-
作者:He, Wei; Hsieh, J. J. Po-An; Schroeder, Andreas; Fang, Yulin
作者单位:Texas Tech University System; Texas Tech University; University System of Georgia; Georgia State University; Aston University; University of Hong Kong
摘要:Contemporary IT project teams demand that individual members generate and implement novel ideas in response to the dynamic changes in IT and business requirements. Firms rely on multidisciplinary, geographically distributed IT project teams to gather the necessary talent, regardless of their locations, for developing novel IT artifacts. In this team context, individuals are expected to leverage dissimilar others??? expertise for creating ideas during idea generation (IG) and then implement the...
-
作者:Samtani, Sagar; Chai, Yidong; Chen, Hsinchun
作者单位:Indiana University System; Indiana University Bloomington; Hefei University of Technology; University of Arizona
摘要:Black hat hackers use malicious exploits to circumvent security controls and take advantage of system vulnerabilities worldwide, costing the global economy over $450 billion annually. While many organizations are increasingly turning to cyber threat intelligence (CTI) to help prioritize their vulnerabilities, extant CTI processes are often criticized as being reactive to known exploits. One promising data source that can help develop proactive CTI is the vast and ever-evolving Dark Web. In thi...
-
作者:Lee, Kyunghee; Han, Kunsoo; Animesh, Animesh; Pinsonneault, Alain
作者单位:Wayne State University; McGill University
摘要:Although researchers have examined the role of dyadic dynamics (i.e., interactions between the acquirer and the target firm) in the success of acquisitions, little attention has been devoted to the role of information technology (IT). In this study, we extend this literature by examining how pre-acquisition IT distance (i.e., the difference between the enterprise IT systems of the two firms that reflects the system incompatibility and resulting costs of system integration) affects the acquirer...
-
作者:Ebrahimi, Mohammadreza; Chai, Yidong; Samtani, Sagar; Chen, Hsinchun
作者单位:State University System of Florida; University of South Florida; Hefei University of Technology; Indiana University System; Indiana University Bloomington; University of Arizona
摘要:International dark web platforms operating within multiple geopolitical regions and languages host a myriad of hacker assets such as malware, hacking tools, hacking tutorials, and malicious source code. Cybersecurity analytics organizations employ machine learning models trained on human-labeled data to automatically detect these assets and bolster their situational awareness. However, the lack of human-labeled training data is prohibitive when analyzing foreign-language dark web content. In t...
-
作者:Zhou, Junjie; Kishore, Rajiv; Amo, Laura; Ye, Cheng
作者单位:Shantou University; Nevada System of Higher Education (NSHE); University of Nevada Las Vegas; State University of New York (SUNY) System; University at Buffalo, SUNY
摘要:Online markets for mental health care (OMMH) allow clients to connect remotely with counselors to receive psychological therapy. Rooted in signaling theory and in the specific context of an OMMH, we theorize relative credibility of signals as the boundary condition that determines whether the demonstration signal of responsiveness to client questions substitutes or complements the two description signals of professional qualifications and counseling style in predicting market demand for counse...
-
作者:Hoehle, Hartmut; Venkatesh, Viswanath; Brown, Susan A.; Tepper, Bennett J.; Kude, Thomas
作者单位:University of Mannheim; Virginia Polytechnic Institute & State University; University of Arizona; University System of Ohio; Ohio State University; ESSEC Business School
摘要:Data breaches are a major threat to organizations from both financial and customer relations perspectives. We developed a nomological network linking post-breach compensation strategies to key outcomes, namely continued shopping intentions, positive word-of-mouth, and online complaining, with the effects being mediated by customers' justice perceptions. We conducted a longitudinal field study investigating Target's data breach in 2013 that affected more than 110 million customers. We examined ...