Journal of Computer Information Systems

Papers
(The TQCC of Journal of Computer Information Systems is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Super App: A Multi-Analytical Cross-Country Approach on the “Everything” App357
Exploring the Determinants of Blockchain Acceptance for Research Data Management349
Organizational Traits and Social Badging: Text Mining Application106
(Un)intended Consequences of AI Sales Assistants54
Influence of Leadership Style on Information Systems Project Outcomes54
Recent Advancements in Machine Learning for Cybercrime Prediction41
Data Science with Semantic Technologies: Application to Information Systems Development36
Risk Assessment Framework Development for Mobile Banking Systems36
Why Soft Skills Matter for Women in Cybersecurity36
Does Time Matter? Examining Collective Intelligence of Virtual Groups31
Cyberspace and Personal Cyber Insurance: A Systematic Review26
Information Systems Protection Motivation with Ethical Appraisals25
ICT, Financial Development and Renewable Energy Consumption24
NLP-Driven Insights on Boutique Hotel Satisfaction23
Impact of Privacy Behaviors on Relatedness and Well-Being in SNSs23
Firm AI Adoption Intensity and Marketing Performance23
Digital Investments in Organizational Learning and Entrepreneurial Agility22
Digital Transformation for Agility and Resilience: An Exploratory Study22
The Effects of USR and Its Communication on Faculty Satisfaction22
Information Security Practices and Intervention Among Teenagers21
Spoofed Email Based Cyberattack Detection Using Machine Learning21
Cybersecurity in Supply Chains: Quantifying Risk19
Secure Share: Optimal Blockchain Integration in IoT Systems18
Predicting Insider Breaches Using Employee Reviews18
Relating Technostress and Turnover Intention: A Three-Wave Study18
Web Community Management in the Digital Era: Review17
Ethical AI in HR: A Case Study of Tech Hiring17
Social Influence, Personal Views, and Behavioral Intention in ChatGPT Adoption17
Understanding Rumor Combating Behavior on Social Media16
Determinants of Knowledge-Sharing Intentions for Shared Decision-Making Platforms16
Comparing Information Security Compliance Between New Zealand, USA, and Vietnam16
The Role of Techno-Eustress in Technology-Enhanced IT Learning16
Green IT and Corporate Social Responsibility for Sustainability16
An Empirical Study on Herd Behavior in Cryptocurrency Trading16
Performance Evaluation of Co-Channel Interference on Wireless Networks15
Managerial Perception of AI in Strategic Decision-Making15
Deterrence and Generative Artificial Intelligence Use in Universities14
Overconfidence Bias Measures and Herd Behavior on Information System Security13
Understanding Customer Readiness for Digital Gamification13
Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach13
Digital Transformation (DT) and Artificial Intelligence (AI) Convergence in Organizations13
Big Data Challenges in Social Sciences: An NLP Analysis12
ChatGPT and Me: A Dual Factor Examination12
Mobile Operating Systems’ Impact on Customer Value: IOS vs. Android12
MLOps Architecture as a Future of Machine Learning12
Tokenizing Tangible Intentions: Unraveling the Motives to Try NFTs12
Towards Adoption of Generative AI in Organizational Settings12
Deep Learning for Safeguarding Image Trustworthiness12
Privacy Vs. Personalization: GENAI’s Role in Technology Adoption12
Enhancing Educational Certificate Management and Verification with Blockchain Technology12
Beyond Scrolling: Social Media’s Impact on Creativity12
How Does Smartphone Usage Feedback Influence Mobility Behavior?11
ChatGPT: Advocacy or Opposition Through Mixed Methods11
Correction11
Leveraging Autoencoders for Better Representation Learning11
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea11
Empowering Sustainability: Cultivating Learning and Knowledge Sharing for Employee Retention10
Wireless Technologies for Environmental Monitoring: A Network Perspective10
An SEM-ANN Approach - Guidelines in Information Systems Research10
What’s Stopping You from Migrating to Mobile Tourism Shopping?10
Enhancing Supply Chain: Exploring and Exploiting AI Capabilities10
The Dual-Channel Model of Immersive Virtual Reality10
An Empirical Examination of Employee Information Security Advice Sharing9
Value of Analytics for Decision-Making: Role of Managers and Analysts9
Managing Privacy in B2B Marketing: A Systematic Literature Review9
Big Data in Food: Systematic Literature Review and Future Directions9
AI Agents and Agentic Systems: A Multi-Expert Analysis9
Cybersecurity Resilience in SMEs. A Machine Learning Approach8
Social Media Continuance from the Perspective of Commitment8
Identifying Interdisciplinary Intersections Through Analytics: Software Piracy Case8
Digital Transformation in Healthcare: Insights on Value Creation8
Teaching Programming in the 21st Century8
Understanding Data Analytics Recommendation Execution: The Role of Recommendation Quality8
Social Networking Technologies in SMEs: A Bibliometric Analysis8
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis8
Developing and Validating a Live Streaming Social Commerce Success Model8
Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors8
Process Virtualization Goes Mainstream: Diving into its Normalization8
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review8
Psychological Capital and Information Security Policy Compliance7
Establishing Consumer Trust in Social Commerce: Cognitive and Affective Appraisal7
Management Information Systems Research: A Topic Modeling Based Bibliometric Analysis7
Network Embeddedness and Company Competitiveness7
Towards a Conceptual Typology of Darknet Risks7
Exploring Personality Traits’ Impact on Risk Perception in Mobile Payments7
Towards Defining a Trustworthy Artificial Intelligence System Development Maturity Model7
Retention of Qualified Cybersecurity Professionals: A Qualitative Study7
Addressing Class Imbalances in Software Defect Detection7
An Approach-Avoidance Model of User Satisfaction and Dissatisfaction7
Consumer Segmentation and Decision: Explainable Machine Learning Insights7
Improving Software Development Traceability with Structured Prompting7
An Authentic Pedagogical Approach to Developing Information Systems Project-based Solutions7
0.24210691452026