European Journal of Information Systems
1996 - 2025
Current editor(s): Par Agerfalk From Taylor & Francis Journals Bibliographic data for series maintained by Chris Longhurst (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 27, issue 6, 2018
- Taking on sacred cows: openness, fair critique, and retaining value when revising classics pp. 623-628

- Frantz Rowe and M. Lynne Markus
- Opinion seeking in a social network-enabled product review website: a study of word-of-mouth in the era of digital social networks pp. 629-653

- Camille Grange and Izak Benbasat
- Feedback, task performance, and interface preferences pp. 654-669

- Steven Bellman and Kyle B. Murray
- Designing an Internet-of-Things (IoT) and sensor-based in-home monitoring system for assisting diabetes patients: iterative learning from two case studies pp. 670-685

- Samir Chatterjee, Jongbok Byun, Kaushik Dutta, Rasmus Ulslev Pedersen, Akshay Pottathil and Harry (Qi) Xie
- Population targeted requirements acquisition pp. 686-711

- Tuure Tuunanen and Ken Peffers
Volume 27, issue 5, 2018
- Transparency in literature reviews: an assessment of reporting practices across review types and genres in top IS journals pp. 503-550

- Mathieu Templier and Guy Paré
- The effects of relative and criticism-based performance appraisals on task-level escalation in an IT project: a laboratory experiment pp. 551-569

- Jong Seok Lee and Mark Keil
- “How does tech make you feel?” a review and examination of negative affective responses to technology use pp. 570-599

- David Agogo and Traci J. Hess
- Understanding social networking site (SNS) identity from a dual systems perspective: an investigation of the dark side of SNS use pp. 600-621

- Greta L. Polites, Christina Serrano, Jason Bennett Thatcher and Kevin Matthews
Volume 27, issue 4, 2018
- User response to mandatory IT use: a coping theory perspective pp. 395-414

- Anol Bhattacherjee, Christopher J. Davis, Amy J. Connolly, Neset Hikmet, Frantz Rowe and Régis Meissonier
- Stakeholders’ enactment of competing logics in IT governance: polarization, compromise or synthesis? pp. 415-433

- Albert Boonstra, U. Yeliz Eseryel, Marjolein A. G. van Offenbeek, Frantz Rowe and Régis Meissonier
- Reversed loss aversion in crowdsourcing contest pp. 434-448

- Haichao Zheng, Bo Xu, Linna Hao, Zhangxi Lin, Dov Te'Eni and Evangelos Katsamakas
- Disaggregation of the IT capital effects on firm performance: Empirical evidence from an IT asset portfolio perspective pp. 449-469

- Tae Hun Kim, Matt Wimble, Vallabh Sambamurthy, Frantz Rowe and Jason Thatcher
- The insider on the outside: a novel system for the detection of information leakers in social networks pp. 470-485

- Giuseppe Cascavilla, Mauro Conti, David G. Schwartz and Inbal Yahav
- Conceptualizing business-to-thing interactions – A sociomaterial perspective on the Internet of Things pp. 486-502

- Anna Maria Oberländer, Maximilian Röglinger, Michael Rosemann, Alexandra Kees, Pär Ågerfalk and Virpi Tuunainen
Volume 27, issue 3, 2018
- Philosophy and information systems: where are we and where should we go? pp. 263-277

- Nik Rushdi Hassan, John Mingers and Bernd Stahl
- The IT artifact and its spirit: a nexus of human values, affordances, symbolic expressions, and IT features pp. 278-294

- Mustapha Cheikh-Ammar, Nik Rushdi Hassan, John Mingers and Bernd Stah
- What’s in a face? Making sense of tangible information systems in terms of Peircean semiotics pp. 295-314

- Paul Beynon-Davies, Nik Rushdi Hassan, John Mingers and Bernd Stahl
- A critical realist script for creative theorising in information systems pp. 315-325

- Clay K. Williams, Donald E. Wynn, Nik Rushdi Hassan, John Mingers and Bernd Stahl
- From sovereign IT governance to liberal IT governmentality? A Foucauldian analogy pp. 326-346

- Aurelie Leclercq-Vandelannoitte and Emmanuel Bertin
- Phronesis, argumentation and puzzle solving in IS research: illustrating an approach to phronetic IS research practice pp. 347-366

- Ojelanki Ngwenyama, Stefan Klein, Nik Rushdi Hassan, John Mingers and Bernd Stahl
- Philosophical foundations for informing the future(S) through IS research pp. 367-379

- Mike Chiasson, Elizabeth Davidson, Jenifer Winter, Nik Rushdi Hassan, John Mingers and Bernd Stahl
- Being critical is good, but better with philosophy! From digital transformation and values to the future of IS research pp. 380-393

- Frantz Rowe
Volume 27, issue 2, 2018
- Whither design science research? pp. 127-128

- Pär J. Ågerfalk
- Design science research genres: introduction to the special issue on exemplars and criteria for applicable design science research pp. 129-139

- Ken Peffers, Tuure Tuunanen and Björn Niehaves
- Aesthetics in design science research pp. 140-153

- Richard L. Baskerville, Mala Kaul, Veda C. Storey, Ken Peffers, Tuure Tuunanen and Björn Niehaves
- Considering the social impacts of artefacts in information systems design science research pp. 154-170

- Gerard De Leoz, Stacie Petter, Ken Peffers, Tuure Tuunanen and Bjoern Niehaves
- Design and evaluation of a model-driven decision support system for repurposing electric vehicle batteries pp. 171-188

- Benjamin Klör, Markus Monhof, Daniel Beverungen, Sebastian Bräuer, Bjoern Niehaves, Tuure Tuunanen and Ken Peffers
- ERP prototype with built-in task and process support pp. 189-206

- Tamara Babaian, Jennifer Xu, Wendy Lucas, Ken Peffers, Tuure Tuunanen and Björn Niehaves
- Modeling interferences in information systems design for cyberphysical systems: Insights from a smart grid application pp. 207-220

- Tobias Brandt, Stefan Feuerriegel, Dirk Neumann, Ken Peffers, Tuure Tuunanen, Björn Niehaves and Anders Hjalmarsson
- Design principles for sensemaking support systems in environmental sustainability transformations pp. 221-247

- Stefan Seidel, Leona Chandra Kruse, Nadine Székely, Michael Gau, Daniel Stieger, Ken Peffers, Tuure Tuunanen, Björn Niehaves and Kalle Lyytinen
- An information system design theory for the comparative judgement of competences pp. 248-261

- Tanguy Coenen, Liesje Coertjens, Peter Vlerick, Marije Lesterhuis, Anneleen Viona Mortier, Vincent Donche, Pieter Ballon, Sven De Maeyer, Ken Peffers, Tuure Tuunanen and Bjoern Niehaves
Volume 27, issue 1, 2018
- Going through changes pp. 1-2

- Pär J. Ågerfalk
- Knowledge exchange roles and EKR performance impact: extending the theory of knowledge reuse pp. 3-21

- Nicole Forsgren, Rajiv Sabherwal, Alexandra Durcikova, Frantz Rowe and Andrew Hardin
- Intention–behaviour misalignment at B2C websites: when the horse brings itself to water, will it drink? pp. 22-45

- Greta L. Polites, Elena Karahanna, Larry Seligman, Pär Ågerfalk and Iris Junglas
- Adding background music as new stimuli of interest to information systems research pp. 46-61

- David Gefen, René Riedl, Dov Te’eni and Ryad Titah
- Online health communities: how do community members build the trust required to adopt information and form close relationships? pp. 62-89

- Hanmei Fan, Reeva Lederman, Frantz Rowe and Sabine Matook
- Assessing the robustness of meta-analytic results in information systems: publication bias and outliers pp. 90-123

- Sven Kepes, Manoj A. Thomas, Frantz Rowe and Mark Silver
- Thanks to Reviewers pp. 124-126

- The Editors
Volume 26, issue 6, 2017
- Stimulating dialog between information systems research and practice pp. 541-545

- Dov Te’eni, Stefan Seidel and Jan vom Brocke
- Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda pp. 546-563

- Paul Benjamin Lowry, Tamara Dinev and Robert Willison
- Which phish get caught? An exploratory study of individuals′ susceptibility to phishing pp. 564-584

- Gregory D. Moody, Dennis F. Galletta and Brian Kimball Dunn
- Taking stock of organisations’ protection of privacy: categorising and assessing threats to personally identifiable information in the USA pp. 585-604

- Clay Posey, Uzma Raja, Robert E. Crossler and A. J. Burns
- Organizational information security policies: a review and research framework pp. 605-641

- W. Alec Cram, Jeffrey G. Proudfoot and John D’Arcy
- Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study pp. 642-660

- Zafer D. Ozdemir, H. Jeff Smith and John H. Benamati
- An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook pp. 661-687

- Abdullah Algarni, Yue Xu and Taizan Chan
- Adverse consequences of access to individuals’ information: an analysis of perceptions and the scope of organisational influence pp. 688-715

- Sabrina Karwatzki, Manuel Trenz, Virpi Kristiina Tuunainen and Daniel Veit
Volume 26, issue 5, 2017
- Service robots in hospitals: new perspectives on niche evolution and technology affordances pp. 451-468

- Tobias Mettler, Michaela Sprenger and Robert Winter
- Balancing exploration and exploitation of IT resources: the influence of Digital Business Intensity on perceived organizational performance pp. 469-488

- Joseph K. Nwankpa and Pratim Datta
- Impact of executive compensation on the execution of IT-based environmental strategies under competition pp. 489-508

- Ricky Y. K. Chan and Katherine H. Y. Ma
- The role of context in IT assimilation: A multi-method study of a SaaS platform in the US nonprofit sector pp. 509-539

- Ryan T. Wright, Nicholas Roberts and David Wilson
Volume 26, issue 4, 2017
- Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users pp. 333-360

- Sven Laumer, Christian Maier and Tim Weitzel
- The funeral industry and the Internet: on the historical emergence and destabilization of strategic paths pp. 361-378

- Matthias Wenzel, Heinz-Theo Wagner and Jochen Koch
- It’s complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis pp. 379-413

- Gregory D. Moody, Paul Benjamin Lowry and Dennis F. Galletta
- Online product review as an indicator of users’ degree of innovativeness and product adoption time: a longitudinal analysis of text reviews pp. 414-431

- Roozmehr Safi and Yang Yu
- Constraint-based and dedication-based mechanisms for encouraging online self-disclosure: Is personalization the only thing that matters? pp. 432-450

- Hung-pin Shih, Kee-hung Lai and T. C. E. Cheng
Volume 26, issue 3, 2017
- Digital natives and immigrant editors, and special issues pp. 237-239

- Dov Te’eni
- Alternative genres in information systems research pp. 240-247

- Michel Avital, Lars Mathiassen and Ulrike Schultze
- The limits to language in doing systems design pp. 248-259

- Richard J. Boland and Kalle Lyytinen
- A narrative approach to publishing information systems research: inspiration from the French New Novel tradition pp. 260-273

- David Avison, Julien Malaurent and Philippe Eynaud
- “What else is there…?”: reporting meditations in experiential computing pp. 274-286

- Mads Bødker
- A half-moon on my skin: a memoir on life with an activity tracker pp. 287-297

- Elpida Prasopoulou
- Once upon a time: Crafting allegories to analyze and share the cultural complexity of strategic alignment pp. 298-314

- Michelle Lynn Kaarst-Brown
- Crowdsourcing of information systems research pp. 315-332

- James Love and Rudy Hirschheim
Volume 26, issue 2, 2017
- The concept of mindfulness in information systems research: a multi-dimensional analysis pp. 121-142

- Sabine Dernbecher and Roman Beck
- The public procurement of information systems: dialectics in requirements specification pp. 143-163

- Carl Erik Moe, Mike Newman and Maung Kyaw Sein
- Variable use of standards-based IOS enabling technologies in Australian SMEs: an examination of deliberate and emergent decision making processes pp. 164-184

- Damien Power and Richard L. Gruner
- Interorganizational dependence, information transparency in interorganizational information systems, and supply chain performance pp. 185-205

- Bangho Cho, Sung Yul Ryoo and Kyung Kyu Kim
- Conflicts and complements between eastern cultures and agile methods: an empirical investigation pp. 206-235

- Balasubramaniam Ramesh, Lan Cao, Jongwoo Kim, Kannan Mohan and Tabitha L. James
Volume 26, issue 1, 2017
- Information systems security policy implementation in practice: from best practices to situated practices pp. 1-20

- Elina Niemimaa and Marko Niemimaa
- Mixed results in strategic IT alignment research: a synthesis and empirical study pp. 21-36

- Magno Queiroz
- Examining the intended and unintended consequences of organisational privacy safeguards pp. 37-65

- Rachida Parks, Heng Xu, Chao-Hsien Chu and Paul Benjamin Lowry
- Useful business cases: value creation in IS projects pp. 66-83

- Peter Axel Nielsen and John Stouby Persson
- Supporting the design of data integration requirements during the development of data warehouses: a communication theory-based approach pp. 84-115

- Christoph Rosenkranz, Roland Holten, Marc Räkers and Wolf Behrmann
- Thanks to Reviewers pp. 116-120

- The Editors
| |