-
作者:Benaroch, Michel; Lichtenstein, Yossi; Fink, Lior
作者单位:Syracuse University; University of East Anglia; Ben-Gurion University of the Negev
摘要:This paper examines multiple contract design choices in the context of transaction and relational attributes and consequent ex ante and ex post transaction costs. It focuses on two understudied themes in the IT outsourcing literature. First, while the literature is predominantly concerned with opportunism and consequent ex post hazard costs that contracts can safeguard against, parties to a contract also economize on ex ante transaction costs by their choice of contract type and contract exten...
-
作者:Nevo, Saggi; Nevo, Dorit; Pinsonneault, Alain
作者单位:State University of New York (SUNY) System; University at Albany, SUNY; Rensselaer Polytechnic Institute; McGill University
摘要:Our knowledge of how users reinvent information technologies (IT) in ways that depart from their intended purposes to achieve new goals is relatively limited. Drawing on a human agency theory that situates actors in the flow of time, this paper develops a theory of IT reinvention. It identifies the key subprocesses of IT reinvention, describes two patterns of reinvention (performance-oriented and mastery-oriented), and explains how the present and the past influence the ambiguities, demands, a...
-
作者:Goh, Jie Mein; Gao, Guodong (Gordon); Agarwal, Ritu
作者单位:Simon Fraser University; University System of Maryland; University of Maryland College Park
摘要:The striking growth of online communities in recent years has sparked significant interest in understanding and quantifying benefits of participation. While research has begun to document the economic outcomes associated with online communities, quantifying the social value created in these collectives has been largely overlooked. This study proposes that online health communities create social value by addressing rural-urban health disparities via improved health capabilities. Using a unique ...
-
作者:Mithas, Sunil; Rust, Roland T.
作者单位:University System of Maryland; University of Maryland College Park
摘要:In this paper, we develop conjectures for understanding how information technology (IT) strategy and IT investments jointly influence profitability and the market value of the firm. We view IT strategy as an expression of the dominant strategic objective that the firm chooses to emphasize, which can be revenue expansion, cost reduction, or a dual emphasis in which both goals are pursued. Using data from more than 300 firms in the United States, we find that at the mean value of IT investments,...
-
作者:Raghunathan, Srinivasan; Sarkar, Sumit
作者单位:University of Texas System; University of Texas Dallas
摘要:The emerging field of data analytics and the increasing importance of data and information in decision making has created a large market for buying and selling information and information-related services. In this market, for some types of information products, it is common for a consumer to purchase the same type of information product from multiple sources. In other situations, a consumer may buy different types of information products from different sources and synthesize the information. O...
-
作者:Saunders, Adam; Brynjolfsson, Erik
作者单位:University of British Columbia; Massachusetts Institute of Technology (MIT)
摘要:In this article, we assess the value of information technology related intangible assets and then use data on business practices and management capabilities to understand how this value is distributed across firms. Using a panel of 127 firms over the period 2003-2006, we replicate and extend the finding from Brynjolfsson, Hitt, and Yang (2002) that $1 of computer hardware is correlated with more than $10 of market value. We account for the missing $9 by broadening the definition of IT to inclu...
-
作者:Kim, Seung Hyun; Mukhopadhyay, Tridas; Kraut, Robert E.
作者单位:Yonsei University; Carnegie Mellon University; Qatar Foundation (QF); Carnegie Mellon University in Qatar
摘要:Despite a general consensus that use of information technology (IT) is an important link between IT investments and performance, the extant literature provides only a limited explanation as to when the use of IT lifts performance. We posit that the impact of knowledge management systems (KMS) usage is contingent on users' alternative sources of knowledge as well as their specific task environments. We investigate under what conditions repository KMS use leads to higher performance outcomes in ...
-
作者:Im, Il; Jun, Jongkun; Oh, Wonseok; Jeong, Seok-Oh
作者单位:Yonsei University; Hankuk University Foreign Studies; Korea Advanced Institute of Science & Technology (KAIST); Hankuk University Foreign Studies
摘要:Using a database of 11,001 unique sponsored search keywords, we investigate the relationship between the characteristics of keywords oriented around deal-seeking and brand-seeking and consumer search behaviors and buying propensities. On the basis of the search depth versus search breadth framework, we hypothesize that deal-seeking keywords elicit a search of greater breadth, whereas brand-seeking keywords induce a search of greater depth. We also explore the moderating effect of product type ...
-
作者:Oh, Hyelim; Animesh, Animesh; Pinsonneault, Alain
作者单位:National University of Singapore; McGill University
摘要:Information goods providers such as print newspapers are experimenting with different pricing models for their online content. Despite research on the topic, it is still not clear how information pricing strategy influences word-of-mouth (WOM) via social media, which has become a dominant channel for raising awareness about a newspaper's articles and attracting new visitors to its website. Using The New York Times' paywall rollout as a natural experiment, our study examines how the implementat...
-
作者:Chen, Yan; Zahedi, Fatemeh Mariam
作者单位:Auburn University System; Auburn University; Auburn University Montgomery; University of Wisconsin System; University of Wisconsin Milwaukee
摘要:Little is known about the context sensitivity of users' online security perceptions and behaviors to national and individual attributes, and there is inadequate research about the spectrum of users' behaviors in dealing with online security threats. In addressing this gap, this paper draws on two complementary theoretical bases: (1) the contextualization of the protection motivation theory (PMT) to online security behavior and (2) a pol-ycontextual lens for the cross-national comparison of use...