-
作者:Jabr, Wael; Ghoshal, Abhijeet; Cheng, Yichen; Pavlou, Paul
作者单位:Pennsylvania Commonwealth System of Higher Education (PCSHE); Pennsylvania State University; Pennsylvania State University - University Park; University of Illinois System; University of Illinois Urbana-Champaign; University System of Georgia; Georgia State University; University of Houston System; University of Houston; University of Houston System; University of Houston
摘要:Online retailers are increasingly focused on maintaining a long-term relationship with customers, encouraging repeat visits rather than single-time purchases to increase customer lifetime value. To help retailers maximize the probabilities of customers' revisiting and purchasing, we develop a two-stage model to better characterize and predict these two fundamental customer activities. In the first stage, we characterize the propensity of a customer revisiting the retailer's website. In the sec...
-
作者:Li, Shilei; Liu, Yang; Feng, Juan
作者单位:City University of Hong Kong; Harbin Institute of Technology; Tsinghua University; Tsinghua Shenzhen International Graduate School; Tsinghua University
摘要:With the wide use of information technologies including Big Data and artificial intelligence (AI), consumers' personal actions (their search history, transaction records, click-through behaviors, etc.) can be tracked, recorded and analyzed by the service provider (e.g., Google) to provide personalized services. Under the current regime, consumers usually hand over their personal data for free in exchange for high-quality services. As it becomes more and more commonly accepted that data is prop...
-
作者:Gong, Jing; Liang, Yi; Ramasubbu, Narayan
作者单位:University of Virginia; Pennsylvania Commonwealth System of Higher Education (PCSHE); University of Pittsburgh; Pennsylvania Commonwealth System of Higher Education (PCSHE); University of Pittsburgh
摘要:Firms often assemble digital infrastructures using continuously evolving software applications sourced from a multitude of vendors. Using the theoretical lens of the threat-rigidity thesis, we raise the possibility that during adverse environmental conditions, software-vendor diversification can be a source of organizational rigidity that may dampen firm performance. Empirical analysis using data on 918 large public U.S. firms operating during two severe environmental shocks, the global financ...
-
作者:Zhang, Jun; Jiang, Qiqi; Zhang, Wenping; Kang, Lele; Lowry, Paul Benjamin; Zhang, Xiong
作者单位:Wuhan University; Copenhagen Business School; Renmin University of China; Nanjing University; Virginia Polytechnic Institute & State University; Beijing Jiaotong University
摘要:Social gamification, which allows technology users to interact with each other in gamified tasks, has drawn increasing interest due to its effectiveness in facilitating users' game engagement and task efforts. In social gamification, users can compete or cooperate with other users or teams to complete game tasks and achieve game goals. However, it remains unclear how various social interaction mechanisms (SIMs), such as cooperation, interpersonal competition, and intergroup competition, influe...
-
作者:Zwass, Vladimir
-
作者:Chen, Kun; Fan, Yifan; Liao, Shaoyi Stephen
作者单位:Southern University of Science & Technology; City University of Hong Kong; Southern University of Science & Technology
摘要:Crypto tokens, issued and managed via smart contracts, function as rewards in blockchain systems to encourage user participation. Distinct from monetary incentives, token incentives are uncertain in reward magnitude due to the large swings in token prices on crypto markets. By focusing on token price volatility, this study investigates how the reward uncertainty affects user contribution in a tokenized digital platform. Our empirical setting is Steemit, a platform where bloggers write posts an...
-
作者:Xu, Da; Hu, Paul Jen-Hwa; Fang, Xiao
作者单位:California State University System; California State University Long Beach; Utah System of Higher Education; University of Utah; University of Delaware; Utah System of Higher Education; University of Utah
摘要:Popular online business directory (OBD) platforms, such as Yelp and TripAdvisor, depend on voluntarily user-submitted data about various businesses to assist consumers in finding appropriate options for transactions. Yet the crowdsourced nature of such data restricts the availability of attribute values for many businesses on the platform. Crowdsourced data often suffer serious completeness and timeliness constraints, with negative implications for key stakeholders such as users, businesses, a...
-
作者:Xie, Jiaheng; Chai, Yidong; Liu, Xiao
作者单位:University of Delaware; Hefei University of Technology; Arizona State University; Arizona State University-Tempe; Hefei University of Technology
摘要:As video-sharing sites emerge as a critical part of the social media landscape, video viewership prediction becomes essential for content creators and businesses to optimize influence and marketing outreach with minimum budgets. Although deep learning champions viewership prediction, it lacks interpretability, which is required by regulators and is fundamental to the prioritization of the video production process and promoting trust in algorithms. Existing interpretable predictive models face ...
-
作者:Figl, Kathrin; Remus, Ulrich
作者单位:University of Innsbruck; University of Innsbruck
摘要:Informed by theoretical perspectives on working memory demands and devices' potential to prime different types of cognitive processing, this paper investigates whether we tend to think faster and more intuitively, with less reflection when we use a smartphone instead of a personal computer (PC) or notebook. Three complementary experimental studies with a total of 823 participants reveal that the results of using such devices surface only when participants can select the smartphone as their pre...
-
作者:Qahri-Saremi, Hamed; Turel, Ofir
作者单位:Colorado State University System; Colorado State University Fort Collins; University of Melbourne; Colorado State University System; Colorado State University Fort Collins
摘要:User susceptibility to phishing messages on social media is a growing information security concern. Contingency factors that can influence this susceptibility and the theoretical mechanisms through which they operate need more scholarly attention. To bridge this gap, we present a temptation and restraint (TR) model (a specific manifestation of the dual-system theory) of social media phishing susceptibility, which explains it as an outcome of a struggle between users' temptation toward engaging...