Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleSeptember 2019
Technology as routine capability
While technology is most commonly associated with material things, tools, or artifacts, it is also associated as a concept with routines, patterns of action that provide capabilities. Researchers have struggled to bring these interpretations together. ...
- articleSeptember 2019
Optimal market entry timing for successive generations of technological innovations
Determining the optimal market entry timing for successive product generations is a critical decision for firms. Pioneering studies on market entry timing have focused on purchase-to-own (PTO) products (e.g., computers) and assumed that an old product ...
- articleSeptember 2019
Can outsourcing of information technology foster innovations in client organizations? an empirical analysis
There is a substantial body of literature on information technology (IT) outsourcing. However, little is known about employing IT outsourcing to generate innovation. In this paper, we articulate the ex ante as well as ex post contracting challenges that ...
- articleJune 2019
The experts in the crowd: the role of experienced investors in a crowdfunding market
Using a data set on individual investments in an online crowdfunding platform for mobile applications, this study examines whether an early investor's experience within the platform serves as a credible signal of quality for other investors in the crowd ...
- articleJune 2019
How does strategic alignment affect firm performance? the roles of information technology investment and environmental uncertainty
The alignment between a firm's business and information technology (IT) strategies continues to be important for research and practice. Prior research investigating the performance consequences of strategic IT alignment (SITA) has produced inconsistent ...
-
- articleMarch 2019
Modeling multichannel advertising attribution across competitors
The bursts and multiplicity of Internet advertising have made multichannel attribution an immediate challenge for marketing practitioners. Existing attribution models predominantly focus on analyzing consumers' conversion paths with respect to one focal ...
- articleMarch 2019
Platform-based function repertoire, reputation, and sales performance of e-marketplace sellers
In today's emerging and competitive e-marketplaces, sellers must take competitive action to improve their sales performance. E-marketplace platform operators offer sellers a portfolio of platform-based functions that are intended to enhance ...
- articleMarch 2019
Adoption of identity theft countermeasures and its short- and long-term impact on firm value
Identity theft has impaired e-commerce. To combat the crime, many identity theft countermeasures (ITC) have been proposed. As investments in ITC are substantial and the benefits of such investments are intangible, companies are often hesitant to adopt ...
- articleMarch 2019
Capitalizing on health information technology to enable digital advantage in U.S. hospitals
This research examines hospital digital advantage, defined as a hospital's technological edge relative to its competitors across a composite of technologies supporting the hospital's various functions and processes. Drawing on Bourdieu's forms of ...
- articleDecember 2018
Single-sourcing versus multisourcing: the roles of output verifiability on task modularity
This paper compares two modes for outsourcing the development of information services projects: single-sourcing (where one vendor handles all outsourced activities) and multisourcing (where multiple vendors handle those activities). We assess the ...
- articleDecember 2018
IT consumerization and the transformation of IT governance
IT governance describes the decision rights and accountability framework used to ensure the alignment of IT-related activities with the organization's strategy and objectives. Conversely, IT consumerization refers to the process whereby the changing ...
- articleDecember 2018
Meaningful healthcare security: does meaningful-use attestation improve information security performance?
Certification mechanisms are often employed to assess and signal difficult-to-observe management practices and foster improvement. In the U.S. healthcare sector, a certification mechanism called meaningful-use attestation was recently adopted as part of ...
- articleDecember 2018
The role of venture capital in the formation of a new technological ecosystem: evidence from the cloud
The diffusion of new information technology (IT) requires the development of an ecosystem of hardware and software producers, users, and other firms. It is widely believed that venture capitalists (VCs) can play a role in the development of such ...
- articleDecember 2018
System dynamics modeling for information systems research: theory development and practical application
Most information systems (IS) research develops theory for explanation and prediction based on a variance logical structure that assumes one-way, time invariant causal relationships. This approach largely misses the opportunity to extend theory from ...
- articleSeptember 2018
Board independence and firm performance in the IT industry: the moderating role of new entry threats
Prior research on corporate governance has offered contradictory empirical evidence on the relationship between the independence of the board of directors (the degree to which the board consists of outside directors who are not affiliated with the ...
- articleSeptember 2018
The interaction between microblog sentiment and stock returns: an empirical examination
Opinion mining of microblog messages has become a popular application of business analytics in recent times. Opinions reflected in microblogs have provided businesses with great opportunities to acquire insights into their operating environments in real ...
- articleJune 2018
Information spillover and semi-collaborative networks in insurer fraud detection
Information spillovers are benefits that a party obtains from the IT efforts of another party. Because these benefits arise from data and information sharing, they are best studied at a process level. Medical claims fraud detection is a prototypical ...
- articleJune 2018
Examining the effects of interfirm managerial social ties on IT components diversity: an agency perspective
Using a sample of U.S. firms and their IT suppliers compiled from multiple sources, we empirically examine the effect of interfirm managerial social ties (IMSTs) on IT components diversity and the conditions when such an effect may be escalated or ...
- articleJune 2018
Consumer preferences, cannibalization, and competition: evidence from the personal computer industry
Understanding the degree of cannibalization and competition in online and offline markets is important to firms' product line designs. However, few empirical studies have measured both effects simultaneously or have examined the factors that determine ...
- articleJune 2018
Identity management and tradable reputation
Online reputation trading is a new phenomenon facilitated by the prosperity of e-commerce and social networks. Whether reputations will be reliable when people can purchase rather than build them originally is a natural concern and also a challenge to ...