Journal of Computer Information Systems

Papers
(The median citation count of Journal of Computer Information Systems is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Super App: A Multi-Analytical Cross-Country Approach on the “Everything” App486
Recent Advancements in Machine Learning for Cybercrime Prediction415
(Un)intended Consequences of AI Sales Assistants146
Organizational Traits and Social Badging: Text Mining Application80
Community Matters More Than Code in Digital Agriculture75
Influence of Leadership Style on Information Systems Project Outcomes71
Human–Robot Interactive Performance Analysis with Enhanced Metacognition65
Risk Assessment Framework Development for Mobile Banking Systems49
Does Time Matter? Examining Collective Intelligence of Virtual Groups48
Data Science with Semantic Technologies: Application to Information Systems Development41
Spoofed Email Based Cyberattack Detection Using Machine Learning34
Information Systems Protection Motivation with Ethical Appraisals32
Why Soft Skills Matter for Women in Cybersecurity31
Enhancing Human Resilience to AI-Driven Social Engineering30
The Effects of USR and Its Communication on Faculty Satisfaction29
Firm AI Adoption Intensity and Marketing Performance27
NLP-Driven Insights on Boutique Hotel Satisfaction26
Cyberspace and Personal Cyber Insurance: A Systematic Review26
Cybersecurity in Supply Chains: Quantifying Risk26
Information Security Practices and Intervention Among Teenagers26
The Digital Edge: A Systematic Review of AI-Driven Competitive Advantage25
Relating Technostress and Turnover Intention: A Three-Wave Study25
Secure Share: Optimal Blockchain Integration in IoT Systems25
Predicting Insider Breaches Using Employee Reviews24
Ethical AI in HR: A Case Study of Tech Hiring24
Social Influence, Personal Views, and Behavioral Intention in ChatGPT Adoption24
Comparing Information Security Compliance Between New Zealand, USA, and Vietnam23
Managerial Perception of AI in Strategic Decision-Making22
Web Community Management in the Digital Era: Review21
An Empirical Study on Herd Behavior in Cryptocurrency Trading20
The Role of Techno-Eustress in Technology-Enhanced IT Learning20
Interactive LLM Agent Review for Software Engineering Artifacts20
Understanding Customer Readiness for Digital Gamification19
ChatGPT and Me: A Dual Factor Examination19
Overconfidence Bias Measures and Herd Behavior on Information System Security19
Beyond Scrolling: Social Media’s Impact on Creativity18
Performance Evaluation of Co-Channel Interference on Wireless Networks17
Deep Learning for Safeguarding Image Trustworthiness17
Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach17
Enhancing Educational Certificate Management and Verification with Blockchain Technology17
Multiscreen Technology’s Impact on Workplace Learning and Performance17
Mobile Operating Systems’ Impact on Customer Value: IOS vs. Android16
Digital Transformation (DT) and Artificial Intelligence (AI) Convergence in Organizations16
Tokenizing Tangible Intentions: Unraveling the Motives to Try NFTs16
Drivers of User Satisfaction and Engagement in Ar/VR-Enabled Tourism Apps15
MLOps Architecture as a Future of Machine Learning15
Deterrence and Generative Artificial Intelligence Use in Universities15
Big Data Challenges in Social Sciences: An NLP Analysis15
Organizational AI Adoption Challenges and Consequent Integration Design15
Towards Adoption of Generative AI in Organizational Settings15
Ethical Judgments in GenAI Environments: A Study of ChatGPT Users14
Unsupervised Heuristic Detection of Deceptive Reviews in E-Commerce14
Cognitive Risks of AI: Literacy, Trust, and Critical Thinking13
Availability Bias in AI Recommenders: Impacts on Impulse Buying13
How Does Smartphone Usage Feedback Influence Mobility Behavior?13
Generative AI, Job Satisfaction and Type of Work13
ChatGPT: Advocacy or Opposition Through Mixed Methods13
Privacy Vs. Personalization: GENAI’s Role in Technology Adoption13
Correction12
Wireless Technologies for Environmental Monitoring: A Network Perspective12
Empowering Sustainability: Cultivating Learning and Knowledge Sharing for Employee Retention11
An Empirical Examination of Employee Information Security Advice Sharing11
Leveraging Autoencoders for Better Representation Learning11
The Dual-Channel Model of Immersive Virtual Reality11
Big Data in Food: Systematic Literature Review and Future Directions11
Managing Privacy in B2B Marketing: A Systematic Literature Review11
Enhancing Supply Chain: Exploring and Exploiting AI Capabilities10
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review10
An SEM-ANN Approach - Guidelines in Information Systems Research10
Large Language Models to Analyze Business Intelligence User Narratives10
AI Agents and Agentic Systems: A Multi-Expert Analysis10
Value of Analytics for Decision-Making: Role of Managers and Analysts9
Social Networking Technologies in SMEs: A Bibliometric Analysis9
Teaching Programming in the 21st Century9
Cybersecurity Resilience in SMEs. A Machine Learning Approach9
Towards a Conceptual Typology of Darknet Risks8
Process Virtualization Goes Mainstream: Diving into its Normalization8
Addressing Class Imbalances in Software Defect Detection8
An Approach-Avoidance Model of User Satisfaction and Dissatisfaction8
Social Media Continuance from the Perspective of Commitment8
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis8
Identifying Interdisciplinary Intersections Through Analytics: Software Piracy Case8
Establishing Consumer Trust in Social Commerce: Cognitive and Affective Appraisal8
Towards Defining a Trustworthy Artificial Intelligence System Development Maturity Model8
Developing and Validating a Live Streaming Social Commerce Success Model8
Digital Transformation in Healthcare: Insights on Value Creation8
Improving Software Development Traceability with Structured Prompting8
Network Embeddedness and Company Competitiveness8
Immersive Metaverse Learning for Children’s Cyber Harm Awareness7
Consumer Segmentation and Decision: Explainable Machine Learning Insights7
Legal and Privacy Concerns of BYOD Adoption7
Driving Continuous Usage Intention of AI Banking Chatbots7
Modeling Escapism and Immersive Experience in the Metaverse7
Exploring Personality Traits’ Impact on Risk Perception in Mobile Payments7
Critical Digital Data Enabling Traceability for Smart Honey Value Chains7
Navigating Cybersecurity: Environment’s Impact on Standards Adoption and Board Involvement7
Skills Expectations in Cybersecurity: Semantic Network Analysis of Job Advertisements7
Psychological Capital and Information Security Policy Compliance7
Management Information Systems Research: A Topic Modeling Based Bibliometric Analysis7
FinTech Cybersecurity Challenges and Regulations: Bahrain Case Study7
Examining Digital Nudges to Influence Pro-Environmental Behavior7
What Determines AI Adoption in Companies? Mixed-Method Evidence6
Using Web Frameworks in Server Side Programming Courses6
Designing a Secure Blockchain-Based Supply Chain Management Framework6
Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation6
The Value of an Early Warning from Crowdsourced Cybersecurity Vulnerabilities6
Unveiling the Potential of Corporate Digital Responsibility (CDR)6
Examining Users’ Contribution in Open Source Software Communities6
Dual Routes of Training on Information Security Policy Compliance6
Blockchain based Sensor System Design For Embedded IoT6
Risk Assessment on Green Supply Chains in Manufacturing6
Ensemble-Based Framework for Fake News Detection in Social-Media5
Achieving Industry-aligned Education through Digital-Commons: A Case Study5
Chatbot Anthropomorphism, Social Presence, Uncanniness and Brand Attitude Effects5
Determinants of Software as a Service (SaaS) Adoption5
AI Adoption, Audit Outcomes, and Professional Reputation5
Influencer Marketing on TikTok: Role of Content and Reviewer-Related Signals5
Exploring Boundary Violations Among Remote Workers with ICTs5
Establishing Antecedents and Outcomes of Human-AI Collaboration: Meta-Analysis5
Generative AI: Current Status and Future Directions5
What Drives Users’ Removal Behavior of Mobile Apps5
A Configurational Approach to CSP Selection and Rejection5
Reimagining Automotive Manufacturing with Generative AI: A Technology-Organization-Environment Perspective5
Improving National Digital Identity Systems Usage: Human-Centric Cybersecurity Survey5
Cloud Computing Risk: A Decision-making Framework5
Driving Industrial Digital Transformation5
Is ChatGPT Enhancing Youth’s Learning, Engagement and Satisfaction?5
Documenting Women’s Digital Movements: A Preliminary Repository5
Correction5
Models of Information Technology Use: Meta-Review and Research Directions5
From Chat to Cart: How AI Boosts Online Impulse Buying5
Database Chatbot Success: User-Centered Design With LLMs4
Consumers’ Continuance Intention Toward Online Shopping Apps: An Integrated Model4
Expectation-Reality Gap in Information Technology Discontinuance Intention4
Business-Driven Data Recommender System: Design and Implementation4
Blockchain Barriers in Supply Chain: A Literature Review4
Privacy Decision-Making Under Constrained Disclosure: IoV Evidence4
IoT and Blockchain: A Review and a Technical-Legal-Social Acceptance Model4
Why Do Users Stay with Generative Artificial Intelligence?4
When AI Is Wrong: Addressing Liability Challenges in Women’s Healthcare4
Factors Influencing Customers’ Apparel Shopping Intention in Metaverse4
Client Peripheral Knowledge and Outsourcing Project Outcomes4
Bibliometric Analysis and Scientific Mapping of IoT4
Individual Creativity and Acceptance of Emerging Information Technology4
Metaverse: Literature Review, Synthesis and Future Research Agenda4
Differential Privacy-Preserving IoT Data Sharing Through Enhanced PSO4
Credit Scoring and Default Prediction Using Pufferfish Optimization Algorithm4
Retail Demand Forecasting Using Spatial-Temporal Gradient Boosting Methods4
Examining AI and Systemic Factors for Improved Chatbot Sustainability4
Factors Influencing ChatGpt Adoption for Product Research and Information Retrieval4
Predictors of Success in Information Security Policy Compliance4
Bad Employees: Examining Deviant Security Behaviors3
Distributor Opportunism Toward the Supplier: A Social Network Perspective3
Exploring the Connections: Ambidexterity, Digital Capabilities, Resilience, and Behavioral Innovation3
Electronic Propinquity: Design Characteristics and Task Complexity in Information Sources3
The Impact of Self-Perceived Facial Attractiveness on Webcam Use3
Applications of Artificial Intelligence in Cross Docking: A Systematic Literature Review3
A Cognitive-Dissonance Theory Perspective in Understanding Online Shopping Journey3
Strategic Responses to Digital Disruption in Incumbent Firms – A Strategy-as-Practice Perspective3
Users’ Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review3
Exploring Stimulus to Consumers’ Virtual Shopping Environment in the Metaverse3
Hotspots and Prospects of Metaverse: An International Comparison3
The Impact of Network Effects on Online Music Listening Behaviors3
SME Performance Through Blockchain Technologies3
Responsible Vibe Coding: Architecture, Opportunities, and Research Agenda3
It Won’t Happen to Me: Surveying SME Attitudes to Cyber-security3
AI-Driven VTuber Brand Management for E-Commerce Competencies3
Online Privacy Policy Disclosure: An Empirical Investigation3
Effective Organizing on the Fly: Social Capital in Temporary Organizations3
Using Social Media in Projects: Information Management Challenges and Recommendations3
Adoption of Augmented Reality Applications for Online shopping: A Multi-Perspective Investigation3
Data and IT Systems Security in Contemporary Organizations3
Insider Intrusion Detection Techniques: A State-of-the-Art Review3
Bridging Academia and Practice with Digital Boundary Objects3
Attributing Stealth Cyberattacks via Temporal Probabilistic Graph Neural Networks3
Antecedents and Outcomes of Blockchain Technology Adoption: Meta-Analysis3
Adaptable Security Maturity Assessment and Standardization for Digital SMEs3
Unpacking the Drivers of AI Technology Acceptance3
A Multi-Dimensional Nomological Network of Mobile Payment Continuance3
Socio-Technical Machine Learning - Putting the User in Control3
Blockchain and Deep Learning Integration for Various Application: A Review3
The Subjectivity of Data Scientists in Machine Learning Design3
Social Networking Continuance and Success: A Replication Study3
0.16720294952393