Mohammad Najjar

Mohammad Najjar
Verified
Mohammad verified their affiliation via an institutional email.
Verified
Mohammad verified their affiliation via an institutional email.
  • Doctor of Philosophy
  • Assistant Professor at Wichita State University

About

10
Publications
16,136
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
265
Citations
Current institution
Wichita State University
Current position
  • Assistant Professor
Additional affiliations
January 2020 - present
Wichita State University
Position
  • Assistant Professor

Publications

Publications (10)
Article
Full-text available
Purpose Amid the coronavirus disease 2019 (COVID-19) pandemic, higher education institutions (HEI) all over the world have transitioned to online teaching. The purpose of this study is to examine the impact of technostress and negative emotional dissonance on online teaching exhaustion and teaching staff productivity. Design/methodology/approach S...
Article
Full-text available
This paper examines the factors that influence customers’ trust in the ride hailing service (RHS). RHS faces legal, social, and safety concerns making trust critical in using RHS. Drawing on legitimacy and uncertainty reduction theories, the authors propose a theoretical framework of the antecedents of trust. This paper develops a survey instrument...
Article
IS service delivery failures inside companies are value diminishing events. Information systems service providers seek to limit this value destruction but lack guidance on IS incident resolution actions that satisfy users and preserve IS service value. We apply Service-Dominant Logic (SDL) to explore what is relevant to users’ recovery service expe...
Article
Purpose Mobile device users are frequently faced with a decision to allow access to their personal information that resides on their devices in order to install mobile applications (apps) and use their features. This paper examines the impact of satisfaction on the intention to allow access to personal information. The paper achieves this by acknow...
Article
Full-text available
Despite the adverse consequences associated with playing risky online games, their popularity is increasing. Prior literature on online games has focused on identifying adoption factors without taking associated risks into consideration. In this study, we examine the factors that drive individuals to play online games in the presence of cybersecuri...
Article
Purpose Information technology is associated with psychological and physical risks such as high stress levels and antisocial behavior. The purpose of this paper is to understand why people engage in technology risk behavior, despite the negative consequences that might follow. Focusing on online games, this study identifies factors that affect indi...
Article
Although the performance of Humanitarian Supply Chain (HSC) receives considerable attention in current literature, measuring HSC performance remains challenging. HSC performance depends largely on the ability to meet the needs of the sufferers which contradicts with current performance measures that focus on input metrics such as donations and expe...
Article
Full-text available
In today's era of big data, business intelligence and analytics, and cloud computing, the previously elusive goal of data monetization has become more achievable. Our analysis of a four-stage journey of a leading U.S. retailer identifies the potential benefits and drawbacks of data monetization. Based on this company's experiences, we provide lesso...
Conference Paper
Full-text available
The notion of privacy calculus has been used to explain the risk-benefit analysis information technology users perform when asked to provide personal information. This study extends the privacy calculus model by proposing a theoretical framework in which technology characteristics (radicalness and complexity) have moderating effects on the benefit-...
Conference Paper
Full-text available
The Information Service Function (ISF) delivers IS services to internal customers (employees) to assist them in their information- and technology-related tasks. IS service failures are an inevitable event and the ISF must enact processes to recover from these failures. This article proposes a theoretical framework integrating literature from market...

Network

Cited By