Difference between revisions of "Main Page"

From IS Theory
Jump to navigation Jump to search
m (Created new theory page)
(PCT_final)
(35 intermediate revisions by 12 users not shown)
Line 1: Line 1:
{{Sponsor Thumbs}}
 
  
 
<div id="mainpage_topbox">
 
<div id="mainpage_topbox">
 +
 
<div id="mainpage_pagetitle">'''Welcome to the <span id="mainpage_mwtitle">Theories Used in IS Research Wiki</span>'''</div>
 
<div id="mainpage_pagetitle">'''Welcome to the <span id="mainpage_mwtitle">Theories Used in IS Research Wiki</span>'''</div>
 
<div class="mainpage_boxcontents">
 
<div class="mainpage_boxcontents">
Line 30: Line 30:
  
 
*[[Absorptive capacity theory]]
 
*[[Absorptive capacity theory]]
 +
*[[Activity Theory]]
 
*[[Actor network theory]]
 
*[[Actor network theory]]
 
*[[Accountability theory]]
 
*[[Accountability theory]]
 
*[[Adaptive structuration theory]]
 
*[[Adaptive structuration theory]]
 
*[[Administrative behavior, theory of]]
 
*[[Administrative behavior, theory of]]
 +
*[[Adaptive enterprise architecture theory]]
 
*[[Agency theory]]
 
*[[Agency theory]]
 
*[[Argumentation theory]]
 
*[[Argumentation theory]]
Line 45: Line 47:
 
*[[Competitive strategy (Porter)]]
 
*[[Competitive strategy (Porter)]]
 
*[[Complexity theory]]
 
*[[Complexity theory]]
 +
*[[Conservation of resources theory]]
 
*[[Contingency theory]]
 
*[[Contingency theory]]
 +
*[[Critical Mass Theory of Interactive Media]]
 
*[[Critical realism theory]]
 
*[[Critical realism theory]]
 
*[[Critical social theory]]
 
*[[Critical social theory]]
Line 69: Line 73:
 
*[[General deterrence theory]]
 
*[[General deterrence theory]]
 
*[[General Strain Theory|General Strain theory]]
 
*[[General Strain Theory|General Strain theory]]
 +
*[[Goal Contagion Theory]]
 
*[[Hedonic-motivation system adoption model (HMSAM)]]
 
*[[Hedonic-motivation system adoption model (HMSAM)]]
 
*[[Hermeneutics]]
 
*[[Hermeneutics]]
Line 77: Line 82:
 
*[[Institutional theory]]
 
*[[Institutional theory]]
 
*[[International information systems theory]]
 
*[[International information systems theory]]
 +
*[[Internationalization Theory]]
 
*[[Kellers Motivational Model |Keller's Motivational Model]]
 
*[[Kellers Motivational Model |Keller's Motivational Model]]
 
*[[Knowledge-based theory of the firm]]
 
*[[Knowledge-based theory of the firm]]
Line 92: Line 98:
 
*[[Organizational learning theory]]
 
*[[Organizational learning theory]]
 
*[[Portfolio theory]]
 
*[[Portfolio theory]]
 +
*[[Privacy Calculus Theory]]
 
*[[Process virtualization theory]]
 
*[[Process virtualization theory]]
 
*[[Prospect theory]]
 
*[[Prospect theory]]
Line 97: Line 104:
 
*[[Punctuated equilibrium theory]]
 
*[[Punctuated equilibrium theory]]
 
*[[Real options theory]]
 
*[[Real options theory]]
 +
*[[Representation Theory]]
 
*[[Resource-based view of the firm]]
 
*[[Resource-based view of the firm]]
 
*[[Resource dependency theory]]
 
*[[Resource dependency theory]]
 
*[[Selective organizational information privacy and security violations model (SOIPSVM)]]
 
*[[Selective organizational information privacy and security violations model (SOIPSVM)]]
 +
*[[Self determination theory]]
 
*[[Self-efficacy theory]]
 
*[[Self-efficacy theory]]
 
*[[Semantic theory of survey response]]
 
*[[Semantic theory of survey response]]
Line 108: Line 117:
 
*[[Social cognitive theory]]
 
*[[Social cognitive theory]]
 
*[[Social Comparison Theory]]
 
*[[Social Comparison Theory]]
 +
*[[Social Contagion Theory]]
 +
*[[Socioemotional Selectivity Theory]]
 
*[[Social exchange theory]]
 
*[[Social exchange theory]]
 +
*[[Social Identity Theory]]
 
*[[Social Influence Theory]] (of Kelman)
 
*[[Social Influence Theory]] (of Kelman)
 +
*[[Social Information Processing Theory]] (of Walther)
 
*[[Social learning theory]]
 
*[[Social learning theory]]
 
*[[Social network theory]]
 
*[[Social network theory]]
 
*[[Social Penetration Theory]]
 
*[[Social Penetration Theory]]
 
*[[Social shaping of technology]]
 
*[[Social shaping of technology]]
 +
*[[Sociomaterialism Theory]]
 
*[[Socio-technical theory]]
 
*[[Socio-technical theory]]
 
*[[Soft systems theory]]
 
*[[Soft systems theory]]
Line 121: Line 135:
 
*[[Task closure theory]]
 
*[[Task closure theory]]
 
*[[Task-technology fit]]
 
*[[Task-technology fit]]
 +
*[[Team resilience theory]]
 
*[[Technological frames of reference]]
 
*[[Technological frames of reference]]
 
*[[Technology acceptance model]]
 
*[[Technology acceptance model]]
Line 127: Line 142:
 
*[[Technology Threat Avoidance Theory (TTAT)|Technology Threat Avoidance Theory]]
 
*[[Technology Threat Avoidance Theory (TTAT)|Technology Threat Avoidance Theory]]
 
*[[Theory of collective action]]
 
*[[Theory of collective action]]
 +
*[https://is.theorizeit.org/wiki/Theory_of_Interactive_Media_Effects Theory of Interactive Media Effects (TIME)]
 +
*[[Theory of Interpersonal Behavior (TIB)|Theory of Interpersonal Behavior]]
 +
*[[Theory of Organizational Creativity|Theory of organizational creativity]]
 +
*[[Theory of Organizational Sensemaking]]
 
*[[Theory of planned behavior]]
 
*[[Theory of planned behavior]]
 
*[[Theory of reasoned action]]
 
*[[Theory of reasoned action]]
 
*[[Theory of slack resources (TSR)|Theory of slack resources]]
 
*[[Theory of slack resources (TSR)|Theory of slack resources]]
 +
*[[Theory of Swift Trust|Theory of swift trust]]
 
*[[Transaction cost economics]]
 
*[[Transaction cost economics]]
 
*[[Transactive memory theory]]
 
*[[Transactive memory theory]]
 +
*[https://is.theorizeit.org/wiki/Uncanny_Valley_Theory Uncanny Valley Theory]
 
*[[Unified theory of acceptance and use of technology]]
 
*[[Unified theory of acceptance and use of technology]]
 
*[[Usage control model]]
 
*[[Usage control model]]
 
*[[Work systems theory]]
 
*[[Work systems theory]]
 
*[[Yield shift theory of satisfaction]]
 
*[[Yield shift theory of satisfaction]]
 +
*

Revision as of 11:30, 23 September 2021

Welcome to the Theories Used in IS Research Wiki

This site provides researchers with summarized information on theories widely used in information systems (IS) research. Click on a linked theory name below to find details about the theory, some examples of IS papers using the theory, and links to related sites. Please feel free to summarize a theory, add to the information already present, correct errors, or suggest additional theories for the list. Theories yet to be summarized and theory submission guidelines can be found below.

This site is built on user contributions. Please share your knowledge and contribute!

This site is maintained as an ongoing project of the Human Behavior Project at the University of Colorado and the Information Systems PhD Preparation Program of the Marriott School of Management of Brigham Young University.

Suggested Citation for the Wiki
Larsen, K. R., Eargle, D. (Eds.) (2015). Theories Used in IS Research Wiki. Retrieved [today's date] from http://IS.TheorizeIt.org.
Highlights
  • IS Theories Wiki is now part of the TheorizeIt.org portal.
    For construct discovery, try out the internomological network at INN.TheorizeIt.org.

Theories