-
作者:Bandyopadhyay, S; Barron, JM; Chaturvedi, AR
作者单位:State University System of Florida; University of Florida; Purdue University System; Purdue University
摘要:With the advent of the Internet, and the minimal information technology requirements of a trading partner to join an exchange, the number of sellers who can qualify and participate in online exchanges is greatly increased. We model the competition between two sellers with different unit costs and production capacities responding to a buyer demand. The resulting mixed-strategy equilibrium shows that one of the sellers has a normal high price with random sales, while the other seller continuousl...
-
作者:Majchrzak, A; Malhotra, A; John, R
作者单位:University of Southern California; University of North Carolina; University of North Carolina Chapel Hill; University of Southern California
摘要:In today's global market environment, enterprises are increasingly turning to use of distributed teams to leverage their resources and address diverse markets. Individual members of structurally diverse distributed teams need to develop their collaboration know-how to work effectively with others on their team. The lack of face-to-face cues creates challenges in developing the collaboration know-how-challenges that can be overcome by communicating not just content, but also context. We derive ...
-
作者:[Anonymous]
-
作者:Cavusoglu, H; Mishra, B; Raghunathan, S
作者单位:Tulane University; University of Texas System; University of Texas Dallas; University of California System; University of California Riverside
摘要:The increasing significance of information technology (IT) security to firms is evident from their growing IT security budgets. Firms rely on security technologies such as firewalls and intrusion detection systems (IDSs) to manage IT security risks. Although the literature on the technical aspects of IT security is proliferating, a debate exists in the IT security community about the value of these technologies. In this paper, we seek to assess the value of IDSs in a firm's IT security archite...
-
作者:Wixom, BH; Todd, PA
作者单位:University of Virginia
摘要:In general, perceptions of information systems (IS) success have been investigated within two primary research streams-the user satisfaction literature and the technology acceptance literature. These two approaches have been developed in parallel and have not been reconciled or integrated. This paper develops an integrated research model that distinguishes beliefs and attitudes about the system (i.e., object-based beliefs and attitudes) from beliefs and attitudes about using the system (i.e., ...
-
作者:Zhu, K; Kraemer, KL
作者单位:University of California System; University of California Irvine; University of California System; University of California Irvine
摘要:Grounded in the innovation diffusion literature and the resource-based theory, this paper develops an integrative research model for assessing the diffusion and consequence of e-business at the firm level. Unlike the typical focus on adoption as found in the literature, we focus on postadoption stages, that is, actual usage and value creation. The model thus moves beyond dichotomous adoption versus nonadoption and accounts for the missing link-actual usage-as a critical stage of value creation...