Editorial Introduction

Zwass, Vladimir

Special Issue: Creating Social Value with Information

Giboney, Justin Scott, Briggs, Robert O, and Nunamaker Jr, Jay F

Beyond Brainstorming: Exploring Convergence in Teams

Seeber, Isabella, De Vreede, Gert-Jan, Maier, Ronald, and Weber, Barbara

A Video-Based Screening System for Automated Risk Assessment Using Nuanced Facial Features

Pentland, Steven J, Twyman, Nathan W, Burgoon, Judee K, Nunamaker, Jay F, and Diller, Christopher BR

Promoting the System Integration of Renewable Energies: Toward a Decision Support System for Incentivizing Spatially Diversified Deployment

Piel, Jan-Hendrik, Hamann, Julian FH, Koukal, André, and Breitner, Michael H

Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence

Samtani, Sagar, Chinn, Ryan, Chen, Hsinchun, and Nunamaker, Jay F

A Data-Mining Approach to Identification of Risk Factors in Safety Management Systems

Shi, Donghui, Guan, Jian, Zurada, Jozef, and Manikas, Andrew

Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information

Anderson, Chad, Baskerville, Richard L, and Kaul, Mala

Risks and Controls in Internet-Enabled Reverse Auctions: Perspectives from Buyers and Suppliers

Sambhara, Chaitanya, Rai, Arun, Keil, Mark, and Kasi, Vijay

Assessing the Credibility of Decisional Guidance Delivered by Information Systems

Hardin, Andrew, Looney, Clayton A, and Moody, Gregory D

A Temporal Study of the Effects of Online Opinions: Information Sources Matter

Huang, Jianxiong, Boh, Wai Fong, and Goh, Kim Huat

User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory

Menard, Philip, Bott, Gregory J, and Crossler, Robert E

Send comments regarding this page to David Eargle.