Provided by James R. Martin, Ph.D., CMA
Professor Emeritus, University of South Florida
Journal of Information Systems
1986-2021 | Journal Updates by Year
Arbore, A., R. Graziani and S. Venturini. 2014. Understanding personal mobile technologies: Decomposing and de-averaging the value of a smartphone. Journal of Information Systems (Spring): 167-185.
Arnold, V., T. S. Benford, C. Hampton and S. G. Sutton. 2014. Enterprise risk management: Re-conceptualizing the role of risk and trust on information sharing in transnational alliances. Journal of Information Systems (Fall): 257-285.
Basoglu, K. A. and T. J. Hess. 2014. Online business reporting: A signaling theory perspective. Journal of Information Systems (Fall): 67-101.
Beck, G. M., R. Limor, V. Arunachalam and P. R. Wheeler. 2014. The effect of changes in decision aid bias on learning: Evidence of functional fixation. Journal of Information Systems (Spring): 19-42.
Boritz, J. E., C. Carnaghan and P. S. Alencar. 2014. Business modeling to improve auditor risk assessment: An investigation of alternative representations. Journal of Information Systems (Fall): 231-256.
Chen, Y., A. L. Smith, J. Cao and W. Xia. 2014. Information technology capability, internal control effectiveness, and audit fees and delays. Journal of Information Systems (Fall): 149-180.
Cong, Y., J. Hao and L. Zou. 2014. The impact of XBRL reporting on market efficiency. Journal of Information Systems (Fall): 181-207.
Crossler, R. E., J. H. Long, T. M. Loraas and B. S. Trinkle. 2014. Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap. Journal of Information Systems (Spring): 209-226.
Deng, X. and T. Wang. 2014. Understanding post-implementation support for enterprise systems: An empirical study of IT personnel's customer-oriented citizenship behaviors. Journal of Information Systems (Fall): 17-39.
Gray, G. L., W G. No and D. W. Miller. 2014. Internal auditors' experiences and opinions regarding green IT: Assessing the gap in normative and positive perspectives. Journal of Information Systems (Spring): 75-109.
Guffey, D. M. and N. L. Harp. 2014. Ranking faculties, Ph.D. programs, individual scholars, and influential articles in accounting information systems based on citations to publications in the Journal of Information Systems. Journal of Information Systems (Spring): 111-114.
Hardy, C. A. 2014. The messy matters of continuous assurance: Findings from exploratory research in Australia. Journal of Information Systems (Fall): 357-377.
Harrigan, F. 2014. Evolution of accounting controls in a de-integrated project structure: A case of hybridization. Journal of Information Systems (Fall): 329-355.
Hong, Y., J. Vaidya and S. Wang. 2014. A survey of privacy-aware supply chain collaboration: From theory to applications. Journal of Information Systems (Spring): 243-268.
Issa, H. and A. Kogan. 2014. A predictive ordered logistic regression model as a tool for quality review of control risk assessments. Journal of Information Systems (Fall): 209-229.
Journal of Information Systems. 2014. Annual editors report. Journal of Information Systems (Fall): 379-383.
Kim, Y. and A. Kogan. 2014. Development of an anomaly detection model for a bank's transitory account system. Journal of Information Systems (Spring): 145-165.
Krahel, J. P. and M. A. Vasarhelyi. 2014. AIS as a facilitator of accounting change: Technology, practice, and education. Journal of Information Systems (Fall): 1-15.
Lim, W. M. 2014. Understanding the influence on online flow elements on hedonic and utilitarian online shopping experiences: A case of online group buying. Journal of Information Systems (Fall): 287-306.
Liu, Q. and M. A. Vasarhelyi. 2014. Editorial: Big questions in AIS research: Measurement, information processing, data analysis, and reporting. Journal of Information Systems (Spring): 1-17.
Masli, A., V. J. Richardson, J. M. Sanchez and R. E. Smith. 2014. The interrelationships between information technology spending, CEO equity incentives, and firm value. Journal of Information Systems (Fall): 41-65.
Morris, B. W., V. F. Kleist, R. B. Dull and C. D. Tanner. 2014. Secure information market: A model to support information sharing, data fusion, privacy, and decisions. Journal of Information Systems (Spring): 269-285.
Nikitkov, A. N., D. N. Stone and T. C. Miller. 2014. Internal controls, routine activity theory (RAT), and sustained online auction deception: A longitudinal analysis. Journal of Information Systems (Spring): 311-337.
Rahman, A. R. and R. S. Debreceny. 2014. Institutionalized online access to corporate information and cost of equity capital: A cross-country analysis. Journal of Information Systems (Spring): 43-74.
Raschke, R. L., A. S. Krishen and P. Kachroo. 2014. Understanding the components of information privacy threats for location-based services. Journal of Information Systems (Spring): 227-242.
Schaupp, L. C. and F. BĂ©langer. 2014. The value of social media for small businesses. Journal of Information Systems (Spring): 187-207.
Singh, K., P. J. Best, M. Bojilov and C. Blunt. 2014. Continuous auditing and continuous monitoring in ERP environments: Case studies of application implementations. Journal of Information Systems (Spring): 287-310.
Trinkle, B. S., R. E. Crossler and M. Warkentin. 2014. I'm game, are you? Reducing real-world security threats by managing employee activity in online social networks. Journal of Information Systems (Fall): 307-327.
Tuttle, B. M., M. H. Taylor and Y. Wu. 2014. Overcoming the reluctance to convey negative project information during an information systems pre-implementation review. Journal of Information Systems (Fall):103-125.
Wang, T. and J. Seng. 2014. Mandatory adoption of XBRL and foreign institutional investors' holdings: Evidence from China. Journal of Information Systems (Fall): 127-147.