International Journal of Information Management
1995 - 2022
Current editor(s): Yogesh K. Dwivedi From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 45, issue C, 2019
- An integrated view of particularized trust in social commerce: An empirical investigation pp. 1-12

- Xusen Cheng, Yu Gu and Jia Shen
- Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior pp. 13-24

- Ling Li, Wu He, Li Xu, Ivan Ash, Mohd Anwar and Xiaohong Yuan
- Determinants of master data management adoption by local government organizations: An empirical study pp. 25-43

- Faizura Haneem, Nazri Kama, Nazim Taskin, David Pauleen and Nur Azaliah Abu Bakar
- The non-monetary benefits of mobile commerce: Extending UTAUT2 with perceived value pp. 44-55

- Norman Shaw and Ksenia Sergueeva
- Content features of tweets for effective communication during disasters: A media synchronicity theory perspective pp. 56-68

- Jaebong Son, Hyung Koo Lee, Sung Jin and Jintae Lee
- Spatial data infrastructure management: A two-sided market approach for strategic reflections pp. 69-82

- Chady Jabbour, Hélène Rey-Valette, Pierre Maurel and Jean-Michel Salles
- A General framework for studying the evolution of the digital innovation ecosystem: The case of big data pp. 83-94

- Chae, Bongsug (Kevin)
- How social media brand pages contribute to functional conflict: The central role of commitment pp. 95-106

- Si Shi, Yu Cao, Yang Chen and Wing S. Chow
- Understanding mobile health service use: An investigation of routine and emergency use intentions pp. 107-117

- Fei Liu, Eric Ngai and Xiaofeng Ju
- Stock market response to information diffusion through internet sources: A literature review pp. 118-131

- Shweta Agarwal, Shailendra Kumar and Utkarsh Goel
- Modeling user preferences using neural networks and tensor factorization model pp. 132-148

- Anu Taneja and Anuja Arora
- How does IT affect design centricity approaches: Evidence from Spain’s smart tourism ecosystem pp. 149-162

- Alvaro E. Arenas, Jie Mein Goh and Alberto Urueña
- Exploring the effects of extrinsic motivation on consumer behaviors in social commerce: Revealing consumers’ perceptions of social commerce benefits pp. 163-175

- Xuequn Wang, Xiaolin Lin and Marilyn K. Spencer
- A human-centric perspective exploring the readiness towards smart warehousing: The case of a large retail distribution warehouse pp. 176-190

- Kamran Mahroof
- The rise of motivational information systems: A review of gamification research pp. 191-210

- Jonna Koivisto and Juho Hamari
- Applying a multi-dimensional hedonic concept of intrinsic motivation on social tagging tools: A theoretical model and empirical validation pp. 211-222

- Hesham Allam, Michael Bliemel, Louise Spiteri, James Blustein and Hossam Ali-Hassan
- Making a case for speech analytics to improve customer service quality: Vision, implementation, and evaluation pp. 223-232

- Scott Scheidt and Q.B. Chung
- Business analytics use in CRM: A nomological net from IT competence to CRM performance pp. 233-245

- Dalwoo Nam, Junyeong Lee and Heeseok Lee
- Mobile cloud computing based stroke healthcare system pp. 250-261

- Yeliz Karaca, Majaz Moonis, Yu-Dong Zhang and Caner Gezgez
- A reversible and secure patient information hiding system for IoT driven e-health pp. 262-275

- Javaid A. Kaw, Nazir A. Loan, Shabir A. Parah, K. Muhammad, Javaid A. Sheikh and G.M. Bhat
- A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems pp. 276-288

- Mohammad Saidur Rahman, Ibrahim Khalil and Xun Yi
- Real-time big data processing for anomaly detection: A Survey pp. 289-307

- Riyaz Ahamed Ariyaluran Habeeb, Fariza Nasaruddin, Abdullah Gani, Ibrahim Abaker Targio Hashem, Ejaz Ahmed and Muhammad Imran
- Mobile edge computing based QoS optimization in medical healthcare applications pp. 308-318

- Ali Hassan Sodhro, Zongwei Luo, Arun Kumar Sangaiah and Sung Wook Baik
- An m-health application for cerebral stroke detection and monitoring using cloud services pp. 319-327

- Laura García, Jesús Tomás, Lorena Parra and Jaime Lloret
- Deep gesture interaction for augmented anatomy learning pp. 328-336

- Ahmad Karambakhsh, Aouaidjia Kamel, Bin Sheng, Ping Li, Po Yang and David Dagan Feng
Volume 44, issue C, 2019
- Towards a big data framework for analyzing social media content pp. 1-12

- Jose Luis Jimenez-Marquez, Israel Gonzalez-Carrasco, Jose Luis Lopez-Cuadrado and Belen Ruiz-Mezcua
- Relationships between IT department culture and agile software development practices: An empirical investigation pp. 13-24

- Manjul Gupta, Joey F. George and Weidong Xia
- Social media data and post-disaster recovery pp. 25-37

- Mehdi Jamali, Ali Nejat, Souparno Ghosh, Fang Jin and Guofeng Cao
- Consumer use of mobile banking (M-Banking) in Saudi Arabia: Towards an integrated model pp. 38-52

- Abdullah M. Baabdullah, Ali Abdallah Alalwan, Nripendra P. Rana, Hatice Kizgin and Pushp Patil
- Understanding consumers’ reactance of online personalized advertising: A new scheme of rational choice from a perspective of negative effects pp. 53-64

- Qi Chen, Yuqiang Feng, Luning Liu and Xianyun Tian
- Examining the role of trust and quality dimensions in the actual usage of mobile banking services: An empirical investigation pp. 65-75

- Sujeet Kumar Sharma and Manisha Sharma
- Investigating factors influencing the physicians’ adoption of electronic health record (EHR) in healthcare system of Bangladesh: An empirical study pp. 76-87

- Akram Hossain, Rui Cerqueira Quaresma and Habibur Rahman
- Can we trace back hotel online reviews’ characteristics using gamification features? pp. 88-95

- Sérgio Moro, Pedro Ramos, Joaquim Esmerado and Seyed Mohammad Jafar Jalali
- Interaction effect of strategic leadership behaviors and organizational culture on IS-Business strategic alignment and Enterprise Systems assimilation pp. 96-108

- Zhen Shao
- Building Guanxi network in the mobile social platform: A social capital perspective pp. 109-120

- Zhen Shao and Zhengyuan Pan
- The link between information processing capability and competitive advantage mediated through decision-making effectiveness pp. 121-131

- Guangming Cao, Yanqing Duan and Trevor Cadden
- Mobile banking use: A comparative study with Brazilian and U.S. participants pp. 132-140

- Rodrigo F. Malaquias and Yujong Hwang
- Exploring barriers of m-commerce adoption in SMEs in the UK: Developing a framework using ISM pp. 141-153

- Nripendra P. Rana, Daniel J. Barnard, Abdullah M.A. Baabdullah, Daniel Rees and Sian Roderick
- Foreign tacit knowledge and a capabilities perspective on MNEs’ product innovativeness: Examining source-recipient knowledge absorption platforms pp. 154-163

- Margaret L. Sheng
- Does privacy assurance on social commerce sites matter to millennials? pp. 164-177

- Yichuan Wang and Carolina Herrando
- The impact of inertia and user satisfaction on the continuance intentions to use mobile communication applications: A mobile service quality perspective pp. 178-193

- Wei-Tsong Wang, Wei-Ming Ou and Wen-Yin Chen
- Importance-Performance Analysis based SWOT analysis pp. 194-203

- Boonyarat Phadermrod, Richard M. Crowder and Gary B. Wills
- Fans as a source of extended innovation capabilities: A case study of Xiaomi Technology pp. 204-208

- Mingwei Li, Suling Jia and Du, Wenyu (Derek)
Volume 43, issue C, 2018
- Online learning: Adoption, continuance, and learning outcome—A review of literature pp. 1-14

- Ritanjali Panigrahi, Praveen Ranjan Srivastava and Dheeraj Sharma
- An investigation of relationships among privacy concerns, affective responses, and coping behaviors in location-based services pp. 15-24

- Yoonhyuk Jung and Jonghwa Park
- Affordances for sharing domain-specific and complex knowledge on enterprise social media pp. 25-37

- L.G. Pee
- Incorporating polarity of relationships in ISM and TISM for theory building in information and organization management pp. 38-51

- Sushil,
- Examining the core knowledge on facebook pp. 52-63

- Wen-Lung Shiau, Yogesh K. Dwivedi and He-Hong Lai
- A value-justice model of knowledge integration in wikis: The moderating role of knowledge equivocality pp. 64-75

- Nan Wang, Yongqiang Sun, Xiao-Liang Shen and Xi Zhang
- Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users pp. 76-84

- Paméla Baillette, Yves Barlette and Aurelie Leclercq-Vandelannoitte
- “Technology enabled Health” – Insights from twitter analytics with a socio-technical perspective pp. 85-97

- Purva Grover, Arpan Kumar Kar and Gareth Davies
- Understanding the effect of cloud computing on organizational agility: An empirical examination pp. 98-111

- Sen Liu, Felix T.S. Chan, Junai Yang and Ben Niu
- Management theory and big data literature: From a review to a research agenda pp. 112-129

- Paula de Camargo Fiorini, Bruno Michel Roman Pais Seles, Charbel Jose Chiappetta Jabbour, Enzo Barberio Mariano and Ana Beatriz Lopes de Sousa Jabbour
- A global perspective on tech investment, financing, and ICT on manufacturing and service industry performance pp. 130-145

- Delvin Grant and Benjamin Yeo
- Cloud computing-enabled healthcare opportunities, issues, and applications: A systematic review pp. 146-158

- Omar Ali, Anup Shrestha, Jeffrey Soar and Samuel Fosso Wamba
- Developing human resource data risk management in the age of big data pp. 159-164

- Thomas Stephen Calvard and Debora Jeske
- Understanding key skills for information security managers pp. 165-172

- Husam Haqaf and Murat Koyuncu
- The impact of knowledge management processes on information systems: A systematic review pp. 173-187

- Mostafa Al-Emran, Vitaliy Mezhuyev, Adzhar Kamaludin and Khaled Shaalan
- Sports clubs’ use of social media to increase spectator interest pp. 188-195

- Tahir M. Nisar, Guru Prabhakar and Pushp P. Patil
- Twitter as a tool for the management and analysis of emergency situations: A systematic literature review pp. 196-208

- María Martínez-Rojas, María del Carmen Pardo-Ferreira and Juan Carlos Rubio-Romero
- The impact of users’ sense of belonging on social media habit formation: Empirical evidence from social networking and microblogging websites in China pp. 209-223

- Qian Liu, Zhen Shao and Weiguo Fan
- People analytics—A scoping review of conceptual boundaries and value propositions pp. 224-247

- Aizhan Tursunbayeva, Stefano Di Lauro and Claudia Pagliari
- Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory pp. 248-260

- Ana Paula Henriques de Gusmão, Maisa Mendonça Silva, Thiago Poleto, Lúcio Camara e Silva and Ana Paula Cabral Seixas Costa
- Towards a theory of SocioCitizenry: Quality anticipation, trust configuration, and approved adaptation of governmental social media pp. 261-272

- Adel M. Aladwani and Yogesh K. Dwivedi
- Antecedents and outcomes of collaborative innovation capabilities on the platform collaboration environment pp. 273-283

- Maomao Chi, Weijun Wang, Xinyuan Lu and Joey F. George
- Impact of ESN implementation on communication and knowledge-sharing in a multi-national organization pp. 284-294

- Nadeem Azaizah, Iris Reychav, Daphne R. Raban, Tomer Simon and Roger McHaney
- Exploring the performance of tacit knowledge: How to make ordinary people deliver extraordinary results in teams pp. 295-304

- Johan Olaisen and Oivind Revang
- The role of compatibility in predicting business intelligence and analytics use intentions pp. 305-318

- Jurij Jaklič, Tanja Grublješič and Aleš Popovič
- Harnessing user innovation for social media marketing: Case study of a crowdsourced hamburger pp. 319-327

- Darius Pacauskas, Risto Rajala, Mika Westerlund and Matti Mäntymäki
- The sharing economy and digital platforms: A review and research agenda pp. 328-341

- Will Sutherland and Mohammad Hossein Jarrahi
- What factors influence the mobile health service adoption? A meta-analysis and the moderating role of age pp. 342-350

- Yang Zhao, Qi Ni and Ruoxin Zhou
- A case analysis of securing organisations against information leakage through online social networking pp. 351-356

- Nurul Nuha Abdul Molok, Atif Ahmad and Shanton Chang
| |