Semantic Filter
show all semantic filters
Found 3937 articles
  • Online Labor Platforms and the Role of Job Security and Compensation (Mis)Fits for Gig Workers

    2023 | International Conference on Information Systems | Citations: 1

    Authors: Adam, Martin; Wiener, Martin; Benlian, Alexander

    Abstract: Online labor platforms (OLPs) use algorithms to manage their workers. Prior res ... Expand

    Semantic filters: factor analysis

    Topics: IS satisfaction platform worker algorithmic management digital platform ride sharing platform

    Methods: survey regression analysis method cross sectional research polynomial regression theoretical contribution

  • Remote Workers’ Privacy Concerns, Psychological Climate for Face Time, and Organizational Affective Commitment

    2023 | HICSS | Citations: 0

    Authors: Afota, Marie-Colombe; Cañibano, Almudena; Ollier-Malaterre, Ariane; Provost Savard, Yanick; Léon, Emmanuelle

    Abstract: During the Covid-19 pandemic, the shift to high-intensity remote work—three days ... Expand

    Semantic filters: factor analysis

    Topics: information privacy concern organizational commitment remote work IT supported collaboration privacy

    Methods: statistical hypothesis test chi squared test longitudinal research SEM tool structural equation modeling

    Theories: social information processing theory

  • Differential Impact of Content in Online Communication on Heterogeneous Candidates: A Field Study in Technical Recruitment

    PDF

    2023 | Information Systems Research | Citations: 0

    Authors: Aggarwal, Rohit; Lee, Michael J.; Midha, Vishal

    Abstract: Recruitment is a critical activity for companies, and the research community has ... Expand

    Semantic filters: factor analysis

    Topics: social media electronic mail IS economics economic surplus IT workforce

    Methods: experimental group survey field study factor analysis descriptive statistic

    Theories: motivation theory

  • An Empirical Investigation on Business Analytics in Software and Systems Development Projects

    PDF

    2023 | Information Systems Frontiers | Citations: 0

    Authors: Ahmad, Muhammad Ovais; Ahmad, Iftikhar; Rana, Nripendra P.; Khan, Iqra Sadaf

    Abstract: To create competitive advantages, companies are leaning towards business analyti ... Expand

    Semantic filters: factor analysis

    Topics: perceived usefulness IT development project IT project systems development IT workforce

    Methods: survey partial least squares path modeling machine learning conceptual modelling data transformation

    Theories: expectation confirmation theory

  • Too Tired and in Too Good of a Mood to Worry About Privacy: Explaining the Privacy Paradox Through the Lens of Effort Level in Information Processing

    PDF

    2023 | Information Systems Research | Citations: 0

    Authors: Alashoor, Tawfiq; Keil, Mark; Smith, H. Jeff; McConnell, Allen R.

    Abstract: The confluence of digital transactions, growing cybersecurity threats, and the i ... Expand

    Semantic filters: factor analysis

    Topics: information privacy concern privacy decision making mobile application task productivity

    Methods: experiment descriptive statistic statistical hypothesis test theory development Student's t-test

    Theories: elaboration likelihood model

  • Uniting Through Difference: Rich Cultural-Identity Expression as a Conduit to Inclusion

    PDF

    2023 | Organization Science | Citations: 0

    Authors: Arnett, Rachel D.

    Abstract: Although previous research suggests that bringing attention to minority cultural ... Expand

    Semantic filters: factor analysis

    Topics: electronic mail accounting identity management IT career pandemic

    Methods: experiment survey ANOVA parametric test data transformation

  • How commitment and platform adoption drive the e-commerce performance of SMEs: A mixed-method inquiry into e-commerce affordances

    PDF

    2023 | International Journal of Information Management | Citations: 0

    Authors: Ballerini, Jacopo; Herhausen, Dennis; Ferraris, Alberto

    Abstract: To cope with the digital transition exacerbated by the COVID-19 pandemic, manage ... Expand

    Semantic filters: factor analysis

    Topics: electronic commerce affordance user experience entrepreneurship usability

    Methods: survey qualitative interview structural equation modeling data transformation personal interview

    Theories: theory of affordance

  • Segmentation preference and technostress: Integrators’ vs segmenters’ experience of technology-induced demands and related spill-over effects

    PDF

    2023 | Information & Management | Citations: 0

    Authors: Becker, Julia; Lanzl, Julia

    Abstract: Remote work is becoming the “new normal”, and more people are working in the hom ... Expand

    Semantic filters: factor analysis

    Topics: information system use technostress pandemic self efficacy IT supported collaboration

    Methods: longitudinal research survey structural equation modeling data transformation confirmatory factor analysis

  • The impact of enterprise architecture management on information systems architecture complexity

    PDF

    2023 | European Journal of Information Systems | Citations: 0

    Authors: Beese, Jannis; Aier, Stephan; Haki, Kazem; Winter, Robert

    Abstract: Significant investments in information systems (IS) over the past decades have l ... Expand

    Semantic filters: factor analysis

    Topics: enterprise architecture IT manager IT development project missing data organization structure

    Methods: survey focus group survey design structural equation modeling partial least squares path modeling

  • The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Bera, Debalina; Kim, Dan

    Abstract: This study investigates the effect of individuals' information processing modes ... Expand

    Semantic filters: factor analysis

    Topics: phishing mindfulness electronic mail email phishing data security

    Methods: experiment survey partial least squares regression machine learning laboratory experiment

    Theories: protection motivation theory