-
作者:Sen, Ravi; Verma, Ajay; Heim, Gregory R.
作者单位:Texas A&M University System; Texas A&M University College Station; Texas A&M University System; Texas A&M University College Station; Mays Business School; Lockheed Martin
摘要:The number of malicious hacking incidents in our increasingly IT-enabled world has been increasing over the years. Conventional wisdom focuses on negative impacts of these malicious hacker activities. We posit that malicious hacker activities also might lead to some unintended consequences, specifically related to altering of software market structure, and associated stakeholder consequences. In this study, we model the competition between two software platforms in the presence of malicious ha...
-
作者:Wulf, Jochen; Blohm, Ivo
作者单位:University of St Gallen; University of St Gallen
摘要:While many firms in recent years have started to offer public Application Programming Interfaces (APIs), firms struggle with shaping digital platform strategies that align API design with aspired business goals and the demands of external developers. We address the lack of theory that explains the performance impacts of three API archetypes (professional, mediation, and open asset services). We couple survey data from 152 API product managers with manually coded API design classifications. Wit...
-
作者:Durward, David; Blohm, Ivo; Leimeister, Jan Marco
作者单位:Universitat Kassel; University of St Gallen
摘要:Crowd work reflects a new form of gainful employment on the Internet. We study how the nature of the tasks being performed and financial compensation jointly shape work perceptions of crowd workers in order to better understand the changing modes and patterns of digital work. Surveying individuals on 23 German crowd working platforms, this work is the first to add a multi-platform perspective on perceived working conditions in crowd work. We show that crowd workers need rather high levels of f...
-
作者:Silic, Mario; Lowry, Paul Benjamin
作者单位:University of St Gallen; Virginia Polytechnic Institute & State University
摘要:We conducted a design-science research project to improve an organization's compound problems of (1) unsuccessful employee phishing prevention and (2) poorly received internal security training. To do so, we created a gamified security training system focusing on two factors: (1) enhancing intrinsic motivation through gamification and (2) improving security learning and efficacy. Our key theoretical contribution is proposing a recontextualized kernel theory from the hedonic-motivation system a...
-
作者:Hinz, Oliver; Otter, Thomas; Skiera, Bernd
作者单位:Goethe University Frankfurt; Deakin University
摘要:The proliferation of the Internet has enabled platform intermediaries to create two-sided markets in many industries. Time-series data on the number of customers on both sides of the markets allow platform intermediaries for estimating the direction and magnitude of network effects, which can then support growth predictions and subsequent information technology (IT) or marketing investment decisions. This article investigates the conditions under which this estimation of same-side and cross-si...
-
作者:Kuem, Jungwon; Khansa, Lara; Kim, Sung S.
作者单位:State University of New York (SUNY) System; University at Albany, SUNY; Virginia Polytechnic Institute & State University; University of Wisconsin System; University of Wisconsin Madison
摘要:Online communities have suffered from their members' intermittent, dormant, or nonexistent participation. We propose that prominence, which refers to the salience of community members' psychological proximity to their community, differs from the engagement construct, which denotes a psychological dedication to behave prosaically toward other community members. Whereas engagement has been increasingly examined as a driver of online community behavior, the role of prominence has received a minim...
-
作者:Ghobadi, Shahla; Mathiassen, Lars
作者单位:University of Leeds; University System of Georgia; Georgia State University
摘要:Software is the lifeblood of technological advancement, and it progresses not only through emerging technologies, but also through the contributions of new generations of developers who have distinct technology-related experiences. We describe our qualitative investigation into how developers, who began regularly using social networking technology at an early age (referred to as precocious users), demonstrate distinct expectations about the goals of software development. We advance a theoretic...
-
作者:Wang, Zhao; Jiang, Cuiqing; Zhao, Huimin; Ding, Yong
作者单位:Hefei University of Technology; University of Wisconsin System; University of Wisconsin Milwaukee
摘要:While Peer-to-Peer (P2P) lending is rapidly growing, it is also accompanied by high credit risk due to information asymmetry. Besides conventional hard information, soft information also enters into the lending decision process. The descriptive loan texts submitted by borrowers have great potential for exploiting useful soft factors, but also pose great challenges due to the semantic sensitivity to context and the complexity of content representation. We propose a novel text mining method for ...
-
作者:Dennis, Alan R.; Yuan, Lingyao (IVY); Feng, Xuan; Webb, Eric; Hsieh, Christine J.
作者单位:Indiana University System; Indiana University Bloomington; IU Kelley School of Business; Iowa State University; University of Oklahoma System; University of Oklahoma - Norman; University System of Ohio; University of Cincinnati
摘要:Most research on e-commerce has focused on deliberate rational cognition, yet research in psychology and marketing suggests that buying decisions may also be influenced by priming (a form of what Information Systems researchers have called digital nudging). We conducted seven experiments to investigate the impact of two types of priming (numeric priming and semantic priming) delivered through what appeared to be advertisements on an e-commerce website. We found that numeric priming had a small...
-
作者:Zwass, Vladimir