Journal of Computer Information Systems

Papers
(The TQCC of Journal of Computer Information Systems is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings278
Influence of Leadership Style on Information Systems Project Outcomes235
Organizational Traits and Social Badging: Text Mining Application53
Correction40
Recent Advancements in Machine Learning for Cybercrime Prediction35
Auditing the Governance and Management of Green IT32
(Un)intended Consequences of AI Sales Assistants31
An Examination of Factors Influencing Social Commerce Adoption30
Exploring the Determinants of Blockchain Acceptance for Research Data Management29
Spoofed Email Based Cyberattack Detection Using Machine Learning29
Data Science with Semantic Technologies: Application to Information Systems Development22
The Effects of USR and Its Communication on Faculty Satisfaction22
Digital Investments in Organizational Learning and Entrepreneurial Agility21
Cyberspace and Personal Cyber Insurance: A Systematic Review20
Firm AI Adoption Intensity and Marketing Performance19
Digital Transformation for Agility and Resilience: An Exploratory Study18
Why Soft Skills Matter for Women in Cybersecurity18
Impact of Privacy Behaviors on Relatedness and Well-Being in SNSs17
Does Time Matter? Examining Collective Intelligence of Virtual Groups17
ICT, Financial Development and Renewable Energy Consumption16
NLP-Driven Insights on Boutique Hotel Satisfaction16
Understanding Failed Software Projects through Forensic Analysis16
Ethical AI in HR: A Case Study of Tech Hiring15
Information Security Practices and Intervention Among Teenagers15
Identity Sharing and Adaptive Personalization Influencing Online Repurchases15
Cybersecurity in Supply Chains: Quantifying Risk14
Social Influence, Personal Views, and Behavioral Intention in ChatGPT Adoption14
Predicting Insider Breaches Using Employee Reviews14
Secure Share: Optimal Blockchain Integration in IoT Systems14
Relating Technostress and Turnover Intention: A Three-Wave Study14
Understanding Rumor Combating Behavior on Social Media13
Comparing Information Security Compliance Between New Zealand, USA, and Vietnam13
Web Community Management in the Digital Era: Review13
Swift Trust and Sensemaking in Fast Response Virtual Teams13
Managerial Perception of AI in Strategic Decision-Making12
An Empirical Study on Herd Behavior in Cryptocurrency Trading12
Green IT and corporate social responsibility for sustainability12
Determinants of Knowledge-Sharing Intentions for Shared Decision-Making Platforms11
A Systematic Review of Data Analytics Job Requirements and Online-Courses11
The Role of Techno-Eustress in Technology-Enhanced IT Learning11
Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach10
Digital Transformation (DT) and Artificial Intelligence (AI) Convergence in Organizations10
Enhancing Educational Certificate Management and Verification with Blockchain Technology10
Performance Evaluation of Co-Channel Interference on Wireless Networks10
Reactions to Abusive Supervision: Neutralization and IS Misuse10
Understanding Customer Readiness for Digital Gamification10
Tokenizing Tangible Intentions: Unraveling the Motives to Try NFTs10
Towards Adoption of Generative AI in Organizational Settings9
Deterrence and Generative Artificial Intelligence Use in Universities9
Optimization of Organizational Design9
Mobile Operating Systems’ Impact on Customer Value: IOS vs. Android9
Exploration and Exploitation in Organizational Cybersecurity8
The Research Framework and Evolution of Service Robots8
Investigating Antecedents of Adoption Intention for Audiobook Applications8
MLOps Architecture as a Future of Machine Learning8
Leveraging Autoencoders for Better Representation Learning8
ChatGPT: Advocacy or Opposition Through Mixed Methods8
How Does Smartphone Usage Feedback Influence Mobility Behavior?8
Big Data Challenges in Social Sciences: An NLP Analysis8
The Role of Identity in Green IT Attitude and Intention8
Correction8
An Empirical Examination of Employee Information Security Advice Sharing8
What’s Stopping You from Migrating to Mobile Tourism Shopping?7
Wireless Technologies for Environmental Monitoring: A Network Perspective7
Enhancing Supply Chain: Exploring and Exploiting AI Capabilities7
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review7
Empowering Sustainability: Cultivating Learning and Knowledge Sharing for Employee Retention7
Big Data in Food: Systematic Literature Review and Future Directions7
AI Agents and Agentic Systems: A Multi-Expert Analysis7
Managing Privacy in B2B Marketing: A Systematic Literature Review7
The Dual-Channel Model of Immersive Virtual Reality7
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea7
An SEM-ANN Approach - Guidelines in Information Systems Research7
Value of Analytics for Decision-Making: Role of Managers and Analysts6
Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors6
Digital Transformation in Healthcare: Insights on Value Creation6
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis6
Social Networking Technologies in SMEs: A Bibliometric Analysis6
Cybersecurity Resilience in SMEs. A Machine Learning Approach6
Teaching Programming in the 21st Century6
Creative Software Development with Team Boundary Management6
SLSS Gamification as an E-Commerce Model in China6
Developing and Validating a Live Streaming Social Commerce Success Model6
Understanding Data Analytics Recommendation Execution: The Role of Recommendation Quality5
An Authentic Pedagogical Approach to Developing Information Systems Project-based Solutions5
Addressing Class Imbalances in Software Defect Detection5
Social Media Continuance from the Perspective of Commitment5
Towards a Conceptual Typology of Darknet Risks5
Improving Software Development Traceability with Structured Prompting5
Effect of Multi-Channel Integration on Customer Purchase Intention5
Identifying Interdisciplinary Intersections Through Analytics: Software Piracy Case5
Towards Defining a Trustworthy Artificial Intelligence System Development Maturity Model5
Establishing Consumer Trust in Social Commerce: Cognitive and Affective Appraisal5
Process Virtualization Goes Mainstream: Diving into its Normalization5
Simulated Phishing Attack and Embedded Training Campaign5
0.044458150863647