Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Agency model (1)
- Business requirement (1)
- COVID-19 (1)
- Cloud computing (1)
- Community health (1)
-
- Computer-mediated Communication (1)
- Conservation of resource theory (1)
- Corporate sustainability (1)
- Cyberloafing (1)
- Denial of risk theory (1)
- Distributional justice (1)
- EHR Task Performance (1)
- Efficiency (1)
- Electronic Health Records (1)
- Emerging IT capability (1)
- Environmental uncertainty (1)
- Financial incentive (1)
- Free shipping program (1)
- Health communication (1)
- ISP compliance (1)
- Interdisciplinary (1)
- Internet fraud (1)
- Knowledge Contribution (1)
- Longitudinal analysis (1)
- MFS (1)
- Media Naturalness Theory (1)
- National culture (1)
- Neutralization theory (1)
- Newspapers (1)
- Offenders (1)
Articles 1 - 11 of 11
Full-Text Articles in Business
Examining Users’ Information Disclosure And Audience Support Response Dynamics In Online Health Communities: An Empirical Study, Joseph A. Manga, Francis K. Andoh-Baidoo, Emmanuel Wusuhon Yanibo Ayaburi, Diego Escobari
Examining Users’ Information Disclosure And Audience Support Response Dynamics In Online Health Communities: An Empirical Study, Joseph A. Manga, Francis K. Andoh-Baidoo, Emmanuel Wusuhon Yanibo Ayaburi, Diego Escobari
Information Systems Faculty Publications and Presentations
Online healthcare communities (OHCs) facilitate two-way interaction. Examining users’ information disclosure-audience support response dynamics can reveal insights for fostering a supportive environment, community engagement, bond formation, knowledge sharing, and sustained participation in OHCs. We propose a structural vector autoregression (SVAR) model of user disclosure and response dynamics in OHCs. Based on the health disclosure decision-making model and daily time series data, we examine the two-way interaction of two dimensions of disclosure efficacy with audience support response acceptance. Findings of the impulse response functions reveal that user information density leads to positive support response acceptance, whereas support response acceptance reduces the …
Framing Of Covid-19 In Newspapers: A Perspective From The Us-Mexico Border, Rifat Afrin, Ahasan Harun, Gayle Prybutok, Victor Prybutok
Framing Of Covid-19 In Newspapers: A Perspective From The Us-Mexico Border, Rifat Afrin, Ahasan Harun, Gayle Prybutok, Victor Prybutok
Information Systems Faculty Publications and Presentations
The degree to which the media report a health emergency affects the seriousness with which the people respond to combat the health crisis. Engagement from local newspapers in the US has received scant scrutiny, even though there is a sizable body of scholarship on the analysis of COVID-19 news. We fill this void by focusing on the Rio Grande Valley area of the US-Mexico border. To understand the differences, we compared such local news coverage with the coverage of a national news outlet. After collecting the relevant news articles, we used sentiment analysis, rapid automatic keyword extraction (RAKE), and co-occurrence …
Value Of Membership-Based Free Shipping In Online Retailing: Impact Of Upstream Pricing Model, Geng Sun, Huseyin Cavusoglu, Srinivasan Raghunathan
Value Of Membership-Based Free Shipping In Online Retailing: Impact Of Upstream Pricing Model, Geng Sun, Huseyin Cavusoglu, Srinivasan Raghunathan
Information Systems Faculty Publications and Presentations
A consumer-side innovation in online retailing is membership-based free shipping (MFS) in which a retailer bears the shipping cost for purchases made by members that have paid an upfront membership fee. On the supplier side, the agency model of selling, where a retailer allows a third-party manufacturer to sell his product on the site for a commission, has been gradually replacing the wholesale model, where the retailer buys from the manufacturer at a wholesale price and resells to consumers at a retail price. We show that the shift to the agency model enhances the value of the MFS program to …
What Does Not Kill You Makes You Stronger: Supply Chain Resilience And Corporate Sustainability Through Emerging It Capability, Zhaojun Yang, Xiaoting Guo, Jun Sun, Yali Zhang, Ying Wang
What Does Not Kill You Makes You Stronger: Supply Chain Resilience And Corporate Sustainability Through Emerging It Capability, Zhaojun Yang, Xiaoting Guo, Jun Sun, Yali Zhang, Ying Wang
Information Systems Faculty Publications and Presentations
Global epidemics and international conflicts disrupt supply chain operations. Many enterprises employ emerging information technology (IT) to reduce supply chain vulnerability and enhance supply chain resilience. Technologies like artificial intelligence and blockchain facilitate more robust supply chain operations, such as remanufacturing, just-in-time production, and automated workflow, leading to corporate sustainability along economic, environmental, and social dimensions. From a dynamic capability perspective, this article conceptualizes emerging IT capability and investigates its role in helping enterprises survive supply chain disruptions and prosper in the long run. A research model depicts the relationships among environmental uncertainty, supply chain vulnerability vigilance, emerging IT capability, …
How Does Organizational Justice Work Across National Culture? Effects Of Procedural And Distributive Justice On Information Security Policy Compliance Across National Culture, Maliha Alam, Nan Xiao
How Does Organizational Justice Work Across National Culture? Effects Of Procedural And Distributive Justice On Information Security Policy Compliance Across National Culture, Maliha Alam, Nan Xiao
Information Systems Faculty Publications and Presentations
Information security policy non-compliance has been a major issue in organizations. While organizational justice plays an important role in ISP compliance., previous studies have found justice works differently for people in various national cultures. This study investigates how procedural and distributive justices affect information security policy compliance across national cultures.
The Use Of Text Analytics To Investigate Concepts In Intra- And Inter-Disciplinary Software Piracy Research Inter-Disciplinary Software Piracy Research, Jerald Hughes, Juan A. Chavarria, Francis Andoh-Baidoo
The Use Of Text Analytics To Investigate Concepts In Intra- And Inter-Disciplinary Software Piracy Research Inter-Disciplinary Software Piracy Research, Jerald Hughes, Juan A. Chavarria, Francis Andoh-Baidoo
Information Systems Faculty Publications and Presentations
IS research has linked collaborators from diverse domains. IS research requires selecting and addressing an appropriate intradisciplinary or interdisciplinary scope. Identifying gaps in the current literature and deciding when and how collaborations among different disciplines may be fruitful poses challenges. We propose a process to analyze a corpus of documents from any topic, to identify potential collaboration areas.
A text analytics process is used to find areas of commonality and exclusivity among questions addressed in existing IS work by analyzing abstracts in papers from multiple disciplines studying 'software piracy.' We use term-term co-occurrence to find all the terms used in …
Unraveling Cyberloafing Paradox: Towards A Targeted Approach For Managing Cyberloafing, Bright Frimpong, Fatima Mohammed
Unraveling Cyberloafing Paradox: Towards A Targeted Approach For Managing Cyberloafing, Bright Frimpong, Fatima Mohammed
Information Systems Faculty Publications and Presentations
Cyberloafing remains an important issue for organizations due to the ambivalent nature of its consequences. There is a need to extend the scope of motives that influence different kinds of cyberloafing to develop a broader understanding of cyberloafing and manage its consequences. Therefore, this study focuses on the triggers of specific cyberloafing behaviors towards developing targeted cyberloafing policies to address their prevalence
Deepen Electronic Health Record Diffusion Beyond Breadth: Game Changers And Decision Drivers, Xuan Wang, Jun Sun, Ying Wang, Yi Liu
Deepen Electronic Health Record Diffusion Beyond Breadth: Game Changers And Decision Drivers, Xuan Wang, Jun Sun, Ying Wang, Yi Liu
Information Systems Faculty Publications and Presentations
Cloud computing, financial incentive and patient-centered care are the game changers that deepen EHR diffusion beyond breadth. Based on the innovation diffusion theory (IDT), technology-organization-environment (TOE) framework and alignment literature, this study examines how these changes shape business requirement, service value and society need that drive different phases of EHR diffusion in terms of planning, adoption, usage and upgrade. A longitudinal analysis with the USA National Ambulatory Medical Care Survey (NAMCS) reveals the impacts of different drivers on EHR diffusion. In addition to quantitative results, interview observations corroborate the relationships among game changers, decision drivers and EHR diffusion. The findings …
How Do Individuals Justify And Rationalize Their Criminal Behaviors In Online Romance Fraud?, Martin Offei, Francis K. Andoh-Baidoo, Emmanuel Wusuhon Yanibo Ayaburi, David Asamoah
How Do Individuals Justify And Rationalize Their Criminal Behaviors In Online Romance Fraud?, Martin Offei, Francis K. Andoh-Baidoo, Emmanuel Wusuhon Yanibo Ayaburi, David Asamoah
Information Systems Faculty Publications and Presentations
Online romance fraud (ORF) is a growing concern with such serious negative consequences as financial loss or suicide to the victim. Majority of empirical studies on online romance fraud using attachment, deception, protection motivation and relation theories focus on the victim. While neutralization offers insights into how individuals justify their deviant behaviors, the results have not been consistent in different contexts. In the ORF context, offenders may not only rely on justifying techniques but also rationalize their actions by denying risk both to the victim and the offender. Thus, drawing from the neutralization and denial of risk theories, we develop …
Unraveling The Link Between Simulation Ehr Training And Task Performance: The Mediation Role Of Stress, Murad Moqbel, Vanessa Garza Clark, Aroop K. Pal, Lauren Pulino
Unraveling The Link Between Simulation Ehr Training And Task Performance: The Mediation Role Of Stress, Murad Moqbel, Vanessa Garza Clark, Aroop K. Pal, Lauren Pulino
Information Systems Faculty Publications and Presentations
Past research has explored the link between computer-mediated communication (CMC) and task performance, but it remains unclear how (i.e., under what mechanisms) CMC impacts task performance. Drawing on media naturalness theory and the stimulus-organism-response model as our theoretical framework, we develop a research model and describe how simulation-based EHR training (a type of CMC) can improve EHR-based task performance by mitigating stress. We empirically test the model with a unique experimental dataset from EHR lab assessment and questionnaires that 225 participants completed. The structural equation modeling analysis results show that simulation EHR training helped improve EHR-based task performance (both effectiveness …
Hands-On Introductory Training In Backdoor And Sql Injection Attacks, Anil Singh, Sandra Henderson
Hands-On Introductory Training In Backdoor And Sql Injection Attacks, Anil Singh, Sandra Henderson
Information Systems Faculty Publications and Presentations
Software, though vital to organizations, come with risks attached. Malicious use of software has caused a great deal of damage to individuals, companies, and even countries. Accounting students generally do not acquire detailed understanding of such threats. To introduce accounting students to software vulnerabilities, we provide two MS Access exercises illustrating simplified versions of Backdoor attacks and SQL injection attacks. These quick and simple-to-do introductory exercises help accounting students get a closer look at software vulnerabilities. The COSO framework, to address such risks is discussed. Post exercise survey revealed increased understanding of software vulnerabilities.