Journal of Computer Information Systems

Papers
(The TQCC of Journal of Computer Information Systems is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation110
Tapping the Next Purchase: Embracing the Wave of Mobile Payment41
Do We Trust in AI? Role of Anthropomorphism and Intelligence35
Big Data, Marketing Analytics, and Firm Marketing Capabilities29
A Cyber-Security Culture Framework for Assessing Organization Readiness27
How Perceived Pressure Affects Users’ Social Media Fatigue Behavior: A Case on WeChat26
Detecting Insider Threat via a Cyber-Security Culture Framework20
Digital Transformation for Agility and Resilience: An Exploratory Study18
The Potential of Generative Artificial Intelligence Across Disciplines: Perspectives and Future Directions18
How Repurchase Intention Is Affected in Social Commerce?: An Empirical Study16
What’s Stopping You from Migrating to Mobile Tourism Shopping?15
Perceived Control and Perceived Risk in Self-service Technology Recovery13
Unlocking Pathways to Mobile Payment Satisfaction and Commitment13
Employees’ Behavior in Phishing Attacks: What Individual, Organizational, and Technological Factors Matter?12
A Risk Management Tool for Agile Software Development12
Social Networking Sites and Researcher’s Success12
Intention to Use IoT by Aged Indian Consumers12
Online Reviews: What Drives Consumers to Use Them11
Simulated Phishing Attack and Embedded Training Campaign11
Artificial Intelligence Service Agents: Role of Parasocial Relationship11
How Social Media Analytics Can Inform Content Strategies11
Factors Influencing Consumers’ Participation in Social Commerce11
Towards Adoption of Generative AI in Organizational Settings10
Purchase Behavior of Consumers Toward GSAs: A Longitudinal Assessment10
Security Education, Training, and Awareness Programs: Literature Review10
A Systematic Review of Data Analytics Job Requirements and Online-Courses9
What Determines AI Adoption in Companies? Mixed-Method Evidence9
The Effect of the Covid-19 Pandemic on ICT Usage by Academics9
A Semantic Model for Enterprise Digital Transformation Analysis9
Information Efficiency in the Cryptocurrency Market:The Efficient-Market Hypothesis9
Counteracting the Impact of Online Fake News on Brands8
The Research Framework and Evolution of Service Robots8
Learnings and Implications of Virtual Hackathon8
Users’ Knowledge Sharing on Social Networking Sites8
Understanding Employee Information Security Policy Compliance from Role Theory Perspective7
Managing Users’ Behaviors on Open Content Crowdsourcing Platform7
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea7
Obstacles of On-Premise Enterprise Resource Planning Systems and Solution Directions7
mWOM Business Strategies: Factors Affecting Recommendations7
Empirical Study on Initial Trust of Wearable Devices Based on Product Characteristics7
Big Data in Food: Systematic Literature Review and Future Directions7
Understanding the Use of Knowledge Sharing Tools7
Machine Learning Based Product Classification for eCommerce7
ICT, Financial Development and Renewable Energy Consumption7
Data Science Skills and Graduate Certificates: A Quantitative Text Analysis7
Understanding Social Media Monitoring and Online Rumors6
Factors Affecting Crowdfunding Success6
Trust in Fintech: Risk, Governance, and Continuance Intention6
Simon’s Decision Phases and User Performance: An Experimental Study6
A Multi-Dimensional Nomological Network of Mobile Payment Continuance6
Repurchase Intention in Online Knowledge Service: The Brand Awareness Perspective6
SLSS Gamification as an E-Commerce Model in China6
It Won’t Happen to Me: Surveying SME Attitudes to Cyber-security6
Blockchain for Cybersecurity: Systematic Literature Review and Classification6
Factors Influencing Consumer Adoption of Electronic Health Records5
Digital Business and Economic Complexity5
Understanding Valences in Mobile Grocery Shopping: Do Consumers’ Characteristics Matter?5
Different Perspectives on BDA Usage by Management Levels5
The Role of Identity in Green IT Attitude and Intention5
Big Data in Healthcare Research: A survey study5
Understanding Continued Use Intention of AI Assistants5
Smart Supply Chain Risk Assessment in Intelligent Manufacturing5
Deep Learning: Differential Privacy Preservation in the Era of Big Data5
Effect of Multi-Channel Integration on Customer Purchase Intention5
Confucian Values, Social Fear, and Knowledge Sharing in Korean Organizations5
An Examination of Factors Influencing Social Commerce Adoption5
Metaverse: Literature Review, Synthesis and Future Research Agenda4
Blockchain Barriers in Supply Chain: A Literature Review4
Understanding Data Analytics Recommendation Execution: The Role of Recommendation Quality4
Self-efficacy in Information Security: A Replication Study4
Digital Transformation in Healthcare: Insights on Value Creation4
Effect of Competitors’ eWOM in the Mobile Game Market4
Designing a Secure Blockchain-Based Supply Chain Management Framework4
Skills Expectations in Cybersecurity: Semantic Network Analysis of Job Advertisements4
Evolution of Information Systems Business Value Research: Topic Modeling Analysis4
Examining Bitcoin and Economic Determinants: An Evolutionary Perspective4
Applications of Artificial Intelligence in Cross Docking: A Systematic Literature Review4
Exploring the Determinants of Blockchain Acceptance for Research Data Management4
Trust Decision-Making in Online Social Communities: A Network-Based Model4
Story Analysis Using Natural Language Processing and Interactive Dashboards4
Understanding Rumor Combating Behavior on Social Media4
Digital OER Impact on Learning Outcomes for Social Inclusion4
Traditional and New ICT Spending and Its Impact on Economy4
Digital Investments in Organizational Learning and Entrepreneurial Agility4
Customer Relationships, Privacy, and Security in Social Commerce4
Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance4
Technology Affordances for Enhancing Job Performance in Digital Work4
0.023940801620483