Spring, Summer, and Fall
Provided by James R. Martin, Ph.D., CMA
Professor Emeritus, University of South Florida
Journal of Information Systems
1986-2023 | Journal Updates by Year
Baxter, R. J., D. K. Holderness Jr. and D. A. Wood. 2016. Applying basic gamification techniques to IT compliance training: Evidence from lab and field. Journal of Information Systems (Fall): 119-133.
Cram, W. A. and R. B. Gallupe. 2016. A method to evaluate information systems control alignment. Journal of Information Systems (Spring): 117-135.
Curtis, M. B. and R. S. Debreceny. 2016. The Journal of Information Systems at Thirty. Journal of Information Systems (Spring): 1-2.
De Cesare, S. and C. Partridge. 2016. BORO as a foundation to enterprise ontology. Journal of Information Systems (Summer): 83-112. (Business Object Reference Ontology).
Dzuranin, A. C. and I. Malaescu. 2016. The current state and future direction of IT audit: Challenges and opportunities. Journal of Information Systems (Spring): 7-20.
Farkas, M. J. and R. M. Hirsch. 2016. The effect of frequency and automation of internal control testing on external auditor reliance on the internal audit function. Journal of Information Systems (Spring): 21-40.
Fengchun, T., C. K. Eller and B. Wier. 2016. Reporting frequency and presentation format: Detecting real activities manipulation. Journal of Information Systems (Fall): 63-77.
Geerts, G. L. 2016. Special section on enterprise ontologies. Journal of Information Systems (Summer): 1-3.
Gray, G. L. 2016. Blogs as research and teaching resources for accounting academics. Journal of Information Systems (Summer): 183-202.
Haislip, J. Z., A. Masli, V. J. Richardson and J. M. Sanchez. 2016. Repairing organizational legitimacy following information technology (IT) material weaknesses: Executive turnover, IT expertise, and IT systems upgrades. Journal of Information Systems (Spring): 41-70.
Han, S., Z. Rezaee, L. Xue and J. H. Zhang. 2016. The association between information technology investments and audit risk. Journal of Information Systems (Spring): 93-116.
Henderson, D. L. III., M. Bradford and A. Kotb. 2016. Inhibitors and enablers of GAS usage: Testing the dual factory theory. Journal of Information Systems (Fall): 135-155.
Higgs, J. L., R. E. Pinsker, T. J. Smith and G. R. Young. 2016. The relationship between board-level technology committees and reported security breaches. Journal of Information Systems (Fall): 79-98.
Janvrin, D. J. and D. A. Wood. 2016. The Journal of Information Systems 2015 Conference on information technology audit. Journal of Information Systems (Spring): 3-5.
Kelton, A. S. and U. S. Murthy. 2016. The effects of information disaggregation and financial statement interactivity on judgments and decisions of nonprofessional investors. Journal of Information Systems (Fall): 99-118.
Lee, M. T. and S. K. Widener. 2016. The performance effects of using business intelligence systems for exploitation and exploration learning. Journal of Information Systems (Fall): 1-31.
Li, P., D. Y. Chan and A. Kogan. 2016. Exception prioritization in the continuous auditing environment: A framework and experimental evaluation. Journal of Information Systems (Summer): 135-157.
Moffitt, K. C., V. J. Richardson, N. M. Snow, M. M. Weisner and D. A. Wood. 2016. Perspectives of past and future AIS research as the Journal of Information Systems turns thirty. Journal of Information Systems (Fall): 157-171.
Murthy, U. S. 2016. Researching at the intersection of accounting and information technology: A call for action. Journal of Information Systems (Summer): 159-167.
Myers, N., N. Snow, S. L. Summers and D. A. Wood. 2016. Accounting institution citation-based research rankings by topical area and methodology. Journal of Information Systems (Fall): 33-62.
Scheller, C. V. and P. Hruby. 2016. Business process and value delivery modeling using possession, ownership, and availability (POA) in enterprises and business networks. Journal of Information Systems (Summer): 5-47.
Schmidt, P. J., J. T. Wood and S. V. Grabski. 2016. Business in the cloud: Research questions on governance, audit, and assurance. Journal of Information Systems (Fall): 173-189.
Sidgman, J. and M. Crompton. 2016. Valuing personal data to foster privacy: A thought experiment and opportunities for research. Journal of Information Systems (Summer): 169-181.
Snow, N. M. and J. L. Reck. 2016. Developing a government reporting taxonomy. Journal of Information Systems (Summer): 49-81.
Steinbart, P. J., R. L. Raschke, G. Gal and W. N. Dilla. 2016. SECURQUAL: An instrument for evaluating the effectiveness of enterprise information security programs. Journal of Information Systems (Spring): 71-92. ("...this study uses the COBIT Version 4.1 Maturity Model Rubrics to develop an instrument (SECURQUAL) that obtains an objective measure of the effectiveness of enterprise information security programs.").
Weber, R. 2016. Thirty years of the Journal of Information Systems: Reflections of a prodigal son. Journal of Information Systems (Spring): 137-146.
Weigand, H. 2016. The e3value ontology for value networks: Current state and future directions. Journal of Information Systems (Summer): 113-133.