About
10
Publications
16,136
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
265
Citations
Introduction
Current institution
Additional affiliations
January 2020 - present
Publications
Publications (10)
Purpose
Amid the coronavirus disease 2019 (COVID-19) pandemic, higher education institutions (HEI) all over the world have transitioned to online teaching. The purpose of this study is to examine the impact of technostress and negative emotional dissonance on online teaching exhaustion and teaching staff productivity.
Design/methodology/approach
S...
This paper examines the factors that influence customers’ trust in the ride hailing service (RHS). RHS faces legal, social, and safety concerns making trust critical in using RHS. Drawing on legitimacy and uncertainty reduction theories, the authors propose a theoretical framework of the antecedents of trust. This paper develops a survey instrument...
IS service delivery failures inside companies are value diminishing events. Information systems service providers seek to limit this value destruction but lack guidance on IS incident resolution actions that satisfy users and preserve IS service value. We apply Service-Dominant Logic (SDL) to explore what is relevant to users’ recovery service expe...
Purpose
Mobile device users are frequently faced with a decision to allow access to their personal information that resides on their devices in order to install mobile applications (apps) and use their features. This paper examines the impact of satisfaction on the intention to allow access to personal information. The paper achieves this by acknow...
Despite the adverse consequences associated with playing risky online games, their popularity is increasing. Prior literature on online games has focused on identifying adoption factors without taking associated risks into consideration. In this study, we examine the factors that drive individuals to play online games in the presence of cybersecuri...
Purpose
Information technology is associated with psychological and physical risks such as high stress levels and antisocial behavior. The purpose of this paper is to understand why people engage in technology risk behavior, despite the negative consequences that might follow. Focusing on online games, this study identifies factors that affect indi...
Although the performance of Humanitarian Supply Chain (HSC) receives considerable attention in current literature, measuring HSC performance remains challenging. HSC performance depends largely on the ability to meet the needs of the sufferers which contradicts with current performance measures that focus on input metrics such as donations and expe...
In today's era of big data, business intelligence and analytics, and cloud computing, the previously elusive goal of data monetization has become more achievable. Our analysis of a four-stage journey of a leading U.S. retailer identifies the potential benefits and drawbacks of data monetization. Based on this company's experiences, we provide lesso...
The notion of privacy calculus has been used to explain the risk-benefit analysis information technology users perform when asked to provide personal information. This study extends the privacy calculus model by proposing a theoretical framework in which technology characteristics (radicalness and complexity) have moderating effects on the benefit-...
The Information Service Function (ISF) delivers IS services to internal customers (employees) to assist them in their information- and technology-related tasks. IS service failures are an inevitable event and the ISF must enact processes to recover from these failures. This article proposes a theoretical framework integrating literature from market...