-
作者:Feng, Yue (Katherine); Claggett, Jennifer L.; Karahanna, Elena; Tam, Kar Yan
作者单位:Hong Kong Polytechnic University; Wake Forest University; University System of Georgia; University of Georgia; Hong Kong University of Science & Technology
摘要:A herding cue is a lean information signal that an individual receives about the aggregate number of others who have engaged in a behavior that may result in herd behavior. Given the ease with which they can be leveraged as implementation interventions or design features on online sites, herding cues hold the promise to provide a means to influence adoption behaviors. Yet, little attention has been devoted in the IS adoption literature to understanding the effects of herding cues. Given that h...
-
作者:Haag, Steffi; Eckhardt, Andreas; Venkatesh, Viswanath
作者单位:Heinrich Heine University Dusseldorf; University of Erlangen Nuremberg; University of Innsbruck; Virginia Polytechnic Institute & State University
摘要:Novel information technologies (ITs), such as mobile devices and third-party cloud services, offer users an increasing variety of action possibilities, i.e., affordances. Organizational IT policies, however, often specify their actualization-i.e., turning those affordances into action-as undesired. Organizations face the challenge that to reach their goals, employees still frequently take advantage of these affordances by using undesired ITs and thereby deviate from IT policies. Although prior...
-
作者:Amo, Laura C.; Grijalva, Emily; Herath, Tejaswini; Lemoine, G. James; Rao, H. Raghav
作者单位:State University of New York (SUNY) System; University at Buffalo, SUNY; State University of New York (SUNY) System; University at Buffalo, SUNY; Brock University; University of Texas System; University of Texas at San Antonio
摘要:Entitlement has been identified as a potentially valuable employee characteristic in the prediction of computer abuse but has not been studied systematically in the IS domain. We introduce the construct of technological entitlement as the persistent sense of being more deserving of technological resources, uses, and privileges compared to other employees. Adapting a model of general entitlement to the work technology context, we theorize that technological entitlement predicts computer abuse a...
-
作者:He, Wei; Hsieh, J. J. Po-An; Schroeder, Andreas; Fang, Yulin
作者单位:Texas Tech University System; Texas Tech University; University System of Georgia; Georgia State University; Aston University; University of Hong Kong
摘要:Contemporary IT project teams demand that individual members generate and implement novel ideas in response to the dynamic changes in IT and business requirements. Firms rely on multidisciplinary, geographically distributed IT project teams to gather the necessary talent, regardless of their locations, for developing novel IT artifacts. In this team context, individuals are expected to leverage dissimilar others??? expertise for creating ideas during idea generation (IG) and then implement the...
-
作者:Samtani, Sagar; Chai, Yidong; Chen, Hsinchun
作者单位:Indiana University System; Indiana University Bloomington; Hefei University of Technology; University of Arizona
摘要:Black hat hackers use malicious exploits to circumvent security controls and take advantage of system vulnerabilities worldwide, costing the global economy over $450 billion annually. While many organizations are increasingly turning to cyber threat intelligence (CTI) to help prioritize their vulnerabilities, extant CTI processes are often criticized as being reactive to known exploits. One promising data source that can help develop proactive CTI is the vast and ever-evolving Dark Web. In thi...
-
作者:Lee, Kyunghee; Han, Kunsoo; Animesh, Animesh; Pinsonneault, Alain
作者单位:Wayne State University; McGill University
摘要:Although researchers have examined the role of dyadic dynamics (i.e., interactions between the acquirer and the target firm) in the success of acquisitions, little attention has been devoted to the role of information technology (IT). In this study, we extend this literature by examining how pre-acquisition IT distance (i.e., the difference between the enterprise IT systems of the two firms that reflects the system incompatibility and resulting costs of system integration) affects the acquirer...
-
作者:Ebrahimi, Mohammadreza; Chai, Yidong; Samtani, Sagar; Chen, Hsinchun
作者单位:State University System of Florida; University of South Florida; Hefei University of Technology; Indiana University System; Indiana University Bloomington; University of Arizona
摘要:International dark web platforms operating within multiple geopolitical regions and languages host a myriad of hacker assets such as malware, hacking tools, hacking tutorials, and malicious source code. Cybersecurity analytics organizations employ machine learning models trained on human-labeled data to automatically detect these assets and bolster their situational awareness. However, the lack of human-labeled training data is prohibitive when analyzing foreign-language dark web content. In t...
-
作者:Zhou, Junjie; Kishore, Rajiv; Amo, Laura; Ye, Cheng
作者单位:Shantou University; Nevada System of Higher Education (NSHE); University of Nevada Las Vegas; State University of New York (SUNY) System; University at Buffalo, SUNY
摘要:Online markets for mental health care (OMMH) allow clients to connect remotely with counselors to receive psychological therapy. Rooted in signaling theory and in the specific context of an OMMH, we theorize relative credibility of signals as the boundary condition that determines whether the demonstration signal of responsiveness to client questions substitutes or complements the two description signals of professional qualifications and counseling style in predicting market demand for counse...
-
作者:Hoehle, Hartmut; Venkatesh, Viswanath; Brown, Susan A.; Tepper, Bennett J.; Kude, Thomas
作者单位:University of Mannheim; Virginia Polytechnic Institute & State University; University of Arizona; University System of Ohio; Ohio State University; ESSEC Business School
摘要:Data breaches are a major threat to organizations from both financial and customer relations perspectives. We developed a nomological network linking post-breach compensation strategies to key outcomes, namely continued shopping intentions, positive word-of-mouth, and online complaining, with the effects being mediated by customers' justice perceptions. We conducted a longitudinal field study investigating Target's data breach in 2013 that affected more than 110 million customers. We examined ...
-
作者:Kane, Gerald C.; Young, Amber G.; Majchrzak, Ann; Ransbotham, Sam
作者单位:Boston College; University of Arkansas System; University of Arkansas Fayetteville; University of Southern California
摘要:Widespread use of machine learning (ML) systems could result in an oppressive future of ubiquitous monitoring and behavior control that, for dialogic purposes, we call Informania. This dystopian future results from ML systems' inherent design based on training data rather than built with code. To avoid this oppressive future, we develop the concept of an emancipatory assistant (EA), an ML system that engages with human users to help them understand and enact emancipatory outcomes amidst the op...