282 results on '"Detmar W. Straub"'
Search Results
2. From worker empowerment to managerial control: The devolution of AI tools' intended positive implementation to their negative consequences.
3. Fostering information security compliance as organizational citizenship behavior.
4. Pay-What-You-Want Pricing in the Digital Product Marketplace: A Feasible Alternative to Piracy Prevention?
5. The Role of Vendor Legitimacy in IT Outsourcing Performance: Theory and Evidence.
6. So, You Trust the Doctor - but the Technology?
7. The Differential Role of Alternative Data in SME-Focused Fintech Lending.
8. How Trust Leads to Commitment on Microsourcing Platforms: Unraveling the Effects of Governance and Third-Party Mechanisms on Triadic Microsourcing Relationships.
9. Measuring creolization in IT outsourcing: Instrument development and validation.
10. Innovation and Policy Support for Two-Sided Market Platforms: Can Government Policy Makers and Executives Optimize Both Societal Value and Profits?
11. Why do participants continue to contribute? Evaluation of usefulness voting and commenting motivational affordances within an online knowledge community.
12. Fostering Participant Health Knowledge and Attitudes: An Econometric Study of a Chronic Disease-Focused Online Health Community.
13. The impact of hierarchical privilege levels and non-hierarchical incentives on continued contribution in online Q&A communities: A motivational model of gamification goals.
14. E-Health: Value Proposition and Technologies Enabling Collaborative Healthcare.
15. Organizational Learning to Leverage Benefits Realization Management; Evidence from a Municipal eHealth Effort.
16. Influential Users in Social Network Services: The Contingent Value of Connecting User Status and Brokerage.
17. Why Do Users Participate in Online Communities? The Effect of Motivational Affordances, Comments, and Peer Contribution on Continuance.
18. The Impact of Institutional Distance on the Joint Performance of Collaborating Firms: The Role of Adaptive Interorganizational Systems.
19. Towards a Theoretical Model for Co-Realization of IT Value in Government.
20. Holistic Archetypes of IT Outsourcing Strategy: A Contingency Fit and Configurational Approach.
21. Knowledge Contributions in Design Science Research: A Meta-Analysis.
22. Enhancing Password Security through Interactive Fear Appeals: A Web-Based Field Experiment.
23. How Information Technology Governance Mechanisms and Strategic Alignment Influence Organizational Performance: Insights from a Matched Survey of Business and IT Managers.
24. Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures.
25. Big data and firm performance: The roles of market-directed capabilities and business strategy.
26. A linguistic signaling model of social support exchange in online health communities.
27. Theorizing Communicative Practices within Financial Internet Discussion Sites.
28. Conflating Antecedents and Formative Indicators: A Comment on Aguirre-Urreta and Marakas.
29. Effective website design for experience-influenced environments: The case of high culture museums.
30. The Impact of Virtually Crowdsourced Social Support on Individual Health: Analyzing Big Datasets for Underlying Causalities.
31. The Critical Importance of Construct Measurement Specification: A Response to Aguirre-Urreta and Marakas.
32. Institutional Influences on Information Systems Security Innovations.
33. User Satisfaction with Information Technology Service Delivery: A Social Capital Perspective.
34. National ICT Policies and Development: A Stage Model and Stakeholder Theory Perspective.
35. If Practice Makes Perfect, Where do we Stand?
36. An Analysis of the Evolving Intellectual Structure of Health Information Systems Research in the Information Systems Discipline.
37. Opening the black box of system usage: user adaptation to disruptive IT.
38. A response to the design-oriented information systems research memorandum.
39. The amplification effects of procedural justice on a threat control model of information systems security behaviours.
40. Chronism Theory, Culture, and System Delay: A Longitudinal Study of Post-Apartheid South Africa.
41. Information infrastructure, governance, and socio-economic development in developing countries.
42. Security lapses and the omission of information security measures: A threat control model and empirical test.
43. Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture.
44. Strategic dependence on the IT resource and outsourcing: A test of the strategic control model.
45. Specifying Formative Constructs in Information Systems Research.
46. Future IS research in net-enabled organizations.
47. Competitive and Cooperative Positioning in Supply Chain Logistics Relationships.
48. Knowledge Spheres and the Diffusion of National IT Policies.
49. Reconceptualizing System Usage: An Approach and Empirical Test.
50. Creating and Developing a Program of Global Research.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.