Journal of Computer Information Systems

Papers
(The median citation count of Journal of Computer Information Systems is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
(Un)intended Consequences of AI Sales Assistants327
Organizational Traits and Social Badging: Text Mining Application311
Exploring the Determinants of Blockchain Acceptance for Research Data Management82
An Examination of Factors Influencing Social Commerce Adoption51
Influence of Leadership Style on Information Systems Project Outcomes48
Recent Advancements in Machine Learning for Cybercrime Prediction36
Why Soft Skills Matter for Women in Cybersecurity36
ICT, Financial Development and Renewable Energy Consumption34
Firm AI Adoption Intensity and Marketing Performance34
Cyberspace and Personal Cyber Insurance: A Systematic Review31
Does Time Matter? Examining Collective Intelligence of Virtual Groups25
Information Systems Protection Motivation with Ethical Appraisals24
NLP-Driven Insights on Boutique Hotel Satisfaction24
Data Science with Semantic Technologies: Application to Information Systems Development23
The Effects of USR and Its Communication on Faculty Satisfaction22
Spoofed Email Based Cyberattack Detection Using Machine Learning22
Risk Assessment Framework Development for Mobile Banking Systems21
Impact of Privacy Behaviors on Relatedness and Well-Being in SNSs21
Digital Transformation for Agility and Resilience: An Exploratory Study20
Digital Investments in Organizational Learning and Entrepreneurial Agility19
Information Security Practices and Intervention Among Teenagers18
Predicting Insider Breaches Using Employee Reviews18
Cybersecurity in Supply Chains: Quantifying Risk18
Ethical AI in HR: A Case Study of Tech Hiring17
Relating Technostress and Turnover Intention: A Three-Wave Study17
Managerial Perception of AI in Strategic Decision-Making16
Secure Share: Optimal Blockchain Integration in IoT Systems16
Web Community Management in the Digital Era: Review16
Social Influence, Personal Views, and Behavioral Intention in ChatGPT Adoption16
Comparing Information Security Compliance Between New Zealand, USA, and Vietnam15
An Empirical Study on Herd Behavior in Cryptocurrency Trading15
Determinants of Knowledge-Sharing Intentions for Shared Decision-Making Platforms15
Green IT and Corporate Social Responsibility for Sustainability15
The Role of Techno-Eustress in Technology-Enhanced IT Learning15
A Systematic Review of Data Analytics Job Requirements and Online-Courses14
Understanding Rumor Combating Behavior on Social Media14
Swift Trust and Sensemaking in Fast Response Virtual Teams13
Performance Evaluation of Co-Channel Interference on Wireless Networks12
Mobile Operating Systems’ Impact on Customer Value: IOS vs. Android12
Deep Learning for Safeguarding Image Trustworthiness11
Deterrence and Generative Artificial Intelligence Use in Universities11
Understanding Customer Readiness for Digital Gamification11
Tokenizing Tangible Intentions: Unraveling the Motives to Try NFTs11
Enhancing Educational Certificate Management and Verification with Blockchain Technology11
Overconfidence Bias Measures and Herd Behavior on Information System Security11
ChatGPT and Me: A Dual Factor Examination11
Digital Transformation (DT) and Artificial Intelligence (AI) Convergence in Organizations11
Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach11
Beyond Scrolling: Social Media’s Impact on Creativity11
Big Data Challenges in Social Sciences: An NLP Analysis10
MLOps Architecture as a Future of Machine Learning10
Privacy Vs. Personalization: GENAI’s Role in Technology Adoption10
Towards Adoption of Generative AI in Organizational Settings10
Correction9
Enhancing Supply Chain: Exploring and Exploiting AI Capabilities9
How Does Smartphone Usage Feedback Influence Mobility Behavior?9
Leveraging Autoencoders for Better Representation Learning9
Wireless Technologies for Environmental Monitoring: A Network Perspective9
ChatGPT: Advocacy or Opposition Through Mixed Methods9
The Dual-Channel Model of Immersive Virtual Reality9
An Empirical Examination of Employee Information Security Advice Sharing8
What’s Stopping You from Migrating to Mobile Tourism Shopping?8
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea8
Empowering Sustainability: Cultivating Learning and Knowledge Sharing for Employee Retention8
AI Agents and Agentic Systems: A Multi-Expert Analysis8
Managing Privacy in B2B Marketing: A Systematic Literature Review8
Big Data in Food: Systematic Literature Review and Future Directions8
Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors7
Developing and Validating a Live Streaming Social Commerce Success Model7
Teaching Programming in the 21st Century7
An SEM-ANN Approach - Guidelines in Information Systems Research7
Digital Transformation in Healthcare: Insights on Value Creation7
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review7
Social Media Continuance from the Perspective of Commitment7
Value of Analytics for Decision-Making: Role of Managers and Analysts7
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis7
Social Networking Technologies in SMEs: A Bibliometric Analysis7
Cybersecurity Resilience in SMEs. A Machine Learning Approach7
Addressing Class Imbalances in Software Defect Detection6
Towards Defining a Trustworthy Artificial Intelligence System Development Maturity Model6
Understanding Data Analytics Recommendation Execution: The Role of Recommendation Quality6
Critical Digital Data Enabling Traceability for Smart Honey Value Chains6
Identifying Interdisciplinary Intersections Through Analytics: Software Piracy Case6
An Authentic Pedagogical Approach to Developing Information Systems Project-based Solutions6
Establishing Consumer Trust in Social Commerce: Cognitive and Affective Appraisal6
An Approach-Avoidance Model of User Satisfaction and Dissatisfaction6
Consumer Segmentation and Decision: Explainable Machine Learning Insights6
Improving Software Development Traceability with Structured Prompting6
Retention of Qualified Cybersecurity Professionals: A Qualitative Study6
Towards a Conceptual Typology of Darknet Risks6
Network Embeddedness and Company Competitiveness6
Process Virtualization Goes Mainstream: Diving into its Normalization6
Management Information Systems Research: A Topic Modeling Based Bibliometric Analysis6
Psychological Capital and Information Security Policy Compliance5
Modeling Escapism and Immersive Experience in the Metaverse5
Immersive Metaverse Learning for Children’s Cyber Harm Awareness5
Examining Users’ Contribution in Open Source Software Communities5
Exploring Personality Traits’ Impact on Risk Perception in Mobile Payments5
Examining Digital Nudges to Influence Pro-Environmental Behavior5
Blockchain based Sensor System Design For Embedded IoT5
Risk Assessment on Green Supply Chains in Manufacturing5
FinTech Cybersecurity Challenges and Regulations: Bahrain Case Study5
Skills Expectations in Cybersecurity: Semantic Network Analysis of Job Advertisements5
Unveiling the Potential of Corporate Digital Responsibility (CDR)5
Legal and Privacy Concerns of BYOD Adoption5
What Drives Users’ Removal Behavior of Mobile Apps4
Determinants of Software as a Service (SaaS) Adoption4
Hard Skill Gap between University Education and the Robotic Industry4
Ensemble-Based Framework for Fake News Detection in Social-Media4
Chatbot Anthropomorphism, Social Presence, Uncanniness and Brand Attitude Effects4
Driving Industrial Digital Transformation4
The Influence of Website Social Cues: A Cross-Culture Comparison4
Do Life-cycle and Generation Moderate Sentiment and Diffusion?4
What Determines AI Adoption in Companies? Mixed-Method Evidence4
Cyber-Espionage Malware Attacks Detection and Analysis: A Case Study4
Correction4
Distress, Eustress, and Continuance Intentions for Distance Learners4
Exploring Boundary Violations Among Remote Workers with ICTs4
Generative AI: Current Status and Future Directions4
Achieving Industry-aligned Education through Digital-Commons: A Case Study4
Using Web Frameworks in Server Side Programming Courses4
Journal of Computer Information Systems: Intellectual and Conceptual Structure4
Is ChatGPT Enhancing Youth’s Learning, Engagement and Satisfaction?4
A Configurational Approach to CSP Selection and Rejection4
Documenting Women’s Digital Movements: A Preliminary Repository4
Establishing Antecedents and Outcomes of Human-AI Collaboration: Meta-Analysis4
Cloud Computing Risk: A Decision-making Framework4
Navigating Cybersecurity: Environment’s Impact on Standards Adoption and Board Involvement4
Dual Routes of Training on Information Security Policy Compliance4
Designing a Secure Blockchain-Based Supply Chain Management Framework4
Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation4
Retail Demand Forecasting Using Spatial-Temporal Gradient Boosting Methods3
Self-efficacy in Information Security: A Replication Study3
Improving National Digital Identity Systems Usage: Human-Centric Cybersecurity Survey3
Client Peripheral Knowledge and Outsourcing Project Outcomes3
Individual Creativity and Acceptance of Emerging Information Technology3
Factors Influencing ChatGpt Adoption for Product Research and Information Retrieval3
Expectation-Reality Gap in Information Technology Discontinuance Intention3
Business-Driven Data Recommender System: Design and Implementation3
Consumers’ Continuance Intention Toward Online Shopping Apps: An Integrated Model3
Examining AI and Systemic Factors for Improved Chatbot Sustainability3
Bibliometric Analysis and Scientific Mapping of IoT3
Digital Business and Economic Complexity3
Models of Information Technology Use: Meta-Review and Research Directions3
Multiple Social Media in Practice – Investigating Emergent Work Practices3
Factors Influencing Customers’ Apparel Shopping Intention in Metaverse3
Information Quality of Investment Services with Social Media3
When AI Is Wrong: Addressing Liability Challenges in Women’s Healthcare3
Blockchain for Cybersecurity: Systematic Literature Review and Classification3
IT Workplace Preferences, Job Demands, and Work Exhaustion3
IoT and Blockchain: A Review and a Technical-Legal-Social Acceptance Model2
The Impact of Network Effects on Online Music Listening Behaviors2
Sustainability Affected by ICT Adoption in Enterprises2
Understanding Continued Use Intention of AI Assistants2
Block Chain Influences on Manufacturing Collaborative Product Innovation2
Antecedents and Outcomes of Blockchain Technology Adoption: Meta-Analysis2
Applications of Artificial Intelligence in Cross Docking: A Systematic Literature Review2
Exploring the Connections: Ambidexterity, Digital Capabilities, Resilience, and Behavioral Innovation2
Organizational Impact of AI-Driven Recruitment Practices: A Mixed‑Methods Study2
The Subjectivity of Data Scientists in Machine Learning Design2
Electronic Propinquity: Design Characteristics and Task Complexity in Information Sources2
Users’ Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review2
Online Privacy Policy Disclosure: An Empirical Investigation2
Insider Intrusion Detection Techniques: A State-of-the-Art Review2
Blockchain Barriers in Supply Chain: A Literature Review2
A Multi-Dimensional Nomological Network of Mobile Payment Continuance2
A Benchmark Comparison of a Domain-Focused Pipeline with ChatGPT2
Metaverse: Literature Review, Synthesis and Future Research Agenda2
Bridging Academia and Practice with Digital Boundary Objects2
SME Performance Through Blockchain Technologies2
Hotspots and Prospects of Metaverse: An International Comparison2
Distributor Opportunism Toward the Supplier: A Social Network Perspective2
Exploring Stimulus to Consumers’ Virtual Shopping Environment in the Metaverse2
Bad Employees: Examining Deviant Security Behaviors2
Using Social Media in Projects: Information Management Challenges and Recommendations2
It Won’t Happen to Me: Surveying SME Attitudes to Cyber-security2
Blockchain and Deep Learning Integration for Various Application: A Review2
Strategic Responses to Digital Disruption in Incumbent Firms – A Strategy-as-Practice Perspective2
Predictors of Success in Information Security Policy Compliance2
Adoption of Augmented Reality Applications for Online shopping: A Multi-Perspective Investigation2
Social Networking Continuance and Success: A Replication Study2
Understanding Voice Shopping Value Co-Creation: A Sem-Fsqca Method2
The Impact of Self-Perceived Facial Attractiveness on Webcam Use2
Effective Organizing on the Fly: Social Capital in Temporary Organizations2
Organizational Sustainability of Generative AI-Driven Optimization Intelligence2
Differential Privacy-Preserving IoT Data Sharing Through Enhanced PSO2
The Role of AI in Financial Services: A Bibliometric Analysis2
Data and IT Systems Security in Contemporary Organizations2
Attributing Stealth Cyberattacks via Temporal Probabilistic Graph Neural Networks2
Database Chatbot Success: User-Centered Design With LLMs2
Adaptable Security Maturity Assessment and Standardization for Digital SMEs2
A Cognitive-Dissonance Theory Perspective in Understanding Online Shopping Journey2
0.055240869522095