Difference between revisions of "Main Page"

From IS Theory
Jump to navigation Jump to search
(PCT)
 
(26 intermediate revisions by 11 users not shown)
Line 36: Line 36:
 
*[[Administrative behavior, theory of]]
 
*[[Administrative behavior, theory of]]
 
*[[Adaptive enterprise architecture theory]]
 
*[[Adaptive enterprise architecture theory]]
 +
*[[Affordance-actualization theory|Affordance-actualization Theory]]
 
*[[Agency theory]]
 
*[[Agency theory]]
 +
*[[Appraisal Theory]]
 
*[[Argumentation theory]]
 
*[[Argumentation theory]]
 +
*[[Attachment-Theory]]
 
*[[Behavioral decision theory]]
 
*[[Behavioral decision theory]]
 
*[[Belief Action Outcome Model|Belief Action Outcome Framework]]
 
*[[Belief Action Outcome Model|Belief Action Outcome Framework]]
 +
*[[Big Five Model of Personality]]
 
*[[Boundary object theory]]
 
*[[Boundary object theory]]
 
*[[Chaos theory]]
 
*[[Chaos theory]]
Line 45: Line 49:
 
*[[Cognitive fit theory]]
 
*[[Cognitive fit theory]]
 
*[[Cognitive load theory]]
 
*[[Cognitive load theory]]
 +
*[[Community Of Practice Theory]]
 
*[[Competitive strategy (Porter)]]
 
*[[Competitive strategy (Porter)]]
 
*[[Complexity theory]]
 
*[[Complexity theory]]
Line 55: Line 60:
 
*[[Customer based Discrepancy Theory]]
 
*[[Customer based Discrepancy Theory]]
 
*[[Customer Focus Theory]]
 
*[[Customer Focus Theory]]
 +
*[[CYNEFIN framework]]
 
*[[Deferred action, theory of]]
 
*[[Deferred action, theory of]]
 
*[[Delone and McLean IS success model]]
 
*[[Delone and McLean IS success model]]
 
*[[Design Theory]]
 
*[[Design Theory]]
 
*[[Diffusion of innovations theory]]
 
*[[Diffusion of innovations theory]]
 +
*[[Distributed Cognition Theory]]
 
*[[Dynamic capabilities]]
 
*[[Dynamic capabilities]]
 
*[[Elaboration likelihood model]]
 
*[[Elaboration likelihood model]]
Line 83: Line 90:
 
*[[International information systems theory]]
 
*[[International information systems theory]]
 
*[[Internationalization Theory]]
 
*[[Internationalization Theory]]
 +
*[[Innovation Resistance Theory]]
 
*[[Kellers Motivational Model |Keller's Motivational Model]]
 
*[[Kellers Motivational Model |Keller's Motivational Model]]
 +
*[[Kohlberg’s theory of Moral Development|Kohlberg's theory of Moral Development]]
 
*[[Knowledge-based theory of the firm]]
 
*[[Knowledge-based theory of the firm]]
 +
*[[Knowledge Security Theory]]
 
*[[Language action perspective]]
 
*[[Language action perspective]]
 
*[[Lemon Market Theory|Information asymmetry theory (lemon market)]]
 
*[[Lemon Market Theory|Information asymmetry theory (lemon market)]]
Line 93: Line 103:
 
*[[Multi-attribute utility theory]]
 
*[[Multi-attribute utility theory]]
 
*[[Multi-motive information systems continuance model (MISC)]]
 
*[[Multi-motive information systems continuance model (MISC)]]
 +
*[[Norm Activation Theory]]
 
*[[Organizational culture theory]]
 
*[[Organizational culture theory]]
 
*[[Organizational information processing theory]]
 
*[[Organizational information processing theory]]
Line 98: Line 109:
 
*[[Organizational learning theory]]
 
*[[Organizational learning theory]]
 
*[[Portfolio theory]]
 
*[[Portfolio theory]]
 +
*[[Privacy Calculus Theory]]
 
*[[Process virtualization theory]]
 
*[[Process virtualization theory]]
 
*[[Prospect theory]]
 
*[[Prospect theory]]
 
*[[Protection motivation theory (NEW entry!)|Protection motivation theory]]
 
*[[Protection motivation theory (NEW entry!)|Protection motivation theory]]
 +
*[[Psychological ownership framework]]
 
*[[Punctuated equilibrium theory]]
 
*[[Punctuated equilibrium theory]]
 +
*[[Rational Choice Theory]]
 
*[[Real options theory]]
 
*[[Real options theory]]
 
*[[Representation Theory]]
 
*[[Representation Theory]]
 
*[[Resource-based view of the firm]]
 
*[[Resource-based view of the firm]]
 
*[[Resource dependency theory]]
 
*[[Resource dependency theory]]
 +
*[[Role Theory]]
 
*[[Selective organizational information privacy and security violations model (SOIPSVM)]]
 
*[[Selective organizational information privacy and security violations model (SOIPSVM)]]
 
*[[Self determination theory]]
 
*[[Self determination theory]]
Line 123: Line 138:
 
*[[Social Information Processing Theory]] (of Walther)
 
*[[Social Information Processing Theory]] (of Walther)
 
*[[Social learning theory]]
 
*[[Social learning theory]]
 +
*[[Social media engagement theory]]
 
*[[Social network theory]]
 
*[[Social network theory]]
 
*[[Social Penetration Theory]]
 
*[[Social Penetration Theory]]
 +
*[[Social Presence Theory#Concise description of theory|Social Presence Theory]]
 
*[[Social shaping of technology]]
 
*[[Social shaping of technology]]
 
*[[Sociomaterialism Theory]]
 
*[[Sociomaterialism Theory]]
Line 132: Line 149:
 
*[[Structuration theory]]
 
*[[Structuration theory]]
 
*[[Structured process modeling theory (SPMT)]]
 
*[[Structured process modeling theory (SPMT)]]
 +
*[[Success Management Theory]]
 
*[[Task closure theory]]
 
*[[Task closure theory]]
 
*[[Task-technology fit]]
 
*[[Task-technology fit]]
Line 141: Line 159:
 
*[[Technology Threat Avoidance Theory (TTAT)|Technology Threat Avoidance Theory]]
 
*[[Technology Threat Avoidance Theory (TTAT)|Technology Threat Avoidance Theory]]
 
*[[Theory of collective action]]
 
*[[Theory of collective action]]
 +
*[[Theory of Hypercompetition]]
 
*[https://is.theorizeit.org/wiki/Theory_of_Interactive_Media_Effects Theory of Interactive Media Effects (TIME)]
 
*[https://is.theorizeit.org/wiki/Theory_of_Interactive_Media_Effects Theory of Interactive Media Effects (TIME)]
 
*[[Theory of Interpersonal Behavior (TIB)|Theory of Interpersonal Behavior]]
 
*[[Theory of Interpersonal Behavior (TIB)|Theory of Interpersonal Behavior]]
Line 149: Line 168:
 
*[[Theory of slack resources (TSR)|Theory of slack resources]]
 
*[[Theory of slack resources (TSR)|Theory of slack resources]]
 
*[[Theory of Swift Trust|Theory of swift trust]]
 
*[[Theory of Swift Trust|Theory of swift trust]]
 +
*[[Theory of Network Externalities]]
 
*[[Transaction cost economics]]
 
*[[Transaction cost economics]]
 
*[[Transactive memory theory]]
 
*[[Transactive memory theory]]
Line 154: Line 174:
 
*[[Unified theory of acceptance and use of technology]]
 
*[[Unified theory of acceptance and use of technology]]
 
*[[Usage control model]]
 
*[[Usage control model]]
 +
*[[ValueTheory|Value Theory]]
 
*[[Work systems theory]]
 
*[[Work systems theory]]
 
*[[Yield shift theory of satisfaction]]
 
*[[Yield shift theory of satisfaction]]
*Privacy Calculus Theory
+
*

Latest revision as of 16:22, 25 August 2023

Welcome to the Theories Used in IS Research Wiki

This site provides researchers with summarized information on theories widely used in information systems (IS) research. Click on a linked theory name below to find details about the theory, some examples of IS papers using the theory, and links to related sites. Please feel free to summarize a theory, add to the information already present, correct errors, or suggest additional theories for the list. Theories yet to be summarized and theory submission guidelines can be found below.

This site is built on user contributions. Please share your knowledge and contribute!

This site is maintained as an ongoing project of the Human Behavior Project at the University of Colorado and the Information Systems PhD Preparation Program of the Marriott School of Management of Brigham Young University.

Suggested Citation for the Wiki
Larsen, K. R., Eargle, D. (Eds.) (2015). Theories Used in IS Research Wiki. Retrieved [today's date] from http://IS.TheorizeIt.org.
Highlights
  • IS Theories Wiki is now part of the TheorizeIt.org portal.
    For construct discovery, try out the internomological network at INN.TheorizeIt.org.

Theories