• Confente, G., Siciliano, G.G., Gaudenzi, B. and Eickhoff, M. 2019 "Effects of data breaches from user-generated content: A corporate reputation analysis,"European Management Journal (37:4) pp. 492-504 [link]


  • Siering, M., Muntermann, J., and Rajagopalan, B. 2018. “Explaining and predicting online review helpfulness: The role of content and reviewer-related signals,“ Decision Support Systems (108:1), pp. 1-12. [link]


  • Sinanaj, G., and Beyer F. 2017. “Do Data Breaches Affect Our Beliefs? — Investigating Reputation Risk in Social Media,” Journal of Information System Security (13:2), pp. 97-116.


  • Eickhoff M., and Muntermann J. 2016. “Stock analysts vs. the crowd: Mutual prediction and the drivers of crowd wisdom,” Information & Management (53:7), pp. 835-845.


  • Gregory, R. W., Keil, M., Muntermann, J., and Mähring, M. 2015. “Paradoxes and the Nature of Ambidexterity in IT Transformation Programs,” Information Systems Research (26:1), pp. 57-80.

  • Sinanaj, G. 2015. “The Intangible Cost of Information Security Breaches: A State of the Art Analysis,” Journal of Information System Security (11:2), pp. 111-130.


  • Gregory, R. W., and Keil, M. 2014. “Blending Bureaucratic and Collaborative Management Styles to Achieve Control Ambidexterity in IS Projects,” European Journal of Information Systems (23:3), pp. 343-356.

  • Gregory, R. W., and Muntermann, J. 2014. “Heuristic Theorizing: Proactively Generating Design Theories,” Information Systems Research (25:3), pp. 639-653.

  • Nofer, M., Hinz, O., Muntermann, J., and Roßnagel, H. 2014. “The Economic Impact of Privacy Violations and Security Breaches,” Business & Information Systems Engineering (6:6), pp. 339-348.

  • Rossnagel, H., Zibuschka, J., Hinz, O., and Muntermann, J. 2014. “Users’ Willingness-to-Pay for Web Identity Management,” European Journal of Information Systems (23:1), pp. 36-50.


  • Beck, R., Gregory, R. W., and Marschollek, O. 2013. “The Interplay of Institutional Logics in IT Public-Private Partnerships,” The DATA BASE for Advances in Information Systems (46:1), pp. 24-38.

  • Beck, R., Weber, S., and Gregory, R. W. 2013. “Theory-Generating Design Science Research,” Information Systems Frontiers (15:4), pp. 637-651.

  • Gregory, R. W., Beck, R., and Keil, M. 2013. “Control Balancing in Information Systems Development Offshoring Projects,” MIS Quarterly (37:4), pp. 1211-1232.

  • Nickerson, R. C., Varshney U., and Muntermann J. 2013. “A Method for Taxonomy Development and its Application in Information Systems,” European Journal of Information Systems (22:3), pp. 336-359.


  • Beck, R., Schott, K., Gregory, R. W. 2011. “Mindful Management Practices in Global Multi-Vendor ISD Outsourcing Projects,” Scandinavian Journal of Information Systems (23:2), pp. 5-28.

  • Groth, S., and Muntermann, J. 2011. “An Intraday Market Risk Management Approach based on Textual Analysis,” Decision Support Systems (50:4), pp. 649-776.

  • Zibuschka, J., Roßnagel, H., Muntermann, J., and Scherner, T. 2011. “Mobile Emergency Management Services Targeting Large Public Events,” International Journal of Service Science, Management, Engineering, and Technology (2:4), pp. 49-66.


  • Beck, R., Marschollek, O., and Gregory, R. W. 2010. “Establishing Preconditions for Spanning the Boundaries in Public Private IT Megaprojects,” International Journal of Information Technology Project Management (1:4), pp. 20-37.

  • Ende, B., and Muntermann, J. 2010. “Dark Pools of Liquidity in Electronic Securities Trading,” BIT –Banking and Information Technology (11:1), pp. 35-44.

  • Schott, K., Beck, R., and Gregory, R. W. 2010.“Management of Globally Distributed Software Development Projects in Multiple-Vendor Constellations,” in Lecture Notes in Business Information Processing: Global Sourcing of Information Technology and Business Processes, I. Oshri and J. Kotlarsky (eds.), Berlin: Springer, pp. 69-81.


  • Gregory, R. W, Prifling, M., and Beck, R. 2008. “The Role of Cultural Intelligence for the Emergence of Negotiated Culture in IT Offshore Outsourcing Projects,” Information Technology and People (22:3), pp. 223-241.

  • Muntermann, J. 2009. “Towards ubiquitous Information Supply for Individual Investors: A Decision Support System Design,” Decision Support Systems (47:2), pp. 82-92.

  • Muntermann, J., Rossnagel, H., and Wilke, D. 2009. “Endstation Medienbruch: Die Rolle der elektronischen Signatur,” Bank und Markt (38:3).


  • Muntermann, J., and Güttler, A. 2007. “Intraday Stock Price Effects of Ad Hoc Disclosures: The German Case,” Journal of International Financial Markets, Institutions and Money (17:1), pp. 1-24.


  • Muntermann, J., and Rossnagel, H. 2006. “Security Issues and Capabilities of Mobile Brokerage Services and Infrastructures,” Journal of Information System Security (2:1), pp. 27-43.


  • Muntermann, J. 2005. “Automated Mobile Alerting Services – Towards A Level Playing Field in the Financial Community,” Journal of Electronic Commerce Research (6:3), pp. 241-250.