default search action
Jeretta Horn Nord
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j27]Yogesh K. Dwivedi, Nir Kshetri, Laurie Hughes, Emma L. Slade, Anand Jeyaraj, Arpan Kumar Kar, Abdullah M. Baabdullah, Alex Koohang, Vishnupriya Raghavan, Manju Ahuja, Hanaa Albanna, Mousa Ahmad Albashrawi, Adil S. Al-Busaidi, Janarthanan Balakrishnan, Yves Barlette, Sriparna Basu, Indranil Bose, Laurence D. Brooks, Dimitrios Buhalis, Lemuria D. Carter, Soumyadeb Chowdhury, Tom Crick, Scott W. Cunningham, Gareth H. Davies, Robert M. Davison, Rahul De', Denis Dennehy, Yanqing Duan, Rameshwar Dubey, Rohita Dwivedi, John S. Edwards, Carlos Flavián, Robin Gauld, Varun Grover, Mei-Chih Hu, Marijn Janssen, Paul Jones, Iris A. Junglas, Sangeeta Khorana, Sascha Kraus, Kai R. Larsen, Paul Latreille, Sven Laumer, F. Tegwen Malik, Abbas Mardani, Marcello Mariani, Sunil Mithas, Emmanuel Mogaji, Jeretta Horn Nord, Siobhán O'Connor, Fevzi Okumus, Margherita Pagani, Neeraj Pandey, Savvas Papagiannidis, Ilias O. Pappas, Nishith Pathak, Jan Pries-Heje, Ramakrishnan Raman, Nripendra P. Rana, Sven-Volker Rehm, Samuel Ribeiro-Navarrete, Alexander Richter, Frantz Rowe, Suprateek Sarker, Bernd Carsten Stahl, Manoj Kumar Tiwari, Wil M. P. van der Aalst, Viswanath Venkatesh, Giampaolo Viglia, Michael Wade, Paul Walton, Jochen Wirtz, Ryan T. Wright:
Opinion Paper: "So what if ChatGPT wrote it?" Multidisciplinary perspectives on opportunities, challenges and implications of generative conversational AI for research, practice and policy. Int. J. Inf. Manag. 71: 102642 (2023) - [j26]Huosong Xia, Duqun Lu, Boqiang Lin, Jeretta Horn Nord, Zuopeng Justin Zhang:
Trust in Fintech: Risk, Governance, and Continuance Intention. J. Comput. Inf. Syst. 63(3): 648-662 (2023) - [j25]Alex Koohang, Jeretta Horn Nord, Keng-Boon Ooi, Garry Wei-Han Tan, Mostafa Al-Emran, Eugene Cheng-Xi Aw, Abdullah Mohammed Baabdullah, Dimitrios Buhalis, Tat Huei Cham, Charles Dennis, Vincent Dutot, Yogesh K. Dwivedi, Laurie Hughes, Emmanuel Mogaji, Neeraj Pandey, Ian Phau, Ramakrishnan Raman, Anshuman Sharma, Marianna Sigala, Akiko Ueno, Lai-Wan Wong:
Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation. J. Comput. Inf. Syst. 63(3): 735-765 (2023) - 2022
- [j24]Alex Koohang, Carol Springer Sargent, Jeretta Horn Nord, Joanna Paliszkiewicz:
Internet of Things (IoT): From awareness to continued use. Int. J. Inf. Manag. 62: 102442 (2022) - [j23]Jeretta Horn Nord, Carol Springer Sargent, Alex Koohang, Angelica Marotta:
Predictors of Success in Information Security Policy Compliance. J. Comput. Inf. Syst. 62(4): 863-873 (2022) - [j22]Marcin Soniewicki, Joanna Paliszkiewicz, Alex Koohang, Jeretta Horn Nord:
Critical Components Affecting Organizational Performance. J. Comput. Inf. Syst. 62(5): 965-974 (2022) - 2021
- [j21]Alex Koohang, Jeretta Horn Nord:
Critical components of data analytics in organizations: A research model. Expert Syst. Appl. 166: 114118 (2021) - [j20]Fatih Çetin, Tara Urich, Joanna Paliszkiewicz, Magdalena Madra-Sawicka, Jeretta Horn Nord:
ICTs, Empowerment, and Success: Women's Perceptions across Eight Countries. J. Comput. Inf. Syst. 61(1): 1-10 (2021) - [j19]Alex Koohang, Jeretta Horn Nord, Zoroayka V. Sandoval, Joanna Paliszkiewicz:
Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance. J. Comput. Inf. Syst. 61(2): 99-107 (2021) - 2020
- [j18]Alex Koohang, Jonathan Anderson, Jeretta Horn Nord, Joanna Paliszkiewicz:
Building an awareness-centered information security policy compliance model. Ind. Manag. Data Syst. 120(1): 231-247 (2020) - [j17]Magdalena Madra-Sawicka, Jeretta Horn Nord, Joanna Paliszkiewicz, Tzong-Ru Lee:
Digital Media: Empowerment and Equality. Inf. 11(4): 225 (2020) - [j16]Magdalena Madra-Sawicka, Joanna Paliszkiewicz, Jeretta Horn Nord:
Determinants of Social Media Usage in Business by Women: Age and Development of the Country. Inf. 11(9): 445 (2020) - [j15]Alex Koohang, Alojzy Nowak, Joanna Paliszkiewicz, Jeretta Horn Nord:
Information Security Policy Compliance: Leadership, Trust, Role Values, and Awareness. J. Comput. Inf. Syst. 60(1): 1-8 (2020) - [j14]Jeretta Horn Nord, Susana de Juana Espinosa, Joanna Paliszkiewicz, Magdalena Madra-Sawicka:
Do technology and social media preferences differ with age? A study of the use of social technologies for business purposes in Spain. J. Comput. Inf. Syst. 60(2): 101-112 (2020)
2010 – 2019
- 2019
- [j13]Jeretta Horn Nord, Alex Koohang, Joanna Paliszkiewicz:
The Internet of Things: Review and theoretical framework. Expert Syst. Appl. 133: 97-108 (2019) - 2017
- [j12]Jeretta Horn Nord, Maria Teresa Riggio, Joanna Paliszkiewicz:
Social and Economic Development through Information and Communications Technologies: Italy. J. Comput. Inf. Syst. 57(3): 278-285 (2017) - 2016
- [j11]Jeretta Horn Nord, Tzong-Ru (Jiun-Shen) Lee, Fatih Çetin, Özlem Atay, Joanna Paliszkiewicz:
Examining the impact of social technologies on empowerment and economic development. Int. J. Inf. Manag. 36(6): 1101-1110 (2016) - [j10]Alex Koohang, Joanna Paliszkiewicz, Jerzy Goluchowski, Jeretta Horn Nord:
Active Learning for Knowledge Construction in E-Learning: A Replication Study. J. Comput. Inf. Syst. 56(3): 238-243 (2016) - 2014
- [j9]Jeretta Horn Nord, Joanna Paliszkiewicz, Alex Koohang:
Using Social Technologies for Competitive Advantage: Impact on Organizations and Higher Education. J. Comput. Inf. Syst. 55(1): 92-104 (2014)
2000 – 2009
- 2006
- [j8]G. Daryl Nord, Tipton F. McCubbins, Jeretta Horn Nord:
E-monitoring in the workplace: privacy, legislation, and surveillance software. Commun. ACM 49(8): 72-77 (2006) - 2005
- [j7]G. Daryl Nord, Jeretta Horn Nord, Hongjiang Xu:
An Investigation of the Impact of Organization Size on Data Quality Issues. J. Database Manag. 16(3): 58-71 (2005) - 2003
- [j6]Hongjiang Xu, Jeretta Horn Nord, G. Daryl Nord, Binshan Lin:
Key issues of accounting information quality management: Australian case studies. Ind. Manag. Data Syst. 103(7): 461-470 (2003) - 2002
- [j5]Sandra Cormack, Aileen Cater-Steel, Jeretta Horn Nord, G. Daryl Nord:
Propeller Heads - Handle with Care: Improving the IT-Business Relationship through Cultural Awareness. Electron. J. Inf. Syst. Dev. Ctries. 7(1): 1-10 (2002) - [j4]Hongjiang Xu, Jeretta Horn Nord, Noel Brown, G. Daryl Nord:
Data quality issues in implementing an ERP. Ind. Manag. Data Syst. 102(1): 47-58 (2002) - 2001
- [c4]Sandra Cormack, Aileen Cater-Steel, Jeretta Horn Nord, G. Daryl Nord:
Resolving the Troubled IT-Business Relationship from a Cultural Perspective. ACIS 2001 - [c3]G. Daryl Nord, Susan Haugen, Andy Koronios, Dusan Lesjak, Ming-te Lu, Jeretta Horn Nord:
Panel: A Global View of the Status of Electronic Business/Electronic Commerce in Collegiate Schools of Business. ECIS 2001: 79-84
1990 – 1999
- 1998
- [c2]G. Daryl Nord, Tom Hilton, Wallace A. Wood, Jeretta Horn Nord:
Information systems curriculum development (panel): skills and knowledge for today and the future. SIGCPR 1998: 303-304 - 1995
- [j3]Jeretta Horn Nord, G. Daryl Nord:
MIS research: Journal status assessment and analysis. Inf. Manag. 29(1): 29-42 (1995) - [j2]Jeretta Horn Nord, G. Daryl Nord:
Executive information systems: A study and comparative analysis. Inf. Manag. 29(2): 95-106 (1995) - 1990
- [c1]Jeretta Horn Nord, G. Daryl Nord:
Executive Support Systems for Strategic Advance (Abstract). ICCI 1990: 9
1980 – 1989
- 1989
- [j1]Richard Aukerman, Robert E. Schooley, G. Daryl Nord, Jeretta Horn Nord:
The importance of selected systems analysis and design tools and techniques as determined by industry systems analysts and university educators. ACM SIGCSE Bull. 21(3): 30-34 (1989)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint