David Gefen

David Gefen
Drexel University | DU · Department of Management

Doctor of Philosophy

About

182
Publications
244,085
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
54,512
Citations
Additional affiliations
September 1997 - November 2015
Drexel University
Position
  • Professor or MIS and Provost Distinguished Research Professor

Publications

Publications (182)
Article
Full-text available
The Clinical Laboratory Improvement Amendments (CLIA) regulations of 1988 required certification of some clinical laboratory professionals but not of others. Analyzing survey data 35 years later, we explore how laboratory professionals today are inadvertently affected by those regulations, specifically their sense of professional identity and their...
Article
Hospitals providing nurse-run school telemedicine programs can improve children’s access to healthcare services by delivering such services on school premises. Despite this potential, the enrollment in such programs by parents falls short of expectations because of parents’ hesitation to allow their children to receive such telemedicine healthcare...
Article
The diffusion of an innovation is often discussed as the outcome of social processes. An alternative IT viewpoint is Adaptive Structuration Theory where IT as “appropriated” by an organization as enabling and encoding the “spirit” of that organization – why and how and where it does what it does. Examining such a case with the diffusion of an exist...
Article
Telemedicine is not released into a social vacuum. In some communities - such as the underserved, low income, mostly minority community served by Einstein Medical Center Philadelphia (EMCP) - the social context presents the medical center with unique challenges centered on a strong community sense of historical discrimination. That context is manif...
Chapter
As a safety-net medical center that serves many underserved communities, Einstein Medical Center Philadelphia (EMCP) faces many challenges in providing healthcare to its communities. To improve those services, EMCP has released a new IT healthcare portal (app). This chapter describes some of the promises and challenges EMCP is currently facing in t...
Article
Organizational distrust, not compensation, is more likely to send IT pros packing.
Article
The helpfulness of online reviews depends on their textual portion. Using the information provided by the seller as a baseline, this study applies latent semantic analysis (LSA) to assess what parts of that textual portion contribute to helpfulness by separating the text into three categories of high entropy words: (1) unique (i.e. does not appear...
Article
Full-text available
Adalat (Nifedipine) is a calcium-channel blocker that is also used as an antihypertensive drug. The drug was approved by the US Food and Drug Administration in 1985 but was discontinued in 1996 on account, among other things, of interactions with other medications. Nonetheless, Adalat is still used in other countries to treat congestive heart failu...
Article
Full-text available
Trust and distrust are crucial aspects of human interaction that determine the nature of many organizational and business contexts. Because of socialization-borne familiarity that people feel about others, trust and distrust can influence people even when they do not know each other. Allowing that some aspects of the social knowledge that is acquir...
Chapter
As a safety-net medical center that serves many underserved communities, Einstein Medical Center Philadelphia (EMCP) faces many challenges in providing healthcare to its communities. To improve those services, EMCP has released a new IT healthcare portal (app). This chapter describes some of the promises and challenges EMCP is currently facing in t...
Conference Paper
Full-text available
Validity is among the most foundational and widely used concepts in science. Much has been written on the subject, yet, we continue to lack established definitions of research validities. This paper presents preliminary results for developing a general ontology of research validity. In this paper, we assembled the largest data set of validities and...
Article
In Part 1 the argument was made for the core Positivist principle of enabling falsification, specifically that data, or at least correlation or covariance matrices, should be made public so that others can attempt to falsify at least the statistical analyses. Doing so could provide a semblance of the direction of what might constitute the desired P...
Article
The helpfulness of online reviews and their impact on purchase decisions is well established. Much previous research measured that helpfulness by analyzing vote assessments. This study examines an alternative semantic measure based on a text analysis of the term “helpful” in those reviews. Analyzing over 20,000 reviews shows that the semantic measu...
Article
I am a critical post-Positivist ? and hold it as a badge of honor. To be a Positivist means that you are humbly willing to put your theory to a test that can falsify it ? that is, to show that it is wrong despite all that you have put into it. To be a post-Positivist means believing in that standard but also acknowledging the limitations of Positiv...
Article
MOUNTAINS OF DATA are constantly being accumulated, including in the form of medical records of doctor visits and treatments. The question is what actionable information can be gleaned from it beyond a one-time record of a specific medical examination. Arguably, if one were to combine the data in a large corpus of many patients suffering from the s...
Article
The growth of eGovernment applications has initiated profound re-engineering of numerous citizen-government interactions but has not yet provided significant impacts on internet-based voting (iVoting). This study examines the role of trust and the technology adoption model (TAM) in influencing citizen intentions to adopt iVoting, and whether a soci...
Article
In this paper, we use Latent Semantic Analysis to explore the design battles in smartphones. Using newspaper coverage from 1992-2012, we build a semantic model of the media coverage to identify article clusters. Cluster membership gives us visibility into trends in coverage over the course of the study. We find that five distinct periods can be ide...
Article
Full-text available
In this guide, we introduce researchers in the behavioral sciences in general and MIS in particular to text analysis as done with latent semantic analysis (LSA). The guide contains hands-on annotated code samples in R that walk the reader through a typical process of acquiring relevant texts, creating a semantic space out of them, and then projecti...
Article
Music is a self-evident crucial part of the human experience across cultures, with artefacts dating as far back as the last Ice Age. Music is, as well, an essential aspect of human communication, profoundly influencing the meaning of communication, perception, and behaviour. Music’s critical role is recognised in many disciplines, including anthrop...
Article
Full-text available
Word co-occurrences in text carry lexical information that can be harvested by data-mining tools such as latent semantic analysis (LSA). This research perspectives article (RPA) demonstrates the potency of using such embedded information by demonstrating that the Technology Acceptance Model (TAM) can be reconstructed significantly by analyzing unre...
Article
Full-text available
Contrary to the assumption that web browsers are designed to support the user, an examination of a 900,000 distinct PCs shows that web browsers comprise a complex ecosystem with millions of addons collaborating and competing with each other. It is possible for addons to “sneak in” through third party installations or to get “kicked out” by their co...
Article
Full-text available
Evidence has indicated that the neuroactive hormone oxytocin is essential for prosocial behavior, particularly trust. Exogenous administration of oxytocin has been shown to increase trust in humans. However, one may argue that, except the administration of oxytocin in nonhealthy patient groups (e.g., those with autism or anxiety disorders) to allev...
Chapter
Online consumer reviews (OCRs) are important in determining sales and price of products because they build trust in the seller (Pavlou and Dimoka 2006). Trust is the driving force in e-commerce (Gefen et al. 2003). One of the key ways in which trust is applied in ecommerce is through e-WOM (electronic word of mouth), such as that created through OC...
Chapter
In recent years, academic and practitioner interest in consumer-generated online reviews (OCR) has increased. One of the potential reasons for such growth in interest is their categorization as a valuable source of information for consumers making buying decisions online (e.g., Archak et al. 2011).
Article
Full-text available
Trust is the enabler of social interaction. Although the origins of research on trust traditionally lie outside the Information Systems (IS) domain, the importance of trust for IS research rapidly grew in the late 1990s, and it is still growing with the increasing ubiquity and advancement of technology in organizations, virtual teams, online market...
Article
Previous studies in an e-commerce context suggest that there are biological differences (i.e. whether one is a man or a woman) with respect to perceptions of websites. In other research, there is evidence that psychological gender (i.e. values such as masculinity or femininity) likewise influences website perceptions. It is the aim of the current i...
Article
Research and business practice have already established the central role of trust in business, particularly in online interactions. Many online business exchanges require the disclosure of sensitive personal information on a regular basis. Simultaneously, customers are reluctant to disclose private information online due to concerns about privacy....
Article
On crowdsourcing software development sites providers bid on very short term request for proposals (median 7 days) that are described in brief (median 241 words). Because of its size, because buyers have the power to refuse to accept the delivered project, and because all contracts are fixed price, this type of market presents a unique context of s...
Article
Privacy policy statements and privacy assurance cues are among the most important website features that online providers use to increase individuals’ trust and willingness to disclose private information online. The focus of this study is a comprehensive examination of the process by which privacy assurance mechanisms influence trust and the modera...
Article
The IT world is going through rapid and drastic changes with the emergence of new business models and, with them, the changing of internal and external organizational boundaries. A recent CIO roundtable composed of the CIOs of some of the leading corporations in Greater Detroit discussed the impact of these shifting boundaries on IT issues includin...
Article
Full-text available
This paper studies the role of trust and trustworthiness as it applies to inanimate software artifacts. Extrapolating from the meaning and theory of interpersonal trust and supporting theories, this study develops software artifact trustworthiness and trust scales for the context of antiviral software. The proposed constructs deal with trustworthin...
Article
Full-text available
This review paper introduces the emerging technology of optical brain imaging, also known as functional near infrared (fNIR) spectroscopy, and discusses its potential role in enhancing theory and methodology used in MIS research. We discuss basic fNIR principles including the technique’s safe and portable nature, which allows ambulatory brain activ...
Article
At a time when organizations are pouring increasing amounts of money into IT, what moderates the effect of that investment on positive outcomes? Consumer, user, and business manager perceptions of the value of IT investments are quite variable. Some think that IT delivers value; others do not. What distinguishes between those organizations whose in...
Article
Trustworthiness is the assessment that another person or others can be trusted because in the past they had shown adequate ability, integrity, and benevolence. Trust is the actual willingness to depend on the trusted party to fulfill its future obligations when there is risk that this trusted party might take undue advantage of the situation. In th...
Article
In 2011 a roundtable meeting of Chief Information Officers (CIOs) that was organized by the Manufacturing Information systems Center at the School of Business Administration at Wayne State University discussed the emergence of public cloud computing and how this is changing the role of the CIO for medium- and large-sized organizations. The nine CIO...
Article
High turnover in IT consultancy companies makes it harder to manage IT projects and increases the cost of such projects as clients demand that vendors assign more employees to each project. Current thinking summarized in Justice Theory and related theories, suggests that labour turnover is a matter of perceived lack of fairness in pay, regulations,...
Article
Many studies have shown that trust is an important cognition that drives the continued use of information systems. The theoretical reasoning behind this effect has been that trust helps people rule out undesirable, yet possible, opportunistic behaviors, and ultimately makes users more at ease regarding transacting with a website. In this study, we...
Article
Electronic markets are ruled by price and reputation, and, at least in the case of Online Sourcing Markets (OSM), also by preference for providers the buyer already contracted with. OSM are online markets for software development. Adding Fukuyama's notion of a low trust culture, an argument is advanced why buyers in OSM may give absolute preference...
Article
Full-text available
Enterprises often assign little strategic value to IT and resist additional investment. CIOs find that profitable IT deployment is blocked. The business/IT misalignment may stem from the lack of IT use maturity within the enterprise. In this article, the authors concentrate on what has to be done on the enterprise side to enable this maturation wit...
Article
Full-text available
This article discusses the role of commonly used neurophysiological tools such as psychophysiological tools (e.g., EKG, eye tracking) and neuroimaging tools (e.g., fMRI, EEG) in Information Systems research. There is heated interest now in the social sciences in capturing presumably objective data directly from the human body, and this interest in...
Article
Many factors contribute to the willingness of individual citizens to adopt eGovernment systems for filing taxes online, for voting on the Internet, for online licensing, and other digital processes. The growing interest in eGovernment has brought some attention to the concept of eVoting. Various dimensions of trust, along with usability and system...
Conference Paper
Full-text available
It is widely agreed that IT facilitates tacit and deeply embedded organizational competencies, thus indirectly contributing to organizational performance (Brynjolfsson & Hitt, 2000; Kohli & Grover, 2008). These competencies in turn may enable competitive advantage, leading to superior economic value for the organization (Wade & Hulland, 2004). It d...
Presentation
Full-text available
It is widely agreed that IT facilitates tacit and deeply embedded organizational competencies, thus indirectly contributing to organizational performance (Brynjolfsson & Hitt, 2000; Kohli & Grover, 2008). These competencies in turn may enable competitive advantage, leading to superior economic value for the organization (Wade & Hulland, 2004). It d...
Article
Full-text available
Investigating the unique circumstance of the cultural changes in the Republic of South Africa (RSA), this study propose a cultural dependent model of the adoption of electronic voting (eVoting). The need for research in RSA dealing with culture and software design, adoption, and use has been noted as critical by the practitioner community but has t...
Article
Full-text available
SEM has potential advantages over linear regression models that make SEM a priori the methods of choice in analyzing path diagrams when these involve latent variables with multiple indicators. What SEM does is to integrate the measurements and the hypothesized causal paths into a simultaneous assessment. SEM can analyze many stages of independent a...
Conference Paper
Full-text available
Extensive discussions and roundtables done by the panelists with tens ofCIOs in recent years suggest that there is increased CIO concern about the depreciation in the perceived importance of MIS in the industry and a need therefore to adapt the curriculum of MIS and its place in the MBA program to what the industry needs. The panel will discuss thi...
Article
Full-text available
A prevalent assumption in the literature is that trust and risk are always relevant in online marketplaces, and that there is always a need to build trust and reduce risk irrespective of context. Challenging this assumption, this study seeks to identify the boundaries of the effects of trust and risk on transaction activity in the context of instit...
Article
The increasing availability of readymade and supposedly ready to use IT packages is changing the way CIOs manage and the challenges they face. In this article we summarize the opinions of CIOs who attended a roundtable to discuss this issue. The CIOs report a shift in internal client attitude toward IT which, combined with the effects of budgetary...
Article
This study examines the importance of innovation leadership in cultivating the strategic fit of an organization with its environment, and enhancing various economic, relationship, and product performance outcomes. It thus explores how innovation leadership enables a firm to change and adapt to its external environment and by implication enhance its...
Article
Full-text available
Several aspects of trust in new and under-researched Information Systems have been discussed. One of the experts, Dimoka, captured the location, timing and level of brain activity that are associated with trust and distrust when subjects interacted with four experimentally manipulated seller profiles that differed on their level of trust and distru...
Article
The information systems field emerged as a new discipline of artificial science as a result of intellectual efforts to understand the nature and consequences of computer and communication technology in modern organizations. As the rapid development of ...
Article
Reluctance to provide personal health information could impede the success of web-based healthcare services. This paper focuses on the role of personal dispositions in disclosing health information online. The conceptual model argues that individuals' intention to disclose such information depends on their trust, privacy concern, and information se...
Article
Full-text available
This article aims to discuss the use of common neurophysiological tools, such as psychophysiological tools (e.g., EKG, eye tracking) and neuroimaging tools (e.g., fMRI, EEG) in Information Systems (IS) research. There is much interest in the social sciences in capturing objective data directly from the human body, and this interest has also been ga...
Article
This study examines the onshore/offshore decision in external software development, comparing the prediction of three theories of international trade. (1) Applying Ricardo's theory of comparative advantage, offshoring to low labor cost countries should apply mainly with large projects. (2) Applying the factor proportion model, however, projects tha...
Conference Paper
Full-text available
This study conceptually develops a Business Value if IT (BVIT) model, conjointly and innovatively using four theoretical frameworks, the Resource-Based View( RBV) of the firm, Knowledge-BasedView (KBV), Contingency theory, and the Strategic Alignment Model. The developed model proposesthat IT-enabled knowledge and communication capabilities, which...
Article
In the ITC cross-cultural literature, we often talk about the differences among peoples and how their respective culture and history may affect their adoption and preference usage patterns of ITC. However, do we really need to look that far to find such crosscultural differences? Considering language is one of the major defining attributes of cultu...
Article
The problem of understanding the operation and management of the business, and its consequences for an automotive supplier was discussed. The study shows the importance of maintaining joint education and training during the ongoing maintenance of the system. It also highlights the importance of creating a sense of ownership over the information sys...
Article
This article reflects on the discussions of the fifteen participants (co authors) of a retreat on the "Foundations of NeuroIS" that took place in Gmunden (Austria) in September 2009. In particular, this article offers initial answers to a set of research questions which are important for the foundations of NeuroIS, an emerging subfield within the I...
Article
The differences among peoples and how their respective culture and history may affect their adoption of information and communication technologies (ICT), as well as their preferred usage patterns, are often discussed in the literature. But do we really need to look that far to find such cross-cultural differences? Considering language is one of the...
Chapter
Deliberate exploitation of natural resources and excessive use of environmentally abhorrent materials have resulted in environmental disruptions threatening the life support systems. A human centric approach of development has already damaged nature to a large extent. This has attracted the attention of environmental specialists and policy makers....
Chapter
Trust and trust beliefs (trustworthiness) are key to e-commerce success but depend, to a large extent, on culture. With e-commerce being an international phenomenon, understanding the cross-cultural aspects of trust creation is therefore arguably required although mostly ignored by current research which deals almost exclusively with the U.S. This...
Chapter
In the ITC cross-cultural literature, we often talk about the differences among peoples and how their respective culture and history may affect their adoption and preference usage patterns of ITC. However, do we really need to look that far to find such cross-cultural differences? Considering language is one of the major defining attributes of cult...
Article
Allowing users to actively participate in the development and implementation of a new IS is supposed to increase their satisfaction with it. This type of participation, representing aspects relating to distributive and procedural justice, is increasingly impractical in current organizational settings, because many IS are used by thousands of employ...
Article
Don't confuse technology with business solutions, focusing instead on what users value most---information.
Article
In 1984, McFarlan suggested in his HBR article that a company might be able to use Information Technology (IT) to achieve strategic advantage in the marketplace. Although widely cited and recently elaborated on (Nolan & McFarlan, 2005), there is little empirical evidence to support it in the specific context of ERP (Enterprise Resource Planning) sy...
Article
This study examines the impact of culture on trust determinants in computer-mediated commerce transactions. Adopting trust-building foundations from cross-culture literature and focusing on a set of well-established cultural constructs as groups of culture ...
Article
We present an agenda for the future research that has the potential to extend the conceptual foundations of trust in online environments and to improve the practice in the domain. The agenda draws on the previous work on trust, the papers included in this Special Issue, and our perspective on the state of the literature. This agenda is structured i...
Conference Paper
Privacy policy statements and privacy-assurance cues are among the most important website features that online providers use to alleviate web customers' privacy concern. This study examines the moderating role of privacy concern on how the quality of privacy policy statements and privacy assurance cues contribute to increased trust, and the subsequ...
Conference Paper
Privacy policy statements and privacy-assurance cues are among the most important website features that online providers could use to alleviate web customers’ privacy concerns. This study examines the moderating role of privacy concern on how privacy assurance cues and argument quality contribute to increased trust, and the subsequent decision to d...
Article
Threaded discussions are one of the central tools of online education. These tools enhance student learning and compensate for the lack of social interaction. This study examines whether these social interactions are affected by some typical gender related conversational behaviors, despite the fact that these threaded discussion are designed to ope...
Chapter
At the core of sociolinguistic theory is the recognition that men and women when engaging in an open conversation communicate differently because of their different respective social objectives in communication. Oral conversations are, according to sociolinguists, akin to cross cultural conversations and hence the tendency toward same-gender conver...
Chapter
Threaded discussions are one of the central tools of online education. These tools enhance student learning and compensate for the lack of social interaction. This study examines whether these social interactions are affected by some typical gender related conversational behaviors, despite the fact that these threaded discussion are designed to ope...
Chapter
In the ITC cross-cultural literature, we often talk about the differences among peoples and how their respective culture and history may affect their adoption and preference usage patterns of ITC. However, do we really need to look that far to find such cross-cultural differences? Considering language is one of the major defining attributes of cult...
Chapter
Trust and trust beliefs (trustworthiness) are key to e-commerce success but depend, to a large extent, on culture. With e-commerce being an international phenomenon, understanding the cross-cultural aspects of trust creation is therefore arguably required although mostly ignored by current research which deals almost exclusively with the U.S. This...
Chapter
Full-text available
To trust means to have expectations about others’ (the trustees’) socially acceptable behavior. One of the central effects of this trust in the context of IT adoption is to increase the perceived usefulness (PU) of Information Technology (IT) associated with the trustee’s agency. One way of increasing this trust is through greater sociocultural sim...
Article
Full-text available
Academic institutions invest considerable resources in improving the website quality of their MBA courses, in the hope of increasing student retention and willingness to recommend the programs to others. Despite this investment, it seems that the old "keep it simple" rule is also true for e-learning. Data collected from students enrolled in a blend...
Article
At the core of sociolinguistic theory is the recognition that men and women when engaging in an open conversation communicate differently because of their different respective social objectives in communication. Oral conversations are, according to sociolinguists, akin to cross cultural conversations and hence the tendency toward same-gender conver...
Article
In the ITC cross-cultural literature, we often talk about the differences among peoples and how their respective culture and history may affect their adoption and preference usage patterns of ITC. However, do we really need to look that far to find such cross-cultural differences? Considering language is one of the major defining attributes of cult...
Conference Paper
Maintaining student satisfaction and through it retaining students and having them recommend the program to others, is central to the success of any MBA program. This is especially important in distance learning programs because of their high dropout rates. The study shows the centrality of social norms outside the realm of the MBA program in deter...
Conference Paper
Privacy issues are major concerns in disclosing sensitive personal information such as health-related information. This study investigates the impact of personal dispositions on forming privacy concern and trust in context of disclosing personal health information online, based on utility theory and prospect theory. The study is among the first to...
Article
Full-text available
Increasing retention in MBA programs and having the students recommend it to others is crucial for the ongoing financial success of these programs. E-learning has been proposed as one way of doing so and many universities are investing heavily in improving the website quality of their courses. This study probes the effectiveness of these investment...

Network

Cited By