About
32
Publications
12,501
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
550
Citations
Current institution
Publications
Publications (32)
The promise-implementation gap is a particularly salient feature in promoting individuals’ pro-environmental behavior (PEB). Many individuals are becoming aware that their past behavior has not actually been in line with the norms they have made promise to. Prior studies have suggested an array of constraints restricting individuals’ pro-environmen...
Task-related conflict and person-related conflict in software testing are inevitable and can impact the effectiveness and efficiency of the software development process. The dimensionality of conflict in software testing is reasonably well understood, although in past research both types of conflict have frequently been modeled as reflective constr...
Historically, academia has paid much attention to environmental Kuznets curve (EKC) associated hypotheses, and the EKC per se has triggered conflicting reactions since first posited. Yet, all controversies seem not to have any base framework to address further pollution-related strategies. Built upon an extensive critical review of the extant EKC l...
This study integrates the Service-Dominant Logic (S-D Logic) perspective and both streams of service marketing and information systems (IS) usage literature, and proposes a research model outlining key actors of social commerce and interactions of how customers participate in social commerce, co-create service value, and remain loyal to and spread...
The wide popularity and rapid growth of social commerce have opened a new arena for business and grand opportunities for Information Systems (IS) research. However, there is only a limited theoretical understanding of and even less substantive empirical grounding on how social media technologies, providers, and customers interact to achieve social...
The widespread of social media (SM) provides information system (IS) research with a great opportunity to examine IS usage habit. This study adapts habit perspectives of social psychology into social media use and contextualizes findings from both service marketing and IS usage literature for developing a model of SM usage habit. The model suggests...
Despite the rapid growth of social commerce, there is only a limited understanding of how social media technologies, marketers and customers can interact to achieve business initiatives and opportunities. This study develops an integrative formative model outlining key qualities and dimensions of social commerce and their interactions. The model wa...
Social media offers customers a unique service value proposition. Recognizing service value as a pivotal concept, this study develops an aggregate construct of online social value, whereby customers evaluate utilitarian and hedonic benefits relative to what they must sacrifice in effort and risk in deriving a value calculation of online social netw...
The wide use and distinctive novelties of social media have established the ever pervasive phenomenon a “hot topic” for information systems (IS) research and practice. In this regard, the Service-Dominant (S-D) Logic from the services marketing literature supports the notion that social media users and providers interact with each other and co-crea...
This study incorporates insights from services marketing and information systems (IS) usage research, and proposes a service value perspective of continued use of Mobile Technology Mediated Services (MTMS). Our study illustrates that customers strongly recognize the value of MTMS in building utilitarian and hedonic benefits, which influences their...
Theoretical advances the in the conceptualization and operationalization of usage of social media (SM) are lacking in Information Systems (IS) research area. This study extends the conceptualization of IS usage and specifications of formative constructs into the SM context, and proposes a formative model of SM usage. The model conceptualizes and op...
In today’s higher education, the Internet is indispensable in creating, storing, and disseminating information and knowledge.
This study examines gender differences among college students in their usage perceptions of the Internet. A multiple-variable
logistic model was proposed and tested using data gathered from 805 college students. The results...
Drawing upon the domains of supply chain management, simulation, Dynamic Data-Driven Application Systems (DDDAS) and Radio Frequency Identification (RFID) technology, we propose the design and implementation of a dynamic RFID data-driven supply chain management system. In accordance with the DDDAS concept, the proposed artifact will be able to (1)...
This research investigates how corporate politics affects Information Technology (IT) configuration decisions in organizational settings of business diversification. We propose that IT configuration in business diversification is a joint function of organizational political forces, modal choices of diversification strategies and related behavioral...
The practice of software development has evolved steadily over the decades. Numerous methods and models (e.g., life cycle models and agile methods) have been proposed to enhance its efficiency and effectiveness. This study provides a testing centric view of software development practices. Specifically, it reviews software development methodologies...
In today's higher education, Internet technologies play increasingly essential roles in creating, storing, and disseminating information and knowledge. This study investigates gender differences in Internet usage patterns and perceptions of Internet technologies using data gathered from 805 business students. A three-variable logistic regression mo...
Social networking (SNW) services such as Facebook and MySpace are growing exponentially. While many people are spending an increasing amount of their time on the services, others use them minimally or discontinue use after a short period of time. This research is asking the question: What are the salient factors influencing individuals to continue...
Information systems (IS) analysis and design has much to do with "people factors." Basically, human beings are creatures of self-interest. This paper first proposes a theory of self-interest as the theoretical base and integrative approach to understand the phenomenon of IS development. Based upon the theory proposed, a series of research propositi...
This paper outlines a research framework on data management in the multidatabase (MDB) environment with the specific focus on the implementation of the federated database system (FDBS). We propose that (1) one essential goal of data management in MDB environment is to balance the organizational tension between empowered subunits and organizational...
The practice of software development has evolved steadily over the decades. Numerous methods and models have been proposed to enhance its efficiency and effectiveness. This paper reviews these methods and models, identifies the latest trends in the industry, and discusses their implications.
Radio frequency identification (RFID) technology can be the initiator of a domino effect. To an organization, the adoption and deployment of RFID technology and the resulting influx of data, information, and knowledge will impact not only its IT infrastructure, but also the quality and timeliness of its business intelligence and decision making. Th...
A wireless local loop connects customer premise equipment to the local exchange on the public switched telephone network using radio signals. Compared to wireline local loops, wireless local loops are easier to deploy and less costly to maintain. One of the most important considerations in deploying wireless local loops is to determine the best cha...