澳门|百乐门网址

  • Editorial Introduction

    Zwass, Vladimir

    Special Section: Cognitive Perspectives on Information Systems

    Briggs, Robert O

    The Role of Self-Control in Information Security Violations: Insights from a Cognitive Neuroscience Perspective

    Hu, Qing, West, Robert, and Smarandescu, Laura

    The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use

    Chatterjee, Sutirtha, Sarker, Suprateek, and Valacich, Joseph S

    Chasing Lemmings: Modeling IT-Induced Misperceptions About the Strategic Situation as a Reason for Flash Crashes

    Brandt, Tobias and Neumann, Dirk

    Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information

    Abbasi, Ahmed, Zahedi, Fatemeh “Mariam”, Zeng, Daniel, Chen, Yan, Chen, Hsinchun, and Nunamaker, Jay F

    Exploring Knowledge Filtering Processes in Electronic Networks of Practice

    Fadel, Kelly J, Meservy, Thomas O, and Jensen, Matthew L

    Bundling Effects on Variety Seeking for Digital Information Goods

    Adomavicius, Gediminas, Bockstedt, Jesse, and Curley, Shawn P

    Enticing and Engaging Consumers via Online Product Presentations: The Effects of Restricted Interaction Design

    Yi, Cheng, Jiang, Zhenhui (Jack), and Benbasat, Izak

    Impact of Recommender System on Competition Between Personalizing and Non-Personalizing Firms

    Ghoshal, Abhijeet, Kumar, Subodha, and Mookerjee, Vijay

    Are You Feeling Lonely? The Impact of Relationship Characteristics and Online Social Network Features on Loneliness

    Matook, Sabine, Cummings, Jeff, and Bala, Hillol

    Understanding the Influence of Instant Messaging on Ending Concessions During Negotiations

    Johnson, Norman A and Cooper, Randolph B


    Send comments regarding this page to David Eargle.

  • 信誉彩票平台网站

    www.澳门金沙国际.com

    中国福彩手机app官方下载

    六福彩票注册平台

    拉菲娱乐注册网址

    金皇朝平台登录

    乐彩网购彩平台

    钱柜娱乐最新官网

    华都彩票网址