-
作者:Parssian, Amir; Sarkar, Sumit; Jacob, Varghese S.
作者单位:IE University; University of Texas System; University of Texas Dallas
摘要:Information derived from relational databases is routinely used for decision making. However, little thought is usually given to the quality of the source data, its impact on the quality of the derived information, and how this in turn affects decisions. To assess quality, one needs a framework that defines relevant metrics that constitute the quality pro. le of a relation, and provides mechanisms for their evaluation. We build on a quality framework proposed in prior work, and develop quality...
-
作者:Fuller, Robert M.; Dennis, Alan R.
作者单位:University of Tennessee System; University of Tennessee Knoxville; Indiana University System; IU Kelley School of Business; Indiana University Bloomington
摘要:Prior research on technology and team performance concludes that the fit of the technology to tasks influences team performance. It also suggests that the way teams appropriate technology influences performance. This research examines how fit and appropriation (from the Fit Appropriation Model) influence performance over time. Initially, the results show that fit better predicted performance; teams using poor-fitting technology performed worse than teams with better fitting technology. However...
-
作者:D'Arcy, John; Hovav, Anat; Galletta, Dennis
作者单位:University of Notre Dame; Korea University; Pennsylvania Commonwealth System of Higher Education (PCSHE); University of Pittsburgh
摘要:Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%-75% of security incidents originate from within an organization. Because of the large number of misuse incidents, it has become important to understand how to reduce such behavior. General deterrence theory suggests that certain controls can serve as deterrent mechanisms by increasing the perceived threat of pu...
-
作者:Bichler, Martin; Shabalin, Pasha; Pikovsky, Alexander
作者单位:Technical University of Munich
摘要:Iterative combinatorial auctions (ICAs) are IT-based economic mechanisms where bidders submit bundle bids in a sequence and an auctioneer computes allocations and ask prices in each auction round. The literature in this field provides equilibrium analysis for ICAs with nonlinear personalized prices under strong assumptions on bidders' strategies. Linear pricing has performed very well in the lab and in the field. In this paper, we compare three selected linear price ICA formats based on alloca...
-
作者:Parboteeah, D. Veena; Valacich, Joseph S.; Wells, John D.
作者单位:Eastern New Mexico University; Washington State University
摘要:With the proliferation of e-commerce, there is growing evidence that online impulse buying is occurring, yet relatively few researchers have studied this phenomenon. This paper reports on two studies that examine how variations in a website influence online impulse buying. The results reveal some relevant insights about this phenomenon. Specifically, although many participants had the urge to buy impulsively, regardless of website quality, this behavior's likelihood and magnitude was directly ...
-
作者:Dong, Shutao; Xu, Sean Xin; Zhu, Kevin Xiaoguo
作者单位:Renmin University of China; Hong Kong University of Science & Technology; University of California System; University of California San Diego
摘要:In this study, we seek to better understand the value of information technology (IT) in supply chain contexts. Grounded in the resource-based theory in conjunction with transaction cost economics, we develop a conceptual model that links three IT-related resources (backend integration, managerial skills, and partner support) to firm performance improvement. The model differs from previous studies by proposing a moderating effect of competition on the resource-performance relationships. Using d...
-
作者:Mittal, Neeraj; Nault, Barrie R.
作者单位:University of Calgary
摘要:M any studies measure the value of information technology (IT) by focusing on how much value is added rather than on the mechanisms that drive value addition. We argue that value from IT arises not only directly through changes in the factor input mix but also indirectly through IT-enabled augmentation of non-IT inputs and changes in the underlying production technology. We develop an augmented form of the Cobb-Douglas production function to separate and measure different productivity-enhancin...
-
作者:Ransbotham, Sam; Mitra, Sabyasachi
作者单位:Boston College; University System of Georgia; Georgia Institute of Technology
摘要:No longer the exclusive domain of technology experts, information security is now a management issue. Through a grounded approach using interviews, observations, and secondary data, we advance a model of the information security compromise process from the perspective of the attacked organization. We distinguish between deliberate and opportunistic paths of compromise through the Internet, labeled choice and chance, and include the role of countermeasures, the Internet presence of the firm, an...