European Journal of Information Systems最新文献

筛选
英文 中文
Data curation as anticipatory generification in data infrastructure 数据管理是数据基础设施的预期泛化
IF 9.5 2区 管理学
European Journal of Information Systems Pub Date : 2023-07-05 DOI: 10.1080/0960085x.2023.2232333
Elena Parmiggiani, N. K. Amagyei, Steinar Kornelius Selebø Kollerud
{"title":"Data curation as anticipatory generification in data infrastructure","authors":"Elena Parmiggiani, N. K. Amagyei, Steinar Kornelius Selebø Kollerud","doi":"10.1080/0960085x.2023.2232333","DOIUrl":"https://doi.org/10.1080/0960085x.2023.2232333","url":null,"abstract":"","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":" ","pages":""},"PeriodicalIF":9.5,"publicationDate":"2023-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47456984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Synergistic Impacts of online and offline social participation on older adults’ subjective well-being: evidence from the Canadian longitudinal study on ageing 线上和线下社会参与对老年人主观幸福感的协同影响:来自加拿大老龄化纵向研究的证据
IF 9.5 2区 管理学
European Journal of Information Systems Pub Date : 2023-06-26 DOI: 10.1080/0960085x.2023.2229283
Xuecong Lu, Jinglu Jiang, Milena M. Head, S. Kahai, Junyi Yang
{"title":"Synergistic Impacts of online and offline social participation on older adults’ subjective well-being: evidence from the Canadian longitudinal study on ageing","authors":"Xuecong Lu, Jinglu Jiang, Milena M. Head, S. Kahai, Junyi Yang","doi":"10.1080/0960085x.2023.2229283","DOIUrl":"https://doi.org/10.1080/0960085x.2023.2229283","url":null,"abstract":"","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":" ","pages":""},"PeriodicalIF":9.5,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44136842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding variation in subunit adoption of electronic health records: facilitating and constraining configurations of critical dependencies 了解亚单位采用电子健康记录的变化:促进和限制关键依赖项的配置
IF 9.5 2区 管理学
European Journal of Information Systems Pub Date : 2023-06-25 DOI: 10.1080/0960085x.2023.2225786
Marjolein A. G. van Offenbeek, Janita F. J. Vos, A. Boonstra
{"title":"Understanding variation in subunit adoption of electronic health records: facilitating and constraining configurations of critical dependencies","authors":"Marjolein A. G. van Offenbeek, Janita F. J. Vos, A. Boonstra","doi":"10.1080/0960085x.2023.2225786","DOIUrl":"https://doi.org/10.1080/0960085x.2023.2225786","url":null,"abstract":"","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":" ","pages":""},"PeriodicalIF":9.5,"publicationDate":"2023-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41942542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Affective Information Processing of Fake News: Evidence from NeuroIS 假新闻的情感信息加工:来自NeuroIS的证据
IF 9.5 2区 管理学
European Journal of Information Systems Pub Date : 2023-06-19 DOI: 10.1080/0960085x.2023.2224973
Bernhard Lutz, M. Adam, S. Feuerriegel, Nicolas Pröllochs, Dirk Neumann
{"title":"Affective Information Processing of Fake News: Evidence from NeuroIS","authors":"Bernhard Lutz, M. Adam, S. Feuerriegel, Nicolas Pröllochs, Dirk Neumann","doi":"10.1080/0960085x.2023.2224973","DOIUrl":"https://doi.org/10.1080/0960085x.2023.2224973","url":null,"abstract":"","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":"116 10","pages":""},"PeriodicalIF":9.5,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41308859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Breach at a Big 4 Accounting Firm: Effects on Auditor Reputation 四大会计师事务所的网络安全漏洞:对审计师声誉的影响
IF 9.5 2区 管理学
European Journal of Information Systems Pub Date : 2023-06-01 DOI: 10.2308/isys-2022-006
B. Litt, Paul N. Tanyi, M. Watson
{"title":"Cybersecurity Breach at a Big 4 Accounting Firm: Effects on Auditor Reputation","authors":"B. Litt, Paul N. Tanyi, M. Watson","doi":"10.2308/isys-2022-006","DOIUrl":"https://doi.org/10.2308/isys-2022-006","url":null,"abstract":"\u0000 Public company investors rely on the Big 4 audit firms to provide assurance over internal controls and financial reporting. What, then, would happen if one of these very assurance providers suffered its own cybersecurity breach? We examine such an event in the major data breach of Deloitte in 2017. Using U.S. data from 2014 to 2019, we find Deloitte suffered significant reputational damage postbreach. Specifically, audit clients and existing shareholders became less likely to approve of Deloitte as the company’s auditor. Deloitte also charged lower audit fees after the incident. Furthermore, Deloitte’s audit clients suffered significant negative market reactions postbreach. Our results suggest pervasive implications of cyberattacks on auditor reputation and support recent congressional efforts to expand regulation in this area.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":"29 1","pages":"77-100"},"PeriodicalIF":9.5,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87155127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Strategy and Cybersecurity Breaches 业务战略和网络安全漏洞
IF 9.5 2区 管理学
European Journal of Information Systems Pub Date : 2023-06-01 DOI: 10.2308/isys-2022-033
Tianpei Li, S. Walton
{"title":"Business Strategy and Cybersecurity Breaches","authors":"Tianpei Li, S. Walton","doi":"10.2308/isys-2022-033","DOIUrl":"https://doi.org/10.2308/isys-2022-033","url":null,"abstract":"\u0000 This study examines whether a firm’s business strategy is an underlying determinant of cybersecurity breach likelihood. Based on organizational theory, firm strategy can focus on innovation or efficiency, with innovative strategy firms being more likely to have weaker, decentralized control systems, multiple technologies, and greater risk than firms with an efficiency-focused strategy. Following the Miles and Snow (1978) strategy topology, we predict and find that the prospector business strategy is associated with greater breach likelihood. We further explore IT awareness within the firm. Ex ante, it is unclear whether strategic IT policy formation is impounded into a firm’s strategy or can be impacted by individual executives and nonstrategy firm characteristics. We find that IT understanding at the executive or firm level can affect the relationship between strategy and breach likelihood. Collectively, our results indicate that business strategy is a useful indicator in evaluating firms’ cybersecurity activities.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":"73 1","pages":"51-76"},"PeriodicalIF":9.5,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83963264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial Policy 编辑政策
IF 9.5 2区 管理学
European Journal of Information Systems Pub Date : 2023-06-01 DOI: 10.2308/0888-7985-37.2.137
{"title":"Editorial Policy","authors":"","doi":"10.2308/0888-7985-37.2.137","DOIUrl":"https://doi.org/10.2308/0888-7985-37.2.137","url":null,"abstract":"","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":"14 1","pages":"137-141"},"PeriodicalIF":9.5,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90299924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When Cash Is King - An Accounts Receivables App Accommodating Different Use Situations 当现金为王-一个应收账款应用程序适应不同的使用情况
IF 9.5 2区 管理学
European Journal of Information Systems Pub Date : 2023-06-01 DOI: 10.2308/isys-2022-022
Jörg H. Mayer, Linus Lischke, R. Quick, Friedrich Kalden
{"title":"When Cash Is King - An Accounts Receivables App Accommodating Different Use Situations","authors":"Jörg H. Mayer, Linus Lischke, R. Quick, Friedrich Kalden","doi":"10.2308/isys-2022-022","DOIUrl":"https://doi.org/10.2308/isys-2022-022","url":null,"abstract":"\u0000 Today’s economic environment has accelerated an already changing working context for accounting. Collecting accounts receivables (AR) stands out, as it enables companies to turn invoices into cash. The objective of this article is to elaborate on both the most important use situations for an AR collection management and a subsequent app design accommodating these use situations. We take a healthcare product provider as our reference company and come up with nine use situations prioritized by an analytic hierarchy process as follows: (1) drive operational governance, (2) switch to a more proactive collection management, (3) increase order-to-cash process effectiveness, (4) set targets and monitor them, (5) automate AR process actions by an agent, (6) predict process errors in advance, (7) exchange information across departments, (8) set up a predictive liquidity management, and (9) automate workload tracking of AR process activities.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":"14 1","pages":"101-122"},"PeriodicalIF":9.5,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83476258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Publishing the Data from "The Effects of Communication Mode and Culture on Deception Detection Accuracy" 发表“传播方式和文化对欺骗检测准确性的影响”数据
IF 9.5 2区 管理学
European Journal of Information Systems Pub Date : 2023-06-01 DOI: 10.2308/isys-2022-025
J. George, Manjul Gupta, Gabriel A. Giordano, Annette M. Mills, Vanesa M. Tennant, Carmen C. Lewis
{"title":"Publishing the Data from \"The Effects of Communication Mode and Culture on Deception Detection Accuracy\"","authors":"J. George, Manjul Gupta, Gabriel A. Giordano, Annette M. Mills, Vanesa M. Tennant, Carmen C. Lewis","doi":"10.2308/isys-2022-025","DOIUrl":"https://doi.org/10.2308/isys-2022-025","url":null,"abstract":"\u0000 With the publication of this article, we are making available the dataset collected for and analyzed in our 2018 MIS Quarterly article “The Effects of Communication Mode and Culture on Deception Detection Accuracy.” Our article examined the relationships between computer-based modes of communication and national culture on deception detection success. We provide additional information about the dataset and how it was collected, as well as suggestions for future research. This additional information should help any scholar interested in further analysis of the dataset or extending our study.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":"45 46","pages":"129-136"},"PeriodicalIF":9.5,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72390705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Customer-Reported Cybersecurity Breaches on Key Supplier Innovations and Relationship Disruption 客户报告的网络安全漏洞对关键供应商创新和关系中断的影响
IF 9.5 2区 管理学
European Journal of Information Systems Pub Date : 2023-05-30 DOI: 10.2308/isys-2020-006
C. He, Jiangbo Huangfu, M. Kohlbeck, Lin Wang
{"title":"The Impact of Customer-Reported Cybersecurity Breaches on Key Supplier Innovations and Relationship Disruption","authors":"C. He, Jiangbo Huangfu, M. Kohlbeck, Lin Wang","doi":"10.2308/isys-2020-006","DOIUrl":"https://doi.org/10.2308/isys-2020-006","url":null,"abstract":"\u0000 Cybersecurity breaches (CBs) negatively influence the breached firms’ business functions, including their innovative investments. Recent research documents a spillover effect of CBs into supply chain firm performance. We extend this research and investigate the impact of customers’ CBs on suppliers’ innovative investments and the disruption of supplier-customer relationships. We find a significant negative association between customers’ reported CBs and suppliers’ innovative investments in the subsequent year. In addition, we find customer-reported CBs increase the likelihood of supplier-customer relationship disruption in the subsequent year. Our study contributes to the broader understanding of the negative impacts of CBs not only on the breached firm’s financial performance but also on key supplier innovation decisions.\u0000 Data Availability: Data are available from the public sources cited in the text.\u0000 JEL Classifications: L14; L29; M49; O30.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":"24 1","pages":"21-49"},"PeriodicalIF":9.5,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76863423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信