Semantic Filter
show all semantic filters
Found 33 articles
  • Are Foreign and Domestic Information Technology Professionals Complements or Substitutes?

    2022 | Management Information Systems Quarterly | Citations: 1

    Authors: Mithas, Sunil; Chen, Yanzhen; Liu, Che-Wei; Han, Kunsoo

    Abstract: The globalization of work raises important questions related to the employment o ... Expand

    Semantic filters: September 11 attack

    Topics: IT workforce IT job research and development outsourcing offshoring

    Methods: instrumental variables estimation robustness check Compustat survey econometric modeling

    Theories: theory of economic recessions economic production theory

  • Examining Assumptions: Provocations on the Nature, Impact, and Implications of IS Theory

    2021 | Management Information Systems Quarterly | Citations: 0

    Authors: Burton-Jones, Andrew; Butler, Brian S; Scott, Susan V; Xu, Sean Xin

    Abstract: The Information Systems research community has a complex relationship with theo ... Expand

    Semantic filters: September 11 attack

    Topics: pandemic IT investment big data IT productivity online auction

    Methods: theory development design guideline theoretical contribution design science survey

    Theories: technology acceptance model sociomaterialism theory information systems theory privacy calculus theory

  • CEO Risk-Taking Incentives and IT Innovation: The Moderating Role of a CEO’s IT-Related Human Capital

    2021 | Management Information Systems Quarterly | Citations: 0

    Authors: Choi, Inmyung; Chung, Sunghun; Han, Kunsoo; Pinsonneault, Alain

    Abstract: Despite the importance of information technology (IT) innovation in today’s digi ... Expand

    Semantic filters: September 11 attack

    Topics: digital innovation human resource management IS education IT career innovation management

    Methods: descriptive statistic data transformation principal component analysis Compustat instrumental variables estimation

    Theories: agency theory

  • The different effects of hardware and software on production interdependence in manufacturing

    PDF

    2021 | Decision Support Systems | Citations: 0

    Authors: Gong, Fengmei; Cheng, Zhuo (June); Nault, Barrie R.

    Abstract: Make or buy decisions are often decisions between investing in capital for produ ... Expand

    Semantic filters: September 11 attack

    Topics: computer hardware productivity intellectual property IT investment business process management

    Methods: longitudinal research autocorrelation analysis econometric modeling chi squared test instrumental variables estimation

    Theories: transaction cost economics economic production theory

  • Rationalizing Online Romance Fraud: In the Eyes of the Offender

    2020 | Americas Conference on Information Systems | Citations: 0

    Authors: Barnor, Jonathan; Boateng, Richard; Kolog, Emmanuel Awuni; Afful-Dadzie, Anthony

    Abstract: This study seeks to understand romance scam from the offenders' perspective and ... Expand

    Semantic filters: September 11 attack

    Topics: computer crime criminality internet technology September 11 attack cyberbullying

    Methods: triangulation personal interview

  • A Double-Edged Sword: Diversity Within Religion and Market Emergence

    PDF

    2020 | Organization Science | Citations: 0

    Authors: Yan, Shipeng

    Abstract: Although societies are becoming increasingly secularized, religion continues to ... Expand

    Semantic filters: September 11 attack

    Topics: September 11 attack entrepreneurship offshoring database system

    Methods: robustness check regression analysis method descriptive statistic longitudinal research

  • Discontinuities in the Value of Relational Capital: The Effects on Employee Entrepreneurship and Mobility

    PDF

    2019 | Organization Science | Citations: 0

    Authors: Byun, Heejung; Raffiee, Joseph; Ganco, Martin

    Abstract: We examine how a discontinuous increase in the value of an employee’s relational ... Expand

    Semantic filters: September 11 attack

    Topics: entrepreneurship value creation IT personell turnover database system human resource management

    Methods: theory development statistical hypothesis test robustness check descriptive statistic computational algorithm

  • Avocados crossing borders: The problem of runaway objects and the solution of a shipping information pipeline for improving international trade

    PDF

    2018 | Information Systems Journal | Citations: 3

    Authors: Jensen, Thomas; Vatrapu, Ravi; Bjørn‐Andersen, Niels

    Abstract: This paper investigates the case of shipments of containers with avocados from f ... Expand

    Semantic filters: September 11 attack

    Topics: electronic data interchange extensible markup language supply chain management electronic mail enterprise resource planning

    Methods: case study qualitative interview focus group design theory design principle

    Theories: boundary objects theory activity theory transaction cost economics

  • Improving crime count forecasts using Twitter and taxi data

    PDF

    2018 | Decision Support Systems | Citations: 13

    Authors: Vomfell, Lara; Härdle, Wolfgang Karl; Lessmann, Stefan

    Abstract: Crime prediction is crucial to criminal justice decision makers and efforts to p ... Expand

    Semantic filters: September 11 attack

    Topics: criminality Twitter social media resource allocation accounting

    Methods: machine learning spatial analysis econometric model archival research random forest classification

  • Using Psycho-physiological Interaction Analysis with fMRI Data in IS Research: A Guideline

    PDF

    2017 | Communications of the Association for Information Systems | Citations: 0

    Authors: Hubert, Marco; Linzmajer, Marc; Riedl, René; Hubert, Mirja; Kenning, Peter; Weber, Bernd

    Abstract: The integration of neuroscientific methods in Information Systems (IS) research ... Expand

    Semantic filters: September 11 attack

    Topics: decision making social network electronic market website September 11 attack

    Methods: functional magnetic resonance imaging parametric test longitudinal research regression analysis method literature sample

    Theories: evolutionary theory argumentation theory