David C Yen

David C Yen
Miami University | MU · Department of Information Systems & Analytics

About

251
Publications
167,614
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
12,772
Citations

Publications

Publications (251)
Article
Full-text available
This review paper focuses on the application of neural networks in semiconductor packaging, particularly examining how the Back Propagation Neural Network (BPNN) model predicts the work-in-process (WIP) arrival rates at various stages of semiconductor packaging processes. Our study demonstrates that BPNN models effectively forecast WIP quantities a...
Article
Full-text available
Corruption represents the misuse of public power by government departments for personal gain, hindering a country’s economic growth. Corruption cannot be eliminated by implementing the national democratic system, and mature democratic countries also exist with varying degrees of corruption. Corruption affects people’s trust in the public sector and...
Article
Full-text available
The Industrial Internet of Things (IIoT) plays an important role in Industry 4.0, but the existing IIoT systems could be vulnerable to a single point of failure and malicious attacks, failing to provide reliable services. IIoT devices have some particularities, such as mobility, limited performance, and distributed deployment, which are challenging...
Article
Full-text available
In December 2019, Severe Special Infectious Pneumonia (SARS-CoV-2)–the novel coronavirus (COVID-19)– appeared for the first time, breaking out in Wuhan, China, and the epidemic spread quickly to the world in a very short period time. According to WHO data, ten million people have been infected, and more than one million people have died; moreover,...
Article
This study investigated the moderating effects of functional social support (emotional and instrumental support) on the relationship of job demand control with burnout and work engagement. In total, 297 frontline employees from a hotpot restaurant franchise in China were surveyed. The results indicated emotional support, such as caring and inspirat...
Article
Full-text available
Online auctions are now widely used, with all the convenience and efficiency brought by internet technology. Despite the advantages over traditional auction methods, some challenges still remain in online auctions. According to the World Business Environment Survey (WBES) conducted by the World Bank, about 60% of companies have admitted to bribery...
Article
Full-text available
Background: Health information can be more easily transmitted and diffused through the Internet, but questionable online health information often misinforms patients. Physicians have a duty to inform patients how to achieve positive health outcomes. Many physicians often write blogs to provide patients with the right health information. However, m...
Article
Full-text available
The purpose of this study is to elucidate the relationships between leader–member exchange (LMX), perceived organizational support (POS), presenteeism, and turnover intention as well as to test the mediating effect of presenteeism and the moderated mediating effect of POS. A total of 566 questionnaires were returned in technology industry to examin...
Article
Full-text available
In addition to the rapid development of global information and communications technology (ICT) and the Internet, recent rapid growth in cloud computing technology represents another important trend. Individual continuance intention towards information technology is a critical area in which information systems research can be performed. This study a...
Article
The study uses a novel psychological text-mining approach, language style matching (LSM), to examine the effect of the social interaction of top management team (TMT) members on conservative accounting reporting practices. We posit that similar language styles help to form consensus and social integration, leading to better cooperation in group dec...
Article
Electronic commerce and online marketplaces have rapidly become critical transaction channels. Many studies of online marketing have focused on the purchasing behaviors of general buyers. However, many business to business (B2B) e-marketplaces allow professional procurement personnel from various businesses to electronically search for and purchase...
Chapter
Many hospitals in Taiwan have started to encounter new and fierce competition as a result of the enactment of the National Health Insurance Policy in 1995. Hospitals should strive to use information technology (IT) strategically to improve their competitive advantage and meet the dynamic challenges in this competitive environment. This study adopts...
Article
Most developed countries across the globe are deploying electronic medical record (EMR) as one of the most important initiatives in their healthcare policy. EMR can not only reduce the problems associated with managing paper medical records but also improve the accuracy of medical decisions made by physicians and increase the safety of patients. Co...
Article
Full-text available
This study investigated the moderating effects of supervisor–subordinate “guanxi” alongside relevant emotional regulation strategies, including cognitive reappraisal and expressive suppression, undertaken by 402 firefighters experiencing burnout caused by work–family conflict, as revealed through the application and analysis of the job demands–reso...
Article
Full-text available
In the digital era, organizations are increasingly tasked with creating and utilizing new content, applications, and/or services through the use of advanced information and communication technologies (ICT) to sustain a competitive advantage. Indeed, sustainability is now an embedded and overarching feature of organizations’ strategic planning. Rese...
Article
This study proposes a quantitative method using the eXtensible Business Reporting Language financial accounting taxonomies to identify firms' common business characteristics and demonstrates that this graph mining approach can effectively identify industry boundaries. The premise of this method is based on the previous findings that financial accou...
Article
With the emergence of information technology (IT), many international companies capitalize on IT to improve their management and operation to obtain the competitive advantages. But, the implementation of IT investment in many companies has not been completely successful to achieve the expected goal and unfortunately result in the miserable forfeitu...
Article
Accounting regulatory changes that affect the information technology (IT) infrastructure of firms have prompted Chief Information Officers (CIOs) to take the lead in aligning IT changes with new reporting requirements. This study investigates the associations between the mandatory adoption of International Financial Reporting Standards (IFRS) and C...
Article
Full-text available
The objective of this study is to identify the financial statement fraud factors and rank the relative importance. First, this study reviews the previous studies to identify the possible fraud indicators. Expert questionnaires are distributed next. After questionnaires are collected, Lawshe’s approach is employed to eliminate these factors whose CV...
Article
Organizations use teams to generate novelty and useful ideas; thus, studying knowledge sharing in a team setting is important. It is essential to understand what and which factors drive the team members' high-quality knowledge contribution in a team meeting. Drawing on theories of social exchange and social capital, this paper proposes and empirica...
Article
The ongoing global trend moving towards digitization and the growing popularity of hand-held devices, such as smartphones and tablet computers, have created an exponential increase in the utilization rates and sales volumes of e-magazines. To understand the perceptions and opinions of e-magazines users, this study integrated the expectation-confirm...
Article
Full-text available
Previous studies have investigated diverse topics in the area of computer auditing. However, few studies have empirically examined internal audit performance. Therefore, the present study examines the influences of various competencies, team problem-solving ability, and computer audit activity on internal audit performance. This study employs a sur...
Article
Full-text available
The rise of global trade and economic development is not only apparently grown in terms of volume but with value as well. Such spurt has evoked the risk management that is associated with export business, and can allow high-tech items fall into the hands of foreign military programs or terrorist organizations. The internal control compliance for ex...
Article
In response to the trend in technology, critical success factors (CSFs) in current research projects are ranked differently from those in prior ones. This study investigates possible CSFs for the life cycle of an ERP system. This study also analyzes the effects of CSFs from the perspective of Information Technology Governance (ITG). Thirty-five CSF...
Article
Log management and log auditing have become increasingly crucial for enterprises in this era of information and technology explosion. The log analysis technique is useful for discovering possible problems in business processes and preventing illegal-intrusion attempts and data-tampering attacks. Because of the complexity of the dynamically changing...
Article
This research explores some factors affecting purchase and repurchase intentions towards online auctions. An experiment, in the context of PChome & eBay and Yahoo Auction online auctions websites, was conducted to simulate an environment manipulating branding, seller evaluation, volume of information, and price ranges to influence purchase intentio...
Article
Under increasing pressure from competitors and consumers, vendor-managed inventory (VMI), which is believed to be conducive to reducing inventory costs and improving distribution and sales, has been a popular system particularly in the retail industry. This present study, by adopting the modified Delphi method, attempts to identify key success fact...
Article
Many hospitals in Taiwan have started to encounter new and fierce competition as a result of the enactment of the National Health Insurance Policy in 1995. Hospitals should strive to use information technology (IT) strategically to improve their competitive advantage and meet the dynamic challenges in this competitive environment. This study adopts...
Article
Full-text available
The purpose of this study is to explore the moderating effect of Big Five personality traits on the relationship between the predictors (need for affiliation, need for popularity, and self-esteem) and self-disclosure on Facebook. The sample of this study is 354 Facebook users from 5 different cultures in East Asia. A partial least square structural...
Article
The driving force behind software development of the Electronic Medical Record (EMR) has been gradually changing. Heterogeneous software requirements have emerged, so how to correctly carry out development project has become a complex task. This paper adopts the knowledge engineering and management mechanism, i.e., CommonKADS, and software quality...
Article
The lack of regulations and disclosures regarding intangible capital has made it rather difficult for investors and creditors to evaluate a firm׳s intangible value before making the associated investment and loan decisions. This study represents an initial attempt to compare/contrast different types of machine learning techniques and identify the o...
Article
Many information systems' incidents result from inadequate protection of information assets. Assets classification and risks assessment procedures will no doubt help to identify the associated risks related to information systems for a better security control. In the banking industry, prior research and studies are rather lacking due to the nature...
Article
The uncertainties of transaction handling and consumer perception toward risk have been identified as some of the major problems causing consumers’ hesitance toward taking advantage of online payments. With the ever-growing implementation of trusting mechanisms for online payments, consumer confidence has greatly increased. This research explores t...
Article
Full-text available
This paper addresses the issues of measuring performance of service-oriented marketing. A measurement framework is provided and its application in a service-oriented company is illustrated. The result reveals that a holistic view for assessing service-oriented marketing is adequate, which includes at least finance, stakeholder, communication and pr...
Article
Organisational critical activities (OCAs) are activities which must receive constant and ongoing management attention in order for that organisation to be successful in its industry. These activities may not be well supported by an organisation's website, or the website not well aligned to the organisation's OCAs. This research first develops the n...
Article
In today's world, Botnet has become one of the greatest threats to network security. Network attackers, or Botmasters, use Botnet to launch the Distributed Denial of Service (DDoS) to paralyze large-scale websites or steal confidential data from infected computers. They also employ "phishing" attacks to steal sensitive information (such as users' a...
Article
Cloud computing has been one of the important topics in the IT domain in the 21st century. Among different features of the cloud computing technologies including super-large scale, dynamic scalability, and on-demand deployment, virtualization no doubt plays a central and critical role. Virtualization can be used to not only help to associate and in...
Article
The technology acceptance model (TAM) has been applied in various fields to study a wide range of information technologies. Although TAM has been developed in this research stream in Taiwan, TAM’s issues of measurement have received scant attention. A robust model must perform measurement invariance across different respondent subgroups to ensure t...
Article
Suffering from Alzheimer’s disease has become one of the critical health issues today. If an abnormal time-space pattern of such patients can be detected earlier, it will help the families to prevent some dangerous situations in advance. We have proposed a method in this study to uncover personal mobility patterns and detect abnormal behavior patte...
Article
The aim of bankruptcy prediction in the areas of data mining and machine learning is to develop an effective model which can provide the higher prediction accuracy. In the prior literature, various classification techniques have been developed and studied, in/with which classifier ensembles by combining multiple classifiers approach have shown thei...
Article
There have been lots of copyright protection scheme in previous studies; however, most of them only emphasize on publisher’s copyright protection except customer’s ownership protection. In this paper, we propose a digital right protection mechanism to resolve both the publisher’s copyright and customer’s ownership protection issues related to digit...
Article
After the occurrence of numerous worldwide financial scandals, the importance of related issues such as internal control and information security has greatly increased. This study develops an internal control framework that can be applied within an enterprise resource planning (ERP) system. A literature review is first conducted to examine the nece...
Article
With the advancement in information technology, enterprises have invested vast resources in implementing information systems that undoubtedly come with higher expectations and hopes of improving the operational efficiency of, and bringing competitive advantages to, enterprises. From the viewpoint of quality management, the quality of information sy...
Article
A growing body of research promotes the importance of trust in the business-to-consumer e-commerce environment. However, there has been little research on consumer trust in the new frontier of consumer-to-consumer (C2C) online auctions. The current study investigates the factors that influence bidders’ trust in online auctions from seller (trust ar...
Article
Full-text available
With the advances in communication and location-based technology, location-based advertising has been used frequently for mobile advertising. However, scholarly works regarding location-based advertising are still few and far between. This study examines the significance of association between format of advertisement, product involvement, privacy,...
Article
The web-based appointment system (WAS) is considered one of the major Internet services provided by e-hospitals. Because the very high adoption rate of WAS in the public medical centers in Taiwan, this research investigates the current status of its implementation and examines the factors affecting the user acceptance of WAS by integrating the Tech...
Article
Full-text available
This study investigates the factors that affect e-loyalty in e-commerce websites. The e-loyalty model proposed in this study is based on DeLone and McLean’s IS Success Model. E-loyalty is explained using three independent factors (information quality, system quality, and service quality), and two mediating factors (trust and customer satisfaction)....
Article
Full-text available
This study extends the Technology Acceptance Model (TAM) by incorporating relationship quality as a mediator to construct a comprehensive framework for understanding the influence on continuance intention in the hospital e-appointment system. A survey of 334 Taiwanese citizens who were contacted via phone or the Internet and Structural Equation Mod...
Article
Business-to-government integration (B2Gi) requires the development of a unique, inter-organizational integration framework to meet the dynamic requirements of various business entities and government organizations. The authors proposed a conceptual framework for the inter-organizational integration service provider (IISP) as a philosophical and str...
Article
Disaster from computer viruses has been ranked at the top of computer crime incidents by CSI/FBI. However, many anti-virus systems have high latency and consume a lot in the available CPU resources for malicious code filtering. Nevertheless, switching or updating anti-virus software within different operating systems is costly, tedious, and annoyin...
Article
To avoid fraud behavior and ensure product data quality throughout the stages of product lifecycle management, the demand for the computer audit is increasing in the engineering and manufacturing industries. Enterprises have paid much attention to the implementation of product data management/product lifecycle management (PDM/PLM) systems in which...
Article
Full-text available
Accessibility of much country-level information and many web services, originating from governments are a global standard. The governments of emerging economies in the eastern countries especially need to adopt, without undue delay, the advanced technologies for providing better web services to their citizens. However, consideration and evaluation...
Article
Core capabilities are critical abilities that enhance and sustain an organization’s competitive advantage in extremely competitive environments. In today’s complex and dynamic business environment, companies are often prevented from effectively and efficiently evaluating relevant factors necessary for developing their core capability strategic syst...
Article
Cloud computing technology has become more and more utilized in business application in today’s industrial fields. In general, many business systems developed based on web services are indeed heterogeneous software systems that process business data by complying with integrated business rules. Web services have until recently been regarded as softw...
Article
After-sale service now goes beyond a mere value-added benefit to a revenue generating activity for return business. This study looks into service convenience and service quality for their effect on return intention. The original dimensionality of service quality is partly confirmed, but the identified dimensions had a varying effect on future retur...
Article
The purpose of this study was to investigate the relations of information, organisation and environment on the supply chain partner’s commitment using data from the auto parts industries listed in the Taiwan External Trade Development Council. Low levels of environmental uncertainty within the context of supply chain relationships with higher level...
Article
Even the ubiquity of technology can make many aspects of life more convenient, it may simultaneously raise some concerns about the privacy issues related to the personal information. This research focused on individual's behavior on self-disclosure online and his/her cognition on personal privacy that was affected by not only the personal psycholog...
Article
Although anchoring effect is a robust phenomenon and has been discussed in different decision making domains, related research efforts in the Internet purchasing domain are still lacking. Furthermore, little research has been conducted to examine the role of individual differences (e.g. product familiarity and confidence level) in the anchoring eff...
Article
This research proposes a new active queue management method (or FPID) to improve network congestion, which integrates the random early detection (RED) method and fuzzy proportional integral derivative (FuzzyPID) approach. Fuzzy theory applied together with PID helps control the buffer queue within the target. This article provides the literature an...
Article
Computer mediated communication (CMC) technologies have benefited business organizations in many ways. Although there have been numerous studies on email use, studies have only begun to emerge regarding use patterns of instant messaging (IM). This study investigated the use of email and IM within two different cultural settings: United States and T...
Article
Currently, tax authorities face the challenge of identifying and collecting from businesses that have successfully evaded paying the proper taxes. In solving the problem of tax evaders, tax authorities are equipped with limited resources and traditional tax auditing strategies that are time-consuming and tedious. These continued practices have resu...
Article
Outsourcing is important in highly diversified business environments, but while there have been many studies on outsourcing, none have explicitly tackled the problem of how SMEs should assess and select their outsourcer. Numerous benefits might be gained if SMEs could utilize evaluation models to help select their IT/IS outsourcer effectively. Prej...
Article
Full-text available
Many countries have devoted increasing attention to information infrastructures. However, a gap in digitalization exists among different government agencies, causing unequal opportunities for accessing infrastructures, information, and communication technologies. This paper, based on Gowin’s Vee structure, is an empirical study of the digital divid...
Article
It is very important for investors and creditors to understand the critical factors affecting a firm’s value before making decisions about investments and loans. Since the knowledge-based economy has evolved, the method for creating firm value has transferred from traditional physical assets to intangible knowledge. Therefore, valuation of intangib...
Article
Full-text available
The effectiveness and efficiency of the internal business process of an enterprise are closely associated with its information system. The performance of an information system depends on its complete integration with the different departments of an organisation. This study attempts to simulate Six Sigma and offer the improvement methods of Six Sigm...
Article
With the increasing mobility of the population, Electronic Medical Records (EMRs) become a promising opportunity for governmental investment to many countries. An EMR project usually involves a huge grant and needs tight control of the output. However, most measuring tools for the quality of paper-based medical records placed a focus on data format...
Article
Despite all the research investigating the impact of data and information technology (IT) breaches to the market value of the breached firms, few studies explore the effects of breach events on the stock price of consulting firms that supplies the know-how and infrastructure to create, implement and maintain those information systems that were hack...
Article
Purpose As business globalisation and internet usage continue to grow, the internet‐based version of data warehouse systems (DWS) is expected to improve traditional DWS. However applying the web‐based interfaces to client‐server‐based DWS structures may cause problems such as inflexibility, inefficiency, loss of scalability, and threats to security...
Article
Pandemic influenza is considered catastrophic to global health, with severe economic and social effects. Consequently, a strategy for the rapid deployment of essential medical supplies used for the prevention of influenza transmission and to alleviate public panic caused by the expected shortage of such supplies needs to be developed. Therefore, we...
Article
The primary purpose of this research was to explore a comparative analysis of the “Web Content Accessibility Guidelines (WCAG)” standard in Taiwan and the international WCAG standards (WCAG 1.0/WCAG 2.0). The WCAG in Taiwan was established by the Research, Development and Evaluation Commission (RDEC), Executive Yuan in 2002. The WCAG 1.0 was establ...
Article
A significant amount of work has been done to better understand the barriers to knowledge flow and develop models of KM maturity; this was intended to help in assessing the progress of KM initiatives in the firm. However, to date there has been no comprehensive research that considers both these issues at the same time, and thus it is still necessa...
Chapter
Small and Medium-sized Enterprises (SMEs) play a vital and pervasive role in the current development of Taiwan’s economy. Recently, the application of Enterprise Resource Planning (ERP) systems have enabled large enterprises to have direct contact with their clients via e-commerce technology, which has led to even fiercer competition among the SMEs...
Article
This paper develops and tests a new factor of the trust model in electronic commerce; namely, internet banking. Internal control of internet banking is very consistent with high levels of trust factors such as security, privacy, and other risk issues. However, this type of association has not yet been widely recognized as a trusted model from the c...
Article
Full-text available
Since the service-oriented ERP systems have become essential to SMEs, the service quality of IS characteristics and the user's internal expectations are considered the key factors of ERP success. With the purpose of understanding how service quality influences user's satisfaction through psychological constructs, based on the Social Cognitive Theor...
Article
Web technology is changing rapidly every day and the internet has become a lifestyle for people all over the world. The power of the web has changed the way people communicate and do business. With the advance of the internet era, a successful website becomes a critical factor for the success of most businesses. Website design is not only about the...
Article
The current research presents a theoretically sound model of the effects of the characteristics of information systems (IS) on the perception of end-users regarding computer self-efficacy and outcome expectations. The relationships among factors of small- and medium-sized enterprises in Taiwan are examined based on the IS success model and social c...
Article
Six Sigma concept depicts a ‘Triangle Relationship’ that integrates three attributes such as customer quality, science manners and team work. By employing this concept with the required survey and data collection to carry out the continuous improvement, a company can truly take advantage of the minimum set of operational variables and the lowest co...
Article
Full-text available
Previously completed research has not been significant when regarding the aspect of deriving a model for measuring the performance of an Enterprise Resource Planning (ERP) system. Therefore, this research attempts to present an objective and quantitative assessment model based on the Balance Scorecard approach for the purpose of appraising the perf...
Article
The improvement of information technology makes storage no longer a problem. In addition, the birth of the Internet makes information transfer faster than ever. It brings us convenient life. However, more and more information result in a new problem, which is information overload. Today, many more people are traveling abroad since they no longer ha...
Article
The recent focus within the auction field has been multi-item auctions where bidders are not restricted to buying only one item of the merchandise. It has been of practical importance in Internet auction sites and has been widely executed by them. In this paper, we concentrate on the use of the multi-item auction for task assignment scenarios and p...
Article
This study focuses on smart phone acceptance in a major delivery service company in Taiwan. Technology Acceptance Model (TAM) was tested in two different forms, the original and with self-efficacy added. A two-dimensional improvement to the theory of self-efficacy was investigated in this research. Only assisted self-efficacy was related to both pe...
Article
The Department of Health of Executive Yuan in Taiwan (R.O.C.) is implementing a five-stage project entitled Electronic Medical Record (EMR) converting all health records from written to electronic form. Traditionally, physicians record patients' symptoms, related examinations, and suggested treatments on paper medical records. Currently when implem...