-
作者:Dong, Shutao; Xu, Sean Xin; Zhu, Kevin Xiaoguo
作者单位:Renmin University of China; Hong Kong University of Science & Technology; University of California System; University of California San Diego
摘要:In this study, we seek to better understand the value of information technology (IT) in supply chain contexts. Grounded in the resource-based theory in conjunction with transaction cost economics, we develop a conceptual model that links three IT-related resources (backend integration, managerial skills, and partner support) to firm performance improvement. The model differs from previous studies by proposing a moderating effect of competition on the resource-performance relationships. Using d...
-
作者:Tiwana, Amrit
作者单位:Iowa State University
摘要:This study addresses the theoretically underexplored question of how fit between project governance configurations, and the knowledge of specialized information technology (IT) and client departments, influences information systems development (ISD) performance. It conceptualizes project governance configurations using two classes of project decisions rights-decision control rights and decision management rights. The paper then develops a middle-range theory of how governance-knowledge fit sha...
-
作者:Agerfalk, Par J.; Fitzgerald, Brian; Slaughter, Sandra A.
作者单位:Uppsala University; University of Limerick; University System of Georgia; Georgia Institute of Technology
-
作者:Mittal, Neeraj; Nault, Barrie R.
作者单位:University of Calgary
摘要:M any studies measure the value of information technology (IT) by focusing on how much value is added rather than on the mechanisms that drive value addition. We argue that value from IT arises not only directly through changes in the factor input mix but also indirectly through IT-enabled augmentation of non-IT inputs and changes in the underlying production technology. We develop an augmented form of the Cobb-Douglas production function to separate and measure different productivity-enhancin...
-
作者:Ransbotham, Sam; Mitra, Sabyasachi
作者单位:Boston College; University System of Georgia; Georgia Institute of Technology
摘要:No longer the exclusive domain of technology experts, information security is now a management issue. Through a grounded approach using interviews, observations, and secondary data, we advance a model of the information security compromise process from the perspective of the attacked organization. We distinguish between deliberate and opportunistic paths of compromise through the Internet, labeled choice and chance, and include the role of countermeasures, the Internet presence of the firm, an...
-
作者:Bampo, Mauro; Ewing, Michael T.; Mather, Dineli R.; Stewart, David; Wallace, Mark
作者单位:Monash University; Monash University; Deakin University
摘要:Viral marketing is a form of peer-to-peer communication in which individuals are encouraged to pass on promotional messages within their social networks. Conventional wisdom holds that the viral marketing process is both random and unmanageable. In this paper, we deconstruct the process and investigate the formation of the activated digital network as distinct from the underlying social network. We then consider the impact of the social structure of digital networks (random, scale free, and sm...
-
作者:Ragu-Nathan, T. S.; Tarafdar, Monideepa; Ragu-Nathan, Bhanu S.; Tu, Qiang
作者单位:University System of Ohio; University of Toledo; Rochester Institute of Technology
摘要:The research reported in this paper studies the phenomenon of technostress, that is, stress experienced by end users of Information and Communication Technologies (ICTs), and examines its influence on their job satisfaction, commitment to the organization, and intention to stay. Drawing from the Transaction-Based Model of stress and prior research on the effects of ICTs on end users, we first conceptually build a nomological net for technostress to understand the influence of technostress on t...
-
作者:Rustagi, Sandeep; King, William R.; Kirsch, Laurie J.
作者单位:Capgemini; Pennsylvania Commonwealth System of Higher Education (PCSHE); University of Pittsburgh
摘要:Client control over the vendor has been identified as a critical factor in successfully managing information technology outsourcing relationships. Though prior studies have suggested that how much control is exercised has significant rami. cations for individuals and firms, relatively few studies have operationalized and studied this important concept. In this study, we de. ne the amount of formal control as the variety of mechanisms used by a client to exercise control over a vendor and the e...
-
作者:Hinz, Oliver; Spann, Martin
作者单位:Goethe University Frankfurt; University of Passau
摘要:The interactive nature of the Internet promotes collaborative business models (e. g., auctions) and facilitates information-sharing via social networks. In Internet auctions, an important design option for sellers is the setting of a secret reserve price that has to be met by a buyer's bid for a successful purchase. Bidders have strong incentives to learn more about the secret reserve price in these auctions, thereby relying on their own network of friends or digital networks of users with sim...
-
作者:Forman, Chris; Ghose, Anindya; Wiesenfeld, Batia
作者单位:University System of Georgia; Georgia Institute of Technology; New York University
摘要:Consumer-generated product reviews have proliferated online, driven by the notion that consumers' decision to purchase or not purchase a product is based on the positive or negative information about that product they obtain from fellow consumers. Using research on information processing as a foundation, we suggest that in the context of an online community, reviewer disclosure of identity-descriptive information is used by consumers to supplement or replace product information when making pur...