Management Information Systems Quarterly
Papers 1633
1 page of 164 pages (1,633 results)
#2Xiaoxiao Liu (HIT: Harbin Institute of Technology)
view all 3 authors...
#1Roberta BernardiH-Index: 3
#2Suprateek Sarker (UVA: University of Virginia)H-Index: 31
Last.Sundeep Sahay (University of Oslo)H-Index: 37
view all 3 authors...
Digital music formats and the Internet as a distribution mechanism have fundamentally disrupted the music industry by altering the way music is packaged, distributed, and consumed. This disruptive innovation has come in two stages. First, it enabled music to be purchased as an individual song (digital single) or as an album (digital album) or to be enjoyed without paying for it (unlicensed digital music). More recently, music has become available as a streaming service (streaming music). Prior t...
Individuals increasingly rely on healthcare virtual support communities (HVSCs) for social support and companionship. While research provides interesting insights into the drivers of informational support in knowledge-sharing virtual communities, there is limited research on the antecedents of emotional support provision and companionship activities in HVSCs. The unique characteristics of HVSCs also justify the need to reexamine members’ voluntary provisions of help in such communities. This pap...
#1Ji Wu (SYSU: Sun Yat-sen University)H-Index: 2
#2Liqiang Huang (ZJU: Zhejiang University)H-Index: 8
Last.J. Leon ZhaoH-Index: 25
view all 3 authors...
This study investigates employee behavior of unauthorized access attempts on information systems (IS) applications in a financial institution and examines how opportunity contexts facilitate such behavior. By contextualizing multilevel criminal opportunity theory, we develop a model that considers both employee- and department-level opportunity contexts. At the employee level, we hypothesize that the scope and data value of the applications that an employee has legitimately accessed, together wi...
#2Joan Rodon Modol (Ramon Llull University)H-Index: 10
Last.Milad Zafar Nezhad (WSU: Wayne State University)H-Index: 3
view all 3 authors...
Legacy information systems consume a large portion of information technology budgets and often impose serious limitations on organizations’ flexibility and innovation. Despite the extensive literature on how organizations adopt and use new IS, we know little about how organizations discontinue their legacy IS. Current studies suggest some actions and events to cease mechanisms such as legitimization, learning, and routinization that give continuity to the systems. However, we do not know when th...
2 CitationsSource
#1Eric Overby (Georgia Institute of Technology)H-Index: 7
#2Sam Ransbotham (BC: Boston College)H-Index: 12
There is substantial knowledge about how individuals and organizations – which we refer to collectively as entities – adopt and use new channels. However, less is known about how this relates to their use of the incumbent channel that the new channel may replace, particularly how this relationship varies across entities and over time. We study this both theoretically and empirically. First, we develop and validate a new typology of how entities’ use of new and incumbent channels evolves over tim...
Top fields of study
Information technology
Information system
Computer science
Management science
Knowledge management