|
Resource |
# Of Theories |
Selection Method |
1. |
Theories Used in IS Research (Wikipedia) |
128 |
IS theories are collected by contributors of Wikipedia, and this website is a project of a Human Behaviour and an IS PhD Preparation Program. |
2. |
Brigham Young University Library (BYU Library, 2022) |
89 |
IS theories are collected according to related articles of top IS books and journals. |
3. |
Dwivedi et al. (2012) |
45 |
IS theories in this book consist of theories that IS researchers use as initial point of their works. |
4. |
Lim et al. (2013) |
44 |
In this study, IS theories are selected by Complex Network Analysis to respond to which theories are used in which research areas, and their linked disciplines. |
5. |
Boateng (2014) |
34 |
This syllabus consist of IS theories used in the conduct of IS research. Related theories are selected by instructor. |
Instructor: Richard Boateng |
Course Name: Theories and Methods of Information Systems |
6. |
Ramírez-Correa (2016) |
16 |
IS theories in this study, identified by co-citation analysis, according to the most widely applied in IS research from the literature of 2015. |
7. |
Key MIS Theories (Wikidot, 2007) |
13 |
IS theories are collected by contributors of this website by reviewing MIS literature. |
8. |
Salam (2011) |
13 |
In this syllabus, IS theories are determined by the instructor, according to their importance to students. |
Instructor: A. F. Salam |
Course Name: Theories of Information Systems |
9. |
Halawi and Mccarthy (2006) |
7 |
Theories in this article are selected by reviewing the theoretical fundamentals of IS theories, and highlighted in terms of their importance for IT. |