Journal of Computer Information Systems

Papers
(The TQCC of Journal of Computer Information Systems is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Social Networking Continuance and Success: A Replication Study269
Influence of Leadership Style on Information Systems Project Outcomes221
Participative and Practical Goal-setting in Enterprise Systems Learning48
Web-Crawling Architecture in Accounting and Finance Research34
The Dual-Channel Model of Immersive Virtual Reality30
Consumer Perceived Value and MOOC Subscription Intentions29
(Un)intended Consequences of AI Sales Assistants29
The Impact of Network Effects on Online Music Listening Behaviors28
Correction28
A Cognitive-Dissonance Theory Perspective in Understanding Online Shopping Journey26
Recent Advancements in Machine Learning for Cybercrime Prediction22
A Collaborative Adaptive Cybersecurity Algorithm for Cognitive Cities20
An Examination of Factors Influencing Social Commerce Adoption19
An SEM-ANN Approach - Guidelines in Information Systems Research18
Replacing Financial Audits with Blockchain: The Verification Issue17
ChatGPT: Advocacy or Opposition Through Mixed Methods16
The Security-as-a-Service Market for Small and Medium Enterprises15
Bad Employees: Examining Deviant Security Behaviors14
An Empirical Examination of Employee Information Security Advice Sharing14
Sustained Participation in Open Source Software Project Communities14
Cyber-Espionage Malware Attacks Detection and Analysis: A Case Study14
Organizational Traits and Social Badging: Text Mining Application14
It Won’t Happen to Me: Surveying SME Attitudes to Cyber-security14
Theory-Guided Multiclass Text Classification in Online Academic Discussions13
An Empirical Comparison of Malicious Insiders and Benign Insiders13
From Technology Acceptance to Platform Attachment: Hospitality Training in Metaverse13
Leveraging Autoencoders for Better Representation Learning13
Effective Organizing on the Fly: Social Capital in Temporary Organizations12
The Bundling of Business Intelligence and Analytics12
Strategic Responses to Digital Disruption in Incumbent Firms– A Strategy-as-Practice Perspective12
What Drives Users’ Removal Behavior of Mobile Apps11
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea11
Integrated Model to Enhance Quality Contributions in Q&A Forums11
Exploring Boundary Violations Among Remote Workers with ICTs11
The Duality of Big Data in Explaining Decision-Making Quality10
Online Privacy Policy Disclosure: An Empirical Investigation10
Smart Supply Chain Risk Assessment in Intelligent Manufacturing10
Motivation and Demotivation of Hackers in Selecting a Hacking Task10
Determining Priority in Smart City Technologies and Services for International Development Cooperation10
Adaptable Security Maturity Assessment and Standardization for Digital SMEs10
A Multi-Dimensional Nomological Network of Mobile Payment Continuance9
Cloud Computing Risk: A Decision-making Framework9
How Does Smartphone Usage Feedback Influence Mobility Behavior?9
The Research Framework and Evolution of Service Robots9
When Human Meets Technology: Unlocking Hybrid Intelligence Role in Breakthrough Innovation Engagement via Self-Extension and Social Intelligence9
Enhancing Supply Chain: Exploring and Exploiting AI Capabilities8
Investigating Antecedents of Adoption Intention for Audiobook Applications8
Factors Affecting Crowdfunding Success8
Managing Privacy in B2B Marketing: A Systematic Literature Review8
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings8
Wireless Technologies for Environmental Monitoring: A Network Perspective8
Customer Relationships, Privacy, and Security in Social Commerce8
AI Orientation, Capabilities, and Business Value: Case Study8
Generative AI Characteristics, User Motivations, and Usage Intention7
Correction7
Big Data in Food: Systematic Literature Review and Future Directions7
Data and IT Systems Security in Contemporary Organizations7
Exploring the Determinants of Blockchain Acceptance for Research Data Management7
What’s Stopping You from Migrating to Mobile Tourism Shopping?7
Auditing the Governance and Management of Green IT7
Is ChatGPT Enhancing Youth’s Learning, Engagement and Satisfaction?7
Distress, Eustress, and Continuance Intentions for Distance Learners7
Predicting Cross-Selling Health Insurance Products Using Machine-Learning Techniques7
Security Education, Training, and Awareness Programs: Literature Review6
The Effects of USR and Its Communication on Faculty Satisfaction6
Distributor Opportunism Toward the Supplier: A Social Network Perspective6
Empowering Sustainability: Cultivating Learning and Knowledge Sharing for Employee Retention6
Hard Skill Gap between University Education and the Robotic Industry6
The Impact of Coproduction Resentment on Continuation Intention6
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis6
Generative AI: Boosting Adaptability and Reducing Workplace Overload6
Determinants of Software as a Service (SaaS) Adoption6
Deep Learning-Based Code Refactoring: A Review of Current Knowledge6
Latent-Curve Modeling of Continued-Use Intentions: Near- Versus Distant-Future5
Digital Investments in Organizational Learning and Entrepreneurial Agility5
Firm AI Adoption Intensity and Marketing Performance5
SLSS Gamification as an E-Commerce Model in China5
Understanding the Motivations for Continuance Usage of Mobile Apps5
Does Time Matter? Examining Collective Intelligence of Virtual Groups5
Social Media and Me: How Community Identity Influences Click Speech5
Spoofed Email Based Cyberattack Detection Using Machine Learning5
Documenting Women’s Digital Movements: A Preliminary Repository5
Effort Minimization Theory in the Data Analytics Era5
Knowledge Management Model Development and Validation Using an ERP Simulation5
Insider Intrusion Detection Techniques: A State-of-the-Art Review5
Human Activity Recognition with Unsupervised Learning of Event Logs4
Applications of Artificial Intelligence in Cross Docking: A Systematic Literature Review4
Self-efficacy in Information Security: A Replication Study4
How to Support Health Care Professionals in Emergencies4
Impact of Privacy Behaviors on Relatedness and Well-Being in SNSs4
The Weakest Link: Employee Cyber-Defense Behaviors While Working from Home4
A Configurational Approach to CSP Selection and Rejection4
Developing and Validating a Live Streaming Social Commerce Success Model4
Learnings and Implications of Virtual Hackathon4
Navigating the Zone: The Impact of Small Teaching Tactics4
Value of Analytics for Decision-Making: Role of Managers and Analysts4
Creative Software Development with Team Boundary Management4
Teaching Programming in the 21st Century4
The Role of AI in Financial Services: A Bibliometric Analysis4
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review4
AI-Enabled Service Continuance: Roles of Trust and Privacy Risk4
Inhibitors and Enablers of Peer-To-Peer Mobile Payment Usage Intention4
Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors4
Data Science with Semantic Technologies: Application to Information Systems Development4
Cybersecurity Resilience in SMEs. A Machine Learning Approach4
NLP-Driven Insights on Boutique Hotel Satisfaction4
0.079380989074707