{"title":"Counterpoint: Representing Forged Concepts as Emergent Variables Using Composite-Based Structural Equation Modeling","authors":"Xi Yu, Sam Zaza, Florian Schuberth, J. Henseler","doi":"10.1145/3505639.3505647","DOIUrl":"https://doi.org/10.1145/3505639.3505647","url":null,"abstract":"","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"24 1","pages":"114-130"},"PeriodicalIF":2.8,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80973181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sherae L. Daniel, Shadi Janansefat, E. Diamant, Yuqing Ren
Free/Libre Open Source Software (FLOSS) developers often make a single contribution to a project and then no more, making project management difficult. To improve understanding around why developers leave, this work explores the relationship between FLOSS developer motivations and their attitudes and behavior related to projects. In particular, we add insight to the current understanding of these issues by proposing single- and double-loop learning as intervening mechanisms that connect developer motivations to outcomes and thereby help clarify when developer motivations have negative and positive impacts for the project. We test our hypotheses in a sample of 132 FLOSS developers. We find that intrinsic motivations (motivation to learn) and social motivations (motivation to collaborate) positively influence single- and double-loop learning while extrinsic motivations negatively impact both types of learning. We further find that single- and double-loop learning have differential impacts on contribution to the focal project and other projects. While single-loop learning is associated with lower turnover intentions, double-loop learning is associated with higher turnover intentions. Implications of our findings for research and management are provided in the discussion.
{"title":"Single- and Double-Loop Learning","authors":"Sherae L. Daniel, Shadi Janansefat, E. Diamant, Yuqing Ren","doi":"10.1145/3433148.3433153","DOIUrl":"https://doi.org/10.1145/3433148.3433153","url":null,"abstract":"Free/Libre Open Source Software (FLOSS) developers often make a single contribution to a project and then no more, making project management difficult. To improve understanding around why developers leave, this work explores the relationship between FLOSS developer motivations and their attitudes and behavior related to projects. In particular, we add insight to the current understanding of these issues by proposing single- and double-loop learning as intervening mechanisms that connect developer motivations to outcomes and thereby help clarify when developer motivations have negative and positive impacts for the project. We test our hypotheses in a sample of 132 FLOSS developers. We find that intrinsic motivations (motivation to learn) and social motivations (motivation to collaborate) positively influence single- and double-loop learning while extrinsic motivations negatively impact both types of learning. We further find that single- and double-loop learning have differential impacts on contribution to the focal project and other projects. While single-loop learning is associated with lower turnover intentions, double-loop learning is associated with higher turnover intentions. Implications of our findings for research and management are provided in the discussion.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"40 1","pages":"68 - 92"},"PeriodicalIF":2.8,"publicationDate":"2020-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82314325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Innovations through the "business process as a service" (BPaaS) concept have shaped new business opportunities for service providers. Technological progress allows business process service providers (BPSPs) to offer a wide range of digitized and standardized services to business clients. Within this business model, capacity planning is a major challenge for BPSPs, as costs are the decisive factor in the competitive business environment of digital service provision. Accordingly, BPSPs must tackle inefficiencies in capacity planning resulting from both idle capacity and lost revenue caused by volatile demand. However, recent technological developments offering dynamic integration and information capabilities may help, as they enable the exchange of excess capacity between business partners. We examine the corresponding potential of IT-enabled excess capacity markets to create competitive advantage in e-business value chains by analyzing a BPSP's capacity-related optimization problem. We build an analytical model based on queuing theory and evaluate it through a discreteevent simulation applying a possible application scenario. By solving the optimization problem, we identified a remarkable cost advantage in using excess capacity as a first competitive advantage. Building on this cost advantage, we furthermore identified differentiation advantages realizable without raising prices. Both findings highlight the relevance of further research on this topic.
{"title":"Creating Competitive Advantage in E-Business Value Chains by Using Excess Capacity via IT-enabled Marketplaces","authors":"B. Häckel, Jochen Übelhör, Christian Voit","doi":"10.1145/3410977.3410983","DOIUrl":"https://doi.org/10.1145/3410977.3410983","url":null,"abstract":"Innovations through the \"business process as a service\" (BPaaS) concept have shaped new business opportunities for service providers. Technological progress allows business process service providers (BPSPs) to offer a wide range of digitized and standardized services to business clients. Within this business model, capacity planning is a major challenge for BPSPs, as costs are the decisive factor in the competitive business environment of digital service provision. Accordingly, BPSPs must tackle inefficiencies in capacity planning resulting from both idle capacity and lost revenue caused by volatile demand. However, recent technological developments offering dynamic integration and information capabilities may help, as they enable the exchange of excess capacity between business partners. We examine the corresponding potential of IT-enabled excess capacity markets to create competitive advantage in e-business value chains by analyzing a BPSP's capacity-related optimization problem. We build an analytical model based on queuing theory and evaluate it through a discreteevent simulation applying a possible application scenario. By solving the optimization problem, we identified a remarkable cost advantage in using excess capacity as a first competitive advantage. Building on this cost advantage, we furthermore identified differentiation advantages realizable without raising prices. Both findings highlight the relevance of further research on this topic.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"301 1","pages":"97 - 118"},"PeriodicalIF":2.8,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73209778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Riedl, Thomas Fischer, Pierre-Majorique Léger, Fred D. Davis
NeuroIS is a field in Information Systems (IS) that makes use of neuroscience and neurophysiological tools and knowledge to better understand the development, adoption, and impact of information and communication technologies. The fact that NeuroIS now exists for more than a decade motivated us to comprehensively review the academic literature. Investigation of the field's development provides insights into the status of NeuroIS, thereby contributing to identity development in the NeuroIS field. Based on a review of N=200 papers published in 55 journals and 13 conference proceedings in the period 2008-2017, we addressed the following four research questions: Which NeuroIS topics were investigated? What kind of NeuroIS research was published? How was the empirical NeuroIS research conducted? Who published NeuroIS research? Based on a discussion of the findings and their implications for future research, which considers results of a recent NeuroIS survey (N=60 NeuroIS scholars), we conclude that today NeuroIS can be considered an established research field in the IS discipline. However, our review also indicates that further efforts are necessary to advance the field, both from a theoretical and methodological perspective.
{"title":"A Decade of NeuroIS Research","authors":"R. Riedl, Thomas Fischer, Pierre-Majorique Léger, Fred D. Davis","doi":"10.1145/3410977.3410980","DOIUrl":"https://doi.org/10.1145/3410977.3410980","url":null,"abstract":"NeuroIS is a field in Information Systems (IS) that makes use of neuroscience and neurophysiological tools and knowledge to better understand the development, adoption, and impact of information and communication technologies. The fact that NeuroIS now exists for more than a decade motivated us to comprehensively review the academic literature. Investigation of the field's development provides insights into the status of NeuroIS, thereby contributing to identity development in the NeuroIS field. Based on a review of N=200 papers published in 55 journals and 13 conference proceedings in the period 2008-2017, we addressed the following four research questions: Which NeuroIS topics were investigated? What kind of NeuroIS research was published? How was the empirical NeuroIS research conducted? Who published NeuroIS research? Based on a discussion of the findings and their implications for future research, which considers results of a recent NeuroIS survey (N=60 NeuroIS scholars), we conclude that today NeuroIS can be considered an established research field in the IS discipline. However, our review also indicates that further efforts are necessary to advance the field, both from a theoretical and methodological perspective.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"19 1","pages":"13 - 54"},"PeriodicalIF":2.8,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84112101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many of the phenomena of interest in information systems (IS) research are nonlinear, and it has consequently been recognized that by applying linear statistical models (e.g., linear regression), we may ignore important aspects of these phenomena. To address this issue, IS researchers are increasingly applying nonlinear models to their datasets. One popular analytical technique for the modeling and analysis of nonlinear relationships is polynomial regression, which in its simplest form fits a "U-shaped" curve to the data. However, the use of polynomial regression can be problematic when the independent variables are contaminated with measurement error, and the implications of error can be more severe than in linear models. In this research, we discuss a number of techniques that can be used for modeling polynomial relationships while simultaneously taking measurement error into account and examine their performance by using a simulation study. In addition, we discuss the use of marginal and response surface plots as interpretational aides when evaluating the results of polynomial models and showcase their use through a practical example using a well-known dataset. Our results clearly indicate that the use of a linear regression analysis for this kind of model is problematic, and we provide a set of recommendations for future IS research practice.
{"title":"Polynomial Regression and Measurement Error","authors":"Miguel I. Aguirre-Urreta, Mikko Rönkkö, Jiang Hu","doi":"10.1145/3410977.3410981","DOIUrl":"https://doi.org/10.1145/3410977.3410981","url":null,"abstract":"Many of the phenomena of interest in information systems (IS) research are nonlinear, and it has consequently been recognized that by applying linear statistical models (e.g., linear regression), we may ignore important aspects of these phenomena. To address this issue, IS researchers are increasingly applying nonlinear models to their datasets. One popular analytical technique for the modeling and analysis of nonlinear relationships is polynomial regression, which in its simplest form fits a \"U-shaped\" curve to the data. However, the use of polynomial regression can be problematic when the independent variables are contaminated with measurement error, and the implications of error can be more severe than in linear models. In this research, we discuss a number of techniques that can be used for modeling polynomial relationships while simultaneously taking measurement error into account and examine their performance by using a simulation study. In addition, we discuss the use of marginal and response surface plots as interpretational aides when evaluating the results of polynomial models and showcase their use through a practical example using a well-known dataset. Our results clearly indicate that the use of a linear regression analysis for this kind of model is problematic, and we provide a set of recommendations for future IS research practice.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"71 1","pages":"55 - 80"},"PeriodicalIF":2.8,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83937794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The DATA BASE for Advances in Information Systems has sponsored a series of articles on the thought of Paul Feyerabend (Treiblmaier, 2018, 2019; Gregor, 2018; Burton-Jones, 2018; Myers, 2018). Treiblmaier and the respondents discuss the actual meaning and implication of Feyerabend's ideas for information systems. In the series, the authors argue we already employ diverse methodologies. However, it is also apparent that a truncated view of philosophy as only concerned with epistemology and all methods as commensurable is employed. This paper argues we do not have a real diversity in the IS field and we should commit to the practice of a disciplined metatheoretic pluralism. Our methodology must not only be rigorously executed but also correctly interpreted in accord with our metatheoretic assumptions. We need to be open to all types of metatheory as well as methods and research topics. The paper provides four suggestions for how to implement disciplined metatheoretic pluralism: 1) Educate doctoral students into the various philosophical paradigms; 2) Require authors to state their metatheoretic assumptions and review for conformance to them; 3) Open publication venues to all authors, methodologies, metatheoretic commitments, and ideas; 4) Change the evaluation mechanism to reduce the pressure to conform to normal science.
{"title":"The Philosopher's Corner","authors":"Michael J. Cuellar","doi":"10.1145/3400043.3400050","DOIUrl":"https://doi.org/10.1145/3400043.3400050","url":null,"abstract":"The DATA BASE for Advances in Information Systems has sponsored a series of articles on the thought of Paul Feyerabend (Treiblmaier, 2018, 2019; Gregor, 2018; Burton-Jones, 2018; Myers, 2018). Treiblmaier and the respondents discuss the actual meaning and implication of Feyerabend's ideas for information systems. In the series, the authors argue we already employ diverse methodologies. However, it is also apparent that a truncated view of philosophy as only concerned with epistemology and all methods as commensurable is employed. This paper argues we do not have a real diversity in the IS field and we should commit to the practice of a disciplined metatheoretic pluralism. Our methodology must not only be rigorously executed but also correctly interpreted in accord with our metatheoretic assumptions. We need to be open to all types of metatheory as well as methods and research topics. The paper provides four suggestions for how to implement disciplined metatheoretic pluralism: 1) Educate doctoral students into the various philosophical paradigms; 2) Require authors to state their metatheoretic assumptions and review for conformance to them; 3) Open publication venues to all authors, methodologies, metatheoretic commitments, and ideas; 4) Change the evaluation mechanism to reduce the pressure to conform to normal science.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"30 1","pages":"101 - 112"},"PeriodicalIF":2.8,"publicationDate":"2020-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76658919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It has been some time now since we have had our Philosopher's Corner feature in place at The DATA BASE for Advances in Information Systems, and we have seen some truly magnificent work appear in these pages in that time. I am gilding the lily in saying so, to be sure, but as an Editor-in-Chief, I have a certain pride of ownership in regard to it. I don't want to claim that The Philosopher's Corner was all my idea; we are a team here in the Editorial office, and we do things as a team and by consensus. Even so, I have a great deal of enthusiasm for the feature and take it upon myself to shamelessly promote it at every turn and in every quarter. Just as I am now.
{"title":"Metaphilosophical Musings","authors":"T. Stafford","doi":"10.1145/3400043.3400045","DOIUrl":"https://doi.org/10.1145/3400043.3400045","url":null,"abstract":"It has been some time now since we have had our Philosopher's Corner feature in place at The DATA BASE for Advances in Information Systems, and we have seen some truly magnificent work appear in these pages in that time. I am gilding the lily in saying so, to be sure, but as an Editor-in-Chief, I have a certain pride of ownership in regard to it. I don't want to claim that The Philosopher's Corner was all my idea; we are a team here in the Editorial office, and we do things as a team and by consensus. Even so, I have a great deal of enthusiasm for the feature and take it upon myself to shamelessly promote it at every turn and in every quarter. Just as I am now.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"103 1","pages":"10 - 11"},"PeriodicalIF":2.8,"publicationDate":"2020-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85252387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
While there has been a substantial amount of attention within the information systems research community towards understanding the phenomenon of adoption, much less is known about non-adoption. This study examines the factors surrounding the decision to not adopt a technology and whether certain factors exert differing effects on individuals in particular ways such that concurrent factors could be identified to develop a classification of the specific types of non-adoption behavior. Utilizing inhibitor theory and the symbolic adoption model as a foundational framework for the different types of non-adoption, we posit that different types of non-adoption exist which is demonstrated by determining the perceptions towards technology that coalesce around different types of non-adoption. We conducted a two-phase investigation into nonadoption with two goals in mind: 1) identify and explore specific factors of the IT that are associated with the rejection decision and are distinct from the adoption decision; and 2) determine the extent to which these factors (along with traditional enablers) differentiate between different types of non-adoption. The results from a discriminant function analysis (DFA) indicate the coalescence of specific perceptual variables according to the types of non-adoption behavior, specifically, the discriminatory power of differing perceptions of IT between trial rejecters, symbolic rejecters, trial accepters, symbolic adopters, and adopters. The implications for research and implications for practice are discussed.
{"title":"An Exploration of the Drivers of Non- Adoption Behavior","authors":"C. Wolverton, Ronald T. Cenfetelli","doi":"10.1145/3400043.3400048","DOIUrl":"https://doi.org/10.1145/3400043.3400048","url":null,"abstract":"While there has been a substantial amount of attention within the information systems research community towards understanding the phenomenon of adoption, much less is known about non-adoption. This study examines the factors surrounding the decision to not adopt a technology and whether certain factors exert differing effects on individuals in particular ways such that concurrent factors could be identified to develop a classification of the specific types of non-adoption behavior. Utilizing inhibitor theory and the symbolic adoption model as a foundational framework for the different types of non-adoption, we posit that different types of non-adoption exist which is demonstrated by determining the perceptions towards technology that coalesce around different types of non-adoption. We conducted a two-phase investigation into nonadoption with two goals in mind: 1) identify and explore specific factors of the IT that are associated with the rejection decision and are distinct from the adoption decision; and 2) determine the extent to which these factors (along with traditional enablers) differentiate between different types of non-adoption. The results from a discriminant function analysis (DFA) indicate the coalescence of specific perceptual variables according to the types of non-adoption behavior, specifically, the discriminatory power of differing perceptions of IT between trial rejecters, symbolic rejecters, trial accepters, symbolic adopters, and adopters. The implications for research and implications for practice are discussed.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"51 8 1","pages":"54 - 81"},"PeriodicalIF":2.8,"publicationDate":"2020-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91019920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Two aspects of decision-making on information security spending, executives' varying preferences for how proposals should be presented and the framing of the proposals, are developed. The proposed model of executives' commitment to information security is an interaction model (in addition to the cost of a security solution, and the risk and the potential loss of a security threat) consisting of the interaction between an executive's preferred subordinate influence approach (PSIA), rational or inspirational, and the framing, positive or negative, of a security proposal. The interaction of these two constructs affects the executive's commitment to an information security proposal. The model is tested using a scenario-based experiment that elicited responses from business executives across 100+ organizations. Results show that the interaction of the negative framing of a proposal and the inspirational PSIA of an executive affects his or her commitment to information security. Further, negative framing of a proposal and the cost of the security solution interact to decrease the executive's commitment to information security. This study underscores that prescriptions for business executives from normative models in information security spending must be complemented with appropriately framed messages to account for the differences in executives' PSIA (rational and inspirational) and cognitive biases.
{"title":"Executives' Commitment to Information Security","authors":"N. Menon, M. Siponen","doi":"10.1145/3400043.3400047","DOIUrl":"https://doi.org/10.1145/3400043.3400047","url":null,"abstract":"Two aspects of decision-making on information security spending, executives' varying preferences for how proposals should be presented and the framing of the proposals, are developed. The proposed model of executives' commitment to information security is an interaction model (in addition to the cost of a security solution, and the risk and the potential loss of a security threat) consisting of the interaction between an executive's preferred subordinate influence approach (PSIA), rational or inspirational, and the framing, positive or negative, of a security proposal. The interaction of these two constructs affects the executive's commitment to an information security proposal. The model is tested using a scenario-based experiment that elicited responses from business executives across 100+ organizations. Results show that the interaction of the negative framing of a proposal and the inspirational PSIA of an executive affects his or her commitment to information security. Further, negative framing of a proposal and the cost of the security solution interact to decrease the executive's commitment to information security. This study underscores that prescriptions for business executives from normative models in information security spending must be complemented with appropriately framed messages to account for the differences in executives' PSIA (rational and inspirational) and cognitive biases.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"2 1","pages":"36 - 53"},"PeriodicalIF":2.8,"publicationDate":"2020-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84300117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software robots tend to increasingly take over organizational processes. However, little is known about principles of building and implementing as opposed to using robotic systems, such as bots for process automation (RPA) and chatbots. Therefore, based on an empirically illustrated theoretical conceptualization of routine automation and affordance actualization, this paper develops a framework that guides how different types of software robots can be built and implemented through transforming a human-executed routine into a robot-automated routine by applying specific implementation guidelines.
{"title":"Towards a Framework of Implementing Software Robots: Transforming Human-executed Routines into Machines","authors":"Corinna Rutschi, Jens Dibbern","doi":"10.1145/3380799.3380808","DOIUrl":"https://doi.org/10.1145/3380799.3380808","url":null,"abstract":"Software robots tend to increasingly take over organizational processes. However, little is known about principles of building and implementing as opposed to using robotic systems, such as bots for process automation (RPA) and chatbots. Therefore, based on an empirically illustrated theoretical conceptualization of routine automation and affordance actualization, this paper develops a framework that guides how different types of software robots can be built and implemented through transforming a human-executed routine into a robot-automated routine by applying specific implementation guidelines.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"44 1","pages":"104-128"},"PeriodicalIF":2.8,"publicationDate":"2020-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77674219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}