Line 7: |
Line 7: |
| | | |
| {{Citing}} | | {{Citing}} |
| + | |
| </div> | | </div> |
| | | |
Line 20: |
Line 21: |
| <div><b>Highlights</b></div> | | <div><b>Highlights</b></div> |
| </div> | | </div> |
− | * '''IS Theories Wiki is now part of the TheorizeIt.org portal.''' | + | |
− | *: For construct discovery, try out the internomological network at [http://INN.TheorizeIt.org INN.TheorizeIt.org]. | + | *'''IS Theories Wiki is now part of the TheorizeIt.org portal.''' |
− | * '''New wiki usage report available'''
| + | *:For construct discovery, try out the internomological network at [http://INN.TheorizeIt.org INN.TheorizeIt.org]. |
− | *: A report analyzing the top-visited wiki pages of 2014 has been compiled. Find it here: [[Top 10 IS Theories 2014 | Top 10 IS Theories of 2014]]. | + | *: |
| </div> | | </div> |
| | | |
− | == Theories == | + | ==Theories== |
| | | |
| *[[Absorptive capacity theory]] | | *[[Absorptive capacity theory]] |
Line 33: |
Line 34: |
| *[[Adaptive structuration theory]] | | *[[Adaptive structuration theory]] |
| *[[Administrative behavior, theory of]] | | *[[Administrative behavior, theory of]] |
− | *[[Agency theory]] | + | *[[Agency theory]] |
| *[[Argumentation theory]] | | *[[Argumentation theory]] |
| *[[Behavioral decision theory]] | | *[[Behavioral decision theory]] |
Line 46: |
Line 47: |
| *[[Contingency theory]] | | *[[Contingency theory]] |
| *[[Critical realism theory]] | | *[[Critical realism theory]] |
− | *[[Critical social theory]] | + | *[[Critical social theory]] |
| *[[Critical success factors, theory of]] | | *[[Critical success factors, theory of]] |
| *[[Customer based Discrepancy Theory]] | | *[[Customer based Discrepancy Theory]] |
| *[[Customer Focus Theory]] | | *[[Customer Focus Theory]] |
− | *[[Deferred action, theory of]] | + | *[[Deferred action, theory of]] |
| *[[Delone and McLean IS success model]] | | *[[Delone and McLean IS success model]] |
| *[[Design Theory]] | | *[[Design Theory]] |
Line 57: |
Line 58: |
| *[[Elaboration likelihood model]] | | *[[Elaboration likelihood model]] |
| *[[Embodied social presence theory]] | | *[[Embodied social presence theory]] |
− | *[[Equity theory]] | + | *[[Equity theory]] |
| *[[Evolutionary theory]] | | *[[Evolutionary theory]] |
− | *[[Expectation confirmation theory]] | + | *[[Expectation confirmation theory]] |
| *[[Feminism theory]] | | *[[Feminism theory]] |
| *[[Fit-Viability theory]] | | *[[Fit-Viability theory]] |
| *[[Flow theory]] | | *[[Flow theory]] |
| *[[Game theory]] | | *[[Game theory]] |
− | *[[Garbage can theory]] | + | *[[Garbage can theory]] |
| *[[General systems theory]] | | *[[General systems theory]] |
| *[[General deterrence theory]] | | *[[General deterrence theory]] |
| + | *[[General Strain Theory|General Strain theory]] |
| *[[Hedonic-motivation system adoption model (HMSAM)]] | | *[[Hedonic-motivation system adoption model (HMSAM)]] |
| *[[Hermeneutics]] | | *[[Hermeneutics]] |
Line 72: |
Line 74: |
| *[[Impression management, theory of]] | | *[[Impression management, theory of]] |
| *[[Information processing theory]] | | *[[Information processing theory]] |
| + | *[[Information warfare]] |
| *[[Institutional theory]] | | *[[Institutional theory]] |
| *[[International information systems theory]] | | *[[International information systems theory]] |
| *[[Kellers Motivational Model |Keller's Motivational Model]] | | *[[Kellers Motivational Model |Keller's Motivational Model]] |
| *[[Knowledge-based theory of the firm]] | | *[[Knowledge-based theory of the firm]] |
− | *[[Language action perspective]] | + | *[[Language action perspective]] |
| *[[Lemon Market Theory|Information asymmetry theory (lemon market)]] | | *[[Lemon Market Theory|Information asymmetry theory (lemon market)]] |
| *[[Management fashion theory]] | | *[[Management fashion theory]] |
Line 82: |
Line 85: |
| *[[Media synchronicity theory]] | | *[[Media synchronicity theory]] |
| *[[Modal aspects, theory of]] | | *[[Modal aspects, theory of]] |
− | *[[Multi-attribute utility theory]] | + | *[[Multi-attribute utility theory]] |
| *[[Multi-motive information systems continuance model (MISC)]] | | *[[Multi-motive information systems continuance model (MISC)]] |
− | *[[Organizational culture theory]] | + | *[[Organizational culture theory]] |
| *[[Organizational information processing theory]] | | *[[Organizational information processing theory]] |
| *[[Organizational knowledge creation]] | | *[[Organizational knowledge creation]] |
| *[[Organizational learning theory]] | | *[[Organizational learning theory]] |
− | *[[Portfolio theory]] | + | *[[Portfolio theory]] |
| *[[Process virtualization theory]] | | *[[Process virtualization theory]] |
− | *[[Prospect theory]] | + | *[[Prospect theory]] |
| *[[Protection motivation theory (NEW entry!)|Protection motivation theory]] | | *[[Protection motivation theory (NEW entry!)|Protection motivation theory]] |
| *[[Punctuated equilibrium theory]] | | *[[Punctuated equilibrium theory]] |
Line 98: |
Line 101: |
| *[[Selective organizational information privacy and security violations model (SOIPSVM)]] | | *[[Selective organizational information privacy and security violations model (SOIPSVM)]] |
| *[[Self-efficacy theory]] | | *[[Self-efficacy theory]] |
| + | *[[Semantic theory of survey response]] |
| *[[SERVQUAL]] | | *[[SERVQUAL]] |
| *[[Signaling|Signaling theory]] | | *[[Signaling|Signaling theory]] |
| + | *[[Social Bond Theory]] |
| *[[Social capital theory]] | | *[[Social capital theory]] |
| *[[Social cognitive theory]] | | *[[Social cognitive theory]] |
| + | *[[Social Comparison Theory]] |
| *[[Social exchange theory]] | | *[[Social exchange theory]] |
| *[[Social Influence Theory]] (of Kelman) | | *[[Social Influence Theory]] (of Kelman) |
| *[[Social learning theory]] | | *[[Social learning theory]] |
| *[[Social network theory]] | | *[[Social network theory]] |
| + | *[[Social Penetration Theory]] |
| *[[Social shaping of technology]] | | *[[Social shaping of technology]] |
| *[[Socio-technical theory]] | | *[[Socio-technical theory]] |
| *[[Soft systems theory]] | | *[[Soft systems theory]] |
− | *[[Stakeholder theory]] | + | *[[Stakeholder theory]] |
| *[[Structuration theory]] | | *[[Structuration theory]] |
| *[[Structured process modeling theory (SPMT)]] | | *[[Structured process modeling theory (SPMT)]] |
− | *[[Task closure theory]] | + | *[[Task closure theory]] |
| *[[Task-technology fit]] | | *[[Task-technology fit]] |
| *[[Technological frames of reference]] | | *[[Technological frames of reference]] |
− | *[[Technology acceptance model]] | + | *[[Technology acceptance model]] |
− | *[[Technology dominance, theory of]] | + | *[[Technology dominance, theory of]] |
| *[[Technology-organization-environment framework]] | | *[[Technology-organization-environment framework]] |
| *[[Technology Threat Avoidance Theory (TTAT)|Technology Threat Avoidance Theory]] | | *[[Technology Threat Avoidance Theory (TTAT)|Technology Threat Avoidance Theory]] |
Line 123: |
Line 130: |
| *[[Theory of reasoned action]] | | *[[Theory of reasoned action]] |
| *[[Theory of slack resources (TSR)|Theory of slack resources]] | | *[[Theory of slack resources (TSR)|Theory of slack resources]] |
− | *[[Transaction cost economics]] | + | *[[Transaction cost economics]] |
− | *[[Transactive memory theory]] | + | *[[Transactive memory theory]] |
| *[[Unified theory of acceptance and use of technology]] | | *[[Unified theory of acceptance and use of technology]] |
| *[[Usage control model]] | | *[[Usage control model]] |
| *[[Work systems theory]] | | *[[Work systems theory]] |
| *[[Yield shift theory of satisfaction]] | | *[[Yield shift theory of satisfaction]] |