Difference between revisions of "Main Page"

From IS Theory
Jump to navigation Jump to search
Line 93: Line 93:
*[[Resource-based view of the firm]]
*[[Resource-based view of the firm]]
*[[Resource dependency theory]]
*[[Resource dependency theory]]
*[[Selective organizational information privacy and security violations model (SOIPSVM)]]
*[[Self-efficacy theory]]
*[[Self-efficacy theory]]

Revision as of 10:08, 9 January 2016

This site is sponsored by the University of Colorado
Welcome to the Theories Used in IS Research Wiki

This site provides researchers with summarized information on theories widely used in information systems (IS) research. Click on a linked theory name below to find details about the theory, some examples of IS papers using the theory, and links to related sites. Please feel free to summarize a theory, add to the information already present, correct errors, or suggest additional theories for the list. Theories yet to be summarized and theory submission guidelines can be found below.

This site is built on user contributions. Please share your knowledge and contribute!

This site is maintained as an ongoing project of the Human Behavior Project at the University of Colorado and the Information Systems PhD Preparation Program of the Marriott School of Management of Brigham Young University.

Suggested Citation for the Wiki
Larsen, K. R., Eargle, D. (Eds.) (2015). Theories Used in IS Research Wiki. Retrieved [today's date] from http://IS.TheorizeIt.org.
  • IS Theories Wiki is now part of the TheorizeIt.org portal.
    For construct discovery, try out the internomological network at INN.TheorizeIt.org.
  • New wiki usage report available
    A report analyzing the top-visited wiki pages of 2014 has been compiled. Find it here: Top 10 IS Theories of 2014.