David GefenDrexel University | DU · Department of Management
David Gefen
Doctor of Philosophy
About
182
Publications
244,085
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
54,512
Citations
Introduction
Additional affiliations
September 1997 - November 2015
Publications
Publications (182)
The Clinical Laboratory Improvement Amendments (CLIA) regulations of 1988 required certification of some clinical laboratory professionals but not of others. Analyzing survey data 35 years later, we explore how laboratory professionals today are inadvertently affected by those regulations, specifically their sense of professional identity and their...
Hospitals providing nurse-run school telemedicine programs can improve children’s access to healthcare services by delivering such services on school premises. Despite this potential, the enrollment in such programs by parents falls short of expectations because of parents’ hesitation to allow their children to receive such telemedicine healthcare...
The diffusion of an innovation is often discussed as the outcome of social processes. An alternative IT viewpoint is Adaptive Structuration Theory where IT as “appropriated” by an organization as enabling and encoding the “spirit” of that organization – why and how and where it does what it does. Examining such a case with the diffusion of an exist...
Telemedicine is not released into a social vacuum. In some communities - such as the underserved, low income, mostly minority community served by Einstein Medical Center Philadelphia (EMCP) - the social context presents the medical center with unique challenges centered on a strong community sense of historical discrimination. That context is manif...
As a safety-net medical center that serves many underserved communities, Einstein Medical Center Philadelphia (EMCP) faces many challenges in providing healthcare to its communities. To improve those services, EMCP has released a new IT healthcare portal (app). This chapter describes some of the promises and challenges EMCP is currently facing in t...
Organizational distrust, not compensation, is more likely to send IT pros packing.
The helpfulness of online reviews depends on their textual portion. Using the information provided by the seller as a baseline, this study applies latent semantic analysis (LSA) to assess what parts of that textual portion contribute to helpfulness by separating the text into three categories of high entropy words: (1) unique (i.e. does not appear...
Adalat (Nifedipine) is a calcium-channel blocker that is also used as an antihypertensive drug. The drug was approved by the US Food and Drug Administration in 1985 but was discontinued in 1996 on account, among other things, of interactions with other medications. Nonetheless, Adalat is still used in other countries to treat congestive heart failu...
Trust and distrust are crucial aspects of human interaction that determine the nature of many organizational and business contexts. Because of socialization-borne familiarity that people feel about others, trust and distrust can influence people even when they do not know each other. Allowing that some aspects of the social knowledge that is acquir...
As a safety-net medical center that serves many underserved communities, Einstein Medical Center Philadelphia (EMCP) faces many challenges in providing healthcare to its communities. To improve those services, EMCP has released a new IT healthcare portal (app). This chapter describes some of the promises and challenges EMCP is currently facing in t...
Validity is among the most foundational and widely used concepts in science. Much has been written on the subject, yet, we continue to lack established definitions of research validities. This paper presents preliminary results for developing a general ontology of research validity. In this paper, we assembled the largest data set of validities and...
In Part 1 the argument was made for the core Positivist principle of enabling falsification, specifically that data, or at least correlation or covariance matrices, should be made public so that others can attempt to falsify at least the statistical analyses. Doing so could provide a semblance of the direction of what might constitute the desired P...
The helpfulness of online reviews and their impact on purchase decisions is well established. Much previous research measured that helpfulness by analyzing vote assessments. This study examines an alternative semantic measure based on a text analysis of the term “helpful” in those reviews. Analyzing over 20,000 reviews shows that the semantic measu...
I am a critical post-Positivist ? and hold it as a badge of honor. To be a Positivist means that you are humbly willing to put your theory to a test that can falsify it ? that is, to show that it is wrong despite all that you have put into it. To be a post-Positivist means believing in that standard but also acknowledging the limitations of Positiv...
MOUNTAINS OF DATA are constantly being accumulated, including in the form of medical records of doctor visits and treatments. The question is what actionable information can be gleaned from it beyond a one-time record of a specific medical examination. Arguably, if one were to combine the data in a large corpus of many patients suffering from the s...
The growth of eGovernment applications has initiated profound re-engineering of numerous citizen-government interactions but has not yet provided significant impacts on internet-based voting (iVoting). This study examines the role of trust and the technology adoption model (TAM) in influencing citizen intentions to adopt iVoting, and whether a soci...
In this paper, we use Latent Semantic Analysis to explore the design battles in smartphones. Using newspaper coverage from 1992-2012, we build a semantic model of the media coverage to identify article clusters. Cluster membership gives us visibility into trends in coverage over the course of the study. We find that five distinct periods can be ide...
In this guide, we introduce researchers in the behavioral sciences in general and MIS in particular to text analysis as done with latent semantic analysis (LSA). The guide contains hands-on annotated code samples in R that walk the reader through a typical process of acquiring relevant texts, creating a semantic space out of them, and then
projecti...
Music is a self-evident crucial part of the human experience across cultures, with artefacts dating as far back as the last Ice Age. Music is, as well, an essential aspect of human communication, profoundly influencing the meaning of communication, perception, and behaviour. Music’s critical role is recognised in many disciplines, including anthrop...
Word co-occurrences in text carry lexical information that can be harvested by data-mining tools such as latent semantic analysis (LSA). This research perspectives article (RPA) demonstrates the potency of using such embedded information by demonstrating that the Technology Acceptance Model (TAM) can be reconstructed significantly by analyzing unre...
Contrary to the assumption that web browsers are designed to support the user, an examination of a 900,000 distinct PCs shows that web browsers comprise a complex ecosystem with millions of addons collaborating and competing with each other. It is possible for addons to “sneak in” through third party installations or to get “kicked out” by their co...
Evidence has indicated that the neuroactive hormone oxytocin is essential for prosocial behavior, particularly trust. Exogenous administration of oxytocin has been shown to increase trust in humans. However, one may argue that, except the administration of oxytocin in nonhealthy patient groups (e.g., those with autism or anxiety disorders) to allev...
Online consumer reviews (OCRs) are important in determining sales and price of products because they build trust in the seller (Pavlou and Dimoka 2006). Trust is the driving force in e-commerce (Gefen et al. 2003). One of the key ways in which trust is applied in ecommerce is through e-WOM (electronic word of mouth), such as that created through OC...
In recent years, academic and practitioner interest in consumer-generated online reviews (OCR) has increased. One of the potential reasons for such growth in interest is their categorization as a valuable source of information for consumers making buying decisions online (e.g., Archak et al. 2011).
Trust is the enabler of social interaction. Although the origins of research on trust traditionally lie outside the Information Systems (IS) domain, the importance of trust for IS research rapidly grew in the late 1990s, and it is still growing with the increasing ubiquity and advancement of technology in organizations, virtual teams, online market...
Previous studies in an e-commerce context suggest that there are biological differences (i.e. whether one is a man or a woman) with respect to perceptions of websites. In other research, there is evidence that psychological gender (i.e. values such as masculinity or femininity) likewise influences website perceptions. It is the aim of the current i...
Research and business practice have already established the central role of trust in business, particularly in online interactions. Many online business exchanges require the disclosure of sensitive personal information on a regular basis. Simultaneously, customers are reluctant to disclose private information online due to concerns about privacy....
On crowdsourcing software development sites providers bid on very short term request for proposals (median 7 days) that are described in brief (median 241 words). Because of its size, because buyers have the power to refuse to accept the delivered project, and because all contracts are fixed price, this type of market presents a unique context of s...
Privacy policy statements and privacy assurance cues are among the most important website features that online providers use to increase individuals’ trust and willingness to disclose private information online. The focus of this study is a comprehensive examination of the process by which privacy assurance mechanisms influence trust and the modera...
The IT world is going through rapid and drastic changes with the emergence of new business models and, with them, the changing of internal and external organizational boundaries. A recent CIO roundtable composed of the CIOs of some of the leading corporations in Greater Detroit discussed the impact of these shifting boundaries on IT issues includin...
This paper studies the role of trust and trustworthiness as it applies to inanimate software artifacts. Extrapolating from the meaning and theory of interpersonal trust and supporting theories, this study develops software artifact trustworthiness and trust scales for the context of antiviral software. The proposed constructs deal with trustworthin...
This review paper introduces the emerging technology of optical brain imaging, also known as functional near infrared (fNIR) spectroscopy, and discusses its potential role in enhancing theory and methodology used in MIS research. We discuss basic fNIR principles including the technique’s safe and portable nature, which allows ambulatory brain activ...
At a time when organizations are pouring increasing amounts of money into IT, what moderates the effect of that investment on positive outcomes? Consumer, user, and business manager perceptions of the value of IT investments are quite variable. Some think that IT delivers value; others do not. What distinguishes between those organizations whose in...
Trustworthiness is the assessment that another person or others can be trusted because in the past they had shown adequate ability, integrity, and benevolence. Trust is the actual willingness to depend on the trusted party to fulfill its future obligations when there is risk that this trusted party might take undue advantage of the situation. In th...
In 2011 a roundtable meeting of Chief Information Officers (CIOs) that was organized by the Manufacturing Information systems Center at the School of Business Administration at Wayne State University discussed the emergence of public cloud computing and how this is changing the role of the CIO for medium- and large-sized organizations. The nine CIO...
High turnover in IT consultancy companies makes it harder to manage IT projects and increases the cost of such projects as clients demand that vendors assign more employees to each project. Current thinking summarized in Justice Theory and related theories, suggests that labour turnover is a matter of perceived lack of fairness in pay, regulations,...
Many studies have shown that trust is an important cognition that drives the continued use of information systems. The theoretical reasoning behind this effect has been that trust helps people rule out undesirable, yet possible, opportunistic behaviors, and ultimately makes users more at ease regarding transacting with a website. In this study, we...
Electronic markets are ruled by price and reputation, and, at least in the case of Online Sourcing Markets (OSM), also by preference for providers the buyer already contracted with. OSM are online markets for software development. Adding Fukuyama's notion of a low trust culture, an argument is advanced why buyers in OSM may give absolute preference...
Enterprises often assign little strategic value to IT and resist additional investment. CIOs find that profitable IT deployment is blocked. The business/IT misalignment may stem from the lack of IT use maturity within the enterprise. In this article, the authors concentrate on what has to be done on the enterprise side to enable this maturation wit...
This article discusses the role of commonly used neurophysiological tools such as psychophysiological tools (e.g., EKG, eye tracking) and neuroimaging tools (e.g., fMRI, EEG) in Information Systems research. There is heated interest now in the social sciences in capturing presumably objective data directly from the human body, and this interest in...
Many factors contribute to the willingness of individual citizens to adopt eGovernment systems for filing taxes online, for voting on the Internet, for online licensing, and other digital processes. The growing interest in eGovernment has brought some attention to the concept of eVoting. Various dimensions of trust, along with usability and system...
It is widely agreed that IT facilitates tacit and deeply embedded organizational competencies, thus indirectly contributing to organizational performance (Brynjolfsson & Hitt, 2000; Kohli & Grover, 2008). These competencies in turn may enable competitive advantage, leading to superior economic value for the organization (Wade & Hulland, 2004). It d...
It is widely agreed that IT facilitates tacit and deeply embedded organizational competencies, thus indirectly contributing to organizational performance (Brynjolfsson & Hitt, 2000; Kohli & Grover, 2008). These competencies in turn may enable competitive advantage, leading to superior economic value for the organization (Wade & Hulland, 2004). It d...
Investigating the unique circumstance of the cultural changes in the Republic of South Africa (RSA), this study propose a cultural dependent model of the adoption of electronic voting (eVoting). The need for research in RSA dealing with culture and software design, adoption, and use has been noted as critical by the practitioner community but has t...
SEM has potential advantages over linear regression models that make SEM a priori the methods of choice in analyzing path diagrams when these involve latent variables with multiple indicators. What SEM does is to integrate the measurements and the hypothesized causal paths into a simultaneous assessment. SEM can analyze many stages of independent a...
Extensive discussions and roundtables done by the panelists with tens ofCIOs in recent years suggest that there is increased CIO concern about the depreciation in the perceived importance of MIS in the industry and a need therefore to adapt the curriculum of MIS and its place in the MBA program to what the industry needs. The panel will discuss thi...
A prevalent assumption in the literature is that trust and risk are always relevant in online marketplaces, and that there is always a need to build trust and reduce risk irrespective of context. Challenging this assumption, this study seeks to identify the boundaries of the effects of trust and risk on transaction activity in the context of instit...
The increasing availability of readymade and supposedly ready to use IT packages is changing the way CIOs manage and the challenges they face. In this article we summarize the opinions of CIOs who attended a roundtable to discuss this issue. The CIOs report a shift in internal client attitude toward IT which, combined with the effects of budgetary...
This study examines the importance of innovation leadership in cultivating the strategic fit of an organization with its environment, and enhancing various economic, relationship, and product performance outcomes. It thus explores how innovation leadership enables a firm to change and adapt to its external environment and by implication enhance its...
Several aspects of trust in new and under-researched Information Systems have been discussed. One of the experts, Dimoka, captured the location, timing and level of brain activity that are associated with trust and distrust when subjects interacted with four experimentally manipulated seller profiles that differed on their level of trust and distru...
The information systems field emerged as a new discipline of artificial science as a result of intellectual efforts to understand the nature and consequences of computer and communication technology in modern organizations. As the rapid development of ...
Reluctance to provide personal health information could impede the success of web-based healthcare services. This paper focuses on the role of personal dispositions in disclosing health information online. The conceptual model argues that individuals' intention to disclose such information depends on their trust, privacy concern, and information se...
This article aims to discuss the use of common neurophysiological tools, such as psychophysiological tools (e.g., EKG, eye tracking) and neuroimaging tools (e.g., fMRI, EEG) in Information Systems (IS) research. There is much interest in the social sciences in capturing objective data directly from the human body, and this interest has also been ga...
This study examines the onshore/offshore decision in external software development, comparing the prediction of three theories of international trade. (1) Applying Ricardo's theory of comparative advantage, offshoring to low labor cost countries should apply mainly with large projects. (2) Applying the factor proportion model, however, projects tha...
This study conceptually develops a Business Value if IT (BVIT) model, conjointly and innovatively using four theoretical frameworks, the Resource-Based View( RBV) of the firm, Knowledge-BasedView (KBV), Contingency theory, and the Strategic Alignment Model. The developed model proposesthat IT-enabled knowledge and communication capabilities, which...
In the ITC cross-cultural literature, we often talk about the differences among peoples and how their respective culture and history may affect their adoption and preference usage patterns of ITC. However, do we really need to look that far to find such crosscultural differences? Considering language is one of the major defining attributes of cultu...
The problem of understanding the operation and management of the business, and its consequences for an automotive supplier was discussed. The study shows the importance of maintaining joint education and training during the ongoing maintenance of the system. It also highlights the importance of creating a sense of ownership over the information sys...
This article reflects on the discussions of the fifteen participants (co authors) of a retreat on the "Foundations of NeuroIS" that took place in Gmunden (Austria) in September 2009. In particular, this article offers initial answers to a set of research questions which are important for the foundations of NeuroIS, an emerging subfield within the I...
The differences among peoples and how their respective culture and history may affect their adoption of information and communication technologies (ICT), as well as their preferred usage patterns, are often discussed in the literature. But do we really need to look that far to find such cross-cultural differences? Considering language is one of the...
Deliberate exploitation of natural resources and excessive use of environmentally abhorrent materials have resulted in environmental disruptions threatening the life support systems. A human centric approach of development has already damaged nature to a large extent. This has attracted the attention of environmental specialists and policy makers....
Trust and trust beliefs (trustworthiness) are key to e-commerce success but depend, to a large extent, on culture. With e-commerce being an international phenomenon, understanding the cross-cultural aspects of trust creation is therefore arguably required although mostly ignored by current research which deals almost exclusively with the U.S. This...
In the ITC cross-cultural literature, we often talk about the differences among peoples and how their respective culture and history may affect their adoption and preference usage patterns of ITC. However, do we really need to look that far to find such cross-cultural differences? Considering language is one of the major defining attributes of cult...
Allowing users to actively participate in the development and implementation of a new IS is supposed to increase their satisfaction with it. This type of participation, representing aspects relating to distributive and procedural justice, is increasingly impractical in current organizational settings, because many IS are used by thousands of employ...
Don't confuse technology with business solutions, focusing instead on what users value most---information.
In 1984, McFarlan suggested in his HBR article that a company might be able to use Information Technology (IT) to achieve strategic advantage in the marketplace. Although widely cited and recently elaborated on (Nolan & McFarlan, 2005), there is little empirical evidence to support it in the specific context of ERP (Enterprise Resource Planning) sy...
This study examines the impact of culture on trust determinants in computer-mediated commerce transactions. Adopting trust-building foundations from cross-culture literature and focusing on a set of well-established cultural constructs as groups of culture ...
We present an agenda for the future research that has the potential to extend the conceptual foundations of trust in online environments and to improve the practice in the domain. The agenda draws on the previous work on trust, the papers included in this Special Issue, and our perspective on the state of the literature. This agenda is structured i...
Privacy policy statements and privacy-assurance cues are among the most important website features that online providers use to alleviate web customers' privacy concern. This study examines the moderating role of privacy concern on how the quality of privacy policy statements and privacy assurance cues contribute to increased trust, and the subsequ...
Privacy policy statements and privacy-assurance cues are among the most important website features that online providers could use to alleviate web customers’ privacy concerns. This study examines the moderating role of privacy concern on how privacy assurance cues and argument quality contribute to increased trust, and the subsequent decision to d...
Threaded discussions are one of the central tools of online education. These tools enhance student learning and compensate for the lack of social interaction. This study examines whether these social interactions are affected by some typical gender related conversational behaviors, despite the fact that these threaded discussion are designed to ope...
At the core of sociolinguistic theory is the recognition that men and women when engaging in an open conversation communicate differently because of their different respective social objectives in communication. Oral conversations are, according to sociolinguists, akin to cross cultural conversations and hence the tendency toward same-gender conver...
Threaded discussions are one of the central tools of online education. These tools enhance student learning and compensate for the lack of social interaction. This study examines whether these social interactions are affected by some typical gender related conversational behaviors, despite the fact that these threaded discussion are designed to ope...
In the ITC cross-cultural literature, we often talk about the differences among peoples and how their respective culture and history may affect their adoption and preference usage patterns of ITC. However, do we really need to look that far to find such cross-cultural differences? Considering language is one of the major defining attributes of cult...
Trust and trust beliefs (trustworthiness) are key to e-commerce success but depend, to a large extent, on culture. With e-commerce being an international phenomenon, understanding the cross-cultural aspects of trust creation is therefore arguably required although mostly ignored by current research which deals almost exclusively with the U.S. This...
To trust means to have expectations about others’ (the trustees’) socially acceptable behavior. One of the central effects of this trust in the context of IT adoption is to increase the perceived usefulness (PU) of Information Technology (IT) associated with the trustee’s agency. One way of increasing this trust is through greater sociocultural sim...
Academic institutions invest considerable resources in improving the website quality of their
MBA courses, in the hope of increasing student retention and willingness to recommend the programs
to others. Despite this investment, it seems that the old "keep it simple" rule is also true for
e-learning. Data collected from students enrolled in a blend...
At the core of sociolinguistic theory is the recognition that men and women when engaging in an open conversation communicate differently because of their different respective social objectives in communication. Oral conversations are, according to sociolinguists, akin to cross cultural conversations and hence the tendency toward same-gender conver...
In the ITC cross-cultural literature, we often talk about the differences among peoples and how their respective culture and history may affect their adoption and preference usage patterns of ITC. However, do we really need to look that far to find such cross-cultural differences? Considering language is one of the major defining attributes of cult...
Maintaining student satisfaction and through it retaining students and having them recommend the program to others, is central to the success of any MBA program. This is especially important in distance learning programs because of their high dropout rates. The study shows the centrality of social norms outside the realm of the MBA program in deter...
Privacy issues are major concerns in disclosing sensitive personal information such as health-related information. This study investigates the impact of personal dispositions on forming privacy concern and trust in context of disclosing personal health information online, based on utility theory and prospect theory. The study is among the first to...
Increasing retention in MBA programs and having the students recommend it to others is crucial for the ongoing financial success of these programs. E-learning has been proposed as one way of doing so and many universities are investing heavily in improving the website quality of their courses. This study probes the effectiveness of these investment...