
Jing Wang- University of New Hampshire
Jing Wang
- University of New Hampshire
About
28
Publications
7,667
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
873
Citations
Current institution
Publications
Publications (28)
This paper aims to identify breach- and firm-level characteristics that may account for the heterogenous stock market reaction to data breaches. Drawing upon the screening theory, this paper examines the possibility of three breach characteristics (breach severity, breach locus, and breach controllability) and two firm attributes (CEO stock ownersh...
Despite attempts by social media companies to curb the spread of fake news with warnings flagging news credibility, the effectiveness of such measures remains unclear. Through the lens of the cognitive dissonance theory and individuals’ trust in the news, this study develops a theoretical model that explains why and how warnings affect an individua...
Despite the significant advancements made in understanding the factors that drive employees' compliance and noncompliance behaviours with information security policy (ISP), less is known about how different factors interact to impact such behaviours. Having been drawn on the social information processing theory, this research develops an integrativ...
This study integrates perspectives from the literature on science parks, environment dynamism, and on the resources-based view of the firm, to develop an integrative model of the park location value to resident firms. Consistent with our theorizing, the externalities generated by the science park, the firm’s idiosyncratic endowment in a wide range...
Despite the significant financial losses associated with data breaches, little is known about the (in)effectiveness of the tools that firms have to protect their value following a breach. Drawing on cognitive dissonance theory and the research on cue diagnosticity and crisis management, this study examines the relative efficacy of firm reputation a...
Both outsourcing strategy and choice of vendors have the potential to influence the success of information technology outsourcing (ITO) initiatives. However, the ways in which these factors combine leading to success in outsourcing has not received much attention in prior research. Accordingly, this study explores the patterns of ITO strategy and v...
The success of multifunctional friend networking (MFN) sites such as Facebook directly relies on users’ continuous participation and content contribution. Information systems and marketing literature offers competing models and perspectives that explain users’ development of continued usage intention of a technology. Drawing on the dual-process the...
Drawing on previous literatures in entrepreneurship and information systems, we examine how entrepreneurial intentions develop in emerging technology industries. We find that in addition to traditional determinants of intention such as perceived desirability and perceived feasibility, personal innovativeness in technology and related knowledge and...
This paper uses a large data set of Free Open Source Software (FOSS) projects obtained from SourceForge.net to investigate survival factors at various stages of a FOSS project's lifecycle. It distinguishes FOSS projects that are still at the initial stage of development from those at the growth stage, and posits that the relative importance of the...
The development model of free open source software (FOSS) provides important managerial lessons for knowledge creation, innovation, and software and new product development. Yet many unanswered questions exist regarding why certain FOSS projects succeed while others fail. Drawing on social capital theory and human agency theory, this study proposes...
The assumption that experts can make approximately optimal subjective and unaided decisions underlies some parameter estimation methods and decision support approaches. We developed experimental testing software and evaluated the performance of student subjects in this kind of decision making for an operational business planning problem having thre...
While the benefits of incorporating Open Source Software (OSS) into personal and organizational systems have been widely touted, OSS must be adopted and used by end users before these benefits can be realized. Drawing on research in information systems and sociology, this study develops and evaluates an integrated model for the acceptance of OSS. I...
Both outsourcing strategy and choice of vendors have the potential to influence the success of information technology outsourcing (ITO) initiatives. However, the ways in which these factors combine leading to success in outsourcing has not received much attention in prior research. Accordingly, this study explores the patterns of ITO strategy and v...
This article examines how price cues can be used strategically to influence consumers' perceptions and bid judgments in Name-Your-Own-Price (NYOP) auctions. It focuses on three specific types of price cues: a low and plausible price cue, a high but implausible price cue, and a range price cue that is bounded at the upper end by the high price cue a...
Merger and acquisition (M&A) activity has many strategic and operational objectives. One operational objective is to develop common and efficient information systems that can be the source of creating significant cost savings for the joined companies. In combining the IS divisions of the acquiring firm with that of the acquired firm there are many...
This study develops a typology that permits the classification of free open source software (FOSS) users into market segments. Based on the typology the nature and extent of perception differences between core FOSS users and FOSS users in other market segments is examined. Significant perception differences are observed between users in different m...
The question of whether or not IT outsourcing initiatives deliver economic value to firms is an important yet under examined one. This study extends extant outsourcing literature by evaluating how firm value is created through IT outsourcing. Using Porter’s Value Chain Model as the theoretical framework, the study systematically traces and measures...
This paper explores knowledge sharing using an agent-based simulation model. Built using Repast, our application allows managers to simulate employee knowledge-sharing behaviors by making parametric assumptions on employee decision strategies and organizational interventions that affect identifiability, benefits, and costs. Our results show that in...
Improvements in technology have led to innovations in training such as Electronic Learning (E-learning). E-learning aims to help organizations in their training initiatives by simplifying the training process and cutting cost. It also attempts to help employees in their learning processes by making learning readily accessible. Unfortunately, the di...
Improvements in technology have led to innovations in training such as Electronic Learning (E-learning). E-learning aims to help organizations in their training initiatives by simplifying the training process and cutting cost. It also attempts to help employees in their learning processes by making learning readily accessible. Unfortunately, the di...
Increasingly, organizations are jumping onto the information technology (IT) outsourcing bandwagon in an effort to create value. However, evidence indicating the positive economic consequences of such initiatives has been limited. This study attempts to fill this void by synthesizing the process-oriented research in IT business value literature and...
This chapter highlights the promise and importance of reverse multi-attribute auctions (RMAA). It outlines the major benefits of RMAAs over other traditional auction mechanisms, such as reverse single attribute auctions, and then presents a structured and critical assessment of the current state of RMAA research. The intention of this chapter is no...
Improvements in technology have led to innovations in training such as Electronic Learning (E-learning). E-learning aims to help organizations in their training initiatives by simplifying the training process and cutting cost. It also attempts to help employees in their learning processes by making learning readily accessible. Unfortunately, the di...
Improvements in technology have led to innovations in training such as Electronic Learning (E-learning). E-learning aims to help organizations in their training initiatives by simplifying the training process and cutting cost. It also attempts to help employees in their learning processes by making learning readily accessible. Unfortunately, the di...
This chapter highlights the promise and importance of reverse multi-attribute auctions (RMAA). It outlines the major benefits of RMAAs over other traditional auction mechanisms, such as reverse single attribute auctions, and then presents a structured and critical assessment of the current state of RMAA research. The intention of this chapter is no...
The past decade has seen dramatic changes in the modern organization with virtual organizations (VOs) becoming an increasingly common form of economic enterprise (Lucas & Baroudi, 1994). Much of this change has been accelerated by advances in information and communication technology (ICT) as well as a contemporary globalized knowledge economy. Virt...