Reference: | [1]. Asatiani, A., Malo, P., Nagbøl, P., Penttinen, E., Rinta-Kahila, T., & Salovaara, A. (2021). Sociotechnical envelopment of artificial intelligence: an approach to organizational deployment of inscrutable artificial intelligence systems. Journal of the Association for Information Systems, 22(2), 325-352. [2]. Boyd, D., Kannan, P., & Slotegraaf, R. (2019). Branded apps and their impact on firm value: a design perspective. Journal of Marketing Research, 56(1), 76-88. [3]. Bygstad, B. and Øvrelid, E. (2020). Architectural alignment of process innovation and digital infrastructure in a high-tech hospital. European Journal of Information Systems, 29(3), 220-237. [4]. Chen, H., He, D., Zhu, S., & Yang, J. (2017). Toward detecting collusive ranking manipulation attackers in mobile app markets., 58-70. [5]. Chiu, C. and Huang, H. (2015). Examining the antecedents of user gratification and its effects on individuals’ social network services usage: the moderating role of habit. European Journal of Information Systems, 24(4), 411-430. [6]. Cram, W., Brohman, M., & Gallupe, R. (2015). Hitting a moving target: a process model of information systems control change. Information Systems Journal, 26(3), 195-226. [7]. Cram, W., Brohman, M., & Gallupe, R. (2016). Information systems control: a review and framework for emerging information systems processes. Journal of the Association for Information Systems, 17(4), 216-266. [8]. Davison, R. (2016). Transition arrangements to a new editorial structure. Information Systems Journal, 27(1), 1-3. [9]. Fu, S., Cai, Z., Lim, E., Liu, Y., Tan, C., Lin, Y., … & Deng, S. (2023). Unraveling the effects of mobile application usage on users’ health status: insights from conservation of resources theory. Journal of the Association for Information Systems, 24(2), 452-489. [10]. Ghazawneh, A. and Henfridsson, O. (2012). Balancing platform control and external contribution in third‐party development: the boundary resources model. Information Systems Journal, 23(2), 173-192. [11]. Karunanayake, N., Rajasegaran, J., Gunathillake, A., Seneviratne, S., & Jourjon, G. (2020). A multi-modal neural embeddings approach for detecting mobile counterfeit apps: a case study on google play store. Ieee Transactions on Mobile Computing, 1-1. [12]. Karwatzki, S., Trenz, M., & Veit, D. (2022). The multidimensional nature of privacy risks: conceptualisation, measurement and implications for digital services. Information Systems Journal, 32(6), 1126-1157. [13]. Kehr, F., Kowatsch, T., Wentzel, D., & Fleisch, E. (2015). Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus. Information Systems Journal, 25(6), 607-635. [14]. Keith, M., Babb, J., Lowry, P., Furner, C., & Abdullat, A. (2015). The role of mobile‐computing self‐efficacy in consumer information disclosure. Information Systems Journal, 25(6), 637-667. [15]. Kisembo, I., Ocen, G., Bongomin, O., Alunyu, A., Nibikora, I., Matovu, D., … & Bwire, F. (2021). An algorithm for improvement of email security on android operating system in the era of industry 4.0... [16]. Lehrer, C., Wieneke, A., Brocke, J., Jung, R., & Seidel, S. (2018). How big data analytics enables service innovation: materiality, affordance, and the individualization of service. Journal of Management Information Systems, 35(2), 424-460. [17]. Lin, Y., Chen, H., Brown, R., Li, S., & Yang, H. (2017). Healthcare predictive analytics for risk profiling in chronic care: a bayesian multitask learning approach. Mis Quarterly, 41(2), 473-495. [18]. Mettler, T. and Wulf, J. (2018). Physiolytics at the workplace: affordances and constraints of wearables use from an employee's perspective. Information Systems Journal, 29(1), 245-273. https://doi.org/10.1111/isj.12205 [19]. Miah, S., Gammack, J., & Hasan, N. (2017). Extending the framework for mobile health information systems research: a content analysis. Information Systems, 69, 1-24. [20]. Mishra, S. and Rana, G. (2019). Economics of counterfeit products: with special reference to mobile phones & watches. Theoretical Economics Letters, 09(05), 1699-1716. [21]. Murungi, D., Wiener, M., & Marabelli, M. (2019). Control and emotions: understanding the dynamics of controllee behaviours in a health care information systems project. Information Systems Journal, 29(5), 1058-1082. [22]. Ofe, H. and Sandberg, J. (2022). The emergence of digital ecosystem governance: an investigation of responses to disrupted resource control in the swedish public transport sector. Information Systems Journal, 33(2), 350-384. [23]. Porter, A. and Hooff, B. (2020). The complementarity of autonomy and control in mobile work. European Journal of Information Systems, 29(2), 172-189. [24]. Pujol, J., Arias, M., & Arratia, A. (2016). Geosrs: a hybrid social recommender system for geolocated data. Information Systems, 57, 111-128. [25]. Rajasegaran, J., Karunanayake, N., Gunathillake, A., Seneviratne, S., & Jourjon, G. (2019). A multi-modal neural embeddings approach for detecting mobile counterfeit apps.. [26]. Rowe, F., Ngwenyama, O., & Richet, J. (2020). Contact-tracing apps and alienation in the age of covid-19. European Journal of Information Systems, 29(5), 545-562. [27]. Salo, M. and Frank, L. (2015). User behaviours after critical mobile application incidents: the relationship with situational context. Information Systems Journal, 27(1), 5-30. [28]. Sanyal, P., Menon, N., & Siponen, M. (2021). An Empirical Examination of the Economics of Mobile Application Security. MIS Quarterly, 45(4). [29]. Seneviratne, S., Kolamunna, H., & Seneviratne, A. (2015). A measurement study of tracking in paid mobile applications.. [30]. Shuraida, S., Gao, Q., Safadi, H., & Jain, R. (2024). The impact of feature exploitation and exploration on mobile application evolution and success. Journal of the Association for Information Systems, 25(3), 648-686. [31]. Spears, J. L., & Barki, H. (2010). User participation in information systems security risk management. Mis Quarterly, 34(3), 503. [32]. Sutanto, J., Palme, E., Tan, C., & Phang, C. (2013). Addressing the personalization-privacy paradox: an empirical assessment from a field experiment on smartphone users. Mis Quarterly, 37(4), 1141-1164. [33]. Tam, K., Feng, Y., & Kwan, S. (2019). The role of morality in digital piracy: understanding the deterrent and motivational effects of moral reasoning in different piracy contexts. Journal of the Association for Information Systems, 604-628. [34]. Thomas Dohmen, Armin Falk, David Huffman, Uwe Sunde, Jürgen Schupp, Gert G. Wagner (2011), Individual Risk Attitudes: Measurement, Determinants, and Behavioral Consequences, Journal of the European Economic Association, Volume 9, Issue 3, 1 [35]. Tu, Y. J., & Piramuthu, S. (2024). Ethical consumerism, supply chains, and deceptions with RFID-based systems. Information & Management, 61(6), 104016. [36]. Tu, Y. J., & Piramuthu, S. (2024). Security and privacy risks in drone-based last mile delivery. European Journal of Information Systems, 33(5), 617-630. [37]. Tu, Y. J., & Shaw, M. J. (2009, December). An integrated approach to managing IT portfolio. In Workshop on E-Business (pp. 243-253). Berlin, Heidelberg: Springer Berlin Heidelberg. [38]. Tu, Y. J., Huang, Y. H., Strader, T. J., Subramanyam, R., Shaw, M. J. (2020). Candidate diversity and granularity in IT portfolio construction, Information Technology and Management, 21, 157-168. [39]. Wang, P., Wu, D., Chen, Z., & Wei, T. (2018). Field experience with obfuscating million‐user ios apps in large enterprise mobile development. Software Practice and Experience, 49(2), 252-273. [40]. Wells, J. D., Valacich, J. S., & Hess, T. J. (2011). What signal are you sending? How website quality influences perceptions of product quality and purchase intentions. MIS quarterly, 373-396. [41]. Zhang, J., Jiang, Q., Zhang, W., Kang, L., Lowry, P., & Zhang, X. (2023). Explaining the outcomes of social gamification: a longitudinal field experiment. Journal of Management Information Systems, 40(2), 401-439. |