default search action
Qin Weng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Qin Weng, Jaime B. Windeler, Likoebe M. Maruping, Viswanath Venkatesh:
Bridge the gap or mind the gap? The role of leader coaching and communication technologies in configurationally dispersed teams. Inf. Manag. 61(6): 104000 (2024) - [j4]Wei A. Huang, Matthew Engelhard, Marika Coffman, Elliot D. Hill, Qin Weng, Abby Scheer, Gary Maslow, Ricardo Henao, Geraldine Dawson, Benjamin Alan Goldstein:
A conditional multi-label model to improve prediction of a rare outcome: An illustration predicting autism diagnosis. J. Biomed. Informatics 157: 104711 (2024) - [c8]Min Ou, Hope Koch, Qin Weng:
Exploring the Impact of Intelligent Technologies on Knowledge Work. AMCIS 2024 - [c7]Tom Mattson, Jie Ren, Qin Weng:
Introduction to the Minitrack on The Bright and Dark Side of Social Media in the Marginalized Contexts. HICSS 2024: 7204 - [c6]Tom Mattson, Qin Weng, Jie Ren:
Curse or Cure: Exploring Responses to Mental Health Related Posts in Reddit and ChatGPT Using Terror Management Theory. HICSS 2024: 7225-7235 - [c5]Min Ou, Qin Weng, Hope Koch:
How Intelligent Technologies Influence the Role of Knowledge Workers in the Tech Industry. ICIS 2024 - 2023
- [j3]Qin Weng, Franck Loic Soh Noume:
The influence of project initiators' person-to-person followership on project popularity in open source communities: The role of reach and importance. J. Strateg. Inf. Syst. 32(2): 101771 (2023) - [c4]Qin Weng:
Agile CRISP-DM for Analytics Projects: Understanding Diabetes Treatment Using fsQCA. AMCIS 2023 - 2022
- [j2]Viswanath Venkatesh, Qin Weng, Arun Rai, Likoebe M. Maruping:
Guidelines for the Development of Three-Level Models: Bridging Levels of Analysis and Integrating Contextual Influences in IS Research. J. Assoc. Inf. Syst. 24(1): 7 (2022) - [c3]Qin Weng, Wendy Wang, Amber Grace Young:
How Is IT Identity Claimed and Manifested? AMCIS 2022
2010 – 2019
- 2019
- [c2]Qin Weng, Wendy Wang, Jignya Patel:
Exploring the Formation of IT Identity: A Technology-Value Fit Model. AMCIS 2019 - 2016
- [j1]Gregory D. Moody, Laurie J. Kirsch, Sandra A. Slaughter, Brian Kimball Dunn, Qin Weng:
Facilitating the Transformational: An Exploration of Control in Cyberinfrastructure Projects and the Discovery of Field Control. Inf. Syst. Res. 27(2): 324-346 (2016) - 2011
- [c1]Qin Weng, Nikhil Sharma, Brian S. Butler:
Just-in-time Knowledge: Knowledge Mobilization in a Public Health Network. AMCIS 2011
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 21:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint