-
作者:Ransbotham, Sam; Fichman, Robert G.; Gopal, Ram; Gupta, Alok
作者单位:Boston College; University of Connecticut; University of Minnesota System; University of Minnesota Twin Cities
摘要:While information technology benefits society in numerous ways, it unfortunately also has potential to create new vulnerabilities. This special issue intends to stimulate thought and research into understanding and mitigating these vulnerabilities. We identify four mechanisms by which ubiquitous computing makes various entities (people, devices, organizations, societies, etc.) more vulnerable, including: increased visibility, enhanced cloaking, increased interconnectedness, and decreased costs...
-
作者:Cavusoglu, Huseyin; Phan, Tuan Q.; Cavusoglu, Hasan; Airoldi, Edoardo M.
作者单位:University of Texas System; University of Texas Dallas; National University of Singapore; University of British Columbia; Harvard University
摘要:We examine the role of granular privacy controls on dynamic content-sharing activities and disclosure patterns of Facebook users based on the exogenous policy change in December 2009. Using a unique panel data set, we first conduct regression discontinuity analyses to verify a discontinuous jump in context generation activities and disclosure patterns around the time of the policy change. We next estimate unobserved effects models to assess the short-run and long-run effects of the change. Res...
-
作者:Jenkins, Jeffrey L.; Anderson, Bonnie Brinton; Vance, Anthony; Kirwan, C. Brock; Eargle, David
作者单位:Brigham Young University; Brigham Young University; Brigham Young University; Pennsylvania Commonwealth System of Higher Education (PCSHE); University of Pittsburgh
摘要:System-generated alerts are ubiquitous in personal computing and, with the proliferation of mobile devices, daily activity. While these interruptions provide timely information, research shows they come at a high cost in terms of increased stress and decreased productivity. This is due to dual-task interference (DTI), a cognitive limitation in which even simple tasks cannot be simultaneously performed without significant performance loss. Although previous research has examined how DTI impacts...
-
作者:Lappas, Theodoros; Sabnis, Gaurav; Valkanas, Georgios
作者单位:Stevens Institute of Technology
摘要:Extant research has focused on the detection of fake reviews on online review platforms, motivated by the well-documented impact of customer reviews on the users' purchase decisions. The problem is typically approached from the perspective of protecting the credibility of review platforms, as well as the reputation and revenue of the reviewed firms. However, there is little examination of the vulnerability of individual businesses to fake review attacks. This study focuses on formalizing the v...
-
作者:Bauer, Julia; Franke, Nikolaus; Tuertscher, Philipp
作者单位:Vrije Universiteit Amsterdam
摘要:In many online communities, users reveal innovative and potentially valuable intellectual property (IP) under conditions that entail the risk of theft and imitation. When there is rivalry and formal IP law is not effective, this could lead to underinvestment or withholding of IP, unless user-organized norms compensate for these shortcomings. This study is the first to explore the characteristics and functioning of such a norms-based IP system in the setting of anonymous, large-scale, and loose...
-
作者:Stanko, Michael A.
作者单位:North Carolina State University
摘要:Within online innovation communities, remixing (i.e., the community's use of an existing innovation as source material or inspiration to aid in the development of further innovations) is an interesting form of knowledge collaboration. This study investigates an open theoretical question: Why are particular innovations remixed by online innovation communities? Some innovations languish, while others are widely remixed. Community members (even those unknown to the innovation's creator) may remix...
-
作者:Barrett, Michael; Oborn, Eivor; Orlikowski, Wanda
作者单位:University of Cambridge; University of Warwick; Massachusetts Institute of Technology (MIT)
摘要:How is value created in an online community (OC) over time? We explored this question through a longitudinal field study of an OC in the healthcare arena. We found that multiple kinds of value were produced and changed over time as different participants engaged with the OC and its evolving technology in various ways. To explain our findings, we theorize OC value as performed through the ongoing sociomaterial configuring of strategies, digital platforms, and stakeholder engagement. We develop ...
-
作者:Ji, Yonghua; Kumar, Subodha; Mookerjee, Vijay
作者单位:University of Alberta; Texas A&M University System; Texas A&M University College Station; Mays Business School; University of Texas System; University of Texas Dallas
摘要:We study operational and managerial problems arising in the context of security monitoring where sessions, rather than raw individual events, are monitored to prevent attacks. The objective of the monitoring problem is to maximize the benefit of monitoring minus the monitoring cost. The key trade-off in our model is that as more sessions are monitored, the attack costs should decrease. However, the monitoring cost would likely increase with the number of sessions being monitored. A key step in...
-
作者:Shaikh, Maha; Vaast, Emmanuelle
作者单位:University of Warwick; McGill University
摘要:Open source communities rely on the espoused premise of complete openness and transparency of source code and development process. Yet, openness and transparency at times need to be balanced out with moments of less open and transparent work. Through our detailed study of Linux Kernel development, we build a theory that explains that transparency and openness are nuanced and changing qualities that certain developers manage as they use multiple digital technologies and create, in moments of ne...
-
作者:Kwon, Hyeokkoo Eric; So, Hyunji; Han, Sang Pil; Oh, Wonseok
作者单位:Korea Advanced Institute of Science & Technology (KAIST); Arizona State University; Arizona State University-Tempe
摘要:Drawing on the rational addiction framework, this study explores the digital vulnerabilities driven by dependence on mobile social apps (e.g., social network sites and social games). Rational addicts anticipate the future consequences of their current behaviors and attempt to maximize utility from their intertemporal consumption choices. Conversely, myopic addicts tend toward immediate gratification and fail to fully recognize the future consequences of their current consumption. In lieu of co...