Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 22 of 22

Full-Text Articles in Entire DC Network

Exploring The Coverage Of Cyberchondria Addiction In Newspapers: A Perspective From The Usa, Rifat Afrin, Mumtahina Obaid, Gayle Prybutok, Ahasan Harun, Victor R. Prybutok Dec 2023

Exploring The Coverage Of Cyberchondria Addiction In Newspapers: A Perspective From The Usa, Rifat Afrin, Mumtahina Obaid, Gayle Prybutok, Ahasan Harun, Victor R. Prybutok

Information Systems Faculty Publications and Presentations

Objectives: The purpose of this study is to investigate how US newspapers reported cyberchondria from 2009 to 2021. Cyberchondria shares similarities with addiction, making it imperative to delve into its representation in media. Cyberchondria refers to an issue of excessive and repetitive internet searches for health information often accompanied by obsessive-compulsive behavior. The goal of this research is locate the frames that appear in cyberchondria coverage, look at how the frames have changed over the given time span, and assess the emotions that the news frames portray.

Method: After collecting the relevant news items, the study applies correspondence analysis, sentiment …


Feature Selection In Intrusion Detection Systems: A New Hybrid Fusion Of Bat Algorithm And Residue Number System, Yakub Kayode Saheed, Temitope Olubanjo Kehinde, Mustafa Ayobami Raji, Usman Ahmad Baba Nov 2023

Feature Selection In Intrusion Detection Systems: A New Hybrid Fusion Of Bat Algorithm And Residue Number System, Yakub Kayode Saheed, Temitope Olubanjo Kehinde, Mustafa Ayobami Raji, Usman Ahmad Baba

Marketing Faculty Publications and Presentations

This research introduces innovative approaches to enhance intrusion detection systems (IDSs) by addressing critical challenges in existing methods. Various machine-learning techniques, including nature-inspired metaheuristics, Bayesian algorithms, and swarm intelligence, have been proposed in the past for attribute selection and IDS performance improvement. However, these methods have often fallen short in terms of detection accuracy, detection rate, precision, and F-score. To tackle these issues, the paper presents a novel hybrid feature selection approach combining the Bat metaheuristic algorithm with the Residue Number System (RNS). Initially, the Bat algorithm is utilized to partition training data and eliminate irrelevant attributes. Recognizing the Bat …


Unveiling The Dark Side In Smartphone Addiction: Mediation Of Strain And Moderation Of Hedonic Use On Well-Being, Murad Moqbel, Saggi Nevo, Fiona Fui-Hoon Nah Mar 2023

Unveiling The Dark Side In Smartphone Addiction: Mediation Of Strain And Moderation Of Hedonic Use On Well-Being, Murad Moqbel, Saggi Nevo, Fiona Fui-Hoon Nah

Information Systems Faculty Publications and Presentations

Purpose

The research purpose is to investigate the mediating and moderating relationships between smartphone addiction and well-being (i.e. health-related quality of life).

Design/methodology/approach

A survey of 236 smartphone users was used to test the research model.

Findings

The structural equation modeling analysis results show that smartphone addiction negatively impacts well-being by draining a key personal resource, energy, thus creating strain. The adverse effect of smartphone addiction on users' well-being is found to be more intense when smartphones are used for hedonic purposes.

Research limitations/implications

Through the conservation of resources theory lens, this study increases our understanding of the role of …


Teaching Tip: A Teaching Module Illustrating Erp Item Value Automation, Anil Singh, Vikram Bhadauria, George Mangalaraj Mar 2023

Teaching Tip: A Teaching Module Illustrating Erp Item Value Automation, Anil Singh, Vikram Bhadauria, George Mangalaraj

Information Systems Faculty Publications and Presentations

Large parts of the enterprise resource planning (ERP) processes are automated. One example is the item values in the sales order process. To execute a sales order, the ERP system applies a specific “find” strategy on a wide variety of data sources such as customer master, material master, and customer price-specific data tables, and extracts information such as customer class, discounts, and dates for computations of line items, namely, prices, discounts, and taxes. While completing their ERP assignments on the sales order process, students often see only the final sales order amount and ignore—and thereby fail to appreciate and understand—the …


Metaverse Marketing: How The Metaverse Will Shape The Future Of Consumer Research And Practice, Yogesh K. Dwivedi, Laurie Hughes, Yichuan Wang, Ali A. Alalwan, Sun J. (Grace) Ahn, Janarthanan Balakrishnan, Sergio Barta, Russell Belk, Dimitrios Buhalis, Reto Felix Dec 2022

Metaverse Marketing: How The Metaverse Will Shape The Future Of Consumer Research And Practice, Yogesh K. Dwivedi, Laurie Hughes, Yichuan Wang, Ali A. Alalwan, Sun J. (Grace) Ahn, Janarthanan Balakrishnan, Sergio Barta, Russell Belk, Dimitrios Buhalis, Reto Felix

Marketing Faculty Publications and Presentations

The initial hype and fanfare from the Meta Platforms view of how the metaverse could be brought to life has evolved into an ongoing discussion of not only the metaverse's impact on users and organizations but also the societal and cultural implications of widespread usage. The potential of consumer interaction with brands within the metaverse has engendered significant debate within the marketing‐ focused discourse on the key challenges and transformative opportunities for marketers. Drawing on insights from expert contributors, this study examines the marketing implications of the hypothetical widespread adoption of the metaverse. We identify new research directions and propose …


How Do Digital Lives Affect Resident Mental Health In The Digital Era? Empirical Evidence Based On Chinese General Social Survey, Yan Chen, Mengyang Wei, Jaime Ortiz Dec 2022

How Do Digital Lives Affect Resident Mental Health In The Digital Era? Empirical Evidence Based On Chinese General Social Survey, Yan Chen, Mengyang Wei, Jaime Ortiz

International Business and Entrepreneurship Faculty Publications and Presentations

Having good mental health means we are better able to connect, function, cope and thrive. The widespread application of digital technology in daily life provides new ways and promising tools for residents to maintain their mental health. Given the importance of mental health for everyone, and the fact that mental health problems are prevalent worldwide, this study discusses how digital lives affects the mental health of residents. The results suggest that digital lives are significantly and positively associated with mental health. Mechanisms analysis identifies personal perceptions (self-rated physical exercise and subjective wellbeing) as the important paths for digital lives to …


How Does Organizational Justice Work Across National Culture? Effects Of Procedural And Distributive Justice On Information Security Policy Compliance Across National Culture, Maliha Alam, Nan Xiao Aug 2022

How Does Organizational Justice Work Across National Culture? Effects Of Procedural And Distributive Justice On Information Security Policy Compliance Across National Culture, Maliha Alam, Nan Xiao

Information Systems Faculty Publications and Presentations

Information security policy non-compliance has been a major issue in organizations. While organizational justice plays an important role in ISP compliance., previous studies have found justice works differently for people in various national cultures. This study investigates how procedural and distributive justices affect information security policy compliance across national cultures.


The Role Of Wisdom In Navigating Social Media Paradoxes: Implications For Consumers, Firms, And Public Policy, Abigail B. Schneider, Sunaina Chugani, Tavleen Kaur, Jason Stornelli, Michael Luchs, Marat Bakpayev, Tessa Garcia-Collart, Bridget Leonard, Lydia Ottlewski, Laura Pricer Jun 2022

The Role Of Wisdom In Navigating Social Media Paradoxes: Implications For Consumers, Firms, And Public Policy, Abigail B. Schneider, Sunaina Chugani, Tavleen Kaur, Jason Stornelli, Michael Luchs, Marat Bakpayev, Tessa Garcia-Collart, Bridget Leonard, Lydia Ottlewski, Laura Pricer

Marketing Faculty Publications and Presentations

Social media has transformed the nature of communication and simultaneously given rise to paradoxes—irresolvable situations where contradictory elements co-exist. These paradoxes are pervasive, and they can jeopardize consumer welfare because they are difficult to navigate. In this conceptual paper, we argue that the principles of wisdom provide a unique and constructive lens through which to view the social media landscape with the aim of maximizing well-being. We illustrate three social media paradoxes at individual, interpersonal, and societal levels of analysis. We also translate wisdom theory into practical recommendations for consumers, marketers, and public policy makers to facilitate wiser use of …


How Do Individuals Justify And Rationalize Their Criminal Behaviors In Online Romance Fraud?, Martin Offei, Francis K. Andoh-Baidoo, Emmanuel Wusuhon Yanibo Ayaburi, David Asamoah Apr 2022

How Do Individuals Justify And Rationalize Their Criminal Behaviors In Online Romance Fraud?, Martin Offei, Francis K. Andoh-Baidoo, Emmanuel Wusuhon Yanibo Ayaburi, David Asamoah

Information Systems Faculty Publications and Presentations

Online romance fraud (ORF) is a growing concern with such serious negative consequences as financial loss or suicide to the victim. Majority of empirical studies on online romance fraud using attachment, deception, protection motivation and relation theories focus on the victim. While neutralization offers insights into how individuals justify their deviant behaviors, the results have not been consistent in different contexts. In the ORF context, offenders may not only rely on justifying techniques but also rationalize their actions by denying risk both to the victim and the offender. Thus, drawing from the neutralization and denial of risk theories, we develop …


Hands-On Introductory Training In Backdoor And Sql Injection Attacks, Anil Singh, Sandra Henderson Jan 2022

Hands-On Introductory Training In Backdoor And Sql Injection Attacks, Anil Singh, Sandra Henderson

Information Systems Faculty Publications and Presentations

Software, though vital to organizations, come with risks attached. Malicious use of software has caused a great deal of damage to individuals, companies, and even countries. Accounting students generally do not acquire detailed understanding of such threats. To introduce accounting students to software vulnerabilities, we provide two MS Access exercises illustrating simplified versions of Backdoor attacks and SQL injection attacks. These quick and simple-to-do introductory exercises help accounting students get a closer look at software vulnerabilities. The COSO framework, to address such risks is discussed. Post exercise survey revealed increased understanding of software vulnerabilities.


Antecedents Of Members’ Trust Propensity And Its Impact On Self- Disclosure Intention In Mobile-Based Online Dating Apps, Bao Q. Duong, Jaeung Lee, Emmanuel Wusuhon Yanibo Ayaburi, Sung Simon Jin Jul 2021

Antecedents Of Members’ Trust Propensity And Its Impact On Self- Disclosure Intention In Mobile-Based Online Dating Apps, Bao Q. Duong, Jaeung Lee, Emmanuel Wusuhon Yanibo Ayaburi, Sung Simon Jin

Information Systems Faculty Publications and Presentations

To examine users’ intention to disclose detailed information on Mobile-Based Online Dating Apps (MBODAs), we adapted Privacy Calculus Theory (PCT) to develop our research model. We posited perceived members’ trust propensity as a central factor connecting its antecedents with users’ information self-disclosure intention. We examine a) the impact of users’ perceived benefit, perceived risk, electronic word of mouth (eWOM), and prior experience on members’ perceived trust propensity, and b) the impact of perceived members’ trust propensity toward users’ information self-disclosure intention. Analysis of MBODA users’ responses indicates that perceived benefit has a positive effect on perceived members’ trust propensity, while …


Effects Of Employee Personality On The Relationships Between Experienced Incivility, Emotional Exhaustion, And Perpetrated Incivility, Jennifer L. Welbourne, Gerardo A. Miranda, Ashwini Gangadharan Nov 2020

Effects Of Employee Personality On The Relationships Between Experienced Incivility, Emotional Exhaustion, And Perpetrated Incivility, Jennifer L. Welbourne, Gerardo A. Miranda, Ashwini Gangadharan

Management Faculty Publications and Presentations

Workplace incivility refers to low-intensity negative behaviors that violate workplace norms of respect. Incivility is known to be a type of stressor in the workplace, with recent research drawing attention to how it may differentially affect employees with varying personality traits. Drawing from a stressor–strain theoretical framework, we examined the moderating effects of four of the Big Five personality traits (agreeableness, conscientiousness, neuroticism, and extraversion) on the relationship between individuals’ experienced incivility and their subsequent emotional exhaustion and perpetrated incivility toward others in the organization. Results from a 2-wave survey of 252 working adults indicate that personality traits moderated the …


Decision Framework For Engaging Cloud-Based Big Data Analytics Vendors, Emmanuel Wusuhon Yanibo Ayaburi, Michele Maasberg, Jaeung Lee Oct 2020

Decision Framework For Engaging Cloud-Based Big Data Analytics Vendors, Emmanuel Wusuhon Yanibo Ayaburi, Michele Maasberg, Jaeung Lee

Information Systems Faculty Publications and Presentations

Organizations face both opportunities and risks with big data analytics vendors, and the risks are now profound, as data has been likened to the oil of the digital era. The growing body of research at the nexus of big data analytics and cloud computing is examined from the economic perspective, based on agency theory (AT). A conceptual framework is developed for analyzing these opportunities and challenges regarding the use of big data analytics and cloud computing in e-business environments. This framework allows organizations to engage in contracts that target competitive parity with their service-oriented decision support system (SODSS) to achieve …


Diota: Decentralized Ledger Based Framework For Data Authenticity Protection In Iot Systems, Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Taeweon Suh, Weidong Shi Jan 2020

Diota: Decentralized Ledger Based Framework For Data Authenticity Protection In Iot Systems, Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Taeweon Suh, Weidong Shi

Computer Science Faculty Publications and Presentations

It is predicted that more than 20 billion IoT devices will be deployed worldwide by 2020. These devices form the critical infrastructure to support a variety of important applications such as smart city, smart grid, and industrial internet. To guarantee that these applications work properly, it is imperative to authenticate these devices and data generated from them. Although digital signatures can be applied for these purposes, the scale of the overall system and the limited computation capability of IoT devices pose two big challenges. In order to overcome these obstacles, we propose DIoTA, a novel decentralized ledger-based authentication framework for …


Understanding The Relationship Between Smartphone Addiction And Well-Being: The Mediation Of Mindfulness And Moderation Of Hedonic Apps, Murad Moqbel Jan 2020

Understanding The Relationship Between Smartphone Addiction And Well-Being: The Mediation Of Mindfulness And Moderation Of Hedonic Apps, Murad Moqbel

Information Systems Faculty Publications and Presentations

The advent of handheld devices such as smartphones has changed the way we connect, navigate, and entertain and has been recognized as a revolution in information and communication technologies (ICT). Despite the plethora of benefits of this new technology, concerns have been raised about the unintended adverse consequences to well-being in the form of addictive use. Past research has linked smartphone addiction to negative consequences, but it remains unclear how, why, and when (i.e., under what conditions) smartphone addiction, in turn, is related to well-being. This study attempts to fill this void by addressing these questions through the lens of …


Antecedents And Consequences Of Leaders’ Security Orientation, Joseph J. Simpson Aug 2019

Antecedents And Consequences Of Leaders’ Security Orientation, Joseph J. Simpson

Theses and Dissertations

Organizations’ leaders are responsible for ensuring that firms’ proprietary assets are protected from expropriation. Firms are increasingly targets of large-scale proprietary assets breaches that jeopardize their ability to financially benefit from their innovation activities. Some firms have proactively built capabilities that allow them to protect their proprietary assets, while leaders are more security oriented and therefore do more to protect their organizations from proprietary assets breaches? Current research on leaders’ role in the protection of proprietary assets is lacking at the strategic level because most studies on organizational security have emphasized employee-level behaviors (e.g., da Veiga & Eloff, 2010, Lee, …


Antecedents And Outcome Of Deficient Self-Regulation In Unknown Wireless Networks Use Context: An Exploratory Study, Emmanuel Wusuhon Yanibo Ayaburi, James Wairimu, Francis K. Andoh-Baidoo Jul 2019

Antecedents And Outcome Of Deficient Self-Regulation In Unknown Wireless Networks Use Context: An Exploratory Study, Emmanuel Wusuhon Yanibo Ayaburi, James Wairimu, Francis K. Andoh-Baidoo

Information Systems Faculty Publications and Presentations

Wireless networks are becoming the norm in the society, where hotspots afford users access to the internet through mobile devices. Unknown wireless networks, open public networks with unknown identity, pose threats as hackers can gain unauthorized access to users’ private information stored in their mobile devices. Despite the imminent dangers, individuals continue to use these networks. This study explicates a self-regulation theory to investigate the antecedents of deficient self-regulation (DSR) and its effects on habitual use of technology. We posit that both habit cues and information security experiential factors influence DSR, leading to habitual use of unknown wireless networks. The …


Data Security Threats Sources: An Empirical Examination Of Institutional Characteristics, Nasim Talebi, Emmanuel Wusuhon Yanibo Ayaburi, Suhail Chakravarty Jan 2019

Data Security Threats Sources: An Empirical Examination Of Institutional Characteristics, Nasim Talebi, Emmanuel Wusuhon Yanibo Ayaburi, Suhail Chakravarty

Information Systems Faculty Publications and Presentations

Driven by the difficulty in achieving complete security with technical tools, business investigators are looking into organizational and behavioral issues that could help make systems more secure. This chapter looks at the security of systems from the organizational perspective. Specifically, this study attempts to identify if different organizations have different predisposition to particular type(s) of security threat sources. Using publicly available security breach data from a privacy rights clearinghouse to investigate which organizational characteristics predisposes an institution to an external or internal threat source, it was concluded that as size of organization and the number of its valuable documents increase …


Social Media Sites Use Intensity And Job Burnout Among The U.S. And Thai Employees, Peerayuth Charoensukmongkol, Murad Moqbel, Sandra Gutierrez-Wirsching Mar 2017

Social Media Sites Use Intensity And Job Burnout Among The U.S. And Thai Employees, Peerayuth Charoensukmongkol, Murad Moqbel, Sandra Gutierrez-Wirsching

Information Systems Faculty Publications and Presentations

This research explored the effect of social network sites (SNS) use intensity in the workplace on three aspects of job burnout. The data were collected from non-teaching employees from universities in the U.S. (N = 174) and in Thailand (N = 182). Results from partial least squares regression revealed some evidence of the u-curve relationship between SNS use intensity and depersonalization in both countries. However, the u-curve relationship between SNS use and lack of personal accomplishment is only supported in U.S. samples. This suggests that while a moderate degree of SNS use at work tends to lower burnout, a high …


Intended Continued Use Social Networking Sites: Effects On Job Satisfaction And Performance, Ned Kock, Murad Moqbel, Kevin Barton, Valerie L. Bartelt Jan 2016

Intended Continued Use Social Networking Sites: Effects On Job Satisfaction And Performance, Ned Kock, Murad Moqbel, Kevin Barton, Valerie L. Bartelt

Information Systems Faculty Publications and Presentations

Hedonic information systems are those that are used primarily for pleasure. Previous research has established that the intention to use hedonic information systems is explained mainly by perceived ease of use and perceived enjoyment, with perceived usefulness to one’s job being given less importance. Facebook could be seen as a hedonic information system. This paper employs a cross-sectional survey of 178 professionals who used Facebook to various degrees. Predictably, the authors’ empirical results show that perceived enjoyment is indeed a much stronger determinant of intended continued Facebook use than ease of use or usefulness to one’s job, explaining a considerable …


Determining The Dynamic Co-Diffusion Of Four E-Services Using Country-Level Panel Data, Samer Takieddine May 2015

Determining The Dynamic Co-Diffusion Of Four E-Services Using Country-Level Panel Data, Samer Takieddine

Theses and Dissertations - UTB/UTPA

Motivated by the slow diffusion of e-services in many countries in the world, and Rogers’ call for researching related innovation as a cluster, this study investigates the co-diffusion among e-services. To our knowledge this study is the first to examine the co-diffusion effects among e-services. It extends prior studies from the e-services diffusion literature, and the technology co-diffusion literature by examining co-diffusion among four e-services; e-banking, e-shopping, e-government, and e-learning. It also examined the co-diffusion mediation effects, moderation effects, and country-level factors’ effects. Using panel data of 28 European countries, and applying dynamic GMM econometric technique, this study’s findings were …


Innovation-Ict-Cybersecurity: The Triad Relationship And Its Impact On Growth Competitiveness, Manal M. Yunis Aug 2013

Innovation-Ict-Cybersecurity: The Triad Relationship And Its Impact On Growth Competitiveness, Manal M. Yunis

Theses and Dissertations - UTB/UTPA

This study examines the global growth competitiveness of countries using the dynamics of growth, ICT, and innovation. It also introduces a new dynamic, cybersecurity, and argues that within a growth competitiveness framework, ICT, innovation, and cybersecurity mechanisms allow some countries to achieve higher ranks on the competitiveness ladder than others. Based on a theoretical framework that encompasses the economic growth model, the complementarity theory, and the international law theory, a model that integrates ICT, innovation, and cybersecurity, depicts the relationships amongst them and with growth competitiveness, and incorporates complementary factors with possible moderating effect is presented. The model proposed relationships …