The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper examines the diverse nature of cognitive, emotional, and behavioral reactions elicited among physicians in response to the introduction of a computerized physician order entry system in a hospital setting. These diverse reactions, which translate into different forms of acceptance and resistance behaviors are studied within the social-historical context of physicians' work using activity...
Contemporary socio-technical environments hold a great potential to drive a positive influence on the behaviors and attitudes of individuals. Drawing upon social cognitive theory (SCT) and the theory of planned behavior (TPB), this paper explores how and to what extent persuasive social influence features (namely, social learning (SL), social comparison (SC), and normative influence (NI)) alter customer...
As personalization, adaptation and persuasion are called for in e-commerce and as computational power increases, a question emerges: should companies use theories to develop and run their e-commerce operations or does mere data based optimization do a better job? We explore different types of computer-based learning methods and present two evaluations of primarily data-driven learning applications...
Company-hosted Facebook pages have emerged as a commonly used marketing tool, but consumers' underlying motivations for using these pages and their effect on members' intentions to purchase the host company's products are currently unclear. The present study examines consumers' hedonic and utilitarian motivations for using company-hosted Facebook pages in relation to the community's usage behavior...
This paper applies the Unified Theory of Acceptance and Use of Technology (UTAUT) for the understanding of individual acceptance and use of Web 2.0 in the context of regional SME networks. Empirical data were collected from German regional SME network members using a questionnaire. Partial Least Squares was applied to estimate the measurement and structural model and test the hypothesized relationships...
This paper examines how advertisers react to the complex competitive environment in sponsored search auctions considering two salient competitive features: rank externality where the payoff of a rank position to an advertiser depends on which specific advertisers are located in other ranks, and competitor heterogeneity where diverse advertisers of different types may be competing for the same search...
Interactivity has been deemed as one of the prominent feature of the Internet for online consumers to seek product information. This study examined how the three dimensions of interactivity (control, direction of communication, and synchronicity) affect the users' online information seeking process, respectively. Moreover, we also assess how users' purpose (utilitarian vs. hedonic) moderates the effects...
In recent years, daily-deal sites that help sellers offer deep-discounted vouchers have become an increasingly popular marketing vehicle. To investigate their effectiveness on sales, this study hypothesizes two different mechanisms, i.e., observational learning and Word-of-Mouth (WOM) via online social networks, affect shopping behaviors and sales of daily-deal vouchers. Using a unique panel data...
Freemium seems a promising solution for content providers to earn money in times of the free mentality of Web 2.0 users. Freemium services can be used both for free or with a paid subscription to obtain premium content. Nevertheless, freemium's success is limited. Especially Music as a Service (MaaS) providers, that provide music via streaming over the internet as a service, still make no profits,...
While the importance of customer satisfaction and purchase intention has been recognized in the marketing literature, the development and empirical validation of a model which specifically depicts the determinants of satisfaction and purchase intention with regard to virtual products has not been undertaken. Consequently, this study, by adopting the expectancy disconfirmation model and symbolic consumption...
While organizations are making a considerable effort to leverage formal and informal control mechanisms (e.g., policies, procedures, organizational culture) to improve security, their impact and effectiveness is under scrutiny as employees seldom comply with information security procedures. Drawing upon Griffin and Neal's safety climate and performance model, we develop an information security climate...
Today's organizations are highly dependent on information management and processes. Information security is one of the top issues for researchers and practitioners. In literature, there is consent that employees are the weakest link in IS security. A variety of researchers discuss planations for employees' security related awareness and behavior. This paper presents a theory-based literature review...
Lack of compliance with organizational information security policies (ISPOs) is a widespread organizational issue that increasingly bears very large direct and qualitative costs. The purpose of our study was to explain the causes of tensions within organizations to either comply with new ISPOs or react negatively against them. To do so, we proposed an innovative model, which pits organizational control...
Social Media applications as a contemporary phenomenon attract the attention of organizations and researchers. While these technologies are mainstream in a private setting, there is still uncertainty among organizations of operating them. The corporate perspective aims at deploying these technologies for value creation, i.e. improvement and even innovation. Conceptual guidance for a proper management...
Video is an important resource for understanding how people learn, but it can also have a life beyond its initial use. In the Video Mosaic Collaborative (VMC), we provide networked opportunities for teaching and learning through the use of a cyber-enabled video repository that provides resources for the creation of networked multimedia artifacts, the VMC Analytic. In this paper, we describe the VMC...
In this paper, a qualitative case study of women-dominated Free/Libre Open Source Software (FLOSS) project is conducted to explore factors which successfully involve and sustain women FLOSS participants by drawing on Brown and Levinsonâs politeness theory. The culture and norms of FLOSS appear to be formulated by what is privileged/marginalized by men in the context of FLOSS, and such menâs...
Rising tide of crowd sourcing as a new method of innovation is surging across diverse industries. Considering that the goal of crowd sourcing is generating ideas which can be seeds of innovation, understanding the characteristics of user-agreeable and organization-adoptable ideas can enhance the effectiveness of idea generation. In our approach, we extract idea contents characteristics such as subjectivity,...
To approach privacy threats stemming from interacting with other users on Online Social Networks (OSN), effective Social Identity Management (SIdM) is a key requirement. SIdM refers to the deliberate and targeted disclosure of personal information to a subset of one's contacts on OSN. Yet, unlike the physical world, SIdM on OSN is compromised by unavailable or insufficient settings as well as by properties...
Maintaining a relationship via video calling requires intertwining relational and technological talk. Using detailed qualitative analysis of transcripts from naturalistic recordings of couples in a video calling field trial, this paper explores how couple members use the possibility of technological distortion as a resource for negotiating around the problem of inattentive or inappropriate responses...
How people engaged in a close, dyadic long-term relationship (LTR) share information behavior can be considered a hallmark non-romantic measure of online relationship creation success. Dyadic LTR information behavior, however, has not been addressed from an information science perspective. Drawing upon findings from studies in social psychology and economics, and other frameworks (transactive memory,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.