Pub Date : 2025-02-07DOI: 10.1016/j.im.2025.104118
Yang-Jun Li , Zhi-Zhi He , Christy M.K. Cheung , Xiao-Liang Shen , Matthew K.O. Lee
Our study seeks to explain bystander inaction by guiding the regulation of delegitimizing doxing. We develop a contextualized research model by integrating attitudinal ambivalence theory and general deterrence theory. Our results innovatively uncover three congruence effects describing how positive and negative appraisals are combined to determine bystander inaction. Moreover, perceived SNS deterrence weakens the negative impact of attitudinal univalence on bystander inaction. As one of the pioneering empirical inquiries into delegitimizing doxing, our study contributes to theory and practice related to bystander intervention in delegitimizing doxing.
{"title":"An integrated model of ambivalence and deterrence of bystander inaction in delegitimizing doxing","authors":"Yang-Jun Li , Zhi-Zhi He , Christy M.K. Cheung , Xiao-Liang Shen , Matthew K.O. Lee","doi":"10.1016/j.im.2025.104118","DOIUrl":"10.1016/j.im.2025.104118","url":null,"abstract":"<div><div>Our study seeks to explain bystander inaction by guiding the regulation of delegitimizing doxing. We develop a contextualized research model by integrating attitudinal ambivalence theory and general deterrence theory. Our results innovatively uncover three congruence effects describing how positive and negative appraisals are combined to determine bystander inaction. Moreover, perceived SNS deterrence weakens the negative impact of attitudinal univalence on bystander inaction. As one of the pioneering empirical inquiries into delegitimizing doxing, our study contributes to theory and practice related to bystander intervention in delegitimizing doxing.</div></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"62 3","pages":"Article 104118"},"PeriodicalIF":8.2,"publicationDate":"2025-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143402639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-06DOI: 10.1016/j.im.2025.104110
Debalina Bera , Dan J. Kim
Phishing, the most pervasive cyber-attack, is a threat to both organizations and individuals, leaving phishing identification the most crucial anti-phishing weapon for all internet users. Individuals’ choice of information processing strategies results in differing accuracy of phishing identification. As an antecedent of phishing identification, the effect of mindfulness training has been researched. However, the influence of dispositional and domain-specific mindfulness, along with an individual's affective state, which drives the choice of information processing strategies which in turn affect one's phishing detection, has not yet been given sufficient empirical and theoretical scrutiny. This study thus identifies and analyzes the antecedents (heuristic and systematic information processing, dispositional and domain mindfulness, and affective state) and behavioral consequences (phishing detection accuracy), drawing on the heuristic-systematic model of information processing, mindful decision-making, and affect-and-persuasion literature. A scenario-based survey experiment was conducted to reveal how dispositional and contextual mindfulness and affectivity influence information processing mechanisms and, consequently, affect phishing detection accuracy. The study aims to contribute to the existing information security literature by examining the novel connections between dispositional and domain mindfulness and their influence on individual users' information processing strategies and phishing detection accuracy. Further, it intends to contribute to phishing training and awareness activities by identifying the function of cognitive-affective (affective states, trait mindfulness) and cognitive-behavioral (domain mindfulness) factors on the choice of information processing modes and phishing detection accuracy. Also, the study indicates that leveraging affective states could enhance the effectiveness of automatic filters in combating phishing attempts.
{"title":"The nexus of mindfulness, affect, and information processing in phishing identification: An empirical examination","authors":"Debalina Bera , Dan J. Kim","doi":"10.1016/j.im.2025.104110","DOIUrl":"10.1016/j.im.2025.104110","url":null,"abstract":"<div><div>Phishing, the most pervasive cyber-attack, is a threat to both organizations and individuals, leaving phishing identification the most crucial anti-phishing weapon for all internet users. Individuals’ choice of information processing strategies results in differing accuracy of phishing identification. As an antecedent of phishing identification, the effect of mindfulness training has been researched. However, the influence of dispositional and domain-specific mindfulness, along with an individual's affective state, which drives the choice of information processing strategies which in turn affect one's phishing detection, has not yet been given sufficient empirical and theoretical scrutiny. This study thus identifies and analyzes the antecedents (heuristic and systematic information processing, dispositional and domain mindfulness, and affective state) and behavioral consequences (phishing detection accuracy), drawing on the heuristic-systematic model of information processing, mindful decision-making, and affect-and-persuasion literature. A scenario-based survey experiment was conducted to reveal how dispositional and contextual mindfulness and affectivity influence information processing mechanisms and, consequently, affect phishing detection accuracy. The study aims to contribute to the existing information security literature by examining the novel connections between dispositional and domain mindfulness and their influence on individual users' information processing strategies and phishing detection accuracy. Further, it intends to contribute to phishing training and awareness activities by identifying the function of cognitive-affective (affective states, trait mindfulness) and cognitive-behavioral (domain mindfulness) factors on the choice of information processing modes and phishing detection accuracy. Also, the study indicates that leveraging affective states could enhance the effectiveness of automatic filters in combating phishing attempts.</div></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"62 3","pages":"Article 104110"},"PeriodicalIF":8.2,"publicationDate":"2025-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143394985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-03DOI: 10.1016/j.im.2025.104109
Peng Xie
This study draws from the theory of collecting to explore how blockchain technologies facilitate virtual art trading and collecting, and then analyzes an NFT dataset to develop artificial scarcity design heuristics for royalty income maximization. The findings show a trade-off between scarcity's positive effect on the sale price and its inverted-U shape effect on trading frequency. Based on this trade-off, several royalty income maximization scarcity design heuristics are proposed and validated using computational studies. The implications of this paper extend beyond the NFT market to other virtual goods markets where scarcity is artificially designed to create value.
{"title":"Artificial scarcity design heuristics for digital collecting: Evidence from the non-fungible token market","authors":"Peng Xie","doi":"10.1016/j.im.2025.104109","DOIUrl":"10.1016/j.im.2025.104109","url":null,"abstract":"<div><div>This study draws from the theory of collecting to explore how blockchain technologies facilitate virtual art trading and collecting, and then analyzes an NFT dataset to develop artificial scarcity design heuristics for royalty income maximization. The findings show a trade-off between scarcity's positive effect on the sale price and its inverted-U shape effect on trading frequency. Based on this trade-off, several royalty income maximization scarcity design heuristics are proposed and validated using computational studies. The implications of this paper extend beyond the NFT market to other virtual goods markets where scarcity is artificially designed to create value.</div></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"62 3","pages":"Article 104109"},"PeriodicalIF":8.2,"publicationDate":"2025-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143419142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-25DOI: 10.1016/j.im.2025.104108
Elodie Manthé , Rémi Mencarelli , Jessie Pallud
Crowdsourcing (CS) has generated considerable excitement among practitioners in recent years, especially for the purpose of solving complex tasks. However, several failed CS initiatives have highlighted the difficulties of tapping into a crowd of contributors. Whereas most scholars consider CS activities to be sources of benefits for all actors involved, some scattered empirical results obtained in management literature challenge this assumption and demonstrate the existence of a dark side of CS. With a systematic literature review, the authors aim to identify various undesirable outcomes related to CS of complex tasks (CSCT). To do so, they reveal how all actors involved in CSCT activities—contributors, crowdsourcers, and CS platforms—can be both victims and perpetrators, possessing some characteristics that can produce detrimental effects but also activating mitigation mechanisms to counteract the dark side of CSCT activities. They also discuss the respective implications for academics and practitioners and suggest avenues for further research.
{"title":"The dark side of crowdsourcing of complex tasks: A systematic literature review","authors":"Elodie Manthé , Rémi Mencarelli , Jessie Pallud","doi":"10.1016/j.im.2025.104108","DOIUrl":"10.1016/j.im.2025.104108","url":null,"abstract":"<div><div>Crowdsourcing (CS) has generated considerable excitement among practitioners in recent years, especially for the purpose of solving complex tasks. However, several failed CS initiatives have highlighted the difficulties of tapping into a crowd of contributors. Whereas most scholars consider CS activities to be sources of benefits for all actors involved, some scattered empirical results obtained in management literature challenge this assumption and demonstrate the existence of a dark side of CS. With a systematic literature review, the authors aim to identify various undesirable outcomes related to CS of complex tasks (CSCT). To do so, they reveal how all actors involved in CSCT activities—contributors, crowdsourcers, and CS platforms—can be both victims and perpetrators, possessing some characteristics that can produce detrimental effects but also activating mitigation mechanisms to counteract the dark side of CSCT activities. They also discuss the respective implications for academics and practitioners and suggest avenues for further research.</div></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"62 3","pages":"Article 104108"},"PeriodicalIF":8.2,"publicationDate":"2025-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143133617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-24DOI: 10.1016/j.im.2025.104106
Nina Platzer , Franziska Stoeckl , Christian Maier , Andreas Eckhardt
Individuals often cycle between using, discontinuing, and resuming information systems (IS). Despite recognizing the growing importance of reacquiring ex-users in IS research and practice, factors driving IS use resumption remain underexplored. Addressing this gap, we conducted 29 interviews analyzing 96 resumption cases. Our findings reveal seven recurring characteristics across five resumption patterns, providing a thorough understanding of the nuanced dynamics influenced by diverse contexts, users, and IS. These findings provide a better understanding of IS use resumption and practical insights for organizations seeking to enhance customer numbers, sales, and revenues by tapping into the potential of winning back ex-users.
{"title":"Why ex-users come back: revealing characteristics and patterns of information system use resumption","authors":"Nina Platzer , Franziska Stoeckl , Christian Maier , Andreas Eckhardt","doi":"10.1016/j.im.2025.104106","DOIUrl":"10.1016/j.im.2025.104106","url":null,"abstract":"<div><div>Individuals often cycle between using, discontinuing, and resuming information systems (IS). Despite recognizing the growing importance of reacquiring ex-users in IS research and practice, factors driving IS use resumption remain underexplored. Addressing this gap, we conducted 29 interviews analyzing 96 resumption cases. Our findings reveal seven recurring characteristics across five resumption patterns, providing a thorough understanding of the nuanced dynamics influenced by diverse contexts, users, and IS. These findings provide a better understanding of IS use resumption and practical insights for organizations seeking to enhance customer numbers, sales, and revenues by tapping into the potential of winning back ex-users.</div></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"62 3","pages":"Article 104106"},"PeriodicalIF":8.2,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143133619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-23DOI: 10.1016/j.im.2025.104107
N. Sharon Hill , Maria Ximena Hincapie
The growing popularity of hybrid work has fueled the growth of teams with substantial reliance on virtual communication (i.e., interactions using computer-mediated communication rather than in person). Across two studies with self-managing hybrid teams, we apply a social role theory perspective to show women's tendency to be more effective virtual collaborators than men. We also find that a team member's virtual teamwork situational judgment—knowledge about formulating effective responses to virtual collaboration demands—mediates this effect. Our findings highlight the importance of a gender perspective in understanding virtual collaboration dynamics to promote successful teamwork in the increasingly digital workplace.
{"title":"Gender differences in virtual collaboration effectiveness in hybrid teams","authors":"N. Sharon Hill , Maria Ximena Hincapie","doi":"10.1016/j.im.2025.104107","DOIUrl":"10.1016/j.im.2025.104107","url":null,"abstract":"<div><div>The growing popularity of hybrid work has fueled the growth of teams with substantial reliance on virtual communication (i.e., interactions using computer-mediated communication rather than in person). Across two studies with self-managing hybrid teams, we apply a social role theory perspective to show women's tendency to be more effective virtual collaborators than men. We also find that a team member's virtual teamwork situational judgment—knowledge about formulating effective responses to virtual collaboration demands—mediates this effect. Our findings highlight the importance of a gender perspective in understanding virtual collaboration dynamics to promote successful teamwork in the increasingly digital workplace.</div></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"62 3","pages":"Article 104107"},"PeriodicalIF":8.2,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143419143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-14DOI: 10.1016/j.im.2025.104104
Yuting Wang , Jie Fang , Bojue Xu , Shuning Zheng , Zhao Cai
Client citizenship behaviors (CCBs) are prominent to enterprise system vendors to improve service. This study delves into the examination of how vendor's in-role and extra-role performance jointly impact CCBs. Employing polynomial regression and response surface analysis, this research scrutinizes the impacts of the congruence and incongruence between the vendor's in-role and extra-role performance as well as the boundary condition of environmental dynamism. The findings indicate that the CCBs are higher when in-role performance matches extra-role performance at a high level. Furthermore, when employees' in-role and extra-role performance are incongruent, CCBs decrease as the discrepancy increases. Environmental dynamism moderates these relationships.
{"title":"Disentangling the impact of vendor in-role and extra-role performance on client citizenship behavior in enterprise system projects: A response surface analysis","authors":"Yuting Wang , Jie Fang , Bojue Xu , Shuning Zheng , Zhao Cai","doi":"10.1016/j.im.2025.104104","DOIUrl":"10.1016/j.im.2025.104104","url":null,"abstract":"<div><div>Client citizenship behaviors (CCBs) are prominent to enterprise system vendors to improve service. This study delves into the examination of how vendor's in-role and extra-role performance jointly impact CCBs. Employing polynomial regression and response surface analysis, this research scrutinizes the impacts of the congruence and incongruence between the vendor's in-role and extra-role performance as well as the boundary condition of environmental dynamism. The findings indicate that the CCBs are higher when in-role performance matches extra-role performance at a high level. Furthermore, when employees' in-role and extra-role performance are incongruent, CCBs decrease as the discrepancy increases. Environmental dynamism moderates these relationships.</div></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"62 2","pages":"Article 104104"},"PeriodicalIF":8.2,"publicationDate":"2025-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143139279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-14DOI: 10.1016/j.im.2025.104105
Anna Priante, Dimitrios Tsekouras
This study examines the impact of game-based student response systems (GSRSs) on students’ learning experiences in face-to-face education. Building on technology-mediated learning and active learning, we demonstrate the positive impact of GSRS use on learning outcomes and learning processes (student motivation, concentration, and enjoyment) in a field experiment in a Dutch secondary school. Our study expands information systems research by showing the educational and social impact of technology integration in physical classrooms and its equalizing role in bridging the performance disparity between underperforming and overperforming students while promoting an inclusive learning environment for all students.
{"title":"Integrating technology in physical classrooms: The impact of game-based response systems on student learning experience","authors":"Anna Priante, Dimitrios Tsekouras","doi":"10.1016/j.im.2025.104105","DOIUrl":"10.1016/j.im.2025.104105","url":null,"abstract":"<div><div>This study examines the impact of game-based student response systems (GSRSs) on students’ learning experiences in face-to-face education. Building on technology-mediated learning and active learning, we demonstrate the positive impact of GSRS use on learning outcomes and learning processes (student motivation, concentration, and enjoyment) in a field experiment in a Dutch secondary school. Our study expands information systems research by showing the educational and social impact of technology integration in physical classrooms and its equalizing role in bridging the performance disparity between underperforming and overperforming students while promoting an inclusive learning environment for all students.</div></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"62 3","pages":"Article 104105"},"PeriodicalIF":8.2,"publicationDate":"2025-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143133618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-10DOI: 10.1016/j.im.2025.104103
Xiahua Wei , Naveen Kumar , Han Zhang
Generative AI technologies, particularly Large Language Models (LLMs), have transformed information management systems but introduced substantial biases that can compromise their effectiveness in informing business decision-making. This challenge presents information management scholars with a unique opportunity to advance the field by identifying and addressing these biases across extensive applications of LLMs. Building on the discussion on bias sources and current methods for detecting and mitigating bias, this paper seeks to identify gaps and opportunities for future research. By incorporating ethical considerations, policy implications, and sociotechnical perspectives, we focus on developing a framework that covers major stakeholders of Generative AI systems, proposing key research questions, and inspiring discussion. Our goal is to provide actionable pathways for researchers to address bias in LLM applications, thereby advancing research in information management that ultimately informs business practices. Our forward-looking framework and research agenda advocate interdisciplinary approaches, innovative methods, dynamic perspectives, and rigorous evaluation to ensure fairness and transparency in Generative AI-driven information systems. We expect this study to serve as a call to action for information management scholars to tackle this critical issue, guiding the improvement of fairness and effectiveness in LLM-based systems for business practice.
{"title":"Addressing bias in generative AI: Challenges and research opportunities in information management","authors":"Xiahua Wei , Naveen Kumar , Han Zhang","doi":"10.1016/j.im.2025.104103","DOIUrl":"10.1016/j.im.2025.104103","url":null,"abstract":"<div><div>Generative AI technologies, particularly Large Language Models (LLMs), have transformed information management systems but introduced substantial biases that can compromise their effectiveness in informing business decision-making. This challenge presents information management scholars with a unique opportunity to advance the field by identifying and addressing these biases across extensive applications of LLMs. Building on the discussion on bias sources and current methods for detecting and mitigating bias, this paper seeks to identify gaps and opportunities for future research. By incorporating ethical considerations, policy implications, and sociotechnical perspectives, we focus on developing a framework that covers major stakeholders of Generative AI systems, proposing key research questions, and inspiring discussion. Our goal is to provide actionable pathways for researchers to address bias in LLM applications, thereby advancing research in information management that ultimately informs business practices. Our forward-looking framework and research agenda advocate interdisciplinary approaches, innovative methods, dynamic perspectives, and rigorous evaluation to ensure fairness and transparency in Generative AI-driven information systems. We expect this study to serve as a call to action for information management scholars to tackle this critical issue, guiding the improvement of fairness and effectiveness in LLM-based systems for business practice.</div></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"62 2","pages":"Article 104103"},"PeriodicalIF":8.2,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143139222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-07DOI: 10.1016/j.im.2025.104101
Martijn Jungst , Cedric Verbeeck
This study examines whether emotional exhaustion mediates the effect of technology overload on two types of employee silence: defensive and acquiescent. We also examine whether employment contracts (part-time/full-time) interact with technology overload to influence emotional exhaustion and subsequently the two types of employee silence. Based on data collected from 210 employees working in different organizations, the results indicate that technology overload is positively associated with employee silence (defensive and acquiescent) and that emotional exhaustion mediates this direct effect. However, the effects of technology overload are less pronounced for part-time employees than for full-time employees.
{"title":"The moderating role of employment contract in the relationship between technology overload and employee silence","authors":"Martijn Jungst , Cedric Verbeeck","doi":"10.1016/j.im.2025.104101","DOIUrl":"10.1016/j.im.2025.104101","url":null,"abstract":"<div><div>This study examines whether emotional exhaustion mediates the effect of technology overload on two types of employee silence: defensive and acquiescent. We also examine whether employment contracts (part-time/full-time) interact with technology overload to influence emotional exhaustion and subsequently the two types of employee silence. Based on data collected from 210 employees working in different organizations, the results indicate that technology overload is positively associated with employee silence (defensive and acquiescent) and that emotional exhaustion mediates this direct effect. However, the effects of technology overload are less pronounced for part-time employees than for full-time employees.</div></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"62 2","pages":"Article 104101"},"PeriodicalIF":8.2,"publicationDate":"2025-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143139305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}