-
作者:Pick, James B.; Azari, Rasool
作者单位:University Redlands; University of California System; University of California Irvine
摘要:This exploratory paper presents a conceptual model of the factors of governmental support and openness, business and technology investment, and socioeconomic level that are posited to influence technological utilization. The conceptual model and conjectures are developed inductively based on logic and prior research about the relationship among variables related to the factors. Structural equation modeling (SEM) is applied to operationalize and test the model. The SEM analysis tests five point...
-
作者:Lowry, Paul Benjamin; Cao, Jinwei; Everard, Andrea
作者单位:Brigham Young University; University of Delaware
摘要:Social computing technologies typically have multiple features that allow users to reveal their personal information to other users. Such self-disclosure (SD) behavior is generally considered positive and beneficial in interpersonal communication and relationships. Using a newly proposed model based on social exchange theory, this paper investigates and empirically validates the relationships between SD technology use and culture. In particular, we explore the effects of culture on information...
-
作者:Granados, Nelson F.; Kauffman, Robert J.; Lai, Hsiangchu; Lin, Huang-Chi
作者单位:Pepperdine University; New York University; University of Rochester; University of Minnesota System; University of Minnesota Twin Cities; Arizona State University; Arizona State University-Tempe; National Sun Yat Sen University
摘要:Digital intermediaries and Internet search technologies have commoditized many products, resulting in intense price competition and channel conflict. Firms use decommoditization strategies to regain control over distribution channels, as well as to implement resonance marketing and hyperdifferentiation, which allows them to improve margins through differentiation. We test two hypotheses: the decommoditization hypothesis and the resonance marketing hypothesis. We use data from an airline with a...
-
作者:Elie-Dit-Cosaque, Christophe; Pallud, Jesie; Kalika, Michel
作者单位:Universite PSL; Universite Paris-Dauphine
摘要:Organizations are increasingly concerned about ensuring that workers have sufficient sense of control over the information technology (IT) that they use. However, we know little about the antecedents of the end user's perceived behavioral control (PBC) with respect to IT. Drawing on Kurt Lewin's field theory, the present study responds to this concern by formulating and testing a model whereby individual, contextual, and social forces influence PBC directly and indirectly via computer anxiety....
-
作者:Zwass, Vladimir
-
作者:Jensen, Matthew L.; Lowry, Paul Benjamin; Jenkins, Jeffrey L.
作者单位:University of Oklahoma System; University of Oklahoma - Norman; City University of Hong Kong; University of Arizona; National Science Foundation (NSF)
摘要:Historically, inaccurate credibility assessments have resulted in tremendous costs to businesses and to society. Recent research offers unobtrusive credibility assessment aids as a solution; however, the accuracy of these decision aids is inadequate, and users often resist accepting the aids' recommendations. We follow the principles of signal detection theory to improve the accuracy of recommendations in computer-aided credibility assessment by combining automated and participatory decision s...
-
作者:Suh, Ayoung; Shin, Kyung-Shik; Ahuja, Manju; Kim, Min Soo
作者单位:Ewha Womans University; University of Louisville; Indiana University System; Indiana University Bloomington; State University System of Florida; Florida State University; Pennsylvania Commonwealth System of Higher Education (PCSHE); Pennsylvania State University; Pennsylvania State University - University Park; Hanyang University
摘要:We examine how the virtuality of work context influences individuals' social networks within and across work groups. Given this purpose, we develop a multilevel research framework that explores the effects of different levels of virtuality on one's intra-group tie strength and extra-group network range based on the computer-mediated communication theory, the proximity theory, and the social network theory. The results of the hierarchical linear modeling indicate that the individual-level virtu...
-
作者:Garg, Rajiv; Smith, Michael D.; Telang, Rahul
作者单位:Carnegie Mellon University
摘要:Measuring peer influence in social networks is an important business and policy question that has become increasingly salient with the development of globally interconnected information and communication technology networks. However, in spite of the new data sources available today, researchers still face many of the same measurement challenges that have been present in the literature for over four decades: homophily, reflection and selection problems, identifying the source of influence, and ...
-
作者:Han, Kuns; Chang, Young Bong; Hahn, Jungpil
作者单位:McGill University; Ulsan National Institute of Science & Technology (UNIST); Purdue University System; Purdue University
摘要:We study interindustry information technology (IT) spillover wherein IT investments made by supplier industries increase the productivity of downstream industries. Using data from U.S. manufacturing industries, we find that industries receive significant IT spillover benefits in terms of total factor productivity growth through economic transactions with their respective supplier industries. More importantly, we find that two characteristics of downstream industries, namely, IT intensity and c...
-
作者:Guo, Ken H.; Yuan, Yufei; Archer, Norman P.; Connelly, Catherine E.
作者单位:Western New England University; McMaster University
摘要:End users are said to be the weakest link in information systems (IS) security management in the workplace. They often knowingly engage in certain insecure uses of IS and violate security policies without malicious intentions. Few studies, however, have examined end user motivation to engage in such behavior. To fill this research gap, in the present study we propose and test empirically a nonmalicious security violation (NMSV) model with data from a survey of end users at work. The results su...