International Journal of Information Management
Papers 2543
1 page of 255 pages (2,543 results)
Spyridon Samonas2
Estimated H-index: 2
Gurpreet Dhillon27
Estimated H-index: 27
(UNCG: University of North Carolina at Greensboro),
Ahlam Almusharraf1
Estimated H-index: 1
Abstract Organizational stakeholders, such as employees and security managers, may understand security rules and policies differently. Extant literature suggests that stakeholder perceptions of security policies can contribute to the success or failure of policies. This paper draws on the Theory of Personal Constructs and the associated methodology, the Repertory Grid technique, to capture the convergence and divergence of stakeholder perceptions with regards to security policy. We collected dat...
Si Shi6
Estimated H-index: 6
(SWUFE: Southwestern University of Finance and Economics),
Yi Wang (SWUFE: Southwestern University of Finance and Economics)+ 1 AuthorsQian Zhang (SWUFE: Southwestern University of Finance and Economics)
Abstract Advances in information and communication technologies (ICT) have led to the revolution in retail industry through integrating multiple available channels to enhance seamless customer experience, promoting a shift from multichannel to omnichannel business. This phenomenon has gained increasing attention in both academia and industry due to growing challenges to serve customers effectively. This study adopted a mixed-method approach to firstly conceptualize omnichannel customer experienc...
Subhro Sarkar1
Estimated H-index: 1
(Indian Institute of Management Rohtak),
Sumedha Chauhan (Global University (GU)), Arpita Khare14
Estimated H-index: 14
(Indian Institute of Management Rohtak)
Abstract Awareness of antecedents and consequences of trust in m-commerce can enable m-commerce service providers to design suitable marketing strategies. Present study conducted a meta-analysis of 118 related empirical studies. The results indicate that antecedents namely perceived usefulness, perceived ease of use, system quality, information quality, service quality, user interface, perceived risk, perceived security, structural assurance, ubiquity, and disposition to trust, while consequence...
Abdus-samad Temitope Olanrewaju1
Estimated H-index: 1
(RMIT: RMIT University),
Mohammad Alamgir Hossain2
Estimated H-index: 2
(RMIT: RMIT University)
+ 1 AuthorsPaul Mercieca2
Estimated H-index: 2
(RMIT: RMIT University)
Abstract The rise of social media has led to changes in how entrepreneurs carry out their day-to-day activities. Studies on social media and entrepreneurship are relatively new and fragmented in their focus, however there is increasing interest from academia and practitioners for further research and investigation within this area. This study systematically reviews research carried out in the domain of social media and entrepreneurship. A total of 160 papers, published between 2002 and 2018 were...
Kenan Degirmenci4
Estimated H-index: 4
(QUT: Queensland University of Technology)
Abstract Recent privacy-related incidents of mobile services have shown that app stores and providers face the challenge of mobile users’ information privacy concerns, which can prevent users from installing mobile apps or induce them to uninstall an app. In this paper, we investigate the role of app permission requests and compare the impact on privacy concerns with other antecedents of information privacy concerns, i.e., prior privacy experience, computer anxiety, and perceived control. To tes...
Ali E. Akgün25
Estimated H-index: 25
(GIT: Gebze Institute of Technology)
Abstract While the concept of wisdom, which refers to how people make right use of their knowledge through their practical actions, judgments, and ethical decisions, in general attracts researcher interest in a variety of disciplines, such as philosophy, psychology and management studies, little is known about how wisdom is conceptualized and then operationalized in the software development project team context. Based on the frameworks for philosophical, group and organizational wisdom, this pap...
Zhen Zhu (China University of Geosciences), Jing Zhao2
Estimated H-index: 2
(China University of Geosciences),
Ashley A. Bush13
Estimated H-index: 13
(FSU: Florida State University)
Abstract Using a process component lens, this paper decomposes an e-business process into technical, relational, and business components. We then draw on resource orchestration theory to identify two managerial actions, resources structuring and capabilities leveraging in using e-business process components, to explain how these three components work together to improve competitive performance in supply chain operations. Two interesting insights emerge from our empirical research corresponds to ...
Published on Jan 1, 2020
Information systems research provides increasing evidence that women and men differ in their use of information technology. However, research has not sufficiently explained why these differences exist. Using the theory of reasoned action and social role theory, this paper investigates gender differences in people’s decisions about information sharing in the context of social networking sites (SNSs). We developed a comparative model of the information-sharing decision process across genders and t...