Journal of Computer Information Systems

Papers
(The TQCC of Journal of Computer Information Systems is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Recent Advancements in Machine Learning for Cybercrime Prediction400
Super App: A Multi-Analytical Cross-Country Approach on the “Everything” App377
Exploring the Determinants of Blockchain Acceptance for Research Data Management120
Influence of Leadership Style on Information Systems Project Outcomes62
Organizational Traits and Social Badging: Text Mining Application59
(Un)intended Consequences of AI Sales Assistants50
Risk Assessment Framework Development for Mobile Banking Systems39
Why Soft Skills Matter for Women in Cybersecurity39
Data Science with Semantic Technologies: Application to Information Systems Development38
Digital Transformation for Agility and Resilience: An Exploratory Study32
Does Time Matter? Examining Collective Intelligence of Virtual Groups28
Information Systems Protection Motivation with Ethical Appraisals27
Cyberspace and Personal Cyber Insurance: A Systematic Review27
NLP-Driven Insights on Boutique Hotel Satisfaction26
Impact of Privacy Behaviors on Relatedness and Well-Being in SNSs25
Spoofed Email Based Cyberattack Detection Using Machine Learning24
ICT, Financial Development and Renewable Energy Consumption23
Firm AI Adoption Intensity and Marketing Performance23
The Effects of USR and Its Communication on Faculty Satisfaction23
Information Security Practices and Intervention Among Teenagers23
Cybersecurity in Supply Chains: Quantifying Risk22
Social Influence, Personal Views, and Behavioral Intention in ChatGPT Adoption21
Relating Technostress and Turnover Intention: A Three-Wave Study21
Secure Share: Optimal Blockchain Integration in IoT Systems20
Predicting Insider Breaches Using Employee Reviews20
Web Community Management in the Digital Era: Review19
Comparing Information Security Compliance Between New Zealand, USA, and Vietnam19
Ethical AI in HR: A Case Study of Tech Hiring19
Green IT and Corporate Social Responsibility for Sustainability18
The Role of Techno-Eustress in Technology-Enhanced IT Learning18
An Empirical Study on Herd Behavior in Cryptocurrency Trading17
Managerial Perception of AI in Strategic Decision-Making17
Overconfidence Bias Measures and Herd Behavior on Information System Security16
Deterrence and Generative Artificial Intelligence Use in Universities16
Understanding Customer Readiness for Digital Gamification16
Performance Evaluation of Co-Channel Interference on Wireless Networks16
ChatGPT and Me: A Dual Factor Examination15
Beyond Scrolling: Social Media’s Impact on Creativity15
Enhancing Educational Certificate Management and Verification with Blockchain Technology15
Deep Learning for Safeguarding Image Trustworthiness15
Mobile Operating Systems’ Impact on Customer Value: IOS vs. Android14
Towards Adoption of Generative AI in Organizational Settings14
Tokenizing Tangible Intentions: Unraveling the Motives to Try NFTs14
Digital Transformation (DT) and Artificial Intelligence (AI) Convergence in Organizations14
Privacy Vs. Personalization: GENAI’s Role in Technology Adoption13
Cognitive Risks of AI: Literacy, Trust, and Critical Thinking13
Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach13
Big Data Challenges in Social Sciences: An NLP Analysis13
MLOps Architecture as a Future of Machine Learning13
Unsupervised Heuristic Detection of Deceptive Reviews in E-Commerce13
ChatGPT: Advocacy or Opposition Through Mixed Methods12
How Does Smartphone Usage Feedback Influence Mobility Behavior?12
Leveraging Autoencoders for Better Representation Learning12
The Dual-Channel Model of Immersive Virtual Reality11
An SEM-ANN Approach - Guidelines in Information Systems Research11
Correction11
Big Data in Food: Systematic Literature Review and Future Directions11
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea11
Wireless Technologies for Environmental Monitoring: A Network Perspective11
Managing Privacy in B2B Marketing: A Systematic Literature Review11
Enhancing Supply Chain: Exploring and Exploiting AI Capabilities11
An Empirical Examination of Employee Information Security Advice Sharing10
Social Networking Technologies in SMEs: A Bibliometric Analysis10
Empowering Sustainability: Cultivating Learning and Knowledge Sharing for Employee Retention10
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review10
AI Agents and Agentic Systems: A Multi-Expert Analysis10
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis10
Value of Analytics for Decision-Making: Role of Managers and Analysts9
Teaching Programming in the 21st Century9
Cybersecurity Resilience in SMEs. A Machine Learning Approach9
Developing and Validating a Live Streaming Social Commerce Success Model9
Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors9
Digital Transformation in Healthcare: Insights on Value Creation9
Process Virtualization Goes Mainstream: Diving into its Normalization8
Identifying Interdisciplinary Intersections Through Analytics: Software Piracy Case8
Towards Defining a Trustworthy Artificial Intelligence System Development Maturity Model8
Understanding Data Analytics Recommendation Execution: The Role of Recommendation Quality8
Towards a Conceptual Typology of Darknet Risks8
Social Media Continuance from the Perspective of Commitment8
Establishing Consumer Trust in Social Commerce: Cognitive and Affective Appraisal8
Modeling Escapism and Immersive Experience in the Metaverse7
An Approach-Avoidance Model of User Satisfaction and Dissatisfaction7
Retention of Qualified Cybersecurity Professionals: A Qualitative Study7
Exploring Personality Traits’ Impact on Risk Perception in Mobile Payments7
Improving Software Development Traceability with Structured Prompting7
Addressing Class Imbalances in Software Defect Detection7
An Authentic Pedagogical Approach to Developing Information Systems Project-based Solutions7
Immersive Metaverse Learning for Children’s Cyber Harm Awareness7
Network Embeddedness and Company Competitiveness7
0.083365201950073