Pub Date : 2024-02-19DOI: 10.1080/07421222.2023.2301174
Ta-Wei (Daniel) Kao, Li Zhang, Benjamin B. M. Shao, Thomas Y. Choi
This study examines how the strength of social ties between focal and peer fundraisers interacts with the network structure generated by these social ties to determine crowdfunding performance. Wit...
{"title":"Social Ties among Fundraisers and Crowdfunding Performance: The Impact of Tie Strength and Network Closure","authors":"Ta-Wei (Daniel) Kao, Li Zhang, Benjamin B. M. Shao, Thomas Y. Choi","doi":"10.1080/07421222.2023.2301174","DOIUrl":"https://doi.org/10.1080/07421222.2023.2301174","url":null,"abstract":"This study examines how the strength of social ties between focal and peer fundraisers interacts with the network structure generated by these social ties to determine crowdfunding performance. Wit...","PeriodicalId":50154,"journal":{"name":"Journal of Management Information Systems","volume":"93 1","pages":""},"PeriodicalIF":7.7,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139901743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-19DOI: 10.1080/07421222.2023.2301177
He Li, William J. Kettinger, Sungjin Yoo
This research examines how a firm’s cloud storage implementation affects different types of security breaches in both the short- and long-term. Building on the attention-based view, we find that cl...
{"title":"Dark Clouds on the Horizon? Effects of Cloud Storage on Security Breaches","authors":"He Li, William J. Kettinger, Sungjin Yoo","doi":"10.1080/07421222.2023.2301177","DOIUrl":"https://doi.org/10.1080/07421222.2023.2301177","url":null,"abstract":"This research examines how a firm’s cloud storage implementation affects different types of security breaches in both the short- and long-term. Building on the attention-based view, we find that cl...","PeriodicalId":50154,"journal":{"name":"Journal of Management Information Systems","volume":"258 1","pages":""},"PeriodicalIF":7.7,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139901731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-19DOI: 10.1080/07421222.2023.2301169
Karl Akbari, Daniel Fürstenau, Till J. Winkler
This study explores the relationship between the governance of architecturally embedded applications and their longevity in organizational use. Using a contingency-fit logic, it posits that alignme...
{"title":"Governance and Longevity of Architecturally Embedded Applications","authors":"Karl Akbari, Daniel Fürstenau, Till J. Winkler","doi":"10.1080/07421222.2023.2301169","DOIUrl":"https://doi.org/10.1080/07421222.2023.2301169","url":null,"abstract":"This study explores the relationship between the governance of architecturally embedded applications and their longevity in organizational use. Using a contingency-fit logic, it posits that alignme...","PeriodicalId":50154,"journal":{"name":"Journal of Management Information Systems","volume":"51 1","pages":""},"PeriodicalIF":7.7,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139901730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-19DOI: 10.1080/07421222.2023.2301168
Vladimir Zwass
Published in Journal of Management Information Systems (Vol. 41, No. 1, 2024)
发表于《管理信息系统期刊》(第 41 卷,第 1 期,2024 年)
{"title":"Editorial Introduction","authors":"Vladimir Zwass","doi":"10.1080/07421222.2023.2301168","DOIUrl":"https://doi.org/10.1080/07421222.2023.2301168","url":null,"abstract":"Published in Journal of Management Information Systems (Vol. 41, No. 1, 2024)","PeriodicalId":50154,"journal":{"name":"Journal of Management Information Systems","volume":"4 1","pages":""},"PeriodicalIF":7.7,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139911019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-19DOI: 10.1080/07421222.2023.2301170
Manuel Wiesche, Christoph Pflügler, Jason Bennett Thatcher
While IT workforce research often examines job- and organizational-related reasons for turnover, studies rarely connect the immediate social context of IT work to IT professionals’ workplace behavi...
尽管 IT 员工队伍研究经常探讨与工作和组织相关的人员流失原因,但很少有研究将 IT 工作的直接社会背景与 IT 专业人员的工作场所行为联系起来...
{"title":"The Impact of Social Comparison on Turnover Among Information Technology Professionals","authors":"Manuel Wiesche, Christoph Pflügler, Jason Bennett Thatcher","doi":"10.1080/07421222.2023.2301170","DOIUrl":"https://doi.org/10.1080/07421222.2023.2301170","url":null,"abstract":"While IT workforce research often examines job- and organizational-related reasons for turnover, studies rarely connect the immediate social context of IT work to IT professionals’ workplace behavi...","PeriodicalId":50154,"journal":{"name":"Journal of Management Information Systems","volume":"28 1","pages":""},"PeriodicalIF":7.7,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139901746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-19DOI: 10.1080/07421222.2023.2301176
Jiexin Zheng, Ka Chung Ng, Rong Zheng, Kar Yan Tam
We examine the evolutionary effects of sentiment words in financial text and their implications for various business outcomes. We propose an algorithm called Word List Vector for Sentiment (WOLVES)...
{"title":"The Effects of Sentiment Evolution in Financial Texts: A Word Embedding Approach","authors":"Jiexin Zheng, Ka Chung Ng, Rong Zheng, Kar Yan Tam","doi":"10.1080/07421222.2023.2301176","DOIUrl":"https://doi.org/10.1080/07421222.2023.2301176","url":null,"abstract":"We examine the evolutionary effects of sentiment words in financial text and their implications for various business outcomes. We propose an algorithm called Word List Vector for Sentiment (WOLVES)...","PeriodicalId":50154,"journal":{"name":"Journal of Management Information Systems","volume":"608 1","pages":""},"PeriodicalIF":7.7,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139901732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-19DOI: 10.1080/07421222.2023.2301172
Junho Yoon, Gautam Pant, Shagun Pant
In contrast with the accelerating trend of boundary-spanning (horizontal) technological innovation, the current Cooperative Patent Classification (CPC) scheme applies a hierarchical (vertical) stru...
与跨边界(横向)技术创新的加速趋势相反,目前的合作专利分类(CPC)计划采用的是分层(纵向)结构。
{"title":"Discovery of Technological Innovation Systems: Implications for Predicting Future Innovation","authors":"Junho Yoon, Gautam Pant, Shagun Pant","doi":"10.1080/07421222.2023.2301172","DOIUrl":"https://doi.org/10.1080/07421222.2023.2301172","url":null,"abstract":"In contrast with the accelerating trend of boundary-spanning (horizontal) technological innovation, the current Cooperative Patent Classification (CPC) scheme applies a hierarchical (vertical) stru...","PeriodicalId":50154,"journal":{"name":"Journal of Management Information Systems","volume":"31 1","pages":""},"PeriodicalIF":7.7,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139901735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-19DOI: 10.1080/07421222.2023.2301178
Benjamin M. Ampel, Sagar Samtani, Hongyi Zhu, Hsinchun Chen, Jay F. Nunamaker Jr.
Cyberattacks have been increasing in volume and intensity, necessitating proactive measures. Cybersecurity risk management frameworks are deployed to provide actionable intelligence to mitigate pot...
{"title":"Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach","authors":"Benjamin M. Ampel, Sagar Samtani, Hongyi Zhu, Hsinchun Chen, Jay F. Nunamaker Jr.","doi":"10.1080/07421222.2023.2301178","DOIUrl":"https://doi.org/10.1080/07421222.2023.2301178","url":null,"abstract":"Cyberattacks have been increasing in volume and intensity, necessitating proactive measures. Cybersecurity risk management frameworks are deployed to provide actionable intelligence to mitigate pot...","PeriodicalId":50154,"journal":{"name":"Journal of Management Information Systems","volume":"29 1","pages":""},"PeriodicalIF":7.7,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139901742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1080/07421222.2023.2267319
Qian Wang, Eric W. T. Ngai, Daniel Pienta, Jason Bennett Thatcher
The adoption of new Information Technology (IT) innovations has led to increased uncertainty among employees, a greater demand for security measures, and more entry points for cyber-attacks, which ...
{"title":"Information Technology Innovativeness and Data-Breach Risk: A Longitudinal Study","authors":"Qian Wang, Eric W. T. Ngai, Daniel Pienta, Jason Bennett Thatcher","doi":"10.1080/07421222.2023.2267319","DOIUrl":"https://doi.org/10.1080/07421222.2023.2267319","url":null,"abstract":"The adoption of new Information Technology (IT) innovations has led to increased uncertainty among employees, a greater demand for security measures, and more entry points for cyber-attacks, which ...","PeriodicalId":50154,"journal":{"name":"Journal of Management Information Systems","volume":"190 1","pages":""},"PeriodicalIF":7.7,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138565030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1080/07421222.2023.2267320
Ching-I Teng, Alan R. Dennis, Alexander S. Dennis
Avatar-mediated communication (AMC), commonly used in online environments such as games and the emerging metaverse, is different from traditional computer-mediated communication in that it is a hum...
{"title":"Avatar-Mediated Communication and Social Identification","authors":"Ching-I Teng, Alan R. Dennis, Alexander S. Dennis","doi":"10.1080/07421222.2023.2267320","DOIUrl":"https://doi.org/10.1080/07421222.2023.2267320","url":null,"abstract":"Avatar-mediated communication (AMC), commonly used in online environments such as games and the emerging metaverse, is different from traditional computer-mediated communication in that it is a hum...","PeriodicalId":50154,"journal":{"name":"Journal of Management Information Systems","volume":"21 1","pages":""},"PeriodicalIF":7.7,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138565022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}