-
作者:Chen, Daniel L.; Horton, John J.
作者单位:Universite de Toulouse; Universite Toulouse 1 Capitole; Toulouse School of Economics; New York University
-
作者:Gong, Fengmei; Nault, Barrie R.; Rahman, Mohammad S.
作者单位:University of La Verne; University of Calgary; Purdue University System; Purdue University
摘要:Logistics outsourcing has increased with the commercialization of the Internet, implying a reduction in the corresponding transaction costs. The Internet-with its universal connectivity and open standards-radically enhanced information technology (IT) capabilities, and we hypothesize this has reduced external transaction costs relatively more than internal governance costs. Using transaction cost theory as a lens, we examine whether the commercialization of the Internet coincided with a move t...
-
作者:Sanyal, Pallab
作者单位:George Mason University
摘要:Jump bidding, which refers to bidding above the minimum necessary, is a robust behavior that has been observed in a variety of ascending auctions in the field as well as the laboratory. However, the phenomenon has yet to be studied in combinatorial auctions, which are a type of multiobject auction that allows bidders to bid on a set of objects. Such auctions have been found to be beneficial when objects exhibit synergy, e.g., are complementary. In this paper, we explore jump bidding behavior i...
-
作者:Santhanam, Radhika; Liu, De; Shen, Wei-Cheng Milton
作者单位:University of Oklahoma System; University of Oklahoma - Norman; University of Minnesota System; University of Minnesota Twin Cities; University of Alabama System; University of Alabama Huntsville
摘要:Gamification, an application of game design elements to non-gaming contexts, is proposed as a way to add engagement in technology-mediated training programs. Yet there is hardly any information on how to adapt game design elements to improve learning outcomes and promote learner engagement. To address this issue, we focus on a popular game design element, competition, and specifically examine the effects of different competitive structures, i.e., whether a person faces a higher-skilled, lower-...
-
作者:Baird, Aaron; Miller, Chadwick J.; Raghu, T. S.; Sinha, Rajiv K.
作者单位:University System of Georgia; Georgia State University; Washington State University; Arizona State University; Arizona State University-Tempe
摘要:Hypercompetitive consumer software markets pit incumbents against free alternatives and pirates. Although the extant literature has studied firm level strategic responses to consumer heterogeneity and piracy, there is a lack of understanding of consumer reactions to digital goods choice sets that include firm product extensions such as the introduction of premium or free alternatives. With context-dependent preferences as the theoretical basis, this study systematically examines the impact of ...
-
作者:Oh, Wonseok; Moon, Jae Yun; Hahn, Jungpil; Kim, Taekyung
作者单位:Korea Advanced Institute of Science & Technology (KAIST); Korea University; National University of Singapore; Suwon University
摘要:From the perspective of leader-member exchange theory, we investigate how two forms of leadership style (uniform leader-member exchange (ULMX) and differential leader-member exchange (DLMX)) impact member participation in online collaborative work communities (OCWC). Furthermore, based on computer simulations, we also examine the moderating impact of key contextual factors on the relationship between leadership style and member contributions. Efficacy of leadership style in OCWCs is greatly in...
-
作者:Fayard, Anne-Laure; Gkeredakis, Emmanouil; Levina, Natalia
作者单位:New York University; New York University Tandon School of Engineering; University of Warwick; New York University
摘要:This paper examines how an organization's culture, and in particular its stance toward the pursuit of knowledge and innovation, matters when confronting new digitally enabled practices for generating novel insights. We draw on an in-depth interpretive study of how two innovation consulting firms encountered crowdsourcing for innovation. Our findings suggest that, although both organizations relied on a similar set of organizational arrangements in their daily consulting work, they enacted diff...
-
作者:Kane, Gerald C.; Ransbotham, Sam
作者单位:Boston College; Boston College; Boston College
摘要:The 15-year history of collaboration on Wikipedia offers insight into how peer production communities create knowledge. In this research, we combine disparate content and collaboration approaches through a social network analysis approach known as an affiliation network. It captures both how knowledge is transferred in a peer production network and also the underlying skills possessed by its contributors in a single methodological approach. We test this approach on the Wikipedia articles dedic...
-
作者:Steinbart, Paul John; Keith, Mark J.; Babb, Jeffry
作者单位:Arizona State University; Arizona State University-Tempe; Brigham Young University; Texas A&M University System; West Texas A&M University
摘要:It is not enough to get information technology (IT) users to adopt a secure behavior. They must also continue to behave securely. Positive outcomes of secure behavior may encourage the continuance of that behavior, whereas negative outcomes may lead users to adopt less-secure behaviors. For example, in the context of authentication, login success rates may determine whether users continue to use a strong credential or switch to less secure behaviors (e.g., storing a credential or changing to a...
-
作者:Moody, Gregory D.; Kirsch, Laurie J.; Slaughter, Sandra A.; Dunn, Brian Kimball; Weng, Qin
作者单位:Nevada System of Higher Education (NSHE); University of Nevada Las Vegas; Pennsylvania Commonwealth System of Higher Education (PCSHE); University of Pittsburgh; University System of Georgia; Georgia Institute of Technology; University of Oklahoma System; University of Oklahoma - Norman
摘要:Emerging from rapid advances in digitization and technological capabilities is a new form of information systems development project: cyber projects. Cyber projects are complex, massive, and ambitious, often involving hundreds of academic, government, and industry professionals, requiring years of development, and costing millions of dollars. In our study, we examine how control is exercised in cyber projects. Based on a longitudinal study over eight years, we develop a process theory of the c...