Journal of Computer Information Systems

Papers
(The TQCC of Journal of Computer Information Systems is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation195
The Potential of Generative Artificial Intelligence Across Disciplines: Perspectives and Future Directions89
Tapping the Next Purchase: Embracing the Wave of Mobile Payment50
Big Data, Marketing Analytics, and Firm Marketing Capabilities33
A Cyber-Security Culture Framework for Assessing Organization Readiness31
Detecting Insider Threat via a Cyber-Security Culture Framework24
Digital Transformation for Agility and Resilience: An Exploratory Study24
Towards Adoption of Generative AI in Organizational Settings23
Unlocking Pathways to Mobile Payment Satisfaction and Commitment21
What’s Stopping You from Migrating to Mobile Tourism Shopping?20
Artificial Intelligence Service Agents: Role of Parasocial Relationship18
What Determines AI Adoption in Companies? Mixed-Method Evidence17
Metaverse: Literature Review, Synthesis and Future Research Agenda14
Simulated Phishing Attack and Embedded Training Campaign14
Purchase Behavior of Consumers Toward GSAs: A Longitudinal Assessment14
A Systematic Review of Data Analytics Job Requirements and Online-Courses13
Security Education, Training, and Awareness Programs: Literature Review13
Trust in Fintech: Risk, Governance, and Continuance Intention12
Intention to Use IoT by Aged Indian Consumers12
Live Streaming Commerce: A Review and Research Agenda12
A Risk Management Tool for Agile Software Development12
The Effect of the Covid-19 Pandemic on ICT Usage by Academics11
ICT, Financial Development and Renewable Energy Consumption11
Factors Affecting Crowdfunding Success11
Information Efficiency in the Cryptocurrency Market:The Efficient-Market Hypothesis10
The Research Framework and Evolution of Service Robots10
A Semantic Model for Enterprise Digital Transformation Analysis10
Big Data in Food: Systematic Literature Review and Future Directions10
Learnings and Implications of Virtual Hackathon9
Counteracting the Impact of Online Fake News on Brands9
It Won’t Happen to Me: Surveying SME Attitudes to Cyber-security9
Blockchain for Cybersecurity: Systematic Literature Review and Classification9
SLSS Gamification as an E-Commerce Model in China8
Applications of Artificial Intelligence in Cross Docking: A Systematic Literature Review8
A Multi-Dimensional Nomological Network of Mobile Payment Continuance8
Blockchain and Deep Learning Integration for Various Application: A Review8
Deep Learning: Differential Privacy Preservation in the Era of Big Data8
Impact of Sensory Perceptions on the Urge to Buy Impulsively8
Different Perspectives on BDA Usage by Management Levels8
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea8
Technology Affordances for Enhancing Job Performance in Digital Work8
An Integrated Model of Continued M-Commerce Applications Usage8
Effect of Multi-Channel Integration on Customer Purchase Intention8
Understanding Continued Use Intention of AI Assistants8
Data Science Skills and Graduate Certificates: A Quantitative Text Analysis8
mWOM Business Strategies: Factors Affecting Recommendations8
Understanding Employee Information Security Policy Compliance from Role Theory Perspective8
Big Data in Healthcare Research: A survey study8
Machine Learning Based Product Classification for eCommerce7
Managing Users’ Behaviors on Open Content Crowdsourcing Platform7
The Role of Identity in Green IT Attitude and Intention7
Factors Influencing Customers’ Apparel Shopping Intention in Metaverse7
Digital Transformation in Healthcare: Insights on Value Creation7
Systematic Survey: Secure and Privacy-Preserving Big Data Analytics in Cloud7
Understanding Valences in Mobile Grocery Shopping: Do Consumers’ Characteristics Matter?7
Big Data Analytics Capability and Firm Performance: Meta-Analysis6
Skills Expectations in Cybersecurity: Semantic Network Analysis of Job Advertisements6
Smart Supply Chain Risk Assessment in Intelligent Manufacturing6
Digital Business and Economic Complexity6
Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors6
Simon’s Decision Phases and User Performance: An Experimental Study6
Recent Advancements in Machine Learning for Cybercrime Prediction6
Enhancing Supply Chain through Implementation of Key IIoT Technologies5
Examining AI and Systemic Factors for Improved Chatbot Sustainability5
Customer Relationships, Privacy, and Security in Social Commerce5
Blockchain Barriers in Supply Chain: A Literature Review5
Examining Bitcoin and Economic Determinants: An Evolutionary Perspective5
Managing Privacy in B2B Marketing: A Systematic Literature Review5
Designing a Secure Blockchain-Based Supply Chain Management Framework5
Management Information Systems Research: A Topic Modeling Based Bibliometric Analysis5
Self-efficacy in Information Security: A Replication Study5
An Examination of Factors Influencing Social Commerce Adoption5
Big Data Challenges in Social Sciences: An NLP Analysis4
Development of a Scale to Measure Cybercrime-Awareness on Social Media4
Employee Empowerment and HR Flexibility in Information Technology SMEs4
Bibliometric Analysis and Scientific Mapping of IoT4
Personality Types in Learning Enterprise Resource Planning (ERP) Systems4
Information Systems and Operations/Supply Chain Management: A Systematic Literature Review4
Exploring the Determinants of Blockchain Acceptance for Research Data Management4
Auditing the Governance and Management of Green IT4
Conjoint Analysis of Blockchain Adoption Challenges in Government4
Big Data and Firm Performance: An Outside-in Approach4
Construal of Social Relationships in Online Consumer Reviews4
Evolution of Information Systems Business Value Research: Topic Modeling Analysis4
Understanding Data Analytics Recommendation Execution: The Role of Recommendation Quality4
Digital Investments in Organizational Learning and Entrepreneurial Agility4
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings4
Journal of Computer Information Systems: Intellectual and Conceptual Structure4
Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach4
Understanding Rumor Combating Behavior on Social Media4
Cybersecurity in Supply Chains: Quantifying Risk4
Cybersecurity Resilience in SMEs. A Machine Learning Approach4
The Duality of Big Data in Explaining Decision-Making Quality4
When Human Meets Technology: Unlocking Hybrid Intelligence Role in Breakthrough Innovation Engagement via Self-Extension and Social Intelligence4
0.042427062988281