James Y. L. Thong

James Y. L. Thong
The Hong Kong University of Science and Technology | UST · Department of Information Systems, Business Statistics and Operations Management

PhD

About

60
Publications
59,294
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
20,943
Citations
Citations since 2016
11 Research Items
14600 Citations
201620172018201920202021202205001,0001,5002,0002,500
201620172018201920202021202205001,0001,5002,0002,500
201620172018201920202021202205001,0001,5002,0002,500
201620172018201920202021202205001,0001,5002,0002,500
Education
July 1992 - November 1996
National University of Singapore
Field of study
  • Information Systems
July 1990 - June 1992
National University of Singapore
Field of study
  • Information Systems

Publications

Publications (60)
Article
Full-text available
This research examines the relationship between service design and citizen satisfaction with e‐government services. Based on a multidimensional conceptualization of service, we define three key service perceptions, each comprising different design characteristics, that jointly influence perceived service quality and citizen satisfaction with e‐gove...
Article
Full-text available
A popular information security-related motivation theory is the Protection Motivation Theory (PMT) that has been studied extensively in many information security contexts with promising results. However, prior studies have found inconsistent findings regarding the relationships within PMT. To shed light on these inconsistent findings, we introduce...
Article
Full-text available
Despite the popular use of animated banner ads on websites, extant research on the effects of web animation has generated mixed results. We argue that it is critical to identify feature-level animation characteristics and examine their individual and combined effects on capturing online consumers’ attention across different task conditions. We iden...
Article
Full-text available
This paper investigates the drivers and inhibitors of Internet privacy concern. Applying the Multidimensional Development Theory to the online environment, we identify the important factors under four dimensions—i.e., environmental, individual, information management, and interaction management. We tested our model using data from an online survey...
Article
Full-text available
Agile methods are widely used in the software industry as a way to more rapidly develop and deliver new software. They define iterative work processes, advocate self‐organization and openness for change, and prescribe how software developers interact with each other and external stakeholders. Despite their popularity, it is unclear how agile method...
Article
Full-text available
As new information technology (IT) platforms continue to emerge, the technical project risk associated with developing IT projects for these platforms is particularly challenging for organizations. We develop a nomological network of people, process, and technology to gain insight into how the effect of technical project risk can be mitigated at th...
Article
Full-text available
This paper examines the role of parenting behaviors in influencing children’s Internet addiction and the consequences of children’s Internet addiction on parents’ job outcomes. First, we draw on attachment theory to theorize that five parenting behaviors (ie, parental control, monitoring, unstructured time, dissuasion, and rationalization) affect c...
Article
Full-text available
Websites commonly use animation to capture the attentional resources of online consumers. While prior research has focused on the effects of animation on animated banner ads, limited research has examined the effects of animation on other items on the same webpage. Drawing from psychological theories that the amount of an individual’s attentional r...
Article
Full-text available
We investigate how information and communication technology (ICT) service providers can win back disadopters of an earlier generation of technology when a new technology generation appears on the market. Integrating prior research on consumers’ defensive bias, knowledge accessibility, diffusion of innovation, and technology adoption, we developed a...
Article
Full-text available
The unified theory of acceptance and use of technology (UTAUT) is a little over a decade old and has been used extensively in information systems (IS) and other fields, as the large number of citations to the original paper that introduced the theory evidences. In this paper, we review and synthesize the IS literature on UTAUT from September 2003 u...
Article
Full-text available
This paper investigates how citizens’ uncertainty in e-government services can be managed. First, we draw from uncertainty reduction theory, and propose that transparency and trust are two key means of reducing citizens’ uncertainty in e-government services. Second, we identify two key sets of relevant drivers of e-government service use: (1) infor...
Article
Full-text available
This paper examines the effects of information and communication technology (ICT) service innovation and its complementary strategies on brand equity and customer loyalty toward ICT service providers. We draw from research on brand equity and customer loyalty, ICT innovation management, and strategy complementarity to propose a model that includes...
Article
Full-text available
This paper discusses the value of context in theory development in information systems (IS) research. We examine how prior research has incorporated context in theorizing and develop a framework to classify existing approaches to contextualization. In addition, we expound on a decomposition approach to contextualization and put forth a set of guide...
Article
Full-text available
Internet privacy concerns (IPC) is an area of study that is receiving increased attention due to the huge amount of personal information being gathered, stored, transmitted, and published on the Internet. While there is an emerging literature on IPC, there is limited agreement about its conceptualization in terms of its key dimensions and its facto...
Article
Full-text available
This paper extends the unified theory of acceptance and use of technology (UTAUT) to study acceptance and use of technology in a consumer context. Our proposed UTAUT2 incorporates three constructs into UTAUT: hedonic motivation, price value, and habit. Individual differences — namely, age, gender, and experience — are hypothesized to moderate the e...
Article
Full-text available
Advances in Internet technologies have led to the popularity of technology-based self-services, with the design of such services becoming increasingly important. Using technology-based services in the public sector as the setting, we identified the key service attributes driving adoption and use of transactional e-government services, and citizens’...
Article
Full-text available
In today's information and communication technology (ICT)-enabled service economy, there is great interest in digital service management. While the extant technology acceptance research has mainly studied user acceptance of various ICTs, there is a dearth of research on consumer acceptance of personal ICT services. In this paper, we extend the unif...
Article
Full-text available
This study presents two extensions to the two-stage expectation confirmation theory of information systems (IS) continuance. First, we expand the belief set from perceived usefulness in the original IS continuance model to include three additional predictors identified in the unified theory of acceptance and use of technology, namely effort expectancy...
Article
Full-text available
In response to the rapid changes in users’ requirements, a new generation of information systems (IS), namely, agile IS, has emerged. Agile IS, defined as information systems developed using agile methods, are characterized by frequent upgrades with a small number of new features released periodically. The existing research on agile IS has mainly f...
Article
Full-text available
While technology adoption is a major stream of research in information systems, few studies have examined the antecedents and consequences of mandatory adoption of technologies. To address this gap, we develop and test a model of mandatory citizen adoption of an e-government technology. Based on a framework that outlines the key stages associated w...
Article
Word-of-mouth (WOM) study is extended to the on-line context (eWOM) by examining the informational and normative determinants of the perceived credibility of on-line consumer recommendations. A survey of users of an on-line consumer discussion forum ...
Article
To facilitate online negotiations, this paper proposes a reservation price reporting mechanism (RPR) and its extended version (ERPR), in which negotiators are invited to report their reservation price to a third-party system before initiating negotiations. ...
Article
Full-text available
It is widely believed that systems development methodologies (SDMs) can help improve the software development process. Nevertheless, their deployment often encounters resistance from systems developers. Agile methodologies, the latest batch of SDMs that are most suitable in dealing with volatile business requirements, are likely to face the same ch...
Article
Full-text available
This article examines the determinants of service quality and continuance intention of online services. We proposed and empirically tested a model with both service and technology characteristics as the main drivers of service quality and subsequent continuance intention of eTax, an electronic government (eGovernment) service that enables citizens...
Article
Full-text available
Due to rapid advances in the Internet and wireless technologies, a ubiquitous computing world is becoming a reality in the form of mobile computing. At the center of this phenomenon is mobile data services which arise from the convergence of advanced mobile communication technologies with data services. Despite the rapid growth in mobile data servi...
Conference Paper
Full-text available
Short message service (SMS) has become an integral part of people's lives. It is one of the most popular services for mobile communications. This paper examines the determinants of user intention to use SMS. We proposed and empirically tested a model with seven main determinants of user acceptance and two key moderators (i.e., gender and region). O...
Article
Full-text available
Prior research on Web animation typically focuses on banner ads, where the findings suggest that users are capable of ignoring the animation when performing online tasks. Research on non-banner-ads animation (e.g., animation applied to the main content of an e-commerce Web site), however, is relatively scarce with inconclusive results. We propose t...
Article
Full-text available
This study examines the utility of three prospective models for understanding the continued IT usage behavior. The three models include: Expectation-Confirmation Model in IT Domain (ECM-IT), Technology Acceptance Model (TAM), and a hybrid model integrating TAM and ECM-IT (extended ECM-IT). Based on a survey of 1826 mobile Internet users, the LISREL...
Article
Full-text available
The expectation-confirmation model (ECM) of IT continuance is a model for investigating continued information technology (IT) usage behavior. This paper reports on a study that attempts to expand the set of post-adoption beliefs in the ECM, in order to extend the application of the ECM beyond an instrumental focus. The expanded ECM, incorporating t...
Article
Purpose The short message service (SMS) has been available in Hong Kong and China since the late 1990s. However, the user acceptance patterns for this service have been evidently different in these two regions. Based on fieldwork in Hong Kong and China, this study attempts to explain these differences. Design/methodology/approach The paper uses th...
Article
Full-text available
Various recommendations for increasing user acceptance of digital libraries are discussed. There are there categories of external factors that may impact user acceptance of digital libraries which include interface characteristics, organizational context and the individual difference users. Interface characteristics include terminology clarity, scr...
Article
Full-text available
Web interface design is of enduring interest to researchers as online shopping on the Internet continues to grow. Prior research has shown that the design of product listing pages, where information on multiple products are displayed together to allow further exploration of any of them, has a great influence on the traffic and sales volume on a web...
Article
Full-text available
The proliferation of information on the Internet poses a significant challenge on humans' limited attentional resources. To attract online users' attention, various kinds of animation are widely used on websites. Despite the ubiquitous use of animation, there is an inadequate understanding of its effect on attention. Focusing on flash animation, th...
Article
Full-text available
Artificial neural networks have been successfully applied to a variety of business application problems involving classification and regression. They are especially useful for regression problems as they do not require prior knowledge about the data distribution. In many applications, it is desirable to extract knowledge from trained neural network...
Article
Full-text available
A feature central to the success of e-commerce Web sites is the design of an effective interface to present product information. However, the suitability of the prevalent information formats in supporting various online shopping tasks is not known. Using the cognitive fit theory as the theoretical framework, we developed a research model to investi...
Article
Full-text available
Theft of software and other intellectual property has become one of the most visible problems in computing today. This paper details the development and empirical validation of a model of software piracy by individuals in the workplace. The model was developed from the results of prior research into software piracy, and the reference disciplines of...
Article
Full-text available
This paper provides an empirical analysis of the effects of telecommunications liberalisation on the fixed line telecommunications operators' strategy formulation in Hong Kong. The analysis is based on an innovative experimental methodology to measure the level of quality of the major telecommunications operators in an international simple resale-b...
Article
Business Process Reengineering is a discipline in which extensive research has been carried out and numerous methodologies churned out. But what seems to be lacking is a structured approach. In this paper we provide a review of BPR and present 'best of breed ' methodologies from contemporary literature and introduce a consolidated, systematic appro...
Article
Full-text available
Digital library research efforts originating from library and information scientists have focused on the technical development. While millions of dollars have been spent on building “usable” digital libraries, previous research indicates that potential users may still not use them. This study contributes to understanding user acceptance of digital...
Article
This issue is based on three outstanding articles presented at the Fourth Pacific Asia Conference on Information Systems held in Hong Kong from June 1 through 3, 2000. The articles are concerned with various knowledge management issues in the Internet era. To meet the quality of this journal, expanded versions of the conference articles went throug...
Article
Full-text available
The introduction of resale-based competition in international direct dialing services in January 1999 triggered a round of extremely fierce competition in Hong Kong's IDD market. In response, both the incumbent operator and new entrants had to adopt aggressive strategies to defend or gain market share. This article reports on an intensive experimen...
Article
Full-text available
While the information systems (IS) literature has identified potential factors of IS implementation success, none has investigated the relative importance of these factors in the context of small businesses. Small businesses have very different characteristics from large businesses; notably, small businesses suffer from resource poverty. Without kn...
Article
Full-text available
The explosion in Internet usage and huge government funding initiatives in digital libraries have drawn attention to research on digital libraries. Whereas the traditional focus of digital library research has been on the technological development, there is now a call for user-focused research. Although millions of dollars have been spent on buildi...
Conference Paper
Artificial neural networks have been successfully applied to solve a variety of business applications involving classification and function approximation. In many such applications, it is desirable to extract knowledge from trained neural networks so that the users can gain a better understanding of the solution. Existing research works have focuse...
Article
Full-text available
The information systems (IS) profession is a stressful profession. However, there is little theoretical or empirical research on the effects of occupational stress on IS professionals. A major reason is because IS professionals and researchers are unaware of the consequences of occupational stress and unfamiliar with the occupational stress literat...
Article
Full-text available
Our existing knowledge of business process reengineering (BPR) is mainly derived from the experiences of private sector organizations, which have fundamentally different characteristics from public organizations. This paper represents a first step in understanding how BPR may be different in public organizations. Drawing on the public administratio...
Article
Full-text available
Based on theories from the technological innovation literature, this study develops an integrated model of information systems (IS) adoption in small businesses. The model specifies contextual variables such as decision-maker characteristics, IS characteristics, organizational characteristics, and environmental characteristics as primary determinan...
Article
Full-text available
Interest in the application of neural networks as tools for decision support has been growing in recent years. A major drawback often associated with neural networks is the difficulty in understanding the knowledge represented by a trained network. This paper describes an approach that can extract symbolic rules from neural networks. We illustrate...
Article
Full-text available
There is a lack of both theoretical and empirical research on the process of ethical decision making in the domain of information Systems (IS). As a step in this direction, we describe and test a general ethical decision-making theory developed in the marketing discipline. We conducted a study on the ethical decision-making process of 243 entry-lev...
Conference Paper
Full-text available
Recent research suggests that it may be useful to explore IT implementation issues from the perspective of organizational learning. Based on the work of Robey et al. (1995), a model is proposed that conceptualizes IT implementation within the context of organizational learning. The proposed model is tested through a case study of a major insurance...
Article
Full-text available
The Small Enterprise Computerization Programme (SECP) was introduced by the Singapore Government to encourage and aid computerization in small businesses. The programme incentives include information technology (IT) seminars, the provision of technical expertise in the forms of advisers and consultants and various financial subsidies and loans. Thi...
Article
Full-text available
Top management support and external information systems (IS) expertise, in the forms of consultants and vendors, have been identified as 2 key factors for effective IS implementation in small businesses. This article proposes a framework for IS implementation in small businesses. The framework is based on high-low combinations of top management sup...
Article
The Small Enterprise Computerisation Programme (SECP) was introduced by the Singapore government in 1986 to encourage and aid computerisation in small businesses. The programme incentives include educational information technology (IT) seminars, provision of technical expertise in the forms of advisors and consultants, and various financial subsidi...
Article
Full-text available
Information systems (IS) effectiveness is a complex variable. The literature on organizational effectiveness suggests that it may not be possible to find a precise measure of IS effectiveness and the criteria for effectiveness may vary from organization to organization. A popular perceptual construct, user satisfaction, is examined through a review...
Article
Full-text available
Top management support is a key recurrent factor critical for effective information systems (IS) implementation. However, the role of top management support may not be as critical as external IS expertise, in the form of consultants and vendors, in small business IS implementation due to the unique characteristics of small businesses. This paper de...
Article
Full-text available
The importance of information technology (IT) to businesses is widely acknowledged. Yet, while large businesses have been using computers for some time, small businesses have been slow in adopting IT. The literature on technological innovation suggests that there are two main classes of variables that are important in determining adoption of an inn...
Article
Full-text available
Most small businesses lack computer experience and do not have sufficient internal computer expertise. Hence, small businesses are more dependent on external expertise such as consultants and vendors than are larger businesses. This paper compares the information systems (IS) effectiveness of a group of small businesses that engage separate consult...
Article
Full-text available
This study examines the impact of a government incentive programme on computerisation in small businesses in Singapore. It compares the computerisation experience of 40 small businesses which have participated in the programme with that of 40 small businesses which have computerised without government assistance. The main finding is that participat...
Conference Paper
The importance of top management support in information systems (IS) implementation has been emphasized in previous IS studies. But, is it really that important? This paper describes an empirical investigation of the influence of CEO support on IS effectiveness in 114 small businesses. The results show that CEO support has a significantly positive...

Network

Cited By

Projects

Project (1)