1016 Pamplin Hall
Blacksburg, VA 24061
United States
Virginia Tech - Pamplin College of Business
SSRN RANKINGS
in Total Papers Downloads
in Total Papers Citations
Hedonic-motivation system adoption model (HMSAM), technology acceptance model, cognitive absorption, immersion, hedonic-motivation systems, utilitarian-motivation systems, mixed-motivation systems, gaming, intrinsic motivation, extrinsic motivation
online payment systems, e-credit, e-commerce, payment gateway, merchant account, shopping cart, PtP payment processes, education
agility, agile development, software development, life cycle, large organizations, waterfall method, extreme programming, Scrum, informal communication, interdependencies, coordination
Stalking, Cyberstalking, Shame, Neutralization, Self-control, Rational choice theory, Social learning theory of crime, Emotional theory of stalking, Self-control theory, Social media, Deviance
Expectations, Intrinsic Motivations, Extrinsic Motivations, Hedonic Motivations, Disconfirmation, Continuance, User Beliefs, Satisfaction, Hedonics, Gaming, Utilitarian Systems, Design Aesthetics, Ease-of-use, Usefulness, Design-expectations Fit
Information Security, Protection Motivation Theory, System Backups, Model Comparison, Fear Appeals, Threat, Coping, Intentions, Behavior
Information Systems, Journal Rankings, Journal Quality, Research Journals, Practitioner Journals, Reference Disciplines, Supporting Disciplines, Tenure, Academic Promotion, Management Information Systems, Computer Information Systems
Accountability theory, identifiability, expectation of evaluation, awareness of monitoring, social presence, factorial survey method, user-interface design, information security policy violations, unauthorized access, graphical vignettes, mediation, moderation, design science
Methodology, Formative Construct Validation, MIMIC Modelling, Covariance-based SEM, Protection-Motivated Behaviors
cyberbullying, cyberstalking, cyberharassment, social media, social media cyberbullying model (SMCBM), neutralization, anonymity, disinhibition, deindividuation, differential association, differential reinforcement, definition, imitation, social structure and social learning (SSSL) model, social lea
Gamification, Gamification Definition, Gamification Domain, Research Agenda, Theory Building, Theories in IS Research, Attitudinal Change, Behavioral Change, Nomological Network
Reactance theory, fairness theory, computer monitoring, computer abuse, privacy invasion, procedural justice, distributive justice, antisocial behavior
collaborative writing, taxonomy, collaboration, group awareness, collaborative writing software
Majority influence, culture, social presence, computer-mediated communication (CMC), group diversity, virtual teams
Information systems journal rankings, scientometrics, bibliometrics, journal quality, SenS-6, SenS-8, self-citation, Impact Factor, h-index, social network analysis, expert opinion, composite ranking or rating, AIS Senior Scholars basket of journals, nomologies for dissemination of scientific knowle
selective organizational information privacy and security violations model (SOIPSVM), privacy, security, theory building, organizational privacy, organizational security, rule violations, policy violations, information abuse, SOIPSVM, PCI DSS, HIPPA, selective organizational rule violations model
e-commerce, internet retailing, logos, credibility, surface credibility, logo design, branding, website design, trust, distrust, online consumers, online marketing, e-commerce, source credibility theory
social networking (SN); social networking applications (SNAs); social media; literature review; systematic review; social networks; social network analysis; social computing; information systems (IS)
Physical Internet (PI), systematic literature review, supply chain management (SCM)
Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, job satisfaction, management support, structural equation modeling
Trust, Internet, brand image, brand awareness, branding alliance, e-commerce, associative network model of memory, familiarity, and information integration theory
privacy fatigue, information privacy, privacy controls, information disclosure, feature fatigue, field experiment
Big data capability, customer agility, organization competitiveness
Big data, big data capability, theory building, IT agility, dynamic capability theory
Theory building; partial least squares (PLS); structural equation modeling (SEM); causal inquiry; first-generation statistical techniques; second-generation statistical techniques
Protection-motivated behaviors, behavioral information security, systematics, theory of diversity, multidimensional scaling, cluster analysis, taxonomy
Security, privacy, information technology (IT) artefact, information systems (IS) artefact, future research, online platforms, the Internet of things (IoT), big data, deterrence theory (DT), rational choice theory (RCT)
Security, Spear-phishing, Training, Fear Appeals, Protection Motivation Theory, Construal Level Theory
research productivity, citation analysis, scientometrics, bibliometrics, information systems
Freemium markets; vertical differentiation; horizontal differentiation; fairness; consumption values theory; longitudinal experiment; difference-in-difference model.
online payment, customer trust, perceived enjoyment, familiarity, propensity to trust, third-party seals, personal innovativeness, risk, intention to adopt, Kuwait
terrorism, cyberterrorism, intrusion detection, genetic programming
accountability, accountability theory, access policy violations, factorial survey method, information security, identifiability, monitoring, evaluation, awareness, social presence
culture, cross-cultural groups, collaboration, collaborative software, group support systems, distributed teams
repertory grid, repgrid, personal construct theory, cognitive mapping
Mobile applications, location-based services, network effects, privacy assurance, electronic commerce, information cascades, privacy seals, privacy calculus, information privacy
Computer-mediated communication (CMC), small-group communication, virtual teams, social presence, social presence theory (SPT), and heuristic evaluation (HE)
Information systems theory, middle-range theory, grand theory, concepts, propositions, theory construction
location-based services, mobile computing, network effects, privacy assurance, electronic commerce, information cascades, privacy seals, privacy calculus, privacy
citations, writing, citation managers, Ph.D. students
IS security; behavioral security; in-role behaviors; extra-role behaviors; social control theory (SCT); security management; information security policy (ISP); formal control; social control; organizations
computer abuse, internal computer abuse (ICA), deterrence theory (DT), rational choice theory (RCT), absolute deterrence, restrictive deterrence, security, behavioral security, organizational security, information security policies (ISPs), compliance violations, criminal behavior
Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, security, organizational commitment, structural equation modeling
gamification; design science research (DSR); hedonic-motivation system adoption model (HMSAM); immersion; flow; security compliance; security education, training, and awareness (SETA)
Digital transformation, IT capability, Agility, Transformational leadership, Case studies, IT innovation, Strategy
e-business, model checking, atomicity, process and communication protocols, data typing
electronic markets, business-to-business marketplaces, supply-chain strategy, strategy
Information Security, Future Research, Behavioral Information Security, Research Challenges, Deviant Security Behavior
continuance; fitness technologies; self-determination model of health behavior (SDMHB); self-determination theory (SDT); basic psychological needs (BPNs) theory; causality orientations theory; exercise goals; subjective vitality
interactivity, interaction, usability, websites, satisfaction, HCI, desires, expectations
scholarship, publishing, research articles, writing, post-postivism, theory building
Information Systems (IS) theory, theorizing, discursive formation, question, paradigm, law, framework, myth, analogy, metaphor, model, concept, construct, hypothesis, statement, media richness theory
Heuristic evaluation, collaborative software, usability, HCI, distributed work
e-Business, Model checking, Money atomicity, Goods atomicity, Valid receipt, Process and communication protocols
IS journal rankings, academics, scientometrics
Online Social Networks (OSNs), OSN Obsessive-Compulsive Disorder, OSN Addiction, OSN Belongingness, Need-To-Belong Theory, Uses and Gratifications Theory, Facebook
RFID, supply-chain agility, bullwhip effect, beer distribution game, e-commerce, interorganizational systems, information systems
password reuse, keystroke dynamics, protection motivation theory, just-in-time fear appeals, support vector machine, cyber-security, developing countries
Mobile-Computing Self-Efficacy, Location-Based Services, Trust, Perceived Risk, Privacy Calculus, Mobile Apps, Smartphones
Collaborative writing (CW), distributed work, group awareness, group support systems, group writing, media richness theory
Information Systems, Analytics, Journal Rankings, Scientometrics, Tenure and Promotion
information security (ISec), security threats, fear appeals, construal level theory (CLT), protection motivation theory (PMT), fear-appeal design, argument nature, temporal distance, organizational security, behavioral security
Business communication, journal influence, journal quality, journal rankings, journal survey, professional communication, scientometrics, technical communication, technology-based communication
collaboration, small groups, virtual teams
information privacy, information disclosure, location data, mobile devices, experimental methodology, privacy calculus
Trust, distrust, ambivalence, electronic transactions, HCI, online behaviour, online relationships, polynomial regression analysis, response surface analysis, Internet, online consumer
healthcare, mobile healthcare system, patient compliance, trust, patient-doctor communication, patient planned behavior
Tenure standards, publication standards, publication benchmarks, faculty productivity, scientometrics, Carnegie Classification
fitness mobile application, social gamification, interpersonal competition, intergroup competition, cooperation, coopetition, social interaction mechanisms (SIMs), field experiment, game engagement, daily steps
Technology acceptance model (TAM), immersion, enjoyment, interactivity, curiosity, hedonic, utilitarian, gaming, adoption, behavioral intention to use, perceived ease-of-use, control, interactivity-stimulus-attention model (ISAM), flow, attention, stimuli
whistle blowing, whistle blowing systems, culture, Middle East, China, USA, anonymity, trust, risk, cross-cultural comparisons
IT service climate, internal IT service perceptions, IT service quality, IT agility, construct distinctiveness, IT strategy
Elaboration Likelihood Model, argumentation, persuasion, cues, source credibility, website quality, privacy seals, assurance statements, privacy policy statements, brand image, risk
Innovation intermediaries, open innovation, collaborative networks, SMEs, wine industry
Information privacy, privacy safeguards, healthcare, imbalance challenge, grounded theory, interpretive research, unintended consequences, intended consequences, the unintended consequences of privacy safeguard enactment (UCPSE) framework
security, information security management (ISM), two-stage meta-analytic structural equation modeling (TSSEM), protection motivation theory (PMT), extended parallel process model (EPPM)
Self-disclosure, social influence, trust, privacy, reciprocity, collectivism, individualism, culture
communication, collaborative software, GSS, media richness, social presence, group size
Ultra-lean interactive media (ULIM), Audience response systems (ARS), Human Computer Interaction (HCI), collaboration, large groups, interactivity, ultra-lean interactivity, CMC Interactivity Model (CMCIM)
Cyberbullying (CB), control balance theory (CBT), social anonymity, anonymity, monitoring, evaluation, control surplus, control deficit, control balance, IT CB prevention capability (ITCBPC), nonlinear mediation, nonlinear moderation, U-shaped curve, inverted U-shaped cure
Wearables, Quantified Self 2.0, Self-disclosure, Healthcare Online Communities, Self-Presentation Theory, Hierarchical Linear Modelling
Information security (ISec), extended parallel processing model (EPPM), protection motivation theory (PMT), organizational security
distrust, decision-making, groups, teams, collaboration, trust, CMC
Collaborative software, instrumental voice, value-expressive voice, virtual groups, voice effect, collaboration
Black hat hacker; security; criminology nerve management; general strain theory; routine activity theory (RAT)
Expectancy Violations Theory, embodied agents, human-to-Embodied Agent communication, expectations, social judgment, decision making
model checking, e-commerce, security, money atomicity, goods atomicity, validated receipt
affect, expectations disconfirmation, stimulus, attention, perceived affective quality, hedonic systems
Contributor withdrawal, cognitive dissonance, emotional change, sense-making, online communities
Citation analysis, IT artifact, scientometrics, bibliometrics, information systems, IS field
Citation analysis, IT artifact, scientometrics, bibliometrics, information systems field, journal influence
Autonomous technology-based agents, biases, collaboration, decision making, emotions, knowledge and learning, unintended consequences.
Collaborative writing, user experiences, collaboration, group work
wearable device, quantified-self, running platforms, physical activity maintenance, motivational affordance, achievement goal, mastery goal, performance goal
Whistle-blowing, whistle-blowing reporting systems, organizational governance, organizational failure, computer abuse, anonymity, trust, IT artifacts, risk
Information security (InfoSec); organizational security; emotions; precaution taking; broaden-and-build theory (BBT); positive psychology; psychological distancing; psychological capital (PsyCap)
e-Business, e-commerce, protocols, model checking, money atomicity, goods atomicity, valid receipt, standards enforcement
Excel, metrics, management consulting, internet service providers, help desk, Information Systems, customer service
IT affordance, innovation, matching fit, covariance fit, organizational courage, actualization
trust, distrust, ambivalence, suspicion, situation abnormality, unified trust-distrust model (UTDM)
Collaborative writing, group work, Collaboratus, distributed work, design
distributed group work, collaborative writing, process structure, collaboration, Internet-based
Organisation security, Control theory, Reactance theory, Reactance, Compliance, Information security policies, Policy compliance, Organisational deviance, Threats to freedom, Boomerang effects
behavioral information security; risk assessment; qualitative analysis; organizational insiders; security professionals; protection motivation theory
Security; Organizational security (OrgSec); human factors of security; cyberthreat intelligence (CTI); risk management; triarchic theory of intelligence (TTI); CTI capability model (CTI-CM); information security officer; CTI practitioner; CTI analyst
Compliance, Information Security Policies (ISPs), Security, Organisational Security, ISP Compliance, Rational Choice Theory (RCT), Affect, Mood, Mood States, Morality, Multilevel Analysis, Organisational Compliance, Theory of Planned Behaviour (TPB), Organisational Citizenship Behaviours (OCBs)
Collaborative writing, group work, Collaboratus, distributed work
Ethical Organizations, Virtue Ethics, IT Affordances, Organizational Capabilities, Organizational Innovation, Collaboration, Organizational Memory, Process Management, IT Strategy, Organizational Wisdom, Organizational Courage, Organizational Justice, Organizational Temperance
Event study methodology (ESM), information security (ISec) breaches, systematic literature review (SLR), ISec events, ISec investments, efficient market hypothesis, contingency factors, abnormal returns
Information System (IS) Security, Information Security Policy (ISP), Violations, Grounded Theory
Information systems theory, theorizing, research methods, discursive practices, problematizing, paradigms, analogies, metaphors, myths, models and concepts
wearable device, quantified-self 2.0 platforms, health behavior maintenance, motivational affordance, self-efficacy
Digital Piracy, Piracy, Meta-Analysis, Literature Review, Social Cognitive Theory (SCT), Theory Building, Illegal File Sharing, Copyright Infringement, Neutralization, Sanctions, Morality, Costs, Benefits, Risks, Social Influence, Perceived Behavioral Control (PBC), Self-Efficacy
Communication media, research dissemination, knowledge dissemination, scholarship, academic publishing, video media, multimedia instruction
Heuristic evaluation, collaboration engineering, virtual groups, virtual teams, group size, usability evaluation, human-computer interaction, thinkLets, collaboration, collaborative software
information and communication technology, knowledge sharing, in-role, extra-role, open innovation.
Thinklets, collaborative writing, collaboration, facilitation, group work
Formative Measurement, Fixed-Weight Redundancy Model (FWRM), Free-Estimation Model, Interpretational Confounding, Interpretational Ambiguity, MIMIC Model, Structural Equation Modeling (SEM), Partial Least Squares (PLS)
Fairness theory (FT), reactance theory (RT), deterrence theory (DT), counterfactual reasoning, reactive computer abuse (CA), explanation adequacy (EA), organisational trust, security education, training, and awareness (SETA), deterrence, security, organisation communication
interaction, interactivity, digital entertainment, taxonomy, lifestyle computing, IDE
Trust, distrust, ambivalence, online behavior, e-commerce, situational abnormality, situational normality, suspicion, systematic processing, discriminative encoding, heuristic-systematic dual-processing model (HSM), least-effort principle, sufficiency principle
Peer-to-peer transactions, microloans, herding behavior, information asymmetry, platforms
Information security (ISec) threats, fear appeals, protection motivation theory (PMT), construal-level theory (CLT), concrete, abstract
privacy, Internet of Things
Mobile device; mobile security; human–computer interaction(HCI); mobile applications (apps); perceived security; dual-task interference; mobile security notification (MSN)
protection motivation theory (PMT), psychological ownership, collectivism, individualism, information security behavior
Security; organizational security; information security; insider computer abuse (ICA); self-control theory; deterrence theory (DT); instrumental motives; expressive motives
Virtues, Ethics, Organizational Leadership, Role Effectiveness, CIO, Information Technology, Executives
XML, data mediation, collaboration, heterogeonous data
Enterprise resource planning system (ERP), ERP assimilation, technology evaluation, technology imitation, diffusion of innovation (DOI) theory, China, adoption, assimilation
Collaboration; user engagement; social presence; co-presence; e-commerce; social presence theory; online shopping; co-browsing
trust, mere-exposure effect, familiarity, logos, swift trust, websites
unauthorized access, accountability, identifiability, evaluation, information security, user interface design
ARS, audience response systems, large classrooms, education, interactivity, communication, status effects, satisfaction, active learning
Autonomous technology-based agents, biases, collaboration, decision making, emotions, knowledge and learning, unintended consequences
Supply chain integration, Developed economies, Developing economies, ICT use, SMEs, Wine industry.
Model checking, e-processes, web services, electronic contracting, dependability auditing
Cyberharassment (CH), deviance, self-control theory (SCT), social learning theory (SLT), technology-based opportunism (TBO), social-psychological-technological (S-P-T) phenomenon
Supply chain resilience, theory building, metaphors, metaphorical transfer, endotherm resilience
Human Computer Interaction, Computer-Mediated Communication, Human Information Behavior, Gender, Deception, Online Game
Protection-motivated behaviors, behavioral information security, information assurance, multidimensional scaling, cluster analysis, typology formation
Human Computer Interaction, voice effect, collaboration
Proximity, collaborative writing, distributed groups, group work
Collaborative tools, collaborative writing (CW), distributed education, distributed work, group writing, hybrid distributed education
Heuristic evaluation, HFDF, GSS, collaborative software, distributed groups
Trust, distrust, groups, virtual teams, tasks, team performance, decision making, decision quality, collaboration
Open Innovation, Semantic Learning, Big Data, Social Media, Small and Medium Sized Enterprises
Anonymizing systems, security infrastructure, security, anonymity, trust in IT, cyber security
control theory, controls, reactance theory, reactance, IT security policies, policy compliance, mandatoriness, organizational mandatoriness, threat to freedom, boomerang effects, anger
HIPPA, privacy violations, organizations, organizational violations, privacy regulations, privacy policies, healthcare, IT policies
Data collection, surveys, online data, Mechanical Turk, Qualtrics, Survey Monkey, data quality, validity, organization research, information systems research, management research
Item Response Theory, Classical Test Theory, Scale Development, Rasch Model, Measurement, Measures, Hedonism, Reliability, Hedonic IS
Collaborative writing, group work, Collaboratus
Self-determination, reactance, efficacy, information security policy
: IS curriculum, Learning, Teaching, Pedagogy, Integrated course design, Cross-course curriculum
Control theory, controls, reactance theory, reactance, IT security policies, policy compliance, mandatoriness, anger
Information Security, Psychological Capital (PsyCap), Protection Motivation Theory (PMT), Positive Psychology, Organizational Insiders
trust, culture, GSS, collaborative software, individualism, collectivism
Information security policy (ISP), Information security policy compliance (ISPC), behavior, protection motivation, institutional governance (IG), higher education institutions (HEIs), protection motivation theory (PMT), theory of planned behavior (TPB)