Journal of Computer Information Systems

Papers
(The median citation count of Journal of Computer Information Systems is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Social Networking Continuance and Success: A Replication Study269
Influence of Leadership Style on Information Systems Project Outcomes221
Participative and Practical Goal-setting in Enterprise Systems Learning48
Web-Crawling Architecture in Accounting and Finance Research34
The Dual-Channel Model of Immersive Virtual Reality30
Consumer Perceived Value and MOOC Subscription Intentions29
(Un)intended Consequences of AI Sales Assistants29
Correction28
The Impact of Network Effects on Online Music Listening Behaviors28
A Cognitive-Dissonance Theory Perspective in Understanding Online Shopping Journey26
Recent Advancements in Machine Learning for Cybercrime Prediction22
A Collaborative Adaptive Cybersecurity Algorithm for Cognitive Cities20
An Examination of Factors Influencing Social Commerce Adoption19
An SEM-ANN Approach - Guidelines in Information Systems Research18
Replacing Financial Audits with Blockchain: The Verification Issue17
ChatGPT: Advocacy or Opposition Through Mixed Methods16
The Security-as-a-Service Market for Small and Medium Enterprises15
Sustained Participation in Open Source Software Project Communities14
Cyber-Espionage Malware Attacks Detection and Analysis: A Case Study14
Organizational Traits and Social Badging: Text Mining Application14
It Won’t Happen to Me: Surveying SME Attitudes to Cyber-security14
Bad Employees: Examining Deviant Security Behaviors14
An Empirical Examination of Employee Information Security Advice Sharing14
An Empirical Comparison of Malicious Insiders and Benign Insiders13
From Technology Acceptance to Platform Attachment: Hospitality Training in Metaverse13
Leveraging Autoencoders for Better Representation Learning13
Theory-Guided Multiclass Text Classification in Online Academic Discussions13
The Bundling of Business Intelligence and Analytics12
Strategic Responses to Digital Disruption in Incumbent Firms– A Strategy-as-Practice Perspective12
Effective Organizing on the Fly: Social Capital in Temporary Organizations12
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea11
Integrated Model to Enhance Quality Contributions in Q&A Forums11
Exploring Boundary Violations Among Remote Workers with ICTs11
What Drives Users’ Removal Behavior of Mobile Apps11
Smart Supply Chain Risk Assessment in Intelligent Manufacturing10
Motivation and Demotivation of Hackers in Selecting a Hacking Task10
Determining Priority in Smart City Technologies and Services for International Development Cooperation10
Adaptable Security Maturity Assessment and Standardization for Digital SMEs10
The Duality of Big Data in Explaining Decision-Making Quality10
Online Privacy Policy Disclosure: An Empirical Investigation10
Cloud Computing Risk: A Decision-making Framework9
How Does Smartphone Usage Feedback Influence Mobility Behavior?9
The Research Framework and Evolution of Service Robots9
When Human Meets Technology: Unlocking Hybrid Intelligence Role in Breakthrough Innovation Engagement via Self-Extension and Social Intelligence9
A Multi-Dimensional Nomological Network of Mobile Payment Continuance9
Managing Privacy in B2B Marketing: A Systematic Literature Review8
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings8
Wireless Technologies for Environmental Monitoring: A Network Perspective8
Customer Relationships, Privacy, and Security in Social Commerce8
AI Orientation, Capabilities, and Business Value: Case Study8
Enhancing Supply Chain: Exploring and Exploiting AI Capabilities8
Investigating Antecedents of Adoption Intention for Audiobook Applications8
Factors Affecting Crowdfunding Success8
Data and IT Systems Security in Contemporary Organizations7
Exploring the Determinants of Blockchain Acceptance for Research Data Management7
What’s Stopping You from Migrating to Mobile Tourism Shopping?7
Auditing the Governance and Management of Green IT7
Is ChatGPT Enhancing Youth’s Learning, Engagement and Satisfaction?7
Distress, Eustress, and Continuance Intentions for Distance Learners7
Predicting Cross-Selling Health Insurance Products Using Machine-Learning Techniques7
Generative AI Characteristics, User Motivations, and Usage Intention7
Correction7
Big Data in Food: Systematic Literature Review and Future Directions7
Empowering Sustainability: Cultivating Learning and Knowledge Sharing for Employee Retention6
Hard Skill Gap between University Education and the Robotic Industry6
The Impact of Coproduction Resentment on Continuation Intention6
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis6
Generative AI: Boosting Adaptability and Reducing Workplace Overload6
Determinants of Software as a Service (SaaS) Adoption6
Deep Learning-Based Code Refactoring: A Review of Current Knowledge6
Security Education, Training, and Awareness Programs: Literature Review6
The Effects of USR and Its Communication on Faculty Satisfaction6
Distributor Opportunism Toward the Supplier: A Social Network Perspective6
Understanding the Motivations for Continuance Usage of Mobile Apps5
Does Time Matter? Examining Collective Intelligence of Virtual Groups5
Social Media and Me: How Community Identity Influences Click Speech5
Spoofed Email Based Cyberattack Detection Using Machine Learning5
Documenting Women’s Digital Movements: A Preliminary Repository5
Effort Minimization Theory in the Data Analytics Era5
Knowledge Management Model Development and Validation Using an ERP Simulation5
Insider Intrusion Detection Techniques: A State-of-the-Art Review5
Latent-Curve Modeling of Continued-Use Intentions: Near- Versus Distant-Future5
Digital Investments in Organizational Learning and Entrepreneurial Agility5
Firm AI Adoption Intensity and Marketing Performance5
SLSS Gamification as an E-Commerce Model in China5
Cybersecurity Resilience in SMEs. A Machine Learning Approach4
NLP-Driven Insights on Boutique Hotel Satisfaction4
Developing and Validating a Live Streaming Social Commerce Success Model4
Applications of Artificial Intelligence in Cross Docking: A Systematic Literature Review4
Self-efficacy in Information Security: A Replication Study4
How to Support Health Care Professionals in Emergencies4
Impact of Privacy Behaviors on Relatedness and Well-Being in SNSs4
The Weakest Link: Employee Cyber-Defense Behaviors While Working from Home4
A Configurational Approach to CSP Selection and Rejection4
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review4
Learnings and Implications of Virtual Hackathon4
Navigating the Zone: The Impact of Small Teaching Tactics4
Value of Analytics for Decision-Making: Role of Managers and Analysts4
Creative Software Development with Team Boundary Management4
Teaching Programming in the 21st Century4
The Role of AI in Financial Services: A Bibliometric Analysis4
Human Activity Recognition with Unsupervised Learning of Event Logs4
AI-Enabled Service Continuance: Roles of Trust and Privacy Risk4
Inhibitors and Enablers of Peer-To-Peer Mobile Payment Usage Intention4
Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors4
Data Science with Semantic Technologies: Application to Information Systems Development4
Organizational Sustainability of Generative AI-Driven Optimization Intelligence3
Electronic Propinquity: Design Characteristics and Task Complexity in Information Sources3
Digital Transformation in Healthcare: Insights on Value Creation3
User Satisfaction and Dissatisfaction: Bipolar versus Unipolar Conceptualizations3
Purchase Behavior of Consumers Toward GSAs: A Longitudinal Assessment3
Understanding Failed Software Projects through Forensic Analysis3
Digital Transformation for Agility and Resilience: An Exploratory Study3
Understanding Continued Use Intention of AI Assistants3
Correction3
Attributing Stealth Cyberattacks via Temporal Probabilistic Graph Neural Networks3
Generation Z: Cyber-Attack Awareness Training Effectiveness3
Scholarly Discourse on GenAI’s Impact on Academic Publishing3
Enhancing Cybersecurity with Extended Reality: A Systematic Review3
ICT, Financial Development and Renewable Energy Consumption3
Social Networking Technologies in SMEs: A Bibliometric Analysis3
Information Efficiency in the Cryptocurrency Market:The Efficient-Market Hypothesis3
SME Performance Through Blockchain Technologies3
Cyberspace and Personal Cyber Insurance: A Systematic Review3
The Potential of Generative Artificial Intelligence Across Disciplines: Perspectives and Future Directions3
Expectation-Reality Gap in Information Technology Discontinuance Intention3
Addressing Class Imbalances in Software Defect Detection2
Understanding Voice Shopping Value Co-Creation: A Sem-Fsqca Method2
Secure Share: Optimal Blockchain Integration in IoT Systems2
Analytics Use Intention: The Role of STEM and Software Attitudes2
Process Virtualization Goes Mainstream: Diving into its Normalization2
Assessing the Impact of Accounting Analytic Capabilities on Firm Performance2
Management of Probability of Desired Invention during Hackathon2
Examining Bitcoin and Economic Determinants: An Evolutionary Perspective2
Understanding Valences in Mobile Grocery Shopping: Do Consumers’ Characteristics Matter?2
Improving Software Development Traceability with Structured Prompting2
Social Media Continuance from the Perspective of Commitment2
Leveraging AI-Enabled Information Systems for Healthcare Management2
The Effect of the Covid-19 Pandemic on ICT Usage by Academics2
Management Emotion and Firm’s Strategic IT Investment Propensity2
Identifying Interdisciplinary Intersections Through Analytics: Software Piracy Case2
Sustainability Affected by ICT Adoption in Enterprises2
Can Stablecoins Foster Cryptocurrencies Adoption?2
Impact of Digital Competence on Employees’ Flourishing Through Basic Psychological Needs Satisfaction2
Improving National Digital Identity Systems Usage: Human-Centric Cybersecurity Survey2
When Chatbots Struggle with Customer Queries: Can Humans Help Them?2
Models of Information Technology Use: Meta-Review and Research Directions2
Retail Demand Forecasting Using Spatial-Temporal Gradient Boosting Methods2
Effects of Student Response Systems on Learning Outcomes2
Relating Technostress and Turnover Intention: A Three-Wave Study2
Information Quality of Investment Services with Social Media2
Simulated Phishing Attack and Embedded Training Campaign2
Task Dependence and External Control Constraints in Technology Acceptance2
Data Visualization: Developing and Validating Dashboard Measurement Instruments2
Establishing Consumer Trust in Social Commerce: Cognitive and Affective Appraisal2
Managing Users’ Behaviors on Open Content Crowdsourcing Platform2
Towards Defining a Trustworthy Artificial Intelligence System Development Maturity Model2
Can E-Government Influence Well-Being? An Empirical Investigation2
Intention to Use IoT by Aged Indian Consumers2
Cybersecurity in Supply Chains: Quantifying Risk2
Multiple Social Media in Practice – Investigating Emergent Work Practices2
Multi-Party Secured Collaboration Architecture from Cloud to Edge2
Deep Temporal Graph Infomax for Imbalanced Insider Threat Detection1
A Privacy Perspective in Adopting Smart Contract Applications for Healthcare1
Relational and Technological Assessment of CRM Providers: A Multifactor Study1
Achieving Entrepreneurial Success for Student Ventures under Uncertainty1
An Experiment Assessing the Sequential Difficulty Effect on IT Tasks1
Managerial Perception of AI in Strategic Decision-Making1
BYOA and Security: Examining Perspective-Taking and Self-Determination1
Bibliometric Analysis and Scientific Mapping of IoT1
Predicting Insider Breaches Using Employee Reviews1
A Systematic Review of Data Analytics Job Requirements and Online-Courses1
Information Security Practices and Intervention Among Teenagers1
An Authentic Pedagogical Approach to Developing Information Systems Project-based Solutions1
An Empirical Study on Herd Behavior in Cryptocurrency Trading1
A Benchmark Comparison of a Domain-Focused Pipeline with ChatGPT1
Mapping the Cybersecurity Research: A Scientometric Analysis of Indian Publications1
Social Influence, Personal Views, and Behavioral Intention in ChatGPT Adoption1
Exploring Personality Traits’ Impact on Risk Perception in Mobile Payments1
Effect of Multi-Channel Integration on Customer Purchase Intention1
WIoT Adoption Among Young Adults in Healthcare Crises1
Synthetic WOM? The Emergence of Generative Artificial Intelligence-Induced Recommendations1
FinTech Cybersecurity Challenges and Regulations: Bahrain Case Study1
A Framework for Analyzing and Improving ISP Compliance1
Live Streaming Commerce: A Review and Research Agenda1
Examining AI and Systemic Factors for Improved Chatbot Sustainability1
The Impact of Age on User Performance: A Field Experiment1
Understanding Data Analytics Recommendation Execution: The Role of Recommendation Quality1
Network Embeddedness and Company Competitiveness1
The Role of Techno-Eustress in Technology-Enhanced IT Learning1
Critical Digital Data Enabling Traceability for Smart Honey Value Chains1
Understanding Big Data-Business Alignment from a Dynamic Perspective1
Business-Driven Data Recommender System: Design and Implementation1
Ethical AI in HR: A Case Study of Tech Hiring1
A Blockchain Based Framework for Electronic Health Records Access Control1
The Tipping Points of Video Conferencing Solutions1
Web Community Management in the Digital Era: Review1
Conceptual Model of Privacy by Design1
Green IT and Corporate Social Responsibility for Sustainability1
Digital Transformation Security Challenges1
Machine Learning Ensures Quantum-Safe Blockchain Availability1
Assessing the Determinants of Metaverse Adoption for E-Commerce Retailing1
Client Peripheral Knowledge and Outsourcing Project Outcomes1
Towards a Conceptual Typology of Darknet Risks1
Women in IT: A Work Ecosystem Perspective1
Factors Influencing Customers’ Apparel Shopping Intention in Metaverse1
Identity Sharing and Adaptive Personalization Influencing Online Repurchases1
Psychological Capital and Information Security Policy Compliance1
Does Knowledge Sharing Belief of Data Analysts Impact Their Behavior?1
0.061131000518799