Difference between revisions of "Main Page"

From IS Theory
Jump to navigation Jump to search
m (Created new theory page)
Line 7: Line 7:
  
 
{{Citing}}
 
{{Citing}}
 +
 
</div>
 
</div>
  
Line 20: Line 21:
 
<div><b>Highlights</b></div>
 
<div><b>Highlights</b></div>
 
</div>
 
</div>
* '''IS Theories Wiki is now part of the TheorizeIt.org portal.'''
+
 
*: For construct discovery, try out the internomological network at [http://INN.TheorizeIt.org INN.TheorizeIt.org].
+
*'''IS Theories Wiki is now part of the TheorizeIt.org portal.'''
*:  
+
*:For construct discovery, try out the internomological network at [http://INN.TheorizeIt.org INN.TheorizeIt.org].
 +
*:
 
</div>
 
</div>
  
== Theories ==
+
==Theories==
  
 
*[[Absorptive capacity theory]]
 
*[[Absorptive capacity theory]]
Line 32: Line 34:
 
*[[Adaptive structuration theory]]
 
*[[Adaptive structuration theory]]
 
*[[Administrative behavior, theory of]]
 
*[[Administrative behavior, theory of]]
*[[Agency theory]]  
+
*[[Agency theory]]
 
*[[Argumentation theory]]
 
*[[Argumentation theory]]
 
*[[Behavioral decision theory]]
 
*[[Behavioral decision theory]]
Line 45: Line 47:
 
*[[Contingency theory]]
 
*[[Contingency theory]]
 
*[[Critical realism theory]]
 
*[[Critical realism theory]]
*[[Critical social theory]]  
+
*[[Critical social theory]]
 
*[[Critical success factors, theory of]]
 
*[[Critical success factors, theory of]]
 
*[[Customer based Discrepancy Theory]]
 
*[[Customer based Discrepancy Theory]]
 
*[[Customer Focus Theory]]
 
*[[Customer Focus Theory]]
*[[Deferred action, theory of]]  
+
*[[Deferred action, theory of]]
 
*[[Delone and McLean IS success model]]
 
*[[Delone and McLean IS success model]]
 
*[[Design Theory]]
 
*[[Design Theory]]
Line 56: Line 58:
 
*[[Elaboration likelihood model]]
 
*[[Elaboration likelihood model]]
 
*[[Embodied social presence theory]]
 
*[[Embodied social presence theory]]
*[[Equity theory]]
+
*[[Equity theory]]
 
*[[Evolutionary theory]]
 
*[[Evolutionary theory]]
*[[Expectation confirmation theory]]  
+
*[[Expectation confirmation theory]]
 
*[[Feminism theory]]
 
*[[Feminism theory]]
 
*[[Fit-Viability theory]]
 
*[[Fit-Viability theory]]
 
*[[Flow theory]]
 
*[[Flow theory]]
 
*[[Game theory]]
 
*[[Game theory]]
*[[Garbage can theory]]
+
*[[Garbage can theory]]
 
*[[General systems theory]]
 
*[[General systems theory]]
 
*[[General deterrence theory]]
 
*[[General deterrence theory]]
Line 77: Line 79:
 
*[[Kellers Motivational Model |Keller's Motivational Model]]
 
*[[Kellers Motivational Model |Keller's Motivational Model]]
 
*[[Knowledge-based theory of the firm]]
 
*[[Knowledge-based theory of the firm]]
*[[Language action perspective]]
+
*[[Language action perspective]]
 
*[[Lemon Market Theory|Information asymmetry theory (lemon market)]]
 
*[[Lemon Market Theory|Information asymmetry theory (lemon market)]]
 
*[[Management fashion theory]]
 
*[[Management fashion theory]]
Line 83: Line 85:
 
*[[Media synchronicity theory]]
 
*[[Media synchronicity theory]]
 
*[[Modal aspects, theory of]]
 
*[[Modal aspects, theory of]]
*[[Multi-attribute utility theory]]
+
*[[Multi-attribute utility theory]]
 
*[[Multi-motive information systems continuance model (MISC)]]
 
*[[Multi-motive information systems continuance model (MISC)]]
*[[Organizational culture theory]]  
+
*[[Organizational culture theory]]
 
*[[Organizational information processing theory]]
 
*[[Organizational information processing theory]]
 
*[[Organizational knowledge creation]]
 
*[[Organizational knowledge creation]]
 
*[[Organizational learning theory]]
 
*[[Organizational learning theory]]
*[[Portfolio theory]]  
+
*[[Portfolio theory]]
 
*[[Process virtualization theory]]
 
*[[Process virtualization theory]]
*[[Prospect theory]]  
+
*[[Prospect theory]]
 
*[[Protection motivation theory (NEW entry!)|Protection motivation theory]]
 
*[[Protection motivation theory (NEW entry!)|Protection motivation theory]]
 
*[[Punctuated equilibrium theory]]
 
*[[Punctuated equilibrium theory]]
Line 99: Line 101:
 
*[[Selective organizational information privacy and security violations model (SOIPSVM)]]
 
*[[Selective organizational information privacy and security violations model (SOIPSVM)]]
 
*[[Self-efficacy theory]]
 
*[[Self-efficacy theory]]
 +
*[[Semantic theory of survey response]]
 
*[[SERVQUAL]]
 
*[[SERVQUAL]]
 
*[[Signaling|Signaling theory]]
 
*[[Signaling|Signaling theory]]
Line 113: Line 116:
 
*[[Socio-technical theory]]
 
*[[Socio-technical theory]]
 
*[[Soft systems theory]]
 
*[[Soft systems theory]]
*[[Stakeholder theory]]
+
*[[Stakeholder theory]]
 
*[[Structuration theory]]
 
*[[Structuration theory]]
 
*[[Structured process modeling theory (SPMT)]]
 
*[[Structured process modeling theory (SPMT)]]
*[[Task closure theory]]
+
*[[Task closure theory]]
 
*[[Task-technology fit]]
 
*[[Task-technology fit]]
 
*[[Technological frames of reference]]
 
*[[Technological frames of reference]]
*[[Technology acceptance model]]  
+
*[[Technology acceptance model]]
*[[Technology dominance, theory of]]  
+
*[[Technology dominance, theory of]]
 
*[[Technology-organization-environment framework]]
 
*[[Technology-organization-environment framework]]
 
*[[Technology Threat Avoidance Theory (TTAT)|Technology Threat Avoidance Theory]]
 
*[[Technology Threat Avoidance Theory (TTAT)|Technology Threat Avoidance Theory]]
Line 127: Line 130:
 
*[[Theory of reasoned action]]
 
*[[Theory of reasoned action]]
 
*[[Theory of slack resources (TSR)|Theory of slack resources]]
 
*[[Theory of slack resources (TSR)|Theory of slack resources]]
*[[Transaction cost economics]]  
+
*[[Transaction cost economics]]
*[[Transactive memory theory]]  
+
*[[Transactive memory theory]]
 
*[[Unified theory of acceptance and use of technology]]
 
*[[Unified theory of acceptance and use of technology]]
 
*[[Usage control model]]
 
*[[Usage control model]]
 
*[[Work systems theory]]
 
*[[Work systems theory]]
 
*[[Yield shift theory of satisfaction]]
 
*[[Yield shift theory of satisfaction]]

Revision as of 05:15, 9 May 2019

This site is sponsored by the University of Colorado
Welcome to the Theories Used in IS Research Wiki

This site provides researchers with summarized information on theories widely used in information systems (IS) research. Click on a linked theory name below to find details about the theory, some examples of IS papers using the theory, and links to related sites. Please feel free to summarize a theory, add to the information already present, correct errors, or suggest additional theories for the list. Theories yet to be summarized and theory submission guidelines can be found below.

This site is built on user contributions. Please share your knowledge and contribute!

This site is maintained as an ongoing project of the Human Behavior Project at the University of Colorado and the Information Systems PhD Preparation Program of the Marriott School of Management of Brigham Young University.

Suggested Citation for the Wiki
Larsen, K. R., Eargle, D. (Eds.) (2015). Theories Used in IS Research Wiki. Retrieved [today's date] from http://IS.TheorizeIt.org.
Highlights
  • IS Theories Wiki is now part of the TheorizeIt.org portal.
    For construct discovery, try out the internomological network at INN.TheorizeIt.org.

Theories