Research
Selected recent faculty research publications.
Abrahams, A., Barkhi, R., Coupey, E., Ragsdale, C., Wallace, L. (2014) “Converting browsers into recurring customers: An analysis of the determinants of sponsored search success for monthly subscription services,” Information Technology and Management, Vol. 15, No. 3, pp. 177-197.
Agarwal, A., Colak, S., Deane, J., and Rakes, T. (2014) “The Task Scheduling Problem: A Neurogenetic Approach,” Journal of Business & Economics Research, Vol. 12, No. 4, pp. 327 – 334.
King, M., Abrahams, A., Ragsdale, C. (2014) “Ensemble Methods for Advanced Skier Days Prediction,” Expert Systems With Applications, Vol. 41, No. 4, Part 1, pp. 1176-1188.
Melnyk, S., C.W. Zobel, S. Griffis, and J. MacDonald (2014) “Making Sense of Transient Responses in Simulation Studies: An Approach for Interpreting Transient Response Time Series Data,” International Journal of Production Research, 52(3), 617-632.
Rakes, T.R., Deane, J.K., Rees, L.P., and Fetter, G. (2014) A Decision Support System for Post-Disaster Interim Housing, Decision Support Systems, Vol. 66, pp. 160-169.
Seref, O., P. Xanthopoulos, T. Razzaghi (2014) “Weighted relaxed support vector machines,” Annals of Operations Research, in print (available online).
Seref, O., W. A. Chaovalitwongse, J. P. Brooks (2014) “Relaxing support vectors for classification,” Annals of Operations Research, 216 (1): 229 – 255.
Seref, O., Y.-J. Fan, E. Borenstein, W. A. Chaovalitwongse (2014) “Information-theoretic feature selection with discrete k-median clustering,” Annals of Operations Research, in print (available online).
Seref, O., Y.-J. Fan, W. A. Chaovalitwongse (2014) “Mathematical programming formulations and algorithms for discrete k-median clustering with time series data”, INFORMS Journal on Computing, 26 (1): 160 – 172.
Wang, H.J. Wang, J. Li, W. Fan, and A.S. Abrahams (2014) “Understanding Knowledge Sharing Processes in Online Q&A Communities,” ACM Transactions on Management Information Systems, 5(4).
Wang, X. Liu, J. Wang, M. Zhang, and W. Fan (2015) “Examining Micro-Level Knowledge Sharing Discussions in Online Communities,” Information Systems Frontiers.
Xiao, M., Khansa, L., Deng, Y., Kim, S. S. (2014) Impact of Prior Reviews on the Subsequent Review Process in Reputation Systems. Journal of Management Information Systems, 30 (3), 279 – 310.
Zobel, C.W. (2014) “Quantitatively Representing Non-linear Disaster Recovery,” Decision Sciences, 45(6), 1053-1082.
Zobel, C.W. and Khansa, L. (2014) Characterizing Multi-Event Disaster Resilience. Computers & Operations Research – Special Issue on MCDM in Emergency Management, 42, 83 – 94.
Abrahams AS, Fan W, Wang GA, Zhang Z, Jiao J (2015). An Integrated Text Analytic Framework for Product Defect Discovery. Production & Operations Management. 24(6), 975-990, June.
Badinelli, R. (2015) “Editorial: Defining and measuring value”, Service Science, 7:3, pp. i-vi.
Baghersad, M. and C.W. Zobel (2015) “Economic Impact of Production Bottlenecks Caused by Disasters Impacting Interdependent Industry Sectors,” International Journal of Production Economics, 168, 71-80.
Shen, W., Y. Hu, and J. Ulmer (2015) Competing for Attention: An Empirical Study of Online Reviewers’ Strategic Behavior, MIS Quarterly, 39(3), pp. 683-696.
Dana M. Johnson and Roberta S. Russell (2015) “SEM of Service Quality to Predict Overall Patient Satisfaction in Medical Clinics: A Case Study,” Quality Management Journal, Vol. 22, No. 4, pp. 18-36.
Khansa, L., Xiao, M., Liginlal, D., Kim, S. S. (2015) Understanding Members’ Active Participation in Online Question-and-Answer Communities: A Theory and Empirical Analysis. Journal of Management Information Systems, 32 (2), 162 – 203.
King, M., Abrahams, A., Ragsdale, C. (2015) Ensemble Learning Methods for Pay-Per-Click Campaign Management, Expert Systems With Applications, Vol. 42, No. 10, pp. 4818-4829.
Razzaghi, T., P. Xanthopoulos, O. Seref (2015) “Constraint relaxation, cost-sensitive learning and bagging for imbalanced classification problems with outliers,” Optimization Letters, in print (available online).
Rees, L.P., Rakes, T.R., and Deane, J.K. (2015) “Using Analytics to Challenge Conventional Baseball Wisdom,” Journal of Service Science, Vol. 8, No.1, pp. 11 – 20.
Roberta S. Russell, Dana M. Johnson and Sheneeta W. White (2015) “Patient Perceptions of Quality: Analyzing Patient Satisfaction Surveys,” International Journal of Operations and Production Management, Vol. 35, No. 8, pp. 1-26.
Zhou, L. Lei, J. Wang, W. Fan, G. Wang (2015) Social Media Adoption and Corporate Disclosure, Journal of Information Systems, 29(2), pp. 23-50.
Badinelli, R. (2016) Modeling Service Systems, Business Expert Press, New York.
Chacko, J., Rees, L.P., Zobel, C., Rakes, T.R., Russell, R.S., and Ragsdale, C.T. (2016) “Decision Support for Long-Range, Community-Based Planning to Mitigate Against and Recover from Potential Multiple Disasters,” Decision Support Systems, Vol. 87, pp. 13-25.
Dana M. Johnson, Roberta S. Russell, and Sheneeta W. White (2016), “Perceptions of Care Quality and the Effect on Patient Satisfaction,” International Journal of Quality and Reliability, Vol. 33, No. 8, pp. 1202-1229.
Janis, J.E., Khansa, L., and Khansa, I. (2016) Surgeon Reimbursements in Maxillofacial Trauma Surgery: Effect of the Affordable Care Act in Ohio. Plastic and Reconstructive Surgery, 137 (2), 613 – 618.
Khansa, I., Khansa, L., and Pearson, G.D. (2016) Strategies for Postoperative Seroma Prevention: A Systematic Review. Plastic and Reconstructive Surgery, 138 (1), 240 – 252.
Law DS; Abrahams AS, and Gruss R* (2016). Automated defect discovery for dishwasher appliances from online consumer reviews. Expert Systems with Applications. Forthcoming. 5-year ISI Impact Factor (2015): 2.879. In 2016, ESWA is ranked #1 among Artificial Intelligence journals by Google Scholar.
MacKenzie, C.A. and C.W. Zobel (2016) Allocating resources to enhance resilience, with application to Superstorm Sandy and an electric utility, Risk Analysis: An International Journal, 36(4), 847-862.
Seref, MMH, Carrillo, J & Yenipazarli, A. (2016) Multi-Generation Pricing and Timing Decisions in New Product Development. International Journal of Production Research, 54:7, 1919-1937.
Seref, O., J. P. Brooks, B. Huang, S. S. Fong (2016) “Enumeration and Cartesian product decomposition of alternate optimal fluxes in cellular metabolism,” INFORMS Journal on Computing, forthcoming.
Winkler M, Abrahams AS, Gruss R*, and Ehsani J (2016). Toy Safety Surveillance from Online Reviews. Decision Support Systems. Forthcoming. 5-year ISI Impact Factor (2015): 3.271.
Zobel, C.W., N. Altay, and M. Haselkorn (eds.) (2016) Advances in Managing Humanitarian Operations. International Series in Operations Research & Management Science, Vol. 235. Springer.
Adams DZ, Gruss R, & Abrahams AS (2017). Automated discovery of safety & efficacy concerns for joint & muscle pain treatments from online reviews. International Journal of Medical Informatics. 100, April, 108-120, DOI: 10.1016/j.ijmedinf.2017.01.005.
Barker, K., Lambert, J.H., Zobel, C.W., Tapia, A.H., Ramirez-Marquez, J.E., Albert, L., Nicholson, C.D., & Caragea, C. (2017). Defining resilience analytics for interdependent cyber-physical-social networks. Sustainable and Resilient Infrastructure, 2(2), 59–67. https://doi.org/10.1080/23789689.2017.1294859
Burns, A. J., Roberts, T. L., Posey, C., & Lowry, P. B. (2017). Examining the influence of organizational insiders’ psychological capital on information security threat and coping appraisals. Computers in Human Behavior, 68(March), 190-209. doi: https://doi.org/10.1016/j.chb.2016.11.018
Casselman, J., Onopa, N., & Khansa, L. (2017). Wearable healthcare: Lessons from the past and a peek into the future. Telematics and Informatics, 34(7), 1011-1023.
Cui, X., Zhang, N., & Lowry, P. B. (2017). The agent bidding habit and use model (ABHUM) and its validation in the Taobao online auction context. Information & Management, 54(3), 281–289. doi: https://doi.org/10.1016/j.im.2016.07.007
Farhoomand, A., Lowry, P. B., & Ziolek, F. (2017). Facebook: Facing off against Tencent (Case # HK1103-PDF-ENG, Harvard Business Publishing; cross-listed as Case #17/585C, Asia Case Research Centre). Retrieved from
Ho, S. M., Lowry, P. B., Warkentin, M., Yang, Y., & Hollister, J. M. (2017). Gender deception in asynchronous online communication: A path analysis. Information Processing & Management, 53(1), 21-41. doi: https://doi.org/10.1016/j.ipm.2016.06.004
Hong, H., Cao, M., & Wang, G. A. (2017). The effects of network externalities and herding on user satisfaction with mobile social apps. Journal of Electronic Commerce Research, 18(1), 18–21.
Hong, H., Xu, D., Wang, G. A., & Fan, W. (2017). An empirical study on the impact of online word-of-mouth sources on retail sales. Information Discovery and Delivery, 45(1).
Hong, H., Xu, D., Wang, G. A., & Fan, W. (2017). Understanding the determinants of online review helpfulness: A meta-analytic investigation. Decision Support Systems, 102, 1–11.
James, T. L., Deane, J. K., & Wallace, L. (2019). An application of goal content theory to examine how desired exercise outcomes impact fitness technology feature set selection. Information Systems Journal, 29(5), 1010-1039.
James, T. L., Lowry, P. B., Wallace, L., & Warkentin, M. (2017). The effect of belongingness on obsessive-compulsive disorder in the use of online social networks. Journal of Management Information Systems, 34(2), 560–596. doi: https://doi.org/10.1080/07421222.2017.1334496
Khansa, L., Kuem, J., Siponen, M., & Kim, S. S. (2017). To cyberloaf or not to cyberloaf: The impact of the announcement of formal organizational controls. Journal of Management Information Systems, 34(1), 141-176.
Kirk KC, & Abrahams AS (2017). Evaluating Public Charity Websites: Stage Model versus Automated Service. Nonprofit Management & Leadership. 27(4), Summer, 475-491.
LaLone, N., Tapia, A., Zobel, C., Caraega, C., Neppalli, V. K., & Halse, S. (2017). Embracing human noise as resilience indicator: twitter as power grid correlate. Sustainable and Resilient Infrastructure, 2(4), 169–178. https://doi.org/10.1080/23789689.2017.1328920
Law DS, Abrahams AS, & Gruss R (2017). Automated defect discovery for dishwasher appliances from online consumer reviews. Expert Systems with Applications. 67, January, 84-94.
Li, Y., Zobel, C. W., & Russell, R. S. (2017). Value of supply disruption information and information accuracy. Journal of Purchasing and Supply Management, 23(3), 191–201. https://doi.org/10.1016/j.pursup.2016.12.001
Lowry, P. B., Chatterjee, S., & Moody, G. D. (2017, January 4–7). Using the control balance theory to explain social media deviance. Paper presented at the Hawaii International Conference on System Sciences (HICSS-50), Big Island, HI.
Lowry, P. B., Dinev, T., & Willison, R. (2017). Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda. European Journal of Information Systems (EJIS), vol. 26(6) pp. 546–563, 26(6), 546-563. doi :https://doi.org/10.1057/s41303-017-0066-x
Lowry, P. B., Moody, G. D., & Chatterjee, S. (2017). Using IT design to prevent cyberbullying. Journal of Management Information Systems, 34(3), 863-901. doi:https://doi.org/10.1080/07421222.2017.1373012
Lowry, P. B., Zhang, J., & Wu, T. (2017). Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework. Computers in Human Behavior, 68(March), 104–120. doi:https://doi.org/10.1016/j.chb.2016.11.015
Ma, Y., Xia, L., Shen, W., Zhou, M., & Fan, W. (2017). A surrogate-based generic classifier for Chinese TV series reviews. Information Discovery and Delivery, 45(2), 66–74. https://doi.org/10.1108/IDD-11-2016-0044
Mair, P., Treiblmaier, H., & Lowry, P. B. (2017). Using multistage competing risks approaches to model web page transitions. Internet Research, 27(3), 650-669. doi:https://doi.org/10.1108/IntR-06-2016-0167
McWhorter, J., Brown, L., & Khansa, L. (2017). A wearable health monitoring system for posttraumatic stress disorder. Biologically Inspired Cognitive Architectures, 22, 44-50.
Moody, G. D., Lowry, P. B., & Galletta, D. (2017). It’s complicated: Explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis. European Journal of Information Systems, 26(4), 379-413. doi:https://doi.org/10.1057/s41303-016-0027-9
Parks, R., Xu, H., Chu, C.-H., & Lowry, P. B. (2017). Examining the intended and unintended consequences of organisational privacy safeguards enactment in healthcare. European Journal of Information Systems, 26(1), 37-65. doi:https://doi.org/10.1016/j.elerap.2017.07.002
Rusch, T., Lowry, P. B., Mair, P., & Treiblmaier, H. (2017). Breaking free from the limitations of classical test theory: Developing and measuring information systems scales using item response theory. Information & Management, 54(2), 189–203. doi:https://doi.org/10.1016/j.im.2016.06.005
Saunders, C., Brown, S.A., Bygstad, B., Dennis, A.R., Ferran, C., Galletta, D., Liang, T.P., Lowry, P.B., Recker, J., & Sarker, S. (2017). Goals, values, and expectations of the AIS family of journals. Journal of the Association for Information Systems, 18(9), 633-647. doi:http://aisel.aisnet.org/jais/vol18/iss9/2/
Singh, R., Mindel, V., & Mathiassen, L. (2017). IT-Enabled Revenue Cycle Transformation in Resource-Constrained Hospitals: A Collaborative Digital Options Inquiry. Journal of Management Information Systems, 34(3), 695-726.
Vance, A., Lowry, P. B., & Wilson, D. (2017). Using trust and anonymity to expand the use of anonymizing systems that improve security across organizations and nations. Security Journal, 30(3), 979-999. doi:https://doi.org/10.1057/sj.2015.22
Wei, J. S., Seedorf, S., Lowry, P. B., Thum, C., & Schulz, T. (2017). How increased social presence through co-browsing influences user engagement in collaborative online shopping. Electronic Commerce Research and Applications, 24(July-August), 84-99. doi:https://doi.org/10.1016/j.elerap.2017.07.002
Adjerid, I., & Kelley, K. (2018). Big data in psychology: A framework for research advancement. American Psychologist, 73(7), 899.
Adjerid, I., Acquisti, A., & Loewenstein, G. (2018). Choice architecture, framing, and cascaded privacy choices. Management Science, 65(5), 2267-2290.
Adjerid, I., Adler-Milstein, J., & Angst, C. (2018). Reducing Medicare spending through electronic health information exchange: the role of incentives and exchange maturity. Information Systems Research, 29(2), 341-361.
Adjerid, I., Peer, E. & Acquisti, A. (2018). Beyond the privacy paradox: Objective versus relative risk in privacy decision making. MIS Quarterly, 42(2), 465-A5.
Al-Daihani, S. M., & Abrahams, A. (2018). Analysis of academic libraries' Facebook posts: Text and data analytics. The Journal of Academic Librarianship, 44(2), 216-225.
Baghersad M, Nasri L, Marucchi NSW, Gruss R, Abrahams AS, & Ehsani JP (2018). An investigation into online videos as a source of safety hazard reports, Journal of Safety Research, 65, June, 89-99.
Bowden, Z., & Ragsdale, C. (2018) "The General Pickup and Delivery Problem with Backtracking Restrictions," International Journal of Operational Research. (In press).
Bowden, Z., & Ragsdale, C. (2018) “The Truck Driver Scheduling Problem with Fatigue Monitoring,” Decision Support Systems. 110, 20-31. https://authors.elsevier.com/a/1W-OFcBd3da94
Dominiczak, J., & Khansa, L. (2018). Principles of Automation for Patient Safety in Intensive Care: Learning From Aviation. The Joint Commission Journal on Quality and Patient Safety, 44(6), 366-371.
Goldberg, D., Deane, J., & Ragsdale, C. (2018), Integrating Spatial Analytics in Global Sourcing Decisions, International Journal of Information Technology & Decision Making, 17(3), pp. 709-739
Goldberg, D., Deane, J., Rakes, T., & Rees, L. (2019), Marketing Investments in Sport Venue Naming Rights & the Market Value of the Firm, International Journal of Sport Management & Marketing, 19(3), published online
Gruss R, Abrahams AS, Kim E, Song Y, & Berry DK. Engaging restaurant customers on Facebook: The power of belongingness appeals on social media, Accepted at: Journal of Hospitality and Tourism Research (JHTR)
Gruss R, Abrahams AS, Song Y, Berry D, & Al-Daihani S. Academic libraries on social media: community- building as an effective user engagement strategy. (Accepted: February 2nd 2019): Journal of the Association for Information Science and Technology (JASIST).
Gruss, R., Abrahams, A. S., Fan, W., & Wang, G. A. (2018). By the numbers: The magic of numerical intelligence in text analytic systems. Decision Support Systems, 113, 86-98.
Hassna, G., & Lowry, P. B. (2018, August 16–18). Big data capability, customer agility, and organization performance: A dynamic capability perspective. Paper presented at the The 24th Annual Americas Conference on Information Systems (AMCIS 2018), New Orleans, LA.
Hsu, J., Chiu, C.-M., Lowry, P. B., & Liang, T. P. (2018). Solving the interpretational-confounding and interpretational-ambiguity problems of formative construct modeling in behavioral research: Proposing a two-stage fixed-weight redundancy approach. Journal of the Association for Information Systems, 19(7), 618-671. doi:https://doi.org/10.17705/1jais.00504
James, T.L., Deane, J., & Wallace, L. (2018), An Application of Goal Content Theory to Examine How Desired Exercise Outcomes Impact Fitness Technology Feature Set Selection, Information Systems Journal, forthcoming
Jiang, L., Mirkovski, K., D. Wall, J., Wagner, C., & Lowry, P. B. (2018). Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities. Internet Research, 28(4), 988-1028.
Khansa, I., Jefferson, R., Khansa, L., & Janis, J. E. (2018). Optimal Pain Control in Abdominal Wall Reconstruction. Plastic and Reconstructive Surgery, 142(3S), 142S-148S.
Khansa, I., Khansa, L., Meyerson, J., & Janis, J. E. (2018). Optimal use of surgical drains: evidence-based strategies. Plastic and Reconstructive Surgery, 141(6), 1542-1549.
Khansa, I., Khansa, L., Pearson, G. D., & Jain, S. A. (2018). Effects of the Affordable Care Act on payer mix and physician reimbursement in hand surgery. The Journal of Hand Surgery, 43(6), 511-515.
Khansa, I., Khansa, L., Westvik, T. S., Ahmad, J., Lista, F., & Janis, J. E. (2018). Work-related musculoskeletal injuries in plastic surgeons in the United States, Canada, and Norway. Plastic and Reconstructive Surgery, 141(1), 165e-175e.
Khansa, L., Barkhi, R., Ray, S., & Davis, Z. (2018). Cyberloafing in the workplace: mitigation tactics and their impact on individuals’ behavior. Information Technology and Management, 19(4), 197-215.
Ma, X., Khansa, L., & Kim, S. S. (2018). Active Community Participation and Crowdworking Turnover: A Longitudinal Model and Empirical Test of Three Mechanisms. Journal of Management Information Systems, 35(4), 1154- 1187.
Menard, P., Warkentin, M., & Lowry, P. B. (2018). The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination. Computers & Security, 75, 147-166.
Mindel, V., Mathiassen, L., & Rai, A. (2018). The sustainability of polycentric information commons. MIS Quarterly, 42(2), 607-631.
Mirkovski, K., Briel, F. v., Lowry, P. B., & Liu, L. (2018, February 7–9). Helping others to enter new markets: How intermediaries enable resource-constrained firms to absorb knowledge. Paper presented at the Australian Centre for Entrepreneurship (ACE) Research Exchange Conference (ACERE 2018), Brisbane, Queensland, Australia.
Mummalaneni V, Gruss R, Goldberg D, Ehsani JP, & Abrahams AS. (2018). Text Analytics for Safety Hazard Detection in Baby Cribs. Safety Science, 104, April, 260-268.
Mummalaneni, V., Gruss, R., Goldberg, D. M., Ehsani, J. P., & Abrahams, A. S. (2018). Social media analytics for quality surveillance and safety hazard detection in baby cribs. Safety science, 104, 260-268.
Nasri, L., Baghersad, M., Gruss, R., Marucchi, N. S. W., Abrahams, A. S., & Ehsani, J. P. (2018). An investigation into online videos as a source of safety hazard reports. Journal of safety research, 65, 89-99.
Njenga, K., & Lowry, P. B. (2018, June 14–15). Information security policy violations: A grounded theory approach to counterfactual balance and tensions. Paper presented at the The Dewald Roode Workshop in Information Systems Security 2018, IFIP WG 8.11 / 11.13, Cape Town, South Africa.
Nottingham, Q. J., Johnson, D. M., & Russell, R. S. (2018). The effect of waiting time on patient perceptions of care quality. Quality Management Journal, 25(1), 32-45.
Nottingham, Q., Johnson, D. M., & Russell, R. (2018). A multi-year SEM model predicting the impact of behavior attributes on overall patient satisfaction. International Journal of Quality & Reliability Management, 35(9), 2006-2034.
Parks, R., Lowry, P. B., Wigand, R., Agarwal, N., & Williams, T. (2018). Why students engage in cyber-cheating through a collective movement: A case of deviance and collusion. Computers & Education, 125(October), 308–326. doi:https://doi.org/10.1016/j.compedu.2018.04.003
Rakes, T. R., Deane, J. K., Rees, L. P., Goldberg, D. M., & Chacko, J. (2018). A fuzzy decision support system for pre-disaster budgeting. International Journal of Information Systems and Management, 1(4), 312-327.
Ramesh, B., Cau, L., Kim, J., Mohan, K & James T. (2018). Consider culture when implementing agile practices. MIT Sloan Management Review. https://sloanreview.mit.edu/article/consider-culture-when-implementing-agile-practices/.
Treiblmaier, H., Putz, L.-M., & Lowry, P. B. (2018). Setting a definition, context, and research agenda for the gamification of non-gaming systems. Association for Information Systems Transactions on Human-Computer Interaction, 10(3), 129-163. doi:https://doi.org/10.17705/1thci.00107
Willison, R., & Lowry, P. B. (2018). Disentangling the motivations for organizational insider computer abuse through the rational choice and life course perspectives. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 49(SI), 81-102.
Willison, R., Lowry, P. B., & Paternoster, R. (2018). A Tale of two deterrents: Considering the role of absolute and restrictive deterrence to inspire new directions in behavioral and organizational security research. Journal of the Association for Information Systems (JAIS), 19(12), 1187-1216.
Wilson, K., & Khansa, L. (2018). Migrating to electronic health record systems: a comparative study between the United States and the United Kingdom. Health Policy, 122(11), 1232-1239.
Zhang, J., Jiang, Q., Lowry, P. B., & Li, Y. (2018, December 13). Gamified double-edged sword: Exploring the different social comparison motives of mobile fitness app users. Paper presented at the 2018 Pre-ICIS Workshop on HCI Research in MIS, International Conference on Information Systems (ICIS 2018), San Francisco, CA.
Zhang, J., Jiang, Q., Zhang, W., Kang, L., Zhang, X., & Lowry, P. B. (2018, December 12). How gamified fitness features influence the system usage: A field experimental approach. Paper presented at the The 3rd Pre-ICIS Workshop on the Digitization of the Individual (DOTI), International Conference on Information Systems (ICIS 2018), San Francisco, CA.
Zhang, M., Ren, C., Wang, G. A., & He, Z. (2018). The impact of channel integration on consumer responses in omni-channel retailing: the mediating effect of consumer empowerment. Electronic commerce research and applications, 28, 181-193.
Zhou, M. J., Lu, B., Fan, W., & Wang, G. A. (2018). Project description and crowdfunding success: an exploratory study. Information Systems Frontiers, 20(2).
Zhou, S., Qiao, Z., Du, Q., Wang, G. A., Fan, W., & Yan, X. (2018). Measuring customer agility from online reviews using big data text analytics. Journal of Management Information Systems, 35(2), 510-539.
Zobel, C. W., & Baghersad, M. (2018). Analytically comparing disaster resilience across multiple dimensions. Socio-Economic Planning Sciences. https://doi.org/10.1016/j.seps.2018.12.005
Arnette, A. N., & Zobel, C. W. (2019). A Risk-Based Approach to Improving Disaster Relief Asset Pre-Positioning. Production and Operations Management, 28(2), 457–478. https://doi.org/10.1111/poms.12934
Awaysheh, A., Wilcke, J., Elvinger, F., Rees, L., Fan, W., & Zimmerman, K. L. (2019). Review of medical decision support and machine-learning methods. Veterinary pathology, 56(4), 512-525.
Briel, F. v., Schneider, C., & Lowry, P. B. (2019). Absorbing knowledge from and with external partners: The role of social integration mechanisms. Decision Sciences Journal, 50(1), 7-45. doi:http://dx.doi.org/10.1111/deci.12314
Burns, A. J., Roberts, T., Posey, C., & Lowry, P. B. (2019). The adaptive roles of positive and negative emotions in organizational insiders’ engagement in security-based precaution taking. Information Systems Research (ISR), Forthcoming.
Chatterjee, S., Sarker, S., Moody, G. D., & Lowry, P. B. (2019, January 8–11). The effect of CIO virtues on CIO role effectiveness. Paper presented at the 52nd Annual Hawaii International Conference on System Sciences (HICSS 2019), Maui, HI.
D’Arcy, J., & Lowry, P. B. (2019). Cognitive-affective drivers of employees’ daily compliance with information security policies: A multilevel, longitudinal Study. Information Systems Journal, 29(1), 43-69. doi:https://doi.org/10.1111/isj.12173
Davis, Z., Zobel, C. W., Khansa, L., & Glick, R. E. (2019). Emergency department resilience to disaster-level overcrowding: A component resilience framework for analysis and predictive modeling. Journal of Operations Management. https://doi.org/10.1002/joom.1017
Deane, J., Goldberg, D., Rakes, T., & Rees, L. (2019), The effect of information security certification announcements on the market value of the firm, Information Technology & Management, published online
Dunn, B. K., Galletta, D. F., Ramasubbu, N., & Lowry, P. B. (2019). Digital borders, location recognition, and experience attribution within a digital geography. Journal of Management Information Systems, 36(2), 418-449. doi:https://doi.org/10.1080/07421222.2019.1598690
Ge, Y. “Gurt,” Zobel, C. W., Murray-Tuite, P., Nateghi, R., & Wang, H. (2019). Building an Interdisciplinary Team for Disaster Response Research: A Data-Driven Approach. Risk Analysis. https://doi.org/10.1111/risa.13280
Goldberg, D. M., Deane, J. K., Rakes, T. R., & Rees, L. P. (2019). Marketing investments in sport venue naming rights and the market value of the firm. International Journal of Sport Management and Marketing, 19(3-4), 233-252.
Goldberg, D., Deane, J., Rakes, T., & Rees, L. (2019), Marketing Investments in Sport Venue Naming Rights & the Market Value of the Firm, International Journal of Sport Management & Marketing, 19(3), published online
Gruss R, Abrahams AS, Kim E, Song Y, & Berry DK. Engaging restaurant customers on Facebook: The power of belongingness appeals on social media, Accepted at: Journal of Hospitality and Tourism Research (JHTR)
Gruss R, Abrahams AS, Song Y, Berry D, & Al-Daihani S. Academic libraries on social media: community- building as an effective user engagement strategy. (Accepted: February 2nd 2019): Journal of the Association for Information Science and Technology (JASIST).
Gruss, R., Abrahams, A., Song, Y., Berry, D., & Al‐Daihani, S. M. (2019). Community building as an effective user engagement strategy: A case study in academic libraries. Journal of the Association for Information Science and Technology.
Hassan, N. R., Mathiassen, L., & Lowry, P. B. (2019). The process of IS theorizing as a discursive practice. Journal of Information Technology (JIT), Forthcoming. doi:https://doi.org/10.1177/0268396219832004
Hassan, N., Mathieson, L., & Lowry, P. B. (2019a, June 12–14). Enhancing theoretical contribution in IS research: The case of technology adoption. Paper presented at the 27th European Conference on Information Systems (2019), Stockholm-Uppsala, Sweden.
Hong, H., Ye, Q., Du, Q., Wang, G. A., & Fan, W. (2019). Crowd characteristics and crowd wisdom: evidence from an online investment community. Journal of Association for Information Science and Technology, accepted for publication. Retrieved from https://doi.org/10.1002/asi.24255
Hull, D. M., Lowry, P. B., Gaskin, J. E., & Mirkovski, K. (2019). A storyteller's guide to problem‐based learning for information systems management education. Information Systems Journal, 29(5), 1040-1057.
James, T. L., Deane, J. K., & Wallace, L. (2019). An application of goal content theory to examine how desired exercise outcomes impact fitness technology feature set selection. Information Systems Journal, 29(5), 1010-1039.
James, T. L., Wallace, L., & Deane, J. K. (2019). Using organismic integration theory to explore the associations between users' exercise motivations and fitness technology feature set use. MIS Quarterly, 43(1), 287-312.
Lowry, P. B., Zhang, J., Moody, G. D., Chatterjee, S., Wang, C., & Wu, T. (2019). Proposing an integrative theory to address the sociotechnical nature of cyberharassment in light of technology-based opportunism. Journal of Management Information Systems, 2019(forthcoming).
Mena, C., Melnyk, S. A., Baghersad, M., & Zobel, C. W. (2019). Sourcing Decisions under Conditions of Risk and Resilience: A Behavioral Study. Decision Sciences, https://doi.org/10.1111/deci.12403
Mirkovski, K., Gaskin, J. E., Hull, D. M., & Lowry, P. B. (2019). Visual storytelling for improving the dissemination and consumption of information systems research: Evidence from a quasi-experiment. Information Systems Journal, 2019(forthcoming). doi:https://doi.org/10.1111/isj.12240
Murray-Tuite, P., Ge, Y., Zobel, C., Nateghi, R., & Wang, H. (2019). Critical Time, Space, and Decision‐Making Agent Considerations in Human‐Centered Interdisciplinary Hurricane‐Related Research. Risk Analysis. https://doi.org/10.1111/risa.13380
Olivero, N., Greco, A., Annoni, A. M., Steca, P., & Lowry, P. B. (2019). Does opportunity make the thief? Abilities and moral disengagement in illegal downloading. Behaviour & Information Technology, 2019(forthcoming). doi: https://doi.org/10.1080/0144929X.2019.1583768
Scheibe, K., Nilakanta, S., Ragsdale, C., & Younie, R. (2019) “An Evidence-based Management Framework for Business Analytics,” Journal of Business Analytics. (In press). https://doi.org/10.1080/2573234X.2019.1609341
Silic, M., & Lowry, P. B. (2019). Using design-science based gamification to improve organizational security training and compliance. Journal of Management Information Systems, 2019(forthcoming).
Sullivan, J., Dowds, J., Novak, D., Scott, D., & Ragsdale, C. (2019) “Development and Application of an Iterative Heuristic for Roadway Snow and Ice Control,” Transportation Research Part A: Policy and Practice. 127, 18-31. https://doi.org/10.1016/j.tra.2019.06.021
Von Briel, F., Schneider, C., & Lowry, P. B. (2019). Absorbing knowledge from and with external Partners: The role of social integration mechanisms. Decision Sciences, 50(1), 7-4.
Zhang, M., Qin, F., & G. A. Wang. (2019). The impact of live video streaming on online purchase intention. The Service Industries Journal, accepted for publication. Retrieved from https://doi.org/10.1080/02642069.2019.1576642
Zhang, S., Kwok, R. C.-W., Lowry, P. B., Liu, Z., & Wu, J. (2019a). Does more accessibility lead to more disclosure? Exploring the influence of information accessibility on self-disclosure in online social networks. Information Technology & People, 32(3), 754-780. doi:https://doi.org/10.1108/ITP-04-2017-0134
Zhang, S., Kwok, R. C.-W., Lowry, P. B., Liu, Z., & Wu, J. (2019b). The influence of role stress on self-disclosure on social networking sites: A conservation of resources perspective. Information & Management, 2019(forthcoming). doi:https://doi.org/10.1016/j.im.2019.02.002
Gruss R, Abrahams A, Song Y, Berry D, Al-Daihani SM (2020). Community building as an effective user engagement strategy: A case study in academic libraries. Journal Of the Association for Information Science and Technology, 71(2). https://doi.org/10.1002/asi.24218
Hong H, Ye Q, Du Q, Wang GA, Fan W (2020). Crowd characteristics and crowd wisdom: Evidence from an online investment community. Journal Of the Association for Information Science and Technology, 71(4). https://doi.org/10.1002/asi.24255
Silic M, Lowry PB (2020). Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance. Journal of Management Information Systems, 37(1). https://doi.org/10.1080/07421222.2019.1705512
Wu D, Moody GD, Zhang J, Lowry PB (2020). Effects of the design of mobile security notifications and mobile app usability on users' security perceptions and continued use intention. Information & Management, 57(5). https://doi.org/10.1016/j.im.2019.103235
Chatterjee C, Moody GD, Chakraborty S, Hardin A, Lowry P (2020). Actualizing information technology affordance for organizational innovation: The role of organizational courage. Journal of Strategic Information Systems, 29(1). https://doi.org/10.1016/j.jsis.2020.101596
Belanger F, James TL (2020). A Theory of Multilevel Information Privacy Management for the Digital Era. Information Systems Research, 31(2). https://doi.org/10.1287/isre.2019.0900
Liu X, Wang A, Fan W, Zhang Z (2020). Finding Useful Solutions in Online Knowledge Communities: A Theory-Driven Design and Multi-level Analysis. Information Systems Research, 31(3). https://doi.org/10.1287/isre.2019.0911
Seeber I, Waizenegger L, Seidel S, Morana S, Benbasat I, Lowry PB (2020). Collaborating with technology-based autonomous agents Issues and research opportunities. Internet Research, 30(1). https://doi.org/10.1108/INTR-12-2019-0503
Shin B, Lowry PB (2020). A review and theoretical explanation of the 'Cyberthreat-Intelligence (CTI) capability' that needs to be fostered in information security practitioners and how this can be accomplished. Computers & Security, 92. https://doi.org/10.1016/j.cose.2020.101761
Chatterjee S, Moody G, Lowry PB, Chakraborty S, Hardin A (2020). Information Technology and organizational innovation: Harmonious information technology affordance and courage-based actualization. Journal Of Strategic Information Systems, 29(1) .https://doi.org/10.1016/j.jsis.2020.101596
Li Y, Zobel CW (2020). Exploring supply chain network resilience in the presence of the ripple effect. International Journal of Production Economics, 228. https://doi.org/10.1016/j.ijpe.2020.107693
O'Connor N, Lowry PB, Treiblmaier H (2020). Interorganizational cooperation and supplier performance in high-technology supply chains. Heliyon, 6(3). https://doi.org/10.1016/j.heliyon.2020.e03434
Karakoc DB, Barker K, Zobel CW, Almoghathawi Y (2020). Social vulnerability and equity perspectives on interdependent infrastructure network component importance. Sustainable Cities and Society, 57. https://doi.org/10.1016/j.scs.2020.102072
Treiblmaier H, Mirkovski K, Lowry PB, Zacharia ZG (2020). The physical internet as a new supply chain paradigm: a systematic literature review and a comprehensive framework. International Journal of Logistics Management, 31(2). https://doi.org/10.1108/IJLM-11-2018-0284
Liu J, Bharadwaj A (2020). Drug abuse and the internet: Evidence from Craigslist. Management Science, 66(5), 1783-2290. https://doi.org/10.1287/mnsc.2019.3479
Zheng B, Bi G, Liu H, Lowry PB (2020). Corporate crisis management on social media: A morality violations perspective. Heliyon, 6(7). https://doi.org/10.1016/j.heliyon.2020.e04435
Schuetz S, Lowry PB, Pienta D, Thatcher J (2020). The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security. Journal of Management Information Systems. 37(3), 723-757. https://doi.org/10.1080/07421222.2020.1790187
van der Schyff K, Flowerday S, Lowry PB (2020). Information privacy behavior in the use of Facebook apps: A personality-based vulnerability assessment. Heliyon, 6(8). https://doi.org/10.1016/j.heliyon.2020.e04714
Cui X, Lai VS, Lowry PB, Lei Y (2020). The effects of bidder factors on online bidding strategies: A motivation-opportunity-ability (MOA) model. Decision Support Systems, 138. https://doi.org/10.1016/j.dss.2020.113397
Lowry PB, Petter S, Leimeister JM (2020). Desperately seeking the artefacts and the foundations of native theory in gamification research: why information systems researchers can play a legitimate role in this discourse and how they can better contribute. European Journal of Information Systems, 29(6). https://doi.org/10.1080/0960085X.2020.1841574
D'Arcy J, Adjerid I, Angst CM, Glavas A (2020). Too Good to Be True: Firm Social Performance and the Risk of Data Breach. Information Systems Research, 31(4). https://doi.org/10.1287/isre.2020.0939
Wu D, Zhang J, Lowry PB, Moody GD (2020). 'Human' in Information Security: Using the Inoculation Defense to Confer Resistance Against Phishing Attacks. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3757150
Baker W, Jacobs J, Romanosky S, Adjerid I (9/14). Improving vulnerability remediation through better exploit prediction. Journal of Cybersecurity 6(1) https://doi.org/nan
Sithipolvanichgul J, Abrahams AS, Goldberg DM, Zaman N, Baghersad M, Nasri L, Ractham P (2020). Safeguarding Korean Export Trade through Social Media-Driven Risk Identification and Characterization. Journal of Korea Trade, 24(8). https://doi.org/10.35611/jkt.2020.24.8.39
Baiyere A, Topi H, Venkatesh V, Wyatt J, Donnellan B (2020). The internet of things (IoT): A research agenda for information systems. Communications of the Association for Information Systems, 47(1). https://doi.org/10.17705/1CAIS.04725
Venkatesh V, Sykes TA, Zhang X (6/1/). ICT For Development In Rural India: A Longitudinal Study Of Women's Health Outcomes. MIS Quarterly, 44(2). https://doi.org/10.25300/MISQ/2020/12342
Zhang J, Wu D, Lowry PB, Moody GD (2020). Remind Me Later’ in Mobile Security Notifications: What Factors Lead to Users’ Deferred Security Coping Behavior? SIGHCI 2020 Proceedings. 6. https://aisel.aisnet.org/sighci2020/6
Venkatesh V, Thong JYL, Chan FKY, Hoehle H, Spohrer K (2020). How agile software development methods reduce work exhaustion: Insights on role perceptions and organizational skills. Information Systems Journal, 30(4). https://doi.org/10.1111/isj.12282
Schuetz S, Venkatesh V (2020). Blockchain, adoption, and financial inclusion in India: Research opportunities. International Journal of Information Management 52. https://doi.org/10.1016/j.ijinfomgt.2019.04.009
Sarkar S, Vance A, Ramesh B, Demestihas M, Wu DT (2020). The influence of professional subculture on information security policy violations: A field study in a healthcare context. Information Systems Research, 31(4). https://doi.org/10.1287/isre.2020.0941
Venkatesh V (2020). Impacts of COVID-19: A research agenda to support people in their fight. International Journal of Information Management, 55. https://doi.org/10.1016/j.ijinfomgt.2020.102197
Schuetz S, Venkatesh V (2020). The Rise of Human Machines: How Cognitive Computing Systems Challenge Assumptions of User-System Interaction. Journal Of the Association for Information Systems, 21(2). https://doi.org/10.17705/1jais.00608
Wu H, Zhang H, Wang Y, Rountev A (2020). Sentinel: generating GUI tests for sensor leaks in Android and Android wear apps. Software Quality Journal, 28(1). https://doi.org/10.1007/s11219-019-09484-z
Refereed Journal Articles
Murray-Tuite P, Zobel CW, Wang H, Ge YG, Nateghi R (2021). Critical Time, Space, and Agent Considerations for Data and Modeling in Interdisciplinary Hazards and Disasters Research. Risk Analysis, 41(7), 1218-1226. https://doi.org/nan
Goldberg DM, Deane JK, Rakes TR, Rees LP (2021). 3D Printing Technology and the Market Value of the Firm. Information Systems Frontiers, 24, 1379-1392. https://doi.org/10.1007/s10796-021-10143-7
Treiblmaier H, Putz L-M, Lowry PB (2018). Setting a Definition, Context, and Theory-Based Research Agenda for the Gamification of Non-Gaming Applications. Association for Information Systems Transactions on Human-Computer Interaction, 10(3), 129-163. https://ssrn.com/abstract=3202034.
Silic M, Lowry PB (2021). Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes. INFORMATION SYSTEMS FRONTIERS, 23(2). https://doi.org/10.1007/s10796-019-09949-3
James T, Ziegelmayer J, Schuler Scott A, Fox G (2021). A Multiple-Motive Heuristic-Systematic Model for Examining How Users Process Android Data and Service Access Notifications. The Data Base for Advances in Information Systems, 52(1), 91-122. https://doi.org/10.1145/3447934.3447941
Zaman N, Essig R, Goldberg D, Abrahams A (2021). Facebook hospital reviews: Automated service quality detection and relationships with patient satisfaction. Decision Sciences, 52(6), 1403-1431. https://doi.org/10.1111/deci.12479
Baghersad M, Zobel CW (2021). Assessing the extended impacts of supply chain disruptions on firms: An empirical study. INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 231. https://doi.org/10.1016/j.ijpe.2020.107862
Zobel CW, MacKenzie CA, Baghersad M, Li Y (2021). Establishing a frame of reference for measuring disaster resilience. DECISION SUPPORT SYSTEMS, 140. https://doi.org/10.1016/j.dss.2020.113406
Chatterjee S, Moody G, Lowry PB, Chakraborty S, Hardin A (2021). The nonlinear influence of harmonious information technology affordance on organisational innovation. Information Systems Journal, 31(2), 294-322. https://doi.org/10.1111/isj.12311
James T, Shen W, Townsend D, Junkunc M, Wallace L (2021). Love Can’t Buy You Money: Resource Exchange on Reward-Based Crowdfunding Platforms. Information Systems Journal, 31(4), 579-609. https://doi.org/10.1111/isj.12321
Venkatesh V, Ann Sykes T, Aljafari R, Poole MS (2021). The future is now: calling for a focus on temporal issues in information system research. Industrial Management & Data Systems, 121(1). https://doi.org/10.1108/IMDS-08-2020-0506
Malmir B, Zobel CW (2021). An applied approach to multi-criteria humanitarian supply chain planning for pandemic response. Journal Of Humanitarian Logistics and Supply Chain Management, 11(2). https://doi.org/10.1108/JHLSCM-08-2020-0064
Hoehle H, Wei J, Schuetz S, Venkatesh V (2021). User compensation as a data breach recovery action: a methodological replication and investigation of generalizability based on the Home Depot breach. Internet Research, 31(3). https://doi.org/10.1108/INTR-02-2020-0105
Kuruzovich J, Paczkowski WP, Golden TD, Goodarzi S, Venkatesh V (2021). Telecommuting and job outcomes: A moderated mediation model of system use, software quality, and social Exchange. Information & Management, 58(3). https://doi.org/10.1016/j.im.2021.103431
Ashraf AR, Tek NT, Anwar A, Lapa L, Venkatesh V (2021). Perceived values and motivations influencing m-commerce use: A nine-country comparative study. International Journal Of Information Management, 59. https://doi.org/10.1016/j.ijinfomgt.2021.102318
Chen Y, Aljafari R, Xiao B, Venkatesh V (2021). Empowering physicians with health information technology: An empirical investigation in Chinese hospitals. Journal Of The American Medical Informatics Association, 28(5). https://doi.org/10.1093/jamia/ocab034
Venkatesh V, Hoehle H, Aloysius JA, Nikkhah HR (2021). Being at the cutting edge of online shopping: Role of recommendations and discounts on privacy perceptions. Computers In Human Behavior, 121. https://doi.org/10.1016/j.chb.2021.106785
Kazemian I, Torabi SA, Zobel CW, Li Y, Baghersad M (2021). A multi-attribute supply chain network resilience assessment framework based on SNA-inspired indicators. Operational Research, 22(3). https://doi.org/10.1007/s12351-021-00644-3
Chen Y, Galletta DF, Lowry PB, Luo XR, Moody GD, Willison R (2021). Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model. Information Systems Research, 32(3), 675-1097. https://doi.org/10.1287/isre.2021.1014
Venkatesh V, Ganster DC, Schuetz SW, Sykes TA (2021). Risks and Rewards of Conscientiousness During the COVID-19 Pandemic. Journal Of Applied Psychology, 106(5), 643-656. https://doi.org/10.1037/apl0000919
Du Q, Li J, Du Y, Wang GA, Fan W (). Predicting crowdfunding project success based on backers' language preferences. Journal of the Association for Information Science and Technology, 72(12), 1558-1574. https://doi.org/10.1002/asi.24530
Schuetz SW, Sykes TA, Venkatesh V (2021). Combating COVID-19 fake news on social media through fact checking: antecedents and consequences. European Journal of Information Systems, 30(4). https://doi.org/10.1080/0960085X.2021.1895682
Perez MA, Sears E, Valente JT, Huang W, Sudweeks J (2021). Factors modifying the likelihood of speeding behaviors based on naturalistic driving data. Accident Analysis And Prevention, 159. https://doi.org/10.1016/j.aap.2021.106267
Bala H, Venkatesh V, Ganster DC, Rai A (2021). How does an enterprise system implementation change interpersonal relationships in organizations. Industrial Management & Data Systems, 121(8). https://doi.org/10.1108/IMDS-06-2020-0380
Dunn B, Ramasubbu N, Jensen M, Galletta D, Lowry PB (2021). The Efficiency–Exposure Paradox: Reconciling the Conflicting Effects of Measured Website Browsing Behaviors for Non-Transactional Outcomes. Association for Information Systems Transactions on Human-Computer Interaction, 13(2), 206-242. https://dx.doi.org/10.2139/ssrn.3808834
Kazemian I, Torabi SA, Zobel CW, Li Y, Baghersad M (2021). A multi-attribute supply chain network resilience assessment framework based on SNA-inspired indicators. Operational Research, 22(3), 1853-1883. https://doi.org/10.1007/s12351-021-00659-w
Ali SEA, Lai F-W, Dominic PDD, Brown NJ, Lowry PBB, Ali RF (2021). Stock market reactions to favorable and unfavorable information security events: A systematic literature review. Computers & Security, 110. https://doi.org/10.1016/j.cose.2021.102451
Kaekitipong L, Ractham P, Abrahams A, Gruss R, Kim E, Davis Z (2021). A Comparative Evaluation of Airline Service Quality Using Online Content Analysis: A Case Study of Korean vs. International Airlines. Asia Pacific Journal of Information Systems, 31(4), 491-526. https://doi.org/10.14329/apjis.2021.31.4.491
Chan FKY, Thong JYL, Brown SA, Venkatesh V (2021). Service Design and Citizen Satisfaction with E-Government Services: A Multidimensional Perspective. Public Administration Review, 81(5), 874-894. https://doi.org/10.1111/puar.13308
Maruping L, Rai A, Aljafari R, Venkatesh V (2021). Overcoming cross-organizational barriers to success in offshore projects. Industrial Management & Data Systems, 121(12), 2365-2386. https://doi.org/10.1108/IMDS-09-2020-0559
Cao M, Wang GA, Kiang MY (2021). Modeling and prediction of human negotiation behavior in human-computer negotiation. ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 50. https://doi.org/10.1016/j.elerap.2021.101099
Abbasi A, Dobolyi D, Vance A, Zahedi FM (2021). The phishing funnel model: a design artifact to predict user susceptibility to phishing websites. Information Systems Research, 32(2), 301-674. https://doi.org/10.1287/ISRE.2020.0973
Wang H, Du R, Shen W, Qiu L, Fan W (2021). Product Reviews: A Benefit, A Burden, or A Trifle? How Seller Reputation Affects the Role of Product Reviews. MIS Quarterly, 46(2). https://doi.org/nan
Baghersad M, Zobel CW, Chatterjee S, Lowry PB (2021). The Roles of Prior Experience and the Location on the Severity of Supply Chain Disruptions. SSRN Electronic Journal, 60(16), 5051-5070. https://doi.org/10.2139/ssrn.3884386
Dunn BK, Ramasubbu N, Galletta DF, Jensen ML, Lowry PB (2021). Efficiency and Exposure: Reconciling the Effects of Website Browsing Behaviors for Non-transactional Outcomes. AIS Transactions on Human-Computer Interaction, 13(2). https://doi.org/10.17705/1thci.00148
Dunn B, Ramasubbu N, Jensen M, Galletta D, Lowry PB (2021). The Efficiency–Exposure Paradox: Reconciling the Conflicting Effects of Measured Website Browsing Behaviors for Non-Transactional Outcomes. SSRN Electronic Journal, 13(2), 206-242. https://doi.org/10.2139/ssrn.3808834
Buttgen M, Dicenta J, Spohrer K, Venkatesh V, Raman R, Hoehle H, Janssen M, De Keyser A, Verbeeck C, Zwienenberg T (2021). Blockchain in Service Management and Service Research – Developing a Research Agenda and Managerial Implications. Journal of Service Management Research, 5(2), 71-102. DOI: 10.15358/2511-8676-2021-2-71
Jacobs J, Romanosky S, Edwards B, Adjerid I, Roytman M (2021). Exploit Prediction Scoring System (EPSS). Digital Threats: Research and Practice, 2(3), 1-17. https://doi.org/10.1145/3436242
Lyu Q, Zhang D, Da R, Zhang H (2021). ReFuzz: A Remedy for Saturation in Coverage-Guided Fuzzing. Electronics, 10(16). https://doi.org/10.3390/electronics10161921
Fundora M, Liu J, Calamaro C, Mahle W, Diwas K (2021). The Association of Workload and Outcomes in the Pediatric Cardiac ICU*. Pediatric Critical Care Medicine, 22(8), 683-691. https://doi.org/ 10.1097/PCC.0000000000002740
Huang C, Chen L, Tadikamalla PR, Gordon MM (2021). Valuation and investment strategies of carbon capture and storage technology under uncertainties in technology, policy and market. Journal Of The Operational Research Society, 72(2), 292-303. https://doi.org/10.1080/01605682.2019.1678402
Jang AJ, Shore J (2021). Man-Bites-Dog Contagion: Disproportionate Diffusion of Information about Rare Categories of Events. SSRN Electronic Journal, nan(nan). https://doi.org/10.2139/ssrn.3774989
Wang H, Li Y, Gao C, Wang G, Tao X, Jin D (2021). Anonymization and De-Anonymization of Mobility Trajectories: Dissecting the Gaps Between Theory and Practice. IEEE TRANSACTIONS ON MOBILE COMPUTING, 20(3), 796-815. https://doi.org/10.1109/TMC.2019.2952774
Goldberg DM, Deane JK, Rakes TR, Rees LP (2022) “3D Printing Technology and the Market Value of the Firm,” Information Systems Frontiers: a journal of research and innovation, Vol. 24, pp. 1379-1392.
Rakes TR, Deane JK, Rees LP, Goldberg DM (2022) “Disaster Risk Planning with Fuzzy Goal Programming,” Risk Analysis: an international journal, Vol. 42, No. 9, pp. 2026-2040.
Greenwood B, Adjerid I, Angst CM, Meikle NL (2022) “How Unbecoming of You: Online Experiments Uncovering Gender Biases in Perceptions of Ridesharing Performance,” JOURNAL OF BUSINESS ETHICS, Vol. 175, No. 3, pp. 499-518, https://doi.org/10.1007/s10551-020-04675-2.
Venkatesh V (2022) “Adoption and use of AI tools: a research agenda grounded in UTAUT,” ANNALS OF OPERATIONS RESEARCH, Vol. 308, pp. 641-652, https://doi.org/10.1007/s10479-020-03918-9.
Huang CD, Baghersad M, Behara RS, Zobel CW (2022) “Optimal Investment in Prevention and Recovery for Mitigating Epidemic Risks,” RISK ANALYSIS, Vol. 42, No. 1, pp. 206-220, https://doi.org/10.1111/risa.13707.
Zaman N, Goldberg DM, Gruss RJ, Abrahams AS, Srisawas S, Ractham P, Seref MMH (2022) “Cross-Category Defect Discovery from Online Reviews: Supplementing Sentiment with Category-Specific Semantics,” INFORMATION SYSTEMS FRONTIERS, Vol. 24, No. 4, pp. 1265-1285, https://doi.org/10.1007/s10796-021-10122-y.
Baghersad M, Zobel CW (2022) “Organizational Resilience to Disruption Risks: Developing Metrics and Testing Effectiveness of Operational Strategies,” RISK ANALYSIS, Vol. 42, No. 3, pp. 561-579, https://doi.org/10.1111/risa.13769.
James TL, Zhang J, Li H, Ziegelmayer JL, Villacis-Calderon ED (2022) “The moderating effect of technology overload on the ability of online learning to meet students' basic psychological needs,” INFORMATION TECHNOLOGY & PEOPLE, Vol. 35, No. 4, pp. 1364-1382, https://doi.org/10.1108/ITP-03-2021-0225.
Hassan NR, Lowry PB, Mathiassen L (2022) “Useful Products in Information Systems Theorizing: A Discursive Formation Perspective,” JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, Vol. 23, No. 2, pp. 418-446, https://doi.org/10.17705/1jais.00730.
Vance A, Eargle D, Eggett D, Straub D, Ouimet K (2022) “Do Security Fear Appeals Work When They Interrupt Tasks? A Multi-Method Examination of Password Strength,” MIS Quarterly,, Vol. 46, No. 3.
Siponen M, Soliman W, Vance A (2022) “Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions,” DATA BASE for Advances in Information Systems, Vol. 53, No. 1, pp. 25-60.
James TL, Belanger F, Lowry PB (2022) “The Mediating Role of Fitness Technology Enablement of Psychological Need Satisfaction and Frustration on the Relationship between Goals for Fitness Technology Use and Use Outcomes,” Journal of the Association for Information Systems.
Venkatesh V, Davis FD, Zhu Y (2022) “A cultural contingency model of knowledge sharing and job performance,” Journal of Business Research, Vol. 140, pp. 202-219, https://doi.org/10.1016/j.jbusres.2021.07.042.
Haag S, Eckhardt A, Venkatesh V (2022) “Deviant Affordances: When Tensions, Deadlocks and Noncompliance Generate Performance,” MIS Quarterly, Vol. 46, No. 4, pp. 2111-2162, https://doi.org/10.25300/misq/2022/1434.
Venkatesh V, Speier-Pero C, Schuetz SW (2022) “Why Do People Shop Online? A Comprehensive Framework of Consumers' Online Shopping Intentions and Behaviors,” Information Technology & People, Vol. 35, No. 5, pp. 1590-1620, https://doi.org/10.1108/itp-12-2020-0867.
Vaithilingam S, Nair M, Macharia M, Venkatesh V (2022) “Mobile Communication and Use Behavior of the Urban Poor in a Developing Country: A Field Study in Malaysia,” International Journal of Information Management, Vol. 63.
Raman R, Aljafari R, Venkatesh V, Richardson V (2022) “Mixed-Methods Research in the Age of Analytics, An Exemplar Leveraging Sentiments from News Articles to Predict Firm Performance,” International Journal of Information Management, Vol. 64, https://doi.org/10.1016/j.ijinfomgt.2021.102451.
Raman R, Aljafari R, Venkatesh V, Richardson V (2022) “Mixed Methods Research in the Age of Analytics: An Exemplar Leveraging Sentiments from News Articles to Explain Firm Performance,” International Journal of Information Management, Vol. 64.
Blut M, Chong AYL, Tsigna Z, Venkatesh V (2022) “Meta-Analysis of the Unified Theory of Acceptance and Use of Technology (UTAUT): Challenging its Validity and Charting a Research Agenda in the Red Ocean,” JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, Vol. 23, No. 1, pp. 13-95, https://doi.org/10.17705/1jais.00719.
Cui X, Zhou Q, Lowry PB, Wang Y (2022) “Do Enterprise Systems Necessarily Lead to Innovation? Identifying the Missing Links with A Moderated Mediation Model,” PACIFIC ASIA JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, Vol. 14, No. 1, pp. 74-104, https://doi.org/10.17705/1pais.14105.
Cui XC, Zhou Q, Lowry P, Wang Y (2022) “Do enterprise systems necessarily lead to innovation? Identifying the missing links with a moderated mediation model,” Pacific Asia Journal of the Association for Information Systems, Vol. 14, No. 1, pp. 74-104, https://doi.org/10.17705/1pais.14105.
Restrepo F, Mali N, Sands LP, Abrahams A, Goldberg DM, White J, Prieto L, Ractham P, Gruss R, Zaman N, Ehsani JP (2022) “Injury prevention for older adults: A dataset of safety concern narratives from online reviews of mobility-related products,” DATA IN BRIEF, Vol. 42, https://doi.org/10.1016/j.dib.2022.108044.
Goldberg DM, Gruss RJ, Abrahams AS (2022) “Fumeus: A family of Python tools for text mining with smoke terms,” SOFTWARE IMPACTS, Vol. 12, https://doi.org/10.1016/j.simpa.2022.100270.
Venkatesh V, Goyal S (2022) “Impact of an Enterprise System Implementation on Job Outcomes: Challenging the Linearity Assumption,” JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, Vol. 39, No. 1, pp. 6-40, https://doi.org/10.1080/07421222.2021.2023405.
Hoehle H, Venkatesh V, Brown SA, Tepper BJ, Kude T (2022) “IMPACT OF CUSTOMER COMPENSATION STRATEGIES ON OUTCOMES AND THE MEDIATING ROLE OF JUSTICE PERCEPTIONS: A LONGITUDINAL STUDY OF TARGET'S DATA BREACH br,” MIS QUARTERLY, Vol. 46, No. 1, pp. 299-340, https://doi.org/10.25300/MISQ/2022/14740.
Hu S, Xu D, Wang A (2022) “Idea response and adoption in open innovation communities: the signalling role of linguistic style,” International Journal of Networking and Virtual Organisations, Vol. 26, No. 3, pp. 212-230, https://doi.org/10.1504/IJNVO.2022.122856.
de Matos MG, Adjerid I (2022) “Consumer Consent and Firm Targeting After GDPR: The Case of a Large Telecom Provider,” MANAGEMENT SCIENCE, Vol. 68, No. 5, pp. 3330-3378, https://doi.org/10.1287/mnsc.2021.4054.
Restrepo F, Mali N, Abrahams A, Ractham P (2022) “Formal definition of the MARS method for quantifying the unique target class discoveries of selected machine classifiers.,” F1000Research, Vol. 11, https://doi.org/10.12688/f1000research.110567.2.
Zhang M, Wang L, Li Y, Wang GA (2022) “C2C interaction in the online review system: Effect of other customers’ responses on subsequent review volume,” Tourism Management, Vol. 93, https://doi.org/10.1016/j.tourman.2022.104622.
Goyal S, Venkatesh V, Shi X (2022) “Role of users? status quo on continuance intentions,” INFORMATION & MANAGEMENT, Vol. 59, No. 8, https://doi.org/10.1016/j.im.2022.103686.
Baker C, Nottingham Q, Holloway J (2022) “Lessons in Linkage: combining administrative data using deterministic linkage for surveillance of sports and recreation injuries in Florida, United States,” International Journal of Population Data Science, Vol. 7, No. 1, https://doi.org/10.23889/IJPDS.V7I1.1749.
Venkatesh V, Speier-Pero C, Aljafari R, Bala H (2022) “IT Use and Job Outcomes: A Longitudinal Field Study of Technology Contingencies,” Journal of the Association of Information Systems, Vol. 23, No. 5, pp. 1184-1210, https://doi.org/10.17705/1jais.00760.
Zhang M, Sun L, Wang GA, Li Y, He S (2022) “Using neutral sentiment reviews to improve customer requirement identification and product design strategies,” INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, Vol. 254, https://doi.org/10.1016/j.ijpe.2022.108641.
Bernstein ES, Shore JC, Jang AJ (2022) “Network Centralization and Collective Adaptability to a Shifting Environment,” Organization Science, https://doi.org/10.1287/orsc.2022.1584.
Budowle B, Arnette A, Ge J, Sajantila A (2022) “A Monte Carlo simulation and sensitivity cost benefit analysis for use of nylon 4N6FLOQSwabs®,” FORENSIC SCIENCE INTERNATIONAL GENETICS SUPPLEMENT SERIES, Vol. 8, pp. 56-58, https://doi.org/10.1016/j.fsigss.2022.09.021.
Wu D, Lowry P, Zhang D, Tao Y (2022) “Patient trust in physicians matters: The role of mobile patient education system and patient-physician communication in improving patient adherence behavior,” Journal of Medical Internet Research, Vol. 24, No. 14, https://doi.org/10.2196/42941.
Sykes T, Aljafari R (2022) “We Are All in This Together, or Are We? Job Strain and Coping in the Context of an E-Healthcare System Implementation,” Journal of Management Information Systems, Vol. 39, No. 4, pp. 1215-1247.
Zhang D, Peng Y, Zhang Y, Wu D, Wang H, Zhang H (2022) “Train Time Delay Prediction for High-Speed Train Dispatching Based on Spatio-Temporal Graph Convolutional Network,” IEEE Transactions on Intelligent Transportation Systems, Vol. 23, No. 3, pp. 2434-2444, https://doi.org/10.1109/tits.2021.3097064.
Zhang D, Peng Y, Xu Y, Du C, Zhang Y, Wang N, Chong Y, Wang H, Wu D, Liu J, Zhang H, Lu L, Liu J (2022) “A high-speed railway network dataset from train operation records and weather data.,” Scientific data, Vol. 9, No. 1, pp. 244-244, https://doi.org/10.1038/s41597-022-01349-8.
Srinivas S, Ling H (2022) “Being digital to being vulnerable: does digital transformation allure a data breach?,” Journal of Electronic Business & Digital Economics, Vol. 1, No. 1/2, pp. 111-137.
Baker C, Nottingham Q, Holloway J (2022) “Lessons in Linkage: combining administrative data using deterministic linkage for surveillance of sports and recreation injuries in Florida, United States,” INTERNATIONAL JOURNAL OF POPULATION DATA SCIENCE (IJPDS), Vol. 7, No. 1, https://doi.org/10.23889/ijpds.v6i1.1749.
Wang L, Lowry P, Luo XR, Li H (2023) “Moving consumers from ‘free’ to ‘fee’: Addressing the vexing differentiation and fairness issues in the platform-based market of multiplayer online battle arena (MOBA) Games”, Information Systems Research, Vol. 34, No. 1, pp. 275-296.
Burns AJ, Roberts TL, Posey C, Lowry P, Fuller B (2023) “Going beyond deterrence: A middle-range theory of motives and controls for insider computer abuse”, Information Systems Research, Vol. 34, No. 1, pp. 342-362. https://doi.org/10.1287/isre.2022.1133
Kirwan CB, Vance A, Jenkins JL, Anderson BB (2023) “Embracing brain and behaviour: Designing programs of complementary neurophysiological and behavioural studies”, INFORMATION SYSTEMS JOURNAL, Vol. 33, No. 2, pp. 324-349. https://doi.org/10.1111/isj.12402
Rai A, Keil M, Choi H, Mindel V (2023) “Understanding how physician perceptions of job demand and process benefits evolve during CPOE implementation”, Health Systems, Vol. 12, No. 1, pp. 98-122. https://doi.org/10.1080/20476965.2022.2113343
Kapucu N, Okhai R, Ge Y, Zobel C (2023) “The use of documentary data for network analysis in emergency and crisis management”, Natural Hazards, Vol. 116, No. 1, pp. 425-445. https://doi.org/10.1007/s11069-022-05681-5
Alikhani R, Ranjbar A, Jamali A, Torabi SA, Zobel CW (2023) “Towards Increasing Synergistic Effects of Resilience Strategies in Supply Chain Network Design”, Omega, pp. 102819-102819. https://doi.org/10.1016/j.omega.2022.102819
Stephens K, Hughes AL, Tasuji T, Harris AG, Xu Y, Purohit H, Zobel C (2023) “Human-AI Teaming During an Ongoing Disaster: How Scripts Around Teaching and Feedback Reveal the Form of Human-Machine Communication”, Human-Machine Communication, Vol. 6, No. 1, pp. 65-85. https://doi.org/10.30658/hmc.6.5
Perez MAA, Sudweeks JDD, Sears E, Valente J, Guo F (2023) “Differences in frequency of occurrence, event characteristics, and pre-impact vehicle kinematics between crashes, near-crashes, and single vehicle conflicts in a large-scale naturalistic driving study”, TRAFFIC INJURY PREVENTION, Vol. 24, No. 1, pp. 32-37. https://doi.org/10.1080/15389588.2022.2155785
Davison RM, Lowry P (2023) ““ISJ editorial: Addressing the implications of recent developments in journal impact factors”, Information Systems Journal, Vol. 33, No. 3, pp. 419-436. https://doi.org/10.1111/isj.12426
Venkatesh V, Cheung CMK, Davis FD, Lee ZWY (2023) “Cyberslacking in the Workplace: Antecedents and Effects on Job Performance”, MIS Quarterly, Vol. 47, No. 1. https://doi.org/10.25300/misq/2022/14985
Windeler J, Maruping LM, Venkatesh V, Weng Q (2023) “Bridge the Gap or Mind the Gap? The Role of Leaders and Technology in Configurationally Dispersed Teams”, Information and Management.
Dike S, Davis Z, Abrahams A, Anjomshoae A, Ractham P (2023) “Evaluation of Passengers Expectation and Satisfaction in the Airline Industry: An Empirical Performance Analysis of Online Reviews”, Benchmarking: An International Journal, Vol. 31, No. 2, pp. 611-639.
Buckman JR, Adjerid I, Tucker C (2023) “Privacy Regulation and Barriers to Public Health”, Management Science, Vol. 69, No. 1, pp. 342-350. https://doi.org/10.1287/mnsc.2022.4580
Mali N, Restrepo F, Abrahams A, Sands L, Goldberg DM, Gruss R, Zaman N, Shields W, Omaki E, Ehsani J, Ractham P, Kaewkitipong L (2023) “Safety Concerns in Mobility-Assistive Products for Older Adults: Content Analysis of Online Reviews”, Journal of Medical Internet Research, Vol. 25. https://doi.org/10.2196/42231
Jesus FC, Figueira-Alves H, Tam C, Pinto DC, Oliveira T, Venkatesh V (2023) “Pragmatic and idealistic reasons: What drives electric vehicle drivers' satisfaction and continuance intention?”, Transportation Research Part A-Policy and Practice, Vol. 170. https://doi.org/10.1016/j.tra.2023.103626
Dwivedi YK, Kshetri N, Hughes L, Slade EL, Jeyaraj A, Kar AK, Baabdullah AM, Koohang A, Raghavan V, Ahuja M, Albanna H, Albashrawi MA, Al-Busaidi AS, Balakrishnan J, Barlette Y, Basu S, Bose I, Brooks L, Buhalis D, Carter L, Chowdhury S, Crick T, Cunningham SW, Davies GH, Davison RM, De R, Dennehy D, Duan Y, Dubey R, Dwivedi R, Edwards JS, Flavian C, Gauld R, Grover V, Hu M-C, Janssen M, Jones P, Junglas I, Khorana S, Kraus S, Larsen KR, Latreille P, Laumer S, Malik FT, Mardani A, Mariani M, Mithas S, Mogaji E, Nord JH, O'Connor S, Okumus F, Pagani M, Pandey N, Papagiannidis S, Pappas IO, Pathak N, Pries-Heje J, Raman R, Rana NP, Rehm S-V, Ribeiro-Navarrete S, Richter A, Rowe F, Sarker S, Stahl BC, Tiwari MK, van der Aalst W, Venkatesh V, Viglia G, Wade M, Walton P, Wirtz J, Wright R (2023) “"So what if ChatGPT wrote it?" Multidisciplinary perspectives on opportunities, challenges and implications of generative conversational AI for research, practice and policy”, International Journal of Information Management, Vol. 71. https://doi.org/10.1016/j.ijinfomgt.2023.102642
Mikhaeil CA, James TL (2023) “Examining the case of French hesitancy toward IDaaS solutions: Technical and social contextual factors of the organizational IDaaS privacy calculus”, Information & Management, Vol. 60, No. 4. https://doi.org/10.1016/j.im.2023.103779
Hull DM, Schuetz SW, Lowry PB (2023) “Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training”, Computers & Security, Vol. 129. https://doi.org/10.1016/j.cose.2023.103252
Liu L, Mirkovski K, Lowry P, Vu Q (2023) ““Do as I say but not as I do”: Influence of political leaders’ populist communication styles on public adherence in a crisis using the global case of COVID-19 movement restrictions”, Data and Information Management, Vol. 7, No. 2, pp. Article: 100039-Article: 100039. https://doi.org/10.1016/j.dim.2023.100039
Venkatesh V, Davis FD, Zhu Y (2023) “Competing roles of intention and habit in predicting behavior: A comprehensive literature review, synthesis, and longitudinal field study”, International Journal of Information Management, Vol. 71. https://doi.org/10.1016/j.ijinfomgt.2023.102644
Diaz Andrade A, Tarafdar M, Davison RM, Hardin A, Techatassanasoontorn AA, Lowry PB, Chatterjee S, Schwabe G (2023) “The importance of theory at the Information Systems Journal”, Information Systems Journal, Vol. 33, No. 4, pp. 693-702. https://doi.org/10.1111/isj.12437
Peng Y, Qiu Q, Zhang D, Yang T, Zhang H (2023) “Ensemble Learning for Interpretable Concept Drift and Its Application to Drug Recommendation”, International Journal of Computers Communications & Control, Vol. 18, No. 1. https://doi.org/10.15837/ijccc.2023.1.5011
Zhang M, Sun L, Li Y, Wang GA, He Z (2023) “Using supplementary reviews to improve customer requirement identification and product design development”, Journal of Management Science and Engineering, Vol. 8, No. 4, pp. 584-597. https://doi.org/10.1016/j.jmse.2023.03.001
Goldberg DM, Abrahams AS (2023) “Maximizing total yield in safety hazard monitoring of online reviews”, Expert Systems with Applications, Vol. 229. https://doi.org/10.1016/j.eswa.2023.120540
Adjerid I, Angst CM, Devaraj S, Berente N (2023) “Does Analytics Help Resolve Equivocality in the Healthcare Context? Contrasting the Effects of Analyzability and Differentiation”, Journal of the Association For Information Systems, Vol. 24, No. 3, pp. 882-911. https://doi.org/10.17705/1jais.00805
Villacis Calderon ED, James TL, Lowry PB (2023) “How Facebook's newsfeed algorithm shapes childhood vaccine hesitancy: An algorithmic fairness, accountability, and transparency (FAT) perspective”, Data and Information Management, Vol. 7, No. 3, . https://doi.org/10.1016/j.dim.2023.100042
Budowle B, Arnette A, Sajantila A (2023) “A cost-benefit analysis for use of large SNP panels and high throughput typing for forensic investigative genetic genealogy”, International Journal of Legal Medicine, Vol. 137, No. 5, pp. 1595-1614. https://doi.org/10.1007/s00414-023-03029-7
Ge YG, Kapucu N, Zobel CW, Hasan S, Hall JL, Wang H, Wang L, Martin Y, Cechowski M (2023) “Building community resilience through cross-sector partnerships and interdisciplinary research”, Public Administration Review, Vol. 83, No. 5, pp. 1415-1422. https://doi.org/10.1111/puar.13697
Jeyaraj A, Dwivedi YK, Venkatesh V (2023) “Intention in information systems adoption and use: Current state and research directions”, International Journal of Information Management, Vol. 73. https://doi.org/10.1016/j.ijinfomgt.2023.102680
Hydari MZ, Adjerid I, Striegel AD (2023) “Health Wearables, Gamification, and Healthful Activity”, Management Science, Vol. 69, No. 7, pp. 3920-3938. https://doi.org/10.1287/mnsc.2022.4581
Hassna G, Rouibah K, Lowry PB, Paliszkiewicz J, Madra-Sawicka M (2023) “The roles of user interface design and uncertainty avoidance in B2C ecommerce success: Using evidence from three national cultures”, Electronic Commerce Research and Applications, Vol. 61. https://doi.org/10.1016/j.elerap.2023.101297
Liao J, Guo X, Li S, Anupoju SMB, Cheng RAA, Weller DL, Sullivan G, Zhang H, Deng X, Wiedmann M (2023) “Comparative genomics unveils extensive genomic variation between populations of species in natural and food-associated environments”, Isme Communications, Vol. 3, No. 1. https://doi.org/10.1038/s43705-023-00293-x
Adjerid I, Ayvaci MUS, Ozer O (2023) “Value of Algorithm-Enabled Process Innovation: The Case of Sepsis”, Manufacturing & Service Operations Management, Vol. 25, No. 4, pp. 1545-1566. https://doi.org/10.1287/msom.2023.1226
Lowry PB, Xiao J, Yuan J (2023) “How Lending Experience and Borrower Credit Influence Rational Herding Behavior in Peer-to-Peer Microloan Platform Markets”, Journal of Management Information Systems, Vol. 40, No. 3, pp. 914-952. https://doi.org/10.1080/07421222.2023.2229128
Du Q, Kwaramba CS, Li C, Wang GA, Nottingham Q (2023) “A contest between users and marketers? The economic value of social media content for adverse events”, Information Processing & Management, Vol. 60, No. 6. https://doi.org/10.1016/j.ipm.2023.103496
Aljafari R, Soh F, Setia P, Agarwal R (2023) “The local environment matters: Evidence from digital healthcare services for patient engagement”, Journal of the Academy of Marketing Science. https://doi.org/10.1007/s11747-023-00972-0
Venkatesh V, Thong JYL, Finance KS, Chan FKY, Arora A, Hoehle H, Venkatraman S (2023) “Equality Does Not Make You Happy: Effects of Differentiated Leader-Member Exchange and Team- Member Exchange on Developer Satisfaction in Agile Development Teams”, MIS Quarterly, Vol. 47, No. 3, pp. 1239-1270. https://doi.org/10.25300/MISQ/2022/15358
Lowry PB, Moody GD, Parameswaran S, Brown NJ (2023) “Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis”, Journal of Management Information Systems, Vol. 40, No. 4, pp. 1099-1138. https://doi.org/10.1080/07421222.2023.2267318
Parks RF, Wigand RT, Lowry PB (2023) “Balancing information privacy and operational utility in healthcare: proposing a privacy impact assessment (PIA) framework”, European Journal of Information Systems, Vol. 32, No. 6, pp. 1052-1069. https://doi.org/10.1080/0960085X.2022.2103044
Zhang J, Jiang Q, Zhang W, Kang L, Lowry PB, Zhang X (2023) “Explaining the outcomes of social gamification: A longitudinal field experiment”, Journal of Management Information Systems, Vol. 40, No. 2, pp. 401-439. https://doi.org/10.1080/07421222.2023.2196776
Venkatesh V, Raman R, Cruz-Jesus F (2024). AI and emerging technology adoption: a research agenda for operations management. International Journal of Production Research, 62(15), 5367–5377. https://doi.org/10.1080/00207543.2023.2192309
Mirkovski K, von Briel F, Lowry PB, Liu L (2024). Achieving entrepreneurial growth despite resource and capability constraints: the role of service intermediaries. Small Business Economics, 62(1), 353-380. https://doi.org/10.1007/s11187-023-00777-z
Zaman N, Goldberg D, Gruss R, Abrahams A (2024). A semi-automated risk assessment method for consumer products. Risk Analysis, 44(3), 509-737. https://doi.org/10.1111/risa.14180
Gruss R, Goldberg D, Zaman N, Abrahams A (2024). Bringing safety analytics to the online shopper: Augmenting point-of-sale interfaces with safety information. Internet Research, 34(4), 1313-1345. https://doi.org/10.1108/INTR-06-2022-0395
Mirkovski K, Rouibah K, Lowry P, Paliszkiewicz J, Ganc M (2024). Cross-Country Determinants of Citizens’ E-Government Reuse Intention: Empirical Evidence from Kuwait and Poland. Information Technology & People, 37(4), 1864-1896. https://doi.org/10.1108/ITP-08-2022-0651
Choi DD, Lowry P (2024). Balancing the commitment to the common good and the protection of personal privacy: Consumer adoption of sustainable, smart connected cars. Information & Management, 61(1), 103876. https://doi.org/10.1016/j.im.2023.103876
Xu F, Hsu C, Wang D, Lowry P (2024). The antecedents of employees’ proactive information security behavior: The perspective of proactive motivation. Information Systems Journal, 34(4), 1144-1174. https://doi.org/10.1111/isj.12488
Restrepo F, Mali N, Sands L, Abrahams A, Goldberg D, Gruss R, Zaman N, Shields W, Omaki E, Ehsani J, Ractham P, Kaewkitipong L (2024). Defective assistive device involvement in older adult Emergency Department visits. Innovation in Aging, 8(1). https://doi.org/10.1093/geroni/igad138
Zhang M, Li Y, Sun L, Wang GA, Du J (2024). The Effects of Comparative Reviews on Product Sales. Journal of Interactive Marketing, 59(2), 167-182. https://doi.org/10.1177/10949968231196578
Zhang T, Wang GA, He Z, Mukherjee A (2024). Service failure monitoring via multivariate multiple linear regression profile schemes with dimensionality reduction. Decision Support Systems, 178, 114122. https://doi.org/10.1016/j.dss.2023.114122
Zhang S, Huang F, Yu L, Wang JF, Lowry PB (2024). A dual-process model to explain self-disclosure on online social networking sites: examining the moderating effect of enjoyment. Internet Research, 34(4), 1456-1487. https://doi.org/10.1108/INTR-08-2021-0545
Baghersad M, Zobel C, Farahani M, Behara R (2024). Trade-offs Between Equity and Efficiency in Prioritizing Critical Infrastructure Investments: A Case of Stormwater Management Systems. Production and Operations Management, 34(4), 590-611. https://doi.org/10.1177/10591478241243387
Shen W, Liu Y, Wang Y (2024). Penalty or Reward? The Effect of Social Disincentives on Online Users’ Contributions. Management Science. https://doi.org/10.1287/mnsc.2021.01115
Jia Y, Liu L, Lowry P (2024). How do consumers make behavioral decisions on social commerce platforms? The interaction effect between behavior visibility and social needs. Information Systems Journal, 34(5), 1703-1736. https://doi.org/10.1111/isj.12508
Li X, Lowry P, Lai F (2024). The influence of ERP-vendor contract compliance and transaction-specific investment on vendee trust: A signaling theory perspective. Information & Management, 61(2). https://doi.org/10.1016/j.im.2024.103923
Chatterjee S, Chakraborty S, Fulk HK, Lowry P (2024). The role of dissonant relational multiplexity in information system implementation failures: Insights from a grounded theory approach. Journal of the Association for Information Systems. https://ssrn.com/abstract=4715716
Dwivedi YK, Jeyaraj A, Hughes L, Davies GH, Ahuja M, Albashrawi MA, Al-Busaidi AS, Al-Sharhan S, Al-Sulaiti KI, Altinay L, Amalaya S, Archak S, Ballestar MT, Bhagwat SA, Bharadwaj A, Bhushan A, Bose I, Budhwar P, Bunker D, Capatina A, Carter L, Constantiou I, Coombs C, Crick T, Csaki C, Darnige Y, De R, Delbridge R, Dubey R, Gauld R, Gutti RK, Hattingh M, Haug A, Hendricks L, Hino A, Hsu CHC, Iivari N, Janssen M, Jebabli I, Jones P, Junglas I, Kaushik A, Khazanchi D, Kodama M, Kraus S, Kumar V, Maier C, Malik T, Matthee M, McCarthy IP, Meier M, Metri B, Micu A, Micu A-E, Misra SK, Mishra A, Molin-Juustila T, Oppermann L, O'Regan N, Pal A, Pandey N, Pappas IO, Parker A, Pathak K, Pienta D, Polyviou A, Raman R, Ribeiro-Navarrete S, Ritala P, Rosemann M, Sarker S, Saxena P, Schlagwein D, Schultze H, Sharma C, Sharma SK, Simintiras A, Singh VK, Smuts H, Soldatos J, Tiwari MK, Thatcher JB, Vanberghen C, Varga A, Vassilakopoulou P, Venkatesh V, Viglia G, Vorley T, Wade M, Walton P (2024). "Real impact": Challenges and opportunities in bridging the gap between research and practice Making a difference in industry, policy, and society. International Journal of Information Management, 78. https://doi.org/10.1016/j.ijinfomgt.2023.102750
Kwaramba CS, Goldstein SM, Lowry PB, Nottingham QJ, Cooper EF (2024). Supply Chain Resilience as Endotherm Resilience: Theorizing Through Metaphorical Transfer. Production and Operations Management, 33(2), 456-474. https://doi.org/10.1177/10591478241234170
Chatterjee S, Chakraborty S, Fulk K, Lowry PB (2024). The Role of Dissonant Relational Multiplexity in Information System Implementation Failures. Journal of the Association for Information Systems. https://ssrn.com/abstract=4715716
Weng Q, Windeler JB, Maruping LM, Venkatesh V (2024). Bridge the gap or mind the gap? The role of leader coaching and communication technologies in configurationally dispersed teams. Information & Management, 61(6). https://doi.org/10.1016/j.im.2024.104000
Xia L, Shen W, Fan W, Wang GA (2024). Knowledge-Aware Learning Framework Based on Schema Theory to Complement Large Learning Models. Journal of Management Information Systems, 41(2), 453-486. https://doi.org/10.1080/07421222.2024.2340827
Li Y, Zhang M, Wang GA, Zhang N (2024). The effect of different types of comparative reviews on product sales. Decision Support Systems, 59(2), 167-182. https://doi.org/10.1016/j.dss.2024.114287
Warkentin M, Renaud K, Vance A, Johnston AC (2024). Introduction to the HICSS-57 Minitrack on Innovative Behavioral IS Security and Privacy Research. Proceedings of the ... Annual Hawaii International Conference on System Sciences. Annual Hawaii International Conference on System Sciences. http://hdl.handle.net/10125/41643
Lowry MR, Lowry PB, Chatterjee SS, Moody GD, Richardson VJ (2024). Achieving strategic alignment between business and information technology with information technology governance: the role of commitment to principles and Top Leadership Support. European Journal of Information Systems, 1-26. https://doi.org/10.1080/0960085X.2024.2390998
Witcher C, Christ D, Sudweeks J, Layman C, Perez M (2024). Determination of rates of occurrence for hydroplaning events with naturalistic driving data. Journal of Safety Research, 91, 303-313. https://doi.org/10.1016/j.jsr.2024.09.018
Bukvic A, Zobel CW (2024). Flood-induced mobility in rural and urban coastal jurisdictions: a homeowner's perspective. Climatic Change, 177(11). https://doi.org/10.1007/s10584-024-03821-3.
Goh Y-X, Anupoju SMB, Nguyen A, Zhang H, Ponder M, Krometis L-A, Pruden A, Liao J (2024). Evidence of horizontal gene transfer and environmental selection impacting antibiotic resistance evolution in soil-dwelling. Nature Communications, 15(1). https://doi.org/10.1038/s41467-024-54459-9
Mindel V, Aaltonen A, Rai A, Mathiassen L, Jabr W (2024). Timely Quality Problem Resolution in Peer-Production Systems: The Impact of Bots, Policy Citations, and Contributor Experiencems. Information systems research. https://doi.org/10.1287/isre.2020.0485
Hung H-Y, Kumar A, Lowry PB, Kumar V, Qiu L (2025). Leveraging EmoPath to Understand Customer Negative Emotional Coping and to Guide a Firm’s Digital Service Recovery Actions. https://ssrn.com/abstract=5159229
Collier ZA, Gruss RJ, Abrahams AS (2025). How good are large language models at product risk assessment? Risk Analysis, 45(4), 766.0-789.0. https://doi.org/10.1111/risa.14351
Cui X, Yang X, Ren J, Lowry PB, Du TCT (2025). Enhancing team creativity among information technology professionals through knowledge sharing and motivational rewards: A self-determination perspective. Data and Information Management, 9(2). https://doi.org/10.1016/j.dim.2024.100075
Venkatesh V (2025). Paradigm changing metaverse: Future research directions in design, technology adoption and use, and impacts. Decision Support Systems, 188. https://doi.org/10.1016/j.dss.2024.114307
Weiss R, Zobel CW (2025). Resist and recover: Introducing a spring theory for modeling disaster resilience. Risk Analysis, 45(2), 409-420. https://doi.org/10.1111/risa.17452
Liang H, Srinivas S, Xue Y (2025). How Mergers and Acquisitions Increase Data Breaches: A Complexity Perspective. MIS Quarterly, 49(1), 211-242. https://doi.org/10.25300/MISQ/2023/17703
Chan FKY, Thong JYL, Brown SA, Venkatesh V (2025). Design characteristics and service experience with e-government services: A public value perspective. International Journal of Information Management, 80. https://doi.org/10.1016/j.ijinfomgt.2024.102834
Neves C, Oliveira T, Cruz-Jesus F, Venkatesh V (2025). Extending the unified theory of acceptance and use of technology for sustainable technologies context. International Journal of Information Management, 80. https://doi.org/10.1016/j.ijinfomgt.2024.102838
Sahin Z, Vance A (2025). What do we need to know about the Chief Information Security Officer? A literature review and research agenda. Computers and Security, 148. https://doi.org/10.1016/j.cose.2024.104063
Alikhani R, Ranjbar A, Torabi SA, Zobel CW (2025). Performance evaluation of concurrent supply chain resilience strategies. International Journal of Production Economics, 279. https://doi.org/10.1016/j.ijpe.2024.109446
Omaki E, Restrepo F, Shields W, Abrahams A (2025). A Natural Language Processing Tool for Extracting Information about Opioid Overdoses from Case Narratives in the Violent Death Reporting System. Injury Prevention. doi: 10.1136/ip-2024-045314
Lowry P, Boh W, Petter S, Leimeister JM (2025). Long Live the Metaverse: Identifying the Potential for Market Disruption and Future Research. Journal of Management Information Systems, 45(1), 3-38. https://doi.org/10.1080/07421222.2025.2455770
Corbett C, Narayanan S, Aloysius J, Berenguer G, Bish E, Bjarnadottir MV, Gao G, Glover WJ, Johnson MP, Kalkanci B, Li J, Martonosi SE, Mejia J, Natarajan KV, Parker C, Sodhi MS, Tang W, Toktay LB, Wowak KD, Zobel C (2025). DEI and Operations Management: Critical Linkages and Research Opportunities. Production and Operations Management, 34(3), 310-330. https://doi.org/10.1177/10591478251318107
Alikhani R, Ranjbar A, Torabi SA, Zobel C (2025). Performance evaluation of concurrent supply chain resilience strategies. International Journal of Production Economics, 279. https://doi.org/10.1016/j.ijpe.2024.109446
Huang L, Abrahams A, Sithipolvanichgul J, Gruss R, Ractham P (2025). Identifying Accounting Control Issues from Online Employee Reviews. Data Science and Management. https://doi.org/10.1016/j.dsm.2025.02.001
Corbett CJ, Narayanan S, Aloysius J, Berenguer G, Bish EK, Bjarnadottir M, Gao GG, Glover WJ, Johnson MP, Kalkanci B, Li J, Martonosi SE, Mejia J, Mishra A, Natarajan K, Parker C, Sodhi MS, Tang W, Wowak KD, Zobel CW (2025). Diversity, Equity and Inclusion and Operations Management: Critical Linkages and Research Opportunities. Production and Operations Management, 34(3), 310-330. https://doi.org/10.1177/10591478251318107
Schneier B, Vance A (2025). "Complexity is the Worst Enemy of Security": Studying Cybersecurity Through the Lens of Organizational Complexity. MIS Quarterly, 49(1), 205-210.
Kormylo C, Adjerid I, Ball S, Dogan C (2025). Till Tech Do Us Part: Betrayal Aversion and Its Role in Algorithm Use. Management Science. https://doi.org/10.1287/mnsc.2022.03510
Venkatesh V (2025). Leveraging Context: Re-Thinking Research Processes to Make "Contributions to Theory". Information systems research. https://doi.org/10.1287/isre.2021.0048
Gaskin J, Lowry PB, Rosengren W, Fife T (2025). Essential validation criteria for rigorous covariance-based structural equation modeling. Information Systems Journal. https://doi.org/10.1111/isj.12598