-
作者:Jiang, Dan; Jiang, Lianlian (Dorothy); London, Jackie, Jr.; Grover, Varun; Sun, Heshan
作者单位:University of North Carolina; East Carolina University; University of Houston System; University of Houston; Loyola University Maryland; University of Arkansas System; University of Arkansas Fayetteville; University of Oklahoma System; University of Oklahoma - Norman
摘要:It has been argued that the theory borrowing practices in IS research have become workmanlike- appropriate and effective, but lacking innovation. This concern is particularly salient at a time when digital phenomena are profoundly transforming society. Therefore, it is legitimate to ask: Are our theory borrowing practices hampering our ability to grapple with revolutionary developments in IS, and if so, what can be done? Through an investigation of the field's borrowing of transaction cost eco...
-
作者:Li, Weifeng; Chen, Hsinchun
作者单位:University System of Georgia; University of Georgia; University of Arizona
摘要:The prevalence and rapid growth of cybercrime are largely attributed to hacker communities on the dark web, where cybercriminals extensively exchange hacking resources, share hacking knowledge, and organize cyberattacks. Such streams of hacker-generated content constitute an invaluable data source for developing threat intelligence that can inform organizations of cybersecurity risks and facilitate proactive cyber defense. Drawing upon the design science paradigm, we propose a novel nonparamet...
-
作者:Mithas, Sunil; Chen, Yanzhen; Liu, Che-Wei; Han, Kunsoo
作者单位:State University System of Florida; University of South Florida; Hong Kong University of Science & Technology; Indiana University System; IU Kelley School of Business; Indiana University Bloomington; McGill University
摘要:The globalization of work raises important questions related to the employment of workers across geographies and how the complementarity or substitution of workers across country borders influences firm profitability. In particular, tension often exists regarding the substitution or complementarity of workers located outside the U.S. or within the U.S. for American firms. We investigate this question in the context of information technology (IT) professionals and assess how domestic and foreig...
-
作者:Deodhar, Swanand J.; Babar, Yash; Burtch, Gordon
作者单位:Indian Institute of Management (IIM System); Indian Institute of Management Ahmedabad; University of Wisconsin System; University of Wisconsin Madison; Boston University
摘要:In many instances, online contest platforms rely on contestants to ensure submission quality. This scalable evaluation mechanism offers a collective benefit. However, contestants may also leverage it to achieve personal, competitive benefits. Our study examines this tension from a status-theoretic perspective, suggesting that the conflict between competitive and collective benefits, and the net implication for evaluation efficacy, is influenced by contestants' status. On the one hand, contesta...
-
作者:Weinmann, Markus; Valacich, Joseph S.; Schneider, Christoph; Jenkins, Jeffry L.; Hibbeln, Martin
作者单位:University of Cologne; Erasmus University Rotterdam; Erasmus University Rotterdam - Excl Erasmus MC; University of Arizona; University of Navarra; IESE Business School; Brigham Young University; University of Duisburg Essen
摘要:Trace data-users' digital records when interacting with technology-can reveal their cognitive dynamics when making decisions on websites in real time. Here, we present a trace -data method, analyzing movements captured via a computer mouse, to assess potential fraud when filling out an online form. In contrast to existing fraud-detection methods, which analyze information after submission, mouse-movement traces can capture the cognitive deliberations as possible indicators of fraud as it is ha...
-
作者:Nikkhah, Hamid Reza; Grover, Varun
作者单位:Bentley University; University of Arkansas System; University of Arkansas Fayetteville
摘要:Companies may face serious adverse consequences as a result of a data breach event. To repair the potential damage to relationships with stakeholders after data breaches, companies adopt a variety of response strategies. However, the effects of these response strategies on the behavior of stakeholders after a data breach are unclear; differences in response times may also affect these outcomes, depending on the notification laws that apply to each company. As part of a multimethod study, we fi...
-
作者:Deng, Honglin; Wang, Weiquan; Lim, Kai H.
作者单位:Tongji University; Chinese University of Hong Kong; Hong Kong Polytechnic University
摘要:Trust violations of online sellers are widely reported in customer reviews and are often ascribed to the sellers' lack of integrity. These reported violations reduce potential customers' trust in the accused sellers, given the critical role of seller integrity in e-commerce. However, accused sellers and buyers often dispute the ascriptions of trust violations (e.g., sellers may argue that a violation is due to their lack of competence instead of their integrity). The trust repair literature ha...
-
作者:Lu, Yingda; Wu, Junjie; Tan, Yong; Chen, Jian
作者单位:University of Illinois System; University of Illinois Chicago; University of Illinois Chicago Hospital; Beihang University; University of Washington; University of Washington Seattle; Tsinghua University
摘要:In recent years, there has been a heated discussion on opinion polarization on social media platforms. Extant research attributes the emergence of echo chambers to higher exposure to information from users' existing social networks, which consists of like-minded others and argues that the provision of information from outside users' networks could alleviate opinion polarization. In this paper, we formulate a hierarchical Bayesian learning model to investigate the impact of replies, one of the ...
-
作者:Saldanha, Terence J. V.; Mithas, Sunil; Khuntia, Jiban; Whitaker, Jonathan; Melville, Nigel P.
作者单位:University System of Georgia; University of Georgia; State University System of Florida; University of South Florida; Children's Hospital Colorado; University of Colorado System; University of Colorado Denver; University of Colorado Anschutz Medical Campus; University of Richmond; University of Michigan System; University of Michigan
摘要:How do green information technology (IT) standards and organizational strategies jointly influence firms' environmental sustainability and financial performance? This is an important question, as many firms adopt green IT standards without considering the fit with their organizational strategies and therefore face uncertain or mixed outcomes. We address this question by developing a theory-driven conceptual framework and collecting archival data on green IT standards and green IT organizationa...
-
作者:Goldstein, Anat; Oestreicher-Singer, Gal; Barzilay, Ohad; Yahav, Inbal
作者单位:Ariel University; Tel Aviv University
摘要:The conversion funnel is a model describing the stages consumers go through in their journey toward a purchase. This journey often lasts several days to weeks and can include multiple visits to a seller's website. A large body of literature has focused on using observable search patterns to identify consumers' hidden purchasing stages and to estimate their likelihood of conversion. We propose a novel set of measures to better reveal the consumer's hidden stage in the funnel. These measures are...