-
作者:Li, He; Yoo, Sungjin; Kettinger, William J.
作者单位:Clemson University; Iona College
摘要:This research examines the joint effects of information technology (IT) strategies and security investments on organizational security breaches. We focus on two forms of IT strategies: digitalization and embeddedness in IT outsourcing networks. Our longitudinal analysis of U.S. hospitals demonstrates that IT security investments reduce security breaches in less digitalized organizations but increase security breaches for highly digitalized organizations. Investing in technical network control ...
-
作者:Ramasubbu, Narayan; Kemerer, Chris F.
作者单位:Pennsylvania Commonwealth System of Higher Education (PCSHE); University of Pittsburgh
摘要:Technical debt refers to maintenance obligations that stem from violations of established standards during the development and subsequent maintenance of enterprise systems. Technical debt remediation is particularly challenging in the outsourcing context due to information asymmetry between client and vendor teams. Control balancing-the periodic adjustments to the control configurations of outsourced projects-has been proposed as a process to help mitigate these information asymmetry challenge...
-
作者:George, Jordana; Gerhart, Natalie; Torres, Russell
作者单位:Texas A&M University System; Texas A&M University College Station; Creighton University; University of North Texas System; University of North Texas Denton
摘要:Many diverse fields across academia are interested in the fake news (FN) phenomenon. A multidisciplinary literature review can provide researchers with new insights, alternative methods, and theories from other fields. The present review incorporates FN research across fields and organizes it into three categories: FN Stimuli, the triggers and impetus for people and organizations to engage with FN; FN Actions, which encompass the activities and processes undertaken in FN; and FN Outcomes, the ...
-
作者:Ng, Ka Chung; Zhang, Xiaojun; Thong, James Y. L.; Tam, Kar Yan
作者单位:Hong Kong Polytechnic University; Hong Kong University of Science & Technology
摘要:A popular information security-related motivation theory is the Protection Motivation Theory (PMT) that has been studied extensively in many information security contexts with promising results. However, prior studies have found inconsistent findings regarding the relationships within PMT. To shed light on these inconsistent findings, we introduce the attitudinal ambivalence theory to open the black box within PMT. We tested our model on data collect ed from 1,383 individuals facing potential ...
-
作者:Zwass, Vladimir
-
作者:Cao, Zike; Chu, Junhong; Hui, Kai-Lung; Xu, Hong
作者单位:Zhejiang University; National University of Singapore; Hong Kong University of Science & Technology
摘要:We empirically examine the effectiveness of referral marketing and price promotion in generating sales in a large e-commerce platform. Our results show that although referral marketing increases sales, its effect is attenuated by price promotion. We argue that price promotion arouses quality concerns and undermines the credibility of online paid referrals in a weak-tie environment. This finding implies diminishing marginal returns for referral marketing and price promotion spending. We conduct...
-
作者:Wessel, Michael; Gleasure, Rob; Kauffman, Robert J.
作者单位:Copenhagen Business School; Singapore Management University
摘要:Rewards-based crowdfunding presents an information asymmetry for participants due to the funding mechanism used. Campaign-backers trust creators to complete projects and deliver rewards as outlined prior to the fundraising process, but creators may discover better opportunities as they progress with a project. Despite this, the all-or-nothing (AON) mechanism on crowdfunding platforms incentivizes creators to set meager funding-targets that are easier to achieve but may offer limited slack when...
-
作者:Kohli, Rajiv; Liang, Ting-Peng
作者单位:National Sun Yat Sen University; National Sun Yat Sen University
-
作者:Aaltonen, Aleksi; Alaimo, Cristina; Kallinikos, Jannis
作者单位:Pennsylvania Commonwealth System of Higher Education (PCSHE); Temple University; Luiss Guido Carli University; Luiss Guido Carli University; University of London; London School Economics & Political Science
摘要:This paper studies the process by which data are generated, managed, and assembled into tradable objects we call data commodities. We link the making of such objects to the open and editable nature of digital data and to the emerging big data industry in which they are diffused items of exchange, repurposing, and aggregation. We empirically investigate the making of data commodities in the context of an innovative telecommunications operator, analyzing its efforts to produce advertising audien...
-
作者:Liang, Ting-Peng; Kohli, Rajiv; Huang, Hang-Chang; Li, Zong-Lin
作者单位:National Sun Yat Sen University
摘要:Blockchain technology has the promise of transforming security and trust in digital transactions. However, concerns about technical complexity and the benefits of deployment have blunted its adoption. We examine factors that influence managerial intention to adopt blockchain technology. We extend the fit-viability model (FVM) and develop a value-based technology adoption model through an empirical study of 242 managers mostly in medical and financial industries. Managers in such organizations ...