Main Page

From IS Theory
Revision as of 17:03, 18 November 2011 by Aweagel (talk | contribs) (fixed spelling of name)
Jump to: navigation, search
This site is sponsored by the University of Colorado

Theories Used in IS Research Wiki

This site provides researchers with summarized information on theories widely used in information systems (IS) research. Click on a linked theory name below to find details about the theory, some examples of IS papers using the theory, and links to related sites. Please feel free to summarize a theory, add to the information already present, correct errors, or suggest additional theories for the list. Theories yet to be summarized and theory submission guidelines can be found below.

All information on this site is presented under a GNU Free Documentation License.

This site is built on user contributions. PLEASE SHARE YOUR KNOWLEDGE AND CONTRIBUTE!!

This site is maintained as an ongoing project of the Information Systems PhD Preparation Program of the Marriott School of Management of Brigham Young University.


The senior editors of this site are:

The managing editors of this site are:

The operational editor of this site is:

Senior IS researcher site advisors are:

  • Sid Huff
  • Dan Robey
  • Carol Saunders
  • Geoff Walsham
  • Jane Webster.

Hosting services provided by the Rollins Center for Entrepreneurship and Technology



 title=Newly Posted Articles



 title=Most Popular Theories


Recent Changes

In 2011, many of the articles on this site were modified by "spam 'bots," which altered page text by inserting links to various websites. Our thanks go the students of BYU's Information Systems PhD Preparation program (Dave Eargle, Arthur Weagel, Lee J Hinkle, Adam Thompson, and Jeremiah Maughan) who reviewed and edited each article to remove the errant links.

To prevent this from happening again, we have added a "captcha" to the account creation page to be sure that only humans gain access to modify pages on this wiki. Unfortunately, many (perhaps a majority) of the user accounts at this site were created by these 'bots. Although some of these accounts could be clearly identified, there were many others which were very difficult to determine if they were valid or not. Rather than risking leaving some 'bot-created accounts active, we have opted to delete all user accounts and require valid users to recreate their accounts under our new procedure. We realize that this will be of a minor inconvenience for some valid uses but we felt the integrity of the site was worth the one-time difficulty for our valid users.