Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Entire DC Network

Perceived Fit Between Green Is And Green Scm: Does It Matter?, Zhaojun Yang, Jun Sun, Yali Zhang, Yin Wang Nov 2019

Perceived Fit Between Green Is And Green Scm: Does It Matter?, Zhaojun Yang, Jun Sun, Yali Zhang, Yin Wang

Information Systems Faculty Publications and Presentations

From a task-technology fit perspective, green SCM and green IS are likely to have synergistic effects on corporate sustainability. Yet, the exact mechanisms through which their perceived alignment by employees may exert influences on organizational performances are unclear. This study captures potential enablement and coverage routes at different development stages of sustainability with fit-as-mediation and fit-as-moderation, respectively. The results based on the observations collected from more than 400 organizations in the USA and China suggest that the perceived fit gradually shifts from a moderator role to a mediator role as the two green endeavors integrate with each other.


Snowball Effect Of User Participation In Online Environmental Communities: Elaboration Likelihood Under Social Influence, Yali Zhang, Haixin Zhang, Zhaojun Yang, Jun Sun, Chrissie Diane Tan Sep 2019

Snowball Effect Of User Participation In Online Environmental Communities: Elaboration Likelihood Under Social Influence, Yali Zhang, Haixin Zhang, Zhaojun Yang, Jun Sun, Chrissie Diane Tan

Information Systems Faculty Publications and Presentations

Ecological preservation and sustainable development depend on active public involvement. The emergence of online environmental communities greatly facilitates people’s participation in green endeavors. The population penetration of such platforms accelerates as existing users persuade people around them and media coverage further attracts public attention. This snowball effect plays an important role in the user base expansion, but the specific mechanism of social influence involved is yet to be examined. Based on the social influence theory, cognitive response theory, and elaboration likelihood model, this study establishes a research model depicting the relationship between persuasion in terms of social influence and outcomes …


Antecedents And Outcome Of Deficient Self-Regulation In Unknown Wireless Networks Use Context: An Exploratory Study, Emmanuel Wusuhon Yanibo Ayaburi, James Wairimu, Francis K. Andoh-Baidoo Jul 2019

Antecedents And Outcome Of Deficient Self-Regulation In Unknown Wireless Networks Use Context: An Exploratory Study, Emmanuel Wusuhon Yanibo Ayaburi, James Wairimu, Francis K. Andoh-Baidoo

Information Systems Faculty Publications and Presentations

Wireless networks are becoming the norm in the society, where hotspots afford users access to the internet through mobile devices. Unknown wireless networks, open public networks with unknown identity, pose threats as hackers can gain unauthorized access to users’ private information stored in their mobile devices. Despite the imminent dangers, individuals continue to use these networks. This study explicates a self-regulation theory to investigate the antecedents of deficient self-regulation (DSR) and its effects on habitual use of technology. We posit that both habit cues and information security experiential factors influence DSR, leading to habitual use of unknown wireless networks. The …


Role Of It Culture In Learners' Acceptance Of E-Learning, James Wairimu, Susan Githua, Kenneth Kungu Jun 2019

Role Of It Culture In Learners' Acceptance Of E-Learning, James Wairimu, Susan Githua, Kenneth Kungu

Information Systems Faculty Publications and Presentations

This chapter sought to explore factors that influence e-learning adoption and use among students in higher education in Kenya. Based on UTAUT model, the study proposes that performance expectancy, effort expectancy, social influence, and facilitating conditions will influence intention to use e-learning. Additionally, the role of IT culture is explored. Performance expectancy, social influence, facilitating conditions, and IT culture were significant in predicting intention to use e-learning. Intention to use significantly predicted usage. Implications for higher education are discussed.


Adaptive Workflow Design Based On Blockchain, Daniel Narh Treku, Jun Sun Apr 2019

Adaptive Workflow Design Based On Blockchain, Daniel Narh Treku, Jun Sun

Information Systems Faculty Publications and Presentations

Increasingly, organizational processes have become more complex. There is a need for the design of workflows to focus on how organizations adapt to emergent processes while balancing the need for decentralization and centralization goal. The advancement in new technologies especially blockchain provides organizations with the opportunity to achieve the goal. Using blockchain technology (i.e. smart contract and blocks of specified consensus for deferred action), we leverage the theory of deferred action and a coordination framework to conceptually design a workflow management system that addresses organizational emergence (e-WfMS). Our artifact helps managers to predict and store the impact of deferred actions. …


Understanding Key Drivers Of Mooc Satisfaction And Continuance Intention To Use, Yunfan Lu, Bin Wang, Yaobin Lu Jan 2019

Understanding Key Drivers Of Mooc Satisfaction And Continuance Intention To Use, Yunfan Lu, Bin Wang, Yaobin Lu

Information Systems Faculty Publications and Presentations

Massive Open Online Courses (MOOCs) have attracted global audiences who desire to learn. However, the completion rate of these courses is less than 10 percent. Few studies have systematically researched the influence of expectation-confirmation theory (ECT) and user experience (e.g., flow experience, perceived interest) on user satisfaction of and the continuance intention to use MOOCs. The present study examines the drivers of MOOC satisfaction based on ECT and the influence of satisfaction on user behavior. A research model reflecting the relationships among confirmation, usefulness, interest, flow, satisfaction, and continuance intention to use, and intention to recommend was developed and tested …


Digital Transformation Through Internet Of Things Services, Tayfun Keskin, Frederick J. Riggins Jan 2019

Digital Transformation Through Internet Of Things Services, Tayfun Keskin, Frederick J. Riggins

Information Systems Faculty Publications and Presentations

Internet of Things (IoT) have been disrupting industries through shifting novel services, and business models. Organizations should also redesign their business service models to navigate this disruption. A holistic understanding of digital transformation through IoT requires the cooperation of multiple disciplines ranging from engineering to economics. This paper utilizes a conceptual model to develop an analytical framework to investigate a number of pricing strategies enabled by different business models. Our findings demonstrate that the Internet of Things phenomenon has the potential to disrupt the way we do business by connecting markets and enabling new business models.


Data Security Threats Sources: An Empirical Examination Of Institutional Characteristics, Nasim Talebi, Emmanuel Wusuhon Yanibo Ayaburi, Suhail Chakravarty Jan 2019

Data Security Threats Sources: An Empirical Examination Of Institutional Characteristics, Nasim Talebi, Emmanuel Wusuhon Yanibo Ayaburi, Suhail Chakravarty

Information Systems Faculty Publications and Presentations

Driven by the difficulty in achieving complete security with technical tools, business investigators are looking into organizational and behavioral issues that could help make systems more secure. This chapter looks at the security of systems from the organizational perspective. Specifically, this study attempts to identify if different organizations have different predisposition to particular type(s) of security threat sources. Using publicly available security breach data from a privacy rights clearinghouse to investigate which organizational characteristics predisposes an institution to an external or internal threat source, it was concluded that as size of organization and the number of its valuable documents increase …