Match!
Journal of Information Technology
IF
3.23
Papers
1103
Papers 1101
1 page of 111 pages (1,101 results)
Newest
Source
#1Kai Riemer (USYD: University of Sydney)H-Index: 23
#2Sandra Peter (USYD: University of Sydney)H-Index: 2
Source
#1Stefan Klein (WWU: University of Münster)H-Index: 25
#2Mary Beth Watson-Manheim (UIC: University of Illinois at Chicago)H-Index: 16
Source
#1Leslie P. Willcocks (LSE: London School of Economics and Political Science)H-Index: 66
Robotics and the automation of knowledge work, often referred to as AI (artificial intelligence), are presented in the media as likely to have massive impacts, for better or worse, on jobs skills, ...
1 CitationsSource
#1Milad Mirbabaie (University of Bremen)H-Index: 7
#2Deborah Bunker (USYD: University of Sydney)H-Index: 14
Last. Christian Ehnis (USYD: University of Sydney)H-Index: 6
view all 5 authors...
In recent times societal crises such as the coronavirus disease 2019 outbreak have given rise to a tension between formal ?command and control? and informal social media activated self-organising information and communication systems that are utilised for crisis management decision-making Social media distrust affects the dissemination of disaster information as it entails shifts in media perception and participation but also changes in the way individuals and organisations make sense of informa...
1 CitationsSource
#1Antony Bryant (LBU: Leeds Beckett University)H-Index: 13
#2Frank Land (LSE: London School of Economics and Political Science)H-Index: 18
The ‘conversation’ offers an important contribution to the archaeology of information systems, both in practice as an academic domain or discipline, and a focus on the genealogy of the field, inclu...
Source
#1Daniel Pienta (Baylor University)H-Index: 1
#2Jason Bennett Thatcher (UA: University of Alabama)H-Index: 2
Last. Allen C. Johnston (UA: University of Alabama)H-Index: 1
view all 3 authors...
Whaling is one of the most financially damaging, well-known, effective cyberattacks employed by sophisticated cybercriminals. Although whaling largely consists of sending a simplistic email message...
Source
#1Kristine Dery (MIT: Massachusetts Institute of Technology)H-Index: 2
#1Kristine Dery (MIT: Massachusetts Institute of Technology)H-Index: 12
Source
#1Julia Kotlarsky (University of Auckland)H-Index: 1
#2Bart van den HooffH-Index: 20
view all 3 authors...
In an era when technologies have become a backbone of most organizations, IT support functions are under immense pressure not only to ensure provision and reliability of IS and technologies but als...
Source
#1Zeinab Baghizadeh (UNSW: University of New South Wales)H-Index: 1
#2Dubravka Cecez-Kecmanovic (UNSW: University of New South Wales)H-Index: 21
Last. Daniel Schlagwein (USYD: University of Sydney)H-Index: 10
view all 3 authors...
High failure rates of information systems development (ISD) projects continue to trouble organizations and information systems practices. Such a state of affairs has been of great concern for the i...
1 CitationsSource
12345678910
Top fields of study
Information management
Information system
Management information systems
Computer science
Management science
Knowledge management
Strategic information system