Journal of Computer Information Systems

Papers
(The TQCC of Journal of Computer Information Systems is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
(Un)intended Consequences of AI Sales Assistants320
Organizational Traits and Social Badging: Text Mining Application288
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings72
Exploring the Determinants of Blockchain Acceptance for Research Data Management50
An Examination of Factors Influencing Social Commerce Adoption46
Influence of Leadership Style on Information Systems Project Outcomes36
Recent Advancements in Machine Learning for Cybercrime Prediction35
Why Soft Skills Matter for Women in Cybersecurity33
Firm AI Adoption Intensity and Marketing Performance32
ICT, Financial Development and Renewable Energy Consumption28
Does Time Matter? Examining Collective Intelligence of Virtual Groups24
Impact of Privacy Behaviors on Relatedness and Well-Being in SNSs24
NLP-Driven Insights on Boutique Hotel Satisfaction23
Information Systems Protection Motivation with Ethical Appraisals22
Cyberspace and Personal Cyber Insurance: A Systematic Review22
Data Science with Semantic Technologies: Application to Information Systems Development20
Digital Investments in Organizational Learning and Entrepreneurial Agility20
The Effects of USR and Its Communication on Faculty Satisfaction19
Risk Assessment Framework Development for Mobile Banking Systems19
Spoofed Email Based Cyberattack Detection Using Machine Learning19
Information Security Practices and Intervention Among Teenagers18
Digital Transformation for Agility and Resilience: An Exploratory Study18
Cybersecurity in Supply Chains: Quantifying Risk17
Predicting Insider Breaches Using Employee Reviews17
Web Community Management in the Digital Era: Review16
Relating Technostress and Turnover Intention: A Three-Wave Study16
Secure Share: Optimal Blockchain Integration in IoT Systems16
Social Influence, Personal Views, and Behavioral Intention in ChatGPT Adoption16
Ethical AI in HR: A Case Study of Tech Hiring16
Managerial Perception of AI in Strategic Decision-Making15
A Systematic Review of Data Analytics Job Requirements and Online-Courses15
Determinants of Knowledge-Sharing Intentions for Shared Decision-Making Platforms15
The Role of Techno-Eustress in Technology-Enhanced IT Learning14
Understanding Rumor Combating Behavior on Social Media14
Green IT and Corporate Social Responsibility for Sustainability13
Swift Trust and Sensemaking in Fast Response Virtual Teams13
Comparing Information Security Compliance Between New Zealand, USA, and Vietnam13
An Empirical Study on Herd Behavior in Cryptocurrency Trading12
Towards Adoption of Generative AI in Organizational Settings12
Enhancing Educational Certificate Management and Verification with Blockchain Technology11
Mobile Operating Systems’ Impact on Customer Value: IOS vs. Android11
Tokenizing Tangible Intentions: Unraveling the Motives to Try NFTs11
Understanding Customer Readiness for Digital Gamification11
Beyond Scrolling: Social Media’s Impact on Creativity11
Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach11
Digital Transformation (DT) and Artificial Intelligence (AI) Convergence in Organizations11
Performance Evaluation of Co-Channel Interference on Wireless Networks11
Deterrence and Generative Artificial Intelligence Use in Universities11
Overconfidence Bias Measures and Herd Behavior on Information System Security11
MLOps Architecture as a Future of Machine Learning10
The Role of Identity in Green IT Attitude and Intention10
Big Data Challenges in Social Sciences: An NLP Analysis10
ChatGPT and Me: A Dual Factor Examination10
Privacy Vs. Personalization: GENAI’s Role in Technology Adoption10
What’s Stopping You from Migrating to Mobile Tourism Shopping?9
Correction9
Leveraging Autoencoders for Better Representation Learning9
Empowering Sustainability: Cultivating Learning and Knowledge Sharing for Employee Retention9
The Dual-Channel Model of Immersive Virtual Reality9
ChatGPT: Advocacy or Opposition Through Mixed Methods9
An Empirical Examination of Employee Information Security Advice Sharing9
Wireless Technologies for Environmental Monitoring: A Network Perspective9
How Does Smartphone Usage Feedback Influence Mobility Behavior?9
Big Data in Food: Systematic Literature Review and Future Directions8
Managing Privacy in B2B Marketing: A Systematic Literature Review8
An SEM-ANN Approach - Guidelines in Information Systems Research7
Value of Analytics for Decision-Making: Role of Managers and Analysts7
Developing and Validating a Live Streaming Social Commerce Success Model7
Digital Transformation in Healthcare: Insights on Value Creation7
Addressing Class Imbalances in Software Defect Detection7
AI Agents and Agentic Systems: A Multi-Expert Analysis7
Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors7
Social Networking Technologies in SMEs: A Bibliometric Analysis7
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis7
Cybersecurity Resilience in SMEs. A Machine Learning Approach7
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea7
Teaching Programming in the 21st Century7
Enhancing Supply Chain: Exploring and Exploiting AI Capabilities7
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review7
An Approach-Avoidance Model of User Satisfaction and Dissatisfaction6
Identifying Interdisciplinary Intersections Through Analytics: Software Piracy Case6
Network Embeddedness and Company Competitiveness6
Simulated Phishing Attack and Embedded Training Campaign6
Establishing Consumer Trust in Social Commerce: Cognitive and Affective Appraisal6
Social Media Continuance from the Perspective of Commitment6
Critical Digital Data Enabling Traceability for Smart Honey Value Chains6
Towards a Conceptual Typology of Darknet Risks6
Effect of Multi-Channel Integration on Customer Purchase Intention6
Improving Software Development Traceability with Structured Prompting6
Understanding Data Analytics Recommendation Execution: The Role of Recommendation Quality6
Towards Defining a Trustworthy Artificial Intelligence System Development Maturity Model6
Process Virtualization Goes Mainstream: Diving into its Normalization6
0.089534044265747