Export 368 results:
Filters: Keyword is BIS  [Clear All Filters]
2017
T. Montgomery, “Hospitality Industry Labor Shortage A Mixed?Methods Investigationâ€, 2017.
S. Fan, Xiao, J. I., Xie, K., and J. Zhao, L., “Introduction to the special issue of ECR on E-business innovation with big dataâ€, Electronic Commerce Research, 2017.
N. Roberts, Gerow, J., Jeyaraj, A., and Roberts, S., “A Meta-Analysis of Organizational Learning and IT Assimilationâ€, 2017.
M. Curry, Marshall, B., and Kawalek, P., “A Normative Model for Assessing SME IT Effectivenessâ€, Communications of the IIMA, vol. 15, no. 1, 2017.
B. Marshall, Curry, M., Correia, J., and Crossler, R., “Personal Motivation Measures for Personal IT Security Behaviorâ€. 2017.
S. Keen and Roberts, N., “Preliminary Evidence for the Use and Efficacy of Mobile Health Applications in Managing Posttraumatic Stress Disorder Symptomsâ€, 2017.
R. Wright, Roberts, N., and Wilson, D., “The Role of Context in IT Assimilation: A Multi-Method Study of a SaaS Platform in the US Nonprofit Sector,â€, 2017.
V. Arora and Khazanchi, D., “Sense of Virtual Place (SOVP): Conceptual Exploration and Initial Empirical Validationâ€, in AMCIS2017 - Boston, MA, August 10-12, 2017, Boston, MA, 2017.
2018
L. J. Zhao, Fan, S., and Zheng, E., “Blockchain-Enabled Trust: The Case of Inter-Firm Dataflowâ€, Americas Conference on Information Systems (AMCIS). New Orleans, 2018.
J. Wu, Fan, S., and J. Zhao, L., “Community Engagement and Online Word of Mouth: An Empirical Investigationâ€, Information & Management, vol. 55, no. 2, pp. 258-270, 2018.
J. Chen, Shao, R., and Fan, S., “Development of Context-based Indices for Measuring Dynamic and Dualistic Nature of Innovationâ€, Academy of Management Annual Conference. Chicago, IL, 2018.
K. Zhang, Fan, S., and Wang, H., “An Efficient Recommender System Using Locality Sensitive Hashingâ€, Proceedings of the 51st Hawaii International Conference on System Sciences. Hawaii, 2018.
L. Huangfu, Hayne, S., Ma, J., and Roberts, N., “Exploratory Study for Readmission in Cancer Patientsâ€, presented at the 2018, 2018.
M. Curry, Marshall, B., Crossler, R., and Correia, J., “Fear Appeals Versus Priming in Ransomware Trainingâ€, in Pre-ICIS Workshop on Information Security and Privacy (WISP 2018), 2018.
M. Curry, Marshall, B., Crossler, R. E., and Correia, J., “InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behaviorâ€, Data Base for Advances in Information Systems, vol. 49, no. SI, 2018.
N. Ilk, Fan, S., and Shang, G., “Investigating the Fee-Delay Relationship in Cryptocurrency Transactions: Evidence from the Bitcoin Networkâ€, Workshop on Information Technologies and Systems. Santa Clara, 2018.
J. Li, Wu, Z., Zhu, B., and Xu, K., “Making Sense of Organization Dynamics Using Text Analysis.â€, Expert Systems with Applications, 2018.
N. Roberts and Kim, I., “Organizational Identity and Digital Platform Evolutionâ€, Front Range Information Systems Research Seminar. 2018.
L. Huangfu, Hayne, S., Ma, J., and Roberts, N., “Untitledâ€, 2018.
N. Roberts and Dinger, M., “Virtual Customer Environment Design and Organizational Innovation: An Exploration-Exploitation Perspectiveâ€, 2018.
2019
A. Chen and Roberts, N., “Connecting Personality Traits to Social Networking Site Addiction: The Mediating Role of Motivesâ€, 2019.
F. Shadbad and Biros, D., “Developing an Unintentional Information Security Misbehavior Scale (UISMS)â€, in Proceeding of Midwest Association for Information Systems, 2019.
N. Roberts and Kim, I., “Digital Platform Life Cycles in Nascent Marketsâ€, Front Range Information Systems Research Seminar. 2019.
D. Campbell and Roberts, N., “Effective Use of Analytic DSS and Job Performanceâ€, 2019.
F. Shadbad, Biros, D., and Sharma, M., “Examining Technostress on Employees Security-related Behaviorsâ€, INFORMS Annual Meeting. 2019.
R. Reitsma and Marks, A., “The Future of Data: Too Much Visualization — Too Little Understanding?â€, Dialectic, vol. 2, no. 2, 2019.
M. Curry, Marshall, B., and Crossler, R. E., “Identifying potentially risky insider on-compliance using machine learning to assess multiple protection motivation behaviorsâ€, in WISP2021: 2021 Workshop on Information Security and Privacy (WISP), 2019.
D. Pan, J. Zhao, L., and Fan, S., “Impacts of Consensus Algorithms in Cryptocurrency: A Theoretical Analysis of PoW versus PoS in Ethereumâ€, no. 1. pp. 16-22, 2019.
M. Curry, Marshall, B., Correia, J., and Crossler, R. E., “InfoSec Process Action Model (IPAM): Targeting Insider's Weak Password Behaviorâ€, Journal of Information Systems, vol. 33, no. 3, pp. 201-225, 2019.
J. Chen, Shen, J., and Fan, S., “Knowledge Networks, Collaboration Networks, and Innovation: A Replication and Extensionâ€, Academy of Management Annual Meeting. Boston, 2019.
N. Ilk and Fan, S., “A Process Mining Framework for Communication Pattern Analysis in Online Contact Centersâ€, Winter Conference On Business Analytics. Salt lake city, 2019.
B. Hammer, Zhang, T., Shadbad, F., and Agrawal, R., “Psychological Contract Violation and Sharing Intention on Facebookâ€, in Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019.
N. Ilk, Shang, G., and Fan, S., “A Supply and Demand Model for Bitcoin’s Data Space Marketplaceâ€, Workshop on Information Technologies and Systems. Munich, 2019.
2020
N. Ilk and Fan, S., “Combining Textual Cues with Social Clues: Utilizing Social Features to Improve Sentiment Analysis in Social Mediaâ€, Decision Sciences, 2020.
N. Roberts and Gerow, J., “Connecting the Role of the Information Technology Function to its Contribution to the Organizationâ€, 2020.
V. Arora and Semken, S., “Connecting to Place - Virtuallyâ€. 2020.
J. Chen, Shao, R., Fan, S., and Li, J., “Impact of Team Size on Technological Contributions: Unpacking Disruption and Developmentâ€, AOM Annual Meeting. Vancouver CA, 2020.
R. Reitsma, Hoglund, B., Marks, A., Chaker, D., and Marks, A., “K-12 Engineering and the Next Generation Science Standards (NGSS): A Network Visualization and Analysisâ€, in American Society for Engineering Education (ASEE), 2020.
C. Butler, Roberts, N., and Vijayasarathy, L., “Managing Software Development Projects for Success: Aligning Plan- and Agility-Based Approaches to Project Complexity and Project Dynamismâ€, 2020.
K. Hoke, O’Connell, K., Semken, S., and Arora, V., “Promoting a Sense of Place Virtually: A Review of the ESA Weekly Water Cooler Chat Focused on Virtual Sense of Placeâ€, vol. 101, no. 4, 2020.
F. Shadbad, Baham, C., and Biros, D., “A Qualitative Approach to Understand Unintentional Information Security Misbehaviorsâ€, in Americas Conference on Information Systems, 2020.
V. T. Raja, Lewis, S., and Tolan, J., “Teaching and maintaining campus community during a pandemicâ€, Higher Ed Community of Practice - Deloitte Faculty Panel. Portland (Zoom), 2020.
F. Shadbad and Biros, D., “Technostress and its Influence on Employee Information Security Policy Complianceâ€, Information Technology and People, 2020.
S. Fan and Ilk, N., “A text analytics framework for automated communication pattern analysisâ€, Information & Management, vol. 57, no. 4, 2020.

Pages