Scholarly Works, Business Information Technology
Browse by
Research articles, presentations, and other scholarship
Recent Submissions
-
The importance of theory at the Information Systems Journal
(Wiley, 2023-07-01) -
Cross-Country Determinants of Citizens’ E-Government Reuse Intention: Empirical Evidence from Kuwait and Poland
(2023)Purpose: Despite the major IT investments made by public institutions, the reuse of e-government services remains an issue as citizens hesitate to use e-government websites regularly. In this study, we investigate the ... -
Achieving entrepreneurial growth despite resource and capability constraints: the role of service intermediaries
(Springer, 2023-05)Entrepreneurial growth—firm growth via the introduction of new market offerings or expansion into new markets—is an important topic for entrepreneurship scholars and practitioners alike. Any firm that wants to exploit ... -
How Facebook's newsfeed algorithm shapes childhood vaccine hesitancy: An algorithmic fairness, accountability, and transparency (FAT) perspective
(Elsevier, 2023-06)Vaccine hesitancy is the delay or refusal of vaccination when vaccines are available. Over the last decade, many reports have suggested that the proliferation of vaccine disinformation and misinformation on social media ... -
Formal definition of the MARS method for quantifying the unique target class discoveries of selected machine classifiers
(F1000 Research, 2022-07)Conventional binary classification performance metrics evaluate either general measures (accuracy, F score) or specific aspects (precision, recall) of a model's classifying ability. As such, these metrics, derived from the ... -
Examining the differential effectiveness of fear appeals in information security management using two-stage meta-analysis
(2023)Most of the information security management research involving fear appeals is guided by either protection motivation theory or the extended parallel processing model. Over time, extant research has extended these theories, ... -
“Do as I say but not as I do”: Influence of political leaders’ populist communication styles on public adherence in a crisis using the global case of COVID-19 movement restrictions
(Elsevier, 2023)This paper explores the influence of political leaders’ populist communication styles on public adherence to government policies regarding COVID-19 containment. We adopt a mixed-methods approach that combines: theory ... -
Tell Me A Story: The Effects That Narratives Exert on Meaningful-Engagement Outcomes in Antiphishing Training
(Elsevier, 2023)Antiphishing training is a critical element of an organization’s security posture. Yet, its effectiveness is often limited by trainees’ perception that it is boring and unengaging, which weakens their attention and thus ... -
Patient trust in physicians matters—Understanding the role of a mobile patient education system and patient-physician communication in improving patient adherence behavior: Field study
(JMIR Publications, 2022-12-31)Background: The ultimate goal of any prescribed medical therapy is to achieve desired outcomes of patient care. However, patient nonadherence has long been a major problem detrimental to patient health, and thus is a concern ... -
How Lending Experience and Borrower Credit Influence Rational Herding Behavior in Peer-to-Peer Microloan Platform Markets
(2023-03)This paper analyzes the herding behavior that characterizes lenders’ lending decisions on a microloan platform and explains how rational herding behavior can resolve the information-asymmetry problem, which is a well-known ... -
Explaining the outcomes of social gamification: A longitudinal field experiment
(Taylor and Francis, 2023)Social gamification, which allows technology users to interact with each other in gamified tasks, has drawn increasing interest due to its effectiveness in facilitating users’ game engagement and task efforts. In social ... -
Do Security Fear Appeals Work When They Interrupt Tasks? A Multi-Method Examination of Password Strength
(Management Information Systems Research Center, University of Minnesota, 2022-09)Weak passwords are one of the most pervasive threats in cybersecurity. Facing this threat, users require guidance on how to protect themselves. A method frequently used by IS practitioners and researchers to provide this ... -
Deviant Affordances: When Tensions, Deadlocks and Nonconformance Generate Performance
(2022-03-17)Novel information technologies (ITs), such as mobile devices and third-party cloud services, offer users an increasing variety of action possibilities, i.e., affordances. Organizational IT policies, however, often specify ... -
Continuous Equality Knapsack with Probit-Style Objectives
(2022-11-04)We study continuous, equality knapsack problems with uniform separable, non-convex objective functions that are continuous, strictly increasing, antisymmetric about a point, and have concave and convex regions. For example, ... -
A Multiple-Motive Heuristic-Systematic Model for Examining How Users Process Android Data and Service Access Notifications
(ACM, 2021)Android access notifications are presented to users to obtain permission to access data and services on smartphones. The number of 'unsafe' apps in the Android marketplaces underscores the importance of understanding what ... -
Metrics That Actually Matter for Vulnerability Management
(TAG Cyber, 2022-10) -
Integrating life cycle assessment and multi criteria decision making for sustainable waste management: Key issues and recommendations for future studies
(Pergamon-Elsevier, 2022-10)Decisions on waste management systems are subjected to multiple sustainability criteria, including environ-mental, social, and economic criteria. Decision makers therefore can benefit from systematic approaches to evaluate ... -
Baseline Word formatting styles for use in publishing at top information systems, management, and engineering journals
(2022-07-14)Basic guidelines on using Microsoft Word's formatting styles for use in publishing at top information systems, management, and engineering journals. Provides actual styles to work with. -
Injury prevention for older adults: A dataset of safety concern narratives from online reviews of mobility-related products
(Elsevier, 2022-06)Older adults are among the fastest-growing demographic groups in the United States, increasing by over a third this past decade. Consequently, the older adult consumer prod-uct market has quickly become a multi-billion-dollar ... -
Sourcing product innovation intelligence from online reviews
(Elsevier, 2022-06)In recent years, online reviews have offered a rich new medium for consumers to express their opinions and feedback. Product designers frequently aim to consider consumer preferences in their work, but many firms are unsure ...