Line 5: |
Line 5: |
| <div class="mainpage_boxcontents"> | | <div class="mainpage_boxcontents"> |
| {{Introduction}} | | {{Introduction}} |
| + | |
| + | {{Citing}} |
| </div> | | </div> |
| | | |
Line 12: |
Line 14: |
| '''[[IS_Theory:Contributing|How to Contribute]]''' | | '''[[IS_Theory:Contributing|How to Contribute]]''' |
| </div> | | </div> |
| + | </div> |
| + | |
| + | <div id="mainpage_newscell"> |
| + | <div class="mainpage_boxtitle"> |
| + | <div><b>Highlights</b></div> |
| + | </div> |
| + | * '''IS Theories Wiki is now part of the TheorizeIt.org portal.''' |
| + | *: For construct discovery, try out the internomological network at [http://INN.TheorizeIt.org INN.TheorizeIt.org]. |
| + | *: |
| </div> | | </div> |
| | | |
Line 18: |
Line 29: |
| *[[Absorptive capacity theory]] | | *[[Absorptive capacity theory]] |
| *[[Actor network theory]] | | *[[Actor network theory]] |
| + | *[[Accountability theory]] |
| *[[Adaptive structuration theory]] | | *[[Adaptive structuration theory]] |
| *[[Administrative behavior, theory of]] | | *[[Administrative behavior, theory of]] |
Line 23: |
Line 35: |
| *[[Argumentation theory]] | | *[[Argumentation theory]] |
| *[[Behavioral decision theory]] | | *[[Behavioral decision theory]] |
| + | *[[Belief Action Outcome Model|Belief Action Outcome Framework]] |
| *[[Boundary object theory]] | | *[[Boundary object theory]] |
| *[[Chaos theory]] | | *[[Chaos theory]] |
Line 34: |
Line 47: |
| *[[Critical social theory]] | | *[[Critical social theory]] |
| *[[Critical success factors, theory of]] | | *[[Critical success factors, theory of]] |
| + | *[[Customer based Discrepancy Theory]] |
| + | *[[Customer Focus Theory]] |
| *[[Deferred action, theory of]] | | *[[Deferred action, theory of]] |
| *[[Delone and McLean IS success model]] | | *[[Delone and McLean IS success model]] |
| + | *[[Design Theory]] |
| *[[Diffusion of innovations theory]] | | *[[Diffusion of innovations theory]] |
| *[[Dynamic capabilities]] | | *[[Dynamic capabilities]] |
| + | *[[Elaboration likelihood model]] |
| *[[Embodied social presence theory]] | | *[[Embodied social presence theory]] |
| *[[Equity theory]] | | *[[Equity theory]] |
Line 49: |
Line 66: |
| *[[General systems theory]] | | *[[General systems theory]] |
| *[[General deterrence theory]] | | *[[General deterrence theory]] |
| + | *[[General Strain Theory|General Strain theory]] |
| + | *[[Hedonic-motivation system adoption model (HMSAM)]] |
| *[[Hermeneutics]] | | *[[Hermeneutics]] |
| *[[Illusion of control]] | | *[[Illusion of control]] |
Line 55: |
Line 74: |
| *[[Institutional theory]] | | *[[Institutional theory]] |
| *[[International information systems theory]] | | *[[International information systems theory]] |
| + | *[[Kellers Motivational Model |Keller's Motivational Model]] |
| *[[Knowledge-based theory of the firm]] | | *[[Knowledge-based theory of the firm]] |
| *[[Language action perspective]] | | *[[Language action perspective]] |
− | *[[Lemon Market Theory]] | + | *[[Lemon Market Theory|Information asymmetry theory (lemon market)]] |
| *[[Management fashion theory]] | | *[[Management fashion theory]] |
| *[[Media richness theory]] | | *[[Media richness theory]] |
Line 63: |
Line 83: |
| *[[Modal aspects, theory of]] | | *[[Modal aspects, theory of]] |
| *[[Multi-attribute utility theory]] | | *[[Multi-attribute utility theory]] |
| + | *[[Multi-motive information systems continuance model (MISC)]] |
| *[[Organizational culture theory]] | | *[[Organizational culture theory]] |
| *[[Organizational information processing theory]] | | *[[Organizational information processing theory]] |
Line 70: |
Line 91: |
| *[[Process virtualization theory]] | | *[[Process virtualization theory]] |
| *[[Prospect theory]] | | *[[Prospect theory]] |
| + | *[[Protection motivation theory (NEW entry!)|Protection motivation theory]] |
| *[[Punctuated equilibrium theory]] | | *[[Punctuated equilibrium theory]] |
| *[[Real options theory]] | | *[[Real options theory]] |
| *[[Resource-based view of the firm]] | | *[[Resource-based view of the firm]] |
| *[[Resource dependency theory]] | | *[[Resource dependency theory]] |
| + | *[[Selective organizational information privacy and security violations model (SOIPSVM)]] |
| *[[Self-efficacy theory]] | | *[[Self-efficacy theory]] |
| *[[SERVQUAL]] | | *[[SERVQUAL]] |
| + | *[[Signaling|Signaling theory]] |
| + | *[[Social Bond Theory]] |
| *[[Social capital theory]] | | *[[Social capital theory]] |
| *[[Social cognitive theory]] | | *[[Social cognitive theory]] |
| *[[Social exchange theory]] | | *[[Social exchange theory]] |
| + | *[[Social Influence Theory]] (of Kelman) |
| *[[Social learning theory]] | | *[[Social learning theory]] |
| *[[Social network theory]] | | *[[Social network theory]] |
Line 86: |
Line 112: |
| *[[Stakeholder theory]] | | *[[Stakeholder theory]] |
| *[[Structuration theory]] | | *[[Structuration theory]] |
| + | *[[Structured process modeling theory (SPMT)]] |
| *[[Task closure theory]] | | *[[Task closure theory]] |
| *[[Task-technology fit]] | | *[[Task-technology fit]] |
Line 92: |
Line 119: |
| *[[Technology dominance, theory of]] | | *[[Technology dominance, theory of]] |
| *[[Technology-organization-environment framework]] | | *[[Technology-organization-environment framework]] |
| + | *[[Technology Threat Avoidance Theory (TTAT)|Technology Threat Avoidance Theory]] |
| *[[Theory of collective action]] | | *[[Theory of collective action]] |
| *[[Theory of planned behavior]] | | *[[Theory of planned behavior]] |
| *[[Theory of reasoned action]] | | *[[Theory of reasoned action]] |
| + | *[[Theory of slack resources (TSR)|Theory of slack resources]] |
| *[[Transaction cost economics]] | | *[[Transaction cost economics]] |
| *[[Transactive memory theory]] | | *[[Transactive memory theory]] |