Journal of Information Systems

Papers
(The median citation count of Journal of Information Systems is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
An Integrative Review and Analysis of Cybersecurity Research: Current State and Future Directions27
Auditing the Blockchain Oracle Problem18
Trust but Verify: The Oracle Paradox of Blockchain Smart Contracts15
Systemizing the Challenges of Auditing Blockchain-Based Assets12
Robotic Process Automation: A Literature-Based Research Agenda10
Attended Process Automation in Audit: A Framework and A Demonstration9
Tax Specific versus Generic Accounting-Based Textual Analysis and the Relationship with Effective Tax Rates: Building Context8
Are Auditors' Reliance on Conclusions from Data Analytics Impacted by Different Data Analytic Inputs?8
Early Disruptors: Examining the Determinants and Consequences of Blockchain Early Adoption7
Classifying the Contents of Cybersecurity Risk Disclosure through Textual Analysis and Factor Analysis7
Cyber Supply Chain Risk Management: Toward an Understanding of the Antecedents to Demand for Assurance6
Using Smart Contracts to Establish Decentralized Accounting Contracts: An Example of Revenue Recognition6
Evidence on Internal Audit Quality from Transitioning to Remote Audits because of COVID-196
Forecast Cloudy—Fair or Stormy Weather: Cloud Computing Insights and Issues5
Extended XBRL Tags and Financial Analysts' Forecast Error and Dispersion4
Cloud Computing Start-ups and Emerging Technologies: From Private Investors' Perspectives4
A Measure of Firm Complexity: Data and Code4
Is User-Generated Twittersphere Activity Associated with Stock Market Reactions to 8-K Filings?4
XBRL Tag Extensions and Tax Accrual Quality4
Privacy-Preserving Information Sharing within an Audit Firm4
Digital Transformation in Accounting and Auditing: 2021 International Conference of the Journal of Information Systems Panel Discussion4
An Executable Axiomatization of the REA2 Ontology3
Firm Use of Cybersecurity Risk Disclosures3
Exploring Antecedents of Peoples' Intentions to Use Smart Services in a Smart City Environment: An Extended UTAUT Model3
A Picture is Worth a Thousand Journal Entries: Accounting Graph Topology for Auditing and Fraud Detection3
Effects of Data Visualization Choices on Psychophysiological Responses, Judgment, and Audit Quality3
Information Security Assurance and the Role of Security Configuration Management: Substantive and Symbolic Perspectives3
JISWorkshop on Robotic Process Automation (RPA) Research: Views from RPA Industry Leaders and AIS Researchers3
Report Users' Perceived Sentiments of Key Audit Matters and Firm Performance: Evidence from a Deep Learning-Based Natural Language Processing Approach3
Assessing Effects of Media Affordances and Information Security Awareness on Knowledge-Sharing in Global Software Development2
The Effect of Technological and Task Considerations on Auditors' Acceptance of Blockchain Technology2
AI and the Accounting Profession: Views from Industry and Academia2
Editors' Introduction to the Special Section on Cloud Computing and Accounting Information Systems (JISC 2018)2
Applications of Data Analytics: Cluster Analysis of Not-for-Profit Data2
An Experimental Investigation of How Self-Interested Organizational Norms Undermine Prosocial Motivation and Influence Employee Effort2
Tracking Tangible Asset Ownership and Provenance with Blockchain2
Classifying Restatements: An Application of Machine Learning and Textual Analytics1
Prioritizing IT Management Issues and Business Performance1
The Multitasking Audit Environment: The Effect of Alternative Modes of Communication on Team Performance1
Factors Affecting Employees' Susceptibility to Cyber-Attacks1
Enterprise Resource Planning Systems and XBRL Reporting Quality1
Increasing Reliance on Financial Advice with Avatars: The Effects of Competence and Complexity on Algorithm Aversion1
Cybersecurity Breaches in the Supply Chain and Earnings Management1
Big Fish, Small Pond: How In-Charge Auditors Engage with Technology-Based Audit Tools to Influence the Audit in Non-Global Network Firms1
Auditor Judgment Bias Research: A 50-Year Trend Analysis and Emerging Technology Use1
Information Processing Costs and Firms' Investment Efficiency: An Examination of Channels of the XBRL Effect1
Application of Latent Semantic Analysis in Accounting Research1
An Exploration of Bank Confirmation Process Automation: A Longitudinal Study1
A View from the CISO: Insights from the Data Classification Process1
Journal of Information SystemsWorkshop on Data Value Creation: Views from Industry and Academia1
The Impact of Audit Committee IT Expertise on Data Breaches1
Blockchain-Based Triple-Entry Accounting: A Systematic Literature Review and Future Research Agenda1
The Use of Geographic Information in Audit Data Analytics for Evidence Gathering: A Design Science Approach1
The Effect of iXBRL Formatted Financial Statements on the Effectiveness of Managers' Decisions When Making Inter-Firm Comparisons1
A Conceptual Framework toward Knowledge Ambidexterity Using Information Systems and Knowledge Management1
Cybersecurity Breach at a Big 4 Accounting Firm: Effects on Auditor Reputation1
Constituent Input on Regulatory Initiatives: A Machine-Learning Approach to Efficiently and Effectively Analyze Unstructured Data0
Reflections on the Journal of Information Systems and Suggested Future Initiatives0
Covers and Front Matter0
The Joint Effects of Argument Quality and Interactivity on Nonprofessional Investors' Perceptions of Disclosure Credibility and Investment Decisions0
Covers and Front Matter0
Covers and Front Matter0
The Informativeness of Sentiment Types in Risk Factor Disclosures: Evidence from Firms with Cybersecurity Breaches0
Covers and Front Matter0
An Accounting Classification System Using Constituency Analysis and Semantic Web Technologies0
Python Code and Illustrative Crisis Management Data from Twitter0
How Do Reporting Frequency and Analyst Perceptions of Real Activities Manipulation (RAM) Influence Managers' RAM Behavior?0
Business Strategy and Cybersecurity Breaches0
Covers and Front Matter0
Annual Editor Report0
Designing a Classifying System for Nonprofit Organizations Using Textual Contents from the Mission Statement0
Covers and Front Matter0
Editorial Policy0
Internal Auditors’ Perceptions of Information Technology-Related Risks: A Comparison Between General Auditors and Information Technology Auditors0
An Investigation of the Effects of Allegation Sources and Consequences on Corporate Directors' Responses to Whistleblowing Allegations0
Toward Automating Shredding Nonprofit XML Files: The Case of IRS Form 990 Data0
Exploring the Impact of Technology Dominance on Audit Professionalism through Data Analytic-Driven Healthcare Audits0
The Role of Construal Alignment in Enterprise Risk Management0
The Impact of CEO IT Ability on Bank Loan Terms0
Auditors’ Risk Perception of Process Control Deficiencies: A Discrete Choice Experiment0
Editorial Policy0
Does XBRL Tagging Indicate Disclosure Quality? The Relationship Between XBRL Standard and Extension Tags and Stock Return Synchronicity0
Covers and Front Matter0
Editorial Policy0
Measuring Financial Statement Disaggregation Using XBRL0
Covers and Front Matter0
The Impact of Audit Office Cybersecurity Experience on Nonbreach Client's Audit Fees and Cybersecurity Risks0
Is an Emoji Worth a Thousand Words? The Effect of Emoji Usage on Nonprofessional Investors' Perceptions0
Editorial Policy0
The Impact of Customer-Reported Cybersecurity Breaches on Key Supplier Innovations and Relationship Disruption0
Annual Editor Report0
Firm-Level Pay Disparity and Breach Risk0
Editorial Policy0
Would You Give Me Your Password?0
Editorial Policy0
The Determinants of InformationWeek 500 Selection and Its Implications: A Textual Analysis Approach0
Editorial Policy0
The Risk of Silence—How the Capital Market Penalizes Social Media Passivity0
Editorial Policy0
Publishing the Data from “The Effects of Communication Mode and Culture on Deception Detection Accuracy”0
The Impact of Blockchain Technology Adoption Announcements on Firm’s Market Value0
Covers and Front Matter0
The Effect of the Frequency and Source of Instructional Messages on Knowledge Sharing Behavior0
Covers and Front Matter0
Covers and Front Matter0
Editorial Policy0
Retail Investor Attention and Audit Pricing0
Auditors’ Categorization of Process Deviations0
Innovative and Novel Research Datasets Related to Cybersecurity Risk Disclosures: A Research Note0
#Twitter: Examining the Impact of Earnings Format Choice and Rehashing Prior Positive Information on Market Prices0
The Impact of Persuasive Response Sequence and Consistency When Information Technology Service Providers Address Auditor-Identified Issues in System and Organization Control 2 Reports0
Annual Editor Report0
Covers and Front Matter0
Editorial Policy0
Covers and Front Matter0
Annual Editor Report0
When Cash Is King—An Accounts Receivables App Accommodating Different Use Situations0
The Effect of Legal Entity Identifiers on Audit Fee Changes0
Cybersecurity Risk and Audit Pricing—A Machine Learning-Based Analysis0
0.019756078720093