Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Business

Could Alexa Increase Your Social Worth?, Peter Tripp Jan 2022

Could Alexa Increase Your Social Worth?, Peter Tripp

Electronic Theses and Dissertations

People have historically used personal introductions to build social capital, which is the foundation of career networking and is perhaps the most effective way to advance a career (Lin, 2001). With societal changes, such as the pandemic (Venkatesh & Edirappuli, 2020), and the increasing capabilities of Artificial Intelligence (AI), new approaches may emerge that impact societal relationships. Social capital theory highlights the need for reciprocal agreements to establish the trust between parties (Gouldner, 1960). My theoretical prediction and focus of this research include two principles: The impact of reciprocity in evaluating trust of the source of the introduction and the …


Why Do Robots Have Smiley Faces?, Mark Findlay Jun 2021

Why Do Robots Have Smiley Faces?, Mark Findlay

Research Collection Yong Pung How School Of Law

The author discussed why engineers and designers provide machines with the semblance of friendliness, and why it takes more than that for humans to trust AI. The ground-breaking AI in community research and policy initiative by CAIDG, supported by the National Research Foundation Singapore under its Emerging Areas Research Projects Funding Initiative, seeks to understand how and why trust can be established when humans and machines come together.


The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney Jan 2020

The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney

CCE Theses and Dissertations

Social media networking sites (SMNS) have become a popular communications medium where users share information, knowledge, and persuasion. In less than two decades, social media's (SM) dominance as a communication medium can't be disputed, for good or evil. Combined with the newly found immediacy and pervasiveness, these SM applications' persuasive power are useful weapons for organizations, angry customers, employees, actors, and activists bent on attacking or hacking other individuals, institutions, or systems. Consequently, SM has become the preferred default mechanism of news sources; however, users are unsure if the information gathered is true or false. According to the literature, SMNS …


Charitable Fundraising: Gaining Donors' Trust On Online Platforms, Deserinas Sulaeman Jun 2017

Charitable Fundraising: Gaining Donors' Trust On Online Platforms, Deserinas Sulaeman

Research Collection School Of Computing and Information Systems

Trust is crucial in the relationships between charitable fundraisers and potential donors. This study examines factors that can help fundraisers gain potential donors’ trust, which is crucial to the success of the campaigns. Examining charitable fundraising campaigns on an online platform, this study finds that trust issues can be mitigated by providing a campaign description that is more sophisticated, more informative, and with fewer errors. Additionally, setting a higher campaign funding goal tends to lead to a more successful campaign. These characteristics likely reflect a competent, committed, and passionate fundraiser. On the other hand, mere exposure to a wide set …


Open Materials Discourse: Consumer Acceptance Of Personal Cloud: Integrating Trust And Risk With The Technology Acceptance Model, Valerie L. Bartelt, Murad Moqbel Sep 2016

Open Materials Discourse: Consumer Acceptance Of Personal Cloud: Integrating Trust And Risk With The Technology Acceptance Model, Valerie L. Bartelt, Murad Moqbel

Information Systems Faculty Publications and Presentations

This paper provides the materials used to collect survey data for the conceptual replication of Pavlou (2003) by Moqbel and Bartelt (2015). This replication paper used trust and perceived risk, in addition to the technology acceptance model (TAM) factors of perceived usefulness and perceived ease of use, to determine how consumer’s behavioral intentions affect online transactions (Moqbel & Bartelt, 2015). Two hundred forty participants took part in the 15-minute survey, with the option of choosing either online or paper format. This paper provides additional materials and details on how the survey was conducted. Step-by-step explanations are provided for the design, …


Open Data Discourse: Consumer Acceptance Of Personal Cloud: Integrating Trust And Risk With The Technology Acceptance Model, Murad Moqbel, Valerie L. Bartelt Jan 2016

Open Data Discourse: Consumer Acceptance Of Personal Cloud: Integrating Trust And Risk With The Technology Acceptance Model, Murad Moqbel, Valerie L. Bartelt

Information Systems Faculty Publications and Presentations

This paper provides the data used to analyze the conceptual replication of Pavlou (2003) by Moqbel and Bartelt (2015) which studied factors that impacted consumer’s behavioral intentions to make online transactions by integrating trust and perceived risk with the technology acceptance model (TAM). We provide a detailed description of the data so it meets the open data standards. In particular, we explain the structure of the data so that other researchers can easily analyze the same dataset to come to the same results and conclusions. Our dataset consists of 240 observations which includes the following constructs: perceived trust, perceived risk, …


Consumer Acceptance Of Personal Cloud: Integrating Trust And Risk With The Technology Acceptance Model, Murad Moqbel, Valerie L. Bartelt Jan 2015

Consumer Acceptance Of Personal Cloud: Integrating Trust And Risk With The Technology Acceptance Model, Murad Moqbel, Valerie L. Bartelt

Information Systems Faculty Publications and Presentations

This paper conducts a conceptual replication of Pavlou (2003) which studied factors that impacted consumer’s behavioral intentions to make online transactions by integrating trust and perceived risk with the technology acceptance model (TAM). We test the generalizability of the model by replicating the study a decade later using a different online setting—personal cloud computing. Our results that are based on 240 observations, confirm the original study’s research model except perceived ease of use lost its direct predictive power to trust, perceived risk and perceived usefulness. Trust continues to be an important factor in perceived ease of use and perceived usefulness …


In Service For Sharing: Leadership And Leader - Follower Relationship Factors As Influencers Of Tacit Knowledge Sharing In The It Industry, Billy Whisnant, Odai Khasawneh Nov 2014

In Service For Sharing: Leadership And Leader - Follower Relationship Factors As Influencers Of Tacit Knowledge Sharing In The It Industry, Billy Whisnant, Odai Khasawneh

Odai Khasawneh

Tacit knowledge is an organizational resource that is difficult to cultivate. It requires that responsible agents in the organization take an active role in encouraging trust and the development of relationships where individuals feel that their voice will be heard and that there will be a benefit from them passing knowledge onto someone else. In knowledge work tacit knowledge is especially important. 

This research found that servant leadership is an important factor in influencing tacit knowledge sharing, however leader-member exchange is a factor that will strongly support the sharing of tacit knowledge. 

If there is a dearth in servant leadership, …


Trust, Betrayal, And Whistle-Blowing: Reflections On The Edward Snowden Case, Herman T. Tavani, Frances Grodzinsky Sep 2014

Trust, Betrayal, And Whistle-Blowing: Reflections On The Edward Snowden Case, Herman T. Tavani, Frances Grodzinsky

School of Computer Science & Engineering Faculty Publications

Is every act of whistle blowing, by definition, a betrayal of trust on the part of the whistle-blower? If so, are employees who blow the whistle, by implication, untrustworthy employees? Assuming that they are, would employees who blow the whistle (presumably on the grounds of moral obligation) also be willing to concede that they are not trustworthy employees, by virtue of carrying out their whistle-blowing act(s)? In answering these questions, we first propose some working definitions of whistle-blowing, trust, and trustworthiness. We then ask whether some instances of whistle-blowing are morally permissible (and perhaps also morally required), even if it …


Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael Dec 2012

Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael

Professor Katina Michael

This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …


Moral Responsibility For Computing Artifacts: "The Rules" And Issues Of Trust, Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf Dec 2012

Moral Responsibility For Computing Artifacts: "The Rules" And Issues Of Trust, Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf

School of Computer Science & Engineering Faculty Publications

“The Rules” are found in a collaborative document (started in March 2010) that states principles for responsibility when a computer artifact is designed, developed and deployed into a sociotechnical system. At this writing, over 50 people from nine countries have signed onto The Rules (Ad Hoc Committee, 2010). Unlike codes of ethics, The Rules are not tied to any organization, and computer users as well as computing professionals are invited to sign onto The Rules. The emphasis in The Rules is that both users and professionals have responsibilities in the production and use of computing artifacts. In this paper, we …


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …


Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat May 2012

Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat

Professor Katina Michael

Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …


Virtual World Commerce Adoption (Vwca) : A Case Study Of Second Life Investigating The Impacts Of Perceived Affordances, Trust, And Need Satisfaction, Kamolbhan Olapiriyakul Jan 2010

Virtual World Commerce Adoption (Vwca) : A Case Study Of Second Life Investigating The Impacts Of Perceived Affordances, Trust, And Need Satisfaction, Kamolbhan Olapiriyakul

Dissertations

Virtual worlds are computer-simulated worlds in which multi-players can simultaneously interact in a rich graphical environment. The development of virtual worlds, along with the massive growth of users, creates opportunities for business organizations. This dissertation involves many studies regarding virtual world adoption in business by virtual consumers.

Most of the research in Information Systems (IS) was conducted investigating factors influencing technology adoption, such as ease of use and usefulness, subjective norms and behavioral controls, self-efficacy, performance and effort expectancy, flow, etc. However, most of these research studies focused neither on design aspects related to affordances nor users' goal-oriented behaviors, such …


Leadership In Partially Distributed Teams, Linda Plotnick May 2009

Leadership In Partially Distributed Teams, Linda Plotnick

Dissertations

Inter-organizational collaboration is becoming more common. When organizations collaborate they often do so in partially distributed teams (PDTs). A PDT is a hybrid team that has at least one collocated subteam and at least two subteams that are geographically distributed and communicate primarily through electronic media. While PDTs share many characteristics with both traditionally collocated and fully distributed teams, they also have unique characteristics and issues.

This dissertation reports on a field study of PDTs conducted over two semesters with student participants, This research was conducted as part of a larger series of studies investigating PDTs, In these studies, participants …