Jason Bennett Thatcher

Affiliations:
  • Temple University, Philadelphia, PA, USA
  • Clemson University (former)


According to our database1, Jason Bennett Thatcher authored at least 131 papers between 2001 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Strategic Directions for AI: The Role of CIOs and Boards of Directors.
MIS Q., 2021

Improving the Design of Information Security Messages by Leveraging the Effects of Temporal Distance and Argument Nature.
J. Assoc. Inf. Syst., 2021

Social Networking Site Use Resumption: A Model of Return Migration.
J. Assoc. Inf. Syst., 2021

Standing Up or Standing By: Understanding Bystanders' Proactive Reporting Responses to Social Media Harassment.
Inf. Syst. Res., 2021

When your data has COVID-19: how the changing context disrupts data collection and what to do about it.
Eur. J. Inf. Syst., 2021

AI-Based Information Systems.
Bus. Inf. Syst. Eng., 2021

Motivation in IT Projects: Investigating the Effect of Agile Practices on Team Members' Intrinsic Motivation.
Proceedings of the 25th Pacific Asia Conference on Information Systems, 2021

2020
Social Media and Selection: Political Issue Similarity, Liking, and the Moderating Effect of Social Media Platform.
MIS Q., 2020

The Effects of Business-IT Strategic Alignment and IT Governance on Firm Performance: A Moderated Polynomial Regression Analysis.
MIS Q., 2020

Information Technology Identity: A Key Determinant of IT Feature and Exploratory Usage.
MIS Q., 2020

Worker stress in the age of mobile technology: The combined effects of perceived interruption overload and worker control.
J. Strateg. Inf. Syst., 2020

The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security.
J. Manag. Inf. Syst., 2020

The Role of Basic Human Values in Knowledge Sharing: How Values Shape the Postadoptive Use of Electronic Knowledge Repositories.
J. Assoc. Inf. Syst., 2020

IT Identity: A Measure and Empirical Investigation of its Utility to IS Research.
J. Assoc. Inf. Syst., 2020

Inside out and outside in: How the COVID-19 pandemic affects self-disclosure on social media.
Int. J. Inf. Manag., 2020

A Great Escape: The Effect of Negative Public Affiliation on Belongingness to Virtual Communities.
Commun. Assoc. Inf. Syst., 2020

The Training Paradox of IT Professionals - Who Leaves, Who Stays?
Proceedings of the 41st International Conference on Information Systems, 2020

Can Trust be Trusted in Cybersecurity?
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Conceptualizing Fluid Team Membership and Its Effects in IT Projects: A Preliminary Model.
Proceedings of the 28th European Conference on Information Systems, 2020

A Taxonomy of Software Delivery Performance Profiles: Investigating the Effects of DevOps Practices.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
The IT Identity Threat: A Conceptual Definition and Operational Measure.
J. Manag. Inf. Syst., 2019

Revisiting the Impact of System Use on Task Performance: An Exploitative-Explorative System Use Framework.
J. Assoc. Inf. Syst., 2019

Blockchain Research in Information Systems: Current Trends and an Inclusive Future Research Agenda.
J. Assoc. Inf. Syst., 2019

A Field-Based View on Gender in the Information Systems Discipline: Preliminary Evidence and an Agenda for Change.
J. Assoc. Inf. Syst., 2019

Perspectives on numerical data quality in IS research.
Decis. Support Syst., 2019

Getting Information Systems Programs Classified as STEM: A U.S.-based Perspective from an AIS Task Force Study and Panel Discussion.
Commun. Assoc. Inf. Syst., 2019

Call for Papers, Issue 1/2021 - AI-Based Information Systems.
Bus. Inf. Syst. Eng., 2019

A Control-Alignment Model for Product Orientation in DevOps Teams-A Multinational Case Study.
Proceedings of the 40th International Conference on Information Systems, 2019

Designing Experimental Studies.
Proceedings of the 40th International Conference on Information Systems, 2019

2018
Mindfulness in Information Technology Use: Definitions, Distinctions, and a New Measure.
MIS Q., 2018

How and why trust matters in post-adoptive usage: The mediating roles of internal and external self-efficacy.
J. Strateg. Inf. Syst., 2018

Concentration, Competence, Confidence, and Capture: An Experimental Study of Age, Interruption-based Technostress, and Task Performance.
J. Assoc. Inf. Syst., 2018

Informing Research: Celebrating 50 Years of Ideas and Science at HICSS.
J. Assoc. Inf. Syst., 2018

Leveraging social media to achieve a community policing agenda.
Gov. Inf. Q., 2018

Understanding social networking site (SNS) identity from a dual systems perspective: an investigation of the dark side of SNS use.
Eur. J. Inf. Syst., 2018

Disaggregation of the IT capital effects on firm performance: Empirical evidence from an IT asset portfolio perspective.
Eur. J. Inf. Syst., 2018

IS Information Systems a (Social) Science?
Commun. Assoc. Inf. Syst., 2018

Celebrating HICSS50: The Past, Present, and Future of HICSS.
Commun. Assoc. Inf. Syst., 2018

ICIS 2017 Panel Report: Break Your Shackles! Emancipating Information Systems from the Tyranny of Peer Review.
Commun. Assoc. Inf. Syst., 2018

Information Systems Betrayal: When Cybersecurity Systems Shift from Agents of Protection to Agents of Harm.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

Turning the Negative Affiliation Around: Looking Glass Self in Online Community Platforms.
Proceedings of the International Conference on Information Systems, 2018

The Paradoxical Effects of Blockchain Technology on Social Networking Practices.
Proceedings of the International Conference on Information Systems, 2018

Lab Experiment and Field Experiment in the Digital Age: Friend or Foe?
Proceedings of the International Conference on Information Systems, 2018

Signaling your Religion: How Strength of Religious Identity Presentation over Social Media Effects Hireability Assessments.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Training to Mitigate Phishing Attacks Using Mindfulness Techniques.
J. Manag. Inf. Syst., 2017

Can Political Skill Enhance Business and IT Knowledge?
Inf. Syst. Manag., 2017

Blockchain Technology in Business and Information Systems Research.
Bus. Inf. Syst. Eng., 2017

Self-Disclosure and SNS Platforms: The Impact of SNS Transparency.
Proceedings of the International Conference on Information Systems, 2017

Implications of Technological Progress for the Measurement of Technology Acceptance Variables: The Case of Self-efficacy.
Proceedings of the International Conference on Information Systems, 2017

Break Your Shackles! Emancipating Information Systems From The Tyranny of Peer Review.
Proceedings of the International Conference on Information Systems, 2017

When Modern Technologies Meet Ageing Workforces: Older Workers are more affected by Demands from Mobile Interruptions than their Younger Counterparts.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Detecting and summarizing emergent events in microblogs and social media streams by dynamic centralities.
Proceedings of the 2017 IEEE International Conference on Big Data, 2017

2016
Job Satisfaction in Agile Development Teams: Agile Development as Work Redesign.
J. Assoc. Inf. Syst., 2016

Research Note - Using Expectation Disconfirmation Theory and Polynomial Modeling to Understand Trust in Technology.
Inf. Syst. Res., 2016

Alignment's nomological network: Theory and evaluation.
Inf. Manag., 2016

Defending against Spear Phishing: Motivating Users through Fear appeal Manipulations.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

Habitual and Misplaced Trust: The Role of the Dark Side of Trust Between Individual Users and Cybersecurity Systems.
Proceedings of the International Conference on Information Systems, 2016

"On Here, I'm Team Jacob: " Exploring Feelings of Belongingness in Virtual Communities.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Evaluating Tenure Cases for Scholars Active in Emergent or Non-mainstream IS research topics.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Self-disclosure & SNS Platforms: The Impact of Transparency, Accountability & Culture.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Power, Politics, and Knowledge: Influencing Executive Teams.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

The Dark Internet: Without Darkness There is No Light.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Beliefs and Attributions toward Computing Technology: The Moderating Role of Social Cues in Interfaces.
J. Organ. End User Comput., 2015

Interrupting the Workplace: Examining Stressors in an Information Technology Context.
J. Assoc. Inf. Syst., 2015

Does Professionalism Matter in the IT Workforce? An Empirical Examination of IT Professionals.
J. Assoc. Inf. Syst., 2015

Six types of IT-business strategic alignment: an investigation of the constructs and their measurement.
Eur. J. Inf. Syst., 2015

Taxing the development structure of open source communities: An information processing view.
Decis. Support Syst., 2015

Towards Grand Challenges in Computing Education Across Disciplines.
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Contextual Factors in Post-adoption: Applying the Model of Proactive Work Behavior to the Study of End-User innovation.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Looking Toward the Future of IT-Business Strategic Alignment through the Past: A Meta-Analysis.
MIS Q., 2014

Modern information technology in an old workforce: Toward a strategic research agenda.
J. Strateg. Inf. Syst., 2014

Incorporating trust-in-technology into Expectation Disconfirmation Theory.
J. Strateg. Inf. Syst., 2014

The Influence of Social Aversion and Institution-Based Trust on Computer Self-Efficacy, Computer Anxiety and Antecedents to IT Use.
J. Organ. End User Comput., 2014

NeuroIS - Alternative or Complement to Existing Methods? Illustrating the Holistic Effects of Neuroscience and Self-Reported Data in the Context of Technostress Research.
J. Assoc. Inf. Syst., 2014

Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance.
Inf. Syst. Res., 2014

Understanding online customers' ties to merchants: the moderating influence of trust on the relationship between switching costs and e-loyalty.
Eur. J. Inf. Syst., 2014

Understanding the social web: towards defining an interdisciplinary research agenda for information systems.
Data Base, 2014

Managing Your PhD Student Career: How to Prepare for the Job Market.
CAIS, 2014

Extending Ecommerce Deception Theory to Phishing.
Proceedings of the International Conference on Information Systems, 2014

The Same, Yet Different: Using Hedonic Systems in Utilitarian Settings.
Proceedings of the International Conference on Information Systems, 2014

Social Media and Emergency Management: Exploring State and Local Tweets.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Can we have fun @ work? The role of intrinsic motivation for utilitarian systems.
Eur. J. Inf. Syst., 2013

A Classification and Investigation of Trustees in B-to-C e-Commerce: General vs. Specific Trust.
Commun. Assoc. Inf. Syst., 2013

Thirty Years and Counting: Do We Still Need the ICIS Women's Breakfast?
Commun. Assoc. Inf. Syst., 2013

Using the Social Web to Explore the Online Discourse and Memory of the Civil War.
Proceedings of the 8th Annual International Conference of the Alliance of Digital Humanities Organizations, 2013

Understanding the Impact of Individual Creativity with Information Technology upon the Deep Usage of IT Systems.
Proceedings of the 19th Americas Conference on Information Systems, 2013

Social Inclusion in a Hyperconnected World.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
The Moderating Effects of Privacy Restrictiveness and Experience on Trusting Beliefs and Habit: An Empirical Test of Intention to Continue Using a Social Networking Website.
IEEE Trans. Engineering Management, 2012

The Grass is Always Greener on The Other Side: A Test of Present and Alternative Job Utility on IT Professionals' Turnover.
IEEE Trans. Engineering Management, 2012

IS Employee Attitudes and Perceptions at Varying Levels of Software Process Maturity.
MIS Q., 2012

Assessing Common Method Bias: Problems with the ULMC Technique.
MIS Q., 2012

Does Technology Trust Substitute Interpersonal Trust?: Examining Technology Trust's Influence on Individual Decision-Making.
J. Organ. End User Comput., 2012

Post-Acceptance Intentions and Behaviors: An Empirical Investigation of Information Technology Use and Innovation.
J. Organ. End User Comput., 2012

Conceptualizing models using multidimensional constructs: a review and guidelines for their use.
Eur. J. Inf. Syst., 2012

Operationalizing Multidimensional Constructs in Structural Equation Modeling: Recommendations for IS Research.
Commun. Assoc. Inf. Syst., 2012

Information Technology Worker Recruitment: An Empirical Examination of Entry-Level IT Job Seekers' Labor Market.
Commun. Assoc. Inf. Syst., 2012

Examining the influence of cultural values on the post-adoptive use of knowledge management systems.
Proceedings of the 2012 Computers and People Research Conference, SIGMIS-CPR '12, Milwaukee, WI, USA, May 31, 2012

Power and Politics: Do CIOs Have What It Takes to Influence the Executive Team's Commitment to IT Initiatives?
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Trust in a specific technology: An investigation of its components and measures.
ACM Trans. Manag. Inf. Syst., 2011

The Role of Trust in Postadoption IT Exploration: An Empirical Examination of Knowledge Management Systems.
IEEE Trans. Engineering Management, 2011

The Emerging CIO Role of Business Technology Strategist.
MIS Q. Executive, 2011

Coping with interruptions in Computer-Mediated Environments: the Role of Computer Experience.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

Unraveling the "paradox of the active user": Determinants of individuals' innovation with it-based work routines.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Trends in Organizational Computing and Electronic Commerce Professionals.
J. Organ. Comput. Electron. Commer., 2010

A Study of Work-Family Conflict Among IT Professionals: Job Characteristics, Individual Values, and Management Practices.
J. Organ. Comput. Electron. Commer., 2010

Old Wine in New Bottles: Investigating how Information Technology is Enabling "Old Criminals" to access "New Venues".
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

Integrating Trust in technology and Computer Self- Efficacy within the Post-Adoption Context: An Empirical Examination.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2009
Swift Trust in Web Vendors: The Role of Appearance and Functionality.
J. Organ. End User Comput., 2009

Organizational Factors and Information Technology Use: Tying Perceptions of the Organization to Perceptions of IT.
J. Organ. End User Comput., 2009

Conceptualizing and testing formative constructs: tutorial and annotated example.
Data Base, 2009

Do We Trust the Technology? People? or Both? Ruminations on Technology Trust.
Proceedings of the 15th Americas Conference on Information Systems, 2009

Is Intrinsic Motivation as Important in Utilitarian Systems as It Is in Hedonic Systems? A Preliminary Meta-Analysis.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Internal and External Dimensions of Computer Self-Efficacy: An Empirical Examination.
IEEE Trans. Engineering Management, 2008

Does Within-Culture Variation Matter? An Empirical Study of Computer Usage.
J. Glob. Inf. Manag., 2008

Impact of the Journey: IS Employee Attitudes and Perceptions as Organizations Climb the CMM Ladder.
Proceedings of the International Conference on Information Systems, 2008

2007
Organisational change and capability reconfiguration in information technology innovation.
Int. J. Inf. Syst. Chang. Manag., 2007

Internet anxiety: An empirical study of the effects of personality, beliefs, and social support.
Inf. Manag., 2007

Fix IT-business relationships through better decision rights.
Commun. ACM, 2007

Individual and Human-Assisted Computer Self Efficacy: An Empirical Examination.
Proceedings of the eOrganisation: Service-, Prozess-, Market-Engineering: 8. Internationale Tagung Wirtschaftsinformatik, 2007

Tying Context to Post-Adoption Behavior with Information Technology: A Conceptual and Operational Definition of Mindfulness.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Antecedents and outcomes of strategic IS alignment: an empirical investigation.
IEEE Trans. Engineering Management, 2006

Do You Know What I Know? A Shared Understandings Perspective on Text-Based Communication.
J. Comput. Mediat. Commun., 2006

IT worker turnover: an empirical examination of intrinsic motivation.
Data Base, 2006

2005
Moving Beyond Intentions and Toward the Theory of Trying: Effects of Work Environment and Gender on Post-Adoption Information Technology Use.
MIS Q., 2005

2004
Commitment, Trust, and Social Involvement: An Exploratory Study of Antecedents to Web Shopper Loyalty.
J. Organ. Comput. Electron. Commer., 2004

2003
Turnover of Information Technology Workers: Examining Empirically the Influence of Attitudes, Job Characteristics, and External Markets.
J. Manag. Inf. Syst., 2003

Culture, Overload and Personal Innovativeness with Information Technology: Extending the Nomological Net.
J. Comput. Inf. Syst., 2003

2002
An Empirical Examination of Individual Traits as Antecedents to Computer Anxiety and Computer Self-Efficacy.
MIS Q., 2002

The role of the work itself: an empirical examination of intrinsic motivation's influence on IT workers attitudes and intentions.
Proceedings of the ACM SIGCPR Conference on Computer Personnel Research, 2002

2001
Synthesizing Structuration and Institutional Theory: three cases.
Australas. J. Inf. Syst., 2001

Information Technology Worker Turnover: An Integrative Model and Empirical Test.
Proceedings of the International Conference on Information Systems, 2001


  Loading...