Journal of Computer Information Systems

Papers
(The median citation count of Journal of Computer Information Systems is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
(Un)intended Consequences of AI Sales Assistants320
Organizational Traits and Social Badging: Text Mining Application288
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings72
Exploring the Determinants of Blockchain Acceptance for Research Data Management50
An Examination of Factors Influencing Social Commerce Adoption46
Influence of Leadership Style on Information Systems Project Outcomes36
Recent Advancements in Machine Learning for Cybercrime Prediction35
Why Soft Skills Matter for Women in Cybersecurity33
Firm AI Adoption Intensity and Marketing Performance32
ICT, Financial Development and Renewable Energy Consumption28
Does Time Matter? Examining Collective Intelligence of Virtual Groups24
Impact of Privacy Behaviors on Relatedness and Well-Being in SNSs24
NLP-Driven Insights on Boutique Hotel Satisfaction23
Information Systems Protection Motivation with Ethical Appraisals22
Cyberspace and Personal Cyber Insurance: A Systematic Review22
Data Science with Semantic Technologies: Application to Information Systems Development20
Digital Investments in Organizational Learning and Entrepreneurial Agility20
The Effects of USR and Its Communication on Faculty Satisfaction19
Risk Assessment Framework Development for Mobile Banking Systems19
Spoofed Email Based Cyberattack Detection Using Machine Learning19
Information Security Practices and Intervention Among Teenagers18
Digital Transformation for Agility and Resilience: An Exploratory Study18
Cybersecurity in Supply Chains: Quantifying Risk17
Predicting Insider Breaches Using Employee Reviews17
Web Community Management in the Digital Era: Review16
Relating Technostress and Turnover Intention: A Three-Wave Study16
Secure Share: Optimal Blockchain Integration in IoT Systems16
Social Influence, Personal Views, and Behavioral Intention in ChatGPT Adoption16
Ethical AI in HR: A Case Study of Tech Hiring16
Managerial Perception of AI in Strategic Decision-Making15
A Systematic Review of Data Analytics Job Requirements and Online-Courses15
Determinants of Knowledge-Sharing Intentions for Shared Decision-Making Platforms15
The Role of Techno-Eustress in Technology-Enhanced IT Learning14
Understanding Rumor Combating Behavior on Social Media14
Green IT and Corporate Social Responsibility for Sustainability13
Swift Trust and Sensemaking in Fast Response Virtual Teams13
Comparing Information Security Compliance Between New Zealand, USA, and Vietnam13
An Empirical Study on Herd Behavior in Cryptocurrency Trading12
Towards Adoption of Generative AI in Organizational Settings12
Enhancing Educational Certificate Management and Verification with Blockchain Technology11
Mobile Operating Systems’ Impact on Customer Value: IOS vs. Android11
Tokenizing Tangible Intentions: Unraveling the Motives to Try NFTs11
Understanding Customer Readiness for Digital Gamification11
Beyond Scrolling: Social Media’s Impact on Creativity11
Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach11
Digital Transformation (DT) and Artificial Intelligence (AI) Convergence in Organizations11
Performance Evaluation of Co-Channel Interference on Wireless Networks11
Deterrence and Generative Artificial Intelligence Use in Universities11
Overconfidence Bias Measures and Herd Behavior on Information System Security11
MLOps Architecture as a Future of Machine Learning10
The Role of Identity in Green IT Attitude and Intention10
Big Data Challenges in Social Sciences: An NLP Analysis10
ChatGPT and Me: A Dual Factor Examination10
Privacy Vs. Personalization: GENAI’s Role in Technology Adoption10
What’s Stopping You from Migrating to Mobile Tourism Shopping?9
Correction9
Leveraging Autoencoders for Better Representation Learning9
Empowering Sustainability: Cultivating Learning and Knowledge Sharing for Employee Retention9
The Dual-Channel Model of Immersive Virtual Reality9
ChatGPT: Advocacy or Opposition Through Mixed Methods9
An Empirical Examination of Employee Information Security Advice Sharing9
Wireless Technologies for Environmental Monitoring: A Network Perspective9
How Does Smartphone Usage Feedback Influence Mobility Behavior?9
Big Data in Food: Systematic Literature Review and Future Directions8
Managing Privacy in B2B Marketing: A Systematic Literature Review8
An SEM-ANN Approach - Guidelines in Information Systems Research7
Value of Analytics for Decision-Making: Role of Managers and Analysts7
Developing and Validating a Live Streaming Social Commerce Success Model7
Digital Transformation in Healthcare: Insights on Value Creation7
Addressing Class Imbalances in Software Defect Detection7
AI Agents and Agentic Systems: A Multi-Expert Analysis7
Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors7
Social Networking Technologies in SMEs: A Bibliometric Analysis7
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis7
Cybersecurity Resilience in SMEs. A Machine Learning Approach7
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea7
Teaching Programming in the 21st Century7
Enhancing Supply Chain: Exploring and Exploiting AI Capabilities7
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review7
An Approach-Avoidance Model of User Satisfaction and Dissatisfaction6
Understanding Data Analytics Recommendation Execution: The Role of Recommendation Quality6
Network Embeddedness and Company Competitiveness6
Simulated Phishing Attack and Embedded Training Campaign6
Identifying Interdisciplinary Intersections Through Analytics: Software Piracy Case6
Establishing Consumer Trust in Social Commerce: Cognitive and Affective Appraisal6
Critical Digital Data Enabling Traceability for Smart Honey Value Chains6
Towards a Conceptual Typology of Darknet Risks6
Social Media Continuance from the Perspective of Commitment6
Improving Software Development Traceability with Structured Prompting6
Towards Defining a Trustworthy Artificial Intelligence System Development Maturity Model6
Effect of Multi-Channel Integration on Customer Purchase Intention6
Process Virtualization Goes Mainstream: Diving into its Normalization6
Management Information Systems Research: A Topic Modeling Based Bibliometric Analysis5
Exploring Personality Traits’ Impact on Risk Perception in Mobile Payments5
Risk Assessment on Green Supply Chains in Manufacturing5
FinTech Cybersecurity Challenges and Regulations: Bahrain Case Study5
Skills Expectations in Cybersecurity: Semantic Network Analysis of Job Advertisements5
An Authentic Pedagogical Approach to Developing Information Systems Project-based Solutions5
Psychological Capital and Information Security Policy Compliance5
Legal and Privacy Concerns of BYOD Adoption5
Examining Digital Nudges to Influence Pro-Environmental Behavior5
Consumer Segmentation and Decision: Explainable Machine Learning Insights5
Retention of Qualified Cybersecurity Professionals: A Qualitative Study5
Modeling Escapism and Immersive Experience in the Metaverse5
Blockchain based Sensor System Design For Embedded IoT5
Examining Users’ Contribution in Open Source Software Communities4
Journal of Computer Information Systems: Intellectual and Conceptual Structure4
Driving Industrial Digital Transformation4
Is ChatGPT Enhancing Youth’s Learning, Engagement and Satisfaction?4
Exploring Boundary Violations Among Remote Workers with ICTs4
Establishing Antecedents and Outcomes of Human-AI Collaboration: Meta-Analysis4
Achieving Industry-aligned Education through Digital-Commons: A Case Study4
Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation4
The Influence of Website Social Cues: A Cross-Culture Comparison4
Generative AI: Current Status and Future Directions4
Cloud Computing Risk: A Decision-making Framework4
Correction4
Ensemble-Based Framework for Fake News Detection in Social-Media4
What Drives Users’ Removal Behavior of Mobile Apps4
Dual Routes of Training on Information Security Policy Compliance4
Designing a Secure Blockchain-Based Supply Chain Management Framework4
Do Life-cycle and Generation Moderate Sentiment and Diffusion?4
Using Web Frameworks in Server Side Programming Courses4
What Determines AI Adoption in Companies? Mixed-Method Evidence4
Distress, Eustress, and Continuance Intentions for Distance Learners4
Documenting Women’s Digital Movements: A Preliminary Repository4
Cyber-Espionage Malware Attacks Detection and Analysis: A Case Study4
Chatbot Anthropomorphism, Social Presence, Uncanniness and Brand Attitude Effects4
Unveiling the Potential of Corporate Digital Responsibility (CDR)4
Navigating Cybersecurity: Environment’s Impact on Standards Adoption and Board Involvement4
Multiple Social Media in Practice – Investigating Emergent Work Practices3
Hard Skill Gap between University Education and the Robotic Industry3
Models of Information Technology Use: Meta-Review and Research Directions3
Retail Demand Forecasting Using Spatial-Temporal Gradient Boosting Methods3
Client Peripheral Knowledge and Outsourcing Project Outcomes3
Blockchain Barriers in Supply Chain: A Literature Review3
Digital Business and Economic Complexity3
Improving National Digital Identity Systems Usage: Human-Centric Cybersecurity Survey3
A Configurational Approach to CSP Selection and Rejection3
Self-efficacy in Information Security: A Replication Study3
Consumers’ Continuance Intention Toward Online Shopping Apps: An Integrated Model3
When AI Is Wrong: Addressing Liability Challenges in Women’s Healthcare3
Bibliometric Analysis and Scientific Mapping of IoT3
Factors Influencing Customers’ Apparel Shopping Intention in Metaverse3
Expectation-Reality Gap in Information Technology Discontinuance Intention3
Business-Driven Data Recommender System: Design and Implementation3
Determinants of Software as a Service (SaaS) Adoption3
Information Quality of Investment Services with Social Media3
IT Workplace Preferences, Job Demands, and Work Exhaustion3
Individual Creativity and Acceptance of Emerging Information Technology3
Blockchain for Cybersecurity: Systematic Literature Review and Classification3
Bad Employees: Examining Deviant Security Behaviors2
Hotspots and Prospects of Metaverse: An International Comparison2
Block Chain Influences on Manufacturing Collaborative Product Innovation2
Factors Influencing ChatGpt Adoption for Product Research and Information Retrieval2
Exploring Stimulus to Consumers’ Virtual Shopping Environment in the Metaverse2
The Security-as-a-Service Market for Small and Medium Enterprises2
Adoption of Augmented Reality Applications for Online shopping: A Multi-Perspective Investigation2
Organizational Sustainability of Generative AI-Driven Optimization Intelligence2
Metaverse: Literature Review, Synthesis and Future Research Agenda2
Distributor Opportunism Toward the Supplier: A Social Network Perspective2
Organizational Impact of AI-Driven Recruitment Practices: A Mixed‑Methods Study2
Electronic Propinquity: Design Characteristics and Task Complexity in Information Sources2
Online Privacy Policy Disclosure: An Empirical Investigation2
A Multi-Dimensional Nomological Network of Mobile Payment Continuance2
It Won’t Happen to Me: Surveying SME Attitudes to Cyber-security2
Predictors of Success in Information Security Policy Compliance2
Bridging Academia and Practice with Digital Boundary Objects2
The Impact of Self-Perceived Facial Attractiveness on Webcam Use2
Examining AI and Systemic Factors for Improved Chatbot Sustainability2
Users’ Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review2
The Impact of Network Effects on Online Music Listening Behaviors2
The Subjectivity of Data Scientists in Machine Learning Design2
Applications of Artificial Intelligence in Cross Docking: A Systematic Literature Review2
Database Chatbot Success: User-Centered Design With LLMs2
The Role of AI in Financial Services: A Bibliometric Analysis2
Insider Intrusion Detection Techniques: A State-of-the-Art Review2
Effective Organizing on the Fly: Social Capital in Temporary Organizations2
Strategic Responses to Digital Disruption in Incumbent Firms – A Strategy-as-Practice Perspective2
Social Networking Continuance and Success: A Replication Study2
Exploring the Connections: Ambidexterity, Digital Capabilities, Resilience, and Behavioral Innovation2
Critical Components Affecting Organizational Performance2
Differential Privacy-Preserving IoT Data Sharing Through Enhanced PSO2
Blockchain and Deep Learning Integration for Various Application: A Review2
Antecedents and Outcomes of Blockchain Technology Adoption: Meta-Analysis2
Data and IT Systems Security in Contemporary Organizations2
Using Social Media in Projects: Information Management Challenges and Recommendations2
Understanding Continued Use Intention of AI Assistants2
IoT and Blockchain: A Review and a Technical-Legal-Social Acceptance Model2
SME Performance Through Blockchain Technologies2
Attributing Stealth Cyberattacks via Temporal Probabilistic Graph Neural Networks2
Adaptable Security Maturity Assessment and Standardization for Digital SMEs2
A Cognitive-Dissonance Theory Perspective in Understanding Online Shopping Journey2
0.079931974411011