Difference between revisions of "Main Page"
m (changing external links to be internal links) |
m (Fixed bad links) |
||
(10 intermediate revisions by 5 users not shown) | |||
Line 30: | Line 30: | ||
*[[Absorptive capacity theory]] | *[[Absorptive capacity theory]] | ||
*[[Actor network theory]] | *[[Actor network theory]] | ||
− | *[[Accountability theory | + | *[[Accountability theory]] |
*[[Adaptive structuration theory]] | *[[Adaptive structuration theory]] | ||
*[[Administrative behavior, theory of]] | *[[Administrative behavior, theory of]] | ||
Line 48: | Line 48: | ||
*[[Critical social theory]] | *[[Critical social theory]] | ||
*[[Critical success factors, theory of]] | *[[Critical success factors, theory of]] | ||
+ | *[[Customer based Discrepancy Theory]] | ||
*[[Customer Focus Theory]] | *[[Customer Focus Theory]] | ||
*[[Deferred action, theory of]] | *[[Deferred action, theory of]] | ||
Line 66: | Line 67: | ||
*[[General systems theory]] | *[[General systems theory]] | ||
*[[General deterrence theory]] | *[[General deterrence theory]] | ||
− | *[[ | + | *[[General Strain Theory|General Strain theory]] |
+ | *[[Hedonic-motivation system adoption model (HMSAM)]] | ||
*[[Hermeneutics]] | *[[Hermeneutics]] | ||
*[[Illusion of control]] | *[[Illusion of control]] | ||
Line 90: | Line 92: | ||
*[[Process virtualization theory]] | *[[Process virtualization theory]] | ||
*[[Prospect theory]] | *[[Prospect theory]] | ||
− | *[[Protection motivation theory (NEW entry!)]] | + | *[[Protection motivation theory (NEW entry!)|Protection motivation theory]] |
*[[Punctuated equilibrium theory]] | *[[Punctuated equilibrium theory]] | ||
*[[Real options theory]] | *[[Real options theory]] | ||
Line 99: | Line 101: | ||
*[[SERVQUAL]] | *[[SERVQUAL]] | ||
*[[Signaling|Signaling theory]] | *[[Signaling|Signaling theory]] | ||
+ | *[[Social Bond Theory]] | ||
*[[Social capital theory]] | *[[Social capital theory]] | ||
*[[Social cognitive theory]] | *[[Social cognitive theory]] | ||
*[[Social exchange theory]] | *[[Social exchange theory]] | ||
+ | *[[Social Influence Theory]] (of Kelman) | ||
*[[Social learning theory]] | *[[Social learning theory]] | ||
*[[Social network theory]] | *[[Social network theory]] | ||
Line 109: | Line 113: | ||
*[[Stakeholder theory]] | *[[Stakeholder theory]] | ||
*[[Structuration theory]] | *[[Structuration theory]] | ||
+ | *[[Structured process modeling theory (SPMT)]] | ||
*[[Task closure theory]] | *[[Task closure theory]] | ||
*[[Task-technology fit]] | *[[Task-technology fit]] | ||
Line 115: | Line 120: | ||
*[[Technology dominance, theory of]] | *[[Technology dominance, theory of]] | ||
*[[Technology-organization-environment framework]] | *[[Technology-organization-environment framework]] | ||
+ | *[[Technology Threat Avoidance Theory (TTAT)|Technology Threat Avoidance Theory]] | ||
*[[Theory of collective action]] | *[[Theory of collective action]] | ||
*[[Theory of planned behavior]] | *[[Theory of planned behavior]] |
Revision as of 03:31, 7 March 2017
This site provides researchers with summarized information on theories widely used in information systems (IS) research. Click on a linked theory name below to find details about the theory, some examples of IS papers using the theory, and links to related sites. Please feel free to summarize a theory, add to the information already present, correct errors, or suggest additional theories for the list. Theories yet to be summarized and theory submission guidelines can be found below.
This site is built on user contributions. Please share your knowledge and contribute!
This site is maintained as an ongoing project of the Human Behavior Project at the University of Colorado and the Information Systems PhD Preparation Program of the Marriott School of Management of Brigham Young University.
- Suggested Citation for the Wiki
- Larsen, K. R., Eargle, D. (Eds.) (2015). Theories Used in IS Research Wiki. Retrieved [today's date] from http://IS.TheorizeIt.org.
- IS Theories Wiki is now part of the TheorizeIt.org portal.
- For construct discovery, try out the internomological network at INN.TheorizeIt.org.
- New wiki usage report available
- A report analyzing the top-visited wiki pages of 2014 has been compiled. Find it here: Top 10 IS Theories of 2014.
Theories
- Absorptive capacity theory
- Actor network theory
- Accountability theory
- Adaptive structuration theory
- Administrative behavior, theory of
- Agency theory
- Argumentation theory
- Behavioral decision theory
- Belief Action Outcome Framework
- Boundary object theory
- Chaos theory
- Cognitive dissonance theory
- Cognitive fit theory
- Cognitive load theory
- Competitive strategy (Porter)
- Complexity theory
- Contingency theory
- Critical realism theory
- Critical social theory
- Critical success factors, theory of
- Customer based Discrepancy Theory
- Customer Focus Theory
- Deferred action, theory of
- Delone and McLean IS success model
- Design Theory
- Diffusion of innovations theory
- Dynamic capabilities
- Elaboration likelihood model
- Embodied social presence theory
- Equity theory
- Evolutionary theory
- Expectation confirmation theory
- Feminism theory
- Fit-Viability theory
- Flow theory
- Game theory
- Garbage can theory
- General systems theory
- General deterrence theory
- General Strain theory
- Hedonic-motivation system adoption model (HMSAM)
- Hermeneutics
- Illusion of control
- Impression management, theory of
- Information processing theory
- Institutional theory
- International information systems theory
- Keller's Motivational Model
- Knowledge-based theory of the firm
- Language action perspective
- Information asymmetry theory (lemon market)
- Management fashion theory
- Media richness theory
- Media synchronicity theory
- Modal aspects, theory of
- Multi-attribute utility theory
- Multi-motive information systems continuance model (MISC)
- Organizational culture theory
- Organizational information processing theory
- Organizational knowledge creation
- Organizational learning theory
- Portfolio theory
- Process virtualization theory
- Prospect theory
- Protection motivation theory
- Punctuated equilibrium theory
- Real options theory
- Resource-based view of the firm
- Resource dependency theory
- Selective organizational information privacy and security violations model (SOIPSVM)
- Self-efficacy theory
- SERVQUAL
- Signaling theory
- Social Bond Theory
- Social capital theory
- Social cognitive theory
- Social exchange theory
- Social Influence Theory (of Kelman)
- Social learning theory
- Social network theory
- Social shaping of technology
- Socio-technical theory
- Soft systems theory
- Stakeholder theory
- Structuration theory
- Structured process modeling theory (SPMT)
- Task closure theory
- Task-technology fit
- Technological frames of reference
- Technology acceptance model
- Technology dominance, theory of
- Technology-organization-environment framework
- Technology Threat Avoidance Theory
- Theory of collective action
- Theory of planned behavior
- Theory of reasoned action
- Theory of slack resources
- Transaction cost economics
- Transactive memory theory
- Unified theory of acceptance and use of technology
- Usage control model
- Work systems theory
- Yield shift theory of satisfaction