-
作者:Majchrzak, Ann
作者单位:University of Southern California
-
作者:Johnson, Norman A.; Cooper, Randolph B.
作者单位:University of Houston System; University of Houston
摘要:Negotiation is increasingly being conducted over computer media, such as e-mail and instant messaging, because of the potential for time savings and monetary benefits. However, these media can affect negotiators' behaviors as they engage in what is called concession making, which is a process by which they make offers that yield benefits to their opponents. In this paper, we focus on how and why conducting negotiations via computer media can affect this process, especially when negotiators hav...
-
作者:Liang, Huigang; Xue, Yajiong
作者单位:University of North Carolina; East Carolina University
摘要:This paper describes the development of the technology threat avoidance theory (TTAT), which explains individual IT users' behavior of avoiding the threat of malicious information technologies. We articulate that avoidance and adoption are two qualitatively different phenomena and contend that technology acceptance theories provide a valuable, but incomplete, understanding of users' IT threat avoidance behavior. Drawing from cybernetic theory and coping theory, TTAT delineates the avoidance be...
-
作者:Duan, Wenjing; Gu, Bin; Whinston, Andrew B.
作者单位:George Washington University; University of Texas System; University of Texas Austin
摘要:Online users often need to make adoption decisions without accurate information about the product values. An informational cascade occurs when it is optimal for an online user, having observed others' actions, to follow the adoption decision of the preceding individual without regard to his own information. Informational cascades are often rational for individual decision making; however, it may lead to adoption of inferior products. With easy availability of information about other users' cho...
-
作者:Kane, Gerald C.; Fichman, Robert G.
作者单位:Boston College
摘要:This paper argues that Web 2.0 tools, specifically wikis, have begun to influence business and knowledge sharing practices in many organizations. Information Systems researchers have spent considerable time exploring the impact and implications of these tools in organizations, but those same researchers have not spent sufficient time considering whether and how these new technologies may provide opportunities for us to reform our core practices of research, review, and teaching. To this end, t...
-
作者:Qureshi, Israr; Compeau, Deborah
作者单位:Hong Kong Polytechnic University; Western University (University of Western Ontario); University Western Ontario Hospital
摘要:Multigroup or between-group analyses are common in the information systems literature. The ability to detect the presence or absence of between-group differences and accurately estimate the strength of moderating effects is important in studies that attempt to show contingent effects. In the past, IS scholars have used a variety of approaches to examine these effects, with the partial least squares (PLS) pooled significance test for multigroup becoming the most common (e.g., Ahuja and Thatcher...
-
作者:Grover, Varun; Straub, Detmar; Galluch, Pamela
作者单位:Clemson University; University System of Georgia; Georgia State University
-
作者:Te'eni, Dov
作者单位:Tel Aviv University
-
作者:Wetzels, Martin; Odekerken-Schroder, Gaby; van Oppen, Claudia
作者单位:Maastricht University
摘要:In this paper, the authors show that PLS path modeling can be used to assess a hierarchical construct model. They provide guidelines outlining four key steps to construct a hierarchical construct model using PLS path modeling. This approach is illustrated empirically using a reflective, fourth order latent variable model of online experiential value in the context of online book and CD retailing. Moreover, the guidelines for the use of PLS path modeling to estimate parameters in a hierarchical...
-
作者:Kim, Sung S.; Son, Jai-Yeol
作者单位:University of Wisconsin System; University of Wisconsin Madison; Yonsei University
摘要:Sustained website traffic through consumers' patronage at the post-adoption stages is known as a key to the survival of an online service provider. Although a firm's survival depends much on repeated use, whether or not a firm survives is also influenced by a variety of other behavioral outcomes that include, but are not limited to, word-of-mouth, willingness to pay, and inattentiveness to alternatives. Whereas post-adoption research has recently paid attention to repeated use, the information...