Journal Contents: Journal of Organizational and End User Computing (JOEUC)

View the Journal of Organizational and End User Computing (JOEUC) home page for complete details.
Volume 32 (2020)
Issue 1
Article 1
The Effect of Information Quality on Social Networking Site (SNS)-Based Commerce: From the Perspective of Malaysian SNS Users (pages 1-18)
Jongchang Ahn (Hanyang University, Seoul, South Korea), Suaini Sura (Universiti Malaysia Sabah, Kota Kinabalu, Malaysia)
Article 2
User's Segmentation on Continued Knowledge Management System Use in the Public Sector (pages 19-40)
Chi-Cheng Huang (Aletheia University, Taipei, Taiwan)
Article 3
E-Revenue Adoption in State Internal Revenue Service: Interrogating the Institutional Factors (pages 41-61)
Aderonke A. Oni (Covenant University, Ota, Nigeria), Ugbedeojo Musa (Federal Polytechnic Idah, Idah, Nigeria), Samuel Oni (Covenant University, Ota, Nigeria)
Article 4
The Effect of Customer Value on User Satisfaction With Dialogue Characteristics of Apple's Intelligent Agent Siri (pages 62-74)
Hye Rin Shim (Yonsei University, Seoul, South Korea), Byoung Gwan Kim (Yonsei University, Seoul, South Korea)
Article 5
The Nature and Role of User Beliefs Regarding a Website's Design Quality (pages 75-96)
Camille Grange (HEC Montreal, Montreal, Canada), Henri Barki (HEC Montreal, Montreal, Canada)
Issue 2
RENEWED CALL FOR A SINGLE CITATION STYLE
Editorial Preface
Steven Walczak (School of Information & Florida Center for Cybersecurity, University of South Florida, Tampa, USA)
Article 1
Technology Addictions and Technostress: An Examination of the U.S. and China (pages 1-19)
Stoney Brooks (Middle Tennessee State University, Murfreesboro, USA), Xuequn Wang (Murdoch University, Perth, Australia), Christoph Schneider (City University of Hong Kong, Kowloon Tong, Hong Kong)
Article 2
A Contingent Approach to Facilitating Conflict Resolution in Software Development Outsourcing Projects (pages 20-41)
Donghwan Cho (Gyeongnam National University of Science and Technology, Gyeongnam, South Korea)
Article 3
Unsupervised Model for Detecting Plagiarism in Internet-based Handwritten Arabic Documents (pages 42-66)
Mahmoud Zaher (Faculty of Computers and Information, Mansoura University, Mansoura, Egypt), Abdulaziz Shehab (Faculty of Computers and Information, Mansoura University, Mansoura, Egypt), Mohamed Elhoseny (Faculty of Computers and Information, Mansoura University, Mansoura, Egypt), Farahat Farag Farahat (Sadat Academy, Cairo, Egypt)
Article 4
A Machine Learning Method with Threshold Based Parallel Feature Fusion and Feature Selection for Automated Gait Recognition (pages 67-92)
Muhammad Sharif (Department of CS, COMSATS University Islamabad, Wah Campus, Wah Cantt, Pakistan), Muhammad Attique (Department of Computer Science, HITEC University, Museum Road Taxila, Pakistan), Muhammad Zeeshan Tahir (Department of CS, COMSATS University Islamabad, Wah Campus, Wah Cantt, Pakistan), Mussarat Yasmim (Department of CS, COMSATS University Islamabad, Wah Campus, Wah Cantt, Pakistan), Tanzila Saba (Artificial Intelligence & Data Analytics (AIDA) Lab, CCIS Prince Sultan University, Riyadh, Saudi Arabia), Urcun John Tanik (Texas A&M University-Commerce, Commerce, USA)
Article 5
Medication Use and the Risk of Newly Diagnosed Diabetes in Patients with Epilepsy: A Data Mining Application on a Healthcare Database (pages 93-108)
Sheng-Feng Sung (Ditmanson Medical Foundation Chiayi Christian Hospital, Chiayi, Taiwan & National Chung Cheng University, Minxiong, Taiwan), Pei-Ju Lee (National Chung Cheng University, Minxiong, Taiwan), Cheng-Yang Hsieh (Tainan Sin Lau Hospital and National Cheng Kung University Hospital and College of Medicine, Tainan, Taiwan), Wan-Lun Zheng (National Chung Cheng University, Minxiong, Taiwan)
Issue 3
Special Issue on Security and Privacy in Cloud Computing
Editorial Preface
Sang-Bing Tsai (Regional Green Economy Development Research Center, School of Business, Wuyi University, China & Research Center for Environment and Sustainable Development of the China Civil Aviation, China)
Article 1
A Novel Trust Model for Secure Group Communication in Distributed Computing (pages 1-14)
Naresh Ramu (SRM Institute of Science and Technology, India), Vijayakumar Pandi (University College of Engineering, Tindivanam, India), Jegatha Deborah Lazarus (University College of Engineering, Tindivanam, India), Sivakumar Radhakrishnan (University College of Engineering, Tindivanam, India)
Article 2
Security-Aware Autonomic Allocation of Cloud Resources: A Model, Research Trends, and Future Directions (pages 15-22)
Sukhpal Singh Gill (Queen Mary University of London, UK), Arash Shaghaghi (Deakin University, Australia)
Article 3
An Efficient Cloud Data Center Allocation to the Source of Requests (pages 23-36)
Kanniga Devi R. (Kalasalingam University, India), Murugaboopathi Gurusamy (Kalasalingam University, India), Vijayakumar P. (University College of Engineering, Tindivanam, India)
Article 4
A Risk Analysis Framework for Social Engineering Attack Based on User Profiling (pages 37-49)
Ziwei Ye (State Key Laboratory of Mathematical Engineering and Advanced Computing, China), Yuanbo Guo (State Key Laboratory of Mathematical Engineering and Advanced Computing, China), Ankang Ju (State Key Laboratory of Mathematical Engineering and Advanced Computing, China), Fushan Wei (State Key Laboratory of Mathematical Engineering and Advanced Computing, China), Ruijie Zhang (State Key Laboratory of Mathematical Engineering and Advanced Computing, China), Jun Ma (State Key Laboratory of Mathematical Engineering and Advanced Computing, China)
Article 5
Android Botnets: A Proof-of-Concept Using Hybrid Analysis Approach (pages 50-67)
Ahmad Karim (Bahauddin Zakariya University, Pakistan), Victor Chang (Teesside University, UK), Ahmad Firdaus (Faculty of Computer Systems and Software Engineering, Malaysia)
Issue 4
Make a Good Decision with the Right Method
Editorial Preface
Sang-Bing Tsai (School of Business, Wuyi University, China, & Research Center for Environment and Sustainable Development of the China Civil Aviation, Civil Aviation University of China, China)
Article 1
How Does Social Identification Moderate the Repurchase Intention?: From the Perspect of OGB (pages 1-25)
Shwu-Min Horng (National Chengchi University, Taiwan)
Article 2
Assessing the Role of Simplicity in the Continuous Use of Mobile Apps (pages 26-42)
Silas Formunyuy Verkijika (University of the Free State, South Africa)
Article 3
A Predictive Analytics Approach to Building a Decision Support System for Improving Graduation Rates at a Four-Year College (pages 43-62)
Xuan Wang (University of Texas Rio Grande Valley, USA), Helmut Schneider (Louisiana State University, USA), Kenneth R. Walsh (The University of New Orleans, USA)
Article 4
Screening Job Candidates With Social Media: A Manipulation of Disclosure Requests (pages 63-84)
John R. Drake (East Carolina University, USA), Christopher P. Furner (East Carolina University, USA)
Article 5
Designing a XSS Defensive Framework for Web Servers Deployed in the Existing Smart City Infrastructure (pages 85-111)
Brij B. Gupta (National Institute of Technology, Kurukshetra, India & Asia University, Taiwan & Macquarie University, Australia), Pooja Chaudhary (National Institute of Technology, Kurukshetra, India), Shashank Gupta (Birla Institute of Technology and Science, Pilani, India)
Article 6
Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud (pages 112-137)
Mamta (National Institute of Technology, Kurukshetra, India), Brij B. Gupta (National Institute of Technology, Kurukshetra, India & Asia University, Taiwan & Macquarie University, Australia)
Article 7
Business Analytics/Business Intelligence and IT Infrastructure: Impact on Organizational Agility (pages 138-161)
Xiaofeng Chen (Western Washington University, USA), Keng Siau (Missouri University of Science and Technology, USA)
Article 8
Lucky Reply Effect: How a Company's Online Replies to Consumers' Online Comments Affect Consumers' Predictions of Randomly Determined Associated Rewards (pages 162-174)
Ming Chen (Nanjing University of Finance and Economics, China), Yidan Huang (Huaqiao University, China), Shih-Heng Yu (National United University, Taiwan), Chia-Huei Wu (Minghsin University of Science Technology, Taiwan)
Volume 31 (2019)
Issue 1
Article 1
Protective Measures and Security Policy Non-Compliance Intention: IT Vision Conflict as a Moderator (pages 1-21)
Kuo-Chung Chang (Yuan Ze University, Taoyuan, Taiwan), Yoke May Seow (Yuan Ze University, Taoyuan, Taiwan)
Article 2
An Empirical Study of Gamification Frameworks (pages 22-38)
Patrick Buckley (University of Limerick, Limerick, Ireland), Seamus Noonan (University of Limerick, Limerick, Ireland), Conor Geary (University of Limerick, Limerick, Ireland), Thomas Mackessy (University of Limerick, Limerick, Ireland), Eoghan Nagle (University of Limerick, Limerick, Ireland)
Article 3
How to Engineer Gamification: The Consensus, the Best Practice and the Grey Areas (pages 39-60)
Alimohammad Shahri (Bournemouth University, Poole, UK), Mahmood Hosseini (Bournemouth University, Poole, UK), Keith Phalp (Bournemouth University, Poole, UK), Jacqui Taylor (Bournemouth University, Poole, UK), Raian Ali (Bournemouth University, Poole, UK)
Article 4
IT Application Maturity, Management Institutional Capability and Process Management Capability (pages 61-85)
Jianping Peng (Sun Yat-sen Business School, Sun Yat-sen University, Guangzhou, China), Jing Quan (Salisbury University, Salisbury, USA), Le Peng (Krannert School of Management, Purdue University, West Lafayette, USA)
Article 5
Exploring Signaling Roles of Service Providers' Reputation and Competence in Influencing Perceptions of Service Quality and Outsourcing Intentions (pages 86-109)
Chung-Lun Wei (National Chung Hsing University, Taichung City, Taiwan), Chien-Ta Ho (National Chung Hsing University, Taichung City, Taiwan)
Issue 2
Article 1
Dynamic Capability and Organizational Performance: Is Social Networking Site a Missing Link? (pages 1-21)
Ly Minh Thi Pham (Faculty of Business Administration, Ton Duc Thang University, Ho Chi Minh City, Vietnam), Lobel Trong Thuy Tran (Faculty of Business Administration, Ton Duc Thang University, Ho Chi Minh City, Vietnam), Phanee Thipwong (Department of Business Administration, Asia University, Taichung, Taiwan), Wan Tran Huang (Department of Business Administration, Asia University, Taichung, Taiwan)
Article 2
Pragmatic Sensory Data Semantics With Service-Oriented Computing (pages 22-36)
Robin Singh Bhadoria (Indian Institute of Technology Indore, Gwalior, India), Narendra S. Chaudhari (Visvesvaraya National Institute of Technology, Nagpur, India)
Article 3
The Shift to Socio-Organizational Drivers of Business Intelligence and Analytics Acceptance (pages 37-64)
Tanja Grublješič (Faculty of Economics, University of Ljubljana, Ljubljana, Slovenia), Pedro Simoes Coelho (NOVA Information Management School, Lisbon, Portugal), Jurij Jaklič (Faculty of Economics, University of Ljubljana, Ljubljana, Slovenia)
Article 4
Role of Perceived Value in Acceptance of “Bring Your Own Device” Policy (pages 65-82)
Lixuan Zhang Zhang (Weber State University, Ogden, USA), Matthew Mouritsen (Weber State University, Ogden, USA), Jeffrey R. Miller (Sam Houston State University, Huntsville, USA)
Article 5
Measuring E-Learners' Perceptions of Service Quality (pages 83-104)
Silvester Ivanaj (ICN Business School, Nancy, France), Grâce-Blache Nganmini (Data Analytics and Insights, TD bank Group, Montreal, Canada), Alain Antoine (ISAM IAE - Université de Lorraine, Nancy, France)
Issue 3
Special Issue on Service-Oriented Computing
Guest Editorial Preface
Shanchen Pang (College of Computer and Communication Engineering, China University of Petroleum, Qingdao, China), Shudong Wang (College of Computer and Communication Engineering, China University of Petroleum, Qingdao, China), Tao Song (College of Computer and Communication Engineering, China University of Petroleum, Qingdao, China), Xun Wang (College of Computer and Communication Engineering, China University of Petroleum, Qingdao, China), Pan Zheng (Information Systems Group, University of Canterbury, Christchurch, New Zealand)
Article 1
A Web Service Composition Approach Based on Planning Graph and Propositional Logic (pages 1-16)
ShiYang Deng (Shandong University of Science and Technology, Qingdao, China), YuYue Du (Shandong University of Science and technology, Qingdao, China), Liang Qi (New Jersey Institute of Technology, Newark, USA)
Article 2
Exploring Relationship Quality of User's Cloud Service: The Case Study of SaaS CRM (pages 17-36)
Tung-Hsiang Chou (National Kaohsiung University of Science and Technology, Kaohsiung City, Taiwan)
Article 3
Recent Progress on QoS Scheduling for Mobile Ad Hoc Networks (pages 37-66)
Dimitris N. Kanellopoulos (University of Patras, Patras, Greece)
Article 4
A Node-Oriented Discrete Event Scheduling Algorithm Based on Finite Resource Model (pages 67-82)
Yu Huang (Peking University, Beijing, China), Wanxing Sheng (China Electric Power Research Institute, Beijing, China), Peipei Jin (Peking University, Beijing, China), Baicuan Nie (Peking University, Beijing, China), Meikang Qiu (Pace University, New York City, USA), Guangquan Xu (Tianjin University, Tianjin, China)
Article 5
Aggregated Handover Authentication for Machine Type Communication (pages 83-96)
Xin Chen (BISTU, Beijing, China), ZhiQiang Liu (BISTU, Beijing, China), Jianxiong Wan (Nara Institute of Science and Technology (NAIST), Ikoma, Japan), Zhuo Li (BISTU, Beijing, China)
Article 6
A Study on Satisfaction Level Among Amateur Web Application Developers Towards Pigeon-Table as Nano Web Development Framework (pages 97-112)
Ong Chin Ann (Swinburne University of Technology, Kuching, Malaysia), Fu Swee Tee (Swinburne University of Technology, Kuching, Malaysia), Voon Yang Nen (Swinburne University of Technology, Kuching, Malaysia)
Issue 4
The Closing of the Year and a Call for a Single Citation Format
Editorial Preface
Steven Walczak (University of South Florida, Tampa, USA)
Article 1
Caching Resource Sharing for Network Slicing in 5G Core Network: A Game Theoretic Approach (pages 1-18)
Qingmin Jia (Beijing University of Posts and Telecommunications, Beijing, China), RenChao Xie (Beijing University of Posts and Telecommunications, Beijing, China), Tao Huang (Beijing University of Posts and Telecommunications, Beijing, China), Jiang Liu (Beijing University of Posts and Telecommunications, Beijing, China), Yunjie Liu (Beijing University of Posts and Telecommunications, Beijing, China)
Article 2
Determinants of Self-Service Analytics Adoption Intention: The Effect of Task-Technology Fit, Compatibility, and User Empowerment (pages 19-45)
Mohammad Daradkeh (Department of Management Information Systems, Faculty of Information Technology and Computer Sciences, Yarmouk University, Irbid, Jordan)
Article 3
Search Engine Advertising Perceived Effectiveness: A Resource-Based Approach on the Role of Advertisers' Competencies (pages 46-73)
Hamed Jafarzadeh (School of Management, Massey Business School, Massey University, Auckland, New Zealand), Babak Abedin (University of Technology Sydney, Ultimo, Australia), Aybüke Aurum (Aurum Academia, Sydney, Australia), John D'Ambra (University of New South Wales, Sydney, Australia)
Article 4
Comparative Analysis of Flight Search Representations (pages 74-88)
Aimal Tariq Rextin (COMSATS University, Islamabad, Pakistan), Fatima Iftekhar (Barani Institute of Management Sciences, Rawalpindi, Pakistan), Muhammad Muddasir Malik (NUST School of Electrical Engineering and Computer Science, Islamabad, Pakistan), Faheem Abbas (NUST School of Electrical Engineering and Computer Science, Islamabad, Pakistan)
Article 5
Personality Traits as Predictor of M-Payment Systems: A SEM-Neural Networks Approach (pages 89-110)
Ali Nawaz Khan (School of Economics and Management, Tongji University Shanghai, China), Xiongfei Cao (School of Management Hefei University of Technology, Hefei, China), Abdul Hameed Pitafi (School of Management, Hefei University of Technology, Hefei, China)
Volume 30 (2018)
Issue 1
Health Information Security: Paper Records May Still Be a Good Thing
Editorial Preface
Steven Walczak (School of Information and Florida Center for Cybersecurity, University of South Florida, Tampa, FL, USA)
Article 1
Seeking Health Information on Social Media: A Perspective of Trust, Self-Determination, and Social Support (pages 1-22)
Yibai Li (Unversity of Scranton, Scranton, PA, USA), Xuequn Wang (Murdoch University, Perth, Australia)
Article 2
Running with the Pack: The Impact of Middle-Status Conformity on the Post-Adoption Organizational Use of Twitter (pages 23-43)
Thomas Mattson (University of Richmond, Richmond, VA, USA), Salvatore Aurigemma (Collins College of Business, University of Tulsa, Tulsa, OK, USA)
Article 3
Consumption Value and Social Capital on Sense of Virtual Community Toward Value of Co-Created Information (pages 44-65)
Hsin Hsin Chang (National Cheng Kung University, Tainan City, Taiwan), Kit Hong Wong (National Cheng Kung University, Tainan City, Taiwan), Cheng Joo Eng (Min-Hwei College of Health Care Management, Tainan City, Taiwan), Shu-Hui Chen (National Cheng Kung University, Tainan City, Taiwan)
Article 4
Validating the EUCS Model to Measure the Level of Satisfaction of Internet Users in Local Banks in Italy (pages 66-81)
Rubens Pauluzzo (Department of Economic and Statistical Sciences, University of Udine, Udine, Italy), Enrico Fioravante Geretto (University of Udine, Udine, Italy)
Article 5
Second Order Interactive End User Development Appropriation in the Public Sector: Application Development Using Spreadsheet Programs (pages 82-106)
Anders Avdic (Örebro University, Örebro, Sweden & Dalarna University, Falun, Sweden)
Issue 2
Preface
Editorial Preface
Steven Walczak (School of Information & Florida Center for Cybersecurity, University of South Florida, Tampa, FL, USA)
Article 1
Personality Traits and Negotiation Style Effects on Negotiators' Perceptions in a Web-Based Negotiation (pages 1-19)
Jadielson Alves de Moura (Universidade Federal de Pernambuco, Recife, Brazil), Ana Paula Cabral Seixas Costa (Universidade Federal de Pernambuco, Recife, Brazil)
Article 2
Spreadsheet Error Types and Their Prevalence in a Healthcare Context (pages 20-42)
Elaine Dobell (Saolta University Health Care Group, Galway, Ireland & University of Limerick, Limerick, Ireland), Sebastian Herold (Department of Mathematics and Computer Science, Karlstad University, Karlstad, Sweden), Jim Buckley (CSIS / Lero – The Irish Software Research Centre, University of Limerick, Limerick, Ireland)
Article 3
Business Intelligence Systems Adoption Model: An Empirical Investigation (pages 43-70)
Saeed Rouhani (Faculty of Management, University of Tehran, Tehran, Iran), Amir Ashrafi (Allameh Tabataba'i University, Tehran, Iran), Ahad Zare Ravasan (Department of Information Technology Management, Mehralborz Institute of Higher Education, Tehran, Iran), Samira Afshari (Allameh Tabataba'i University, Tehran, Iran)
Article 4
Communication Processes of Information Technology Executives in Higher Education (pages 71-87)
Angela K. Hollman (University of Nebraska at Kearney, Kearney, NE, USA), Sonja H. Bickford (University of Nebraska at Kearney, Kearney, NE, USA), Janet L. Lear (University of Nebraska at Kearney, Kearney, NE, USA)
Article 5
The Impact of Firm Characteristics and IT Governance on IT Material Weaknesses (pages 88-111)
Peiqin Zhang (McCoy College of Business Administration, Texas State University, San Marcos, TX, USA), Kexin Zhao (Belk College of Business, University of North Carolina at Charlotte, Charlotte, NC, USA), Ram L. Kumar (Belk College of Business, University of North Carolina at Charlotte, Charlotte, NC, USA)
Issue 3
Special Issue on Information Management in Internet of Things
Guest Editorial Preface
Kim Huang (The Maharaja Sayajirao University of Baroda, Vadodara, India)
Article 1
Anomaly Detection Using RFID-Based Information Management in an IoT Context (pages 1-23)
Raúl Parada (Dipartimento di Ingegneria dell'Informazione, Università degli Studi di Padova, Padova, Italy), Joan Melià-Seguí (Estudis d'Informàtica, Multimèdia i Telecomunicació, Internet Interdisciplinary Institute (IN3), Universitat Oberta de Catalunya (UOC), Barcelona, Spain), Rafael Pous (Departament de Tecnologies de la Informació i les Comunicacions, Universitat Pompeu Fabra, Barcelona, Spain)
Article 2
The Role of the Internet of Things in the Improvement and Expansion of Business (pages 24-44)
Hodjat Hamidi (Department of Information Technology, Faculty of Industrial Engineering, K. N. Toosi University of Technology, Tehran, Iran), Maryam Jahanshahifard (Department of Information Technology, Faculty of Industrial Engineering, K. N. Toosi University of Technology, Tehran, Iran)
Article 3
Smart Vehicular System based on the Internet of Things (pages 45-62)
Midde Ranjit Reddy (Jawaharlal Nehru Technological University Anantapur, Andhra Pradesh, India), K. G Srinivasa (Ch. Bramh Prakash Government Engineering College, New Delhi, India), B. Eswara Reddy (Jawaharlal Nehru Technological University Anantapur, Andhra Pradesh, India)
Article 4
Impact of Information Technology on Information Search Channel Selection for Consumers (pages 63-80)
Gaurav Khatwani (Indian Institute of Management, Rohtak, India), Praveen Ranjan Srivastava (Indian Institute of Management, Rohtak, India)
Issue 4
Special Issue on Internet of Things: Issues, Challenges, and Opportunities
Guest Editorial Preface
Ganesh Chandra Deka (Directorate General of Training, Ministry of Skill Development and Entrepreneurship, New Delhi, India)
Article 1
Web Service Usability Analysis Based on User Preferences (pages 1-13)
Luiza Fabisiak (West Pomeranian University of Technology, Szczecin, Poland)
Article 2
PpBAC: Popularity Based Access Control Model for Cloud Computing (pages 14-31)
Suyel Namasudra (Department of Computer Science and Engineering, National Institute of Technology Patna, Patna, Bihar, India), Pinki Roy (National Institute of Technology, Silchar, India)
Article 3
A Customer Centric Best Connected Channel Model for Heterogeneous and IoT Networks (pages 32-50)
Pushpa Singh (Department of Information Technology, Accurate Institute of Management and Technology, Greater Noida, India), Rajeev Agrawal (Department of Electronics and Communication Engineering, G.L. Bajaj Institute of Technology and Management, Greater Noida, India)
Article 4
Factors that Influence the Acceptance of Internet of Things Services by Customers of Telecommunication Companies in Jordan (pages 51-63)
Adai Mohammad Al-Momani (College of Computer Science and IT, Universiti Tenaga Nasional, Kajang, Malaysia), Moamin A Mahmoud (College of Computer Science and IT, Universiti Tenaga Nasional, Kajang, Malaysia), Mohd Sharifuddin Ahmad (College of Information Technology, Universiti Tenaga Nasional, Kajang, Malaysia)
Article 5
Smart Agricultural Enterprise System Based on Integration of Internet of Things and Agent Technology (pages 64-82)
Ilham Kitouni (Department of Computer Science, Constantine 2 University, MISC Laboratory, Constantine, Algeria), Djamel Benmerzoug (Constantine 2 University, LIRE Laboratory, Constantine, Algeria), Fouzi Lezzar (Constantine 2 University, LIRE Laboratory, Constantine, Algeria)
Article 6
Data Analytics Assisted Internet of Things Towards Building Intelligent Healthcare Monitoring Systems: IoT for Healthcare (pages 83-103)
Srinivasa K G (CBP Government Engineering College, New Delhi, India), Sowmya BJ (MSRIT, Bangalore, India), Abhinav Shikhar (MSRIT, Bangalore, India), Ritu Utkarsha (RIET, Faridabad, India), Aahan Singh (MSRIT, Bangalore, India)
Article 7
A Hybrid Case Based Reasoning Model for Classification in Internet of Things (IoT) Environment (pages 104-122)
Saroj Kr Biswas (NIT Silchar, India), Debashree Devi (NIT Silchar, India), Manomita Chakraborty (NIT Silchar, India)
Volume 29 (2017)
Issue 1
Globalization and Theoretical and Applied Research
Editorial Preface
Steven Walczak (School of Information & Florida Center for Cybersecurity, University of South Florida, Tampa, FL, USA)
Article 1
A Cultural Model of Online Banking Adoption: Long-Term Orientation Perspective (pages 1-22)
Leelien Ken Huang (Feng Chia University, Taichung City, Taiwan)
Article 2
Factors Influence Intention to Adopt Internet Medical Information on Bulletin Boards: A Heuristic-Systematic Perspective (pages 23-41)
Ying Chieh Liu (Chaoyang University of Technology, Taichung City, Taiwan), Yu-An Huang (National Chi Nan University, Nantou, Taiwan)
Article 3
Cellular Automata: Elementary Cellular Automata (pages 42-50)
Rupali Bhardwaj (School of Mathematics and Computer Applications, Thapar University, Patiala, India), Anil Upadhyay (Department of Mathematics, Bipin Chandra Tripathi Kumaon Engineering College, Dwarahat, India)
Article 4
A Model for Impact of Organizational Project Benefits Management and its Impact on End User (pages 51-65)
Hodjat Hamidi (Information Technology Engineering Group, Department of Industrial Engineering, K.N. Toosi University of Technology, Tehran, Iran)
Issue 2
Article 1
User Acceptance of Technologies in Their Infancy: The Case of 3D Printing Business Models (pages 1-24)
Timo Hartmann (Maastricht University, Maastricht, The Netherlands), Evelyne Vanpoucke (Université Libre de Bruxelles, Brussels, Belgium)
Article 2
Error Trapping and Metamorphic Testing for Spreadsheet Failure Detection (pages 25-42)
Pak-Lok Poon (RMIT University, Melbourne, Australia), Huai Liu (RMIT University, Melbourne, Australia), Tsong Yueh Chen (Swinburne University of Technology, Melbourne, Australia)
Article 3
Developers, Quality Control and Download Volume in Open Source Software (OSS) Projects (pages 43-66)
Geoffrey Hill (University of Central Arkansas, Conway, AR, USA), Pratim Datta (Kent State University, Kent, OH, USA and University of Johannesburg, Johannesburg, South Africa), Candice Vander Weerdt (Kent State University, Kent, OH, USA)
Article 4
The Adoption Drivers of Web-Based B2B Systems: A Comparison between Durable and Nondurable Goods-Producing Industries (pages 67-81)
Khaled Saleh Al-Omoush (Al-Zaytoonah University of Jordan, Amman, Jordan)
Issue 3
Article 1
Users' Perspectives on Using Wikis for Managing Knowledge: Benefits and Challenges (pages 1-23)
Fayez Hussain Alqahtani (Computer Science Department, King Saud University, Riyadh, Saudi Arabia)
Article 2
WPKT: Work Process Knowledge Template for Codification of Organizational Process Knowledge (pages 24-48)
Akhilesh Bajaj (University of Tulsa, Tulsa, OK, USA), Meredith Bates-Thornton (Verizon, Tulsa, OK, USA)
Article 3
Student Resistance to a Mandatory Learning Management System in Online Supply Chain Courses (pages 49-67)
Kenneth David Strang (State University of New York Plattsburgh at Queensbury, Queensbury, NY, USA), Narasimha Rao Vajjhala (American University of Nigeria, Yola, Nigeria)
Article 4
Using Social Media to Support Presentation Skill Development in Traditional Classroom Environments (pages 68-91)
Paul M. Di Gangi (Management, Information Systems, and Quantitative Methods Department, University of Alabama at Birmingham, Birmingham, AL, USA), Samuel H. Goh (Department of Business Informatics, Northern Kentucky University, Highland Heights, KY, USA), Carmen C. Lewis (Department of Information Systems and Quantitative Methods, Troy University, Dothan, AL, USA)
Issue 4
Special Issue on Bigdata Analytics in Practice
Guest Editorial Preface
Ganesh Chandra Deka (Ministry of Skill Development and Entrepreneurship, Directorate General of Training, Shram Shakti Bhawan, Room N-329, New Delhi, India), Steven Walczak (School of Information, University of South Florida, Tampa, FL, USA)
Article 1
IoT Based Agriculture as a Cloud and Big Data Service: The Beginning of Digital India (pages 1-23)
Sukhpal Singh Gill (CLOUDS Lab, School of Computing and Information Systems, University of Melbourne, Melbourne, Australia), Inderveer Chana (Computer Science and Engineering Department, Thapar University, Patiala, India), Rajkumar Buyya (CLOUDS Lab, School of Computing and Information Systems, University of Melbourne, Melbourne, Australia)
Article 2
Balance Resource Utilization (BRU) Approach for the Dynamic Load Balancing in Cloud Environment by Using AR Prediction Model (pages 24-50)
Rajeev Kumar Gupta (Maulana Azad National Institute of Technology (MANIT), Bhopal, India), Rajesh Kumar Pateriya (Maulana Azad National Institute of Technology (MANIT), Bhopal, India)
Article 3
Sentiment Analysis of Tweets for Estimating Criticality and Security of Events (pages 51-71)
V. Subramaniyaswamy (School of Computing, SASTRA University, Thanjavur, India), R. Logesh (School of Computing, SASTRA University, Thanjavur, India), M. Abejith (School of Computing, SASTRA University, Thanjavur, India), Sunil Umasankar (School of Computing, SASTRA University, Thanjavur, India), A. Umamakeswari (School of Computing, SASTRA University, Thanjavur, India)
Article 4
Internet of Things (IOT) Solution for Increasing the Quality of Life of Physically Challenged People (pages 72-83)
G. M. Siddesh (Department of Information Science and Engineering, Ramaiah Institute of Technology, Bangalore, India), K. G. Srinivasa (Department of Information Technology, Ch. Brahm Prakash Government Engineering College, New Delhi, India), Siddharth Kaushik (Ramaiah Institute of Technology, Bangalore, India), S. V. Varun (Ramaiah Institute of Technology, Bangalore, India), Vidhatri Subramanyam (Ramaiah Institute of Technology, Bangalore, India), Vinay M. Patil (Ramaiah Institute of Technology, Bangalore, India)
Article 5
A Methodical Healthcare Model to Eliminate Motion Artifacts from Big EEG Data (pages 84-102)
Vandana Roy (Research Scholar, Jabalpur Engineering College, Jabalpur, India), Shailja Shukla (Department of Computer Science, Jabalpur Engineering College, Jabalpur, India)
Volume 28 (2016)
Issue 1
Article 1
Unsuccessful Performance and Future Computer Self-Efficacy Estimations: Attributions and Generalization to Other Software Applications (pages 1-14)
Richard D. Johnson (Department of Management, University at Albany, Albany, NY, USA), Yuzhu Li (University of Massachusetts Dartmouth, North Dartmouth, MA, USA), James H. Dulebohn (Michigan State University, East Lansing, MI, USA)
Article 2
Social Media Use in the Workplace: A Study of Dual Effects (pages 15-31)
John R. Carlson (Department of Information Systems, Baylor University, Waco, TX, USA), Suzanne Zivnuska (California State University, Chico, Chico, CA, USA), Ranida B. Harris (Indiana University Southeast, New Albany, IN, USA), Kenneth J. Harris (Indiana University Southeast, New Albany, IN, USA), Dawn S. Carlson (Department of Management, Baylor University, Waco, TX, USA)
Article 3
A User-Centric Typology of Information System Requirements (pages 32-55)
Adarsh Satindarlal Kakar (Alabama State University, Montgomery, AL, USA)
Article 4
Diffusion of Adoption of Facebook for Customer Relationship Management in Australia: An Exploratory Study (pages 56-72)
Babak Abedin (Faculty of Engineering and IT, University of Technology Sydney (UTS), Sydney, Australia)
Issue 2
Unveiling the Impact of Social Media: Importance of the Co-Creation of Business Value during the Adoption and Use Process (Part A)
Guest Editorial Preface
Samuel Fosso Wamba (NEOMA Business School, Mont-Saint-Aignan, France), Shahriar Akter (University of Wollongong, Wollongong, Australia), Mithu Bhattacharya (College of Business Administration, University of Detroit Mercy, Detroit, MI, USA)
Article 1
The Primer of Social Media Analytics (pages 1-12)
Samuel Fosso Wamba (NEOMA Business School, Mont-Saint-Aignan, France), Shahriar Akter (University of Wollongong, Wollongong, Australia), Hyunjin Kang (Department of Marketing, George Washington University, Washington D.C., USA), Mithu Bhattacharya (College of Business Administration, University of Detroit Mercy, Detroit, MI, USA), Mohammed Upal (WebHawks IT, Tokyo, Japan)
Article 2
Design and Development of Intelligent Decision Support Prototype System for Social Media Competitive Analysis in Fashion Industry (pages 13-32)
Eric W.T. Ngai (Department of Management and Marketing, The Hong Kong Polytechnic University, Hong Kong), S.S. Lam (Lee Shau Kee School of Business & Administration, The Open University of Hong Kong, Hong Kong), J.K.L. Poon (Hong Kong Community College, The Hong Kong Polytechnic University, Hong Kong), Bin Shen (Glorious Sun School of Business & Management, Donghua University, Shanghai, China), Karen K.L. Moon (Department of Clothing and Textiles/Research Institute of Human Ecology, Seoul National University, Seoul, South Korea)
Article 3
The Influence of Social Presence, Social Exchange and Feedback Features on SNS Continuous Use: The Facebook Context (pages 33-52)
Mustapha Cheikh-Ammar (Ivey Business School, University of Western Ontario, London, Canada), Henri Barki (HEC Montreal, Montreal, Canada)
Article 4
Social Media Engagement Theory: Exploring the Influence of User Engagement on Social Media Usage (pages 53-73)
Paul M. Di Gangi (University of Alabama at Birmingham, Birmingham, AL, USA), Molly M. Wasko (Department of Management, Information Systems and Quantitative Methods, University of Alabama at Birmingham, Birmingham, AL, USA)
Article 5
Social Media-Based Forecasting: A Case Study of Tweets and Stock Prices in the Financial Services Industry (pages 74-91)
Wu He (Department of Information Technology and Decision Sciences,Old Dominion University, Norfolk, VA, USA), Lin Guo (University of New Hampshire, Durham, NH, USA), Jiancheng Shen (Old Dominion University, Norfolk, VA, USA), Vasudeva Akula (VOZIQ, Ashburn, VA, USA)
Article 6
Virtual Space Co-Creation: The Perspective of User Innovation (pages 92-106)
Yonggui Wang (Business School and Collaborative Innovation Center, University of International Business and Economics, Beijing, China), Dahui Li (Labovitz School of Business and Economics, University of Minnesota Duluth, Duluth, MN, USA)
Article 7
Article 8
Separating the Wheat from the Chaff: Extracting Business Value from Feature Requests Posted in User Forums (pages 124-141)
Adarsh Kumar Kakar (Alabama State University, Montgomery, AL, USA)
Issue 3
Unveiling the Impact of Social Media: Importance of the Co-Creation of Business Value during the Adoption and Use Process (Part B)
Guest Editorial Preface
Samuel Fosso Wamba (NEOMA Business School, Mont-Saint-Aignan, France), Shahriar Akter (University of Wollongong, Wollongong, Australia), Mithu Bhattacharyya (University of Detroit Mercy, Detroit, MI, USA)
Article 1
How does Social Media Analytics Create Value? (pages 1-9)
Shahriar Akter (University of Wollongong, Wollongong, Australia), Mithu Bhattacharyya (University of Detroit Mercy, Detroit, MI, USA), Samuel Fosso Wamba (NEOMA Business School, Mont-Saint-Aignan, France), Sutapa Aditya (Long Island University, Brookville, NY, USA)
Article 2
Twitter Predicting the 2012 US Presidential Election?: Lessons Learned from an Unconscious Value Co-Creation Platform (pages 10-30)
Miguel Maldonado (ESAN University, Lima, Peru), Vicenta Sierra (ESADE – Ramon Llull University, Sant Cugat, Spain)
Article 3
Participating in the Enterprise Web 2.0 Platform: The Influence of Trust (pages 31-48)
Fayez Hussain Alqahtani (Computer Science Department, King Saud University, Riyadh, Saudi Arabia), Ibrahim Abunadi (College of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia)
Article 4
Social Commerce Benefits for Small Businesses: An Organizational Level Study (pages 49-66)
Ludwig Christian Schaupp (Department of Accounting, College of Business & Economics West Virginia University, Morgantown, WV, USA), France Bélanger (Virginia Tech, Blacksburg, VA, USA)
Article 5
Catch a Fad or Capture a Value?: Social Media Leverage in SMEs (pages 67-81)
Xiaoyun He (Auburn University at Montgomery, Montgomery, AL, USA), Haibing Lu (Santa Clara University, Santa Clara, CA, USA)
Article 6
Determinants of Social Media Impact in Local Government (pages 82-103)
Mohd Hisham Mohd Sharif (University of Adelaide, Adelaide, Australia), Indrit Troshani (BusinessSchool, University of Adelaide, Adelaide, Australia), Robyn Davidson (University of Adelaide, Adelaide, Australia)
Article 7
Implementation of Social Media Concepts for e-Government: Case Study of a Social Media Tool for Value Co-Creation and Citizen Participation (pages 104-121)
Raimundo Díaz-Díaz (Universidad de Cantabria, Santander, Spain), Daniel Pérez-González (Universidad de Cantabria, Santander, Spain)
Article 8
Use of Social Media for Disaster Management: A Prescriptive Framework (pages 122-140)
Louis Ngamassi (Prairie View A&M University, Prairie View, TX, USA), Thiagarajan Ramakrishnan (Prairie View A&M University, Prairie View, TX, USA), Shahedur Rahman (Prairie View A&M University, Prairie View, TX, USA)
Article 9
A Multimethod Study of Enterprise Social Media Implementation and Use: Mitigating the Gap between Theory and Practice (pages 141-162)
Hillol Bala (Indiana University, Bloomington, IN, USA), Anne P. Massey (Indiana University, Bloomington, IN, USA), Christine J. Hsieh (Indiana University, Bloomington, IN, USA)
Issue 4
Editorial Note
Editorial Preface
Steven Walczak (School of Information & Florida Center for Cybersecurity, University of South Florida, Tampa, FL, USA)
Article 1
Responsibility and Skills Requirements for Entry Level Analytics Professionals (pages 1-14)
Wenhong Luo (Villanova University, Villanova, PA, USA)
Article 2
Influences of Organizational Culture on Knowledge Sharing in an Online Virtual Community: Interactive Effects of Trust, Communication and Leadership (pages 15-32)
Chaoyun Liang (Department of Bio-Industry Communication and Development, National Taiwan University, Taipei, Taiwan), Chi-Cheng Chang (National Taiwan Normal University, Taipei, Taiwan), William Rothwell (Pennsylvania State University, University Park, PA, USA), Kuen-Ming Shu (Department of Mechanical and Computer-Aided Engineering, National Formosa University, Huwei, Taiwan)
Article 3
Exploring Portuguese Academics' Understanding of Ownership and Intellectual Property of Online Educational Materials (pages 33-54)
Jorge Tiago Martins (Information School, Sheffield University, Sheffield, UK), Miguel Baptista Nunes (School of Information Management, Sun Yat-sen University, Guangzhou, China)
Article 4
The Implications of Social Influence Theory on Continuance Intention for Social Networking Among Chinese University Students (pages 55-72)
Xuan Xiao (Harbin Institute of Technology, Harbin, China), Tienan Wang (Harbin Institute of Technology, Harbin, China)
Article 5
An Empirical Investigation of Decision Making in IT-Related Dilemmas: Impact of Positive and Negative Consequence Information (pages 73-90)
Chen Zhang (University of Memphis, Memphis, TN, USA), Judith C. Simon (University of Memphis, Memphis, TN, USA), Euntae “Ted” Lee (University of Memphis, Memphis, TN, USA)
Volume 27 (2015)
Issue 1
Article 1
B2B E-Commerce Success among Small and Medium-Sized Enterprises: A Business Network Perspective (pages 1-32)
Morteza Ghobakhloo (Department of Mechanical and Manufacturing Engineering, Universiti Putra Malaysia, Selangor, Malaysia), Tang Sai Hong (Department of Mechanical and Manufacturing Engineering, Universiti Putra Malaysia, Selangor, Malaysia), Craig Standing (Centre for Innovative Practice, Edith Cowan University, Joondalup, Australia)
Article 2
Introducing a Taxonomy for Classifying Qualitative Spreadsheet Errors (pages 33-56)
Linda Leon (Department of Finance and Computer Information Systems, Loyola Marymount University, Los Angeles, CA, USA), Zbigniew H. Przasnyski (Department of Finance and Computer Information Systems, Loyola Marymount University, Los Angeles, CA, USA), Kala Chand Seal (Department of Finance and Computer Information Systems, Loyola Marymount University, Los Angeles, CA, USA)
Article 3
User Resistance Behaviors and Management Strategies in IT-Enabled Change (pages 57-76)
Tim Klaus (College of Business, Texas A&M University, Corpus Christi, TX, USA), J. Ellis Blanton (College of Business, University of South Florida, Tampa, FL, USA), Stephen C. Wingreen (University of Canterbury in Christchurch, Christchurch, New Zealand)
Article 4
Investigation on the Factors Determining Consumers' Use of Online Intermediated Shopping (OIS): A Behavioral Intention Perspective (pages 77-97)
Wei Zhang (Department of Internal Control, SuZhou New District Economic Development Group Corporation, Suzhou, Jiangsu, China), Xue Yang (Department of Marketing and Electronic Business, Nanjing University, Nanjing, Jiangsu, China), Quansheng Wang (Department of Marketing and Electronic Business, Nanjing University, Nanjing, Jiangsu, China), Chengde Zheng (Department of Marketing and Electronic Business, Nanjing University, Nanjing, Jiangsu, China), Choon Ling Sia (Department of Information Systems, City University of Hong Kong, Hong Kong, China)
Issue 2
Article 1
Strategic Information System Planning in Healthcare Organizations (pages 1-31)
Theresa Lee (University of Toronto, Toronto, Canada), Amir Hossein Ghapanchi (School of Information and Communication Technology, Griffith University, Southport, Queensland, Australia, and Institute for Integrated and Intelligent Systems, Gold Coast, Queensland, Australia), Amir Talaei-Khoei (School of Systems, Management and Leadership, University of Technology, Sydney, Australia), Pradeep Ray (Asia Pacific ubiquitous Healthcare Research Centre (APuHC), UNSW, Sydney, Australia)
Article 2
The Impact of On-Line Consumer Reviews on Value Perception: The Dual-Process Theory and Uncertainty Reduction (pages 32-57)
Hsin Hsin Chang (National Cheng Kung University, Tainan City, Taiwan), Po Wen Fang (National Cheng Kung University, Tainan City, Taiwan), Chien Hao Huang (National Cheng Kung University, Tainan City, Taiwan)
Article 3
Knowledge Sharing, Social Relationships, and Contextual Performance: The Moderating Influence of Information Technology Competence (pages 58-73)
Jianping Peng (Sun Yat-sen Business School, Sun Yat-sen University, Guangzhou, China), Jing Quan (Franklin P. Perdue School of Business, Salisbury University, Salisbury, MD, USA), Guoying Zhang (Dillard College of Business Administration, Midwestern State University, Wichita Falls, TX, USA), Alan J. Dubinsky (Dillard College of Business Administration, Midwestern State University, Wichita Falls, TX, USA & Purdue University West Lafayette, IN, USA)
Issue 3
Article 1
Explaining Online Customer Repurchase Intentions from a Relationship-Marketing Perspective: An Integration of the 4Rs Marketing Strategy and Customer Trust (pages 1-26)
Mei-Ju Lin (Department of Industrial and Information Management, National Cheng Kung University, Tainan, Taiwan), Wei-Tsong Wang (Department of Industrial and Information Management, National Cheng Kung University, Tainan, Taiwan)
Article 2
Beliefs and Attributions toward Computing Technology: The Moderating Role of Social Cues in Interfaces (pages 27-54)
Richard D. Johnson (Department of Management, University at Albany, State University of New York, Albany, NY, USA), Natasha Veltri (Information & Technology Management, University of Tampa, Tampa, FL, USA), Jason B. Thatcher (College of Business and Behavioral Science, Clemson University, Clemson, SC, USA)
Article 3
The Relationship between User Satisfaction, System Attributes and the Motivating Potential of System Use (pages 55-79)
Jason F. Cohen (University of the Witwatersrand, Johannesburg, South Africa), James Matheri Kangethe (University of the Witwatersrand, Johannesburg, South Africa)
Issue 4
Article 1
IT Enabled Organisational Agility: Evidence from Chinese Firms (pages 1-24)
Yunshi Mao (Business School of Sun Yat-Sen University, Guangzhou, China), Jing Quan (Department of Information and Decision Sciences, Perdue School of Business, Salisbury University, Salisbury, MD, USA)
Article 2
Influence of SMS Advertising on Consumer Behavioral Intention (pages 25-42)
Hongyan Lin (Xiamen University of Technology, Xiamen, China), Zhankui Chen (Xiamen University of Technology, Xiamen, China)
Article 3
Information Systems Project Management Risk: Does it Matter for Firm Performance? (pages 43-60)
Stefan Tams (Department of Information Technologies, HEC Montreal, Montreal, Canada), Kevin Hill (Department of Human Resources Management, HEC Montreal, Montreal, Canada)
Volume 26 (2014)
Issue 1
Article 1
The Influence of Social Aversion and Institution-Based Trust on Computer Self-Efficacy, Computer Anxiety and Antecedents to IT Use (pages 1-26)
Elizabeth White Baker (Cameron School of Business, University of North Carolina - Wilmington, Wilmington, NC, USA), Jason Bennett Thatcher (College of Business and Behavioral Science, Clemson University, Clemson, SC, USA), Michael Gundlach (College of Business, California State University, Chico, CA, USA), D. Harrison McKnight (Eli Broad College of Business, Michigan State University, East Lansing, MI, USA)
Article 2
Information Security Program Effectiveness in Organizations: The Moderating Role of Task Interdependence (pages 27-46)
Kenneth J. Knapp (University of Tampa, Tampa, FL, USA), Claudia J. Ferrante (USAF, United States Air Force Academy, Colorado Springs, CO, USA)
Article 3
Evaluating the Effectiveness of Static Analysis Programs Versus Manual Inspection in the Detection of Natural Spreadsheet Errors (pages 47-65)
Salvatore Aurigemma (Collins College of Business, University of Tulsa, Tulsa, OK, USA), Ray Panko (Department of IT Management, University of Hawaii at Manoa, Honolulu, HI, USA)
Article 4
The Impact of Software Testing Governance Choices (pages 66-85)
Xihui Zhang (University of North Alabama, Florence, AL, USA), Colin G. Onita (University of Akron, Akron, OH, USA), Jasbir S. Dhaliwal (University of Memphis, Memphis, TN, USA)
Issue 2
Article 1
Social Media Tools Adoption and Use by SMES: An Empirical Study (pages 1-17)
Samuel Fosso Wamba (NEOMA Business School, Mont-Saint-Aignan, Rouen, France), Lemuria Carter (School of Business and Economics, Department of Accounting and Finance, North Carolina A & T State University, Greensboro, NC, USA)
Article 2
Investigating the Motives of Customers' Continuance Intentions towards Online Reservation: The Role of E-Service Quality (pages 18-40)
Samar Mouakket (College of Business Administration, University of Sharjah, Sharjah, United Arab Emirates)
Article 3
How Can Secure Websites Improve Buying Intention?: Usable Versus Non Usable Contexts? (pages 41-59)
Natalia Vila (Facultad de Economia, Universidad de Valencia, Valencia, Spain), Inés Kuster (Facultad de Economia, Universidad de Valencia, Valencia, Spain)
Article 4
Do I Matter?: The Impact of Individual Differences on a Technology-Mediated End User Training Process (pages 60-79)
Saurabh Gupta (Department of Management, University of North Florida, Jacksonville, FL, USA), Rob Anson (College of Business and Economics, Boise State University, Boise, ID, USA)
Issue 3
Article 1
E-SERVCON and E-Commerce Success: Applying the DeLone & McLean Model (pages 1-22)
Jung-Yu Lai (National Chung Hsing University, Taichung, Taiwan)
Article 2
Explaining Users' Security Behaviors with the Security Belief Model (pages 23-46)
Clay K. Williams (Southern Illinois University Edwardsville, Edwardsville, IL, USA), Donald Wynn (University of Dayton, Dayton, OH, USA), Ramana Madupalli (Southern Illinois University Edwardsville, Edwardsville, IL, USA), Elena Karahanna (Terry College of Business, University of Georgia, Athens, GA, USA), Barbara K. Duncan (Southern Illinois University Edwardsville, Edwardsville, IL, USA)
Article 3
Overreliance on Mathematical Accuracy of Computer Output: An Issue for IT Educators (pages 47-64)
Ian Sims (Department of International Business and Asian Studies, Griffith University, Gold Coast, Australia), Conor O'Leary (Department of Accounting, Finance and Economics, Griffith Business School, Griffith University, Brisbane, Australia), Pran Boolaky (Department of Accounting, Finance and Economics, Griffith Business School, Griffith University, Brisbane, Australia)
Article 4
The Effect of Trust on Customers' Online Repurchase Intention in Consumer-to-Consumer Electronic Commerce (pages 65-86)
Lin Jia (Department of Information Systems and Supply Chain Management, Harbert College of Business, Auburn University, Auburn, AL, USA), Casey Cegielski (Department of Information Systems and Supply Chain Management, Harbert College of Business, Auburn University, Auburn, AL, USA), Qinsheng Zhang (Department of Management, College of Management, Ocean University of China, Qingdao, China)
Issue 4
Article 1
Habit: How Does It Develop, and Affect Continued Usage of Chinese Users on Social Networking Websites? (pages 1-22)
Guopeng Yin (School of Information Technology & Management, University of International Business and Economics, Beijing, China), Ling Zhu (College of Management, Long Island University Post, Brookville, NY, USA)
Article 2
Explaining Cyberloafing through a Theoretical Integration of Theory of Interpersonal Behavior and Theory of Organizational Justice (pages 23-42)
Teresa K. Betts (College of Business, Murray State University, Murray, KY, USA), Andrew J. Setterstrom (Department of Operations Management and Information Systems, Northern Illinois University, DeKalb, IL, USA), John Michael Pearson (Department of Management, Southern Illinois University, Carbondale, IL, USA), Stephanie Totty (Department of Management, Marketing and Business Administration, Murray State University, Murray, KY, USA)
Article 3
Investigating Privacy Perception and Behavior on Weibo (pages 43-56)
Clinton Amos (John B. Goddard School of Business and Economics, Weber State University, Ogden, UT, USA), Lixuan Zhang (John B. Goddard School of Business and Economics, Weber State University, Ogden, UT, USA), Iryna Pentina (Department of Marketing and International Business, University of Toledo, Toledo, OH, USA)
Article 4
To Adopt or Not to Adopt: A Perception-Based Model of the EMR Technology Adoption Decision Utilizing the Technology-Organization-Environment Framework (pages 57-79)
Colleen Schwarz (Department of Management, University of Louisiana at Lafayette, Lafayette, LA, USA), Andrew Schwarz (Information Systems & Decision Sciences Department (ISDS), Louisiana State University, Baton Rouge, LA, USA)
Volume 25 (2013)
Issue 1
Article 1
Engaging Remote Employees: The Moderating Role of “Remote” Status in Determining Employee Information Security Policy Awareness (pages 1-23)
Allen C. Johnston (School of Business, University of Alabama at Birmingham, Birmingham, AL, USA), Barbara Wech (School of Business, University of Alabama at Birmingham, Birmingham, AL, USA), Eric Jack (School of Business, University of Alabama at Birmingham, Birmingham, AL, USA)
Article 2
A Social-Feedback Enriched Interface for Software Download (pages 24-42)
Gianluca Dini (Dipartimento di Ingegneria dell’Informazione, Università di Pisa, Pisa, Tuscany, Italy), Pierfrancesco Foglia (Dipartimento di Ingegneria dell’Informazione, Università di Pisa, Pisa, Tuscany, Italy), C. Antonio Prete (Dipartimento di Ingegneria dell’Informazione, Università di Pisa, Pisa, Tuscany, Italy), Michele Zanda (Dipartimento di Ingegneria dell’Informazione, Università di Pisa, Pisa, Tuscany, Italy)
Article 3
Are Mobile Spreadsheet Applications Usable? (pages 43-63)
Derek Flood (Department of Computing and Communication Technologies, Oxford Brookes University, Oxford, UK), Rachel Harrison (Department of Computing and Communication Technologies, Oxford Brookes University, Oxford, UK), Claudia Iacob (Department of Computing and Communication Technologies, Oxford Brookes University, Oxford, UK), Ann Nosseir (Oxford Brookes University, Oxford, UK), Kevin McDaid (Software Technology Research Centre, Dundalk Institute of Technology, Dundalk, County Louth, Ireland)
Issue 2
Article 1
Virtual Team Effectiveness: Investigating the Moderating Role of Experience with Computer-Mediated Communication on the Impact of Team Cohesion and Openness (pages 1-18)
John R. Carlson (Department of Information Systems, Baylor University, Waco, TX, USA), Dawn S. Carlson (Department of Management, Baylor University, Waco, TX, USA), Emily M. Hunter (Department of Management, Baylor University, Waco, TX, USA), Randal L. Vaughn (Department of Information Systems, Baylor University, Waco, TX, USA), Joey F. George (SCIS Department, Iowa State University, Ames, IA, USA)
Article 2
An Artifact Switching Model for User Acceptance of eBooks (pages 19-40)
Clive Sanford (Department of Information Systems, Hanyang University, Seoul, Korea)
Article 3
Goal Abstraction, Goal Linkage Dependency, and Perceived Utilitarian Value of Information Systems: A Mixed-Method Study (pages 41-58)
Sabine Matook (UQ Business School, The University of Queensland, Brisbane, QLD, Australia), Hans van der Heijden (School of Management, Royal Holloway, University of London, UK)
Article 4
Assessing ERP Learning (Management, Business Process, and Skills) and Attitudes (pages 59-74)
Timothy Paul Cronan (Department of Information Systems, Sam M. Walton College of Business, University of Arkansas, Fayetteville, AR, USA), David E. Douglas (Department of Information Systems, Sam M. Walton College of Business, University of Arkansas, Fayetteville, AR, USA)
Issue 3
Users and Uses Research: Understanding “The Familiar Unknown”
Guest Editorial Preface
Raymond R. Panko (Shidler College of Business Administration, University of Hawaii, Honolulu, HI, USA)
Article 1
End User Computing: The Dark Matter (and Dark Energy) of Corporate IT (pages 1-19)
Raymond R. Panko (Shidler College of Business Administration, University of Hawaii, Honolulu, HI, USA), Daniel N. Port (Department of Information Technology Management, University of Hawaii, Honolulu, HI, USA)
Article 3
A Composite Framework for Behavioral Compliance with Information Security Policies (pages 32-51)
Salvatore Aurigemma (Communication and Information Sciences (CIS) PhD Program, University of Hawaii at Manoa, Honolulu, HI, USA)
Article 4
Simplicity is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior (pages 52-66)
Jeffrey L. Jenkins (Marriott School of Management, Brigham Young University, Provo, UT, USA), Alexandra Durcikova (Price College of Business, The University of Oklahoma, Norman, OK, USA), Mary B. Burns (Jake Jabs College of Business & Entrepreneurship, Montana State University, Bozeman, MT, USA)
Article 5
Involving End Users to Mitigate Risk in IS Development Projects (pages 67-82)
Chintan Amrit (Department of Industrial Engineering and Business Information Systems, School of Management and Governance, University of Twente, Enschede, The Netherlands), Jos van Hillegersberg (Department of Industrial Engineering and Business Information Systems, School of Management and Governance, University of Twente, Enschede, The Netherlands), Bart van Diest (First Consulting B.V., Enschede, The Netherlands)
Issue 4
Article 1
Segmentation of Information Systems Users: The Finite Mixture Partial Least Squares Method (pages 1-26)
Semina Halilovic (School of Economics and Business,University of Sarajevo, Sarajevo, Bosnia and Herzegovina), Muris Cicic (School of Economics and Business, University of Sarajevo, Sarajevo, Bosnia and Herzegovina)
Article 2
Modeling the Impact of Biometric Security on Millennials’ Protection Motivation (pages 27-49)
Benjamin Ngugi (Suffolk University, Boston, MA, USA), Arnold Kamis (Suffolk University, Boston, MA, USA)
Article 3
Information Technology Management Practice: Impacts upon Effectiveness (pages 50-74)
Brandis Phillips (North Carolina A & T State University, Greensboro, NC, USA)
Article 4
End User Security Training for Identification and Access Management (pages 75-103)
Tonia San Nicolas-Rocca (School of Library and Information Science, San Jose State University, San Jose, CA, USA), Lorne Olfman (Center for Information Systems and Technology, Claremont Graduate University, Claremont, CA, USA)
Volume 24 (2012)
Issue 1
Article 1
Post-Acceptance Intentions and Behaviors: An Empirical Investigation of Information Technology Use and Innovation (pages 1-20)
Pamela E. Carter (North Carolina A&T State University, USA), Jason Bennett Thatcher (Clemson University, USA), Katherine M. Chudoba (Utah State University, USA), Kent Marett (Mississippi State University, USA)
Article 2
IS Security Policy Violations: A Rational Choice Perspective (pages 21-41)
Anthony Vance (Brigham Young University, USA), Mikko T. Siponen (University of Oulu, Finland)
Article 3
Typing Biometric Keypads: Combining Keystroke Time and Pressure Features to Improve Authentication (pages 42-63)
Benjamin Ngugi (Suffolk University, USA), Peter Tarasewich (Northeastern University, USA), Michael Recce (Jersey Institute of Technology, USA)
Article 4
Technology-Mediated Collaboration, Shared Mental Model and Task Performance (pages 64-81)
Hayward P. Andres (North Carolina A&T State University, USA)
Article 5
Exploring Choice as an Antecedent to Behavior: Incorporating Alternatives into the Technology Acceptance Process (pages 82-107)
Miguel I. Aguirre-Urreta (DePaul University, USA), George M. Marakas (University of Kansas, USA)
Issue 2
Article 1
The Role of IT Governance Practices in Creating Business Value in SMEs (pages 1-17)
Carla Wilkin (Monash University, Australia)
Article 2
Does Technology Trust Substitute Interpersonal Trust?: Examining Technology Trust’s Influence on Individual Decision-Making (pages 18-38)
Xin Li (University of South Florida St. Petersburg, USA), Guang Rong (Clemson University, USA), Jason Bennett Thatcher (Clemson University, USA)
Article 3
The Impact of Information Technology Internal Controls on Firm Performance (pages 39-49)
Lemuria D. Carter (North Carolina A&T State University, USA), Brandis Phillips (North Carolina A&T State University, USA), Porche Millington (North Carolina A&T State University, USA)
Article 4
Information Systems Service Quality, Zone of Tolerance, and User Satisfaction (pages 50-73)
Narasimhaiah Gorla (American University of Sharjah, UAE)
Issue 3
Article 1
Internet Voting Usefulness: An Empirical Analysis of Trust, Convenience and Accessibility (pages 1-17)
Lemuria Carter (North Carolina Agricultural and Technical State University, USA), Ronald Campbell (North Carolina Agricultural and Technical State University, USA)
Article 2
Developing an Instrument for E-Public Services’ Acceptance Using Confirmatory Factor Analysis: Middle East Context (pages 18-44)
Ahmed Alzahrani (King Saud University, Saudi Arabia), Bernd Carsten Stahl (De Montfort University, UK), Mary Prior (De Montfort University, UK)
Article 3
Inhibitors and Enablers of Public E-Services in Lebanon (pages 45-68)
Antoine Harfouche (University of Tours, France), Alice Robbin (Indiana University Bloomington, USA)
Article 4
The Role of End User in E-Government Application Development: A Conceptual Model in the Agricultural Context (pages 69-85)
Shah Jahan Miah (University of the Sunshine Coast, Australia)
Issue 4
Article 1
End User Adoption of Enterprise Systems in Eastern and Western Cultures (pages 1-17)
Yujong Hwang (School of Accountancy and MIS, DePaul University, Chicago, USA & College of International Studies, Kyung Hee University, Seoul, Korea)
Article 2
The Role of Appraisal in Adapting to Information Systems (pages 18-40)
Kelly J. Fadel (Department of Management Information Systems, Jon M. Huntsman School of Business, Utah State University, Logan, UT, USA)
Article 3
A Study of Help Requested Online by Spreadsheet Users (pages 41-53)
Chris Chambers (School of Electrical Engineering and Computer Science, Oregon State University, Corvallis, OR, USA), Zachary Sommers (School of Electrical Engineering and Computer Science, Oregon State University, Corvallis, OR, USA), Christopher Scaffidi (School of Electrical Engineering and Computer Science, Oregon State University, Corvallis, OR, USA)
Article 4
Computer Self-Efficacy: A Meta-Analysis (pages 54-80)
Rex Karsten (Department of Management, College of Business Administration, University of Northern Iowa, Cedar Falls, IA, USA), Atul Mitra (College of Business Administration, University of Northern Iowa, Cedar Falls, IA, USA), Dennis Schmidt (College of Business Administration, University of Northern Iowa, Cedar Falls, IA, USA)
Volume 23 (2011)
Issue 1
Article 1
Evaluation of Information Strategy Implementation: A Critical Approach (pages 1-17)
Yongmei Bentley (University of Bedfordshire Business School, UK), Steve Clarke (University of Hull Business School, UK)
Article 2
The Value of TAM Antecedents in Global IS Development and Research (pages 18-37)
Chad S. Anderson (Georgia State University, USA), Said Al-Gahtani (King Khalid University, Saudi Arabia), Geoffrey Hubona (Virginia Commonwealth University, USA)
Article 3
Construct Validity Assessment in IS Research: Methods and Case Example of User Satisfaction Scale (pages 38-63)
Dewi Rooslani Tojib (Monash University, Australia), Ly-Fie Sugianto (Monash University, Australia)
Article 4
A Social Capital Perspective on IT Professionals’ Work Behavior and Attitude (pages 64-78)
Lixuan Zhang (Augusta State University, USA), Mary C. Jones (University of North Texas, USA)
Article 5
Gender Differences in E-Learning: Communication, Social Presence, and Learning Outcomes (pages 79-94)
Richard D. Johnson (University at Albany – SUNY, USA)
Issue 2
Article 1
Developers, Decision Makers, Strategists or Just End-users? Redefining End-User Computing for the 21st Century: A Case Study (pages 1-14)
Sandra Barker (University of South Australia, Australia), Brenton Fiedler (University of South Australia, Australia)
Article 2
Participation in ICT-Enabled Meetings (pages 15-36)
Katherine M. Chudoba (Utah State University, USA), Mary Beth Watson-Manheim (University of Illinois, Chicago, USA), Kevin Crowston (Syracuse University, USA), Chei Sian Lee (Nanyang Technological University, Singapore)
Article 3
In or Out: An Integrated Model of Individual Knowledge Source Choice (pages 37-56)
Yinglei Wang (Acadia University, Canada), Darren Meister (The University of Western Ontario, Canada), Peter H. Gray (University of Virginia, USA)
Article 4
Expert and Novice End-User Spreadsheet Debugging: A Comparative Study of Performance and Behaviour (pages 57-80)
Brian Bishop (Dundalk Institute of Technology, Ireland), Kevin McDaid (Dundalk Institute of Technology, Ireland)
Issue 3
Article 1
Understanding User Dissatisfaction: Exploring the Role of Fairness in IT-Enabled Change (pages 1-25)
Tim Klaus (Texas A&M University – Corpus Christi, USA)
Article 2
Antecedents of Improvisation in IT-Enabled Engineering Work (pages 26-47)
William J. Doll (The University of Toledo, USA), Xiaodong Deng (Oakland University, USA)
Article 3
Exploring the Dimensions and Effects of Computer Software Similarities in Computer Skills Transfer (pages 48-66)
Yuan Li (Columbia College, USA), Kuo-Chung Chang (Yuan Ze University, Taiwan)
Article 4
Preparing IS Students for Real-World Interaction with End Users Through Service Learning: A Proposed Organizational Model (pages 67-80)
Laura L. Hall (University of Texas at El Paso, USA), Roy D. Johnson (University of Pretoria, South Africa)
Article 5
The Role of Computer Attitudes in Enhancing Computer Competence in Training (pages 81-100)
James P. Downey (University of Central Arkansas, USA), Lloyd A. Smith (Missouri State University, USA)
Issue 4
Article 1
Development of a Mesh Generation Code with a Graphical Front-End: A Case Study (pages 1-16)
Jeffrey Carver (University of Alabama, USA)
Article 2
Characterizing Data Discovery and End-User Computing Needs in Clinical Translational Science (pages 17-30)
Parmit K. Chilana (University of Washington, USA), Elishema Fishman (University of Washington, USA), Estella M. Geraghty (University of California, Davis, USA), Peter Tarczy-Hornoch (University of Washington, USA), Fredric M. Wolf (University of Washington, USA), Nick R. Anderson (University of Washington, USA)
Article 3
Computational Engineering in the Cloud: Benefits and Challenges (pages 31-50)
Lorin Hochstein (USC Information Sciences Institute, USA), Brian Schott (Nimbis Services, USA), Robert B. Graybill (USC Information Sciences Institute, USA)
Article 4
Scientific End-User Developers and Barriers to User/Customer Engagement (pages 51-63)
Judith Segal (The Open University, UK), Chris Morris (STFC Daresbury Laboratory, UK)
Article 5
An Analysis of Process Characteristics for Developing Scientific Software (pages 64-79)
Diane Kelly (Royal Military College of Canada, Canada)
Volume 22 (2010)
Issue 1
Article 1
End-User Software Engineering and Why it Matters (pages 1-22)
Margaret Burnett (Oregon State University, USA)
Article 2
Studying the Documentation of an API for Enterprise Service-Oriented Architecture (pages 23-51)
Brad A. Myers (Carnegie Mellon University, USA), Sae Young Jeong (Carnegie Mellon University, USA), Yingyu Xie (Carnegie Mellon University, USA), Jack Beaton (Nokia, Inc., USA), Jeff Stylos (Carnegie Mellon University, USA), Ralf Ehret (SAP AG, Germany), Jan Karstens (SAP AG, Germany), Arkin Efeoglu (SAP AG, Germany), Daniela K. Busse (SAP Labs LLC, USA)
Article 3
End User Development and Meta-Design: Foundations for Cultures of Participation (pages 52-82)
Gerhard Fischer (University of Colorado, USA)
Issue 2
Article 1
WOAD: A Framework to Enable the End-User Development of Coordination-Oriented Functionalities (pages 1-20)
Federico Cabitza (Università degli Studi di Milano-Bicocca, Italy), Carla Simone (Università degli Studi di Milano-Bicocca, Italy)
Article 2
Entering the Clubhouse: Case Studies of Young Programmers Joining the Online Scratch Communities (pages 21-35)
Yasmin B. Kafai (University of Pennsylvania, USA), Deborah A Fields (University of California, Los Angeles, USA), William Q. Burke (University of Pennsylvania, USA)
Article 3
Mutual Development: The Software Engineering Context of End-User Development (pages 36-57)
Anders I. Mørch (University of Oslo, Norway), Renate Andersen (University of Oslo, Norway)
Article 4
Appropriation Infrastructure: Mediating Appropriation and Production Work (pages 58-81)
Gunnar Stevens (University of Siegen and Fraunhofer FIT, Germany), Volkmar Pipek (University of Siegen and Fraunhofer FIT, Germany), Volker Wulf (University of Siegen and Fraunhofer FIT, Germany)
Issue 3
Article 1
The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions (pages 1-21)
Allen C. Johnston (University of Alabama Birmingham, USA), Merrill Warkentin (Mississippi State University, USA)
Article 2
Enterprise Systems Training Strategies: Knowledge Levels and User Understanding (pages 22-39)
Tony Coulson (California State University, San Bernardino, USA), Lorne Olfman (Claremont Graduate University, USA), Terry Ryan (Claremont Graduate University, USA), Conrad Shayo (California State University, San Bernardino, USA)
Article 4
A Model of System Re-Configurability and Pedagogical Usability in an E-Learning Context: A Faculty Perspective (pages 66-81)
Jianfeng Wang (Mansfield University of Pennsylvania, USA), William J. Doll (The University of Toledo, USA), Xiaodong Deng (Oakland University, USA)
Article 5
A Path Analysis of the Impact of Application-Specific Perceptions of Computer Self-Efficacy and Anxiety on Technology Acceptance (pages 82-95)
Bassam Hasan (The University of Toledo, USA), Mesbah U. Ahmed (The University of Toledo, USA)
Issue 4
Article 1
Contrasting IT Capability and Organizational Types: Implications for Firm Performance (pages 1-23)
Terry Anthony Byrd (Auburn University, USA), Linda W. Byrd (Auburn University, USA)
Article 2
Utilization and Perceived Benefit for Diverse Users of Communities of Practice in a Healthcare Organization (pages 24-50)
Steven Walczak (University of Colorado Denver, USA), Richard Mann (Cardinal Health, USA)
Article 3
Self-Determined Adoption of an ICT System in a Work Organization (pages 51-69)
Eija Korpelainen (Helsinki University of Technology, Finland), Matti Vartiainen (Helsinki University of Technology, Finland), Mari Kira (Helsinki University of Technology, Finland)
Article 4
Investigating Technology Commitment in Instant Messaging Application Users (pages 70-94)
Y. Ken Wang (University of Pittsburgh at Bradford, USA), Pratim Datta (Kent State University, USA)
Article 5
Organizing End-User Training: A Case Study of an E-Bank and its Elderly Customers (pages 95-112)
Harri Oinas-Kukkonen (University of Oulu,Finland), Sari Hohtari (Kemi-Tornio University of Applied Sciences, Finland), Samuli Pekkola (Tampere University of Technology, Finland)
Volume 21 (2009)
Issue 1
Article 1
An Examination of the Impacts of Brand Equity, Security, and Personalization on Trust Processes in an E Commerce Environment (pages 1-36)
Catharina Stoecklin-Serino (Florida State University, USA), David Paradice (Florida State University, USA)
Article 2
Exploring Online Transaction Self-Efficacy in Trust Building in B2C E-Commerce (pages 37-59)
Young Hoon Kim (Rutgers University, USA), Dan J. Kim (University of Houstin Clear Lake, USA), Yujong Hwang (DePaul University, USA)
Article 3
Rebuilding Post-Violation Trust in B2C Electronic Commerce (pages 60-74)
Qinyu Liao (The University of Texas at Brownsville and Texas Southmost College, USA), Xin Luo (The University of New Mexico, USA), Anil Gurung (Neuamann College, USA)
Article 4
An Exploratory Study Into Delivery and Payment Choice Restriction (pages 75-87)
Kevin J. Shanahan (New Mexico State University, USA), Barbara Ross-Wooldridge (The University of Texas at Tyler, USA), Charles M. Hermans (Missouri State University, USA)
Article 5
Swift Trust in Web Vendors: The Role of Appearance and Functionality (pages 88-108)
Xin Li (University of North Carolina at PemBrook, USA), Guang Rong (Clemson University, USA), Jason B. Thatcher (Clemson University, USA)
Issue 2
Article 1
Using Metaphors for Making Sense of End-User Attitudes and Behavior during Information Systems Development (pages 1-27)
Zahid Hussain (University of Bradford, UK), Khalid Hafeez (The University of York, UK)
Article 2
End User Authentication (EUA) Model and Password for Security (pages 28-43)
George S. Oreku (Harbin Institute of Technology, China), Jianzhong Li (Harbin Institute of Technology and Heilongjiang University, China)
Article 3
A Model of the Relationship among Consumer Trust, Web Design and User Attributes (pages 44-66)
Xiaoni Zhang (Northern Kentucky University, USA), Victor R. Prybutok (University of North Texas, USA), Sherry Ryan (University of North Texas, USA), Robert Pavur (University of North Texas, USA)
Article 4
Capturing and Comprehending the Behavioral/Dynamical Interactions within an ERP Implementation (pages 67-89)
James R. Burns (Texas Tech University, USA), Don G. Jung (MyongJi University, Korea), James J. Hoffman (Texas Tech University, USA)
Issue 3
Article 1
An Empirical Study of Computer Self-Efficacy and the Technology Acceptance Model in the Military: A Case of a U.S. Navy Combat Information System (pages 1-23)
Yair Levy (Nova Southeastern University, USA), Bruce D. Green (The GBS Group, USA)
Article 2
Errors in Operational Spreadsheets (pages 24-36)
Stephen G. Powell (Dartmouth College, USA), Kenneth R. Baker (Dartmouth College, USA), Barry Lawson (Dartmouth College, USA)
Article 3
Organizational Factors and Information Technology Use: Tying Perceptions of the Organization to Perceptions of IT (pages 37-59)
Riza Ergun Arsal (Clemson University, USA), Jason Bennett Thatcher (Clemson University, USA), Thomas J. Zagenczyk (Clemson University, USA), D. Harrison McKnight (Michigan State University, USA), Manju K. Ahuja (University of Louisville, USA)
Article 4
An Investigation of Liking of Computers, Help Received, and Job Outcomes for Computer Workers (pages 60-79)
Ranida B. Harris (Indiana University Southeast, USA), Kent Marett (Mississippi State University, USA)
Article 5
Analysis of User Involvement and Participation on the Quality of IS Planning Projects: An Exploratory Study (pages 80-98)
Varadharajan Sridhar (Management Development Institute, India), Dhruv Nath (Management Development Institute, India), Amit Malik (Management Development Institute, India)
Issue 4
Article 1
Investigating the Effects of Distractions and Task Complexity on Knowledge Worker Productivity in the Context of Mobile Computing Environments (pages 1-20)
Darren B. Nicholson (Rowan University, USA), Jennifer A. Nicholson (Rowan University, USA), D. Veena Parboteeah (Eastern New Mexico University, USA), Joseph S. Valacich (Washington State University, USA)
Article 2
Accurately Determining Self-Efficacy for Computer Application Domains: An Empirical Comparison of Two Methodologies (pages 21-40)
James P. Downey (University of Central Arkansas, USA), R. Kelly Rainer Jr. (Auburn University, USA)
Article 3
A Theoretical Investigation and Extension of a Model of Information Technology Architecture Maturity (pages 41-62)
Randy V. Bradley (The University of Tennessee, USA), Terry Anthony Byrd (Auburn University, USA)
Article 4
Pervasive or Invasive? A Strategic Approach to IT-Enabled Access and Immediacy (pages 63-72)
Linda L. Brennan (Mercer University, USA)
Volume 20 (2008)
Issue 1
Article 1
Knowledge Management Systems Usage: Rating Scheme Validity and the Effort-Accuracy Trade-Off (pages 1-16)
Robin Poston (University of Memphis, USA), Cheri Speier (Michigan State University, USA)
Article 2
Knowledge Appraisal and Knowledge Management Systems: Judging What We Know (pages 17-34)
Hannah Standing Rasmussen (University of Western Ontario, Canada), Nicole Haggerty (University of Western Ontario, Canada)
Article 3
Rewarding End-Users for Participating in Organizational KM: A Case Study (pages 35-49)
M. N. Ravishankar (School of Business and Economics, Loughborough University, Loughborough, UK)
Article 4
Exploring System Use as a Measure of Knowledge Management Success (pages 50-63)
Murray E. Jennex (San Diego State University, USA)
Article 5
A Call for Change in the Call Center (pages 64-75)
Debbie Richards (Macquarie University, Australia)
Issue 2
Article 1
Diffusing Management Information for Legal Compliance: The Role of the IS Organization Within the Sarbanes-Oxley Act (pages 1-24)
Ashley Braganza (Cranfield University, UK), Ray Hackney (Brunel University, UK)
Article 3
End User Types: An Instrument to Clarify Users Based on the User Cube (pages 61-81)
Chittibabu Govindarajulu (Delaware State University, USA), Bay Arinze (Drexel University, USA)
Issue 3
Article 1
Social and Usage-Process Motivations for Consumer Internet Access (pages 1-21)
Thomas F. Stafford (University of Memphis, USA)
Article 2
Explicating Computer Self-Efficacy Relationships: Generality and the Overstated Case of Specificity Matching (pages 22-40)
James P. Downey Jr. (University of Central Arkansas, USA), R. Kelly Rainer (Auburn University, USA), Summer E. Bartczak (Air Force Institute of Technology, USA)
Article 3
Design of the PromoPad: An Automated Augmented-Reality Shopping Assistant (pages 41-56)
Wei Zhu (Michigan State University, USA), Charles B. Owen (Cheil Communications, Korea)
Article 4
Thinking Outside of the Ballot Box: Examining Public Trust in E-Voting Technology (pages 57-80)
Susan K. Lippert (Drexel University, USA), Ekundayo B. Ojumu (IBM Global Services, USA)
Issue 4
Article 1
Looking at Behavioral Innovativeness: A Rasch Analysis (pages 1-22)
Geoffrey N. Soutar (University of Western Australia, Australia), Steven Ward (Murdoch University, Australia)
Article 2
The Role of Media Richness in Information Technology-Supported Communication in Group Cohesion, Agreeability, and Performance (pages 23-44)
Michael B. Knight (Texas A&M University - Kingsville, USA), J. Michael Pearson (Southern Illinois University at Carbondale, USA), D. Scott Hunsinger (Appalachian State University, USA)
Article 3
Ratings Scheme Bias in E-Commerce: Preliminary Insights (pages 45-73)
Robin S. Poston (University of Memphis, USA), Marla B. Royne (University of Memphis, USA)
Article 4
Validating the End-User Computing Satisfaction Instrument for Online Shopping Systems (pages 74-96)
Chung-Tzer Liu (Soochow University, Taiwan), Yi Maggie Guo (University of Michigan – Dearborn, USA)
Volume 19 (2007)
Issue 1
Article 1
Two Experiments in Reducing Overconfidence in Spreadsheet Development (pages 1-23)
Raymond R. Panko (University of Hawai`i, USA)
Article 2
User Acceptance of Voice Recognition Technology: An Empirical Extension of the Technology Acceptance Model (pages 24-50)
Steven John Simon (Mercer University, USA), David Paper (Utah State University, USA)
Article 3
Educating Our Students in Computer Application Concepts: A Case for Problem-Based Learning (pages 51-61)
Peter P. Mykytyn (Southern Illinois University, USA)
Article 4
Covert End User Development: A Study of Success (pages 62-71)
Elaine H. Ferneley (University of Salford, UK)
Issue 2
Article 1
Are Information Systems' Success and Failure Factors Related? An Exploratory Study (pages 1-22)
Jeremy J. Fowler (La Trobe University, Australia), Pat Horan (La Trobe University, Australia)
Article 2
When Technology Does Not Support Learning: Conflicts Between Epistemological Beliefs and Technology Support in Virtual Learning Environments (pages 23-46)
Steven Hornik (University of Central Florida, USA), Richard D. Johnson (University of South Florida, USA), Yu Wu (University of Central Florida, USA)
Article 3
Combining Tailoring and Evolutionary Software Development for Rapidly Changing Business Systems (pages 47-64)
Jeanette Eriksson (Blekinge Institute of Technology, Sweden), Yvonne Dittrich (IT-University of Copenhagen, Denmark)
Issue 3
Article 1
Spreadsheet Errors and Decision Making: Evidence from Field Interviews (pages 1-23)
Jonathan P. Caulkins (Carnegie Mellon University Heinz School of Public Policy and Management & Qatar Campus, USA), Erica Layne Morrison (IBM Global Services, USA), Timothy Weidemann (Fairweather Consulting, USA)
Article 2
Inhibitors of Two Illegal Behaviors: Hacking and Shoplifting (pages 24-42)
Lixuan Zhang (College of Charleston, USA), Randall Young (University of North Texas, USA), Victor Prybutok (University of North Texas, USA)
Article 3
The Development and Empirical Validation of the B2E Portal User Satisfaction (B2EPUS) Scale (pages 43-63)
Dewi Rooslani Tojib (Monash University, Australia), Ly Fie Sugianto (Monash University, Australia)
Issue 4
Article 1
A Theoretical Model and Framework for Understanding Knowledge Management System Implementation (pages 1-21)
Tom Butler (University College Cork, Ireland), Ciara Heavin (University College Cork, Ireland), Finbarr O’Donovan (University College Cork, Ireland)
Article 2
The Role of Fit in Knowledge Management Systems: Tentative Propositions of the KMS Design (pages 22-41)
Peter Baloh (University of Ljubljana, Slovenia)
Article 3
Users as Developers: A Field Study of Call Centre Knowledge Work (pages 42-56)
Beryl Burns (University of Salford, UK), Ben Light (University of Salford, UK)
Article 4
Exploring the Factors Influencing End Users' Acceptance of Knowledge Management Systems: Development of a Research Model of Adoption and Continued Use (pages 57-79)
Jun Xu (Southern Cross University, Australia), Mohammed Quaddus (Curtin University of Technology, Australia)
Volume 18 (2006)
Issue 1
Article 1
Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users (pages 1-22)
J. Drennan (University of Technology, Australia), G. Sullivan (Griffith University, Australia), J. Previte (The University of Queensland, Australia)
Article 2
Privacy Statements as a Means of Uncertainty Reduction in WWW Interactions (pages 23-49)
Irene Pollach (Vienna University of Economics and Business Administration, Austria)
Article 3
Effectiveness of Computer Training: The Role of Multilevel Computer Self-Efficacy (pages 50-68)
Bassam Hasan (The University of Toledo, USA)
Issue 2
Article 1
Examining User Perceptions of Third-Party Organizations Credibility and Trust in an E-Retailer (pages 1-19)
Robin L. Wakefield (Hankamer School of Business, Baylor University, USA), Dwayne Whitten (Mays School of Business, Texas A&M University, USA)
Article 3
Evaluating Group Difference in Gender During the Formation of Relationship Quality and Loyalty in ISP Service (pages 38-62)
Chieh-Peng Ling (Vanung University, Taiwan), Cherng G. Ding (National Chiao Tung University, Taiwan)
Issue 3
Article 1
Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model (pages 1-24)
Tabitha James (Virginia Polytechnic Institute & State University, USA), Taner Pirim (Mississippi Center for Supercomputing Research, USA), Katherine Boswell (Middle Tennessee State University, USA), Brian Reithel (University of Mississippi, USA), Reza Barkhi (Virginia Polytechnic Institute & State University, USA)
Article 2
Intentions to Use Information Technologies: An Integrative Model (pages 25-46)
Ron Thompson (Wake Forest University, USA), Deborah Compeau (University of Western Ontario, Canada), Chris Higgins (University of Western Ontario, Canada)
Article 4
End User Computing Ergonomics: Facts or Fads? (pages 66-74)
Carol Clark (Middle Tennessee State University, USA)
Issue 4
Article 1
Super Users and Local Developers: The Organization of End-User Development in an Accounting Company (pages 1-21)
Hege-René Hansen Asand (University of Oslo, Norway), Anders I. Morch (University of Oslo, Norway)
Article 2
End-User Perceptions of the Benefits and Risks of End-User Web Development (pages 22-42)
Tanya McGill (Murdoch University, Australia), Chris Klisc (Murdoch University, Australia)
Article 3
Supporting Work Practice Through End-User Development Environments (pages 43-65)
M. F. Costabile (Universita di Bari, Italy), D. Fogli (Universita di Brescia, Italy), R. Lanzilotti (Universita di Milano, Italy)
Article 4
Semantic Composition of Web Portal Components (pages 66-87)
Jens Jahnke (University of Victoria, Canada), Yury Bychkov (University of Victoria, Canada), D. Dahlem (University of Victoria, Canada), L. Kawasme (University of Victoria, Canada)
Volume 17 (2005)
Issue 1
Article 1
Article 2
Business Software Specifications for Consumers: Toward a Standard Format (pages 23-37)
Shouhong Wang (University of Massachusetts, Dartmouth, USA)
Article 3
The Role of Internet Self-Efficacy in the Acceptance of Web-Based Electronic Medical Records (pages 38-57)
Qingxiong Ma (Central Missouri State University, USA), Liping Liu (University of Akron, USA)
Issue 2
Article 1
Learning to Use IT in the Workplace: Mechanisms and Masters (pages 1-25)
Valerie K. Spitler (University of North Florida, USA)
Article 2
Learning from Patterns During Information Technology Configuration (pages 26-42)
Keith S. Horton (Napier University, UK), Rick G. Dewar (Heriot-Watt University, UK)
Article 3
Impact of Personal Innovativeness on the Use of the Internet Among Employees at Work (pages 43-63)
Tor J. Larsen (Norwegian School of Management, Norway), Øystein Sorebo (Buskerud University College, Norway)
Article 4
User Behaving Badly: Phenomena and Paradoxes from an Investigation into Information System Misfit (pages 64-91)
Panagiotis Kanellis (Athens University of Economics and Business, Greece), Ray J. Paul (Brunel University, UK)
Issue 3
Article 1
A Comparison of Audio-Conferencing and Computer Conferencing in a Dispersed Negotiation Setting: Efficiency Matters! (pages 1-26)
Abbas Foroughi (University of Southern Indiana, USA), William C. Perkins (Indiana University, USA), Leonard M. Jessup (Washington State University, USA)
Article 2
The Effectiveness of Online Task Support vs. Instructor-Led Training (pages 27-46)
Ji-Ye Mao (City University of Hong Kong, Hong Kong), Bradley R. Brown (University of Waterloo, Canada)
Article 3
Issue 4
Article 1
Quality of Use of a Complex Technology: A Learning-Based Model (pages 1-22)
Marie-Claude Boudreau (The University of Georgia, USA), Larry Seligman (The University of Georgia, USA)
Article 2
Assessing Web-Enabled Interactivity: An Audit Tool (pages 23-48)
Barbara Marcolin (University of Calgary, Canada), Nicole Coviello (University of Auckland, New Zealand), Roger Milley (Shell Canada Limited, Canada)
Article 3
The Changing Demographics: The Diminishing Role of Age and Gender in Computer Usage (pages 49-65)
Michael B. Knight (Appalachian State University, USA), J. Michael Pearson (Southern Illinois University at Carbondale, USA)
Volume 16 (2004)
Issue 1
Article 1
Success Factors in the Implementation of a Collaborative Technology, and Resulting Productivity Improvements in a Small Business: An Exploratory Study (pages 1-20)
Nory B. Jones (University of Maine, USA), Thomas R. Kochtanek (University of Missouri, USA)
Article 2
Organizational Knowledge Sharing in ERP Implementation: Lessons from Industry (pages 21-40)
Mary C. Jones (University of North Texas, USA), R. Leon Price (University of Oklahoma, USA)
Article 3
The Effect of End User Development on End User Success (pages 41-58)
Tanya McGill (Murdoch University, Australia)
Article 4
The Technology Acceptance Model: A Meta-Analysis of Empirical Findings (pages 59-72)
Qingxiong Ma (Central Missouri State University, USA), Liping Liu (University of Akron, USA)
Issue 2
Article 1
Supporting the JAD Facilitator with the Nominal Group Technique (pages 1-19)
Evan W. Duggan (University of Alabama, USA), Cherian S. Thachenkary (Georgia State University, USA)
Article 2
Predicting Computer Task Performance: Personal Goal and Self-Efficacy (pages 20-37)
Mun Y. Yi (University of South Carolina, USA), Kun S. Im (Yonsei University, Korea)
Article 3
Perceived Control in Information Systems (pages 38-56)
Steven A. Morris (Middle Tennessee State University, USA), Thomas E. Marshall (Auburn University, USA)
Issue 3
Article 1
Electronic Banking and Information Assurance Issues: Surveys and Synthesis (pages 1-21)
Manish Gupta (State University of New York, USA), Raghav Rao (State University of New York, USA), Shambhu Upadhyaya (State University of New York, USA)
Article 2
Computer Security and Risky Computing Practices: A Rational Choice Perspective (pages 22-40)
Kregg Aytes (Idaho State University, USA), Terry Connolly (University of Arizona, USA)
Article 3
Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security (pages 41-58)
Merrill Warkentin (Mississippi State University, USA), Kimberly Davis (Mississippi State University, USA), Ernst Bekkering (Mississippi State University, USA)
Article 4
Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics? (pages 59-77)
Bernd Carsten Stahl (De Montfort University, UK)
Issue 4
Article 1
Toward a Comprehensive Framework: EUC Research Issues and Trends (1999-2000) (pages 1-16)
James P. Downey (University of Central Arkansas, USA)
Article 2
Testing the Technology-to-Performance Chain Model (pages 17-36)
D. Sandy Staples (Queen’s University, Canada), Peter Seddon (The University of Melbourne, Australia)
Article 3
Asynchronous Learning Using a Hybrid Learning Package: A Teacher Development Strategy in Geography (pages 37-54)
Kalyani Chatterjea (Nanyang Technological University, Singapore)
Article 4
Applying Strategies to Overcome User Resistance in a Group of Clinical Managers to a Business Software Application: A Case Study (pages 55-64)
Barbara Adams (Cyrus Medical Systems, USA), Eta S. Berner (University of Alabama at Birmingham, USA), Joni Rousse Wyatt (Norwood Clinic, Inc., USA)
Volume 15 (2003)
Issue 1
Article 1
Some UK and USA Comparisons of Executive Information Systems in Practice and Theory (pages 1-19)
Xianzhong M. Xu (University of Portsmouth, UK), Brian Lehaney (Coventry University, UK), Steve Clarke (University of Luton, UK), Yanqing Duan (University of Luton, UK)
Article 2
Framework for Cognitive Skill Acquisition and Spreadsheet Training (pages 20-37)
S. E. Kruck (James Madison University, USA), John J. Maher (Virginia Polytechnic Institute & State Univ., USA), Reza Barkhi (Virginia Polytechnic Institute & State Univ., USA)
Article 3
The Roles of Computer Self-Efficacy and Outcome Expectancy in Influencing the Computer End-User's Organizational Commitment (pages 38-53)
Robert W. Stone (University of Idaho, USA), John W. Henry (Georgia Southern University, USA)
Article 4
Internetalization of End-Users (pages 54-56)
A. K. Aggarwal (University of Baltimore, USA)
Issue 2
Article 1
Understanding the Hidden Dissatisfaction of Users toward End-User Computing (pages 1-22)
Nancy Shaw (George Mason University, USA), Joo-Eng Lee-Partridge (Central Connecticut State University, USA), James S. Ang (National University in Singapore, Singapore)
Article 2
The Impact of Computer Processor Speed on End-User Productivity (pages 23-36)
David C. Wierschem (Texas A&M University, USA), Thomas L. Brodnax (Texas A&M University, USA)
Article 3
Article 4
Exploring the Effects of Hardware Performance, Application Design and Cognitive Demands on User Productivity and Perceptions (pages 54-74)
Andrew Sears (University of Maryland Baltimore County, USA), Julie A. Jacko (Georgia Institute of Technology, USA)
Issue 3
Article 1
TAM or Just Plain Habit: A Look at Experienced Online Shoppers (pages 1-13)
David Gefen (Drexel University, USA)
Article 2
Assessing Customer Perceptions of Website Service Quality in Digital Marketing Environments (pages 14-31)
Yi-Shun Wang (National Changhua University of Education, Taiwan), Tzung-I Tang (National Chengchi University, Taiwan)
Article 3
On-Line Retailing: What Drives Success? Evidence from Ireland (pages 32-44)
William Golden (National University of Ireland Galway, Ireland), Marsha Hughes (National University of Ireland Galway, Ireland), Patricia Gallagher (IBM Global Services, Ireland)
Article 4
Website Retailing: Electronic Supply Chain Replenishment (pages 45-55)
Lori N. Leonard (University of Tulsa, USA), Timothy P. Cronan (University of Arkansas Fayetteville, USA)
Issue 4
Article 1
Toward an Integrative Framework for Online Consumer Behavior Research: A Meta-Analysis Approach (pages 1-26)
Khawaja A. Saeed (University of South Carolina, USA), Yujong Hwang (DePaul University, USA), Mun Y. Yi (University of South Carolina, USA)
Article 2
Understanding Web Information Search Behavior: An Exploratory Model (pages 27-48)
Christopher Hodkinson (Griffith University, Australia), Geoffrey Kiel (University of Queensland Business School, Australia)
Article 3
Patient Health Information Search: An Exploratory Model of Web-based Search Behavior (pages 49-61)
Jason E. Lueg (Mississippi State University, USA), Robert S. Moore (Mississippi State University, USA), Merrill Warkentin (Mississippi State University, USA)
Article 4
Customer Perceptions of a Thin-Client Micro-Payment System: Issues and Experiences (pages 62-77)
Xiaoling Dai (University of Auckland, New Zealand), John Grundy (University of Auckland, New Zealand)
Article 5
Virtual Reality, Involvement and the Consumer Interface (pages 78-96)
John Gammack (Griffith University, Australia), Christopher Hodkinson (Griffith University, Australia)
Volume 14 (2002)
Issue 1
Article 1
The Focus of Research in End User Computing: Where Have We Come Since the 1980s? (pages 3-22)
Ann Powell (Southern Illinois University-Edwardsville, USA), Jo E. Moore (Southern Illinois University-Edwardsville, USA)
Article 2
The Role of Trainer Behavior in End User Software Training (pages 23-32)
Deborah Compeau (University of Calgary, Canada)
Article 3
Towards User-Oriented Control of End-User Computing in Large Organizations (pages 33-41)
Neil McBride (DeMontfort University, UK), A. Trevor Wood-Harper (University of Salford, UK)
Issue 2
Article 1
End-User Perspectives on the Uptake of Computer Supported Cooperative Working (pages 3-15)
Phil Turner (Napier University, Scotland), Susan Turner (Napier University, Scotland)
Article 2
How Does Attitude Impact IT Implementation: A Study of Small Business Owners (pages 16-29)
Elaine R. Winston (Hofstra University, USA), Dorothy Dologite (Baruch College, City University of New York, USA)
Article 3
A Three-Tier Technology Training Strategy in a Dynamic Business Environment (pages 30-39)
Albert Huang (University of the Pacific, USA)
Article 4
A Study of Computer Attitudes of Non-Computing Students of Technical Colleges in Brunei Darussalam (pages 40-47)
Afzaal H. Seyal (Institute Technology Brunei, Brunei Darussalam), Mahbubur M. Rahim (Institute Technology Brunei, Brunei Darussalam), M. Noah Rahman (Institute Technology Brunei, Brunei Darussalam)
Issue 3
Article 1
User-Developed Applications: Can End Users Assess Quality? (pages 1-15)
Tanya J. McGill (Murdoch University, Australia)
Article 2
Effectiveness of Systems Analysis and Design Education: An Exploratory Study (pages 16-31)
Rajiv Kohli (University of Notre Dame, USA), Jatinder N. Gupta (University of Alabama in Huntsville, USA)
Article 3
Environmental and Person Antecedents of Telecommuting Outcomes (pages 32-50)
Victor Y. Haines III (University of Sherbrooke, Canada), Silvie St-Onge (Ecole des Hautes Etudes Commerciales, Canada), Martine Archambault (University of Sherbrooke, Canada)
Article 4
A Visual Code Inspection Approach to Reduce Spreadsheet Linking Errors (pages 51-63)
Mike Morrison (University of Wisconsin-Eau Claire, USA), Joline Morrison (University of Wisconsin-Eau Claire, USA), John Melrose (University of Wisconsin-Eau Claire, USA), E. Vance Wilson (Arizona State University, USA)
Issue 4
Article 1
Toward an Understanding of the Behavioral Intention to Use a Groupware Application (pages 1-16)
Yining Chen (Ohio University, USA), Hao Lou (Ohio University, USA)
Article 3
Selecting High-Performing Information Technology Professionals (pages 37-50)
L. A. Witt (University of New Orleans, USA), L. A. Burke (Louisiana State University-Shreveport, USA)
Article 4
An Analysis of IS Professional and End User Causal Attributions for User-System Outcomes (pages 51-73)
Rex Karsten (University of Northern Iowa, USA)
Volume 13 (2001)
Issue 1
Article 1
The Assessment of Software Quality from the User Perspective: Evaluation of a GIS Implementation (pages 3-11)
Brownwyn Huitfeldt (Queensland Department of Natural Resources, Australia), Michael Middleton (Queensland University of Technology, Australia)
Article 2
The Relationship Between User Participation and the Management of Change Surrounding the Development of Information Systems: A European Perspective (pages 12-25)
Tom Butler (University College Cork, Ireland), Brian Fitzgerald (University College Cork, Ireland)
Article 3
Influence of Computer Attitude and Self-Efficacy on IT Usage Behavior (pages 26-33)
Patrick Y. Chau (University of Hong Kong, Hong Kong)
Article 4
VDT Health Hazards: A Guide for End Users and Managers (pages 34-39)
Carol Clark (Middle Tennessee State University, USA)
Issue 2
Article 1
A Study of Remote Workers and Their Differences from Non-Remote Workers (pages 3-14)
D. Sandy Staples (Queen’s University, Canada)
Article 2
A Comparison of Surrogate Success Measures in Ongoing Representation Decision Support Systems: An Extension to Simulation Technology (pages 15-25)
Roger McHaney (Kansas State University, USA), Timothy P. Cronan (University of Arkansas, USA)
Article 3
The Effect of Individual Differences on Computer Attitudes: An Empirical Study (pages 26-39)
Claudia Orr (Northern Michigan University, USA), David Allen (Northern Michigan University, USA), Sandra Poindexter (Northern Michigan University, USA)
Article 4
The Effect of Attitudes, Goal Setting and Self-Efficacy on End User Performance (pages 40-45)
I. M. Jawahar (Illinois State University, USA), B. Elango (Illinois State University, USA)
Issue 3
Article 1
Nursing Staff Requirements for Telemedicine in the Neonatal Intensive Care Unit (pages 5-13)
Tara Qavi (User Centred Design Specialist, UK), Lisa Corley (University of Salford, UK), Steve Kay (University of Salford, UK)
Article 2
Scanning and Image Processing System (SIPS) for Medication Ordering (pages 14-19)
Stephen L. Chan (Hong Kong Baptist University, Hong Kong)
Article 3
Organizational and Implementation Issues of Patient Data Management Systems in an Intensive Care Unit (pages 20-29)
Nathalie Mitev (London School of Economics, UK), Sharon Kerkham (Salford University, UK)
Article 4
Studying the Translations of NHSnet (pages 30-40)
Edgar A. Whitley (London School of Economics and Political Science, UK), Athanasia Pouloudi (Brunel University, UK)
Issue 4
Article 1
The Importance of User Ownership and Positive User Attitudes in the Successful Adoption of Community Information Systems (pages 5-16)
C. R. Coombs (Loughborough University, UK), N. F. Doherty (Loughborough University, UK), J. Loan-Clarke (Loughborough University, UK)
Article 2
Experiences from Health Information System Implementation Projects Reported in Canada Between 1991 and 1997 (pages 17-25)
Francis Lau (University of Alberta, Canada), Marilynne Hebert (University of British Columbia, Canada)
Article 3
Introducing Computer-Based Telemedicine in Three Rural Missouri Counties (pages 26-35)
Kimberly D. Harris (Duquesne University, USA), Joseph F. Donaldson (University of Missouri-Columbia, USA), James D. Campbell (University of Missouri-Columbia, USA)
Volume 12 (2000)
Issue 1
Article 1
The Role of Training in Preparing End Users to Learn Related Software (pages 3-13)
Conrad Shayo (California State University-San Bernardino, USA), Lorne Olfman (Claremont Graduate University, USA)
Article 2
The Impact of Task and Cognitive Style on Decision-making Effectiveness Using a Geographic Information System (pages 14-23)
Martin D. Crossland (Southwest Missouri State University, USA), Richard T. Herschel (St. Joseph’s University, USA), William C. Perkins (Indiana University, USA), Joseph N. Scudder (Northern Illinois University, USA)
Article 3
Schools of Thought in Research into End-User Computing Success (pages 24-34)
Roger W. Harris (Universiti Malaysia Sarawak, Malaysia)
Article 4
Shifting Paradigms: The New Informated Business Architecture (pages 35-43)
Andrew S. Targowski (Western Michigan University, USA), Thomas A. Carey (Western Michigan University, USA)
Issue 2
Article 1
Pricing Strategies and Technologies for On-Line Delivered Content (pages 4-10)
Martin Bichler (Vienna University of Economics and Business Administration, Australia), Claudia Loebbecke (Copenhagen Business School, Denmark)
Article 2
Digital News: Content, Delivery, and Value Propositions for an Intangible Product (pages 11-19)
Jonathan W. Palmer (University of Maryland, USA), Lars B. Eriksen (University of Aalborg, Denmark)
Article 3
Commercialization of Electronic Information (pages 20-31)
Jean-Henry Morin (University of Geneva, Switzerland), Dimitri Konstantas (University of Geneva, Switzerland)
Article 4
Signalling Intentions and Obliging Behavior Online: An Application of Semiotic and Legal Modeling in E-Commerce (pages 33-42)
James Backhouse (London School of Economics, UK), Edward K. Cheng (Harvard Law School, USA)
Article 5
Issue 3
Article 1
End Users as Expert System Developers? (pages 3-13)
Christian Wagner (City University of Hong Kong, Hong Kong)
Article 2
Designing End-User Geographic Information Systems (pages 14-22)
Lawrence A. West (University of Central Florida, USA)
Article 3
An Architecture for Organizational Decision Support Systems that Utilizes a Model Coordination Subsystem (pages 23-34)
Gyeung-Min J. Kim (Morgan State University, USA), James R. Burns (Texas Tech University, USA), Rohae Myung (Morgan State University, USA)
Issue 4
Article 1
Web-User Satisfaction: An Exploratory Study (pages 3-10)
James R. Otto (Villanova University, USA), Mohammad K. Najdawi (Villanova University, USA), Karen M. Caron (Villanova University, USA)
Article 2
The Impact of Gender and Experience on User Confidence in Electronic Mail (pages 11-20)
John A. Hoxmeier (Colorado State University, USA), Winter Nie (American Graduate School of International Management, USA), G. Thomas Purvis (Hewlett-Packard Corporation, USA)
Article 3
Perceived Value and Technology Adoption Across Four End User Groups (pages 21-28)
Jaak Jurison (Fordham University, USA)
Volume 11 (1999)
Issue 1
Article 1
Exploring the Measurement of End User Computing Success (pages 5-14)
Conrad Shayo (CA State University, San Bernardino, USA), Ruth Guthrie (CA Polytechnic University of Pomona, USA), Magid Igbaria (Claremont Graduate University, USA)
Article 2
Constructive Design Environments: Implementing End User Systems Development (pages 15-23)
John G. Gammack (Murdoch University, Australia)
Article 3
Strategies for Managing EUC on the Web (pages 24-31)
R. Ryan Nelson (University of Virginia, USA), Peter Todd (University of Houston, USA)
Article 4
Rethinking End-User Training Strategy: Applying a Hierarchical Knowledge-Level Model (pages 32-39)
Maung Sein (Agder College, Norway), Robert P. Bostrom (University of Georgia, USA), Lorne Olfman (Claremont Graduate University, USA)
Article 5
Knowledge Transfer in Conceptual Modeling by End Users (pages 40-51)
Laku Chidambaram (Indiana University, USA)
Issue 2
Article 1
Strategic Information Systems Planning: Perspectives on the Role of the “End User” Revisited (pages 3-12)
Ray Hackney (Manchester Metropolitan University, UK), John Kawalek (Sheffield Hallam University, UK), Gurpreet Dhillon (University of Nevada, Las Vegas, USA)
Article 2
Copyright, Piracy, Privacy, and Security Issues: Acceptable or Unacceptable Actions for End Users? (pages 13-20)
Jennifer Kreie (University of Arkansas, USA), Timothy Paul Cronan (University of Arkansas, USA)
Article 3
The Relationship Between User Satisfaction and Systems Usage: Empirical Evidence from Egypt (pages 21-28)
Omar E.M. Khalil (University of MA Dartmouth, USA), Manal M. Elkordy (Alexandria University, Egypt)
Issue 3
Article 1
Beyond Backpropagation: Using Simulated Annealing for Training Neural Networks (pages 3-10)
Randall S. Sexton (Ball State University, USA), Robert E. Dorsey (University of Mississippi, USA), John D. Johnson (University of Mississippi, USA)
Article 2
A New Approach to Evaluating Business Ethics: An Artificial Neural Networks Application (pages 11-19)
Mo Adam Mahmood (University of Texas, El Paso, USA), Gary L. Sullivan (University of Texas, El Paso, USA), Ray-Lin Tung (University of Texas, El Paso, USA)
Article 3
DSS Model Usage in Public and Private Sectors: Differences and Implications (pages 20-28)
Anil Aggarwal (University of Baltimore, USA), Rajesh Mirani (University of Baltimore, USA)
Issue 4
Article 1
The Reality of User-Centered Design (pages 5-15)
Susan Gasson (Binghamton University, State Univ NY, USA)
Article 2
Measuring the Impact of Information Systems on Organizational Behavior (pages 16-21)
R. Wayne Headrick (New Mexico State University, USA), George W. Morgan (Southwest Texas State University, USA)
Article 3
What’s in a Name?: Exploring the Metaphorical Implications of Data Warehousing in Concept and Practice (pages 22-32)
Elizabeth J. Davidson (University of Hawaii Manoa, USA)
Article 4
The Human Side of Information Systems Development: A Case of an Intervention at a British Visitor Attraction (pages 33-39)
Brian Lehaney (University of Luton Business School, UK), Steve Clarke (University of Luton Business School, UK), Vikki Kimberlee (University of Luton Business School, UK), Sarah Spencer-Matthews (Swinburne University of Technology, Australia)
Article 5
The Wicked Relationship between Organizations and Information Technology (pages 40-51)
Gill Mallalieu (University of Sunderland, UK), Clare Harvey (University of Sunderland, UK), Colin Hardy (University of Sunderland, UK)
Volume 10 (1998)
Issue 1
Article 1
Communicating Project Drift Through Cost/Benefit Scenarios (pages 5-11)
David Mccomb (First Principles, Inc., USA), Jill Smith Slater (University of Denver, USA)
Article 2
The Soft System Methodology as a Framework for Software Process Improvement (pages 12-19)
Peter D.C. Bennetts (Cheltenham and Gloucester College of Higher Education, UK), A. Trevor Wood-Harper (University of Salford, UK), Stella Mills (Cheltenham and Gloucester College of Higher Education, UK)
Article 3
An Analysis of Excluded IS Processes in the Capability Maturity Model and Their Potential Impact (pages 20-29)
Russell L. Purvis (University of Central Florida, USA), Jose Santiago (University of Central Florida, USA), V. Sambamurthy (Florida State University, USA)
Issue 2
Article 1
The Place of User Enhanceability in User-Oriented Software Development (pages 3-14)
Nikolay Mehandjiev (University of Hull, UK), Leonardo Bottaci (University of Hull, UK)
Article 2
What We Know About Spreadsheet Errors (pages 15-21)
Raymond R. Panko (University of Hawaii, USA)
Article 3
Tailoring Tools for System Development (pages 22-29)
Anders I. Mørch (University of Bergen, Norway)
Article 4
End-User Programming in Three Dimensions (pages 30-37)
Natalia Kowalczyk (University of Gdansk, Poland)
Article 5
Supporting Large-Scale End User Specification of Workflows, Work Coordination and Tool Integration (pages 38-48)
John Grundy (University of Waikato, New Zealand), John Hosking (University of Auckland, New Zealand), Warwick Mugridge (University of Auckland, New Zealand)
Issue 3
Article 1
The Effects of Conceptual Consistency on the End User’s Mental Models of Multiple Applications (pages 3-15)
John W. Satzinger (Southwest Missouri State University, USA)
Article 2
A Survey of Factors Affecting Physical Discomfort at a Computer Workstation (pages 16-26)
Tung Lai Lai (Nanyang Technological University, Singapore), Kyung Kyu Kim (Nanyang Technological University, Singapore), Ang Kah Eng (Nanyang Technological University, Singapore), Neo Aik Keong (Nanyang Technological University, Singapore), Pang Soh Chui (Nanyang Technological University, Singapore)
Article 3
Preparing Future Technology Users (pages 27-31)
Mary J. Granger (George Washington University, USA), Susan K. Lippert (George Washington University, USA)
Issue 4
Article 1
The Effects of Environmental Factors on the Adoption and Diffusion of Telework (pages 5-14)
Cynthia Ruppel (University of Toledo, USA), Geoffry S. Howard (Kent State University, USA)
Article 2
The Work Experiences of Professional Men and Women Who Telecommute: Convergence or Divergence? (pages 15-22)
Donna W. Mccloskey (Widener University, USA), Magid Igbaria (Claremont Graduate University, USA and Tel Aviv University, Israel), Saroj Parasuraman (Drexel University, USA)
Article 3
Managers: A Key Ingredient to Alternative (pages 23-32)
C. Bruce Kavan (University of North Florida, USA), Carol Stoak Saunders (University of Oklahoma, USA)
Article 4
Work Ethic Differences Between Traditional and Telework Employees (pages 33-41)
Ruth A. Guthrie (University of Redlands, USA), James B. Pick (University of Redlands, USA)
Article 5
Family Structure and the Telecommuter’s Quality of Life (pages 42-49)
Terri L. Dixon (Sumitomo Electric Lightwave Corp., USA), Jane Webster (University of Waterloo, Canada)
Volume 9 (1997)
Issue 1
Article 1
Article 2
Article 3
An Information Abstraction Model for End User CASE Support (pages 28-34)
Shirley Becker (American University, USA), Rick Gibson (American University, USA)
Issue 2
Article 1
Assessing User Computing Effectiveness: An Integrated Model (pages 3-15)
Tor Guimaraes (Tennessee Technological University, USA), Magid Igbaria (Claremont Graduate School, USA)
Article 2
Effects of User Characteristics on Computer Attitudes Among Undergraduate Business Students (pages 16-23)
Ibrahim M. Al-Jabri (King Fahd University of Petroleum and Minerals, Saudi Arabia), Muhammad A. Al-Khaldi (King Fahd University of Petroleum and Minerals, Saudi Arabia)
Article 3
Confirmatory Factor Analysis of the End-User Computing Satisfaction Instrument: A Replication (pages 24-31)
William J. Doll (University of Toledo, USA), Weidong Xia (University of Pittsburgh, USA)
Issue 3
Article 1
End User Ability: Impact of Job and Individual Differences (pages 3-13)
Barbara Marcolin (University of Calgary, Canada), Malcolm Munro (University of Calgary, Canada), Kevin Campbell (National Energy Board, Canada)
Article 2
End User Training: An Experimental Comparison of Lecture versus Computer-Based Training (pages 14-27)
George A. Bohlen (University of Dayton, USA), Thomas W. Ferratt (University of Dayton, USA)
Issue 4
Article 1
An Attributional Analysis of the Rejection of Information Technology (pages 3-18)
John W. Henry (Georgia Southern University, USA), Mark J. Martinko (Florida State University, USA)
Article 2
Determinants of Variability in Function Point Estimates (pages 19-28)
Ashok Subramanian (University of Missouri, USA), Mary C. Lacity (University of Missouri, USA)
Article 3
Hierarchy of End User Computing Needs: An Empirical Investigation (pages 29-35)
Mohammed H.A. Tafti (Hofstra University, USA), Ashraf I. Shirani (Hofstra University, USA)
Volume 8 (1996)
Issue 1
Article 1
An Investigation of the Relationship Between Managerial Personality Type and Computer Use (pages 4-12)
Charles H. Mawhinney (Metropolitan State College of Denver, USA), Albert L. Lederer (University of Kentucky, USA)
Article 2
A Study of End User Computing and the Provision of Tool Support to Advance End User Empowerment (pages 13-21)
H.U. Shah (Aston University, UK), D.R. Lawrence (University of Wolverhampton, UK)
Article 3
Office Computer Systems in Healthcare: Use and Assessment (pages 22-30)
Judy L. Wynekoop (University of Texas, San Antonio, USA)
Issue 2
Article 1
Definition and Measurement of End User Computing Sophisticiation (pages 3-13)
Samir Blili (Université du Québec à Trois-Rivières, Canada), Louis Raymond (Université du Québec à Trois-Rivières, Canada), Suzanne Rivard (Ecole des Hautes Etudes Commerciales, Canada)
Article 2
Knowledge Transfer from Expert Systems vs. Traditional Instruction: Do Personality Traits Make a Difference? (pages 14-20)
Marcus D. Odom (University of Southwestern LA, USA), Hamid Pourjalali (University of Southwestern LA, USA)
Article 3
A Methodology for Evaluating EIS Software Packages (pages 21-31)
Dae-Ho Byun (Kyungsung University, South Korea), Eui-Ho Suh (POSTECH, South Korea)
Issue 3
Article 1
A Comparison of Foreign Government Computing Policies (pages 3-10)
Rick Gibson (American University, USA), Mary Alice Mcdonough (Computer Data Systems, USA)
Article 2
Computer Use Patterns (pages 11-14)
Terry D. Lundgren (Eastern Illinois University, USA), Carol A. Lundgren (Eastern Illinois University, USA)
Article 3
The Impact of Decision Support Training on Computer Use: The Effect of Prior Training, Age, and Gender (pages 15-23)
F. Nelson Ford (Auburn University, USA), William N. Ledbetter (Middle Tennessee State University, USA), Tom L. Roberts (Middle Tennessee State University, USA)
Issue 4
Article 1
Determinants of Microcomputer Usage in the Republic of Ireland (pages 3-10)
Marilyn L. Wilkins (Eastern Illinois University, USA)
Article 2
Graduate Business Students as Surrogates for Executives in the Evaluation of Technology (pages 11-19)
Robert Owen Briggs (University of Arizona, USA), Pierre A. Balthazard (University of Arizona, USA), Alan R. Dennis (University of Georgia, USA)
Article 3
A Markup Approach to Surveys and Questionnaires (pages 20-27)
Jeffrey Hsu (Rutgers University, USA), Murray Turoff (New Jersey Institute of Technology, USA)
Volume 7 (1995)
Issue 1
Article 1
Faculty Use of Electronic Communications Before and After a LAN Installation: A Three-Year Analysis (pages 4-12)
Marilyn L. Wilkins (Eastern Illinois University, USA), Karen Nantz (Eastern Illinois University, USA)
Article 2
Examing the Process of Electronic-JAD (pages 13-22)
Erran Carmel (American University, USA), Joey F. George (Florida State University, USA), Jay F. Nunamaker Jr. (University of Arizona, USA)
Issue 2
Article 1
Can DSS Technology Improve Group Decision Performance for End Users?: An Experimental Study (pages 3-11)
David Gundersen (Stephen Austin University, USA), Donald Davis (University of Southern Mississippi, USA), D.F. Davis (University of Southern Mississippi, USA)
Article 2
Teaching End-User Applications with Computer-Based Training: Theory and an Empirical Investigation (pages 12-18)
Brent Bowman (University of Nevada, USA), Fritze Grupe (University of Nevada, USA), Mark G. Simkin (University of Nevada, USA)
Issue 3
Article 1
Supporting Appropriate User-Developed Applications: Guidelines for Managers (pages 3-11)
Laura Lally (Hofstra University, USA)
Article 2
Issue 4
Article 1
Cross-Cultural Teamwork in End User Computing: A Theoretical Model (pages 4-11)
Regina F. Bento (University of Baltimore, USA)
Article 3
Work Perceptions Among Hong Kong and United States I/S Workers: A Cross-Cultural Comparison (pages 22-29)
Norman B. Bryan (University of North Carolina, USA), Ephraim R. Mclean (Georgia State University, USA), Stanley J. Smits (Georgia State University, USA), Janice Burn (Hong Kong Polytechnic, Hong Kong)
Volume 6 (1994)
Issue 1
Article 1
A Foundation for the Use of Hypertext-based Documentation Techniques (pages 4-15)
Julie E. Kendall (Rutgers University-Camden, USA), Pentti Kerola (Oulu University, Finland)
Article 2
Small Business Attitudes Toward Computers (pages 16-25)
Charles M. Ray (Ball State University, USA), Thomas M. Harris (Ball State University, USA), J. Lee Dye (Ball State University, USA)
Issue 2
Article 1
Consistency in Human-Computer Interfaces for End-Users (pages 3-10)
Chang-Tseh Hsieh (University of Southern Mississippi, USA), Ming-Te Lu (Metropolitan State University, USA), Engming Lin (Eastern Kentucky University, USA)
Article 2
The Relationship of Application Risks to Application Controls: A Study of Microcomputer-based Spreadsheet Applications (pages 11-18)
Robert Schultheis (Southern Illinois University, Edwardsville, USA), Mary Sumner (Southern Illinois University, Edwardsville, USA)
Article 3
Computer Virus Folklore (pages 19-23)
Terry D. Lundgren (Eastern Illinois University, USA)
Issue 3
Article 1
The Accountant’s Contribution to Executive Information Systems (pages 3-11)
Mary B. Curtis (University of Kentucky, USA)
Article 2
Groupware at Work: Users’ Experience With Lotus Notes (pages 12-21)
Hao Lou (Ohio University, USA)
Article 3
Health and Stress Issues of Office Automation: A Singapore Study (pages 22-31)
Shailendra Palvia (Nanyang Technological University, Singapore), Lai Lai Tung (Nanyang Technological University (NTU), Singapore)
Issue 4
Article 1
Key Issues in the MIS Implementation Process: An Update Using End User Computing Satisfaction (pages 3-14)
Peggy L. Lane (Indiana University/Purdue University, USA), Jeffrey Palko (Northwestern State University of LA, USA), Timothy Paul Cronan (University of Arkansas, USA)
Article 2
Trends in Information Technology in Small Businesses (pages 15-25)
Georgios I. Doukidis (Athens University of Economics, Greece), Steve Smithson (London School of Economics, UK), Takis Lybereas (Warwick Business School, UK)
Volume 5 (1993)
Issue 1
Article 1
KARTT: A Multimedia Tool to Help Students Learn Knowledge Acquisition (pages 5-17)
Karen Bland (IBM Corporation, USA), Jay Liebowitz (George Washington University, USA)
Article 2
Article 3
Computer Information Satisfaction: A Longitudinal Study of Computing Systems and EUC in a Public Organization (pages 27-36)
Kristy D. Glorfeld (University of Arkansas, USA), Timothy Paul Cronan (University of Arkansas, USA)
Issue 2
Article 1
A 4GL Based Executive Search System (pages 5-17)
Ruediger Mueller (University of Wisconsin-Oshkosh, USA)
Article 2
Structured Techniques for Successful End User Spreadsheets (pages 18-25)
Harry Benham (Montana State University, USA), Michael Delaney (Saint Joseph’s University, USA), Andrew Luzi (California State University, Fullerton, USA)
Article 3
Organizational Impact of Decision Support Technology: What’s Ahead for the ‘90s? (pages 26-30)
Fred K. Augustine (Stetson University, USA), Theordore J. Surynt (Stetson University, USA), Frank A. Dezoort (Stetson University, USA), Daniel K. Rosetti (Stetson University, USA)
Issue 3
Article 1
MCPS—The Multimedia Computing Presentation System (pages 5-16)
Sorel Reisman (California State University, Fullerton, USA)
Article 2
Object-Oriented Cost Accounting System Design (pages 17-25)
John E. Gessford (California State University, Long Beach, USA)
Article 3
Using Innovative Information Technology Architecture for Entrepreneurial Success: The Case of “YCH” Logistics Company (pages 26-33)
Shailendra C. Palvia (Nanyang Technological University (NTU), Singapore), Boon Siong Neo (Nanyang Technological University (NTU), Singapore)
Issue 4
Article 1
An Examination of Sources of Support Preferred By End-User Computing Personnel (pages 4-11)
Brent Bowman (University of Nevada, Reno, USA), Gritz H. Grupe (University of Nevada, Reno, USA), Daulatram Lund (University of Nevada, Reno, USA), Winnie D. Moore (University of Nevada, Reno, USA)
Article 2
Why Microcomputers May Increase the Cost of Doing Business (pages 12-19)
Gary Adna Ames (University of Nebraska-Lincoln, USA)
Volume 4 (1992)
Issue 1
Article 1
A Survey of Micro-Mainframe Links (pages 1-12)
Judith D. Ahrens (Drexel University, USA), Samuel D. Strum (Merck and Co., USA)
Article 2
The Evaluation of Local Area Network Designs Through Simulation (pages 13-23)
Richard G. Born (Northern Illinois University, USA)
Article 3
An Accounting Curriculum Issue: The Importance of Microcomputer Knowledge to the Accounting Practitioner (pages 24-30)
Arthur A. Rasher (University of Tulsa, USA), Warren A. Beatty (University of South Alabama, USA)
Issue 2
Article 1
XMAIL: An Intelligent Electronic Mail System (pages 2-12)
Milam Aiken (University of Mississippi, USA), Luvai F. Motiwalla (University of Hartford, USA)
Article 2
Microcomputer Laboratory Maintenance (pages 13-20)
Norman A. Garrett (Eastern Illinois University, USA), Terry D. Lundgren (Eastern Illinois University, USA)
Article 3
Neurocomputing Approach to Residential Property Valuation (pages 21-30)
Ming-Te Lu (St. Cloud State University, USA), Debra H. Lu (St. Cloud State University, USA)
Issue 3
Article 1
End User Computing Success Factors: Further Evidence from a Developing Nation (pages 4-13)
Abdulla H. Abdul-Gader (King Fahd University of Petroleum and Minerals, Saudi Arabia)
Article 2
Information Resources Management for End User Computing: An Exploratory Study (pages 14-20)
Phillip Ein-Dor (Tel Aviv, Israel), Eli Segev (Tel Aviv University, Israel)
Article 3
Management of the Information Center: The Relationship of Power to End-user Performance and Satisfaction (pages 21-30)
Yong-Kil Cho (University of Wisconsin-Parkside, USA), Kenneth Kendall (Rutgers University, USA)
Issue 4
Article 1
Using End User Characteristics to Facilitate Effective Management of End User Computing (pages 5-16)
Donald L. Amoroso (University of Colorado, Colorado Springs, USA)
Article 2
Article 3
Microcomputer Software Piracy and Prevention Strategies (pages 26-35)
Tom Singleton (University of Mississippi, USA), Milam Aiken (University of Mississippi, USA), Ashraf Shirani (University of Mississippi, USA)
Volume 3 (1991)
Issue 1
Article 1
An Expert System Prototype for Performance Appraisal of Managerial Communication (pages 1-11)
James S. Moore (Indiana University at Fort Wayne, USA)
Article 2
Application Controls for Spreadsheet Development (pages 12-22)
Ming-Te Lu (St. Cloud State University, USA), Charles R. Litecky (University of Missouri-Columbia, USA), Debra H. Lu (St. Cloud State University, USA)
Article 3
Integration of Microcomputers into the Organization: A Human Adaptation Model and the Organizational Response (pages 23-35)
Meg Kletke (Oklahoma State University, USA), James E. Trumbly (Oklahoma State University, USA), Debra L. Nelson (Oklahoma State University, USA)
Issue 2
Article 1
The Administrative Use of Computers in Professional Sport Organizations (pages 2-12)
Terry R. Haggerty (Pennsylvania State University, USA)
Article 2
Implementation of a Token Ring LAN: A Case of a University Business School (pages 13-23)
Linda E. Duxbury (Carleton University, Canada), Anthony Koziol (Supply and Services, Canada)
Article 3
Steering Through the Mist of Personal Computing: A Guide for Managers (pages 24-31)
Janis L. Gogan (Boston University School of Management, USA)
Issue 3
Article 1
EDSS For Product Maintenance in a Global Environment (pages 2-10)
F. Stuart Wells (Tennessee Technological University, USA), R. Natarajan (Tennessee Technological University, USA)
Article 2
Critical LAN Success Factors: An Implementation Model (pages 11-21)
Raymond A. Patterson (Bowling Green State University, USA), Dennis D. Strouble (Bowling Green State University, USA)
Article 3
Electronic Mail in the University (pages 22-27)
Rodney A. Pearson (Mississippi State University, USA)
Issue 4
Article 1
Implementing a Markov-based Accounts Receivable DSS: A Prototyping Approach (pages 2-9)
Julie E. Kendall (Rutgers University, USA), Marc J. Schniederjans (University of Nebraska-Lincoln, USA)
Article 2
The Diffusion of Laptop Computers Among Industrial Salesforces (pages 10-21)
Jane M. Mackay (Texas Christian University, USA), Susan K. Higgins (Texas Christian University, USA), Chalres W. Lamb Jr. (Texas Christian University, USA), William Moncrief III (Texas Christian University, USA)
Article 3
Microcomputer-Based Decision Support for Facilities Planning and Management (pages 22-31)
Mohammad Dadashzadeh (Wichita State University, USA)
Volume 2 (1990)
Issue 1
Article 1
The Use of an Alternative Source of Expertise for the Development of Microcomputer Expert Systems (pages 2-14)
Gary Grudnitski (San Diego State University, USA), Robert L. Black (Coopers & Lybrand, USA)
Article 2
Software Selection: A Knowledge-based System Approach (pages 15-25)
D. G. Dologite (Baruch College-City University of New York, USA)
Article 3
An Experimental Investigation of Comparative Operating Efficiency of a 4GL (Focus) and COBOL in a Workstation Environment (pages 26-38)
Bijoy Bordoloi (Oakland University, USA), A. Milton Jenkins (University of Baltimore, USA)
Issue 2
Article 1
Article 2
The Impact of Local Area Networks on Users and Their Work: A Field Study (pages 15-24)
Ravinder Nath (University of Memphis, USA)
Article 3
A Survey of the AACSB Universities’ Policies on Software Copying (pages 25-35)
Susan Athey (Colorado State University, USA)
Issue 4
Article 1
Microcomputer Implementation in Small Businesses: Current Status and Success Factors (pages 2-11)
John F. Schleich (University of Nevada-Las Vegas, USA), William J. Corney (University of Nevada-Las Vegas, USA), Warren J. Boe (University of Iowa, USA)
Article 2
Downsizing at American Sterilizer (pages 12-23)
Mark W. Doll (University of Toledo, USA), William J. Doll (University of Toledo, USA)
Article 3
A Framework for Addressing End User Training Needs (pages 24-31)
Jane M. Mackay (Texas Christian University, USA), Charles W. Lamb Jr. (Texas Christian University, USA)
Volume 1 (1989)
Issue 1
Article 1
Microcomputers: Strategic Tools for the 1990s (pages 1-7)
Larry Oliva (Sun Microsystems, USA), Mehdi Khosrow-Pour (Pennsylvania State University at Harrisburg, USA)
Article 2
Microcomputer Software Evaluation and Selection Strategies (pages 8-21)
Ronald W. Hasty (University of Texas at El Paso, USA), Anthony F. Herbst (University of Texas at El Paso, USA), Mo A. Mahmood (University of Texas at El Paso, USA)
Article 4
Microcomputers and Small Business: A Market Survey (pages 29-40)
Sufi M. Nazem (University of Nebraska at Omaha, USA), R. Leon Price (University of Oklahoma, USA)
Issue 2
Article 1
An Integrative Management Approach to Developing Knowledge-Based Systems for Management Decision Making (pages 1-13)
Robert J. Mockler (St. John’s University, USA), D.G. Dologite (Baruch College-City University of New York, USA)
Article 2
Admissions Advisor: A Micro-Based Expert System Using Certainty Factors (pages 14-23)
Clive C. Sanford (University of Maine, USA), Thomas Marshall (University of North Texas, USA)
Article 3
The Changing Environment of Software Copyright: The Case of Apple Computer v. Microsoft Corp. (pages 24-32)
Cherie Sherman Werbel (Ramapo College of New Jersey, USA), Phillip Werbel (Attorney-at-Law, USA)
Issue 3
Article 1
Microcomputer Purchase Decisions in Small Retail Businesses (pages 1-11)
Gerry Gingrich (University of North Carolina at Wilmington, USA), Earl Honeycutt Jr. (University of North Carolina at Wilmington, USA)
Article 2
A Methodology for Evaluating Tutorials for Computer Application Software (pages 12-24)
Richard Yellen (University of North Texas, USA)
Article 3
Comparative Study of Strategic Issues in the Management of Business School Computer Resources (pages 25-32)
Ralph Stair Jr. (Florida State University, USA)