Difference between revisions of "Main Page"

From IS Theory
Jump to navigation Jump to search
(61 intermediate revisions by 15 users not shown)
Line 1: Line 1:
==Recent Changes==
+
{{Sponsor Thumbs}}
In 2011, many of the articles on this site were modified by "spam bots," which altered page text by inserting links to various websites.  Our  thanks go the students of BYU's Information Systems PhD Preparation program (Dave Eargle, Arthur Weagle, Lee J Hinkle, Adam Thompson, and Jeremiah Maughan) who reviewed and edited each article to remove the errant links. 
 
  
To prevent this from happening again, we have added a "captcha" to the account creation page to be sure that only humans gain access to modify pages on this wiki.  Unfortunately, many (perhaps a majority) of the user accounts at this site were created by these 'bots.  Although some of these accounts could be clearly identified, there were many others which were very difficult to determine if they were valid or not.  Rather than risking leaving some 'bot-created accounts active, we have opted to delete all user accounts and require valid users to recreate their accounts under our new procedure.  We realize that this will be of a minor inconvenience for some valid uses but we felt the integrity of the site was worth the one-time difficulty for our valid users.
+
<div id="mainpage_topbox">
 +
<div id="mainpage_pagetitle">'''Welcome to the <span id="mainpage_mwtitle">Theories Used in IS Research Wiki</span>'''</div>
 +
<div class="mainpage_boxcontents">
 +
{{Introduction}}
  
== Theories Used in IS Research Wiki==
+
{{Citing}}
This site provides researchers with summarized information on theories widely used in information systems (IS) research. Click on a linked theory name below to find details about the theory, some examples of IS papers using the theory, and links to related sites. Please feel free to summarize a theory, add to the information already present, correct errors, or suggest additional theories for the list. Theories yet to be summarized and theory submission guidelines can be found below.
+
</div>
  
All information on this site is presented under a [http://en.wikipedia.org/wiki/GNU_Free_Documentation_License GNU Free Documentation License].
+
<div id="mainpage_sitelinks">
 +
'''[[IS_Theory:About|About this site]]''' &nbsp; | &nbsp;
 +
'''[[IS_Theory:Acknowledgements|Acknowledgements]]''' &nbsp; | &nbsp;
 +
'''[[IS_Theory:Contributing|How to Contribute]]'''
 +
</div>
 +
</div>
  
This site is built on user contributions. PLEASE SHARE YOUR KNOWLEDGE AND CONTRIBUTE!!
+
<div id="mainpage_newscell">
 
+
<div class="mainpage_boxtitle">
This site is maintained as an ongoing project of the Information Systems PhD Preparation Program of the Marriott School of Management of Brigham Young University.
+
<div><b>Highlights</b></div>
 
+
</div>
== Acknowledgements ==
+
* '''IS Theories Wiki is now part of the TheorizeIt.org portal.'''
The senior editors of this site are:
+
*: For construct discovery, try out the internomological network at [http://INN.TheorizeIt.org INN.TheorizeIt.org].
*[mailto:scott@schne.org Scott Schneberger]
+
*:  
*[mailto:mwade@schulich.yorku.ca Mike Wade].
+
</div>
 
 
The managing editors of this site are:
 
*[mailto:anthony@vance.name Anthony Vance]
 
*[mailto:gove@byu.edu Gove Allen].
 
 
 
The operational editor of this site is:
 
*[mailto:dave.eargle@gmail.com David Eargle]
 
 
 
Senior IS researcher site advisors are:
 
*Sid Huff
 
*Dan Robey
 
*Carol Saunders
 
*Geoff Walsham
 
*Jane Webster.
 
  
 
== Theories ==
 
== Theories ==
Line 36: Line 29:
 
*[[Absorptive capacity theory]]
 
*[[Absorptive capacity theory]]
 
*[[Actor network theory]]
 
*[[Actor network theory]]
 +
*[[Accountability theory]]
 
*[[Adaptive structuration theory]]
 
*[[Adaptive structuration theory]]
 
*[[Administrative behavior, theory of]]
 
*[[Administrative behavior, theory of]]
Line 41: Line 35:
 
*[[Argumentation theory]]
 
*[[Argumentation theory]]
 
*[[Behavioral decision theory]]
 
*[[Behavioral decision theory]]
 +
*[[Belief Action Outcome Model|Belief Action Outcome Framework]]
 
*[[Boundary object theory]]
 
*[[Boundary object theory]]
 
*[[Chaos theory]]
 
*[[Chaos theory]]
Line 52: Line 47:
 
*[[Critical social theory]]  
 
*[[Critical social theory]]  
 
*[[Critical success factors, theory of]]
 
*[[Critical success factors, theory of]]
 +
*[[Customer based Discrepancy Theory]]
 +
*[[Customer Focus Theory]]
 
*[[Deferred action, theory of]]  
 
*[[Deferred action, theory of]]  
 
*[[Delone and McLean IS success model]]
 
*[[Delone and McLean IS success model]]
 +
*[[Design Theory]]
 
*[[Diffusion of innovations theory]]
 
*[[Diffusion of innovations theory]]
 
*[[Dynamic capabilities]]
 
*[[Dynamic capabilities]]
 +
*[[Elaboration likelihood model]]
 
*[[Embodied social presence theory]]
 
*[[Embodied social presence theory]]
 
*[[Equity theory]]   
 
*[[Equity theory]]   
Line 67: Line 66:
 
*[[General systems theory]]
 
*[[General systems theory]]
 
*[[General deterrence theory]]
 
*[[General deterrence theory]]
 +
*[[General Strain Theory|General Strain theory]]
 +
*[[Hedonic-motivation system adoption model (HMSAM)]]
 
*[[Hermeneutics]]
 
*[[Hermeneutics]]
 
*[[Illusion of control]]
 
*[[Illusion of control]]
 
*[[Impression management, theory of]]
 
*[[Impression management, theory of]]
 
*[[Information processing theory]]
 
*[[Information processing theory]]
 +
*[[Information warfare]]
 
*[[Institutional theory]]
 
*[[Institutional theory]]
 
*[[International information systems theory]]
 
*[[International information systems theory]]
 +
*[[Kellers Motivational Model |Keller's Motivational Model]]
 
*[[Knowledge-based theory of the firm]]
 
*[[Knowledge-based theory of the firm]]
 
*[[Language action perspective]]   
 
*[[Language action perspective]]   
*[[Lemon Market Theory]]
+
*[[Lemon Market Theory|Information asymmetry theory (lemon market)]]
 
*[[Management fashion theory]]
 
*[[Management fashion theory]]
 
*[[Media richness theory]]
 
*[[Media richness theory]]
Line 81: Line 84:
 
*[[Modal aspects, theory of]]
 
*[[Modal aspects, theory of]]
 
*[[Multi-attribute utility theory]]   
 
*[[Multi-attribute utility theory]]   
 +
*[[Multi-motive information systems continuance model (MISC)]]
 
*[[Organizational culture theory]]  
 
*[[Organizational culture theory]]  
 
*[[Organizational information processing theory]]
 
*[[Organizational information processing theory]]
Line 88: Line 92:
 
*[[Process virtualization theory]]
 
*[[Process virtualization theory]]
 
*[[Prospect theory]]  
 
*[[Prospect theory]]  
 +
*[[Protection motivation theory (NEW entry!)|Protection motivation theory]]
 
*[[Punctuated equilibrium theory]]
 
*[[Punctuated equilibrium theory]]
 
*[[Real options theory]]
 
*[[Real options theory]]
 
*[[Resource-based view of the firm]]
 
*[[Resource-based view of the firm]]
 
*[[Resource dependency theory]]
 
*[[Resource dependency theory]]
 +
*[[Selective organizational information privacy and security violations model (SOIPSVM)]]
 
*[[Self-efficacy theory]]
 
*[[Self-efficacy theory]]
 
*[[SERVQUAL]]
 
*[[SERVQUAL]]
 +
*[[Signaling|Signaling theory]]
 +
*[[Social Bond Theory]]
 
*[[Social capital theory]]
 
*[[Social capital theory]]
 
*[[Social cognitive theory]]
 
*[[Social cognitive theory]]
 +
*[[Social Comparison Theory]]
 
*[[Social exchange theory]]
 
*[[Social exchange theory]]
 +
*[[Social Influence Theory]] (of Kelman)
 
*[[Social learning theory]]
 
*[[Social learning theory]]
 
*[[Social network theory]]
 
*[[Social network theory]]
 +
*[[Social Penetration Theory]]
 
*[[Social shaping of technology]]
 
*[[Social shaping of technology]]
 
*[[Socio-technical theory]]
 
*[[Socio-technical theory]]
Line 104: Line 115:
 
*[[Stakeholder theory]]   
 
*[[Stakeholder theory]]   
 
*[[Structuration theory]]
 
*[[Structuration theory]]
 +
*[[Structured process modeling theory (SPMT)]]
 
*[[Task closure theory]]   
 
*[[Task closure theory]]   
 
*[[Task-technology fit]]
 
*[[Task-technology fit]]
Line 110: Line 122:
 
*[[Technology dominance, theory of]]  
 
*[[Technology dominance, theory of]]  
 
*[[Technology-organization-environment framework]]
 
*[[Technology-organization-environment framework]]
 +
*[[Technology Threat Avoidance Theory (TTAT)|Technology Threat Avoidance Theory]]
 +
*[[Theory of collective action]]
 
*[[Theory of planned behavior]]
 
*[[Theory of planned behavior]]
 
*[[Theory of reasoned action]]
 
*[[Theory of reasoned action]]
 +
*[[Theory of slack resources (TSR)|Theory of slack resources]]
 
*[[Transaction cost economics]]  
 
*[[Transaction cost economics]]  
 
*[[Transactive memory theory]]  
 
*[[Transactive memory theory]]  

Revision as of 13:13, 19 November 2018

This site is sponsored by the University of Colorado
Welcome to the Theories Used in IS Research Wiki

This site provides researchers with summarized information on theories widely used in information systems (IS) research. Click on a linked theory name below to find details about the theory, some examples of IS papers using the theory, and links to related sites. Please feel free to summarize a theory, add to the information already present, correct errors, or suggest additional theories for the list. Theories yet to be summarized and theory submission guidelines can be found below.

This site is built on user contributions. Please share your knowledge and contribute!

This site is maintained as an ongoing project of the Human Behavior Project at the University of Colorado and the Information Systems PhD Preparation Program of the Marriott School of Management of Brigham Young University.

Suggested Citation for the Wiki
Larsen, K. R., Eargle, D. (Eds.) (2015). Theories Used in IS Research Wiki. Retrieved [today's date] from http://IS.TheorizeIt.org.
Highlights
  • IS Theories Wiki is now part of the TheorizeIt.org portal.
    For construct discovery, try out the internomological network at INN.TheorizeIt.org.

Theories