2023 | International Conference on Information Systems | Citations: 0
Authors: Dong, Sichen; Hu, Daning; Chau, Michael
Abstract: Decentralized autonomous organizations (DAOs) offer a novel paradigm, fostering ... Expand
Topics: social norm blockchain structured query language application programming interface social media
Methods: theory development economic model experiment
Theories: economic theory
2023 | HICSS | Citations: 0
Authors: Dong, X.; Liu, Y.; Hu, C.
Abstract: Re-creation behavior is an important way for video website users to generate co ... Expand
Topics: user behavior online community website intrinsic motivation
Methods: survey PLS tool data transformation exploratory factor analysis
2023 | International Journal of Information Management | Citations: 0
Authors: Dubey, Rameshwar; Gupta, Manjul; Mikalef, Patrick; Akter, Shahriar
Abstract: In this Editorial Note for the special issue on "Incorporating Blockchain Techno ... Expand
Topics: blockchain innovation management customer loyalty digital innovation peer-to-peer model
Methods: literature sample design science case study structured literature research theory development
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Dyosi, Neliswa; Tanner, Maureen
Abstract: The retail industry is highly competitive and requires businesses to continuous ... Expand
Topics: cryptocurrency database system innovation management perceived usefulness business process management
Methods: literature sample survey structured literature research literature study synthesis
Theories: unified theory of acceptance and use of technology technology acceptance model
2023 | DESRIST | Citations: 0
Authors: Díaz, Oscar; Garmendia, Xabier; Contell, Jeremías P.; Pereira, Juanan
Abstract: Research Question (RQ) Scoping refers to defining and refining a research questi ... Expand
Topics: artificial intelligence ease of use perceived usefulness perceived ease of use communication service infrastructure
Methods: chatGPT chatbot design principle survey natural language processing
Theories: technology acceptance model theory of affordance
2023 | European Conference On Information Systems | Citations: 0
Authors: Eggert, Mathias; Weber, Jannik
Abstract: The popularity of social media and particularly Instagram grows steadily. Peopl ... Expand
Topics: Instagram usability social media privacy IT security defense
Methods: structural equation modeling survey partial least squares regression computational algorithm literature study
2023 | International Conference on Business Informatics | Citations: 0
Authors: Elbert, Nico; Stein, Nikolai; Flath, Christoph M.
Abstract: In this study, we introduce a data-driven approach for process mining in real-t ... Expand
Topics: process mining strategic management business process management decision support decision making
Methods: cluster analysis Petri net modeling language XGBoost event log
2023 | Information Systems Journal | Citations: 2
Authors: Engert, Martin; Evers, Julia; Hein, Andreas; Krcmar, Helmut
Abstract: Digital platform ecosystems increasingly dominate the enterprise software domain ... Expand
Topics: digital ecosystem platform governance enterprise information system digital platform innovation management
Methods: qualitative interview case study qualitative coding design artifact theory development
2023 | Journal of Management Information Systems | Citations: 0
Authors: Eryilmaz, Evren; Thoms, Brian; Ahmed, Zafor; Lee, Howard
Abstract: This paper explores the formation of a learning community facilitated by custom ... Expand
Topics: recommender system collaborative filtering pandemic online learning system open source
Methods: qualitative content analysis descriptive statistic sociometry synthesis mixed method
Theories: cognitive theory
2023 | HICSS | Citations: 0
Authors: Faltermaier, Stefan; Strunk, Kim; Obermeier, Michaela; Fiedler, Marina
Abstract: Desirable user behavior is key to cyber security in organizations. However, a co ... Expand
Topics: IT security user behavior information technology capability IT security defense password
Methods: qualitative interview personal interview qualitative coding grounded theory case study