Department of Business Information Technology
Permanent URI for this community
Browse
Browsing Department of Business Information Technology by Title
Now showing 1 - 20 of 105
Results Per Page
Sort Options
- Achieving entrepreneurial growth despite resource and capability constraints: the role of service intermediariesMirkovski, Kristijan; von Briel, Frederik; Lowry, Paul Benjamin; Liu, Libo (Springer, 2023-05)Entrepreneurial growth—firm growth via the introduction of new market offerings or expansion into new markets—is an important topic for entrepreneurship scholars and practitioners alike. Any firm that wants to exploit opportunities for entrepreneurial growth needs resources and capabilities that it can use to develop new market offerings or to enter new markets. However, many firms face resource and capability constraints, and research has shown that strategic partnerships can provide external pathways for firms to exploit growth opportunities despite their resource and capability constraints. All the extant external growth pathways have in common that they require firms to have some resources and capabilities, which are valuable for partners and can be jointly appropriated with them. An alternative pathway for firms to leverage external resources and capabilities—especially knowledge-based ones—that has received little attention in the literature on growth is short-term contracting of professional service firms such as accounting firms, marketing agencies, or R&D consultancies. Hence, we investigate the role of service intermediaries—professional service firms that facilitate the exchange of services among other firms—as external managers who support their clients to access and leverage a broad range of required resources and capabilities from third parties. We conducted a nested multi-case study of two service intermediaries that enabled two small, wineries from North Macedonia to successfully seize entrepreneurial growth opportunities in markets abroad despite their resource and capability deficits. We identify seven support mechanisms—need articulating, social embedding, linking, governing, clarifying, renegotiating, and mediating—through which the service intermediaries orchestrated complementary external resources and capabilities on behalf of the wineries, thereby enabling the two firms to successfully develop two new product lines for and enter two new geographic markets each. We also identify process differences depending on the stage of the opportunity evaluation process, target market characteristics, and external stakeholder involvement for which we postulate three propositions about the influence of mechanisms on the growth opportunity development. Our study offers novel insights and makes a contribution to research on entrepreneurial growth and resource orchestration.
- Adaptation to Information Technology: A Holistic Nomological Network from Implementation to Job OutcomesBala, Hillol; Venkatesh, Viswanath (INFORMS, 2016-01-01)Information technology (IT) implementation is a major organizational change event that substantially disrupts an employee's work environment. We develop a model of technology adaptation behaviors that employees perform to cope with a new IT that causes such disruptions. Our model posits technology adaptation behaviors as a key linking mechanism between IT implementation and employee job outcomes, thus offering a holistic nomological network of technology adaptation behaviors. Two field studies conducted over a period of six months, with four waves of data collection each, in two organizations (N D211 and N D181) implementing two different ITs, supported the model. We found that employees performed four different technology adaptation behaviors-exploration-to-innovate, exploitation, exploration-to-revert, and avoidance-based on whether they appraised an IT as an opportunity or a threat and whether they had perceptions of control over an IT. Employees' experiential engagements (i.e., user participation and training effectiveness) and psychological engagements (i.e., user involvement and management support) during the implementation jointly determined their appraisal of an IT. Finally, we found that technology adaptation behaviors influenced changes in two key job outcomes, job performance and job satisfaction.
- The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Security-Based Precaution TakingBurns, A. J.; Roberts, Tom L.; Posey, Clay; Lowry, Paul Benjamin (Institute for Operations Research and the Management Sciences (INFORMS), 2019-12)Protecting organizational information is a top priority for most firms. This reality, coupled with the fact that organizational insiders control much of their organizations’ valuable information, has led both researchers and practitioners to acknowledge the importance of insiders’ behavior for information security (InfoSec). Until recently, researchers have employed only a few theories to understand these influences, and this has generated calls for a broadened theoretical repertoire. Given this opportunity, we incorporate the framework of emotions developed in the information systems (IS) discipline by Beaudry and Pinsonneault (2010) and add the broaden-and-build theory (BBT) to understand the influence of discrete positive and negative emotions on insiders’ precaution-taking activities. Our findings demonstrate that the relationship between both positive and negative emotions and precaution taking is mediated by insiders’ (1) psychological capital (PsyCap), a higher-order, work-related construct of positive psychological resource capabilities, and (2) psychological distancing, a coping mechanism characterized by insiders’ attempts to detach themselves psychologically from a situation. By considering these factors, our model explains 32 percent of the variance in insiders’ precaution taking in organizations. Researchers and practitioners can use these findings to develop effective insider InfoSec training, including emotional appeals that increase insiders’ precaution taking.
- Adoption and use of AI tools: a research agenda grounded in UTAUTVenkatesh, Viswanath (Springer, 2021-01-19)This paper is motivated by the widespread availability of AI tools, whose adoption and consequent benefits are still not well understood. As a first step, some critical issues that relate to AI tools in general, humans in the context of AI tools, and AI tools in the context of operations management are identified. A discussion of how these issues could hinder employee adoption and use of AI tools is presented. Building on this discussion, the unified theory of acceptance and use of technology is used as a theoretical basis to propose individual characteristics, technology characteristics, environmental characteristics and interventions as viable research directions that could not only contribute to the adoption literature, particularly as it relates to AI tools, but also, if pursued, such research could help organizations positively influence the adoption of AI tools.
- The antecedents of employees’ proactive information security behavior: The perspective of proactive motivationXu, Feng; Hsu, Carol; Wang, David; Lowry, Paul Benjamin (2023)Organizational information security (ISec) protection is undergoing a turbulent shift in the workplace environment. In an environment of ever-increasing risks of insider threats and external cyberattacks, individual employees are often expected to take the initiative to solve organizational security problems. This study therefore focuses on employees’ proactive information security behaviors (ISBs)—behaviors that are self-initiated, change-oriented, and future-focused—and the motivations that compel employees to protect organizational assets. We ground our study in Parker et al.’s (2010) proactive motivation theory (ProMT) and develop an integrated multilevel model to examine the respective effects of proactive motivational states, that is, can-do, reason-to, and energized-to motivations, on employees’ proactive ISBs. We also explore the roles of individual differences and contextual factors—namely, proactive personality and supervisory ISec support—and their influences on proactive motivational states. Data were collected from 210 employees situated in 55 departments distributed among multiple organizations located in China. The results show that supervisory ISec support positively influences employees’ proactive motivational states and thereby boosts employees’ proactive ISBs. Proactive personality negatively moderates the effect of supervisory ISec support on flexible security role orientation (reason-to motivation). By identifying the antecedents of employees’ proactive ISBs, we make key theoretical contributions to ISec research and valuable practical contributions to organizational ISec management.
- Applying Best Supply Chain Practices to Humanitarian ReliefRussell, Roberta S.; Hiller, Janine S. (Penn State, 2015-05)With the growth in length and breadth of extended supply chains, more companies are employing risk management techniques and resilience planning to deal with burgeoning and costly supply chain disruptions. As companies can learn from humanitarian groups, so can humanitarian groups learn from industry how to respond, recover, and prepare for these disruptive events. This paper looks at industry leaders in supply chain risk management and explores how humanitarian supply chains can learn from industry best practices.
- Asymmetries in Potential for Partisan GerrymanderingGoedert, Nicholas; Hildebrand, Robert; Travis, Laurel; Pierson, Matthew (2024)This paper investigates the effectiveness of potential partisan gerrymandering of the U.S. House of Representatives across a range of states. We use a heuristic algorithm to generate district maps that optimize for multiple objectives, including compactness, partisan benefit, and competitiveness. While partisan gerrymandering is highly effective for both sides, we find that the majority of states are moderately biased toward Republicans when optimized for either compactness or partisan benefit, meaning that Republican gerrymanders have the potential to be more effective. However, we also find that more densely populated and more heavily Hispanic states show less Republican bias or even Democratic bias. Additionally, we find that in almost all cases we can generate reasonably compact maps with very little sacrifice to partisan objectives through a mixed objective function. This suggests that there is a strong potential for stealth partisan gerrymanders that are both compact and beneficial to one party. Nationwide, partisan gerrymandering is capable of swinging over one hundred seats in the U.S. House, even when compact districts are simultaneously sought.
- Balancing the commitment to sustainability and the protection of personal privacy: Consumer adoption of sustainable smart-connected carsChoi, Daaen Daniel; Lowry, Paul Benjamin (2023-10)Sustainable, smart connected cars (SSCCs) are one of the representative sustainable products that leverage smart technologies (e.g., the internet of things, artificial intelligence, big data). Although many studies have investigated consumers’ purchase decisions regarding sustainable products, little research has addressed SSCCs and the relationship between privacy, disclosure intentions, and purchase intentions in SSCCs. These relationships are important because the use of smart technology products requires large volumes of consumers’ personal information, which can lead to severe privacy issues when adopting SSCCs. Accordingly, consumers’ preferences for features of sustainable products could conflict with their privacy concerns when they disclose personal information. Thus, we investigate the relationship between the several benefits of SSCCs and privacy-related decisions when purchasing SSCCs. We propose an extended privacy trade-off model based on three critical assumptions: two types of privacy trade-offs, bidirectional privacy reduction, and anchoring effects. We also investigate the effects of government subsidies for purchasing SSCCs regarding the relationship between governments, companies, and consumers. To validate our model, we test the effects of interaction between privacy concerns and the benefits of SSCCs on disclosure intentions and purchase intentions. Our repeated tests for the various benefits of SSCCs demonstrate the robustness of the model. Our results indicate that when consumers consider purchasing SSCCs, sustainability plays the role of the common good in trading for privacy concerns. In addition, government subsidies to encourage companies’ sustainable products increase disclosure intentions and purchase intentions. We conclude that the status of sustainability as a common goal among governments, companies, and consumers represents an opportunity to balance the privacy tensions in the sale and purchase of SSCCs.
- Baseline Word formatting styles for use in publishing at top information systems, management, and engineering journalsLowry, Paul Benjamin (2022-07-14)Basic guidelines on using Microsoft Word's formatting styles for use in publishing at top information systems, management, and engineering journals. Provides actual styles to work with.
- Being at the cutting edge of online shopping: Role of recommendations and discounts on privacy perceptionsVenkatesh, Viswanath; Hoehle, Hartmut; Aloysius, John A.; Nikkhah, Hamid Reza (Pergamon-Elsevier, 2021-08-01)Despite the explosion of selling online, customers continue to have privacy concerns about online purchases. To alleviate such concerns, shopping sites seek to employ interventions to encourage users to buy more online. Two common interventions used to promote online sales are: (1) recommendations that help customers choose the right product either based on historic purchase correlations or recommendations suggested by the retailer; and (2) discounts that increase the value of products. Building on privacy calculus, we theorize about how and why key, representative combinations of recommendations and discounts influence the effects of inhibitors and enablers on online purchase intention. Our research design incorporated recommendations coming from different sources for the recommendation (retailer and other customers’ preferences) product relatedness (related products with historic purchases correlated to the focal product and unrelated products with no historic purchase correlation to the focal product) and two types of discounts (regular and bundle). Participants completed a browsing task in a controlled online shopping environment and completed a survey (n = 496). We found mixed results of moderating effects of recommendations and product relatedness on the effect of inhibitors and enablers on purchase intention. Although recommendations did not enhance the effects of inhibitors, they did enhance the effects of enablers on online purchase intention. We also found that product relatedness did not enhance the effect of privacy enablers on online purchase intentions. The results also showed that discounts enhance the effects of enablers, and that discounts can counteract the moderating effect of recommendations on the relationship between inhibitors and purchase intention under certain circumstances. We discuss theoretical and practical implications.
- Blockchain, adoption, and financial inclusion in India: Research opportunitiesSchuetz, Sebastian; Venkatesh, Viswanath (Elsevier, 2020-06-01)The economic development of rural India requires connecting remote villages to local and global supply chains. Yet, high rates of financial exclusion inhibit rural Indians from participating in these supply networks. We review the literature on financial inclusion, adoption, and blockchain in India, and posit that to resolve financial exclusion, the four challenges of geographical access, high cost, inappropriate banking products, and financial illiteracy need to be overcome. Next, we argue that blockchain technologies hold the potential to overcome most of these challenges. However, for blockchain technologies to become the cornerstone of financial inclusion initiatives, an understanding of technology adoption in India is needed. To guide the development of such understanding, we develop a research agenda on the antecedents of adoption, adoption patterns, and outcomes of adoption. Answering these research questions will lead to a nuanced understanding of adoption of blockchain-based technologies in rural India. The practical contribution of this paper is the discussion of how blockchain can alleviate the issue of financial exclusion in rural India, thereby providing a basis for a solution that could connect rural Indians to global supply chain networks. The theoretical contribution lies in the identification of knowledge gaps that should be answered to achieve financial inclusion of rural Indians.
- Children's Internet Addiction, Family-to-Work Conflict, and Job Outcomes: A Study of Parent-Child DyadsVenkatesh, Viswanath; Sykes, Tracy Ann; Chan, Frank K. Y.; Thong, James Y. L.; Hu, Paul Jen-Hwa (Society for Information Management, 2019-09-01)This paper examines the role of parenting behaviors in influencing children’s Internet addiction and the consequences of children’s Internet addiction on parents’ job outcomes. First, we draw on attachment theory to theorize that five parenting behaviors (i.e., parental control, monitoring, unstructured time, dissuasion, and rationalization) affect children’s Internet addiction and their effects are moderated by the children’s views of parent–child attachment. Second, we draw on research on the work–family interface to theorize that children’s Internet addiction affects parents’ job outcomes (i.e., job satisfaction, organizational commitment, and work exhaustion) and the effects are mediated by family-to-work conflict. We tested our hypotheses using an integrated research approach that includes quantitative and qualitative data. We conducted an online survey to collect quantitative responses from 776 parent–child dyads. The results of our model showed that the effects of parenting behaviors on children’s Internet addiction, except for dissuasion, were moderated by the children’s views of parent–child attachment. Also, family-to-work conflict mediated the effects of children’s Internet addiction on parents’ job satisfaction, organizational commitment, and work exhaustion. We collected qualitative data via interviews from 50 parents to cross-validate the results from the quantitative study.
- Combating COVID-19 fake news on social media through fact checking: antecedents and consequencesSchuetz, Sebastian W.; Sykes, Tracy Ann; Venkatesh, Viswanath (Taylor & Francis, 2021-06-02)The onset of the COVID-19 pandemic was accompanied with a pandemic of fake news spreading over social media (SM). Fact checking might help combat fake news and a plethora of fact-checking platforms exist, yet few people actually use them. Moreover, whether fact checking is effective in preventing citizens from falling for fake news, particularly COVID-19 related, is unclear. Against this backdrop, we examine potential antecedents to fact checking that can be a target for interventions and establish that fact checking is actually effective for preventing the public from falling for harmful COVID-19 fake news. We use a representative U.S. sample collected in April of 2020 and find that awareness of fake news and patterns of active SM use (e.g., commenting on content instead of reading it) increases the fact checking of COVID-19 fake news, whereas SM homophily reduces fact checking and the effects of SM use as users are trapped in “echo chambers”. We also find that fact checking helps users identify accurate information on how to protect themselves against COVID-19 instead of false and often harmful claims propagated on SM. These findings highlight the importance of fact checking for combating COVID-19 fake news and help identify potential interventions.
- Combating Infant Mortality in Rural India: Evidence From a Field Study of eHealth Kiosk ImplementationsVenkatesh, Viswanath; Rai, Arun; Sykes, Tracy Ann; Aljafari, Ruba (Society for Information Management, 2016-06-01)The United Nations' Millennium Development Goals listed high infant mortality rates as a major problem in developing countries, especially in rural areas. Given the powerful information dissemination capabilities, information and communication technologies (ICTs) have been suggested as interventions to build infant care awareness and to modify healthcare behaviors. We examine how the use of one ICT intervention-specifically, eHealth kiosks disseminating authenticated and accessible medical information-can alleviate the problem of high infant mortality in rural India. We investigate how mothers' social networks affect their use of eHealth kiosks, seeking professional medical care for their infants and, ultimately, infant mortality. Drawing on the social epidemiology and social networks literatures, we focus on advice and hindrance from both strong and weak ties as the conduit of social influence on mothers' health-related behaviors for the care of their infants. Over a period of 7 years, we studied 4,620 infants across 10 villages where the eHealth kiosks were implemented along with support resources for proxy use. The results revealed that (1) eHealth kiosk use promotes seeking professional medical care and reduces infant mortality, (2) mothers are especially vulnerable to hindrance from both strong and weak ties as they choose to maintain the status quo of traditional infant healthcare practices (e.g., reliance on untrained personnel, superstitions, fatalism) in villages, and (3) advice from both strong and weak ties offers the potential to break down misplaced beliefs about infant healthcare practices and to develop literacy on seeking professional medical care. In contrast, in a comparative group of 10 neighboring villages, the reduction in infant mortality was not as pronounced and the effect of professional medical care in reducing infant mortality was lower. Our findings suggest that an ICT intervention can effectively address one of society's most important problems (i.e., infant mortality) even in parts of the world with limited resources and deep suspicion of technology and change. Overall, we believe such an ICT intervention will complement other investments being made, including the facilitation of use (proxy use) and provision of professional medical facilities to reduce infant mortality.
- Continuous Equality Knapsack with Probit-Style ObjectivesFravel, Jamie; Hildebrand, Robert; Travis, Laurel (2022-11-04)We study continuous, equality knapsack problems with uniform separable, non-convex objective functions that are continuous, strictly increasing, antisymmetric about a point, and have concave and convex regions. For example, this model captures a simple allocation problem with the goal of optimizing an expected value where the objective is a sum of cumulative distribution functions of identically distributed normal distributions (i.e., a sum of inverse probit functions). We prove structural results of this model under general assumptions and provide two algorithms for efficient optimization: (1) running in linear time and (2) running in a constant number of operations given preprocessing of the objective function.
- Corporate crisis management on social media: A morality violations perspectiveZheng, Bowen; Bi, Gongbing; Liu, Hefu; Lowry, Paul Benjamin (2020-07)Communication via a social network function enabled by social media has greatly empowered consumers' secondary crisis communication, as compared to a firm's crisis communication, and has thus changed corporate crisis management. This study aims to uncover consumers' decision process of engaging in secondary crisis communication in a social media context. Drawing on the social control perspective and impression management theory,this study examines the role of perceived morality violations and consumers' susceptibility to social influence in shaping consumers' secondary crisis communication in corporate crises. Moreover, leveraging cognitive dissonance theory, this study further examines the effects of corporate responses on the process of consumers' secondary crisis communication. A survey design with four scenarios was conducted to test a series of hypotheses relating to the decision process of secondary crisis communication. Our empirical results demonstrate that consumers' approach to secondary crisis communication on social media depends largely to the degree to which they perceive moral violations in the firms' crisis response. The findings also show that consumers tend to want to believe they are doing the "right thing" when considering secondary crisis communication and thus are afraid of being disliked by others for their purchasing decisions related to a firm in crisis. Such social conformance can result in a snowballing of negative word of mouth in product-harm crises cases. Findings contribute to the literature on social media crisis management and consumers' communication behavior on social media during product-harm crises.
- Cross-Country Determinants of Citizens’ E-Government Reuse Intention: Empirical Evidence from Kuwait and PolandMirkovski, Kristijan; Rouibah, Kamel; Lowry, Paul Benjamin; Paliszkiewicz, Joanna; Ganc, Marzena (2023)Purpose: Despite the major IT investments made by public institutions, the reuse of e-government services remains an issue as citizens hesitate to use e-government websites regularly. In this study, we investigate the cross-country determinants of e-government reuse intention by proposing a theoretical model that integrates constructs from (1) the Delone and McLean IS success model (i.e., system quality, service quality, information quality, perceived value, and user satisfaction); (2) the trust and risk models (i.e., citizen trust, overall risk, time risk, privacy risk, and psychological risks); and (3) Hofstede’s cultural model (i.e., uncertainty avoidance, masculinity, individualism, and cross-cultural trust and risk). Design/methodology/approach: Based on data from interviews with 81 Kuwaiti citizens and surveys of 1,829 Kuwaiti and Polish citizens, we conducted comprehensive, cross-cultural, and comparative analyses of e-government reuse intention in a cross-country setting. Findings: The results show that trust is positively associated with citizens’ intention to reuse e-government services, whereas risk is negatively associated with citizens’ perceived value. We also found that masculinity–femininity and uncertainty avoidance are positively associated with the intention to reuse e-government services and that individualism–collectivism has no significant relationship with reuse intention. This study’s findings have important implications for researchers and practitioners seeking to understand and improve e-government success in cross-country settings. Originality/value: We developed a parsimonious model of quality, trust, risk, culture, and technology reuse that captures country-specific cultural contexts and enables us to conduct a comprehensive, cross-cultural, and comparative analysis of e-government reuse intention in the cross-country setting of Kuwait and Poland.
- A cultural contingency model of knowledge sharing and job performanceVenkatesh, Viswanath; Davis, Fred D.; Zhu, Yaping (Elsevier, 2022-02-01)Drawing from the knowledge management literature, we developed and tested a nomological network related to knowledge sharing – i.e., knowledge seeking and knowledge providing using knowledge management systems. We investigated the effect of cultural contingencies on the prediction of both knowledge seeking and knowledge providing. In addition, we examined the effect of knowledge sharing using a KMS on employee job performance. We conducted a study using a field survey of 224 employees in an organization in the People's Republic of China and United States. We found that sensitivity to image and sensitivity to organizational incentives influenced both knowledge seeking and knowledge providing, and the effect was varied across individuals with different cultural values. For example, our findings suggested that the negative relationship between sensitivity to image and knowledge seeking was stronger for individuals with collectivistic values than for those with individualistic values. We also found that both knowledge seeking and knowledge providing led to better job performance.
- Customers' tolerance for validation in omnichannel retail stores: Enabling logistics and supply chain analyticsHoehle, Hartmut; Aloysius, John A.; Chan, Frank; Venkatesh, Viswanath (Emerald, 2018-01-01)Purpose: Mobile technologies are increasingly used as a data source to enable big data analytics that enable inventory control and logistics planning for omnichannel businesses. The purpose of this paper is to focus on the use of mobile technologies to facilitate customers’ shopping in physical retail stores and associated implementation challenges. Design/methodology/approach: First, the authors introduce three emerging mobile shopping checkout processes in the retail store. Second, the authors suggest that new validation procedures (i.e. exit inspections) necessary for implementation of mobile-technology-enabled checkout processes may disrupt traditional retail service processes. The authors propose a construct labeled “tolerance for validation” defined as customer reactions to checkout procedures. The authors define and discuss five dimensions – tolerance for: unfair process; changes in validation process; inconvenience; mistrust; and privacy intrusion. The authors develop a measurement scale for the proposed construct and conduct a study among 239 customers. Findings: The results show that customers have higher tolerance for validation under scenarios in which mobile technologies are used in the checkout processes, as compared to the traditional self-service scenario in which no mobile technology is used. In particular, the customers do not show a clear preference for specific mobile shopping scenarios. Originality/value: These findings contribute to our understanding of a challenge that omnichannel businesses may face as they leverage data from digital technologies to enhance collaborative planning, forecasting, and replenishment processes. The proposed construct and measurement scales can be used in future work on omnichannel retailing.
- Cyberslacking in the Workplace: Antecedents and Effects on Job PerformanceVenkatesh, Viswanath; Cheung, Christy M. K.; Davis, Fred D.; Lee, Zach W. Y. (2021-11-07)Employees’ nonwork use of information technology (IT), or cyberslacking, is of growing concern due to its erosion of job performance and other negative organizational consequences. Research on cyberslacking antecedents has drawn on diverse theoretical perspectives, resulting in a lack of cohesive explanation of cyberslacking. Further, prior studies generally overlooked IT-specific variables. To address the cyberslacking problems in organizations and research gaps in the literature, we used a combination of a literature-based approach and a qualitative inquiry to develop a model of cyberslacking that includes a 2x2 typology of antecedents. The proposed model was tested and supported in a three-wave field study of 395 employees in a Fortune-100 US organization. For research, this work organizes antecedents from diverse research streams and validates their relative impact on cyberslacking, thus providing a cohesive theoretical explanation of cyberslacking. This work also incorporates contextualization (i.e., IT-specific factors) into theory development and enriches IS literature by examining the nonwork aspects of IT use and their negative consequences to organizations. For practice, the results provide practitioners with insights into nonwork use of IT in organizations, particularly on how they can take organizational action to mitigate cyberslacking and maintain employee productivity.