Follow

Submissions from 2018

Link

Message from the STEP 2018 Workshop Chairs, Sajjan Shiva, Robin Poston, and Jong Seok Lee

Link

The role of accounting and professional associations in IT security auditing: An AMCIS panel report, Thomas F. Stafford, Robin Poston, Randi Jiang, Graham Gal, Robert E. Crossler, and Robin Lyons

Link

How to keep brand fan page followers? The lens of person-environment fit theory, Zhenya Tang, Leida Chen, and Mark L. Gillenson

Link

Understanding the importance of interaction between creators and backers in crowdfunding success, Nianxin Wang, Qingxiang Li, Huigang Liang, Taofeng Ye, and Shilun Ge

Link

Predicting the risk of acute care readmissions among rehabilitation inpatients: A machine learning approach, Yajiong Xue, Huigang Liang, John Norbury, Rita Gillis, and Brenda Killingworth

Does premium subscription pay off? Evidence from online dating platform, Yinan Yu, Animesh Animesh, Jui Ramaprasad, and Alain Pinsonneault

The impact of performance-contingent monetary incentives on user-generated content contribution, Yinan Yu, Warut Khern-am-nuai, and Alain Pinsonneault

Established companies' strategic responses to sharing economy threats, Chen Zhang, William J. Kettinger, Prajakta Kolte, and Sungjin Yoo

Link

One World, Two Realities: Perception Differences between Software Developers and Testers, Xihui “Paul” Zhang, David Nickels, Robin Poston, and Jasbir Dhaliwal

Submissions from 2017

The role of accounting and professional associations in IT security auditing, Sharif Islam, Randi Jiang, Moderators, Robin S. Poston, Paul Phillips, Graham Gal, and Thomas F. Stafford

Link

Unraveling the alignment paradox: How does business-IT alignment shape organizational agility?, Huigang Liang, Nianxin Wang, Yajiong Xue, and Shilun Ge

Link

Understanding online health information use: The case of people with physical disabilities, Huigang Liang, Yajiong Xue, and Zhiruo Zhang

Link

Investigating predictors of the 641 elders' willingness to enroll in nursing homes in Shanghai, Meng Yun Luo, Hui Gang Liang, Yuan Yuan Dong, Dan Dan Mo, Wei Dong, Yi Zhang, Yue Wang, and Yong Cai

Link

The impact of software testing governance choices, Xihui Zhang, Colin G. Onita, and Jasbir S. Dhaliwal

Submissions from 2016

Security risks related to employee "extra-role" creation of an "online-persona", Ruby E. Booth, Sandra M. Richardson, and Judith C. Simon

Research in progress: The snob and bandwagon effects on consumers' purchase intention under different promotion strategies, Li Dan Chen, Hui Gang Liang, Xin Lai, Neng Min Wang, and Wei Huang

Pricing new goods in the presence of multichannel social learning and online fake reviews in social networks, Qiaozhen Guo, Eric Fang, Hsing Kenneth Cheng, Ying Ju Chen, Huigang Liang, Xianjun Geng, and Wei Huang

Enhancing IT intrapreneurism in big pharma: Incorporating human-centered design at merck consumer care, Brian D. Janz and M. Jeff Brittain

How Buckman's value stream initiative re-visioned IT for value, Brian Janz, Tim Meek, Ernest Nichols, and John Oglesby

Link

IT outsourcing research from 1992 to 2013: A literature review based on main path analysis, Huigang Liang, Jian Jun Wang, Yajiong Xue, and Xiaocong Cui

Link

Multiobjective optimization for multiperiod reverse logistics network design, Shuang Li, Nengmin Wang, Tao Jia, Zhengwen He, and Huigang Liang

Link

PREVENTING SUBSTANCE USE AMONG NATIVE AMERICAN EARLY ADOLESCENTS, John Lowe, Huigang Liang, Jim Henson, and Cheryl Riggs

Link

Global Virtual Team Performance: The Effect of Coordination Effectiveness, Trust, and Team Cohesion, Ravi Paul, John R. Drake, and Huigang Liang

Making sense of resistance to agile adoption in waterfall organizations: Social intelligence and leadership, Robin Poston, Jignya Patel, and Yelyzaveta Tymchenko

Link

Towards a better understanding of system analysts’ tacit knowledge: A mixed method approach, Pattarawan Prasarnphanich, Brian D. Janz, and Jignya Patel

Link

The bullwhip effect on inventory under different information sharing settings based on price-sensitive demand, Nengmin Wang, Jizhou Lu, Gengzhong Feng, Yungao Ma, and Huigang Liang

Link

Cloud computing research in the IS discipline: A citation/co-citation analysis, Nianxin Wang, Huigang Liang, Yu Jia, Shilun Ge, Yajiong Xue, and Zhining Wang

Link

Alignments between the depth and breadth of inter-organizational systems deployment and their impact on firm performance, Cheng Zhang, Ling Xue, and Jasbir Dhaliwal

Link

An empirical investigation of decision making in it-related dilemmas: Impact of positive and negative consequence information, Chen Zhang, Judith C. Simon, and Euntae Ted Lee

Submissions from 2015

Link

The effect of online social value on satisfaction and continued use of social media, Tao Hu, William J. Kettinger, and Robin S. Poston

Link

Employees' exploration of complex systems: An integrative view, Huigang Liang, Zeyu Peng, Yajiong Xue, Xitong Guo, and Nengmin Wang

Link

Analysis of the bullwhip effect in two parallel supply chains with interacting price-sensitive demands, Yungao Ma, Nengmin Wang, Zhengwen He, Jizhou Lu, and Huigang Liang

Task-technology fit and employees' exploration of enterprise systems: Moderating role of local management commitment, Zeyu Peng, Huigang Liang, and Xitong Guo

Link

Vision 2020: The future of software quality management and impacts on global user acceptance, Robin Poston and Ashley Calvert

Link

IS human capital: Assessing gaps to strengthen skill and competency sourcing, Robin S. Poston and Jasbir Dhaliwal

'What are they saying?' Examining healthcare field discourses in West Tennessee, Kulraj Singh, Brian Janz, Sandra M. Richardson, Deepti Agrawal, and John M. Amis

Link

Game of information security investment: Impact of attack types and network vulnerability, Yong Wu, Gengzhong Feng, Nengmin Wang, and Huigang Liang

Link

Investigating the resistance to telemedicine in Ethiopia, Yajiong Xue, Huigang Liang, Victor Mbarika, Richard Hauser, Paul Schwager, and Mequanint Kassa Getahun

Submissions from 2014

The openness challenge: Why some cities take it on and others don't, Deepti Agrawal, William J. Kettinger, and Chen Zhang

Achieving business goals with gamification: An informational and motivational perspective, Jeffrey P. Kaleta, William J. Kettinger, and Chen Zhang

Link

Managing user acceptance testing of business applications, Robin Poston, Kalyan Sajja, and Ashley Calvert

Link

Mindfully experimenting with it: Cases on corporate social media introduction, Robin S. Poston and William J. Kettinger

Link

IT and agility in the social enterprise: A case study of St Jude Children's Research Hospital's "Cure4Kids" IT-platform for international outreach, Sandra Richardson, William J. Kettinger, Michael Shane Banks, and Yuri Quintana

Link

Knowledge sharing, intellectual capital and firm performance, Zhining Wang, Nianxin Wang, and Huigang Liang

Understanding healthcare professionals' resistance of telemedicine: An empirical study in Ethiopia, Yajiong Xue, Huigang Liang, Victor Mbarika, Richard Hauser, and Paul Schwager

Link

Sources of conflict between developers and testers in software development, Xihui Zhang, Thomas F. Stafford, Jasbir S. Dhaliwal, Mark L. Gillenson, and Gertrude Moeller

Submissions from 2013

Link

Decision support systems for ecosystems management: A singerian approach to urban infrastructure decision making, James F. Courtney, Sandra Richardson, and David Paradice

Link

The paradox of fit: How perceptions of fit impede organizational change, Maria B. Gondo, John M. Amis, Brian D. Janz, and James M. Vardaman

Link

Can price controls reduce pharmaceutical expenses? A case study of antibacterial expenditures in 12 Chinese Hospitals from 1996 to 2005, Sheng Han, Huigang Liang, Weiping Su, Yajiong Xue, and Luwen Shi

Link

A View from the top: Integrated information delivery and effective information use from the senior executive's perspective, William J. Kettinger, Chen Zhang, and Kuo Chung Chang

Online health information use by disabled people: The moderating role of disability, Huigang Liang and Yajiong Xue

Link

Ensuring employees' IT compliance: Carrot or stick?, Huigang Liang, Yajiong Xue, and Liansheng Wu

Data Monetization: Lessons from a retailer's journey, Mohammad S. Najjar and William J. Kettinger

Link

Liuwei Dihuang Pills () enhance the effect of Western medicine in treating type 2 diabetes: A meta-analysis of randomized controlled trials, Run Pu, Xiang Nan Geng, Fei Yu, Hui Gang Liang, and Lu Wen Shi

Link

How does organisational absorptive capacity matter in the assimilation of enterprise information systems?, Nilesh Saraf, Huigang Liang, Yajiong Xue, and Qing Hu

Assessing internet source credibility, Thomas F. Stafford, Jason Rhea, and Robin S. Poston

A cross-sectional and temporal analysis of information consumption on twitter, Srikar Velichety and Sudha Ram

Link

Examining lists on twitter to uncover relationships between following, membership and subscription, Srikar Velichety and Sudha Ram

The science of twitter lists: Understanding membership and subscription through network analysis, Srikar Velichety and Sudha Ram

Link

Continued participation in online innovation communities: Does community response matter equally for everyone?, Chen Zhang, Jungpil Hahn, and Prabuddha De

Link

The impact of conflict judgments between developers and testers in software development, Xihui Zhang, Jasbir S. Dhaliwal, Mark L. Gillenson, and Thomas F. Stafford

Submissions from 2012

Link

Community partnership to affect substance abuse among Native American adolescents, John Lowe, Huigang Liang, Cheryl Riggs, Jim Henson, and Tribal Elder

Link

The business rules approach and its effect on software testing, Thomas O. Meservy, Chen Zhang, Euntae T. Lee, and Jasbir Dhaliwal

The influence of technology characteristics on privacy calculus: A theoretical framework, Mohammad Said Najjar and Son Ngoc Bui

A software testing assessment to manage project testability, Robin Poston, Jignya Patel, and Jasbir Dhaliwal

Link

Toward a framework for personalized web-based training for healthcare providers in low-income countries, Sandra M. Richardson

Browser update practices in households: Insights from protection motivation theory and customer satisfaction, Srikar Velichety and Alexandra Durcikova

Link

Common citation analysis and technology overlap factor: An empirical investigation of litigated patents using network analysis, Srikar Velichety and Sudha Ram

Link

Resource structuring or capability building? An empirical study of the business value of information technology, Nianxin Wang, Huigang Liang, Weijun Zhong, Yajiong Xue, and Jinghua Xiao

Link

An empirical study of knowledge sharing intention within virtual teams, Yajiong Xue, Huigang Liang, Richard Hauser, and Margaret O'Hara

Link

Effects of electronic medical record in a Chinese hospital: A time series study, Yajiong Xue, Huigang Liang, Xiaocheng Wu, Hai Gong, Bin Li, and Yuxia Zhang

Impact of IT product compatibility initiatives on the market value of firms, Chen Zhang, Qizhi Dai, Deepti Agrawal, and William Kettinger

Submissions from 2011

Link

An integrated approach to software project management, Padmanav Acharya and Srikar Velichety

Link

Data management and data administration: Assessing 25 years of practice, Peter Aiken, Mark L. Gillenson, Xihui Zhang, and David Rafner

Link

Alignment within the software development unit: Assessing structural and relational dimensions between developers and testers, Jasbir Dhaliwal, Colin Gabriel Onita, Robin Poston, and Xihui Paul Zhang

Link

From imitation to innovation: A study of China's drug R&D and relevant national policies, Jingxi Ding, Yajiong Xue, Huigang Liang, Rong Shao, and Yongfa Chen

Link

An analysis of China's national essential medicines policy, Xiaodong Guan, Huigang Liang, Yajiong Xue, and Luwen Shi

Link

I'm just burned out: Understanding information system compatibility with personal values and role-based stress in a nursing context, Amy Hennington, Brian Janz, and Robin Poston

Link

An empirical investigation of client managers responsibilities in managing offshore outsourcing of software-testing projects, Radhika P. Jain, Robin S. Poston, and Judith C. Simon

Link

Mitigating vendor silence in offshore outsourcing: An empirical investigation, Radhika P. Jain, Judith C. Simon, and Robin S. Poston

CIO and business executive leadership approaches to establishing company-wide information orientation, William J. Kettinger, Chen Zhang, and Donald A. Marchand

Link

China's drug innovation and policy environment, Huigang Liang, Jinxi Ding, and Yajiong Xue

Link

Online health information seeking by people with physical disabilities due to neurological conditions, Huigang Liang, Yajiong Xue, and Susan K. Chase

MIS-aligned student perspectives of outsourcing and offshoring, Thomas O. Meservy, Sandra M. Richardson, Judith Simon, and Deepti Agrawal

Link

Alignment within the corporate IT unit: An analysis of software testing and development, Colin Onita and Jasbir Dhaliwal

Link

Web-enabled supply chain management: Key antecedents and performance impacts, C. Ranganathan, Thompson S.H. Teo, and Jasbir Dhaliwal

Toward a Theory of Emergent Leadership for Collaborative Information Systems Development among Social Enterprises, Sandra M. Richardson, James L. Parrish, and David A. Rosenthal

Link

The road to business-IT alignment: A case study of two Chinese companies, Nianxin Wang, Shilun Ge, Yajiong Xue, and Huigang Liang

Link

Team climate, empowering leadership, and knowledge sharing, Yajiong Xue, John Bradley, and Huigang Liang

Link

Punishment, justice, and compliance in mandatory IT settings, Yajiong Xue, Huigang Liang, and Liansheng Wu

Link

Satisfaction with employee relationship management systems: The impact of usefulness on systems quality perceptions, Yang Yang, Thomas F. Stafford, and Mark Gillenson

A fork in the road: A conceptual model of online consumer iterative search, Chen Zhang, Anssi Öörni, William Kettinger, and Jeffrey Kaleta

Submissions from 2010

Link

Personalization systems: Effects of risk propensity and congruency of suggestive guidance on risk taking behavior, Asli Y. Akbulut-Bailey, Robin S. Poston, and Clayton A. Looney

Link

Meeting the demand for IT employees: Can career choice be managed?, Brian D. Janz and Ernest L. Nichols

Link

From virtual organization to e-business: Transformational structuration, James J. Lee, Bandula Jayatilaka, Ben B. Kim, Ted E. Lee, Pairin Katerattanakul, and Soongoo Hong

Link

Understanding security behaviors in personal computer usage: A threat avoidance perspective, Huigang Liang and Yajiong Xue

Link

Understanding the influence of team climate on it use, Huigang Liang, Yajiong Xue, Weiling Ke, and Kwok Kee Wei

'Stuff' happens: A theoretical framework for internal IS service recovery, Mohammad Said Najjar, Aaron Kennon Smith, and William J. Kettinger

Emotional and rational components of is service satisfaction and their impact on is service continuance, Colin Gabriel Onita and Jasbir Dhaliwal

Role of testers in selecting an enterprise architecture solution: An exploratory study, Robin Poston, Jasbir Dhaliwal, and Rashid Koja