Journal of Computer Information Systems

Papers
(The median citation count of Journal of Computer Information Systems is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings278
Influence of Leadership Style on Information Systems Project Outcomes235
Organizational Traits and Social Badging: Text Mining Application53
Correction40
Recent Advancements in Machine Learning for Cybercrime Prediction35
Auditing the Governance and Management of Green IT32
(Un)intended Consequences of AI Sales Assistants31
An Examination of Factors Influencing Social Commerce Adoption30
Spoofed Email Based Cyberattack Detection Using Machine Learning29
Exploring the Determinants of Blockchain Acceptance for Research Data Management29
The Effects of USR and Its Communication on Faculty Satisfaction22
Data Science with Semantic Technologies: Application to Information Systems Development22
Digital Investments in Organizational Learning and Entrepreneurial Agility21
Cyberspace and Personal Cyber Insurance: A Systematic Review20
Firm AI Adoption Intensity and Marketing Performance19
Digital Transformation for Agility and Resilience: An Exploratory Study18
Why Soft Skills Matter for Women in Cybersecurity18
Does Time Matter? Examining Collective Intelligence of Virtual Groups17
Impact of Privacy Behaviors on Relatedness and Well-Being in SNSs17
NLP-Driven Insights on Boutique Hotel Satisfaction16
Understanding Failed Software Projects through Forensic Analysis16
ICT, Financial Development and Renewable Energy Consumption16
Information Security Practices and Intervention Among Teenagers15
Identity Sharing and Adaptive Personalization Influencing Online Repurchases15
Ethical AI in HR: A Case Study of Tech Hiring15
Social Influence, Personal Views, and Behavioral Intention in ChatGPT Adoption14
Predicting Insider Breaches Using Employee Reviews14
Secure Share: Optimal Blockchain Integration in IoT Systems14
Relating Technostress and Turnover Intention: A Three-Wave Study14
Cybersecurity in Supply Chains: Quantifying Risk14
Comparing Information Security Compliance Between New Zealand, USA, and Vietnam13
Web Community Management in the Digital Era: Review13
Swift Trust and Sensemaking in Fast Response Virtual Teams13
Understanding Rumor Combating Behavior on Social Media13
An Empirical Study on Herd Behavior in Cryptocurrency Trading12
Green IT and corporate social responsibility for sustainability12
Managerial Perception of AI in Strategic Decision-Making12
A Systematic Review of Data Analytics Job Requirements and Online-Courses11
The Role of Techno-Eustress in Technology-Enhanced IT Learning11
Determinants of Knowledge-Sharing Intentions for Shared Decision-Making Platforms11
Performance Evaluation of Co-Channel Interference on Wireless Networks10
Reactions to Abusive Supervision: Neutralization and IS Misuse10
Understanding Customer Readiness for Digital Gamification10
Tokenizing Tangible Intentions: Unraveling the Motives to Try NFTs10
Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach10
Digital Transformation (DT) and Artificial Intelligence (AI) Convergence in Organizations10
Enhancing Educational Certificate Management and Verification with Blockchain Technology10
Deterrence and Generative Artificial Intelligence Use in Universities9
Optimization of Organizational Design9
Mobile Operating Systems’ Impact on Customer Value: IOS vs. Android9
Towards Adoption of Generative AI in Organizational Settings9
MLOps Architecture as a Future of Machine Learning8
Leveraging Autoencoders for Better Representation Learning8
ChatGPT: Advocacy or Opposition Through Mixed Methods8
How Does Smartphone Usage Feedback Influence Mobility Behavior?8
Big Data Challenges in Social Sciences: An NLP Analysis8
The Role of Identity in Green IT Attitude and Intention8
Correction8
An Empirical Examination of Employee Information Security Advice Sharing8
Exploration and Exploitation in Organizational Cybersecurity8
The Research Framework and Evolution of Service Robots8
Investigating Antecedents of Adoption Intention for Audiobook Applications8
Empowering Sustainability: Cultivating Learning and Knowledge Sharing for Employee Retention7
Big Data in Food: Systematic Literature Review and Future Directions7
AI Agents and Agentic Systems: A Multi-Expert Analysis7
Managing Privacy in B2B Marketing: A Systematic Literature Review7
The Dual-Channel Model of Immersive Virtual Reality7
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea7
An SEM-ANN Approach - Guidelines in Information Systems Research7
What’s Stopping You from Migrating to Mobile Tourism Shopping?7
Wireless Technologies for Environmental Monitoring: A Network Perspective7
Enhancing Supply Chain: Exploring and Exploiting AI Capabilities7
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review7
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis6
Social Networking Technologies in SMEs: A Bibliometric Analysis6
Cybersecurity Resilience in SMEs. A Machine Learning Approach6
Teaching Programming in the 21st Century6
Creative Software Development with Team Boundary Management6
SLSS Gamification as an E-Commerce Model in China6
Developing and Validating a Live Streaming Social Commerce Success Model6
Value of Analytics for Decision-Making: Role of Managers and Analysts6
Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors6
Digital Transformation in Healthcare: Insights on Value Creation6
Identifying Interdisciplinary Intersections Through Analytics: Software Piracy Case5
Towards Defining a Trustworthy Artificial Intelligence System Development Maturity Model5
Improving Software Development Traceability with Structured Prompting5
Effect of Multi-Channel Integration on Customer Purchase Intention5
Process Virtualization Goes Mainstream: Diving into its Normalization5
Simulated Phishing Attack and Embedded Training Campaign5
Establishing Consumer Trust in Social Commerce: Cognitive and Affective Appraisal5
Addressing Class Imbalances in Software Defect Detection5
Social Media Continuance from the Perspective of Commitment5
Understanding Data Analytics Recommendation Execution: The Role of Recommendation Quality5
Towards a Conceptual Typology of Darknet Risks5
An Authentic Pedagogical Approach to Developing Information Systems Project-based Solutions5
Legal and Privacy Concerns of BYOD Adoption4
FinTech Cybersecurity Challenges and Regulations: Bahrain Case Study4
Skills Expectations in Cybersecurity: Semantic Network Analysis of Job Advertisements4
Exploring Personality Traits’ Impact on Risk Perception in Mobile Payments4
Do Life-cycle and Generation Moderate Sentiment and Diffusion?4
Consumer Segmentation and Decision: Explainable Machine Learning Insights4
Generative AI: Current Status and Future Directions4
Examining Users’ Contribution in Open Source Software Communities4
Unveiling the Potential of Corporate Digital Responsibility (CDR)4
Navigating Cybersecurity: Environment’s Impact on Standards Adoption and Board Involvement4
Critical Digital Data Enabling Traceability for Smart Honey Value Chains4
Retention of Qualified Cybersecurity Professionals: A Qualitative Study4
Management Information Systems Research: A Topic Modeling Based Bibliometric Analysis4
Conceptual Model of Privacy by Design4
Risk Assessment on Green Supply Chains in Manufacturing4
Journal of Computer Information Systems: Intellectual and Conceptual Structure4
Achieving Industry-aligned Education through Digital-Commons: A Case Study4
Blockchain based Sensor System Design For Embedded IoT4
Simon’s Decision Phases and User Performance: An Experimental Study4
Network Embeddedness and Company Competitiveness4
Psychological Capital and Information Security Policy Compliance4
The Influence of Website Social Cues: A Cross-Culture Comparison4
Designing a Secure Blockchain-Based Supply Chain Management Framework4
Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation4
Using Web Frameworks in Server Side Programming Courses4
Smart Supply Chain Risk Assessment in Intelligent Manufacturing3
Documenting Women’s Digital Movements: A Preliminary Repository3
A Configurational Approach to CSP Selection and Rejection3
Cyber-Espionage Malware Attacks Detection and Analysis: A Case Study3
What Determines AI Adoption in Companies? Mixed-Method Evidence3
Cloud Computing Risk: A Decision-making Framework3
Establishing Antecedents and Outcomes of Human-AI Collaboration: Meta-Analysis3
Hard Skill Gap between University Education and the Robotic Industry3
Determinants of Software as a Service (SaaS) Adoption3
What Drives Users’ Removal Behavior of Mobile Apps3
Sustained Participation in Open Source Software Project Communities3
Driving Industrial Digital Transformation3
Is ChatGPT Enhancing Youth’s Learning, Engagement and Satisfaction?3
Web-Crawling Architecture in Accounting and Finance Research3
Correction3
Distress, Eustress, and Continuance Intentions for Distance Learners3
Dual Routes of Training on Information Security Policy Compliance3
Chatbot Anthropomorphism, Social Presence, Uncanniness and Brand Attitude Effects3
Exploring Boundary Violations Among Remote Workers with ICTs3
Self-efficacy in Information Security: A Replication Study2
Blockchain for Cybersecurity: Systematic Literature Review and Classification2
Blockchain Barriers in Supply Chain: A Literature Review2
Blockchain and Deep Learning Integration for Various Application: A Review2
Using Social Intelligence to Overcome Agile Adoption Challenges2
Predictors of Success in Information Security Policy Compliance2
The Subjectivity of Data Scientists in Machine Learning Design2
Exploring Stimulus to Consumers’ Virtual Shopping Environment in the Metaverse2
Client Peripheral Knowledge and Outsourcing Project Outcomes2
Individual Creativity and Acceptance of Emerging Information Technology2
Improving National Digital Identity Systems Usage: Human-Centric Cybersecurity Survey2
Retail Demand Forecasting Using Spatial-Temporal Gradient Boosting Methods2
When AI Is Wrong: Addressing Liability Challenges in Women’s Healthcare2
Digital Business and Economic Complexity2
Bridging Academia and Practice with Digital Boundary Objects2
Metaverse: Literature Review, Synthesis and Future Research Agenda2
Database Chatbot Success: User-Centered Design With LLMs2
IoT and Blockchain: A Review and a Technical-Legal-Social Acceptance Model2
IT Workplace Preferences, Job Demands, and Work Exhaustion2
Users’ Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review2
Bibliometric Analysis and Scientific Mapping of IoT2
Factors Influencing Customers’ Apparel Shopping Intention in Metaverse2
Multiple Social Media in Practice – Investigating Emergent Work Practices2
Business-Driven Data Recommender System: Design and Implementation2
Intention to Use IoT by Aged Indian Consumers2
Examining AI and Systemic Factors for Improved Chatbot Sustainability2
The Impact of Self-Perceived Facial Attractiveness on Webcam Use2
Differential Privacy-Preserving IoT Data Sharing Through Enhanced PSO2
Detecting Insider Threat via a Cyber-Security Culture Framework2
Using Social Media in Projects: Information Management Challenges and Recommendations2
Expectation-Reality Gap in Information Technology Discontinuance Intention2
Factors Influencing ChatGpt Adoption for Product Research and Information Retrieval2
Consumers’ Continuance Intention Toward Online Shopping Apps: An Integrated Model2
Models of Information Technology Use: Meta-Review and Research Directions2
Information Quality of Investment Services with Social Media2
The Impact of Network Effects on Online Music Listening Behaviors1
Assessing the Impact of Accounting Analytic Capabilities on Firm Performance1
Management of Probability of Desired Invention during Hackathon1
Adaptable Security Maturity Assessment and Standardization for Digital SMEs1
A Semantic Model for Enterprise Digital Transformation Analysis1
Insider Intrusion Detection Techniques: A State-of-the-Art Review1
Recommendation and Distillation of IoT Multi-Environments1
Applications of Artificial Intelligence in Cross Docking: A Systematic Literature Review1
Unlocking Pathways to Mobile Payment Satisfaction and Commitment1
A Benchmark Comparison of a Domain-Focused Pipeline with ChatGPT1
Electronic Propinquity: Design Characteristics and Task Complexity in Information Sources1
Impact of Sensory Perceptions on the Urge to Buy Impulsively1
Data and IT Systems Security in Contemporary Organizations1
The Effect of the Covid-19 Pandemic on ICT Usage by Academics1
Bad Employees: Examining Deviant Security Behaviors1
Live Streaming Commerce: A Review and Research Agenda1
Antecedents and Outcomes of Blockchain Technology Adoption: Meta-Analysis1
Hotspots and Prospects of Metaverse: An International Comparison1
Sustainability Affected by ICT Adoption in Enterprises1
Recursive Decision-Making: A Confirmation of Newell and Simon1
Strategic Responses to Digital Disruption in Incumbent Firms – A Strategy-as-Practice Perspective1
AI Privacy Opinions between US and Chinese People1
Distributor Opportunism Toward the Supplier: A Social Network Perspective1
Enhancing Supply Chain through Implementation of Key IIoT Technologies1
The Role of AI in Financial Services: A Bibliometric Analysis1
Exploring Relational Needs on Using Social Network Sites1
Organizational Sustainability of Generative AI-Driven Optimization Intelligence1
Development of a Scale to Measure Cybercrime-Awareness on Social Media1
A Cognitive-Dissonance Theory Perspective in Understanding Online Shopping Journey1
Understanding Voice Shopping Value Co-Creation: A Sem-Fsqca Method1
Online Privacy Policy Disclosure: An Empirical Investigation1
Management Emotion and Firm’s Strategic IT Investment Propensity1
Effective Organizing on the Fly: Social Capital in Temporary Organizations1
An Experiment Assessing the Sequential Difficulty Effect on IT Tasks1
Exploring the Connections: Ambidexterity, Digital Capabilities, Resilience, and Behavioral Innovation1
SME Performance Through Blockchain Technologies1
Block Chain Influences on Manufacturing Collaborative Product Innovation1
Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review1
Security Education, Training, and Awareness Programs: Literature Review1
Role of Internet Self-Efficacy and Interactions on Blended Learning Effectiveness1
Understanding Continued Use Intention of AI Assistants1
Predicting Compliance of Security Policies: Norms and Sanctions1
Attributing Stealth Cyberattacks via Temporal Probabilistic Graph Neural Networks1
BYOA and Security: Examining Perspective-Taking and Self-Determination1
Understanding the Diffusion of Business Analysis Responsibilities1
It Won’t Happen to Me: Surveying SME Attitudes to Cyber-security1
Synthetic WOM? The Emergence of Generative Artificial Intelligence-Induced Recommendations1
Social Networking Continuance and Success: A Replication Study1
Effects of Student Response Systems on Learning Outcomes1
A Multi-Dimensional Nomological Network of Mobile Payment Continuance1
Examining Bitcoin and Economic Determinants: An Evolutionary Perspective1
The Security-as-a-Service Market for Small and Medium Enterprises1
Deep Learning: Differential Privacy Preservation in the Era of Big Data1
Critical Components Affecting Organizational Performance1
0.076617002487183