The "Theoretical Lens" Concept: We All Know What it Means, but do We All Know the Same Thing?
暂无分享,去创建一个
[1] Fred Niederman,et al. Testing and extending the unfolding model of voluntary turnover to it professionals , 2007 .
[2] Jongwoo Kim,et al. Achieving dynamic capabilities with cloud computing: an empirical investigation , 2016, Eur. J. Inf. Syst..
[3] Ephraim R. McLean,et al. Information Systems Success: The Quest for the Dependent Variable , 1992, Inf. Syst. Res..
[4] Ned Kock,et al. The Psychobiological Model: Towards a New Theory of Computer-Mediated Communication Based on Darwinian Evolution , 2004, Organ. Sci..
[5] Evangelos A. Kiountouzis,et al. Managing the introduction of information security awareness programmes in organisations , 2015, Eur. J. Inf. Syst..
[6] Rui Chen,et al. Learning and self-disclosure behavior on social networking sites: the case of Facebook users , 2015, Eur. J. Inf. Syst..
[7] Jean-Claude Courbon. User-centered DSS design and implementation , 1996 .
[8] K. Weick. ENACTED SENSEMAKING IN CRISIS SITUATIONS[1] , 1988 .
[9] M. Markus,et al. Information technology and organizational change: causal structure in theory and research , 1988 .
[10] Hock-Hai Teo,et al. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..
[11] M. Porter. Competitive Advantage: Creating and Sustaining Superior Performance , 1985 .
[12] P. Romer. Two Strategies for Economic Development: Using Ideas and Producing Ideas , 1992 .
[13] A. Giddens. The consequences of modernity , 1990 .
[14] A. Strauss,et al. Grounded theory , 2017 .
[15] Shan Ling Pan,et al. Information technology offshoring in India: a postcolonial perspective , 2013, Eur. J. Inf. Syst..
[16] J. Kooiman,et al. Governing as Governance , 2003 .
[17] R. Oliver. Effect of expectation and disconfirmation on postexposure product evaluations: An alternative interpretation. , 1977 .
[18] John Tooby,et al. Better than rational: Evolutionary psychology and the invisible hand , 1994 .
[19] Ephraim R. McLean,et al. Theoretical perspectives in IS research: from variance and process to conceptual latitude and conceptual fit , 2015, Eur. J. Inf. Syst..
[20] Carl F. Fey,et al. Institutional theory and MNC subsidiary HRM practices: evidence from a three-country study , 2007 .
[21] J. Derrida. Deconstruction in a Nutshell: A Conversation with Jacques Derrida , 2020 .
[22] Tawei Wang,et al. A legitimacy challenge of a cross-cultural interorganizational information system , 2015, Eur. J. Inf. Syst..
[23] A. Giddens. Central Problems In Social Theory , 1979 .
[24] Patrick Y. K. Chau,et al. Cross-cultural IS research: perspectives from Eastern and Western traditions , 2015, Eur. J. Inf. Syst..
[25] Tejaswini Herath,et al. A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings , 2011, Eur. J. Inf. Syst..
[26] Lihua Huang,et al. The Role of IS Capabilities in the Development of Multi-Sided Platforms: The Digital Ecosystem Strategy of Alibaba.com , 2015, J. Assoc. Inf. Syst..
[27] Syed Nasirin,et al. Grounded theory method in information systems research: its nature, diversity and opportunities , 2013, Eur. J. Inf. Syst..
[28] J. Brockner. The Escalation of Commitment to a Failing Course of Action: Toward Theoretical Progress , 1992 .
[29] W. Orlikowski. Sociomaterial Practices: Exploring Technology at Work , 2007 .
[30] Bill Doolin,et al. Sociomateriality and boundary objects in information systems development , 2012, Eur. J. Inf. Syst..
[31] B. Wernerfelt,et al. A Resource-Based View of the Firm , 1984 .
[32] Stanley H. Cohen. Discipline and Punish: The Birth of the Prison , 2019, Contemporary Sociology: A Journal of Reviews.
[33] Sung S. Kim,et al. Out of Dedication or Constraint? A Dual Model of Post-Adoption Phenomena and its Empirical Test in the Context of Online Services , 2009, MIS Q..
[34] Tim Carrigan,et al. Toward a new sociology of masculinity , 1985, The Making of Masculinities.
[35] M. Keil,et al. The effects of sunk cost and project completion on information technology project escalation , 1995 .
[36] Mark Keil,et al. Understanding overbidding behavior in C2C auctions: an escalation theory perspective , 2012, Eur. J. Inf. Syst..
[37] Max Boisot,et al. Markets and Hierarchies in a Cultural Perspective , 1986 .
[38] Susan Leigh Star,et al. Institutional Ecology, `Translations' and Boundary Objects: Amateurs and Professionals in Berkeley's Museum of Vertebrate Zoology, 1907-39 , 1989 .
[39] R. Quinn. Beyond Rational Management: Mastering the Paradoxes and Competing Demands of High Performance , 1991 .
[40] A. Kellerman,et al. The Constitution of Society : Outline of the Theory of Structuration , 2015 .
[41] John Tooby,et al. Introduction: Evolutionary psychology and conceptual integration , 1992 .
[42] V. G. Ouchi,et al. A conceptual framework for the design and organizational control mechanisms , 1979 .
[43] Anol Bhattacherjee,et al. Why end-users move to the cloud: a migration-theoretic analysis , 2014, Eur. J. Inf. Syst..
[44] Fred D. Davis. A technology acceptance model for empirically testing new end-user information systems : theory and results , 1985 .
[45] Martin Christopher,et al. Logistics and Supply Chain Management: Strategies for Reducing Cost and Improving Service (Second Edition) , 1999 .
[46] I. Lakatos,et al. Criticism and the Growth of Knowledge: Falsification and the Methodology of Scientific Research Programmes , 1970 .
[47] Frantz Rowe,et al. What literature review is not: diversity, boundaries and recommendations , 2014, Eur. J. Inf. Syst..
[48] Kalle Lyytinen,et al. Inter-organizational information systems adoption – a configuration analysis approach , 2011, Eur. J. Inf. Syst..
[49] Qing Hu,et al. Research Report: Diffusion of Information Systems Outsourcing: A Reevaluation of Influence Sources , 1997, Inf. Syst. Res..
[50] Pratim Datta,et al. The economics and psychology of consumer trust in intermediaries in electronic markets: the EM-Trust Framework , 2008, Eur. J. Inf. Syst..
[51] M. Smith. Field Theory in Social Science: Selected Theoretical Papers. , 1951 .
[52] A. Pettigrew. Context and Action in the Transformation of the Firm , 1987 .
[53] Kalle Lyytinen,et al. The limits to language in doing systems design , 2017, Eur. J. Inf. Syst..
[54] Hung-Pin Shih,et al. Constraint-based and dedication-based mechanisms for encouraging online self-disclosure: Is personalization the only thing that matters? , 2017, Eur. J. Inf. Syst..
[55] David Gefen,et al. The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern , 2015, Eur. J. Inf. Syst..
[56] Sabine Matook,et al. Development of an IS change reason–IS change type combinations matrix , 2011, Eur. J. Inf. Syst..
[57] Lan Cao,et al. A framework for adapting agile development methodologies , 2009, Eur. J. Inf. Syst..
[58] K. Weick. Theory Construction as Disciplined Imagination , 1989 .
[59] K. Popper,et al. Conjectures and refutations;: The growth of scientific knowledge , 1972 .
[60] Guy Paré,et al. Re-examining the causal structure of information technology impact research , 2007, Eur. J. Inf. Syst..
[61] Leyland F. Pitt,et al. Potential Research Space in MIS: A Framework for Envisioning and Evaluating Research Replication, Extension, and Generation , 2002, Inf. Syst. Res..
[62] N. Kock,et al. Media richness or media naturalness? The evolution of our biological communication apparatus and its influence on our behavior toward E-communication tools , 2005, IEEE Transactions on Professional Communication.
[63] I. Lorge,et al. Irrelevant rewards in animal learning. , 1936 .
[64] Ron Weber,et al. Evaluating and Developing Theories in the Information Systems Discipline , 2012, J. Assoc. Inf. Syst..
[65] Ephraim R. McLean,et al. Measuring e-Commerce Success: Applying the DeLone & McLean Information Systems Success Model , 2004, Int. J. Electron. Commer..
[66] Richard T. Watson,et al. Enriching our theoretical repertoire: the role of evolutionary psychology in technology acceptance , 2013, Eur. J. Inf. Syst..
[67] Tina Blegind Jensen,et al. Hospitality and hostility in hospitals: a case study of an EPR adoption among surgeons , 2007 .
[68] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[69] J. Battilana,et al. BUILDING SUSTAINABLE HYBRID ORGANIZATIONS: THE CASE OF COMMERCIAL MICROFINANCE ORGANIZATIONS , 2010 .
[70] Wiebe E. Bijker,et al. Science in action : how to follow scientists and engineers through society , 1989 .
[71] B. Fredrickson. The broaden-and-build theory of positive emotions. , 2004, Philosophical transactions of the Royal Society of London. Series B, Biological sciences.
[72] Shirin Madon,et al. Governance lessons from the experience of telecentres in Kerala , 2005, Eur. J. Inf. Syst..
[73] Cynthia Hardy,et al. The Power Behind Empowerment: Implications for Research and Practice , 1998 .
[74] R. Rhodes. Understanding governance : policy networks, governance, reflexivity and accountability , 1997 .
[75] Jeanette Van Akkeren,et al. An epidemic of pain in an Australian radiology practice , 2007, Eur. J. Inf. Syst..
[76] Angela Lin,et al. The social and political construction of technological frames , 2005, Eur. J. Inf. Syst..
[77] David A. Whetten,et al. Albert and Whetten Revisited: Strengthening the Concept of Organizational Identity , 2006 .
[78] S. L. Star,et al. This is Not a Boundary Object: Reflections on the Origin of a Concept , 2010 .
[79] V. Grover,et al. Decisions to Outsource Information Systems Functions: Testing a Strategy‐Theoretic Discrepancy Model , 1995 .
[80] Richard C. Atkinson,et al. Human Memory: A Proposed System and its Control Processes , 1968, Psychology of Learning and Motivation.
[81] Glen Whyte,et al. Escalating Commitment to a Course of Action: A Reinterpretation , 1986 .
[82] David Arnott,et al. Decision support systems evolution: framework, case study and research agenda , 2004, Eur. J. Inf. Syst..
[83] W. Orlikowski,et al. Genre Repertoire: The Structuring of Communicative Practices in Organizations , 1994 .
[84] Shan Ling Pan,et al. Developing information processing capability for operational agility: implications from a Chinese manufacturer , 2014, Eur. J. Inf. Syst..
[85] Yu Zhao,et al. The process of enterprise resource planning implementation and business process re‐engineering: tales from two Chinese small and medium‐sized enterprises , 2008, Inf. Syst. J..
[86] K. Weick. The Generative Properties Of Richness , 2007 .
[87] Cathy Urquhart,et al. Everyday power struggles: living in an IOIS project , 2013, Eur. J. Inf. Syst..
[88] Jane Bennett,et al. The Enchantment of Modern Life: Attachments, Crossings, and Ethics , 2001 .
[89] Wanda J. Orlikowski,et al. Technological frames: making sense of information technology in organizations , 1994, TOIS.
[90] Cathy Urquhart,et al. Using grounded theory method in information systems: the researcher as blank slate and other myths , 2013, J. Inf. Technol..
[91] Lars Mathiassen,et al. The role of industry infrastructure in telehealth innovations: a multi-level analysis of a telestroke program , 2007, Eur. J. Inf. Syst..
[92] C. Delbruck,et al. [The theory of migration]. , 1993, Jahrbucher fur Nationalokonomie und Statistik.
[93] H. Chaiklin,et al. How Does Social Science Work? Reflections on Practice , 1993 .
[94] Wendy K. Smith,et al. Managing Strategic Contradictions: A Top Management Model for Managing Innovation Streams , 2005 .
[95] Ephraim R. McLean,et al. The DeLone and McLean Model of Information Systems Success: A Ten-Year Update , 2003, J. Manag. Inf. Syst..
[96] J. R. Moore,et al. The theory of the growth of the firm twenty-five years after , 1960 .
[97] Michael Tyworth,et al. Organizational identity and information systems: how organizational ICT reflect who an organization is , 2014, Eur. J. Inf. Syst..
[98] R. Lamb,et al. Of Bicycles, Bakelites, and Bulbs: Toward a Theory of Sociotechnical Change , 1996, Inf. Process. Manag..
[99] N. Venkatraman,et al. Determinants of Information Technology Outsourcing: A Cross-Sectional Analysis , 2011, J. Manag. Inf. Syst..
[100] Jorge Gonçalves,et al. Fragmentation or cohesion? Visualizing the process and consequences of information system diversity, 1993–2012 , 2016, Eur. J. Inf. Syst..
[101] Chris Beasley,et al. Gender & sexuality : Critical theories, critical thinkers , 2005 .
[102] Rob Kling,et al. Reconceptualizing Users as Social Actors in Information Systems Research , 2003, MIS Q..
[103] Shirley Gregor,et al. The Nature of Theory in Information Systems , 2006, MIS Q..
[104] Paul Benjamin Lowry,et al. Examining the intended and unintended consequences of organisational privacy safeguards , 2016, Eur. J. Inf. Syst..
[105] Alexandra Durcikova,et al. WHAT , I SHOULDN ’ T HAVE DONE THAT ? : THE INFLUENCE OF TRAINING AND JUST-INTIME REMINDERS ON SECURE BEHAVIOR Completed Research Paper , 2013 .
[106] Juan Rodon,et al. Analysing IOIS adoption through structural contradictions , 2010, Eur. J. Inf. Syst..
[107] L. L. Cummings,et al. Strategic Response to Institutional Influences on Information Systems Outsourcing , 1997 .
[108] Rudy Hirschheim,et al. Crowdsourcing of information systems research , 2017, Eur. J. Inf. Syst..
[109] K. Weick. Making Sense of the Organization , 2000 .
[110] Harold H. Kassarjian. Low Involvement:N a Second Look , 1981 .
[111] K. Lewin,et al. Group decision and social change. , 1999 .
[112] N. Venkatraman,et al. Institutional Initiatives for Technological Change: From Issue Interpretation to Strategic Choice , 1995 .
[113] M. Boisot,et al. From Fiefs to Clans and Network Capitalism: Explaining China's Emerging Economic Order , 1996 .
[114] Lawrence Loh,et al. Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect , 1992, Inf. Syst. Res..
[115] Katja Bachmeier. Powers Of Freedom Reframing Political Thought , 2016 .
[116] R. Oliver. A Cognitive Model of the Antecedents and Consequences of Satisfaction Decisions , 1980 .
[117] K. Weick. FROM SENSEMAKING IN ORGANIZATIONS , 2021, The New Economic Sociology.
[118] Ilze Zigurs,et al. Managing strategic contradictions in hybrid teams , 2007, Eur. J. Inf. Syst..
[119] Robert Wayne Gregory,et al. Blending bureaucratic and collaborative management styles to achieve control ambidexterity in IS projects , 2014, Eur. J. Inf. Syst..
[120] Nicholas Berente,et al. Dressage, control, and enterprise systems: the case of NASA's Full Cost initiative , 2010, Eur. J. Inf. Syst..
[121] Neil F. Doherty,et al. From technical to socio-technical change: tackling the human and organizational aspects of systems development projects , 2005, Eur. J. Inf. Syst..
[122] A. Quayson,et al. Postcolonialism: Theory, Practice or Process? , 2000 .
[123] Helmut Krcmar,et al. Grounded Theory Methodology in Information Systems Research , 2017, MIS Q..
[124] Blake E. Ashforth,et al. Normalizing Dirty Work: Managerial Tactics For Countering Occupational Taint , 2007 .
[125] R. Emerson. Power-Dependence Relations , 1962, Power in Modern Societies.
[126] Jay R. Galbraith. Designing Complex Organizations , 1973 .
[127] Calvin Meng Lai Chan,et al. Managing e-Government system implementation: a resource enactment perspective , 2011, Eur. J. Inf. Syst..
[128] Jeremy Rose,et al. Trust dynamics in a large system implementation: six theoretical propositions , 2013, Eur. J. Inf. Syst..
[129] Stephen W. Hawking,et al. The Illustrated A Brief History of Time , 1996 .
[130] FROM THE EDITORS ADVANTAGES OF STARTING WITH THEORY , 2017 .
[131] R. Young,et al. Postcolonialism: An Historical Introduction , 2001 .
[132] T. P. Hughes,et al. The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology , 1989 .
[133] Atreyi Kankanhalli,et al. Customers’ preference of online store visit strategies: an investigation of demographic variables , 2010, Eur. J. Inf. Syst..
[134] H. Kelley,et al. Communication and Persuasion: Psychological Studies of Opinion Change , 1982 .
[135] Lawrence B. Mohr,et al. Explaining organizational behavior , 1982 .
[136] Heather A. Smith,et al. Making IT Happen: Critical Issues in IT Management , 2003 .
[137] Geoff Walsham,et al. Grounded theorizing for electronically mediated social contexts , 2013, Eur. J. Inf. Syst..
[138] Nandini Rajagopalan,et al. TOWARD A THEORY OF STRATEGIC CHANGE: A MULTI-LENS PERSPECTIVE AND INTEGRATIVE FRAMEWORK , 1997 .
[139] Bonnie Brinton Anderson,et al. How users perceive and respond to security messages: a NeuroIS research agenda and empirical study , 2016, Eur. J. Inf. Syst..
[140] B. M. Staw. The Escalation of Commitment To a Course of Action , 1981 .
[141] K. Weick,et al. Organizing and the Process of Sensemaking , 2005 .
[142] M. Callon. Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St Brieuc Bay , 1984 .
[143] Barry M. Staw,et al. Knee-deep in the Big Muddy: A study of escalating commitment to a chosen course of action. , 1976 .
[144] Duane T. Wegener,et al. The elaboration likelihood model: Current status and controversies. , 1999 .
[145] Fred Niederman,et al. Design science and the accumulation of knowledge in the information systems discipline , 2012, TMIS.
[146] Szu-Yuan Sun,et al. Usability, quality, value and e-learning continuance decisions , 2005, Comput. Educ..
[147] Ulrich Remus,et al. The effective promotion of informal control in information systems offshoring projects , 2015, Eur. J. Inf. Syst..
[148] JoAnne Yates,et al. It's About Time: Temporal Structuring in Organizations , 2002, Organ. Sci..
[149] Jonny Holmström,et al. Requirements engineering blinders: exploring information systems developers’ black-boxing of the emergent character of requirements , 2011, Eur. J. Inf. Syst..
[150] Blake E. Ashforth,et al. How can you do it?: Dirty work and the challenge of constructing a positive identity , 1999 .
[151] Paul Benjamin Lowry,et al. Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior , 2013, Int. J. Hum. Comput. Stud..
[152] Andrew H. Van de Ven,et al. Running in Packs to Develop Knowledge-Intensive Technologies , 2005, MIS Q..
[153] Shirley Gregor,et al. The Anatomy of a Design Theory , 2007, J. Assoc. Inf. Syst..
[154] Kalle Lyytinen,et al. Explaining information systems change: a punctuated socio-technical change model , 2008, Eur. J. Inf. Syst..
[155] Elpida Prasopoulou,et al. A half-moon on my skin: a memoir on life with an activity tracker , 2017, Eur. J. Inf. Syst..
[156] Gerardine DeSanctis,et al. Use of group decision support systems as an appropriation process , 1989, [1989] Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences. Volume IV: Emerging Technologies and Applications Track.
[157] Antonis C. Stylianou,et al. A process model for analyzing and managing flexibility in information systems , 2014, Eur. J. Inf. Syst..
[158] Varun Grover,et al. Business Process Outsourcing: an event study on the nature of processes and firm valuation , 2009, Eur. J. Inf. Syst..
[159] William H. Glick,et al. Typologies As a Unique Form Of Theory Building: Toward Improved Understanding and Modeling , 1994 .
[160] Xin Luo,et al. Improving multiple-password recall: an empirical study , 2009, Eur. J. Inf. Syst..
[161] Ben Light,et al. Introducing Masculinity Studies to Information Systems Research: the case of Gaydar , 2007, Eur. J. Inf. Syst..
[162] A. Strauss,et al. Basics of qualitative research: Grounded theory procedures and techniques. , 1993 .
[163] R. F. I. Smith,et al. Governance , 2001, The Corporation as a Protagonist in Global History, c. 1550-1750.
[164] Graeme R. Newman,et al. On crimes and punishments : fifth edition , 2009 .
[165] Lars Mathiassen,et al. Contextual dynamics during health information systems implementation: an event-based actor-network approach , 2008, Eur. J. Inf. Syst..
[166] John C. Henderson,et al. Strategic Alignment: Leveraging Information Technology for Transforming Organizations , 1993, IBM Syst. J..
[167] Adrian J. Slywotzky,et al. Adaptive Enterprise: Creating and Leading Sense-And-Respond Organizations , 1999 .
[168] Andrea Carugati,et al. Escaping ‘localisms’ in IT sourcing: tracing changes in institutional logics in an Italian firm , 2012, Eur. J. Inf. Syst..
[169] Dorothy E. Leidner,et al. Bridging the work/social divide: the emotional response to organizational social networking sites , 2012, Eur. J. Inf. Syst..
[170] Matthew R. Jones,et al. Giddens's Structuration Theory and Information Systems Research , 2008, MIS Q..
[171] William G. Ouchi,et al. Markets, Bureaucracies, and Clans. , 1980 .
[172] Dale Goodhue,et al. Task-Technology Fit and Individual Performance , 1995, MIS Q..
[173] L. Cosmides,et al. To appear in: Evolutionary Psychology and the Emotions Handbook of Emotions, 2nd Edition , 2022 .
[174] Lars Mathiassen,et al. Scalable growth in IT-enabled service provisioning: a sensemaking perspective , 2011, Eur. J. Inf. Syst..
[175] F. Heider. ATTITUDES AND COGNITIVE ORGANIZATION , 1977 .
[176] Jasbir Singh Dhaliwal,et al. Alignment within the corporate IT unit: an analysis of software testing and development , 2011, Eur. J. Inf. Syst..
[177] Carol W. Hsu,et al. Frame misalignment: interpreting the implementation of information systems security certification in an organization , 2009, Eur. J. Inf. Syst..
[178] Daphne R. Raban,et al. Conversation as a source of satisfaction and continuance in a question-and-answer site , 2012, Eur. J. Inf. Syst..
[179] K. Weick. The social psychology of organizing , 1969 .
[180] Matthias Lange,et al. An empirical analysis of the factors and measures of Enterprise Architecture Management success , 2016, Eur. J. Inf. Syst..