Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
88 result(s) for "Lowry, Paul Benjamin"
Sort by:
Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities
Purpose Drawing on sensemaking and emotion regulation research, the purpose of this paper is to reconceptualize core contributor withdrawal (CCW) in the context of online peer-production communities (OPPCs). To explain the underlying mechanisms that make core contributors withdraw from these communities, the authors propose a process theory of contributor withdrawal called the core contributor withdrawal theory (CCWT). Design/methodology/approach To support CCWT, a typology of unmet expectations of online communities is presented, which uncovers the cognitive and emotional processing involved. To illustrate the efficacy of CCWT, a case study of the English version of Wikipedia is provided as a representative OPPC. Findings CCWT identifies sensemaking and emotion regulation concerning contributors’ unmet expectations as causes of CCW from OPPCs, which first lead to declined expectations, burnout and psychological withdrawal and thereby to behavioral withdrawal. Research limitations/implications CCWT clearly identifies how and why important participation transitions, such as from core contributor to less active contributor or non-contributor, take place. By adopting process theories, CCWT provides a nuanced explanation of the cognitive and affective events that take place before core contributors withdraw from OPPCs. Practical implications CCWT highlights the challenge of online communities shifting from recruiting new contributors to preventing loss of existing contributors in the maturity stage. Additionally, by identifying the underlying cognitive and affective processes that core contributors experience in response to unexpected events, communities can develop safeguards to prevent or correct cognitions and emotions that lead to withdrawal. Originality/value CCWT provides a theoretical framework that accounts for the negative cognitions and affects that lead to core contributors’ withdrawal from online communities. It furthers the understanding of what motivates contributing to and what leads to withdrawal from OPPC.
Patient Trust in Physicians Matters—Understanding the Role of a Mobile Patient Education System and Patient-Physician Communication in Improving Patient Adherence Behavior: Field Study
The ultimate goal of any prescribed medical therapy is to achieve desired outcomes of patient care. However, patient nonadherence has long been a major problem detrimental to patient health and, thus, is a concern for all health care providers. Moreover, nonadherence is extremely costly for global medical systems because of unnecessary complications and expenses. Traditional patient education programs often serve as an intervention tool to increase patients' self-care awareness, disease knowledge, and motivation to change patient behaviors for better adherence. Patient trust in physicians, patient-physician relationships, and quality of communication have also been identified as critical factors influencing patient adherence. However, little is known about how mobile patient education technologies help foster patient adherence. This study aimed to empirically investigate whether and how a mobile patient education system (MPES) juxtaposed with patient trust can increase patient adherence to prescribed medical therapies. This study was conducted based on a field survey of 125 patients in multiple states in the United States who have used an innovative mobile health care system for their health care education and information seeking. Partial least squares techniques were used to analyze the collected data. The results revealed that patient-physician communication and the use of an MPES significantly increase patients' trust in their physicians. Furthermore, patient trust has a prominent effect on patient attitude toward treatment adherence, which in turn influences patients' behavioral intention and actual adherence behavior. Based on the theory of planned behavior, the results also indicated that behavioral intention, response efficacy, and self-efficacy positively influenced patients' actual treatment adherence behavior, whereas descriptive norms and subjective norms do not play a role in this process. Our study is one of the first that examines the relationship between patients who actively use an MPES and their trust in their physicians. This study contributes to this context by enriching the trust literature, addressing the call to identify key patient-centered technology determinants of trust, advancing the understanding of patient adherence mechanisms, adding a new explanation of the influence of education mechanisms delivered via mobile devices on patient adherence, and confirming that the theory of planned behavior holds in this patient adherence context.
Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures
Social computing technologies typically have multiple features that allow users to reveal their personal information to other users. Such self-disclosure (SD) behavior is generally considered positive and beneficial in interpersonal communication and relationships. Using a newly proposed model based on social exchange theory, this paper investigates and empirically validates the relationships between SD technology use and culture. In particular, we explore the effects of culture on information privacy concerns and the desire for online interpersonal awareness, which influence attitudes toward, intention to use, and actual use of SD technologies. Our model was tested using arguably the strongest social computing technology for online SD-instant messaging (IM)-with users from China and the United States. Our findings reveal that cross-cultural dimensions are significant predictors of information privacy concerns and desire for online awareness, which are, in turn, found to be predictors of attitude toward, intention to use, and actual use of IM. Overall, our proposed model is applicable to both cultures. Our findings enhance the theoretical understanding of the effects of culture and privacy concerns on SD technologies and provide practical suggestions for developers of SD technologies, such as adding additional control features to applications.
The physical internet as a new supply chain paradigm: a systematic literature review and a comprehensive framework
PurposeThe physical internet (PI) is an emerging logistics and supply chain management (SCM) concept that draws on different technologies and areas of research, such as the Internet of Things (IoT) and key performance indicators, with the purpose of revolutionizing existing logistics and SCM practices. The growing literature on the PI and its noteworthy potential to be a disruptive innovation in the logistics industry call for a systematic literature review (SLR), which we conducted that defines the current state of the literature and outlines future research directions and approaches.Design/methodology/approachThe SLR that was undertaken included journal publications, conference papers and proceedings, book excerpts, industry reports and white papers. We conducted descriptive, citation, thematic and methodological analyses to understand the evolution of PI literature.FindingsBased on the literature review and analyses, we proposed a comprehensive framework that structures the PI domain and outlines future directions for logistics and SCM researchers.Research limitations/implicationsOur research findings are limited by the relatively low number of journal publications, as the PI is a new field of inquiry that is composed primarily of conference papers and proceedings.Originality/valueThe proposed PI-based framework identifies seven PI themes, including the respective facilitators and barriers, which can inform researchers and practitioners on future potentially disruptive SC strategies.
Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites
Trust is a crucial factor in e-commerce. However, consumers are less likely to trust unknown Web sites. This study explores how less-familiar e-commerce Web sites can use branding alliances and Web site quality to increase the likelihood of initial consumer trust. We use the associative network model of memory to explain brand knowledge and to show how the mere exposure effect can be leveraged to improve a Web site's brand image. We also extend information integration theory to explain how branding alliances are able to increase initial trust and transfer positive effects to Web sites. Testing of our model shows that the most important constructs for increasing initial trust in our experimental context are branding and Web site quality. Finally, we discuss future research ideas, limitations, implications, and ideas for practitioners.
Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities
The global use of online communities has exploded to involve hundreds of millions of users. Despite the tremendous social impact and business opportunities afforded by these communities, little information systems (IS) research has addressed them - especially in a cross-cultural context. Our research proposes an online community self-disclosure model, tested in a cross-cultural setting using data provided by French and British working professionals. Our model is based on social exchange theory (SET) and social penetration theory (SPT), as well as on cross-cultural theory related to individualism-collectivism. SET explains that individuals engage in relationships when the perceived costs associated with the relationship are less than the expected benefits. SPT extends SET to explain that individuals participate in self-disclosure to foster relationships - reciprocation is the primary benefit of self-disclosure, whereas risk is the foundational cost of self-disclosure. Our study established several important findings: positive social influence to use an online community increases online community self-disclosure; reciprocity increases self-disclosure; online community trust increases self-disclosure; and privacy risk beliefs decrease self-disclosure. Meanwhile, a tendency toward collectivism increases self-disclosure. We further found that French participants had higher scores on horizontal individualism than British participants. Several other findings and their implications for practice are also discussed.
Increasing Accountability Through User-Interface Design Artifacts
Access-policy violations are a growing problem with substantial costs for organizations. Although training programs and sanctions have been suggested as a means of reducing these violations, evidence shows the problem persists. It is thus imperative to identify additional ways to reduce access-policy violations, especially for systems providing broad access to data. We use accountability theory to develop four user-interface (UI) design artifacts that raise users’ accountability perceptions within systems and in turn decrease access-policy violations. To test our model, we uniquely applied the scenario-based factorial survey method to various graphical manipulations of a records system containing sensitive information at a large organization with over 300 end users who use the system daily. We show that the UI design artifacts corresponding to four submanipulations of accountability can raise accountability and reduce access policy violation intentions. Our findings have several theoretical and practical implications for increasing accountability using UI design. Moreover, we are the first to extend the scenario-based factorial survey method to test design artifacts. This method provides the ability to use more design manipulations and to test with fewer users than is required in traditional experimentation and research on human–computer interaction. We also provide bootstrapping tests of mediation and moderation and demonstrate how to analyze fixed and random effects within the factorial survey method optimally.
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
In this essay, we outline some important concerns in the hope of improving the effectiveness of security and privacy research. We discuss the need to re-examine our understanding of information technology and information system (IS) artefacts and to expand the range of the latter to include those artificial phenomena that are crucial to information security and privacy research. We then briefly discuss some prevalent limitations in theory, methodology, and contributions that generally weaken security/privacy studies and jeopardise their chances of publication in a top IS journal. More importantly, we suggest remedies for these weaknesses, identifying specific improvements that can be made and offering a couple of illustrations of such improvements. In particular, we address the notion of loose re-contextualisation, using deterrence theory research as an example. We also provide an illustration of how the focus on intentions may have resulted in an underuse of powerful theories in security and privacy research, because such theories explain more than just intentions. We then outline three promising opportunities for IS research that should be particularly compelling to security and privacy researchers: online platforms, the Internet of things, and big data. All of these carry innate information security and privacy risks and vulnerabilities that can be addressed only by researching each link of the systems chain, that is, technologies-policies-processes-people-society-economy-legislature. We conclude by suggesting several specific opportunities for new research in these areas.
Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model
The dramatic increase in social media use has challenged traditional social structures and shifted a great deal of interpersonal communication from the physical world to cyberspace. Much of this social media communication has been positive: Anyone around the world who has access to the Internet has the potential to communicate with and attract a massive global audience. Unfortunately, such ubiquitous communication can be also used for negative purposes such as cyberbullying, which is the focus of this paper. Previous research on cyberbullying, consisting of 135 articles, has improved the understanding of why individuals—mostly adolescents—engage in cyberbullying. However, our study addresses two key gaps in this literature: (1) how the information technology (IT) artifact fosters/inhibits cyberbullying and (2) why people are socialized to engage in cyberbullying. To address these gaps, we propose the social media cyberbullying model (SMCBM), which modifies Akers’ [Akers RL (2011) Social Learning and Social Structure: A General Theory of Crime and Deviance , 2nd ed. (Transaction Publishers, New Brunswick, NJ)] social structure and social learning model. Because Akers developed his model for crimes in the physical world, we add a rich conceptualization of anonymity composed of five subconstructs as a key social media structural variable in the SMCBM to account for the IT artifact. We tested the SMCBM with 1,003 adults who have engaged in cyberbullying. The empirical findings support the SMCBM. Heavy social media use combined with anonymity facilitates the social learning process of cyberbullying in social media in a way that fosters cyberbullying. Our results indicate new directions for cyberbullying research and implications for anticyberbullying practices.
Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance
We conducted a design-science research project to improve an organization's compound problems of (1) unsuccessful employee phishing prevention and (2) poorly received internal security training. To do so, we created a gamified security training system focusing on two factors: (1) enhancing intrinsic motivation through gamification and (2) improving security learning and efficacy. Our key theoretical contribution is proposing a recontextualized kernel theory from the hedonic-motivation system adoption model that can be used to assess employee security constructs along with their intrinsic motivations and coping for learning and compliance. A six-month field study with 420 participants shows that fulfilling users' motivations and coping needs through gamified security training can result in statistically significant positive behavioral changes. We also provide a novel empirical demonstration of the conceptual importance of \"appropriate challenge\" in this context. We vet our work using the principles of proof-of-concept and proof-of-value, and we conclude with a research agenda that leads toward final proof-in-use.