Immersive virtual reality in the age of the Metaverse: A hybrid-narrative review based on the technology affordance perspective

E Dincelli, A Yayla - The journal of strategic information systems, 2022 - Elsevier
Immersive virtual reality (VR) that utilizes head-mounted displays (HMD) is one of the key
emerging technologies of the 21st century and has drawn keen attention from consumers …

Information security awareness and behavior: a theory-based literature review

B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …

Consumers' decisions in social commerce context: An empirical investigation

J Chen, XL Shen - Decision Support Systems, 2015 - Elsevier
With the popularity and growth of social networking, consumers often rely on the advice and
recommendations from online friends when making purchase decisions. Social commerce in …

Unveiling the dark side of social networking sites: Personal and work-related consequences of social networking site addiction

M Moqbel, N Kock - Information & Management, 2018 - Elsevier
Although previous research has explored the effects of social networking site (SNS) use in
organizations, researchers have focused little on its negative consequences. This article …

Editor's comments: an update and extension to SEM guidelines for administrative and social science research

D Gefen, EE Rigdon, D Straub - MIS quarterly, 2011 - JSTOR
The objective of this guide, therefore, is to provide a comprehensive, organized, and
contemporary summary of the minimal necessary reporting required of SEM research so that …

Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions

CL Anderson, R Agarwal - MIS quarterly, 2010 - JSTOR
Although firms are expending substantial resources to develop technology and processes
that can help safeguard the security of their computing assets, increased attention is being …

Specifying formative constructs in information systems research

S Petter, D Straub, A Rai - MIS quarterly, 2007 - JSTOR
While researchers go to great lengths to justify and prove theoretical links between
constructs, the relationship between measurement items and constructs is often ignored. By …

Toward agile: an integrated analysis of quantitative and qualitative field data on software development agility

G Lee, W Xia - MIS quarterly, 2010 - JSTOR
As business and technology environments change at an unpre cedented rate, software
development agility to respond to changing user requirements has become increasingly …

The role of extra-role behaviors and social controls in information security policy effectiveness

JSC Hsu, SP Shih, YW Hung… - Information systems …, 2015 - pubsonline.informs.org
Although most behavioral security studies focus on organizational in-role behaviors such as
information security policy (ISP) compliance, the role of organizational extra-role behaviors …

Impact of IS capabilities on firm performance: The roles of organizational agility and industry technology intensity

CM Felipe, DE Leidner, JL Roldán… - Decision …, 2020 - Wiley Online Library
Drawing on the information technology (IT)‐enabled capabilities perspective, this study
develops a model that extends our knowledge of the mechanisms through which IT …