-
作者:Sykes, Tracy Ann; Venkatesh, Viswanath
作者单位:University of Arkansas System; University of Arkansas Fayetteville
摘要:This paper draws from communication research and negative asymmetry theory to examine how employee social network ties at work affect deep structure use and job performance in the context of an enterprise system (ES) implementation. Specifically, we examine how the content (i.e., advice and impeding) and source (i.e., friends and acquaintances) of social network ties interact with one another to influence both deep structure use of the new ES and employee job performance. A longitudinal field ...
-
作者:Angst, Corey M.; Block, Emily S.; D'Arcy, John; Kelley, Ken
作者单位:University of Notre Dame; University of Alberta; University of Delaware; University of Notre Dame
摘要:In this study, we argue that institutional factors determine the extent to which hospitals are symbolic or substantive adopters of information technology (IT) specific organizational practices. We then propose that symbolic and substantive adoption will moderate the effect that IT security investments have on reducing the incidence of data security breaches over time. Using data from three different sources, we create a matched panel of over 5,000 U. S. hospitals and 938 breaches over the 2005...
-
作者:Li, Mengxiang; Tan, Chuan-Hoo; Wei, Kwok-Kee; Wang, Kanliang
作者单位:Hong Kong Baptist University; National University of Singapore; National University of Singapore; National University of Singapore; Renmin University of China
摘要:The literature highlights the importance of product review information to a consumer, but limited knowledge exists on the provision of such information in a shopping website. This research uses information foraging theory (IFT) to determine how to provide product reviews. Product reviews differ according to whether the content is mainly on product attributes (i.e., attribute-oriented product reviews) or usage experience (i.e., usage-oriented product reviews). Two empirical studies were conduct...
-
作者:Chang, Young Bong; Gurbaxani, Vijay; Ravindran, Kiron
作者单位:Sungkyunkwan University (SKKU); University of California System; University of California Irvine; IE University
摘要:Information technology outsourcing (ITO) is the predominant mode of acquiring information systems services, providing clear evidence that the economics of service delivery favor external service providers over in-house information systems departments. An interesting feature of many large ITO arrangements is that the production assets necessary for service delivery are transferred to the vendor. The argument in favor of such asset transfers, based in property rights theory, is that they are nec...
-
作者:Wiesche, Manuel; Jurisch, Marlen C.; Yetton, Philip W.; Krcmar, Helmut
作者单位:Technical University of Munich
摘要:Grounded theory methodology (GTM), with its espoused goal of theory development of novel phenomena, has found broad application in Information Systems (IS) research. To investigate how GTM is applied in IS research and how the research contributions are contingent on those applications, we review 43 GTM-based articles in major IS and related journals. Ten of the articles develop theory. The other 33 articles use GTM to develop models and rich descriptions of new phenomena as their theoretical ...
-
作者:Nan, Ning; Tanriverdi, Huseyin
作者单位:University of British Columbia; University of Texas System; University of Texas Austin
摘要:While information technology (IT) serves as a new source of sustainable competitive advantage for firms, it also induces hyperturbulent environments (or hyperturbulence) that erode that sustainable competitive advantage. In this paper, we posit that these contradictions might be due to cross-level nonlinear causality between firm-level IT-based strategic actions and collective-level IT-induced hyperturbulence. We develop a multilevel perspective of IS strategy for theorizing this causality, an...
-
作者:Goode, Sigi; Hoehle, Hartmut; Venkatesh, Viswanath; Brown, Susan A.
作者单位:Australian National University; University of Arkansas System; University of Arkansas Fayetteville; University of Arizona
摘要:Drawing on expectation confirmation research, we develop hypotheses regarding the effect of compensation on key customer outcomes following a major data breach and consequent service recovery effort. Data were collected in a longitudinal field study of Sony customers during their data breach in 2011. A total of 144 customers participated in the two-phase data collection that began when the breach was announced and concluded after reparations were made. Using polynomial modeling and response su...
-
作者:Bapna, Ravi; Qiu, Liangfei; Rice, Sarah
作者单位:University of Minnesota System; University of Minnesota Twin Cities; State University System of Florida; University of Florida; Texas A&M University System; Texas A&M University College Station; Mays Business School
摘要:The growing importance of online social networks provides fertile ground for researchers seeking to gain a deeper understanding of fundamental constructs of human behavior, such as trust and forgiveness, and their linkage to social ties. Through a field experiment that uses data from the Facebook API to measure social ties that connect our subjects, we separate forward-looking instrumental trust from static intrinsic trust and show that the level of instrumental trust and forgiveness, and the ...
-
作者:Benaroch, Michel; Chernobai, Anna
作者单位:Syracuse University; Syracuse University
摘要:This paper presents an empirical study of changes that firms implement in their board-level IT governance (ITG) upon experiencing operational IT failures. Consistent with the separation of oversight from management decisions, board-level ITG is responsible for monitoring managerial IT decisions and policies for controlling IT resources. We expect that operational IT failures indicating inadequacies in board monitoring of controls over IT resources would result in a negative stock market reacti...
-
作者:Zhang, Xiaojun
作者单位:Hong Kong University of Science & Technology
摘要:This paper seeks to develop a better understanding of job performance in the context of a knowledge management system (KMS) implementation. This work adopts the context theorizing approach that informs the conceptualization of KMS use and identification of contingency factors. Specifically, the literature on rich system use is adapted to develop the construct in the context of a KMS. The literature related to task, system, user, and leadership is also drawn upon to identify four contingency-fa...