European Journal of Information Systems
1996 - 2025
Current editor(s): Par Agerfalk From Taylor & Francis Journals Bibliographic data for series maintained by Chris Longhurst (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 23, issue 6, 2014
- Insufficient theoretical contribution: a conclusive rationale for rejection? pp. 593-599

- Pär J Ågerfalk
- Paradigm lost … paradigm gained: a hermeneutical rejoinder to Banville and Landry’s ‘Can the Field of MIS be Disciplined?’ pp. 600-615

- Nik R Hassan
- The competitive impact of information technology: can commodity IT contribute to competitive performance? pp. 616-628

- Gabriele Piccoli and Tsz-Wai Lui
- No time to waste: the role of timing and complementarity of alignment practices in creating business value in IT projects pp. 629-654

- Armin Vermerris, Martin Mocker and Eric van Heck
- A ‘sweet spot’ change strategy for a least developed country: leveraging e-Government in Bangladesh pp. 655-671

- Shirley Gregor, Ahmed Imran and Tim Turner
- An empirical investigation of Technology Readiness among medical staff based in Greek hospitals pp. 672-690

- Christos D Melas, Leonidas A Zampetakis, Anastasia Dimopoulou and Vassilis S Moustakis
- The longitudinal impact of enterprise system users’ pre-adoption expectations and organizational support on post-adoption proficient usage pp. 691-707

- John F Veiga, Marcus M Keupp, Steven W Floyd and Franz Kellermanns
- Internet adoption by the elderly: employing IS technology acceptance theories for understanding the age-related digital divide pp. 708-726

- Björn Niehaves and Ralf Plattfaut
Volume 23, issue 5, 2014
- When mobile is the norm: researching mobile information systems and mobility as post-adoption phenomena pp. 503-512

- Catherine Middleton, Rens Scheepers and Virpi Kristiina Tuunainen
- Changing information retrieval behaviours: an empirical investigation of users’ cognitive processes in the choice of location-based services pp. 513-528

- Ioanna D Constantiou, Christiane Lehrer and Thomas Hess
- Mobile technology in mobile work: contradictions and congruencies in activity systems pp. 529-542

- Stan Karanasios and David Allen
- Mobile information systems and organisational control: beyond the panopticon metaphor? pp. 543-557

- Aurelie Leclercq-Vandelannoitte, Henri Isaac and Michel Kalika
- Working with connective flow: how smartphone use is evolving in practice pp. 558-570

- Kristine Dery, Darl Kolb and Judith MacCormick
- An organizational perspective on m-business: usage factors and value determination pp. 571-592

- Winnie Ng Picoto, France Bélanger and António Palma-dos-Reis
Volume 23, issue 4, 2014
- An empirical evaluation of existing IS change theories for the case of IOIS evolution pp. 373-399

- Kai Reimers, Robert B Johnston and Stefan Klein
- Integrated clinical pathway management for medical quality improvement – based on a semiotically inspired systems architecture pp. 400-417

- Weizi Li, Kecheng Liu, Hongqiao Yang and Changrui Yu
- Information sharing and interoperability: the case of major incident management pp. 418-432

- David K Allen, Stan Karanasios and Alistair Norman
- Transforming decision-making processes: a research agenda for understanding the impact of business analytics on organisations pp. 433-441

- Rajeev Sharma, Sunil Mithas and Atreyi Kankanhalli
- Design matters for decision makers: Discovering IT investment alternatives pp. 442-461

- Jane Elisabeth Frisk, Rikard Lindgren and Lars Mathiassen
- Developing information processing capability for operational agility: implications from a Chinese manufacturer pp. 462-480

- Pei-Ying Huang, Shan L Pan and Tao Hua Ouyang
- The role of GPS-enabled information in transforming operational decision making: an exploratory study pp. 481-502

- Andreja Habjan, Constantine Andriopoulos and Manto Gotsi
Volume 23, issue 3, 2014
- What literature review is not: diversity, boundaries and recommendations pp. 241-255

- Frantz Rowe
- Towards mindful case study research in IS: a critical analysis of the past ten years pp. 256-272

- Marcus Keutel, Bjoern Michalik and Janek Richter
- Rethinking the place of the artefact in IS using Heidegger's analysis of equipment pp. 273-288

- Kai Riemer and Robert B Johnston
- Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations pp. 289-305

- Mikko Siponen and Anthony Vance
- Do you see what I see? The search for consensus among executives’ perceptions of IT business value pp. 306-325

- Paul P Tallon
- IT capability and organizational performance: the roles of business process agility and environmental factors pp. 326-342

- Yang Chen, Yi Wang, Saggi Nevo, Jiafei Jin, Luning Wang and Wing S Chow
- Blending bureaucratic and collaborative management styles to achieve control ambidexterity in IS projects pp. 343-356

- Robert Wayne Gregory and Mark Keil
- Why end-users move to the cloud: a migration-theoretic analysis pp. 357-372

- Anol Bhattacherjee and Sang Cheol Park
Volume 23, issue 2, 2014
- Why would we care about privacy? pp. 97-102

- Tamara Dinev
- Cultural and generational influences on privacy concerns: a qualitative study in seven European countries pp. 103-125

- Caroline Lancelot Miltgen and Dominique Peyrat-Guillard
- A systematic methodology for privacy impact assessments: a design science approach pp. 126-150

- Marie Caroline Oetzel and Sarah Spiekermann
- A process model for analyzing and managing flexibility in information systems pp. 151-184

- Ram L. Kumar and Antonis C. Stylianou
- Understanding online customers' ties to merchants: the moderating influence of trust on the relationship between switching costs and e-loyalty pp. 185-204

- Michelle Carter, Ryan Wright, Jason Bennett Thatcher and Richard Klein
- Using organizational influence processes to overcome IS implementation barriers: lessons from a longitudinal case study of SPI implementation pp. 205-222

- Ojelanki Ngwenyama and Peter Axel Nielsen
- Board-level IT governance and organizational performance pp. 223-239

- Ofir Turel and Chris Bart
Volume 23, issue 1, 2014
- Interpretive accounts and fairy tales: a critical polemic against the empiricist bias in interpretive IS research pp. 1-11

- Bernd Carsten Stahl
- Empiricism in interpretive IS research: a response to Stahl pp. 12-16

- Geoff Walsham
- Who do you think you are? A review of the complex interplay between information systems, identification and identity pp. 17-35

- Edgar A. Whitley, Uri Gal and Annemette Kjaergaard
- Users' willingness to pay for web identity management systems pp. 36-50

- Heiko Roßnagel, Jan Zibuschka, Oliver Hinz and Jan Muntermann
- Interrelationships of identity and technology in IT assimilation pp. 51-68

- Aurelie Leclercq-Vandelannoitte
- Organizational identity and information systems: how organizational ICT reflect who an organization is pp. 69-83

- Michael Tyworth
- Performing embodied identity in virtual worlds pp. 84-95

- Ulrike Schultze
Volume 22, issue 6, 2013
- Journals and conferences in discourse pp. 589-591

- Dov Te'eni
- IS integration and knowledge sharing in multi-unit firms: the winner's curse pp. 592-603

- Nilesh Saraf, Chris Schlueter Langdon and Omar El Sawy
- Why the first provider takes it all: the consequences of a low trust culture on pricing and ratings in online sourcing markets pp. 604-618

- David Gefen and Erran Carmel
- The pursuit of trust in ad hoc virtual teams: how much electronic portrayal is too much? pp. 619-636

- Shoshana Altschuller and Raquel Benbunan-Fich
- Does risk matter? Disengagement from risk management practices in information systems projects pp. 637-649

- Elmar Kutsch, David Denyer, Mark Hall and Elizabeth (Liz) Lee-Kelley
- How user risk and requirements risk moderate the effects of formal and informal control on the process performance of IT projects pp. 650-672

- Mark Keil, Arun Rai and Shan Liu
- Empirical investigation of the usefulness of Gateway constructs in process models pp. 673-689

- Jan Recker
- Longitudinal use of method rationale in method configuration: an exploratory study pp. 690-710

- Fredrik Karlsson
Volume 22, issue 5, 2013
- Governing IT in inter-organizational relationships: Issues and future research pp. 493-497

- Gerald Grant and Felix B Tan
- Creating value through governing IT deployment in a public/private-sector inter-organisational context: a human agency perspective pp. 498-511

- Carla L Wilkin, John Campbell and Stephen Moore
- Inter-firm IT governance in power-imbalanced buyer–supplier dyads: exploring how it works and why it lasts pp. 512-528

- Jinghua Xiao, Kang Xie and Qing Hu
- The mediating role of psychological contract breach in IS outsourcing: inter-firm governance perspective pp. 529-547

- Hyung Jin Kim, Bongsik Shin and Hogeun Lee
- Exploring the impact of operating model choice on the governance of inter-organizational workflow: the U.S. e-prescribing network pp. 548-568

- Nelson King
- Exploring value networks: theorising the creation and capture of value with open source software pp. 569-588

- Lorraine Morgan, Joseph Feller and Patrick Finnegan
Volume 22, issue 4, 2013
- ‘Datafication’: making sense of (big) data in a complex world pp. 381-386

- Mark Lycett
- Information technology offshoring in India: a postcolonial perspective pp. 387-402

- M N Ravishankar, Shan L Pan and Michael D Myers
- Leveraging the IT competence of non-IS workers: social exchange and the good corporate citizen pp. 403-415

- Joshua M Davis
- The role of online seller reviews and product price on buyers' willingness-to-pay: a risk perspective pp. 416-433

- Jianan Wu and Edgardo Arturo Ayala Gaytán
- Towards integrating acceptance and resistance research: evidence from a telecare case study pp. 434-454

- Marjolein van Offenbeek, Albert Boonstra and DongBack Seo
- Trust dynamics in a large system implementation: six theoretical propositions pp. 455-474

- Bjarne Rerup Schlichter and Jeremy Rose
- How a professionally qualified doctoral student bridged the practice-research gap: a confessional account of Collaborative Practice Research pp. 475-492

- Lars Mathiassen and Anna Sandberg
Volume 22, issue 3, 2013
- Embracing diversity through mixed methods research pp. 251-256

- Pär J Ågerfalk
- Digital business reporting standards: mapping the battle in France pp. 257-277

- Véronique Guilloux, Joanne Locke and Alan Lowe
- Top management support in multiple-project environments: an in-practice view pp. 278-294

- Amany Elbanna
- Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts pp. 295-316

- Tamara Dinev, Heng Xu, Jeff H Smith and Paul Hart
- Sympathy or strategy: social capital drivers for collaborative contributions to the IS community pp. 317-335

- Matthias Trier and Judith Molka-Danielsen
- A method for taxonomy development and its application in information systems pp. 336-359

- Robert C Nickerson, Upkar Varshney and Jan Muntermann
- Can we have fun @ work? The role of intrinsic motivation for utilitarian systems pp. 360-380

- Jennifer E Gerow, Ramakrishna Ayyagari, Jason Bennett Thatcher and Philip L Roth
Volume 22, issue 2, 2013
- Research opportunities in information technology funding and system justification pp. 131-138

- Ken Peffers and Brian L Dos Santos
- Revisiting IS business value research: what we already know, what we still need to know, and how we can get there pp. 139-169

- Guido Schryen
- Shareholder reaction to firm investments in the capability maturity model: an event study pp. 170-190

- Greg Filbeck, Matthew Swinarski and Xin Zhao
- Adapting funding processes for agile IT projects: an empirical investigation pp. 191-205

- Lan Cao, Kannan Mohan, Balasubramaniam Ramesh and Sumantra Sarkar
- Effects of time-inconsistent preferences on information technology infrastructure investments with growth options pp. 206-220

- Sarah S Khan, Moutaz Khouja and Ram L Kumar
- E-government adoption in public administration organizations: integrating institutional theory perspective and resource-based view pp. 221-234

- Daqing Zheng, Jin Chen, Lihua Huang and Cheng Zhang
- Effective ERP adoption processes: the role of project activators and resource investments pp. 235-250

- Edward W N Bernroider
Volume 22, issue 1, 2013
- Grounded theory method in information systems research: its nature, diversity and opportunities pp. 1-8

- David F Birks, Walter Fernandez, Natalia Levina and Syed Nasirin
- Grounded theorizing for electronically mediated social contexts pp. 9-25

- Emmanuelle Vaast and Geoff Walsham
- The use of ethnography and grounded theory in the development of a management information system pp. 26-44

- Elisa Mattarelli, Fabiola Bertolotti and Diego Maria Macrì
- Using grounded theory as a method for rigorously reviewing literature pp. 45-55

- Joost F Wolfswinkel, Elfi Furtmueller and Celeste P M Wilderom
- Enriching our theoretical repertoire: the role of evolutionary psychology in technology acceptance pp. 56-75

- Chon Abraham, Marie-Claude Boudreau, Iris Junglas and Richard Watson
- Everyday power struggles: living in an IOIS project pp. 76-94

- Riitta Hekkala and Cathy Urquhart
- Using a grounded theory approach to study online collaboration behaviors pp. 95-118

- Susan Gasson and Jim Waters
- Profiling grounded theory approaches in information systems research pp. 119-129

- Rangarirai Matavire and Irwin Brown
| |