Journal of Computer Information Systems

Papers
(The median citation count of Journal of Computer Information Systems is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Correction291
Recent Advancements in Machine Learning for Cybercrime Prediction252
Auditing the Governance and Management of Green IT62
Organizational Traits and Social Badging: Text Mining Application42
Exploring the Determinants of Blockchain Acceptance for Research Data Management39
An Examination of Factors Influencing Social Commerce Adoption32
(Un)intended Consequences of AI Sales Assistants31
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings31
Influence of Leadership Style on Information Systems Project Outcomes31
Firm AI Adoption Intensity and Marketing Performance23
Cyberspace and Personal Cyber Insurance: A Systematic Review23
Why Soft Skills Matter for Women in Cybersecurity22
Impact of Privacy Behaviors on Relatedness and Well-Being in SNSs21
NLP-Driven Insights on Boutique Hotel Satisfaction19
Does Time Matter? Examining Collective Intelligence of Virtual Groups19
Spoofed Email Based Cyberattack Detection Using Machine Learning18
Digital Investments in Organizational Learning and Entrepreneurial Agility18
The Effects of USR and Its Communication on Faculty Satisfaction18
Data Science with Semantic Technologies: Application to Information Systems Development18
Risk Assessment Framework Development for Mobile Banking Systems17
Digital Transformation for Agility and Resilience: An Exploratory Study16
ICT, Financial Development and Renewable Energy Consumption16
Information Security Practices and Intervention Among Teenagers15
Cybersecurity in Supply Chains: Quantifying Risk15
Predicting Insider Breaches Using Employee Reviews15
Social Influence, Personal Views, and Behavioral Intention in ChatGPT Adoption14
Ethical AI in HR: A Case Study of Tech Hiring14
Identity Sharing and Adaptive Personalization Influencing Online Repurchases14
Relating Technostress and Turnover Intention: A Three-Wave Study14
Web Community Management in the Digital Era: Review13
Secure Share: Optimal Blockchain Integration in IoT Systems13
Swift Trust and Sensemaking in Fast Response Virtual Teams13
Understanding Failed Software Projects through Forensic Analysis13
Managerial Perception of AI in Strategic Decision-Making12
Determinants of Knowledge-Sharing Intentions for Shared Decision-Making Platforms12
The Role of Techno-Eustress in Technology-Enhanced IT Learning12
An Empirical Study on Herd Behavior in Cryptocurrency Trading11
Green IT and Corporate Social Responsibility for Sustainability11
A Systematic Review of Data Analytics Job Requirements and Online-Courses11
Comparing Information Security Compliance Between New Zealand, USA, and Vietnam11
Deterrence and Generative Artificial Intelligence Use in Universities10
Understanding Customer Readiness for Digital Gamification10
Tokenizing Tangible Intentions: Unraveling the Motives to Try NFTs10
Performance Evaluation of Co-Channel Interference on Wireless Networks10
Mobile Operating Systems’ Impact on Customer Value: IOS vs. Android10
Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach10
Enhancing Educational Certificate Management and Verification with Blockchain Technology10
ChatGPT and Me: A Dual Factor Examination10
Reactions to Abusive Supervision: Neutralization and IS Misuse10
Understanding Rumor Combating Behavior on Social Media10
MLOps Architecture as a Future of Machine Learning9
Overconfidence Bias Measures and Herd Behavior on Information System Security9
Optimization of Organizational Design9
Digital Transformation (DT) and Artificial Intelligence (AI) Convergence in Organizations9
Big Data Challenges in Social Sciences: An NLP Analysis9
Towards Adoption of Generative AI in Organizational Settings9
Leveraging Autoencoders for Better Representation Learning8
The Dual-Channel Model of Immersive Virtual Reality8
ChatGPT: Advocacy or Opposition Through Mixed Methods8
Correction8
The Role of Identity in Green IT Attitude and Intention8
How Does Smartphone Usage Feedback Influence Mobility Behavior?8
Wireless Technologies for Environmental Monitoring: A Network Perspective7
An SEM-ANN Approach - Guidelines in Information Systems Research7
AI Agents and Agentic Systems: A Multi-Expert Analysis7
Enhancing Supply Chain: Exploring and Exploiting AI Capabilities7
Big Data in Food: Systematic Literature Review and Future Directions7
What’s Stopping You from Migrating to Mobile Tourism Shopping?7
Managing Privacy in B2B Marketing: A Systematic Literature Review7
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea7
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review6
Addressing Class Imbalances in Software Defect Detection6
Social Media Continuance from the Perspective of Commitment6
Empowering Sustainability: Cultivating Learning and Knowledge Sharing for Employee Retention6
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis6
Developing and Validating a Live Streaming Social Commerce Success Model6
SLSS Gamification as an E-Commerce Model in China6
Effect of Multi-Channel Integration on Customer Purchase Intention6
Understanding Data Analytics Recommendation Execution: The Role of Recommendation Quality6
Value of Analytics for Decision-Making: Role of Managers and Analysts6
Teaching Programming in the 21st Century6
Cybersecurity Resilience in SMEs. A Machine Learning Approach6
Identifying Interdisciplinary Intersections Through Analytics: Software Piracy Case6
Improving Software Development Traceability with Structured Prompting6
Social Networking Technologies in SMEs: A Bibliometric Analysis6
An Empirical Examination of Employee Information Security Advice Sharing6
Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors6
Digital Transformation in Healthcare: Insights on Value Creation6
Establishing Consumer Trust in Social Commerce: Cognitive and Affective Appraisal5
Towards Defining a Trustworthy Artificial Intelligence System Development Maturity Model5
Exploring Personality Traits’ Impact on Risk Perception in Mobile Payments5
Network Embeddedness and Company Competitiveness5
Towards a Conceptual Typology of Darknet Risks5
Consumer Segmentation and Decision: Explainable Machine Learning Insights5
Conceptual Model of Privacy by Design5
Process Virtualization Goes Mainstream: Diving into its Normalization5
Simulated Phishing Attack and Embedded Training Campaign5
Critical Digital Data Enabling Traceability for Smart Honey Value Chains5
An Authentic Pedagogical Approach to Developing Information Systems Project-based Solutions5
Skills Expectations in Cybersecurity: Semantic Network Analysis of Job Advertisements4
FinTech Cybersecurity Challenges and Regulations: Bahrain Case Study4
Do Life-cycle and Generation Moderate Sentiment and Diffusion?4
Using Web Frameworks in Server Side Programming Courses4
Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation4
Dual Routes of Training on Information Security Policy Compliance4
Unveiling the Potential of Corporate Digital Responsibility (CDR)4
Retention of Qualified Cybersecurity Professionals: A Qualitative Study4
Legal and Privacy Concerns of BYOD Adoption4
Risk Assessment on Green Supply Chains in Manufacturing4
Designing a Secure Blockchain-Based Supply Chain Management Framework4
Generative AI: Current Status and Future Directions4
Navigating Cybersecurity: Environment’s Impact on Standards Adoption and Board Involvement4
Management Information Systems Research: A Topic Modeling Based Bibliometric Analysis4
Psychological Capital and Information Security Policy Compliance4
Blockchain based Sensor System Design For Embedded IoT4
The Influence of Website Social Cues: A Cross-Culture Comparison4
Examining Users’ Contribution in Open Source Software Communities4
Chatbot Anthropomorphism, Social Presence, Uncanniness and Brand Attitude Effects4
Hard Skill Gap between University Education and the Robotic Industry3
Establishing Antecedents and Outcomes of Human-AI Collaboration: Meta-Analysis3
Driving Industrial Digital Transformation3
Cyber-Espionage Malware Attacks Detection and Analysis: A Case Study3
Achieving Industry-aligned Education through Digital-Commons: A Case Study3
Multiple Social Media in Practice – Investigating Emergent Work Practices3
Self-efficacy in Information Security: A Replication Study3
A Configurational Approach to CSP Selection and Rejection3
Journal of Computer Information Systems: Intellectual and Conceptual Structure3
Exploring Boundary Violations Among Remote Workers with ICTs3
What Drives Users’ Removal Behavior of Mobile Apps3
Cloud Computing Risk: A Decision-making Framework3
Documenting Women’s Digital Movements: A Preliminary Repository3
Improving National Digital Identity Systems Usage: Human-Centric Cybersecurity Survey3
Expectation-Reality Gap in Information Technology Discontinuance Intention3
Correction3
Web-Crawling Architecture in Accounting and Finance Research3
Sustained Participation in Open Source Software Project Communities3
What Determines AI Adoption in Companies? Mixed-Method Evidence3
Distress, Eustress, and Continuance Intentions for Distance Learners3
Is ChatGPT Enhancing Youth’s Learning, Engagement and Satisfaction?3
Business-Driven Data Recommender System: Design and Implementation3
Determinants of Software as a Service (SaaS) Adoption3
Exploring the Connections: Ambidexterity, Digital Capabilities, Resilience, and Behavioral Innovation2
Bridging Academia and Practice with Digital Boundary Objects2
Adoption of Augmented Reality Applications for Online shopping: A Multi-Perspective Investigation2
Examining AI and Systemic Factors for Improved Chatbot Sustainability2
Critical Components Affecting Organizational Performance2
Digital Business and Economic Complexity2
Factors Influencing Customers’ Apparel Shopping Intention in Metaverse2
Models of Information Technology Use: Meta-Review and Research Directions2
Bibliometric Analysis and Scientific Mapping of IoT2
The Subjectivity of Data Scientists in Machine Learning Design2
Predictors of Success in Information Security Policy Compliance2
The Impact of Network Effects on Online Music Listening Behaviors2
The Security-as-a-Service Market for Small and Medium Enterprises2
Online Privacy Policy Disclosure: An Empirical Investigation2
The Impact of Self-Perceived Facial Attractiveness on Webcam Use2
Exploring Stimulus to Consumers’ Virtual Shopping Environment in the Metaverse2
Users’ Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review2
Blockchain Barriers in Supply Chain: A Literature Review2
IT Workplace Preferences, Job Demands, and Work Exhaustion2
Retail Demand Forecasting Using Spatial-Temporal Gradient Boosting Methods2
Blockchain for Cybersecurity: Systematic Literature Review and Classification2
Using Social Media in Projects: Information Management Challenges and Recommendations2
Database Chatbot Success: User-Centered Design With LLMs2
Antecedents and Outcomes of Blockchain Technology Adoption: Meta-Analysis2
Social Networking Continuance and Success: A Replication Study2
Data and IT Systems Security in Contemporary Organizations2
Hotspots and Prospects of Metaverse: An International Comparison2
Block Chain Influences on Manufacturing Collaborative Product Innovation2
Differential Privacy-Preserving IoT Data Sharing Through Enhanced PSO2
Factors Influencing ChatGpt Adoption for Product Research and Information Retrieval2
Metaverse: Literature Review, Synthesis and Future Research Agenda2
Individual Creativity and Acceptance of Emerging Information Technology2
Consumers’ Continuance Intention Toward Online Shopping Apps: An Integrated Model2
Information Quality of Investment Services with Social Media2
When AI Is Wrong: Addressing Liability Challenges in Women’s Healthcare2
Client Peripheral Knowledge and Outsourcing Project Outcomes2
IoT and Blockchain: A Review and a Technical-Legal-Social Acceptance Model2
Blockchain and Deep Learning Integration for Various Application: A Review2
Bad Employees: Examining Deviant Security Behaviors2
Effective Organizing on the Fly: Social Capital in Temporary Organizations2
0.13468599319458