Joey F. George

According to our database1, Joey F. George authored at least 110 papers between 1988 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Invited Paper: The Times they are a Changin': How Non-Technology Factors have Affected IS Curriculum over Time.
JISE, 2019

Relationships between IT department culture and agile software development practices: An empirical investigation.
Int. J. Inf. Manag., 2019

Journal Lists are Not Going Away: A Response to Fitzgerald et al.
CAIS, 2019

IT-Induced Employment Irregularities and Deskilling: Impacts on Temporary Worker Welfare.
Proceedings of the 40th International Conference on Information Systems, 2019

Online Disinformation and the Psychological Bases of Prejudice and Political Conservatism.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
The Effects of Communication Media and Culture on Deception Detection Accuracy.
MIS Quarterly, 2018

The amorphous nature of agile: no one size fits all.
J. Systems and IT, 2018

Informing Research: Celebrating 50 Years of Ideas and Science at HICSS.
J. AIS, 2018

Antecedents and outcomes of collaborative innovation capabilities on the platform collaboration environment.
Int. J. Inf. Manag., 2018

An Exploration of Deception Detection: Are Groups More Effective Than Individuals?
Communication Research, 2018

Personal Health Record Systems as Boundary Objects.
CAIS, 2018

Celebrating HICSS50: The Past, Present, and Future of HICSS.
CAIS, 2018

Information Systems Betrayal: When Cybersecurity Systems Shift from Agents of Protection to Agents of Harm.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

Iterating the Cybernetic Loops in Anti-Phishing Behavior: A Theoretical Integration.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Behind Cyber Doors: Securing the Internet of Self.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Connected Homes and Online Retail: The Case of IoT Enabled Online Shopping.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
The influence of inter-firm IT governance strategies on relational performance: The moderation effect of information technology ambidexterity.
Int. J. Inf. Manag., 2017

Beware the dark side: Cultural preferences for lying online.
Comput. Hum. Behav., 2017

Does IT Capability and Competitive Actions Shape Firm Profitability?
Proceedings of the International Conference on Information Systems, 2017

2016
Toward the development of a big data analytics capability.
Inf. Manag., 2016

Website credibility and deceiver credibility: Expanding Prominence-Interpretation Theory.
Comput. Hum. Behav., 2016

One Question, Two Answers Mixed Findings of Information Technology Capability and Firm Performance and Their Implications.
AIS Trans. Replication Res., 2016

Website Credibility Assessment: An Empirical - Investigation of Prominence-interpretation Theory.
AIS Trans. Hum. Comput. Interact., 2016

The Dark Internet: Without Darkness There is No Light.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Mixed Findings on IT Capability and Firm Performance and their Implications.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Achieving Academic-Industry Collaboration with Departmental Advisory Boards.
MIS Quarterly Executive, 2015

Mediation and time-lag analyses of e-alignment and e-collaboration capabilities.
Industrial Management and Data Systems, 2015

How Does the Rivalry between Firms Explain the IT Capability Gap, Leanness, and Performance of Firms?
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Investigating the effects of IS strategic leadership on organizational benefits from the perspective of CIO strategic roles.
Inf. Manag., 2014

Sender credibility and deception detection.
Comput. Hum. Behav., 2014

A Grounded Theory Approach to Information Technology Adoption.
CAIS, 2014

Privacy in the Age of Big Data: The Challenges and Opportunities for Privacy Research.
Proceedings of the International Conference on Information Systems, 2014

From Waterfall to Agile: A Review of Approaches to Systems Analysis and Design.
Proceedings of the Computing Handbook, 2014

2013
The Effects of Task Complexity and Group Member Experience on Computer-Mediated Groups Facing Deception.
IEEE Trans. Prof. Communication, 2013

Media Selection as a Strategic Component of Communication.
MIS Quarterly, 2013

Virtual Team Effectiveness: Investigating the Moderating Role of Experience with Computer-Mediated Communication on the Impact of Team Cohesion and Openness.
JOEUC, 2013

Why aren't organizations adopting virtual worlds?
Comput. Hum. Behav., 2013

MOOCs and Beyond.
Proceedings of the International Conference on Information Systems, 2013

The Effects of Fictitious Customer Testimonials across Different Cultures.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
Cultural determinants of media choice for deception.
Comput. Hum. Behav., 2012

Information Technology Worker Recruitment: An Empirical Examination of Entry-Level IT Job Seekers' Labor Market.
CAIS, 2012

2011
Anticipating information needs for senior portal contents.
Comput. Hum. Behav., 2011

Faculty Exchanges as a Way to Increase Globalization in the IS Curriculum.
CAIS, 2011

Perceived Organizational Readiness Study on EHR Implementation.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

Unraveling the "paradox of the active user": Determinants of individuals' innovation with it-based work routines.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Lying at Work: A Deceiver's View of Media Characteristics.
CAIS, 2010

2009
A Cross-Cultural Comparison of Computer-Mediated Deceptive Communication.
Proceedings of the Pacific Asia Conference on Information Systems, 2009

Making it Hard to Lie: Cultural Determinants of Media Choice for Deception.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
Computer Mediated Negotiations and Deception.
Proceedings of the Handbook of Research on Computer Mediated Communication (2 Volumes), 2008

Deceptive Communication in E-Collaboration.
Proceedings of the Handbook of Research on Computer Mediated Communication (2 Volumes), 2008

The Role of E-Training in Protecting Information Assets Against Deception Attacks.
MIS Quarterly Executive, 2008

Deception: Toward an Individualistic View of Group Support Systems.
J. AIS, 2008

Distributed Deception: An Investigation of the Effectiveness of Deceptive Communication in a Computer-Mediated Environment.
IJeC, 2008

Cross-cultural deception in social networking sites and face-to-face communication.
Comput. Hum. Behav., 2008

Three Years as Editor-in-Chief of Communications of the Association for Information Systems.
CAIS, 2008

Detecting Deception in Computer-Mediated Interviewing.
Proceedings of the 16th European Conference on Information Systems, 2008

2007
IT Road Warriors: Balancing Work--Family Conflict, Job Autonomy, and Work Overload to Mitigate Turnover Intentions.
MIS Quarterly, 2007

The Influences of Deception and Computer-Mediation on Dyadic Negotiations.
J. Computer-Mediated Communication, 2007

The Gap Between Small Group Theory and Group Support System Research.
Proceedings of the Groupware: Design, Implementation, and Use, 13th International Workshop, 2007

2006
Researching life in e-society with diary studies.
Proceedings of the Fourteenth European Conference on Information Systems, 2006

2005
Inside the Fence: Sensitizing Decision Makers to the Possibility of Deception in the Data They Use.
MIS Quarterly Executive, 2005

Deception: The Dark Side of E-Collaboration.
IJeC, 2005

Does Information Systems Still Matter? Lessons for a Maturing Discipline.
CAIS, 2005

Gender Differences in Deception and Its Detection Under Varying Electronic Media Conditions.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Group Deception in Computer-Supported Environments.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Task Complexity and Deception Detection in a Collaborative Group Setting.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Media Selection for Deceptive Communication.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

A Quasi-experiment to Determine the Impact of a Computer Based Deception Detection Training System: The Use of Agent99 Trainer in the U.S. Military.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Are Prevailing Theories and Practices of IS Security Management Adequate? An Evaluation and Call to Action.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
Commitment, Trust, and Social Involvement: An Exploratory Study of Antecedents to Web Shopper Loyalty.
J. Org. Computing and E. Commerce, 2004

The theory of planned behavior and Internet purchasing.
Internet Research, 2004

Testing Various Modes of Computer-Based Training for Deception Detection.
Proceedings of the Intelligence and Security Informatics, 2004

Deception Detection under Varying Electronic Media and Warning Conditions.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Training to Detect Deception: An Experimental Investigation.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Inhibiting Deception and Its Detection.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Report of the Ad Hoc Committee on Member Misconduct to the AIS Council.
CAIS, 2003

Training Professionals to Detect Deception.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

2002
Inducing Sensitivity to Deception in Order to Improve Decision Making Performance: A Field Study.
MIS Quarterly, 2002

Influences on the intent to make Internet purchases.
Internet Research, 2002

What Every Business Student Needs to Know About Information Systems.
CAIS, 2002

Improving software inspections with group process support.
Commun. ACM, 2002

Overworked and Isolated? Predicting the Effect of Work-Family Conflict, Autonomy, and Workload on Organizational Commitment and Turnover of Virtual Workers.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

2000
An empirical investigation of ODSS impact on individuals and organizations.
Decis. Support Syst., 2000

Countering the anchoring and adjustment bias with decision support systems.
Decis. Support Syst., 2000

The Effects of Internet Experience and Attitudes Toward Privacy and Security on Internet Purchasing.
Proceedings of the 8th European Conference on Information Systems, 2000

1999
Group Support Systems and Deceptive Communication.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

1997
Groups over time: what are we really studying?
Int. J. Hum. Comput. Stud., 1997

1996
Computer-Based Monitoring: Common Perceptions and Empirical Results.
MIS Quarterly, 1996

Panel 15 Researching Privacy: From Computerized Workplaces to the Marketspace.
Proceedings of the Seventeenth International Conference on Information Systems, 1996

1995
Managing software quality in a very large development project.
Inf. Manag., 1995

Exploring the Software Engineering Component in MIS Research.
Commun. ACM, 1995

The Adequacy of Office Models.
Advances in Computers, 1995

1993
The Implementation of Expert Systems: A Survey of Successful Implementations.
DATA BASE, 1993

PD and Joint Application Design: A Transatlantic Comparison.
Commun. ACM, 1993

Systems Development: Vital MIS Research Method or Medicine Show?
Proceedings of the Fourteenth International Conference on Information Systems, 1993

1992
The Conceptualization and Development of Organizational Decision Support Systems.
J. of Management Information Systems, 1992

AEI: A Knowledge-Based Approach to Integrated Office Systems.
J. of Management Information Systems, 1992

An examination of four GDSS experiments.
J. Inf. Sci., 1992

Electronic meeting systems as innovation: A study of the innovation process.
Inf. Manag., 1992

Information technology for organizational change.
Decis. Support Syst., 1992

Supporting Joint Application Development (JAD) with Electronic Meeting Systems: A Field Study.
Proceedings of the Thirteenth International Conference on Information Systems, 1992

1991
Microcomputer Training: Do Trained Users Differ from Nontrained User?
DATA BASE, 1991

Electronic Meeting Systems To Support Group Work.
Commun. ACM, 1991

Examining the Computing and Centralization Debate.
Commun. ACM, 1991

1990
Using Two Different Electronic Meeting System Tools for the Same Task: An Experimental Comparison.
J. of Management Information Systems, 1990

A Study of Collaborative Group Work With and Without Computer-Based Support.
Information Systems Research, 1990

Desktop Computerization as a Continuing Process.
Proceedings of the 11th International Conference on Information Systems, 1990

The organizational implementation of an electronic meeting system: an analysis of the innovation process.
Proceedings of the Conference on Human Factors in Computing Systems, 1990

1989
Implementing desktop computing, infrastructure, and quality of worklife.
Proceedings of the 10th International Conference on Information Systems, 1989

1988
Information Technology to Support Electronic Meetings.
MIS Quarterly, 1988


  Loading...