-
作者:Wolff, Josephine
作者单位:Rochester Institute of Technology
摘要:With computer security spending on the rise, organizations seem to have accepted the notion that buying more-and more expensive-defenses allows them to better protect their computer systems. In the context of complex computer systems, however, defenses can also have the opposite effect, creating new, unforeseen vulnerabilities in the systems they are intended to protect. Advocacy for defense-in-depth and diverse security measures has contributed to this more is better mentality for defending c...
-
作者:Zhang, Zan; Nan, Guofang; Li, Minqiang; Tan, Yong
作者单位:Tianjin University; Tianjin University; University of Washington; University of Washington Seattle
摘要:Many software firms, especially mobile app providers, offer perpetually free basic products to users, but premiums are charged for access to the additional features or functionalities. While the free offering helps capture potential customers, it might cannibalize the sales of premium goods or services. This paper adopts a game theoretical approach to examine the impact of free offering on the competition between two firms in the presence of network effects. The firms can either offer a free c...
-
作者:Zwass, Vladimir
-
作者:Gomez, Jaime; Salazar, Idana; Vargas, Pilar
作者单位:Universidad de La Rioja; University of Cambridge
摘要:We analyze the alignment between information processing needs and capacities. First, we explore the relationship between firms' vertical and horizontal boundaries and information technology (IT) capabilities. The literature postulates that less internalization leads firms to invest more in information technology. However, we argue that the use of taper integration and diversification increases the demand for IT-based resources such as IT infrastructure and IT human resources. Second, we propos...
-
作者:Ho, Shuyuan Mary; Hancock, Jeffrey T.; Booth, Cheryl; Liu, Xiuwen
作者单位:State University System of Florida; Florida State University; Stanford University; State University System of Florida; Florida State University; State University System of Florida; Florida State University
摘要:Computer-mediated deception threatens the security of online users' private and personal information. Previous research confirms that humans are bad lie detectors, while demonstrating that certain observable linguistic features can provide crucial cues to detect deception. We designed and conducted an experiment that creates spontaneous deception scenarios in an interactive online game environment. Logistic regression, and certain classification methodologies were applied to analyzing data col...
-
作者:Zwass, Vladimir
-
作者:Li, Xitong
作者单位:Hautes Etudes Commerciales (HEC) Paris
摘要:It is by now almost accepted as a stylized fact that offering deal promotion (such as via Groupon or LivingSocial) deteriorates local merchants' online reputations (e.g., the average of Yelp review ratings). However, in this paper we show that the stylized fact is not true in certain circumstances. We theorize that the valence and volume of prior reviews can play an important moderating role in the effect of deal promotion. Empirically, we show that restaurants with a relatively low prior aver...
-
作者:Proudfoot, Jeffrey G.; Jenkins, Jeffrey L.; Burgoon, Judee K.; Nunamaker, Jay F., Jr.
作者单位:Bentley University; Brigham Young University; University of Arizona; University of Arizona; National Science Foundation (NSF); University of Arizona
摘要:Eye-tracking technology has exhibited promise for identifying deception in automated screening systems. Prior deception research using eye trackers has focused on the detection and interpretation of brief oculometric variations in response to stimuli (e.g., specific images or interview questions). However, more research is needed to understand how variations in oculometric behaviors evolve over the course of an interaction with a deception detection system. Using latent growth curve modeling, ...
-
作者:Liang, Nan (Peter); Biros, David P.; Luse, Andy
作者单位:Oklahoma State University System; Oklahoma State University - Stillwater; Oklahoma State University System; Oklahoma State University - Stillwater; Oklahoma State University System; Oklahoma State University - Stillwater
摘要:Malicious insiders continue to pose a great threat to organizations. With their knowledge and access to organizational resources, malicious insiders could launch attacks more easily that result in more damaging impacts compared to outsiders. However, empirical research about malicious insiders is rare due to the unavailability of data. With few exceptions, many studies focus on a small number of cases. In order to identify common characteristics of a large number of malicious insiders, this st...
-
作者:Susarla, Anjana; Oh, Jeong-Ha; Tan, Yong
作者单位:Michigan State University; Michigan State University's Broad College of Business; University System of Georgia; Georgia State University; University of Washington; University of Washington Seattle
摘要:Motivated by the rise of social media platforms that achieve a fusion of content and community, we consider the role of word-of-mouth communications (WOM) structured through a network. Using a data set from YouTube, we examine how cascades of WOM interactions enhance the popularity of videos. We first estimate the impact of channel influence and other network parameters in initiating WOM communications. The probit estimation considers the selection effect in videos that are likely to be associ...