Risks and Side effects of Digitalization: a Multi-Level Taxonomy of the Adverse effects of using Digital Technologies and Media
暂无分享,去创建一个
[1] Markus Salo,et al. Two Decades of the Dark Side in the Information Systems Basket: Suggesting five areas for Future Research , 2016, ECIS.
[2] Jae Kyu Lee,et al. Research Framework for AIS Grand Vision of the Bright ICT Initiative , 2015 .
[3] Maung K. Sein,et al. Trajectory of Affordances: Insights from a case of telemedicine in Nepal , 2018, Inf. Syst. J..
[4] M. Lynne Markus,et al. Designing for Digital Transformation: Lessons for Information Systems Research from the Study of ICT and Societal Challenges , 2016, MIS Q..
[5] Liisa von Hellens,et al. Illuminating the underground: the reality of unauthorised file sharing , 2015, Inf. Syst. J..
[6] Shirley Gregor,et al. The Nature of Theory in Information Systems , 2006, MIS Q..
[7] Jan Muntermann,et al. A method for taxonomy development and its application in information systems , 2013, Eur. J. Inf. Syst..
[8] Sven Laumer,et al. The effects of technostress and switching stress on discontinued use of social networking services: a study of Facebook use , 2015, Inf. Syst. J..
[9] Lorin M. Hitt,et al. Productivity, Business Profitability, and Consumer Surplus: Three Different Measures of Information Technology Value , 1996, MIS Q..
[10] Jason Bennett Thatcher,et al. Concentration, Competence, Confidence, and Capture: An Experimental Study of Age, Interruption-based Technostress, and Task Performance , 2018, J. Assoc. Inf. Syst..
[11] Jason Bennett Thatcher,et al. Interrupting the Workplace: Examining Stressors in an Information Technology Context , 2015, J. Assoc. Inf. Syst..
[12] Franz Strich,et al. Why do you NOT use the Enterprise Social Network? Analyzing Non-Users' reasons through the lens of Affordances , 2017, ICIS.
[13] Anindya Ghose,et al. Internet’s Dirty Secret: Assessing the Impact of Online Intermediaries on HIV Transmission , 2012, MIS Q..
[14] M. Leslie. Yin and Yang. , 2004, Science of aging knowledge environment : SAGE KE.
[15] L. Tompson,et al. Routine Activities and Proactive Police Activity: A Macro-scale Analysis of Police Searches in London and New York City , 2017 .
[16] Fred D. Davis,et al. Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual‐systems perspective , 2015, Inf. Syst. J..
[17] Ajay S. Vinze,et al. The Role of ICT as a Double-Edged Sword in Fostering Societal Transformations , 2018, J. Assoc. Inf. Syst..
[18] D. Raphael. The impartial spectator : Adam Smith's moral philosophy , 2007 .
[19] Torsten Eymann,et al. Digitalization: Opportunity and Challenge for the Business and Information Systems Engineering Community , 2017, Business & Information Systems Engineering.
[20] Jan Ondrus,et al. Towards a Response to Ransomware: Examining Digital Capabilities of the WannaCry Attack , 2018, Pacific Asia Conference on Information Systems.
[22] Monideepa Tarafdar,et al. The dark side of information technology , 2015 .
[23] Won Kim,et al. The dark side of the Internet: Attacks, costs and responses , 2011, Inf. Syst..
[24] Feng Tian,et al. How Do Enterprise Resource Planning Systems Affect Firm Risk? Post-Implementation Impact , 2015, MIS Q..
[25] Brian Donnellan,et al. A Theoretical Framework to Develop a Research Agenda for Information Systems Innovation , 2013, Commun. Assoc. Inf. Syst..
[26] Stuart J. Barnes,et al. To sell or not to sell: Exploring sellers' trust and risk of chargeback fraud in cross‐border electronic commerce , 2018, Inf. Syst. J..