article 3
Steering Through the Mist of Personal Computing: A Guide for Managers (pages 24-31)
Janis L. Gogan (Boston University School of Management, USA)
Issue 3
Article 1
EDSS For Product Maintenance in a Global Environment (pages 2-10)
F. Stuart Wells (Tennessee Technological University, USA), R. Natarajan (Tennessee Technological University, USA)
Article 2
Critical LAN Success Factors: An Implementation Model (pages 11-21)
Raymond A. Patterson (Bowling Green State University, USA), Dennis D. Strouble (Bowling Green State University, USA)
Article 3
Electronic Mail in the University (pages 22-27)
Rodney A. Pearson (Mississippi State University, USA)
Issue 4
Article 1
Implementing a Markov-based Accounts Receivable DSS: A Prototyping Approach (pages 2-9)
Julie E. Kendall (Rutgers University, USA), Marc J. Schniederjans (University of Nebraska-Lincoln, USA)
Article 2
The Diffusion of Laptop Computers Among Industrial Salesforces (pages 10-21)
Jane M. Mackay (Texas Christian University, USA), Susan K. Higgins (Texas Christian University, USA), Chalres W. Lamb Jr. (Texas Christian University, USA), William Moncrief III (Texas Christian University, USA)
Article 3
Microcomputer-Based Decision Support for Facilities Planning and Management (pages 22-31)
Mohammad Dadashzadeh (Wichita State University, USA)
Volume 2 (1990)
Issue 1
Article 1
The Use of an Alternative Source of Expertise for the Development of Microcomputer Expert Systems (pages 2-14)
Gary Grudnitski (San Diego State University, USA), Robert L. Black (Coopers & Lybrand, USA)
Article 2
Software Selection: A Knowledge-based System Approach (pages 15-25)
D. G. Dologite (Baruch College-City University of New York, USA)
Article 3
An Experimental Investigation of Comparative Operating Efficiency of a 4GL (Focus) and COBOL in a Workstation Environment (pages 26-38)
Bijoy Bordoloi (Oakland University, USA), A. Milton Jenkins (University of Baltimore, USA)
Issue 2
Article 1
Article 2
The Impact of Local Area Networks on Users and Their Work: A Field Study (pages 15-24)
Ravinder Nath (University of Memphis, USA)
Article 3
A Survey of the AACSB Universities’ Policies on Software Copying (pages 25-35)
Susan Athey (Colorado State University, USA)
Issue 4
Article 1
Microcomputer Implementation in Small Businesses: Current Status and Success Factors (pages 2-11)
John F. Schleich (University of Nevada-Las Vegas, USA), William J. Corney (University of Nevada-Las Vegas, USA), Warren J. Boe (University of Iowa, USA)
Article 2
Downsizing at American Sterilizer (pages 12-23)
Mark W. Doll (University of Toledo, USA), William J. Doll (University of Toledo, USA)
Article 3
A Framework for Addressing End User Training Needs (pages 24-31)
Jane M. Mackay (Texas Christian University, USA), Charles W. Lamb Jr. (Texas Christian University, USA)
Volume 1 (1989)
Issue 1
Article 1
Microcomputers: Strategic Tools for the 1990s (pages 1-7)
Larry Oliva (Sun Microsystems, USA), Mehdi Khosrow-Pour (Pennsylvania State University at Harrisburg, USA)
Article 2