default search action
James Y. L. Thong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j48]Frank K. Y. Chan, James Y. L. Thong, Susan A. Brown, Viswanath Venkatesh:
Design characteristics and service experience with e-government services: A public value perspective. Int. J. Inf. Manag. 80: 102834 (2025) - 2022
- [j47]Viswanath Venkatesh, James Y. L. Thong, Kai Spohrer, Frank K. Y. Chan, Ankur Arora, Hartmut Hoehle, Srinivasan Venkatraman:
Equality Does Not Make You Happy: Effects of Differentiated Leader-Member Exchange and Team-Member Exchange on Developer Satisfaction in Agile Development Teams. MIS Q. 47(3): 1239-1270 (2022) - 2021
- [j46]Weiyin Hong, Muller Y. M. Cheung, James Y. L. Thong:
The Impact of Animated Banner Ads on Online Consumers: A Feature-Level Analysis Using Eye Tracking. J. Assoc. Inf. Syst. 22(1): 2 (2021) - [j45]Ka Chung Ng, Xiaojun Zhang, James Y. L. Thong, Kar Yan Tam:
Protecting Against Threats to Information Security: An Attitudinal Ambivalence Perspective. J. Manag. Inf. Syst. 38(3): 732-764 (2021) - 2020
- [j44]Viswanath Venkatesh, James Y. L. Thong, Frank K. Y. Chan, Hartmut Hoehle, Kai Spohrer:
How agile software development methods reduce work exhaustion: Insights on role perceptions and organizational skills. Inf. Syst. J. 30(4): 733-761 (2020) - [e2]Doug Vogel, Kathy Ning Shen, Pan Shan Ling, Carol Hsu, James Y. L. Thong, Marco De Marco, Moez Limayem, Sean Xin Xu:
24th Pacific Asia Conference on Information Systems, PACIS 2020, Dubai, UAE, June 22-24, 2020. 2020 [contents]
2010 – 2019
- 2019
- [j43]Likoebe M. Maruping, Viswanath Venkatesh, James Y. L. Thong, Xiaojun Zhang:
A Risk Mitigation Framework for Information Technology Projects: A Cultural Contingency Perspective. J. Manag. Inf. Syst. 36(1): 120-157 (2019) - [j42]Viswanath Venkatesh, Tracy Ann Sykes, Frank K. Y. Chan, James Y. L. Thong, Paul Jen-Hwa Hu:
Children's Internet Addiction, Family-to-Work Conflict, and Job Outcomes: A Study of Parent-Child Dyads. MIS Q. 43(3) (2019) - 2017
- [j41]Muller Y. M. Cheung, Weiyin Hong, James Y. L. Thong:
Effects of Animation on Attentional Resources of Online Consumers. J. Assoc. Inf. Syst. 18(8): 1 (2017) - [j40]Xin Xu, James Y. L. Thong, Kar Yan Tam:
Winning Back Technology Disadopters: Testing a Technology Readoption Model in the Context of Mobile Internet Services. J. Manag. Inf. Syst. 34(1): 102-140 (2017) - 2016
- [j39]Viswanath Venkatesh, James Y. L. Thong, Frank K. Y. Chan, Paul Jen-Hwa Hu:
Managing Citizens' Uncertainty in E-Government Services: The Mediating and Moderating Roles of Transparency and Trust. Inf. Syst. Res. 27(1): 87-111 (2016) - [j38]Viswanath Venkatesh, James Y. L. Thong, Xin Xu:
Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead. J. Assoc. Inf. Syst. 17(5): 1 (2016) - 2014
- [j37]Weiyin Hong, Frank K. Y. Chan, James Y. L. Thong, Lewis C. Chasalow, Gurpreet Dhillon:
A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research. Inf. Syst. Res. 25(1): 111-136 (2014) - [j36]Xin Xu, James Y. L. Thong, Viswanath Venkatesh:
Effects of ICT Service Innovation and Complementary Strategies on Brand Equity and Customer Loyalty in a Consumer Technology Market. Inf. Syst. Res. 25(4): 710-729 (2014) - 2013
- [j35]Weiyin Hong, James Y. L. Thong:
Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies. MIS Q. 37(1): 275-298 (2013) - [e1]Jae-Nam Lee, Ji-Ye Mao, James Y. L. Thong:
17th Pacific Asia Conference on Information Systems, PACIS 2013, Jeju Island, Korea, June 18-22, 2013. 2013 [contents] - 2012
- [j34]Viswanath Venkatesh, James Y. L. Thong, Xin Xu:
Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology. MIS Q. 36(1): 157-178 (2012) - 2011
- [j33]Viswanath Venkatesh, James Y. L. Thong, Frank K. Y. Chan, Paul Jen-Hwa Hu, Susan A. Brown:
Extending the two-stage information systems continuance model: incorporating UTAUT predictors and the role of context. Inf. Syst. J. 21(6): 527-555 (2011) - [j32]Weiyin Hong, James Y. L. Thong, Lewis C. Chasalow, Gurpreet Dhillon:
User Acceptance of Agile Information Systems: A Model and Empirical Test. J. Manag. Inf. Syst. 28(1): 235-272 (2011) - [j31]James Y. L. Thong, Viswanath Venkatesh, Xin Xu, Se-Joon Hong, Kar Yan Tam:
Consumer Acceptance of Personal Information and Communication Technology Services. IEEE Trans. Engineering Management 58(4): 613-625 (2011) - [c11]Muller Y. M. Cheung, James Y. L. Thong:
Is Localization Advisable for E-Commerce Websites? WEB 2011: 255-260 - 2010
- [j30]Frank K. Y. Chan, James Y. L. Thong, Viswanath Venkatesh, Susan A. Brown, Paul Jen-Hwa Hu, Kar Yan Tam:
Modeling Citizen Satisfaction with Mandatory Adoption of an E-Government Technology. J. Assoc. Inf. Syst. 11(10): 2 (2010)
2000 – 2009
- 2009
- [j29]James Y. L. Thong, Felix B. Tan:
Introduction to the PACIS2007 special issue for decision support systems. Decis. Support Syst. 46(4): 753-754 (2009) - [j28]Frank K. Y. Chan, James Y. L. Thong:
Acceptance of agile methodologies: A critical review and conceptual framework. Decis. Support Syst. 46(4): 803-814 (2009) - [j27]James Y. L. Thong, Felix B. Tan:
Introduction to the Special Section: Consumption, Influence, and Participation of Web Users. Int. J. Electron. Commer. 13(4): 5-8 (2009) - [j26]Paul Jen-Hwa Hu, Susan A. Brown, James Y. L. Thong, Frank K. Y. Chan, Kar Yan Tam:
Determinants of service quality and continuance intention of online services: The case of eTax. J. Assoc. Inf. Sci. Technol. 60(2): 292-306 (2009) - 2008
- [j25]Se-Joon Hong, James Y. L. Thong, Jae Yun Moon, Kar Yan Tam:
Understanding the behavior of mobile data services consumers. Inf. Syst. Frontiers 10(4): 431-445 (2008) - [c10]Kwok Yue Chan, Min Gong, Yan Xu, James Y. L. Thong:
Examining user acceptance of SMS: An empirical study in China and Hong Kong. PACIS 2008: 294 - 2007
- [j24]Weiyin Hong, James Y. L. Thong, Kar Yan Tam:
How do Web users respond to non-banner-ads animation? The effects of task type and user experience. J. Assoc. Inf. Sci. Technol. 58(10): 1467-1482 (2007) - [c9]Xin Xu, James Y. L. Thong, Kar Yan Tam:
Winning Back Technology Disadopters. PACIS 2007: 81 - [c8]Frank K. Y. Chan, James Y. L. Thong:
An Integrated Framework of Individual Acceptance of Agile Methodologies. PACIS 2007: 154 - 2006
- [j23]Se-Joon Hong, James Y. L. Thong, Kar Yan Tam:
Understanding continued information technology usage behavior: A comparison of three models in the context of mobile internet. Decis. Support Syst. 42(3): 1819-1834 (2006) - [j22]James Y. L. Thong, Se-Joon Hong, Kar Yan Tam:
The effects of post-adoption beliefs on the expectation-confirmation model for information technology continuance. Int. J. Hum. Comput. Stud. 64(9): 799-810 (2006) - 2005
- [c7]Se-Joon Hong, James Y. L. Thong, Kar Yan Tam:
Understanding Continued IT Usage: An Extension to the Expectation-Confirmation Model in IT Domain. PACIS 2005: 105 - 2004
- [j21]James Y. L. Thong, Weiyin Hong, Kar Yan Tam:
What leads to acceptance of digital libraries? Commun. ACM 47(11): 78-83 (2004) - [j20]Rudy Setiono, James Y. L. Thong:
An approach to generate rules from neural networks for regression problems. Eur. J. Oper. Res. 155(1): 239-250 (2004) - [j19]Weiyin Hong, James Y. L. Thong, Kar Yan Tam:
Designing product listing pages on e-commerce websites: an examination of presentation mode and information format. Int. J. Hum. Comput. Stud. 61(4): 481-503 (2004) - [j18]Weiyin Hong, James Y. L. Thong, Kar Yan Tam:
Does Animation Attract Online Users' Attention? The Effects of Flash on Information Search Performance and Perceptions. Inf. Syst. Res. 15(1): 60-86 (2004) - [j17]Weiyin Hong, James Y. L. Thong, Kar Yan Tam:
The Effects of Information Format and Shopping Task on Consumers' Online Shopping Behavior: A Cognitive Fit Perspective. J. Manag. Inf. Syst. 21(3): 149-184 (2004) - 2003
- [j16]James Y. L. Thong, Chee-Sing Yap, Kin-Lee Seah:
A consolidated methodology for business process reengineering. Int. J. Comput. Appl. Technol. 17(1): 1-15 (2003) - [j15]A. Graham Peace, Dennis F. Galletta, James Y. L. Thong:
Software Piracy in the Workplace: A Model and Empirical Test. J. Manag. Inf. Syst. 20(1): 153-177 (2003) - 2002
- [j14]James Y. L. Thong, Weiyin Hong, Kar Yan Tam:
Understanding user acceptance of digital libraries: what are the roles of interface characteristics, organizational context, and individual differences? Int. J. Hum. Comput. Stud. 57(3): 215-242 (2002) - [j13]Weiyin Hong, James Y. L. Thong, Wai-Man Wong, Kar Yan Tam:
Determinants of User Acceptance of Digital Libraries: An Empirical Examination of Individual Differences and System Characteristics. J. Manag. Inf. Syst. 18(3): 97-124 (2002) - 2001
- [j12]Xu Yan, James Y. L. Thong:
International direct dialing quality in a competitive transitional telecommunications market. IEEE Commun. Mag. 39(5): 168-174 (2001) - [j11]James Y. L. Thong, Patrick Y. K. Chau, Kar Yan Tam:
Decision-making and e-commerce systems. Decis. Support Syst. 32(1): 1-2 (2001) - [j10]James Y. L. Thong, Patrick Y. K. Chau, Kar Yan Tam:
Introduction to the Special Issue on Organizational Learning and Knowledge Management. J. Organ. Comput. Electron. Commer. 11(3): 153-154 (2001) - 2000
- [j9]James Y. L. Thong, Chee-Sing Yap, Kin-Lee Seah:
Business Process Reengineering in the Public Sector: The Case of the Housing Development Board in Singapore. J. Manag. Inf. Syst. 17(1): 245-270 (2000) - [c6]Rudy Setiono, Wee Kheng Leow, James Y. L. Thong:
Opening the neural network black box: an algorithm for extracting rules from function approximating artificial neural networks. ICIS 2000: 176-186
1990 – 1999
- 1999
- [j8]James Y. L. Thong:
An Integrated Model of Information Systems Adoption in Small Businesses. J. Manag. Inf. Syst. 15(4): 187-214 (1999) - 1998
- [j7]Rudy Setiono, James Y. L. Thong, Chee-Sing Yap:
Symbolic rule extraction from neural networks: An application to identifying organizations adopting IT. Inf. Manag. 34(2): 91-101 (1998) - [j6]James Y. L. Thong, Chee-Sing Yap:
Testing an Ethical Decision-Making Theory: The Case of Softlifting. J. Manag. Inf. Syst. 15(1): 213-237 (1998) - 1997
- [j5]Chee-Sing Yap, James Y. L. Thong:
Programme evaluation of a government information technology programme for small businesses. J. Inf. Technol. 12(2): 107-120 (1997) - [j4]James Y. L. Thong, Chee-Sing Yap, K. S. Raman:
Environments for Information Systems Implementation in Small Businesses. J. Organ. Comput. Electron. Commer. 7(4): 253-278 (1997) - [c5]Kwang-Tat Ang, James Y. L. Thong, Chee-Sing Yap:
IT implementation through the lens of organizational learning: a case study of insuror. ICIS 1997: 331-348 - 1996
- [j3]James Y. L. Thong, Chee-Sing Yap:
Information Systems Effectiveness: A User Satisfaction Approach. Inf. Process. Manag. 32(5): 601-610 (1996) - [j2]James Y. L. Thong, Chee-Sing Yap, K. S. Raman:
Top Management Support, External Expertise and Information Systems Implementation in Small Businesses. Inf. Syst. Res. 7(2): 248-267 (1996) - [c4]Ai-Hua Liang, James Y. L. Thong, Chee-Sing Yap:
Occupational Stress Among IT Professionals; Towards Conceptual Clarity. ECIS 1996: 385-400 - 1995
- [c3]Chee-Sing Yap, James Y. L. Thong:
An impact evaluation of a government computerisation programme. ECIS 1995: 125-136 - 1994
- [j1]James Y. L. Thong, Chee-Sing Yap, K. S. Raman:
Engagement of External Expertise in Information Systems Implementation. J. Manag. Inf. Syst. 11(2): 209-231 (1994) - 1993
- [c2]Chee-Sing Yap, James Y. L. Thong, K. S. Raman:
Government incentives and small business computerisation: An empirical study. ECIS 1993: 198-212 - 1992
- [c1]James Y. L. Thong, Chee-Sing Yap, K. S. Raman:
Top management support in small business information systems implementation: how important is it? SIGCPR 1992: 416-425
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint