-
作者:Clemons, Eric K.; Wilson, Josh; Matt, Christian; Hess, Thomas; Ren, Fei; Jin, Fujie; Koh, Noi Sian
作者单位:University of Pennsylvania; University of Pennsylvania; University of Bern; University of Pennsylvania; University of Munich; University of Munich; University of Munich; Peking University; Indiana University System; IU Kelley School of Business; Indiana University Bloomington; Nanyang Polytechnic
摘要:Trust underlies much of the online shopping behavior. We compare trust in online shopping in four countries: (1) the United States, a mature online market; (2) Germany; (3) China, the fastest growing online market, where consumers are plagued by counterfeits, forgeries, and spoiled or defective items; and (4) Singapore. We performed laboratory experiments in all four countries. We used three experimental treatments: (1) no assurances; (2) promises of product quality and authenticity; and (3) p...
-
作者:Lai, Vincent Siuking; Lai, Fujun; Lowry, Paul Benjamin
作者单位:Chinese University of Hong Kong; Soochow University - China; University of Southern Mississippi; University of Hong Kong
摘要:Enterprise resource planning (ERP) software is a platform for innovation with high failure rates due to its complexity. In China, failure rates of ERP are also high, with key differences between China and Western countries in terms of development, cultural, and organizational structure. Even when Chinese firms successfully adopt ERP, many fail to assimilate ERP and consequently never experience the full benefits of the innovation. The purpose of this study is to examine the predictors of adopt...
-
作者:Li, Weifeng; Chen, Hsinchun; Nunamaker, Jay F., Jr.
作者单位:University of Arizona; University of Arizona; University of Arizona; University of Arizona; University of Arizona
摘要:The past few years have witnessed millions of credit/debit cards flowing through the underground economy and ultimately causing significant financial loss. Examining key underground economy sellers has both practical and academic significance for cybercrime forensics and criminology research. Drawing on social media analytics, we have developed the AZSecure text mining system for identifying and profiling key sellers. The system identifies sellers using sentiment analysis of customer reviews a...
-
作者:Siering, Michael; Koch, Jascha-Alexander; Deokar, Amit V.
作者单位:Goethe University Frankfurt; University of Massachusetts System; University of Massachusetts Lowell
摘要:Crowdfunding platforms offer founders the possibility to collect funding for project realization. With the advent of these platforms, the risk of fraud has risen. Fraudulent founders provide inaccurate information or pretend interest toward a project. Within this study, we propose deception detection support mechanisms to address this novel type of Internet fraud. We analyze a sample of fraudulent and nonfraudulent projects published at a leading crowdfunding platform. We examine whether the a...
-
作者:Hu, Paul Jen-Hwa; Hu, Han-Fen; Wei, Chih-Ping; Hsu, Pei-Fang
作者单位:Utah System of Higher Education; University of Utah; Nevada System of Higher Education (NSHE); University of Nevada Las Vegas; National Taiwan University; National Tsing Hua University
摘要:This study examines key drivers of firms' green information technology (IT) practices. A hierarchical view, premised in institutional theory and competitive dynamics, leads to a model that explains firms' practices. This model includes factors that pertain to the environment (environmental awareness and government regulations), industry (industry norms and competitors' green practices), and firm (customers' and equity holders' attitudes and internal readiness) levels. Survey data collected fro...
-
作者:Jiang, Zhenhui (Jack); Wang, Weiquan; Tan, Bernard C. Y.; Yu, Jie
作者单位:National University of Singapore; National University of Singapore; City University of Hong Kong; National University of Singapore; National University of Singapore; University of Nottingham
摘要:Though aesthetics is generally acknowledged as an important aspect of website design, extant information systems (IS) research on web user experience has rarely studied what affects website aesthetics and how aesthetics influences users' perceptions of the website and the organization behind the website. In this paper, we synthesize prior literature from different academic domains and propose users' perceived quality of five design elements (i.e., unity, complexity, intensity, novelty, and int...
-
作者:Zahedi, Fatemeh Mariam; Walia, Nitin; Jain, Hemant
作者单位:University of Wisconsin System; University of Wisconsin Milwaukee; University System of Ohio; Ashland University; University of Tennessee System; University of Tennessee at Chattanooga
摘要:Motivated by rising demands for medical care and the recent trends in medical care delivery, this work designs, develops, and evaluates the augmented virtual doctor office (AVDO). AVDO is intended to provide group medical visits in cyberspace (Cyber GMV). This research adopts the design science approach to design AVDO based on the extension of media naturalness (MN) theory. AVDO is implemented in an augmented world setting that integrates real visual cues with a virtual-world technology (Secon...
-
作者:Zhou, Wenqi; Duan, Wenjing
作者单位:Duquesne University; George Washington University
摘要:With the broad reach of the Internet, online users frequently resort to various word-of-mouth (WOM) sources, such as online user reviews and professional reviews, during online decision making. Although prior studies generally agree on the importance of online WOM, we have little knowledge of the interplay between online user reviews and professional reviews. This paper empirically investigates a mediation model in which online user reviews mediate the impact of professional reviews on online ...
-
作者:Anderson, Bonnie Brinton; Vance, Anthony; Kirwan, C. Brock; Jenkins, Jeffrey L.; Eargle, David
作者单位:Brigham Young University; Brigham Young University; Brigham Young University; Pennsylvania Commonwealth System of Higher Education (PCSHE); University of Pittsburgh
摘要:Warning messages are fundamental to users' security interactions. Unfortunately, they are largely ineffective, as shown by prior research. A key contributor to this failure is habituation: decreased response to a repeated warning. Previous research has only inferred the occurrence of habituation to warnings, or measured it indirectly, such as through the proxy of a related behavior. Therefore, there is a gap in our understanding of how habituation to security warnings develops in the brain. Wi...
-
作者:Althuizen, Niek; Reichel, Astrid
作者单位:ESSEC Business School; Salzburg University
摘要:We investigate the effectiveness of three types of IT-enabled cognitive stimulation tools for enhancing creative problem solving: mind mappers, process guides, and stimuli providers. Based on the dual pathway to creativity models, the authors examine the extent to which these tools are capable of stimulating individuals to explore their knowledge base more deeply (i.e., the persistence pathway) and more broadly (i.e., the flexibility pathway) and, hence, help to produce more novel ideas. In a ...