European Journal of Information Systems
1996 - 2025
Current editor(s): Par Agerfalk From Taylor & Francis Journals Bibliographic data for series maintained by Chris Longhurst (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 25, issue 6, 2016
- Contextualization and problematization, gamification and affordance: a traveler’s reflections on EJIS pp. 473-476

- Dov Te’eni
- Triggered essential reviewing: the effect of technology affordances on service experience evaluations pp. 477-492

- Gabriele Piccoli
- Contextualizing the twin concepts of systematicity and transparency in information systems literature reviews pp. 493-508

- Guy Paré, Mary Tate, David Johnstone and Spyros Kitsiou
- Fragmentation or cohesion? Visualizing the process and consequences of information system diversity, 1993–2012 pp. 509-533

- Yong Liu, Hongxiu Li, Jorge Goncalves, Vassilis Kostakos and Bei Xiao
- Collaborative partner or opponent: How the messenger influences the deaf effect in IT projects pp. 534-552

- Arno Nuijten, Mark Keil and Harry Commandeur
- Alignment in an inter-organisational network: the case of ARC transistance pp. 553-568

- Bernhard R Katzy, Gordon Sung and Kevin Crowston
Volume 25, issue 5, 2016
- The impact of media on how positive, negative, and neutral communicated affect influence unilateral concessions during negotiations pp. 391-410

- Norman A Johnson, Randolph B Cooper and Richard D Holowczak
- An empirical analysis of the factors and measures of Enterprise Architecture Management success pp. 411-431

- Matthias Lange, Jan Mendling and Jan Recker
- Untangling the complex role of guilt in rational decisions to discontinue the use of a hedonic Information System pp. 432-447

- Ofir Turel
- A process explanation of the effects of institutional distance between parties in outsourced information systems development projects pp. 448-464

- Gregory Vial and Suzanne Rivard
- Four common multicommunicating misconceptions pp. 465-471

- Ann-Frances Cameron, Jane Webster, Henri Barki and Ana Ortiz de Guinea
Volume 25, issue 4, 2016
- Utilizing big data analytics for information systems research: challenges, promises and guidelines pp. 289-302

- Oliver Müller, Iris Junglas, Jan vom Brocke and Stefan Debortoli
- The inner and the outer model in explanatory design theory: the case of designing electronic feedback systems pp. 303-316

- Bjoern Niehaves and Kevin Ortbach
- Work routines as an object of resistance during information systems implementations: theoretical foundation and empirical evidence pp. 317-343

- Sven Laumer, Christian Maier, Andreas Eckhardt and Tim Weitzel
- Identity metamorphoses in digital disruption: a relational theory of identity pp. 344-363

- Anastasia Utesheva, Jason R Simpson and Dubravka Cecez-Kecmanovic
- How users perceive and respond to security messages: a NeuroIS research agenda and empirical study pp. 364-390

- Bonnie Brinton Anderson, Anthony Vance, C Brock Kirwan, David Eargle and Jeffrey L Jenkins
Volume 25, issue 3, 2016
- Measuring eGovernment success: a public value approach pp. 187-208

- Murray Scott, William DeLone and William Golden
- Achieving dynamic capabilities with cloud computing: an empirical investigation pp. 209-230

- Douglas A Battleson, Barry C West, Jongwoo Kim, Balasubramaniam Ramesh and Pamela S Robinson
- Dispositional and situational factors: influences on information security policy violations pp. 231-251

- Allen C Johnston, Merrill Warkentin, Maranda McBride and Lemuria Carter
- Web assurance seal services, trust and consumers’ concerns: an investigation of e-commerce transaction intentions across two nations pp. 252-273

- Dan J Kim, Myung-Seong Yim, Vijayan Sugumaran and H Raghav Rao
- Why different trust relationships matter for information systems users pp. 274-287

- Matthias Söllner, Axel Hoffmann and Jan Marco Leimeister
Volume 25, issue 2, 2016
- Factors influencing the intention to comply with data protection regulations in hospitals: based on gender differences in behaviour and deterrence pp. 91-109

- Michael Foth
- Representing small business web presence content: the web presence pyramid model pp. 110-130

- Stephen Burgess
- Effectiveness of top management support in enterprise systems success: a contingency perspective of fit between leadership style and system life-cycle pp. 131-153

- Zhen Shao, Yuqiang Feng and Qing Hu
- Mindful revolution or mindless trend? Examining agile development as a management fashion pp. 154-169

- W Alec Cram and Sue Newell
- Handle mergers and acquisitions with care: the fragility of trust between the IT-service provider and end-users pp. 170-186

- Susan A Brown, Anne P Massey and Kerry W Ward
Volume 25, issue 1, 2016
- Twenty years of the European information systems academy at ECIS: emergent trends and research topics pp. 1-15

- Mari-Klara Stein, Robert D Galliers and Edgar A Whitley
- Economic decision criteria for the migration to cloud storage pp. 16-28

- Maurizio Naldi and Loretta Mastroeni
- How to get the most from a business intelligence application during the post implementation phase? Deep structure transformation at a U.K. retail bank pp. 29-46

- Alena Audzeyeva and Robert Hudson
- Understanding champion behaviour in a health-care information system development project – how multiple champions and champion behaviours build a coherent whole pp. 47-63

- Joeri van Laere and Lena Aggestam
- Transforming healthcare: policy discourses of IT and patient-centred care pp. 64-76

- Ela Klecun
- FEDS: a Framework for Evaluation in Design Science Research pp. 77-89

- John Venable, Jan Pries-Heje and Richard Baskerville
Volume 24, issue 6, 2015
- Publishing and getting published in EJIS: marshaling contributions for a diversity of genres pp. 559-568

- Dov Te'eni, Frantz Rowe, Pär J Ågerfalk and Jong Seok Lee
- The effective promotion of informal control in information systems offshoring projects pp. 569-587

- Martin Wiener, Ulrich Remus, Jakob Heumann and Magnus Mähring
- Personal information management effectiveness of knowledge workers: conceptual development and empirical validation pp. 588-606

- Yujong Hwang, William J Kettinger and Mun Y Yi
- The impact of decision support system features on user overconfidence and risky behavior pp. 607-623

- Chi-Wen Chen and Marios Koufaris
- The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern pp. 624-644

- Gaurav Bansal, Fatemeh ‘Mariam’ Zahedi and David Gefen
- Flexible generification: ICT standardization strategies and service innovation in health care pp. 645-663

- Ole Hanseth and Bendik Bygstad
- Theoretical perspectives in IS research: from variance and process to conceptual latitude and conceptual fit pp. 664-679

- Andrew Burton-Jones, Ephraim R McLean and Emmanuel Monod
Volume 24, issue 5, 2015
- Giving too much social support: social overload on social networking sites pp. 447-464

- Christian Maier, Sven Laumer, Andreas Eckhardt and Tim Weitzel
- Six types of IT-business strategic alignment: an investigation of the constructs and their measurement pp. 465-491

- Jennifer E Gerow, Jason Bennett Thatcher and Varun Grover
- Time and information technology in teams: a review of empirical research and future research directions pp. 492-518

- Zixing Shen, Kalle Lyytinen and Youngjin Yoo
- Determinants of software piracy under risk aversion: a model with empirical evidence pp. 519-530

- Ahmed Driouchi, Mingzhu Wang and Tarik Driouchi
- Using quantitative data in mixed-design grounded theory studies: an enhanced path to formal grounded theory in information systems pp. 531-557

- Isabelle Walsh
Volume 24, issue 4, 2015
- Current issue and future submissions, contextualized pp. 361-363

- Dov Te'eni
- A unified model of IT continuance: three complementary perspectives and crossover effects pp. 364-373

- Anol Bhattacherjee and Chieh-Peng Lin
- Five-factor model personality traits as predictors of perceived and actual usage of technology pp. 374-390

- Tim Barnett, Allison W Pearson, Rodney Pearson and Franz Kellermanns
- The effect of online social value on satisfaction and continued use of social media pp. 391-410

- Tao Hu, William J Kettinger and Robin S Poston
- Examining the antecedents of user gratification and its effects on individuals’ social network services usage: the moderating role of habit pp. 411-430

- Chao-Min Chiu and Hsin-Yi Huang
- Quitting the use of a habituated hedonic information system: a theoretical model and empirical examination of Facebook users pp. 431-446

- Ofir Turel
Volume 24, issue 3, 2015
- Cross-cultural IS research: perspectives from Eastern and Western traditions pp. 229-233

- Merrill Warkentin, Brigitte Charles-Pauvers and Patrick Y K Chau
- The realignment of offshoring frame disputes (OFD): an ethnographic ‘cultural’ analysis pp. 234-246

- M N Ravishankar
- Toward a theory of perceived benefits, affective commitment, and continuance intention in social virtual worlds: cultural values (indulgence and individualism) matter pp. 247-261

- Zhongyun Zhou, Xiao-Ling Jin, Yulin Fang and Doug Vogel
- Knowledge sharing intention in the United States and China: a cross-cultural study pp. 262-277

- Yu-Wei Chang, Ping-Yu Hsu, Wen-Lung Shiau and Chung-Chih Tsai
- A legitimacy challenge of a cross-cultural interorganizational information system pp. 278-294

- Carol Hsu, Yu-Tzu Lin and Tawei Wang
- The effect of culture on requirements: a value-based view of prioritization pp. 295-313

- Tuure Tuunanen and I-Te Kuo
- Cross-national differences in individual knowledge-seeking patterns: a climato-economic contextualization pp. 314-336

- Liwei Chen, J J Po-An Hsieh, Evert Van de Vliert and Xu Huang
- An espoused cultural perspective to understand continued intention to use mobile applications: a four-country study of mobile social media application usability pp. 337-359

- Hartmut Hoehle, Xiaojun Zhang and Viswanath Venkatesh
Volume 24, issue 2, 2015
- Information system integration in mergers and acquisitions: research ahead pp. 117-120

- Jonas Hedman and Suprateek Sarker
- Learning to acquire: how serial acquirers build organisational knowledge for information systems integration pp. 121-144

- Stefan Henningsson
- When IT capabilities are not scale-free in merger and acquisition integrations: how do capital markets react to IT capability asymmetries between acquirer and target? pp. 145-158

- Hüseyin Tanriverdi and Vahap Bülent Uysal
- The roles of contextual elements in post-merger common platform development: an empirical investigation pp. 159-177

- Radhika P Jain and Balasubramaniam Ramesh
- Discovery paths: exploring emergence and IT evolutionary design in cross-border M&As. Analysing grupo Santander’s acquisition of abbey (2004–2009) pp. 178-201

- Javier Busquets
- Knowledge-acquisitions and post-acquisition innovation performance: a comparative hazards model pp. 202-226

- Pratim Datta and Yaman Roumani
- Erratum: Discovery paths: exploring emergence and IT evolutionary design in cross-border M&As. Analysing Grupo Santander’s acquisition of Abbey (2004–2009) pp. 227-227

- Javier Busquets
Volume 24, issue 1, 2015
- Challenges in learning and improving continuously pp. 1-3

- Dov Te'eni
- Associating consumer perceived value with business models for digital services pp. 4-22

- Aaron Baird and T S Raghu
- Adopting IS process innovations in organizations: the role of IS leaders’ individual factors and technology perceptions in decision making pp. 23-37

- Srinarayan Sharma and Arun Rai
- Managing the introduction of information security awareness programmes in organisations pp. 38-58

- Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis and Evangelos Kiountouzis
- The roles of psychological climate, information management capabilities, and IT support on knowledge-sharing: an MOA perspective pp. 59-75

- William J Kettinger, Yuan Li, Joshua M Davis and Lynda Kettinger
- Forming an intention to act on recommendations given via online social networks pp. 76-92

- Sabine Matook, Susan A Brown and Johanna Rolf
- Learning and self-disclosure behavior on social networking sites: the case of Facebook users pp. 93-106

- Rui Chen and Sushil K Sharma
- Distinguishing and contrasting two strategies for design science research pp. 107-115

- Juhani Iivari
| |