Journal of Computer Information Systems

Papers
(The median citation count of Journal of Computer Information Systems is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation195
The Potential of Generative Artificial Intelligence Across Disciplines: Perspectives and Future Directions89
Tapping the Next Purchase: Embracing the Wave of Mobile Payment50
Big Data, Marketing Analytics, and Firm Marketing Capabilities33
A Cyber-Security Culture Framework for Assessing Organization Readiness31
Digital Transformation for Agility and Resilience: An Exploratory Study24
Detecting Insider Threat via a Cyber-Security Culture Framework24
Towards Adoption of Generative AI in Organizational Settings23
Unlocking Pathways to Mobile Payment Satisfaction and Commitment21
What’s Stopping You from Migrating to Mobile Tourism Shopping?20
Artificial Intelligence Service Agents: Role of Parasocial Relationship18
What Determines AI Adoption in Companies? Mixed-Method Evidence17
Simulated Phishing Attack and Embedded Training Campaign14
Purchase Behavior of Consumers Toward GSAs: A Longitudinal Assessment14
Metaverse: Literature Review, Synthesis and Future Research Agenda14
A Systematic Review of Data Analytics Job Requirements and Online-Courses13
Security Education, Training, and Awareness Programs: Literature Review13
Live Streaming Commerce: A Review and Research Agenda12
A Risk Management Tool for Agile Software Development12
Trust in Fintech: Risk, Governance, and Continuance Intention12
Intention to Use IoT by Aged Indian Consumers12
ICT, Financial Development and Renewable Energy Consumption11
Factors Affecting Crowdfunding Success11
The Effect of the Covid-19 Pandemic on ICT Usage by Academics11
The Research Framework and Evolution of Service Robots10
A Semantic Model for Enterprise Digital Transformation Analysis10
Big Data in Food: Systematic Literature Review and Future Directions10
Information Efficiency in the Cryptocurrency Market:The Efficient-Market Hypothesis10
Counteracting the Impact of Online Fake News on Brands9
It Won’t Happen to Me: Surveying SME Attitudes to Cyber-security9
Blockchain for Cybersecurity: Systematic Literature Review and Classification9
Learnings and Implications of Virtual Hackathon9
Impact of Sensory Perceptions on the Urge to Buy Impulsively8
Different Perspectives on BDA Usage by Management Levels8
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea8
Technology Affordances for Enhancing Job Performance in Digital Work8
An Integrated Model of Continued M-Commerce Applications Usage8
Effect of Multi-Channel Integration on Customer Purchase Intention8
Understanding Continued Use Intention of AI Assistants8
Data Science Skills and Graduate Certificates: A Quantitative Text Analysis8
mWOM Business Strategies: Factors Affecting Recommendations8
Understanding Employee Information Security Policy Compliance from Role Theory Perspective8
Big Data in Healthcare Research: A survey study8
SLSS Gamification as an E-Commerce Model in China8
Applications of Artificial Intelligence in Cross Docking: A Systematic Literature Review8
A Multi-Dimensional Nomological Network of Mobile Payment Continuance8
Blockchain and Deep Learning Integration for Various Application: A Review8
Deep Learning: Differential Privacy Preservation in the Era of Big Data8
The Role of Identity in Green IT Attitude and Intention7
Factors Influencing Customers’ Apparel Shopping Intention in Metaverse7
Digital Transformation in Healthcare: Insights on Value Creation7
Systematic Survey: Secure and Privacy-Preserving Big Data Analytics in Cloud7
Understanding Valences in Mobile Grocery Shopping: Do Consumers’ Characteristics Matter?7
Machine Learning Based Product Classification for eCommerce7
Managing Users’ Behaviors on Open Content Crowdsourcing Platform7
Digital Business and Economic Complexity6
Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors6
Simon’s Decision Phases and User Performance: An Experimental Study6
Recent Advancements in Machine Learning for Cybercrime Prediction6
Big Data Analytics Capability and Firm Performance: Meta-Analysis6
Skills Expectations in Cybersecurity: Semantic Network Analysis of Job Advertisements6
Smart Supply Chain Risk Assessment in Intelligent Manufacturing6
Blockchain Barriers in Supply Chain: A Literature Review5
Examining Bitcoin and Economic Determinants: An Evolutionary Perspective5
Managing Privacy in B2B Marketing: A Systematic Literature Review5
Designing a Secure Blockchain-Based Supply Chain Management Framework5
Management Information Systems Research: A Topic Modeling Based Bibliometric Analysis5
Self-efficacy in Information Security: A Replication Study5
An Examination of Factors Influencing Social Commerce Adoption5
Enhancing Supply Chain through Implementation of Key IIoT Technologies5
Examining AI and Systemic Factors for Improved Chatbot Sustainability5
Customer Relationships, Privacy, and Security in Social Commerce5
Auditing the Governance and Management of Green IT4
Big Data Challenges in Social Sciences: An NLP Analysis4
Development of a Scale to Measure Cybercrime-Awareness on Social Media4
Construal of Social Relationships in Online Consumer Reviews4
Evolution of Information Systems Business Value Research: Topic Modeling Analysis4
Understanding Data Analytics Recommendation Execution: The Role of Recommendation Quality4
Digital Investments in Organizational Learning and Entrepreneurial Agility4
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings4
Conjoint Analysis of Blockchain Adoption Challenges in Government4
Big Data and Firm Performance: An Outside-in Approach4
Understanding Rumor Combating Behavior on Social Media4
Cybersecurity in Supply Chains: Quantifying Risk4
Cybersecurity Resilience in SMEs. A Machine Learning Approach4
The Duality of Big Data in Explaining Decision-Making Quality4
When Human Meets Technology: Unlocking Hybrid Intelligence Role in Breakthrough Innovation Engagement via Self-Extension and Social Intelligence4
Journal of Computer Information Systems: Intellectual and Conceptual Structure4
Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach4
Employee Empowerment and HR Flexibility in Information Technology SMEs4
Bibliometric Analysis and Scientific Mapping of IoT4
Personality Types in Learning Enterprise Resource Planning (ERP) Systems4
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review4
Exploring the Determinants of Blockchain Acceptance for Research Data Management4
Traditional and New ICT Spending and Its Impact on Economy3
Towards a Conceptual Typology of Darknet Risks3
The Weakest Link: Employee Cyber-Defense Behaviors While Working from Home3
Investigating Antecedents of Adoption Intention for Audiobook Applications3
(Un)intended Consequences of AI Sales Assistants3
Driving Industrial Digital Transformation3
Bounded Rationality: Managerial Decision-Making and Data3
Cybersecurity in the Automotive Industry: A Systematic Literature Review (SLR)3
Reactions to Abusive Supervision: Neutralization and IS Misuse3
Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review3
The Role of Techno-Eustress in Technology-Enhanced IT Learning3
Retail Demand Forecasting Using Spatial-Temporal Gradient Boosting Methods3
Generation Z: Cyber-Attack Awareness Training Effectiveness3
Hacker Definitions in Information Systems Research3
Strategic Responses to Digital Disruption in Incumbent Firms– A Strategy-as-Practice Perspective3
Post-Quantum Cryptography Research Landscape: A Scientometric Perspective3
User Selection Strategies of Interactive Data Visualization Format3
AI Privacy Opinions between US and Chinese People3
Predictors of Success in Information Security Policy Compliance3
Digital Transformation Security Challenges3
Exploring Personality Traits’ Impact on Risk Perception in Mobile Payments3
Identity Sharing and Adaptive Personalization Influencing Online Repurchases3
Cyberspace and Personal Cyber Insurance: A Systematic Review3
Hard Skill Gap between University Education and the Robotic Industry3
Replacing Financial Audits with Blockchain: The Verification Issue3
Antecedents and Outcomes of Blockchain Technology Adoption: Meta-Analysis3
Exploring Relational Needs on Using Social Network Sites3
Blockchain based Sensor System Design For Embedded IoT3
Role of Internet Self-Efficacy and Interactions on Blended Learning Effectiveness3
When AI Is Wrong: Addressing Liability Challenges in Women’s Healthcare3
Multiple Social Media in Practice – Investigating Emergent Work Practices2
Developing and Validating a Live Streaming Social Commerce Success Model2
Creative Software Development with Team Boundary Management2
How Does Smartphone Usage Feedback Influence Mobility Behavior?2
Employees’ BYOD Security Policy Compliance in the Public Sector2
Adaptable Security Maturity Assessment and Standardization for Digital SMEs2
Developing the Profiles of Business Analytics Adopters and Non-adopters Using Data Mining Tools2
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants2
Examining Users’ Contribution in Open Source Software Communities2
Retention of Qualified Cybersecurity Professionals: A Qualitative Study2
Job Performance in Digital Work: Do Personality Traits Matter?2
Psychological Factors Behind Innovation Adoption: Affordance Actualisation Model2
Secure Share: Optimal Blockchain Integration in IoT Systems2
Firm AI Adoption Intensity and Marketing Performance2
Distributor Opportunism Toward the Supplier: A Social Network Perspective2
Cloud Computing Risk: A Decision-making Framework2
Exploring the Connections: Ambidexterity, Digital Capabilities, Resilience, and Behavioral Innovation2
Bad Employees: Examining Deviant Security Behaviors2
Cloud Disruption Impacts Business IT Role Requirements2
Using Social Intelligence to Overcome Agile Adoption Challenges2
The Influence of Website Social Cues : A Cross-Culture Comparison2
Least Privilege across People, Process, and Technology: Endpoint Security Framework2
FinTech Cybersecurity Challenges and Regulations: Bahrain Case Study2
Information Quality of Investment Services with Social Media2
Mapping the Cybersecurity Research: A Scientometric Analysis of Indian Publications2
Teaching Programming in the 21st Century2
SME Performance Through Blockchain Technologies2
The Bundling of Business Intelligence and Analytics2
Impact of Cybersecurity Disclosures on Stakeholder Intentions2
Explaining Digital Technology: Digital Artifact Delineation and Coalescence2
An SEM-ANN Approach - Guidelines in Information Systems Research2
Block Chain Influences on Manufacturing Collaborative Product Innovation2
A Three Country Comparative Study of Social Commerce Adoption2
Determinants of Knowledge-Sharing Intentions for Shared Decision-Making Platforms2
Swift Trust and Sensemaking in Fast Response Virtual Teams2
Green IT and Corporate Social Responsibility for Sustainability2
Social Media Continuance from the Perspective of Commitment1
Deep Learning-Based Code Refactoring: A Review of Current Knowledge1
Impact of Digital Competence on Employees’ Flourishing Through Basic Psychological Needs Satisfaction1
An Empirical Comparison of Malicious Insiders and Benign Insiders1
Predicting Insider Breaches Using Employee Reviews1
An Empirical Examination of Employee Information Security Advice Sharing1
Online Privacy Policy Disclosure: An Empirical Investigation1
Management of Probability of Desired Invention during Hackathon1
The Impact of Self-Perceived Facial Attractiveness on Webcam Use1
Organizational Sustainability of Generative AI-Driven Optimization Intelligence1
Predicting Compliance of Security Policies: Norms and Sanctions1
Legal and Privacy Concerns of BYOD Adoption1
Users’ Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review1
Factors Influencing ChatGpt Adoption for Product Research and Information Retrieval1
The Role of AI in Financial Services: A Bibliometric Analysis1
Understanding the Diffusion of Business Analysis Responsibilities1
Robust Web Data Extraction Based on Weighted Path-layer Similarity1
Conceptual Model of Privacy by Design1
Multi-Party Secured Collaboration Architecture from Cloud to Edge1
The Effects of USR and Its Communication on Faculty Satisfaction1
Data Visualization: Developing and Validating Dashboard Measurement Instruments1
Determining Priority in Smart City Technologies and Services for International Development Cooperation1
Cyber-Espionage Malware Attacks Detection and Analysis: A Case Study1
Process Virtualization Goes Mainstream: Diving into its Normalization1
Honest Information Sharing in Social Commerce Based on Ethical Perceptions1
Motivation and Demotivation of Hackers in Selecting a Hacking Task1
Models of Information Technology Use: Meta-Review and Research Directions1
Critical Components Affecting Organizational Performance1
Risk Assessment on Green Supply Chains in Manufacturing1
Mobile Operating Systems’ Impact on Customer Value: IOS vs. Android1
Acquisition of IS Capabilities by Collaborating with Academics: A Case in A Non-Profit Organization in Hong Kong1
Individual Creativity and Acceptance of Emerging Information Technology1
Social Networking Technologies in SMEs: A Bibliometric Analysis1
IT Workplace Preferences, Job Demands, and Work Exhaustion1
Understanding Big Data-Business Alignment from a Dynamic Perspective1
Value of Analytics for Decision-Making: Role of Managers and Analysts1
Sustainability Affected by ICT Adoption in Enterprises1
Utilizing a Simulation Approach for Data Analytics Pedagogy1
Management Emotion and Firm’s Strategic IT Investment Propensity1
Sustained Participation in Open Source Software Project Communities1
The Security-as-a-Service Market for Small and Medium Enterprises1
Does Knowledge Sharing Belief of Data Analysts Impact Their Behavior?1
Exploration and Exploitation in Organizational Cybersecurity1
Impact of Privacy Behaviors on Relatedness and Well-Being in SNSs1
Optimization of Organizational Design1
The Subjectivity of Data Scientists in Machine Learning Design1
IoT and Blockchain: A Review and a Technical-Legal-Social Acceptance Model1
Phish Me, Phish Me Not1
Data Loss Prevention from a Malicious Insider1
Insider Intrusion Detection Techniques: A State-of-the-Art Review1
Achieving Entrepreneurial Success for Student Ventures under Uncertainty1
0.041670083999634