Journal of Computer Information Systems

Papers
(The TQCC of Journal of Computer Information Systems is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
(Un)intended Consequences of AI Sales Assistants327
Organizational Traits and Social Badging: Text Mining Application311
Exploring the Determinants of Blockchain Acceptance for Research Data Management82
An Examination of Factors Influencing Social Commerce Adoption51
Influence of Leadership Style on Information Systems Project Outcomes48
Why Soft Skills Matter for Women in Cybersecurity36
Recent Advancements in Machine Learning for Cybercrime Prediction36
Firm AI Adoption Intensity and Marketing Performance34
ICT, Financial Development and Renewable Energy Consumption34
Cyberspace and Personal Cyber Insurance: A Systematic Review31
Does Time Matter? Examining Collective Intelligence of Virtual Groups25
NLP-Driven Insights on Boutique Hotel Satisfaction24
Information Systems Protection Motivation with Ethical Appraisals24
Data Science with Semantic Technologies: Application to Information Systems Development23
Spoofed Email Based Cyberattack Detection Using Machine Learning22
The Effects of USR and Its Communication on Faculty Satisfaction22
Risk Assessment Framework Development for Mobile Banking Systems21
Impact of Privacy Behaviors on Relatedness and Well-Being in SNSs21
Digital Transformation for Agility and Resilience: An Exploratory Study20
Digital Investments in Organizational Learning and Entrepreneurial Agility19
Information Security Practices and Intervention Among Teenagers18
Predicting Insider Breaches Using Employee Reviews18
Cybersecurity in Supply Chains: Quantifying Risk18
Ethical AI in HR: A Case Study of Tech Hiring17
Relating Technostress and Turnover Intention: A Three-Wave Study17
Managerial Perception of AI in Strategic Decision-Making16
Secure Share: Optimal Blockchain Integration in IoT Systems16
Web Community Management in the Digital Era: Review16
Social Influence, Personal Views, and Behavioral Intention in ChatGPT Adoption16
Comparing Information Security Compliance Between New Zealand, USA, and Vietnam15
An Empirical Study on Herd Behavior in Cryptocurrency Trading15
Determinants of Knowledge-Sharing Intentions for Shared Decision-Making Platforms15
Green IT and Corporate Social Responsibility for Sustainability15
The Role of Techno-Eustress in Technology-Enhanced IT Learning15
A Systematic Review of Data Analytics Job Requirements and Online-Courses14
Understanding Rumor Combating Behavior on Social Media14
Swift Trust and Sensemaking in Fast Response Virtual Teams13
Mobile Operating Systems’ Impact on Customer Value: IOS vs. Android12
Performance Evaluation of Co-Channel Interference on Wireless Networks12
Tokenizing Tangible Intentions: Unraveling the Motives to Try NFTs11
Enhancing Educational Certificate Management and Verification with Blockchain Technology11
Overconfidence Bias Measures and Herd Behavior on Information System Security11
ChatGPT and Me: A Dual Factor Examination11
Digital Transformation (DT) and Artificial Intelligence (AI) Convergence in Organizations11
Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach11
Beyond Scrolling: Social Media’s Impact on Creativity11
Deep Learning for Safeguarding Image Trustworthiness11
Deterrence and Generative Artificial Intelligence Use in Universities11
Understanding Customer Readiness for Digital Gamification11
Big Data Challenges in Social Sciences: An NLP Analysis10
MLOps Architecture as a Future of Machine Learning10
Privacy Vs. Personalization: GENAI’s Role in Technology Adoption10
Towards Adoption of Generative AI in Organizational Settings10
Correction9
Enhancing Supply Chain: Exploring and Exploiting AI Capabilities9
How Does Smartphone Usage Feedback Influence Mobility Behavior?9
Leveraging Autoencoders for Better Representation Learning9
Wireless Technologies for Environmental Monitoring: A Network Perspective9
ChatGPT: Advocacy or Opposition Through Mixed Methods9
The Dual-Channel Model of Immersive Virtual Reality9
An Empirical Examination of Employee Information Security Advice Sharing8
What’s Stopping You from Migrating to Mobile Tourism Shopping?8
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea8
Empowering Sustainability: Cultivating Learning and Knowledge Sharing for Employee Retention8
AI Agents and Agentic Systems: A Multi-Expert Analysis8
Managing Privacy in B2B Marketing: A Systematic Literature Review8
Big Data in Food: Systematic Literature Review and Future Directions8
An SEM-ANN Approach - Guidelines in Information Systems Research7
Digital Transformation in Healthcare: Insights on Value Creation7
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review7
Social Media Continuance from the Perspective of Commitment7
Value of Analytics for Decision-Making: Role of Managers and Analysts7
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis7
Social Networking Technologies in SMEs: A Bibliometric Analysis7
Cybersecurity Resilience in SMEs. A Machine Learning Approach7
Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors7
Developing and Validating a Live Streaming Social Commerce Success Model7
Teaching Programming in the 21st Century7
Process Virtualization Goes Mainstream: Diving into its Normalization6
Towards Defining a Trustworthy Artificial Intelligence System Development Maturity Model6
Critical Digital Data Enabling Traceability for Smart Honey Value Chains6
An Authentic Pedagogical Approach to Developing Information Systems Project-based Solutions6
Understanding Data Analytics Recommendation Execution: The Role of Recommendation Quality6
Identifying Interdisciplinary Intersections Through Analytics: Software Piracy Case6
Establishing Consumer Trust in Social Commerce: Cognitive and Affective Appraisal6
Consumer Segmentation and Decision: Explainable Machine Learning Insights6
Retention of Qualified Cybersecurity Professionals: A Qualitative Study6
An Approach-Avoidance Model of User Satisfaction and Dissatisfaction6
Improving Software Development Traceability with Structured Prompting6
Towards a Conceptual Typology of Darknet Risks6
Network Embeddedness and Company Competitiveness6
Management Information Systems Research: A Topic Modeling Based Bibliometric Analysis6
Addressing Class Imbalances in Software Defect Detection6
0.044633865356445