Journal of Computer Information Systems

Papers
(The median citation count of Journal of Computer Information Systems is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Super App: A Multi-Analytical Cross-Country Approach on the “Everything” App357
Exploring the Determinants of Blockchain Acceptance for Research Data Management349
Organizational Traits and Social Badging: Text Mining Application106
(Un)intended Consequences of AI Sales Assistants54
Influence of Leadership Style on Information Systems Project Outcomes54
Recent Advancements in Machine Learning for Cybercrime Prediction41
Why Soft Skills Matter for Women in Cybersecurity36
Data Science with Semantic Technologies: Application to Information Systems Development36
Risk Assessment Framework Development for Mobile Banking Systems36
Does Time Matter? Examining Collective Intelligence of Virtual Groups31
Cyberspace and Personal Cyber Insurance: A Systematic Review26
Information Systems Protection Motivation with Ethical Appraisals25
ICT, Financial Development and Renewable Energy Consumption24
Firm AI Adoption Intensity and Marketing Performance23
NLP-Driven Insights on Boutique Hotel Satisfaction23
Impact of Privacy Behaviors on Relatedness and Well-Being in SNSs23
The Effects of USR and Its Communication on Faculty Satisfaction22
Digital Investments in Organizational Learning and Entrepreneurial Agility22
Digital Transformation for Agility and Resilience: An Exploratory Study22
Spoofed Email Based Cyberattack Detection Using Machine Learning21
Information Security Practices and Intervention Among Teenagers21
Cybersecurity in Supply Chains: Quantifying Risk19
Relating Technostress and Turnover Intention: A Three-Wave Study18
Secure Share: Optimal Blockchain Integration in IoT Systems18
Predicting Insider Breaches Using Employee Reviews18
Social Influence, Personal Views, and Behavioral Intention in ChatGPT Adoption17
Web Community Management in the Digital Era: Review17
Ethical AI in HR: A Case Study of Tech Hiring17
Green IT and Corporate Social Responsibility for Sustainability16
An Empirical Study on Herd Behavior in Cryptocurrency Trading16
Understanding Rumor Combating Behavior on Social Media16
Determinants of Knowledge-Sharing Intentions for Shared Decision-Making Platforms16
Comparing Information Security Compliance Between New Zealand, USA, and Vietnam16
The Role of Techno-Eustress in Technology-Enhanced IT Learning16
Managerial Perception of AI in Strategic Decision-Making15
Performance Evaluation of Co-Channel Interference on Wireless Networks15
Deterrence and Generative Artificial Intelligence Use in Universities14
Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach13
Digital Transformation (DT) and Artificial Intelligence (AI) Convergence in Organizations13
Overconfidence Bias Measures and Herd Behavior on Information System Security13
Understanding Customer Readiness for Digital Gamification13
Enhancing Educational Certificate Management and Verification with Blockchain Technology12
Beyond Scrolling: Social Media’s Impact on Creativity12
Big Data Challenges in Social Sciences: An NLP Analysis12
ChatGPT and Me: A Dual Factor Examination12
Mobile Operating Systems’ Impact on Customer Value: IOS vs. Android12
MLOps Architecture as a Future of Machine Learning12
Tokenizing Tangible Intentions: Unraveling the Motives to Try NFTs12
Towards Adoption of Generative AI in Organizational Settings12
Deep Learning for Safeguarding Image Trustworthiness12
Privacy Vs. Personalization: GENAI’s Role in Technology Adoption12
Leveraging Autoencoders for Better Representation Learning11
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea11
How Does Smartphone Usage Feedback Influence Mobility Behavior?11
ChatGPT: Advocacy or Opposition Through Mixed Methods11
Correction11
Enhancing Supply Chain: Exploring and Exploiting AI Capabilities10
The Dual-Channel Model of Immersive Virtual Reality10
Empowering Sustainability: Cultivating Learning and Knowledge Sharing for Employee Retention10
Wireless Technologies for Environmental Monitoring: A Network Perspective10
An SEM-ANN Approach - Guidelines in Information Systems Research10
What’s Stopping You from Migrating to Mobile Tourism Shopping?10
Big Data in Food: Systematic Literature Review and Future Directions9
AI Agents and Agentic Systems: A Multi-Expert Analysis9
An Empirical Examination of Employee Information Security Advice Sharing9
Value of Analytics for Decision-Making: Role of Managers and Analysts9
Managing Privacy in B2B Marketing: A Systematic Literature Review9
Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors8
Process Virtualization Goes Mainstream: Diving into its Normalization8
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review8
Cybersecurity Resilience in SMEs. A Machine Learning Approach8
Social Media Continuance from the Perspective of Commitment8
Identifying Interdisciplinary Intersections Through Analytics: Software Piracy Case8
Digital Transformation in Healthcare: Insights on Value Creation8
Teaching Programming in the 21st Century8
Understanding Data Analytics Recommendation Execution: The Role of Recommendation Quality8
Social Networking Technologies in SMEs: A Bibliometric Analysis8
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis8
Developing and Validating a Live Streaming Social Commerce Success Model8
Establishing Consumer Trust in Social Commerce: Cognitive and Affective Appraisal7
Addressing Class Imbalances in Software Defect Detection7
Consumer Segmentation and Decision: Explainable Machine Learning Insights7
An Authentic Pedagogical Approach to Developing Information Systems Project-based Solutions7
Towards Defining a Trustworthy Artificial Intelligence System Development Maturity Model7
Psychological Capital and Information Security Policy Compliance7
Management Information Systems Research: A Topic Modeling Based Bibliometric Analysis7
Network Embeddedness and Company Competitiveness7
An Approach-Avoidance Model of User Satisfaction and Dissatisfaction7
Improving Software Development Traceability with Structured Prompting7
Towards a Conceptual Typology of Darknet Risks7
Exploring Personality Traits’ Impact on Risk Perception in Mobile Payments7
Retention of Qualified Cybersecurity Professionals: A Qualitative Study7
Modeling Escapism and Immersive Experience in the Metaverse6
Blockchain based Sensor System Design For Embedded IoT6
Critical Digital Data Enabling Traceability for Smart Honey Value Chains6
FinTech Cybersecurity Challenges and Regulations: Bahrain Case Study6
Skills Expectations in Cybersecurity: Semantic Network Analysis of Job Advertisements6
Immersive Metaverse Learning for Children’s Cyber Harm Awareness6
Examining Digital Nudges to Influence Pro-Environmental Behavior6
Unveiling the Potential of Corporate Digital Responsibility (CDR)5
Do Life-cycle and Generation Moderate Sentiment and Diffusion?5
Legal and Privacy Concerns of BYOD Adoption5
Achieving Industry-aligned Education through Digital-Commons: A Case Study5
Generative AI: Current Status and Future Directions5
Cyber-Espionage Malware Attacks Detection and Analysis: A Case Study5
Navigating Cybersecurity: Environment’s Impact on Standards Adoption and Board Involvement5
Examining Users’ Contribution in Open Source Software Communities5
Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation5
Dual Routes of Training on Information Security Policy Compliance5
Driving Industrial Digital Transformation5
Establishing Antecedents and Outcomes of Human-AI Collaboration: Meta-Analysis5
The Influence of Website Social Cues: A Cross-Culture Comparison5
Designing a Secure Blockchain-Based Supply Chain Management Framework5
Using Web Frameworks in Server Side Programming Courses5
Risk Assessment on Green Supply Chains in Manufacturing5
Journal of Computer Information Systems: Intellectual and Conceptual Structure5
What Determines AI Adoption in Companies? Mixed-Method Evidence5
Chatbot Anthropomorphism, Social Presence, Uncanniness and Brand Attitude Effects5
Reimagining Automotive Manufacturing with Generative AI: A Technology-Organization-Environment Perspective4
Hard Skill Gap between University Education and the Robotic Industry4
Expectation-Reality Gap in Information Technology Discontinuance Intention4
AI Adoption, Audit Outcomes, and Professional Reputation4
Exploring Boundary Violations Among Remote Workers with ICTs4
Distress, Eustress, and Continuance Intentions for Distance Learners4
Documenting Women’s Digital Movements: A Preliminary Repository4
Models of Information Technology Use: Meta-Review and Research Directions4
Multiple Social Media in Practice – Investigating Emergent Work Practices4
Information Quality of Investment Services with Social Media4
Self-efficacy in Information Security: A Replication Study4
Cloud Computing Risk: A Decision-making Framework4
Is ChatGPT Enhancing Youth’s Learning, Engagement and Satisfaction?4
Correction4
A Configurational Approach to CSP Selection and Rejection4
Factors Influencing Customers’ Apparel Shopping Intention in Metaverse4
Business-Driven Data Recommender System: Design and Implementation4
Determinants of Software as a Service (SaaS) Adoption4
Ensemble-Based Framework for Fake News Detection in Social-Media4
What Drives Users’ Removal Behavior of Mobile Apps4
Client Peripheral Knowledge and Outsourcing Project Outcomes3
Consumers’ Continuance Intention Toward Online Shopping Apps: An Integrated Model3
IoT and Blockchain: A Review and a Technical-Legal-Social Acceptance Model3
Predictors of Success in Information Security Policy Compliance3
The Subjectivity of Data Scientists in Machine Learning Design3
Metaverse: Literature Review, Synthesis and Future Research Agenda3
Differential Privacy-Preserving IoT Data Sharing Through Enhanced PSO3
Users’ Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review3
Blockchain for Cybersecurity: Systematic Literature Review and Classification3
Blockchain Barriers in Supply Chain: A Literature Review3
Digital Business and Economic Complexity3
Improving National Digital Identity Systems Usage: Human-Centric Cybersecurity Survey3
IT Workplace Preferences, Job Demands, and Work Exhaustion3
Database Chatbot Success: User-Centered Design With LLMs3
Exploring the Connections: Ambidexterity, Digital Capabilities, Resilience, and Behavioral Innovation3
Why Do Users Stay with Generative Artificial Intelligence?3
Adoption of Augmented Reality Applications for Online shopping: A Multi-Perspective Investigation3
Blockchain and Deep Learning Integration for Various Application: A Review3
Factors Influencing ChatGpt Adoption for Product Research and Information Retrieval3
When AI Is Wrong: Addressing Liability Challenges in Women’s Healthcare3
Individual Creativity and Acceptance of Emerging Information Technology3
Retail Demand Forecasting Using Spatial-Temporal Gradient Boosting Methods3
Using Social Media in Projects: Information Management Challenges and Recommendations3
Bridging Academia and Practice with Digital Boundary Objects3
The Impact of Self-Perceived Facial Attractiveness on Webcam Use3
Unpacking the Drivers of AI Technology Acceptance3
Exploring Stimulus to Consumers’ Virtual Shopping Environment in the Metaverse3
Examining AI and Systemic Factors for Improved Chatbot Sustainability3
Bibliometric Analysis and Scientific Mapping of IoT3
A Benchmark Comparison of a Domain-Focused Pipeline with ChatGPT2
A Multi-Dimensional Nomological Network of Mobile Payment Continuance2
SME Performance Through Blockchain Technologies2
Strategic Responses to Digital Disruption in Incumbent Firms – A Strategy-as-Practice Perspective2
Understanding Continued Use Intention of AI Assistants2
A Cognitive-Dissonance Theory Perspective in Understanding Online Shopping Journey2
Hotspots and Prospects of Metaverse: An International Comparison2
Attributing Stealth Cyberattacks via Temporal Probabilistic Graph Neural Networks2
Applications of Artificial Intelligence in Cross Docking: A Systematic Literature Review2
Live Streaming Commerce: A Review and Research Agenda2
Management Emotion and Firm’s Strategic IT Investment Propensity2
Online Privacy Policy Disclosure: An Empirical Investigation2
Adaptable Security Maturity Assessment and Standardization for Digital SMEs2
Understanding Voice Shopping Value Co-Creation: A Sem-Fsqca Method2
Effective Organizing on the Fly: Social Capital in Temporary Organizations2
Organizational Sustainability of Generative AI-Driven Optimization Intelligence2
Social Networking Continuance and Success: A Replication Study2
Electronic Propinquity: Design Characteristics and Task Complexity in Information Sources2
Insider Intrusion Detection Techniques: A State-of-the-Art Review2
The Impact of Network Effects on Online Music Listening Behaviors2
Effects of Student Response Systems on Learning Outcomes2
Assessing the Impact of Accounting Analytic Capabilities on Firm Performance2
Bad Employees: Examining Deviant Security Behaviors2
It Won’t Happen to Me: Surveying SME Attitudes to Cyber-security2
The Effect of the Covid-19 Pandemic on ICT Usage by Academics2
Organizational Impact of AI-Driven Recruitment Practices: A Mixed‑Methods Study2
Block Chain Influences on Manufacturing Collaborative Product Innovation2
Distributor Opportunism Toward the Supplier: A Social Network Perspective2
Antecedents and Outcomes of Blockchain Technology Adoption: Meta-Analysis2
Data and IT Systems Security in Contemporary Organizations2
The Role of AI in Financial Services: A Bibliometric Analysis2
0.35083603858948