Article | Form of Contribution | Theoretical Sampling | Role of Prior Theory .d | Open Coding | Axial Coding | Selective Coding | Theoretical Coding | Constant Comparison | Memoing | Coding Paradigm | GTM Approach | GTM Adaptions | Core Category | Duration (Months) | Citations per Year .c | Total Citations .c |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Barrett and Walsham 1999 | Tb | S | 34 | 1388 | 222 | |||||||||||
Maznevski and Chudoba 2000 | Tb | a | a | a | a | S | 21 | 9707 | 1456 | |||||||
Larsen et al 2009 | Tb | S | 450 | 26 | ||||||||||||
Goulielmos 2004 | T | S | 418 | 46 | ||||||||||||
Boudreau and Robey 2005 | T | S | 15 | 629 | 629 | |||||||||||
Volkoff et al. 2007 | T | a | S | 36 | 2838 | 227 | ||||||||||
Ransbotham and Mitra 2009 | T | S | 3-4a | 1217 | 73 | |||||||||||
Strong and Volkoff 2010 | T | S | 36 | 3100 | 155 | |||||||||||
Abraham et al. 2013 | T | b | a | a | S | b | 20 | 400 | 8 | |||||||
Gasson and Waters 2013 | T | G | 2,5 | 50 | 10 | |||||||||||
Corbett and Mellouli 2017 | T | S | 12 | |||||||||||||
Gregory et al. 2015 | T | G | 24 | |||||||||||||
Bensaou et al. 2014 | T | GS | 16 | |||||||||||||
Shaw 2014 | T | S | ||||||||||||||
Gregory et al. 2013 | T | 2G | 53 | |||||||||||||
Mattarelli et al. 2013 | T | S | 24 | |||||||||||||
Nidhra et al. 2013 | T | S | ||||||||||||||
Dougherty & Dunne 2012 | T | S | 36 | |||||||||||||
Zahedi and Bansal 2011 | T | S | ||||||||||||||
Vannoy and Salam 2010 | T | S | ||||||||||||||
Gerlach et al 2018 | T | G | ||||||||||||||
Hansen and Baroody 2019 | T | S | ||||||||||||||
Zamani and Pouloudi 2020 | T | 2G | 74 | |||||||||||||
Miceli et al 2020 | T | 2G | ||||||||||||||
Barber and Bettez 2020 | T | S | ||||||||||||||
Wiedemann et al 2020 | T | G | ||||||||||||||
Gerlach and Cenfetelli 2020 | T | 2G | ||||||||||||||
Gregory et al. 2018 | T | GS | 60 | |||||||||||||
Krancher et al. 2018 | T | 2G | ||||||||||||||
Smolander et al. 2008 | Mb | S | a | 12 | 471 | 33 | ||||||||||
Huff and Munro 1985 | M | a | a | a | Ga | a | 9a | 643 | 193 | |||||||
Orlikowski 1993 | M | S | 690 | 1518 | ||||||||||||
Crook and Kumar 1998 | M | S | 1312 | 223 | ||||||||||||
Scott 2000 | M | S | 6 | 2280 | 342 | |||||||||||
Scott and Kaindl 2000 | M | S | 18 | 1127 | 169 | |||||||||||
Lee 2001 | M | S | 6 | 105 | 147 | |||||||||||
Fabricatore et al. 2002 | M | a | a | a | a | S | 14a | 1131 | 147 | |||||||
Levina and Ross 2003 | M | a | a | a | S | a | 40a | 5383 | 646 | |||||||
Nasirin and Birks 2003 | M | GS | 25 | 30 | ||||||||||||
Sherif and Vinze 2003 | M | S | 533 | 64 | ||||||||||||
Smith and Kumar 2004 | M | S | 1164 | 128 | ||||||||||||
Shah 2006 | M | S | 660 | 594 | ||||||||||||
Espinosa et al. 2007 | M | S | 3075 | 246 | ||||||||||||
Xu and Ramesh 2007 | M | S | 438 | 35 | ||||||||||||
Day et al. 2007 | M | S | 1067 | 64 | ||||||||||||
Palka et al. 2009 | M | S | 15 | 1850 | 111 | |||||||||||
Chalkraborty et al. 2010 | M | a | a | S | a | 40a | 1440 | 72 | ||||||||
Qiu et al. 2017 | M | GS | 20 | |||||||||||||
Miranda et al. 2015 | M | G | 72 | |||||||||||||
Montazemi and Qahri-Saremi 2015 | M | 2G | ||||||||||||||
Sadovykh et al. 2015 | M | GS | ||||||||||||||
Hinds & Cramton 2014 | M | 2G | ||||||||||||||
Lin et al. 2014 | M | S | ||||||||||||||
Austin et al. 2012 | M | 2G | ||||||||||||||
Edberg et al. 2012 | M | 2G | 24 | |||||||||||||
Galliers and Huang 2012 | M | GS | 3 | |||||||||||||
Lin et al. 2012 | M | GS | ||||||||||||||
Berente et al. 2011 | M | S | ||||||||||||||
Boldosova 2019 | M | S | ||||||||||||||
Senyo et al 2019 | M | 2G | ||||||||||||||
Taylor et al 2019 | M | 2G | 3 | |||||||||||||
Carugati et al. 2018 | M | G | 48 | |||||||||||||
Ghobadi and Mathiassen 2017 | M | GS | 12 | |||||||||||||
Huang et al. 2017 | M | S | 8 | |||||||||||||
Liu et al. 2017 | M | S | 120 | |||||||||||||
Parks et al. 2017 | M | 2G | 18 | |||||||||||||
Seeley and Targett 1997 | D | S | 117 | 21 | ||||||||||||
De Vreede et al. 1998 | D | S | 24 | 812 | 138 | |||||||||||
Seeley and Targett 1999 | D | S | 369 | 59 | ||||||||||||
Jones and Hughes 2001 | D | S | 886 | 124 | ||||||||||||
Slack and Rowley 2002 | D | S | 2 | 285 | 37 | |||||||||||
Debreceny et al. 2003 | D | S | 300 | 36 | ||||||||||||
Lander et al. 2004 | D | S | 1409 | 155 | ||||||||||||
Volkoff et al. 2005 | D | a | Ga | a | 36 | 1100 | 110 | |||||||||
Zahedi et al. 2006 | D | G | 400 | 36 | ||||||||||||
Hackney et al. 2007 | D | S | 513 | 41 | ||||||||||||
Tschang 2007 | D | GS | 36 | 1663 | 133 | |||||||||||
Kesseler 2008 | D | GS | 56 | 286 | 20 | |||||||||||
Ribes and Finholt 2009 | D | a | 2G | a | 56 | 1783 | 107 | |||||||||
Chang et al. 2011 | D | S | 325 | 13 | ||||||||||||
Lederman and Johnston 2011 | D | S | 25 | 10 | ||||||||||||
Mueller et al 2018 | D | S | 9 | |||||||||||||
Feuston et al 2020 | D | 2G | 24 |
Does apply | T Theory |
Does apply partially/indicated | M Model |
Other | D Description |
Not reported | GS Glaser und Strauss (1967) |
a Change after contacting the authors based on additional information | S Straussian |
b Change after contacting the authors based on false coding | G Glaserian |
c Citations from Google Scholar as of Spring 2015 | 2G 2nd generation (e.g. Clarke) |
d Reverse coding |
References:
Abdel-Hamid, T. K. (1989). “A Study of Staff Turnover, Acquisition, and Assimiliation and Their Impact on Software Development Cost and Schedule.” Journal of Management Information Systems 6(1): 21-40.
Abhay Nath, M., A. Catherine and R. Agarwal (2012). “Electronic Health Records Assimilation and Physician Identity Evolution: An Identity Theory Perspective.” Information Systems Research 23(3): 738-760.
Abraham, C., M.-C. Boudreau, I. Junglas and R. Watson (2013). “Enriching our Theoretical Repertoire: The Role of Evolutionary Psychology in Technology Acceptance.” European Journal of Information Systems 22(1): 56-75.
Austin, R. D., L. Devin and E. E. Sullivan (2012). “Accidental Innovation: Supporting Valuable Unpredictability in the Creative Process.” Organization Science 23(5): 1505-1522.
Barber, C. S. and S. C. Bettez (2020). “Exposing patterns of adult solicitor behaviour: towards a theory of control within the cybersexual abuse of youth.” European Journal of Information Systems.
Barrett, M. and G. Walsham (1999). “Electronic Trading and Work Transformation in the London Insurance Market.” Information Systems Research 10(1): 1-22.
Beck, T. E. and D. A. Plowman (2014). “Temporary, Emergent Interorganizational Collaboration in Unexpected Circumstances: A Study of the Columbia Space Shuttle Response Effort.” Organization Science 25(4): 1234-1252.
Bensaou, B. M., C. Galunic and C. Jonczyk-Sédès (2014). “Players and Purists: Networking Strategies and Agency of Service Professionals.” Organization Science 25(1): 29-56.
Bercovitz, J. E. L. and B. B. Tyler (2014). “Who I Am and How I Contract: The Effect of Contractors’ Roles on the Evolution of Contract Structure in University-Industry Research Agreements.” Organization Science 25(6): 1840-1859.
Berente, N., S. Hansen, J. C. Pike and P. J. Bateman (2011). “Arguing the Value of Virtual Worlds: Patterns of Discursive Sensemaking of an Innovative Technology.” MIS Quarterly 35(3): 685-709.
Berente, N., S. Seidel and H. Safadi (2018). “Research Commentary—Data-Driven Computationally Intensive Theory Development.” Information Systems Research.
Berente, N., S. Seidel and H. Safadi (2019). “Research Commentary—Data-Driven Computationally Intensive Theory Development.” Information Systems Research 30(1): 50-64.
Boldosova, V. (2019). “Deliberate storytelling in big data analytics adoption.” Information Systems Journal 29(6): 1126-1152.
Boudreau, M.-C. and D. Robey (2005). “Enacting Integrated Information Technology: A Human Agency Perspective.” Organization Science 16(1): 3-18.
Carugati, A., W. Fernández, L. Mola and C. Rossignoli (2018). “My choice, your problem? Mandating IT use in large organisational networks.” Information Systems Journal 28(1): 6-47.
Chakraborty, S., S. Sarker and S. Sarker (2010). “An Exploration into the Process of Requirements Elicitation: A Grounded Approach.” Journal of the Association for Information Systems 11(4): 212-249.
Chang, C. L.-H., V. Chen, G. Klein and J. J. Jiang (2011). “Information System Personnel Career Anchor Changes Leading to Career Changes.” European Journal of Information Systems 20(1): 103-117.
Corbett, J. and S. Mellouli (2017). “Winning the SDG Battle in Cities: How an Integrated Information Ecosystem Can Contribute to the Achievement of the 2030 Sustainable Development Goals.” Information Systems Journal 27(4): 427-461.
Crook, C. W. and R. L. Kumar (1998). “Electronic Data Interchange: A Multi-Industry Investigation using Grounded Theory.” Information & Management 34(2): 75-89.
Day, J. M., I. Junglas and L. Silva (2009). “Information Flow Impediments in Disaster Relief Supply Chains.” Journal of the Association for Information Systems 10(8): 637-660.
De Vreede, G.-J., N. Jones and R. J. Mgaya (1998). “Exploring the Application and Acceptance of Group Support Systems in Africa.” Journal of Management Information Systems 15(3): 197-234.
Debreceny, R., M. Putterill, L.-L. Tung and A. L. Gilbert (2003). “New Tools for the Determination of e-Commerce Inhibitors.” Decision Support Systems 34(2): 177-195.
Dougherty, D. and D. D. Dunne (2012). “Digital Science and Knowledge Boundaries in Complex Innovation.” Organization Science 23(5): 1467-1484.
Edberg, D., P. Ivanova and W. Kuechler (2012). “Methodology Mashups: An Exploration of Processes Used to Maintain Software.” Journal of Management Information Systems 28(4): 271-304.
Espinosa, J. A., S. A. Slaughter, R. E. Kraut and J. D. Herbsleb (2007). “Team Knowledge and Coordination in Geographically Distributed Software Development.” Journal of Management Information Systems 24(1): 135-169.
Fabricatore, C., M. Nussbaum and R. Rosas (2002). “Playability in Action Videogames: A Qualitative Design Model.” Human-Computer Interaction 17(4): 311-368.
Feuston, J. L., A. S. Taylor and A. M. Piper (2020). “Conformity of Eating Disorders through Content Moderation.” Human-Computer Interaction 4: 1-28.
Galliers, R. D. and J. C. Huang (2012). “The Teaching of Qualitative Research Methods in Information Systems: an Explorative Study Utilizing Learning Theory.” European Journal of Information Systems 21(2): 119-134.
Gasson, S. and J. Waters (2013). “Using a Grounded Theory Approach to Study Online Collaboration Behaviors.” European Journal of Information Systems 22(1): 95-118.
Gerlach, J. P. and R. T. Cenfetelli (2020). “Constant Checking Is Not Addiction: A Grounded Theory of IT-Mediated State-Tracking.” MIS Quarterly 44(4): 1705-1732.
Gerlach, J. P., N. Eling, N. Wessels and P. Buxmann (2018). “Flamingos on a slackline: Companies’ challenges of balancing the competing demands of handling customer information and privacy.” Information Systems Journal 29(2): 548-575.
Ghobadi, S. and L. Mathiassen (2017). “Risks to Effective Knowledge Sharing in Agile Software Teams: A Model for Assessing and Mitigating Risks.” Information Systems Journal 27(6): 699-731.
Ghoshal, A., S. Menon and S. Sarkar (2015). “Recommendations Using Information from Multiple Association Rules: A Probabilistic Approach.” Information Systems Research 26(3): 532-551.
Giessmann, A. and C. Legner (2016). “Designing business models for cloud platforms.” Information Systems Journal 26(5): 551-579.
Goes, P. B. (2013). Editor’s Comments. MIS Quarterly, MIS Quarterly. 37: iii-vii.
Goulielmos, M. (2004). “Systems Development Approach: Transcending Methodology.” Information Systems Journal 14(4): 363-386.
Gregory, R. W., R. Beck and M. Keil (2013). “Control Balancing in Information Systems Development Offshoring Projects.” MIS Quarterly 37(4): 1211-A1214.
Gregory, R. W., E. Kaganer, O. Henfridsson and T. J. Ruch (2018). “IT CONSUMERIZATION AND THE TRANSFORMATION OF IT GOVERNANCE.” MIS Quarterly 42(4): 1225-1253.
Gregory, R. W., M. Keil, J. Muntermann and M. Mähring (2015). “Paradoxes and the Nature of Ambidexterity in IT Transformation Programs.” Information Systems Research 26(1): 57-80.
Hackney, R., S. Jones and A. Lösch (2007). “Towards an e-Government Efficiency Agenda: The Impact of Information and Communication Behaviour on e-Reverse Auctions in Public Sector Procurement.” European Journal of Information Systems 16(2): 178-191.
Hansen, S. and A. J. Baroody (2019). “Electronic Health Records and the Logics of Care: Complementarity and Conflict in the U.S. Healthcare System.” Information Systems Research 31(1): 1-19.
Hinds, P. J. and C. D. Cramton (2014). “Situated Coworker Familiarity: How Site Visits Transform Relationships Among Distributed Workers.” Organization Science 25(3): 794-814.
Huang, J., O. Henfridsson, M. J. Liu and S. Newell (2017). “GROWING ON STEROIDS: RAPIDLY SCALING THE USER BASE OF DIGITAL VENTURES THROUGH DIGITAL INNOVATON.” MIS Quarterly 41(1): 301-314.
Huff, S. L. and M. C. Munro (1985). “Information Technology Assessment and Adoption: A Field Study.” MIS Quarterly 9(4): 327-340.
Johnston, A. C., M. Warkentin and M. Siponen (2015). “AN ENHANCED FEAR APPEAL RHETORICAL FRAMEWORK: LEVERAGING THREATS TO THE HUMAN ASSET THROUGH SANCTIONING RHETORIC.” MIS Quarterly 39(1): 113-A117.
Jones, S. and J. Hughes (2001). “Understanding IS Evaluation as a Complex Social Process: A Case Study of a UK Local Authority.” European Journal of Information Systems 10(4): 189-203.
Kesseler, E. (2008). “Assessing COTS Software in a Certifiable Safety‐Critical Domain.” Information Systems Journal 18(3): 299-324.
Krancher, O., P. Luther and M. Jost (2018). “Key Affordances of Platform-as-a-Service: Self-Organization and Continuous Feedback.” Journal of Management Information Systems 35(3): 776-812.
Lander, M. C., R. L. Purvis, G. E. McCray and W. Leigh (2004). “Trust-Building Mechanisms Utilized in Outsourced IS Development Projects: A Case Study.” Information & Management 41(4): 509-528.
Larsen, T. J., F. Niederman, M. Limayem and J. Chan (2009). “The Role of Modelling in Achieving Information Systems Success: UML to the Rescue?” Information Systems Journal 19(1): 83-117.
Lederman, R. and R. B. Johnston (2011). “Decision Support or Support for Situated Choice: Lessons for System Design from Effective Manual Systems.” European Journal of Information Systems 20(5): 510-528.
Lee, C. S. (2001). “Modeling the Business Value of Information Technology.” Information & Management 39(3): 191-210.
Levina, N. and J. W. Ross (2003). “From the Vendor’s Perspective: Exploring the Value Proposition in Information Technology Outsourcing.” MIS Quarterly 27(3): 331-364.
Lin, A. C. H., W. D. Fernandez and S. Gregor (2012). “Understanding Web Enjoyment Experiences and Informal Learning: A Study in a Museum Context.” Decision Support Systems 53(4): 846-858.
Lin, H.-C. K., T.-Y. Chuang, I. L. Lin and H.-Y. Chen (2014). “Elucidating the Role of IT/IS Assessment and Resource Allocation in IT/IS Performance in Hospitals.” Information & Management 51(1): 104-112.
Liu, C. C., S. B. Srivastava and T. E. Stuart (2016). “An Intraorganizational Ecology of Individual Attainment.” Organization Science 27(1): 90-105.
Liu, M., C. E. Hull and Y. T. C. Hung (2017). “Starting open source collaborative innovation: the antecedents of network formation in community source.” Information Systems Journal 27(5): 643-670.
Mattarelli, E., F. Bertolotti and D. M. Macrì (2013). “The Use of Ethnography and Grounded Theory in the Development of a Management Information System.” European Journal of Information Systems 22(1): 26-44.
Maznevski, M. L. and K. M. Chudoba (2000). “Bridging Space over Time: Global Virtual Team Dynamics and Effectiveness.” Organization Science 11(5): 473-492.
Miceli, M., M. Schuessler and T. Yang (2020). “Between Subjectivity and Imposition: Power Dynamics in Data Annotation for Computer Vision.” Human-Computer Interaction 1(1): 1-25.
Miller, C. C., N. T. Washburn and W. H. Glick (2013). “The Myth of Firm Performance.” Organization Science 24(3): 948-964.
Miranda, S. M., I. Kim and J. D. Summers (2015). “Jamming with Social Media: How Cognitive Structuring of Organizing Vision Facets Affects IT Innovation Diffusion.” MIS Quarterly 39(3): 591-A519.
Montazemi, A. R. and H. Qahri-Saremi (2015). “Factors Affecting Adoption of Online Banking: A Meta-analytic Structural Equation Modeling Study.” Information & Management 52(2): 210-226.
Mueller, K. S., J. Mendling and E. W. N. Bernroider (2018). “The roles of social identity and dynamic salient group formations for ERP program management success in a postmerger context.” Information Systems Journal 29(3): 609-640.
Nasirin, S. and D. F. Birks (2003). “DSS Implementation in the UK Retail Organisations: A GIS Perspective.” Information & Management 40(4): 325-336.
Nidhra, S., M. Yanamadala, W. Afzal and R. Torkar (2013). “Knowledge Transfer Challenges and Mitigation Strategies in Global Software Development—A Systematic Literature Review and Industrial Validation.” International Journal of Information Management 33(2): 333-355.
Orlikowski, W. J. (1993). “CASE Tools as Organizational Change: Investigating Incremental and Radical Changes in Systems Development.” MIS Quarterly 17(3): 309-340.
Palka, W., K. Pousttchi and D. G. Wiedemann (2009). “Mobile Word-of-Mouth: A Grounded Theory of Mobile Viral Marketing.” Journal of Information Technology 24(2): 172-185.
Parks, R., H. Xu, C.-H. Chu and P. B. Lowry (2017). “Examining the intended and unintended consequences of organisational privacy safeguards.” European Journal of Information Systems 26(1): 37-65.
Qiu, Y., A. Gopal and I.-H. Hann (2017). “Logic Pluralism in Mobile Platform Ecosystems: A Study of Indie App Developers on the iOS App Store.” Information Systems Research 28(2): 225-249.
Ransbotham, S. and S. Mitra (2009). “Choice and Chance: A Conceptual Model of Paths to Information Security Compromise.” Information Systems Research 20(1): 121-139.
Ribes, D. and T. A. Finholt (2009). “The Long Now of Technology Infrastructure: Articulating Tensions in Development.” Journal of the Association for Information Systems 10(5): 375-398.
Sadovykh, V., D. Sundaram and S. Piramuthu (2015). “Do Decision-making Structure and Sequence Exist in Health Online Social Networks?” Decision Support Systems 74: 102-120.
Scott, J. E. (2000). “Facilitating Interorganizational Learning with Information Technology.” Journal of Management Information Systems 17(2): 81-113.
Scott, J. E. and L. Kaindl (2000). “Enhancing Functionality in an Enterprise Software Package.” Information & Management 37(3): 111-122.
Seeley, M. and D. Targett (1999). “Patterns of Senior Executives’ Personal Use of Computers.” Information & Management 35(6): 315-330.
Seeley, M. E. and D. Targett (1997). “A Senior Executive End‐User Framework.” Information Systems Journal 7(4): 289-308.
Senyo, P. K., K. Liu and J. Effah (2019). “Digital business ecosystem: Literature review and a framework for future research.” International Journal of Information Management 47: 52-64.
Shah, S. K. (2006). “Motivation, Governance, and the Viability of Hybrid Forms in Open Source Software Development.” Management Science 52(7): 1000-1014.
Shaw, N. (2014). “The Role of the Professional Association: A Grounded Theory Study of Electronic Medical Records usage in Ontario, Canada.” International Journal of Information Management 34(2): 200-209.
Sherif, K. and A. Vinze (2003). “Barriers to Adoption of Software Reuse: A Qualitative Study.” Information & Management 41(2): 159-175.
Singh, P. V., T. Yong and N. Youn (2011). “A Hidden Markov Model of Developer Learning Dynamics in Open Source Software Projects.” Information Systems Research 22(4): 790-807.
Slack, F. and J. Rowley (2002). “Kiosks 21: A New Role for Information Kiosks?” International Journal of Information Management 22(1): 67-83.
Smith, M. A. and R. L. Kumar (2004). “A Theory of Application Service Provider (ASP) Use from a Client Perspective.” Information & Management 41(8): 977-1002.
Smolander, K., M. Rossi and S. Purao (2008). “Software Architectures: Blueprint, Literature, Language or Decision?” European Journal of Information Systems 17(6): 575-588.
Stanko, M. A. (2016). “Toward a Theory of Remixing in Online Innovation Communities.” Information Systems Research 27(4): 773-791.
Strong, D. M. and O. Volkoff (2010). “Understanding Organization-Enterprise System Fit: A Path to Theorizing the Information Technology Artifact.” MIS Quarterly 34(4): 731-756.
Taylor, A., H. R. Lee, A. Kubota and L. D. Riek (2019). “Coordinating Clinical Teams: Using Robots to Empower Nurses to Stop the Line.” Human-Computer Interaction 3: 1-30.
Tschang, F. T. (2007). “Balancing the Tensions between Rationalization and Creativity in the Video Games Industry.” Organization Science 18(6): 989-1005.
Vannoy, S. A. and A. F. Salam (2010). “Managerial Interpretations of the Role of Information Systems in Competitive Actions and Firm Performance: A Grounded Theory Investigation.” Information Systems Research 21(3): 496-515.
Vardaman, J. M., S. G. Taylor, D. G. Allen, M. B. Gondo and J. M. Amis (2015). “Translating Intentions to Behavior: The Interaction of Network Structure and Behavioral Intentions in Understanding Employee Turnover.” Organization Science 26(4): 1177-1191.
Vitorino, M. A. (2014). “Understanding the Effect of Advertising on Stock Returns and Firm Value: Theory and Evidence from a Structural Model.” Management Science 60(1): 227-245.
Volkoff, O., D. M. Strong and M. B. Elmes (2005). “Understanding Enterprise Systems-enabled Integration.” European Journal of Information Systems 14(2): 110-120.
Volkoff, O., D. M. Strong and M. B. Elmes (2007). “Technological Embeddedness and Organizational Change.” Organization Science 18(5): 832-848.
Whelan, E., R. Teigland, E. Vaast and B. Butler (2013). “Editorial.” Information Systems Journal 23(6): 471-474.
Wiedemann, A., M. Wiesche, H. Gewald and H. Krcmar (2020). “Understanding How DevOps Aligns Development and Operations: A Tripartite Model of Intra-IT Alignment.” European Journal of Information Systems 29(5): 458-473.
Wollersheim, J. and K. H. Heimeriks (2016). “Dynamic Capabilities and Their Characteristic Qualities: Insights from a Lab Experiment.” Organization Science 27(2): 233-248.
Xu, P. and B. Ramesh (2007). “Software Process Tailoring: an Empirical Investigation.” Journal of Management Information Systems 24(2): 293-328.
Yaraghi, N., A. Ye Du, R. Sharman, R. D. Gopal and R. Ramesh (2015). “Health Information Exchange as a Multisided Platform: Adoption, Usage, and Practice Involvement in Service Co-Production.” Information Systems Research 26(1): 1-18.
Zahedi, F., W. V. Van Pelt and M. Srite (2006). “Web Documents’ Cultural Masculinity and Femininity.” Journal of Management Information Systems 23(1): 87-128.
Zahedi, F. M. and B. Gaurav (2011). “Cultural Signifers of Web Site Images.” Journal of Management Information Systems 28(1): 147-200.
Zamani, E. D. and N. Pouloudi (2020). “Generative mechanisms of workarounds, discontinuance and reframing: a study of negative disconfirmation with consumerised IT.” Information Systems Journal.
Zheng, Z., P. A. Pavlou and G. Bin (2014). “Latent Growth Modeling for Information Systems: Theoretical Extensions and Practical Applications.” Information Systems Research 25(3): 547-568.