February 2025
·
62 Reads
·
5 Citations
International Journal of Information Management
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
February 2025
·
62 Reads
·
5 Citations
International Journal of Information Management
January 2025
·
5 Reads
Journal of the Association for Information Systems
February 2023
·
153 Reads
·
4 Citations
February 2022
·
722 Reads
·
25 Citations
MIS Quarterly
Data breaches are a major threat to organizations from both financial and customer relations perspectives. We developed a nomological network linking post-breach compensation strategies to key outcomes, namely continued shopping intentions, positive word-of-mouth, and online complaining, with the effects being mediated by customers' justice perceptions. We conducted a longitudinal field study investigating Target's data breach in 2013 that affected more than 110 million customers. We examined customers' expectations toward compensation immediately after the breach was confirmed (survey 1) and their experiences after reparations were made (survey 2). Evidence from polynomial regression and response surface analyses of data collected from 388 affected customers showed that customers' justice perceptions were influenced by the actual compensation provided as well as the type and extent of compensation an organization could and should have provided, i.e., customers' compensation expectations. Interestingly, both positive and negative expectation disconfirmation led to less favorable justice perceptions compared to when expectations were met. Justice perceptions were, in turn, associated with key outcomes. We discuss implications for research on data security, information systems, and justice theory.
January 2022
·
138 Reads
·
67 Citations
Decision Support Systems
This study aims to identify and investigate the various trust targets and their transfer mechanism in a blockchain-enabled healthcare mutual aid platform. We first conduct a qualitative online interview toward initial users in the platform and identify three types of trust (i.e., trust in technology, trust in members, and trust in platform) that play salient roles in promoting users' usage intentions. We then develop a preliminary theoretical model based on the interview findings and conduct a survey to test our research model. The empirical results suggest that three platform mechanisms, namely member credibility, blockchain certificate, and structural assurance, significantly facilitate the three trust targets, which subsequently enhance individuals' behavioral intentions. A mediation analysis further demonstrates that the three trust targets partially or fully mediate the influences of three platform mechanisms on behavioral intentions through different path relationships. Our study contributes to the extant literature by uncovering the nomological network among three specific trust targets and explicating their antecedents as well as behavioral outcomes in the emerging context of blockchain-enabled applications.
December 2021
·
334 Reads
·
1 Citation
Social media (SM) has evolved into a common technology to establish and maintain relationships with friends, family, and colleagues. Yet, recently SM users have used the platforms less for their personal relationship management. Thus, the opportunities for companies to interact with their customers were reduced. This paper conceptualizes how companies need to approach a commercial friendship with SM users so that the user provides access for the firm representative to their personal sphere online. The focus is on understanding the heuristics users would apply based on certain decision factors. We build on the relationship marketing literature that suggests the willingness of SM members to engage in relationships with business representatives is tied to social, psychological, economic, and customization benefits. Our short paper presents the research model and describes the proposed research method to aid in understanding the factors motivating SM users to accept commercial representatives as a real friend.
September 2021
·
1,762 Reads
·
81 Citations
Public Administration Review
This research examines the relationship between service design and citizen satisfaction with e‐government services. Based on a multidimensional conceptualization of service, we define three key service perceptions, each comprising different design characteristics, that jointly influence perceived service quality and citizen satisfaction with e‐government services. The service perceptions and their corresponding design characteristics are: (1) perceptions of a core service—accuracy, completeness, self‐service capability, and convenience; (2) perceptions of facilitating services—accessibility, privacy protection, security protection, and user support; and (3) perceptions of supporting services—personalization capability and transparency. We tested our research model using data from a two‐stage survey of 3,065 users of three e‐government services. The results showed that all design characteristics contributed to their respective service perceptions that influenced perceived service quality that in turn influenced citizen satisfaction. The finding of a three‐way interaction among the service perceptions supported their complementary role in influencing perceived service quality.
June 2021
·
67 Reads
·
5 Citations
ACM Transactions on Management Information Systems
Past years have seen rising engagement among caregivers in online health communities. Although studies indicate that this caregiver-generated online health information benefits patients, how such information can be perceived easily and correctly remains unclear. This study aims to fill this gap by exploring mechanisms to improve the perceived helpfulness of online health information. We propose a multi-method framework, including a novel Medical-Enriched DEep Learning (MEDEL) feature extraction method, econometric analyses, and a randomized experiment. The results show that when the medical language of health information is informal, the senior care information is more helpful. Our findings provide a theoretical foundation to understand the influence of language formality on many other business communications. Our proposed multi-method approach can also be generalized to investigate research questions involving complex textual features. Forum sites could leverage our proposed approach to improve the helpfulness of online health information and user satisfaction.
June 2020
·
222 Reads
·
45 Citations
Information overload has been an important issue in today’s big data era where a huge amount of unstructured user-generated content in different languages is being created on the Web in every minute. Social media search systems could help with it by effectively and efficiently collecting, storing, organizing and presenting user-generated content across the Web in an organized and timely manner. However, little research has been done to examine factors that could influence user acceptance on this new type of systems. To address it, this study develops a research model by integrating Mental Workload (MWL), Task-Technology Fit (TTF), and the unified theory of acceptance and use of technology (UTAUT). The model is tested on a security-related social media search system. The results indicate that both MWL and TTF can significantly influence user acceptance. We also operationalize the multi-dimensional latent construct of MWL by developing survey-based measurement items for different dimensions.
June 2019
·
228 Reads
·
5 Citations
Nearly 100% of Americans aged 18 to 29 own a cell phone of some kind, and there has been a move toward using mobile devices for financial services; however, such a move also implies increased opportunities for fraud. Although technology has traditionally been blamed for showing some vulnerabilities, individuals are in a better position to deter technology-based fraud when they are concerned about revealing their personal information. The purpose of this study is to examine the influence of protection motivation theory (PMT) on privacy concerns (PC) and the consequences of this influence in trust, specifically in the context of mobile banking (m-banking). We tested our research model in an online survey with 351 American m-banking users from Amazon Mechanical Turk. We addressed one literature gap that is the omission of fear in PMT as an antecedent of PC, and one opportunity that is to reuse the most recent PC scale (Internet Privacy Concerns – IPC) as initially conceptualized. We found that the fear of losing information from m-banking activates PC and induces the user to have less trust in this platform. In addition, we proposed an improvement to the IPC scale by adding a new second-order factor named exposure management (individuals’ consciousness about the control users feel they have over their personal information).
... This way, governments can support citizens in rural and distant regions with the same quality level as that in cities. The adoption of user-centric approaches can help with designing technological systems aligned with user needs and practices [8]. Furthermore, governments may need to introduce new laws and regulations for digital data protection [9]. ...
February 2025
International Journal of Information Management
... We applied a sequential quantitative-qualitative mixed-methods design to answer this question (Creswell and Plano Clark 2017;Venkatesh et al. 2023). We first used a vignette-based experiment with 332 sales professionals who had B2B negotiation experience and assumed the role of sales manager negotiating with a buyer (Study 1). ...
February 2023
... Further research deals with the consequences of a data breach. For example, Hoehle et al. (2022) investigate the impact of post-data breach compensation strategies on customer relationships. They showed that meeting customer expectations regarding compensation was crucial for positive justice perceptions and provided insights to organisations regarding how to effectively respond to data breaches and mitigate their negative consequences (Hoehle et al. 2022). ...
February 2022
MIS Quarterly
... The studies underscore the rule that when users have confidence that decentralized fintech platforms are stable (with the best encryption, sensible contract audits, and clear protocols), they tend to use such services (Al-Adaileh et al., 2024;Proelss et al., 2023). Technological advancements and effective communication are required to alleviate perceived risks due to security concerns, which can, in turn, aid user adoption (Shao et al., 2022;Song et al., 2022). ...
January 2022
Decision Support Systems
... On a given platform, complementors differ in terms of cultural background (Moser and Deichmann, 2020), by either extending or subverting a platform's vitality (O'Mahony and Karp, 2020), and by their institutional structure. For example, on a social media platform, private users mainly complement content for their peers, while companies complement content for interacting with their customers (Matook and Brown, 2021). Analogous, on sharing economy platforms, end-users are heterogeneous in terms of civility (Ma et al., 2020) or level of enthusiasm . ...
December 2021
... Further, the collaboration can expand to include medical institutions and government officials so that users can retweet verified debunking information quickly. The provision of medical information, however, must account for the layperson's understanding (Xie et al. 2021). ...
June 2021
ACM Transactions on Management Information Systems
... Perceived service quality arises from collecting information and evaluating citizens' overall service use regarding services provided by service providers or the government through online services. Perceived good service quality indicates a positive experience with the service and will make citizens more satisfied (Chan et al., 2021) and providing electronic services for disseminating information to the public will meet standards equivalent to the general expectations of service users. Because the quality of the website directly affects effective service delivery, user satisfaction and trust in the service (Veeramootoo et al., 2018) and Li and Shang (2020) stated the influence on citizens' intention to use electronic services, the researchers therefore hypothesized the study as follows. ...
September 2021
Public Administration Review
... In addition, it is crucial to implement controls to protect the privacy of individuals whose data is collected (e.g., to anonymize data and store it in a secure and encrypted database). (Alharthi et al., 2017;Krotov & Johnson, 2022;Terlizzi et al., 2019) 8) Define a clear big data strategy (M) Successful cultural change can be achieved by having a clear organizational vision concerning big data, ensuring top management commitment, and accelerating its acceptance. (Alharthi et al., 2017;Rogers et al., 2007) 9) Create the position of Chief Data Officer (M) ...
June 2019
... Yet, research has emphasized that the use of information systems (ISs) can be a double-edged sword for individuals' mental workload: While ISs can help decrease mental workload by freeing individuals from certain subtasks, they may also increase mental workload as individuals have to invest additional resources in their interaction with an IS and process its provided information (Gregor & Benbasat, 1999). Due to the complex influence of IS on mental workload, research has begun to investigate the impact of ISs on mental workload across different task types (e.g., simple vs. complex tasks; Bläsing & Bornewasser, 2021;Liu et al., 1994), domains (e.g., aviation and healthcare; Hart, 2006;Xi et al., 2023;Kremer et al. 2022) and IS types (e.g., social media platforms and metaverse; Dang et al., 2020;Xi et al., 2023). In doing so, this research aims to unpack the contextual factors organizations should consider when introducing ISs to effectively support individuals' task performances. ...
June 2020
... This study used partial least square-structural equation modelling (PLS-SEM) method to process the data and analyzed it using Smart-PLS 3.0, a widely applied software for PLS-SEM method (Durcikova et al., 2018). The method is very appealing to many researchers because it enables them to estimate complex models with many constructs, indicator variables and structural paths (Hair et al., 2019). ...
March 2018
MIS Quarterly