David Gefen

According to our database1, David Gefen authored at least 91 papers between 1996 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Gazing at the stars is not enough, look at the specific word entropy, too!
Inf. Manag., 2020

Creating Construct Distance Maps with Machine Learning: Stargazing Trust.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Governmental intervention in Hospital Information Exchange (HIE) diffusion: a quasi-experimental ARIMA interrupted time series analysis of monthly HIE patient penetration rates.
Eur. J. Inf. Syst., 2019

A semantic measure of online review helpfulness and the importance of message entropy.
Decis. Support Syst., 2019

A Post-Positivist Answering Back.: Part 2: A Demo in R of the Importance of Enabling Replication in PLS and LISREL.
Data Base, 2019

The Philosopher's Corner: A Post-Positivist Answering Back. Part 1: Good for You, Karl Popper!
Data Base, 2019

Doing a Doctorate in BISE in Germany, Austria and Switzerland? A Debate on the Why, What and How.
Bus. Inf. Syst. Eng., 2019

Toward Creating a General Ontology for Research Validity.
Proceedings of the ER Forum and Poster & Demos Session 2019 on Publishing Papers with CEUR-WS co-located with 38th International Conference on Conceptual Modeling (ER 2019), 2019

2018
Social identity and trust in internet-based voting adoption.
Gov. Inf. Q., 2018

Adding background music as new stimuli of interest to information systems research.
Eur. J. Inf. Syst., 2018

Identifying patterns in medical records through latent semantic analysis.
Commun. ACM, 2018

2017
Controlling for Lexical Closeness in Survey Research: A Demonstration on the Technology Acceptance Model.
J. Assoc. Inf. Syst., 2017

A Guide to Text Analysis with Latent Semantic Analysis in R with Annotated Code: Studying Online Reviews and the Stack Exchange Community.
Commun. Assoc. Inf. Syst., 2017

Exploring the relative impact of biological sex and masculinity-femininity values on information technology use.
Behav. Inf. Technol., 2017

2016
How project description length and expected duration affect bidding and project success in crowdsourcing software development.
J. Syst. Softw., 2016

Do context and personality matter? Trust and privacy concerns in disclosing private information online.
Inf. Manag., 2016

Seeing the Forest: Applying Latent Semantic Analysis to Smartphone Discourse.
Proceedings of the 29th Bled eConference: Digital Economy, 2016

2015
The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern.
Eur. J. Inf. Syst., 2015

The Center Cannot Hold: How Leading Firms are Managing the Changing IT Boundaries.
Commun. Assoc. Inf. Syst., 2015

2014
Understanding Trust in IT Artifacts: An Evaluation of the impact of Trustworthiness and Trust on Satisfaction with Antiviral Software.
Data Base, 2014

Do Not Call Me Chief Information Officer, But Chief Integration Officer. A Summary of the 2011 Detroit CIO Roundtable.
CAIS, 2014

It is All Personal: Dealing with the revolving Door in the Indian High Tech Industry.
Proceedings of the 22st European Conference on Information Systems, 2014

Organizational Information Technology Maturity: Antecedent Factors and Consequent Outcomes.
Proceedings of the Sixteenth International Conference on Electronic Commerce, 2014

2013
The Dual Role of Trust in System Use.
J. Comput. Inf. Syst., 2013

Why the first provider takes it all: the consequences of a low trust culture on pricing and ratings in online sourcing markets.
Eur. J. Inf. Syst., 2013

2012
On the Use of Neuropyhsiological Tools in IS Research: Developing a Research Agenda for NeuroIS.
MIS Q., 2012

The Boundaries of Trust and Risk: The Quadratic Moderating Role of Institutional Structures.
Inf. Syst. Res., 2012

Organizational IT Maturity (OITM): A Measure of Organizational Readiness and Effectiveness to Obtain Value from Its Information Technology.
Inf. Syst. Manag., 2012

ICIS 2011 Panel Report: Are We on the Wrong Track and Do MIS Curricula Need to Be Reengineered?
Commun. Assoc. Inf. Syst., 2012

Government of the People, By the People: A Look at Trust in eGovernment.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
The Changing Role of the CIO in the World of Outsourcing: Lessons Learned from a CIO Roundtable.
Commun. Assoc. Inf. Syst., 2011

Are We on the Wrong Track and so do MIS Curricula Need to be Reengineered?
Proceedings of the International Conference on Information Systems, 2011

2010
The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online.
Decis. Support Syst., 2010

On the Foundations of NeuroIS: Reflections on the Gmunden Retreat 2009.
Commun. Assoc. Inf. Syst., 2010

From IT Assets to Business and Economic Value.
Proceedings of the 5th Mediterranean Conference on Information Systems, 2010

In Search of a Possible the Missing Variable - the Relationship between Trust, Learning Involvement, and KMS Adoption.
Proceedings of the 5th Mediterranean Conference on Information Systems, 2010

Does Reputation Really Signal Potential Success in Online Marketplaces, or is IT only a Trigger?
Proceedings of the 5th Mediterranean Conference on Information Systems, 2010

2009
Why IS management is in trouble and how to save it: lessons learned in the automotive industry.
Commun. ACM, 2009

2008
A Research Agenda for Trust in Online Environments.
J. Manag. Inf. Syst., 2008

Special Issue: Trust in Online Environments.
J. Manag. Inf. Syst., 2008

Leadership and justice: Increasing non participating users' assessment of an IT through passive participation.
Inf. Manag., 2008

What makes the competitive contribution of ERP strategic.
Data Base, 2008

Give me information, not technology.
Commun. ACM, 2008

The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation.
Proceedings of the International Conference on Information Systems, 2008

Efficacy of Privacy Assurance Mechanisms in the Context of Disclosing Health Information Online.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
Are Cross-Gender Conversations in Threaded Discussions Reminiscent of Communicating Across Cultural Boundaries?
Int. J. Inf. Commun. Technol. Educ., 2007

Vive la Différence: The Cross-Culture Differences Within Us.
Int. J. e Collab., 2007

On the Centrality of Social Norms in Determining MBA Program Success.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

The Impact of Personal Dispositions on Privacy and Trust in Disclosing Health Information Online.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Business Familiarity as Risk Mitigation in Software Development Outsourcing Contracts.
MIS Q., 2006

Is the World Really Flat? A Look at Offshoring in an Online Programming Marketplace.
MIS Q., 2006

On the Need to Include National Culture as a Central Issue in E-Commerce Trust Beliefs.
J. Glob. Inf. Manag., 2006

Psychological Barriers: Lurker and Poster Motivation and Behavior in Online Communities.
Commun. Assoc. Inf. Syst., 2006

What Can Be Learned from CMMi Failures?
Commun. Assoc. Inf. Syst., 2006

ICIS Panel Summary: Should Institutional Trust Matter in Information Systems Research?
Commun. Assoc. Inf. Syst., 2006

The Moderating Role of Perceived Regulatory Effectiveness of Online Marketplaces on the Role of Trust and Risk on Transaction Intentions.
Proceedings of the International Conference on Information Systems, 2006

2005
What do software practitioners really think about project success: an exploratory study.
J. Syst. Softw., 2005

Cultural Diversity and Trust in IT Adoption: A Comparison of Potential e-Voters in the USA and South Africa.
J. Glob. Inf. Manag., 2005

The Role of Facilitating Conditions and Institutional Trust in Electronic Marketplaces.
J. Electron. Commer. Organ., 2005

Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role.
Inf. Syst. Res., 2005

A Multi-Level Approach to Measuring the Benefits of an Erp System in Manufacturing Firms.
Inf. Syst. Manag., 2005

If you spoke as she does, sir, instead of the way you do: a sociolinguistics perspective of gender differences in virtual communities.
Data Base, 2005

A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example.
Commun. Assoc. Inf. Syst., 2005

Should Institutional Trust Matter in Information Systems Research?
Proceedings of the International Conference on Information Systems, 2005

Antecedents of Trust in Online Communities.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2004
What Makes an ERP Implementation Relationship Worthwhile: Linking Trust Mechanisms and ERP Usefulness.
J. Manag. Inf. Syst., 2004

Virtual Community Attraction: Why People Hang Out Online.
J. Comput. Mediat. Commun., 2004

Building Effective Online Marketplaces with Institution-Based Trust.
Inf. Syst. Res., 2004

Validation Guidelines for IS Positivist Research.
Commun. Assoc. Inf. Syst., 2004

2003
Inexperience and experience with online stores: the importance of TAM and trust.
IEEE Trans. Engineering Management, 2003

Trust and TAM in Online Shopping: An Integrated Model.
MIS Q., 2003

TAM or Just Plain Habit: A Look at Experienced Online Shoppers.
J. Organ. End User Comput., 2003

IT acceptance: managing user - IT group boundaries.
Data Base, 2003

Assessing Unidimensionality Through LISREL: An Explanation and an Example.
Commun. Assoc. Inf. Syst., 2003

The Transitional Role of Institutional Trust in Online Interorganizational Relationships.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

The Conceptualization of Trust, Risk and Their Relationship in Electronic Commerce: The Need for Clarifications.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Institutional trust and familiarity in online interorganizational relationships.
Proceedings of the 11th European Conference on Information Systems, 2003

2002
Some antecedents and effects of trust in virtual communities.
J. Strateg. Inf. Syst., 2002

Implementation Team Responsiveness and User Evaluation of Customer Relationship Management: A Quasi-Experimental Design Study of Social Exchange Theory.
J. Manag. Inf. Syst., 2002

Customer Loyalty in E-Commerce.
J. Assoc. Inf. Syst., 2002

Encouraging Citizen Adoption of eGovernment by Building Trust.
Electron. Mark., 2002

Reflections on the dimensions of trust and trustworthiness among online consumers.
Data Base, 2002

2001
Validation in Information Systems Research: A State-of-the-Art Assessment.
MIS Q., 2001

Customer Loyalty to an Online Store: The Meaning of Online Service Quality.
Proceedings of the International Conference on Information Systems, 2001

2000
The Relative Importance of Perceived Ease of Use in IS Adoption: A Study of E-Commerce Adoption.
J. Assoc. Inf. Syst., 2000

Structural Equation Modeling and Regression: Guidelines for Research Practice.
Commun. Assoc. Inf. Syst., 2000

1999
The Relation between Outsourcing and the Return from Corporate IT Spending: Perceptions from Practitioners.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

1998
The Impact of Developer Reponsiveness on Perceptions of Usefulness and Ease of Use: An Extension of the Technology Acceptance Model.
Data Base, 1998

How Managers Assess the Business Value Returned from Information Technology Spending.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

1997
Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model.
MIS Q., 1997

1996
The non-homogeneous maintenance periods: a case study of software modifications.
Proceedings of the 1996 International Conference on Software Maintenance (ICSM '96), 1996


  Loading...