
Paul M. Di GangiUniversity of Alabama at Birmingham | UAB · Department of Management, Information Systems and Quantitative Methods
Paul M. Di Gangi
Doctor of Philosophy in Business Administration (MIS)
About
37
Publications
146,527
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,379
Citations
Introduction
Paul M. Di Gangi is a Professor in the Collat School of Business at the University of Alabama at Birmingham. Paul serves as a Senior Editor for MIS Quarterly Executive and an Associate Editor for the European Journal of Information Systems.
Publications
Publications (37)
Purpose
The purpose of this paper is to examine how participation in an online health community provides for direct benefits in the form of information utility and social support and an indirect influence on perceptions of patient empowerment.
Design/methodology/approach
A multi‐method approach was conducted involving interviews with moderators of...
Business models that rely on social media and user-generated content have shifted from the more traditional business model, where value for the organization is derived from the one-way delivery of products and/or services, to the provision of intangible value based on user engagement. This research builds a model that hypothesizes that the user exp...
The growth of social media has crossed the boundary from individual to organizational use, bringing with it a set of benefits and risks. To mitigate these risks and ensure the benefits of social media use are realized, organizations have developed a host of new policies, procedures, and hiring practices. However, research to date has yet to provide...
An organization's ability to successfully manage information security incidents is determined by the actions of its employees, as well as the actions of various groups of employees within its organizational boundaries. To date, information security research has primarily focused on individual-level phenomena and has not yet explored group-level phe...
Purpose
Political skill has emerged as a concept of interest within the information systems literature to explain individual performance outcomes. The purpose of this paper is to adapt political skill to technology-mediated contexts. Specifically, the authors seek to understand political skill's role in shaping microtask workers' opportunity recogn...
Microlabor markets engage workers in temporary employment contracts to complete short-duration tasks for micropayments. Because microlabor platforms often preclude worker interaction, independent microtasking communities have emerged to allow workers to exchange ideas and interact to improve their work performance. Research has yet to take an in-de...
Microtask gig workers (MGWs) rely on digital platforms to arrange work agreements with requesters to complete well-defined microtasks. Many MGWs use an electronic network of practice (ENP) to facilitate information sharing about desirable and undesirable microtasks. This study uses social capital theory to theorize how social capital’s dimensions –...
A significant focus of behavioral security research has been on understanding employees’ motives for protecting sensitive assets. To date, theorizing efforts in this space have focused on appraisal processes and nomological models that are designed to capture the responses to the security threats articulated within fear appeals. Because fear appeal...
Internet-of-Things (IoT) research has primarily focused on identifying IoT devices' organizational risks with little attention to consumer perceptions about IoT device risks. The purpose of this study is to understand consumer risk perceptions for personal IoT devices and translate these perceptions into guidance for future research directions. We...
Purpose
This research investigates how the value creation interests and activities of different stakeholder groups within one open source software (OSS) project influence the project's development over time.
Design/methodology/approach
The authors conducted a case study of OpenSimulator using textual and thematic analyses of the initial four years...
Full terms and conditions of access and use, archived papers, submission instructions, a search tool, and much more can be found on the JISE website: http://jise.org ABSTRACT Over the last two decades, the academy has experienced a renaissance of diversity in pedagogical techniques with the introduction of experiential learning, active learning, fl...
Developing and advancing theory in the information systems (IS) discipline requires scholars to use and contribute to theory. While few IS scholars create new theories, many borrow and adapt theories from other disciplines to study a variety of phenomena in the realm of IS. Over time, this practice has raised concerns as to the appropriateness and...
This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applic...
Social media has become widely adopted in both society and business. However, the academy has been slow to leverage social media as a learning tool. The purpose of this study is twofold. First, this study explores student perceptions about the use of social media in face-to-face classroom environments. Second, this study examines how social media,...
This article describes a study designed to collect student perceptions of personal social media risks. The study used the Delphi method to rank the risks of using social media as perceived by undergraduate students. The students' rankings were compared to the personal risks of using social media identified and ranked by a group of Library and Infor...
This paper describes a study designed to collect student perceptions of the personal risks incurred when using social media. The study used the Delphi method to rank the social media risks perceived by students. The students' rankings were compared to the personal risks identified and ranked by a group of Library and Information Science professiona...
The authors employ a seeded, ranking type Delphi to answer the following research question: how do each of the major stakeholder groups within organizations (representing both strategic and operational levels) conceptualize the risks associated with IT in operations? Using three expert panels drawn from Big 4 IT audit groups and Fortune 1000 busine...
While private-collective communities, such as open source software communities engaging directly with firms, are argued to provide the “best of both worlds” for knowledge creation, little is known about how entrepreneurs, one of the driving forces of value creation in society, contribute to these communities. We conducted a multi-method exploratory...
While private-collective communities, such as open source communities engaging directly with firms, are argued to provide the “best of both worlds” for knowledge creation, little is known about how entrepreneurs, one of the driving forces of value creation in society, contribute to these communities. We conducted a multi-method exploratory case stu...
While private-collective communities, such as open source communities engaging directly with firms, are argued to provide the "best of both worlds" for knowledge creation, little is known about how entrepreneurs, one of the driving forces of value creation in society, contribute to these communities. We conducted a multi-method exploratory case stu...
Advances in computer-mediated communication technologies have increased the variety of choices individuals have when sharing knowledge both within and across organizational boundaries. This paper extends prior research by comparing face-to-face and computer-mediated communication channels email, online communities, and knowledge repositories/wikis...
A growing trend within the literature on value creation is the introduction of private-collective knowledge communities, which create opportunities for organizations to leverage knowledge. In these communities, participants privately invest in a project's success by freely revealing and contributing their personal resources such as expertise and ti...
Web 2.0 technologies present an opportunity for firms to create online communities where users engage in value creation by submitting product reviews, providing feedback, suggesting ideas, and identifying new sources of innovation. Our research suggests that there are four major challenges associated with successfully integrating an online user com...
Open innovation models suggest that an organization's end users can be a potentially beneficial source for new ideas and innovations. However, incorporating end users raises some interesting challenges regarding how to balance the decision making power between a firm and the user community. Using Diffusion of Innovation Theory, we propose hypothese...
Researchers have recently advocated the use of open innovation models to capitalize on new sources of innovation. One such
promising source of new innovations comes from the actual end users of an organization’s products and services. However, many
organizations have difficulty absorbing these innovations due to a fear over losing control of the in...
Due to recent advances in computer-mediated communication technologies, individuals are able to communicate through a variety of channels to exchange knowledge. This paper extends prior research to include a comparison of knowledge exchange through face-to-face and computer-mediated communication environments (e-mail, electronic community, and elec...
Organizational interest in user-generated content (UGC) websites is growing, as organizations face highly competitive markets, uncertain economic environments, and a growing user base accustomed to active engagement rather than passive acceptance of products and services. Organizations are now exploring ways to provide a platform (website) through...