Followed Journals
Journal you Follow: 0
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Journals are published.
Already have an account? Sign In to see the journals you follow.
Similar Journals
Journal Cover
European Journal of Information Systems
Journal Prestige (SJR): 1.628
Citation Impact (citeScore): 4
Number of Followers: 177  
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 0960-085X - ISSN (Online) 1476-9344
Published by Springer-Verlag Homepage  [2643 journals]
  • Stakeholders’ enactment of competing logics in IT governance:
           polarization, compromise or synthesis'
    • Authors: Albert Boonstra; U. Yeliz Eseryel; Marjolein A. G. van Offenbeek
      Pages: 415 - 433
      Abstract: Abstract Governing IT while incorporating stakeholders with diverse institutional backgrounds remains a challenge. Stakeholder groups are typically socialized differently and may have different perspectives on IT governance dilemmas. Yet, extant literature offers only limited insight on socialized views on IT governance. This study uses an institutional logics lens to examine how competing institutional logics get connected in IT governance practices through dominant stakeholders’ enactment patterns and how these enactment patterns may affect the organization’s IT performance. We find that logics were coupled to the three dominant stakeholder groups, but only loosely so. Congruence between the three logics they enacted depended on the IT governance dilemma at hand. Our findings demonstrate how within a triad of competing logics, switching rivalry among hybrid logics may develop. Here, the enactments led to two hybrid logics, none of which became dominant. Remarkably, the IT professionalism logic accommodated polarization between medical professionalism and the managerial logic, causing unstable IT governance. We propose that IT professionalism offers room for agency and is crucial in determining the resulting enactment patterns: polarizing, compromising or even synthesizing. This study may raise managers’ awareness of the competing logics underlying IT governance practices and clarify the pivotal role of IT professionalism in IT governance debates.
      PubDate: 2017-08-24
      DOI: 10.1057/s41303-017-0055-0
      Issue No: Vol. 27, No. 4 (2017)
  • Reversed loss aversion in crowdsourcing contest
    • Authors: Haichao Zheng; Bo Xu; Linna Hao; Zhangxi Lin
      Pages: 434 - 448
      Abstract: Abstract Crowdsourcing contest is an effective means for firms to outsource tasks online to a large group of solvers in order to obtain creative solutions. This study investigates loss aversion of solvers in crowdsourcing contests. An experiment was conducted, and reversed loss aversion was identified for solvers, suggesting that solvers experience more happiness from the gains when they win the contest than the pain from the equivalent losses when they fail. The results also suggested that solvers experience higher reversed loss aversion for ideation contests than for expertise-based contests. We then investigated the effects of reversed loss aversion from a game theory perspective. The solutions showed that solvers’ effort level is greater with reversed loss aversion, while the optimal reward for the contest remains the same. In light of our findings, sponsors should conduct contests to solve ideation problems in which the solvers are loss averse reversed and will input more effort. Diversified business models could be developed by crowdsourcing platforms to match solvers and different crowdsourcing tasks.
      PubDate: 2017-08-14
      DOI: 10.1057/s41303-017-0061-2
      Issue No: Vol. 27, No. 4 (2017)
  • Disaggregation of the IT capital effects on firm performance: Empirical
           evidence from an IT asset portfolio perspective
    • Authors: Tae Hun Kim; Matt Wimble; Vallabh Sambamurthy
      Pages: 449 - 469
      Abstract: Abstract Although prior research has frequently focused on aggregate IT capital, most firms invest in specific types with different goals. Each type of capital represents a distinct factor of a firm’s production function. Drawing on a theory-of-production framework, we disaggregate overall IT capital into specific types to examine their unique effects on firm performance over time. We categorize these IT-specific production factors into a firm’s installed personal computers for individual information access, servers for collective information access, storage capacity for information stock, and nodes for information flow. We investigate when and how each IT capital type contributes to firm performance by analyzing the 5-year panel data of 1,548 US firms. Our findings show that individual information access capital and collective information access capital have immediate effects on profitability through cost efficiency or sales growth. By contrast, information stock capital has a lagged effect on profitability. In addition, information stock capital complements individual information access capital in improving profitability, as well as contributing to sales growth and cost efficiency equivalent to firm size. These results extend the existing research on firm-level effects of IT investments by demonstrating that different IT capital effects have unique ways of affecting firm performance.
      PubDate: 2017-08-14
      DOI: 10.1057/s41303-017-0062-1
      Issue No: Vol. 27, No. 4 (2017)
  • Design and evaluation of a model-driven decision support system for
           repurposing electric vehicle batteries
    • Authors: Benjamin Kloör; Markus Monhof; Daniel Beverungen; Sebastian Braäer
      Pages: 171 - 188
      Abstract: Abstract The diffusion of electric vehicles suffers from immature and expensive battery technologies. Repurposing electric vehicle batteries for second-life application scenarios may lower the vehicles’ total costs of ownership and increases their ecologic sustainability. However, identifying the best – or even a feasible – scenario for which to repurpose a battery is a complex and unresolved decision problem. In this exaptation research, we set out to design, implement, and evaluate the first decision support system that aids decision-makers in the automobile industry with repurposing electric vehicle batteries. The exaptation is done by classifying decisions on repurposing products as bipartite matching problems and designing two binary integer linear programs that identify (a) all technical feasible assignments and (b) optimal assignments of products and scenarios. Based on an empirical study and expert interviews, we parameterize both binary integer linear programs for repurposing electric vehicle batteries. In a field experiment, we show that our decision support system considerably increases the decision quality in terms of hit rate, miss rate, precision, fallout, and accuracy. While practitioners can use the implemented decision support system when repurposing electric vehicle batteries, other researchers can build on our results to design decision support systems for repurposing further products.
      PubDate: 2017-09-06
      DOI: 10.1057/s41303-017-0044-3
      Issue No: Vol. 27, No. 2 (2017)
  • ERP prototype with built-in task and process support
    • Authors: Tamara Babaian; Jennifer Xu; Wendy Lucas
      Pages: 189 - 206
      Abstract: Abstract Several recent studies of ERP system interfaces have confirmed that their poor usability hinders worker productivity, despite the huge investments companies make in user training and support. Usability challenges arise from the complexity of ERP systems, which are designed as a universal tool for a plethora of organizational practices and contexts. Learning to operate within an excessively vast terrain of ERP task pages and parameters is a significant challenge for most ERP users. Our proposed solution relies on the system itself to share task and process information in order to guide users through learning and performing their business tasks with the system. This perspective arises from employing the human–computer collaboration approach to the design of user interfaces, which we apply as a guiding framework for our research. In this paper, we present two interface components for providing ERP system users with task and process guidance: Automated Playback and Interactive Process Visualization. The novelty of our approach comes from using the history of past interactions to dynamically compose animated demonstrations of task interfaces and to provide an interactive graphical map of the current process being worked on by the user.
      PubDate: 2017-09-04
      DOI: 10.1057/s41303-017-0060-3
      Issue No: Vol. 27, No. 2 (2017)
  • Stimulating dialog between information systems research and practice
    • Authors: Dov Te’eni; Stefan Seidel; Jan vom Brocke
      Pages: 541 - 545
      PubDate: 2017-11-01
      DOI: 10.1057/s41303-017-0067-9
      Issue No: Vol. 26, No. 6 (2017)
  • Why security and privacy research lies at the centre of the information
           systems (IS) artefact: proposing a bold research agenda
    • Authors: Paul Benjamin Lowry; Tamara Dinev; Robert Willison
      Pages: 546 - 563
      Abstract: Abstract In this essay, we outline some important concerns in the hope of improving the effectiveness of security and privacy research. We discuss the need to re-examine our understanding of information technology and information system (IS) artefacts and to expand the range of the latter to include those artificial phenomena that are crucial to information security and privacy research. We then briefly discuss some prevalent limitations in theory, methodology, and contributions that generally weaken security/privacy studies and jeopardise their chances of publication in a top IS journal. More importantly, we suggest remedies for these weaknesses, identifying specific improvements that can be made and offering a couple of illustrations of such improvements. In particular, we address the notion of loose re-contextualisation, using deterrence theory research as an example. We also provide an illustration of how the focus on intentions may have resulted in an underuse of powerful theories in security and privacy research, because such theories explain more than just intentions. We then outline three promising opportunities for IS research that should be particularly compelling to security and privacy researchers: online platforms, the Internet of things, and big data. All of these carry innate information security and privacy risks and vulnerabilities that can be addressed only by researching each link of the systems chain, that is, technologies–policies–processes–people–society–economy–legislature. We conclude by suggesting several specific opportunities for new research in these areas.
      PubDate: 2017-11-01
      DOI: 10.1057/s41303-017-0066-x
      Issue No: Vol. 26, No. 6 (2017)
  • Which phish get caught' An exploratory study of individuals′
           susceptibility to phishing
    • Authors: Gregory D. Moody; Dennis F. Galletta; Brian Kimball Dunn
      Pages: 564 - 584
      Abstract: Abstract Phishing, or the practice of sending deceptive electronic communications to acquire private information from victims, results in significant financial losses to individuals and businesses. The first goal of this study is to identify situational and personality factors that explain why certain individuals are susceptible to such attacks. The second goal is to test those empirically, along with previously identified factors, to explain the likelihood that an individual will fall victim to a phishing attack. We employed the Delphi method to identify seven personality factors that may influence this susceptibility (trust, distrust, curiosity, entertainment drive, boredom proneness, lack of focus, and risk propensity). Our regression model included these as well as variables examined in previous studies. We find that emails sent from a known source significantly increase user susceptibility to phishing, as does a user’s curiosity, risk propensity, general Internet usage, and Internet anxiety. In post hoc tests, we also find that trust and distrust can be significant predictors of susceptibility and that this significance is dependent on the characteristics of the message.
      PubDate: 2017-11-01
      DOI: 10.1057/s41303-017-0058-x
      Issue No: Vol. 26, No. 6 (2017)
  • Taking stock of organisations’ protection of privacy: categorising and
           assessing threats to personally identifiable information in the USA
    • Authors: Clay Posey; Uzma Raja; Robert E. Crossler; A. J. Burns
      Pages: 585 - 604
      Abstract: Abstract Many organisations create, store, or purchase information that links individuals’ identities to other data. Termed personally identifiable information (PII), this information has become the lifeblood of many firms across the globe. As organisations accumulate their constituencies’ PII (e.g. customers’, students’, patients’, and employees’ data), individuals’ privacy will depend on the adequacy of organisations’ information privacy safeguards. Despite existing protections, many breaches still occur. For example, US organisations reported around 4,500 PII-breach events between 2005 and 2015. With such a high number of breaches, determining all threats to PII within organisations proves a burdensome task. In light of this difficulty, we utilise text-mining and cluster analysis techniques to create a taxonomy of various organisational PII breaches, which will help drive targeted research towards organisational PII protection. From an organisational systematics perspective, our classification system provides a foundation to explain the diversity among the myriad of threats. We identify eight major PII-breach types and provide initial literature reviews for each type of breach. We detail how US organisations differ regarding their exposure to these breaches, as well as how the level of severity (i.e. number of records affected) differs among these PII breaches. Finally, we offer several paths for future research.
      PubDate: 2017-11-01
      DOI: 10.1057/s41303-017-0065-y
      Issue No: Vol. 26, No. 6 (2017)
  • Organizational information security policies: a review and research
    • Authors: W. Alec Cram; Jeffrey G. Proudfoot; John D’Arcy
      Pages: 605 - 641
      Abstract: Abstract A major stream of research within the field of information systems security examines the use of organizational policies that specify how users of information and technology resources should behave in order to prevent, detect, and respond to security incidents. However, this growing (and at times, conflicting) body of research has made it challenging for researchers and practitioners to comprehend the current state of knowledge on the formation, implementation, and effectiveness of security policies in organizations. Accordingly, the purpose of this paper is to synthesize what we know and what remains to be learned about organizational information security policies, with an eye toward a holistic understanding of this research stream and the identification of promising paths for future study. We review 114 influential security policy-related journal articles and identify five core relationships examined in the literature. Based on these relationships, we outline a research framework that synthesizes the construct linkages within the current literature. Building on our analysis of these results, we identify a series of gaps and draw on additional theoretical perspectives to propose a revised framework that can be used as a basis for future research.
      PubDate: 2017-11-01
      DOI: 10.1057/s41303-017-0059-9
      Issue No: Vol. 26, No. 6 (2017)
  • Antecedents and outcomes of information privacy concerns in a peer
           context: An exploratory study
    • Authors: Zafer D. Ozdemir; H. Jeff Smith; John H. Benamati
      Pages: 642 - 660
      Abstract: Abstract Academic studies typically view privacy threats as originating solely from organizations. With the rise of social media, such a view is incomplete because consumers increasingly face risks from peers’ misuse of data. In this paper, we study information privacy in the context of peer relationships on commercial social media sites. We develop a model that considers relationships between the constructs of privacy experiences, privacy awareness, trust, risk, and benefits and how those relationships impact individuals’ disclosure behaviors. We test the model by creating a survey that includes a number of measures that were taken directly from or were closely based on measures from prior studies. We conduct seven pilot tests of undergraduate students in order to validate the survey items. Working with the online survey firm Qualtrics, we gather a dataset of 314 Facebook users’ responses to our validated survey, and we test our model using partial least squares techniques. We find that both privacy experiences and privacy awareness are quite significant predictors of privacy concerns. We also find that trust, risk, benefits, and privacy concerns work together to explain a large amount (37%) of the variance in disclosure behaviors. We discuss implications for practice and for future research.
      PubDate: 2017-11-01
      DOI: 10.1057/s41303-017-0056-z
      Issue No: Vol. 26, No. 6 (2017)
  • An empirical study on the susceptibility to social engineering in social
           networking sites: the case of Facebook
    • Authors: Abdullah Algarni; Yue Xu; Taizan Chan
      Pages: 661 - 687
      Abstract: Abstract Research suggests that social engineering attacks pose a significant security risk, with social networking sites (SNSs) being the most common source of these attacks. Recent studies showed that social engineers could succeed even among those organizations that identify themselves as being aware of social engineering techniques. Although organizations recognize the serious risks of social engineering, there is little understanding and control of such threats. This may be partly due to the complexity of human behaviors in failing to recognize attackers in SNSs. Due to the vital role that impersonation plays in influencing users to fall victim to social engineering deception, this paper aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization on Facebook. In doing so, we identify source credibility dimensions in terms of social engineering on Facebook, Facebook-based source characteristics that influence users to judge an attacker as per these dimensions, and mediation effects that these dimensions play between Facebook-based source characteristics and susceptibility to social engineering victimization.
      PubDate: 2017-11-01
      DOI: 10.1057/s41303-017-0057-y
      Issue No: Vol. 26, No. 6 (2017)
  • Adverse consequences of access to individuals’ information: an analysis
           of perceptions and the scope of organisational influence
    • Authors: Sabrina Karwatzki; Manuel Trenz; Virpi Kristiina Tuunainen; Daniel Veit
      Pages: 688 - 715
      Abstract: Abstract Organisations are highly interested in collecting and analysing customer data to enhance their service offerings and customer interaction. However, individuals increasingly fear how such practices may negatively affect them. Although previous studies have investigated individuals’ concerns about information privacy practices, the adverse consequences people associate with external actors accessing their personal information remain unclear. To mitigate customers’ fears, organisations need to know which adverse consequences individuals are afraid of and how to address those negative perceptions. To investigate this topic, we conducted 22 focus groups with 119 participants. We developed a comprehensive conceptualisation and categorisation of individuals’ perceived adverse consequences of access to their information that includes seven types of consequences: psychological, social, career-related, physical, resource-related, prosecution-related, and freedom-related. Although individuals may limit their interactions with an organisation owing to consequences they associate with both the organisation and other actors, organisations can apply preventive and corrective mechanisms to mitigate some of these negative perceptions. However, organisations’ scope of influence is limited and some fears may be mitigated only by individuals themselves or government regulation, if at all.
      PubDate: 2017-11-01
      DOI: 10.1057/s41303-017-0064-z
      Issue No: Vol. 26, No. 6 (2017)
  • Service robots in hospitals: new perspectives on niche evolution and
           technology affordances
    • Authors: Tobias Mettler; Michaela Sprenger; Robert Winter
      Pages: 451 - 468
      Abstract: Abstract Changing demands in society and the limited capabilities of health systems have paved the way for robots to move out of industrial contexts and enter more human-centered environments such as health care. We explore the shared beliefs and concerns of health workers on the introduction of autonomously operating service robots in hospitals or professional care facilities. By means of Q-methodology, a mixed research approach specifically designed for studying subjective thought patterns, we identify five potential end-user niches, each of which perceives different affordances and outcomes from using service robots in their working environment. Our findings allow for better understanding resistance and susceptibility of different users in a hospital and encourage managerial awareness of varying demands, needs, and surrounding conditions that a service robot must contend with. We also discuss general insights into presenting the Q-methodology results and how an affordance-based view could inform the adoption, appropriation, and adaptation of emerging technologies.
      PubDate: 2017-09-01
      DOI: 10.1057/s41303-017-0046-1
      Issue No: Vol. 26, No. 5 (2017)
  • Balancing exploration and exploitation of IT resources: the influence of
           Digital Business Intensity on perceived organizational performance
    • Authors: Joseph K. Nwankpa; Pratim Datta
      Pages: 469 - 488
      Abstract: Abstract Facing a barrage of novel information technology (IT), organizations must invest on the basis of the impact of IT capabilities on the organization’s performance. This research extends Bharadwaj’s (MIS Quarterly 169–196, 2000) resource-based view of the relationship between IT capability and performance by introducing both the mediating and moderating effects of Digital Business Intensity (DBI). Empirical data collected from CIO’s from US firms reveal that although IT capability positively influences organizational performance, this relationship may differ in strength at different levels of DBI. Our study also finds that IT capability is important in determining DBI, which in turn influences organizational performance. Findings highlight tensions between DBI exploration and IT capabilities exploitation. Results also suggest that companies that leverage their existing IT capabilities to drive DBI are more adept at securing performance returns. However, when DBI investments do not complement existing IT capabilities, DBI appears to dampen performance, further accentuated for high-DBI firms.
      PubDate: 2017-09-01
      DOI: 10.1057/s41303-017-0049-y
      Issue No: Vol. 26, No. 5 (2017)
  • Impact of executive compensation on the execution of IT-based
           environmental strategies under competition
    • Authors: Ricky Y. K. Chan; Katherine H. Y. Ma
      Pages: 489 - 508
      Abstract: Abstract Drawing on agency theory and the contingent natural resource-based theory, this study employs firm-level archival and survey data of US manufacturing firms to examine the impact of CEO compensation forms on the execution of IT-based environmental strategies and the moderating influence of competitive intensity on this impact. The findings reveal that CEO fixed pay and bonus negatively affect the execution of the two types of IT-based environmental strategies, green IT strategies and IT-enabled green strategies, whereas CEO stock option positively influences such execution. The moderation analysis further highlights that while competitive intensity reinforces the positive impact of CEO stock option on both strategies, it weakens the negative impact of CEO fixed pay and bonus only on IT-enabled green strategies. The findings suggest that a highly competitive operating setting represents an ideal setting for using stock option to motivate CEOs to execute these two strategies. At the minimum, this setting helps mitigate the deterrent effect of fixed pay and bonus on CEOs’ execution of IT-enabled green strategies. The findings also suggest that firms should align their CEO compensation package with the characteristics of high uncertainty and long payback periods of IT-based environmental strategic endeavors and the competitive conditions they face.
      PubDate: 2017-09-01
      DOI: 10.1057/s41303-017-0052-3
      Issue No: Vol. 26, No. 5 (2017)
  • The role of context in IT assimilation: A multi-method study of a SaaS
           platform in the US nonprofit sector
    • Authors: Ryan T. Wright; Nicholas Roberts; David Wilson
      Pages: 509 - 539
      Abstract: Abstract Nonprofit organizations (NPOs) operate in environments characterized by growing competition for resources and greater stakeholder demands for accountability, which makes deploying and maintaining information systems a struggle. In this competitive, resource-constrained environment, enterprise Software-as-a-Service (SaaS) platforms offer NPOs a cost-effective way access reliable, low-maintenance information technology services. Thus, the extent to which NPOs assimilate SaaS is an important area of inquiry. Yet despite the wealth of research on organizational IT assimilation, we know little regarding whether, when, and how NPOs assimilate IT innovations. We further our understanding of NPO assimilation of SaaS by conducting a context-based study. To do so, we employ multiple methods with data collected from US-based NPOs executives. Our first study showed that organizational factors (e.g., readiness, top management participation) and environmental factors (e.g., social gains, industry) affect the degree to which NPOs assimilate SaaS. However, we also found that technological factors do not appear to play a significant role in NPO SaaS assimilation. We conducted a phenomenological analysis to shed further light on this unexpected finding. Our analysis found that readiness to adopt SaaS, perceptions about SaaS complexity, and the use of outside consultants all played a key role in NPOs’ assimilation process.
      PubDate: 2017-09-01
      DOI: 10.1057/s41303-017-0053-2
      Issue No: Vol. 26, No. 5 (2017)
  • It’s complicated: explaining the relationship between trust, distrust,
           and ambivalence in online transaction relationships using polynomial
           regression analysis and response surface analysis
    • Authors: Gregory D. Moody; Paul Benjamin Lowry; Dennis F. Galletta
      Pages: 379 - 413
      Abstract: Abstract Trust and distrust are considered crucial elements affecting online relationships – particularly those involving electronic transactions. Although some studies propose that they are distinct, others claim that they are merely opposite ends of one continuum. Further adding to the debate is the possibility of ambivalence, a topic that has not been examined in electronic transaction relationships. Unfortunately, current models of trust and distrust have limitations that impede explanations of how – or even if – ambivalence is generated by feelings of trust and distrust and how these two constructs can best coexist. We thus propose a hybrid model which considers the limitations and strengths of previous models. Namely, we posit that trust and distrust can coexist as separate components with related continua. We use polynomial regression analysis (PRA) and response surface analysis (RSA) to test these complex relationships. Using an empirical study of online consumer behaviour with 521 experienced online consumers, strong empirical validation is found for the model. We examine the effects of ambivalence on the truster’s intentions towards a website and find a small positive effect which increases such intentions. PRA and RSA confirm that trust and distrust are most likely separate components – not opposite ends of a continuum – with related continua. The continua within the subconstructs of trust and distrust likely have more complex and interesting relationships than have been considered previously. These findings lead to interesting future research opportunities on trust, distrust and ambivalence using advanced techniques such as PRA and RSA.
      PubDate: 2017-07-01
      DOI: 10.1057/s41303-016-0027-9
      Issue No: Vol. 26, No. 4 (2017)
  • Online product review as an indicator of users’ degree of innovativeness
           and product adoption time: a longitudinal analysis of text reviews
    • Authors: Roozmehr Safi; Yang Yu
      Pages: 414 - 431
      Abstract: Abstract Online reviews have become extremely valuable sources of information about products and their customers as electronic commerce continues to proliferate rapidly. Previous research has shown that reviews of a product change and evolve over its life. Identifying and understanding patterns of change in reviews and the forces that shape them is an underexplored topic with substantial potential for predicting and improving the market performance of products. In this study, we analyze review text of nearly 50 products over the course of their lives. Our longitudinal analysis of reviews reveals changes in certain personality-related characteristics of buyers in ways that are consistent with the predictions of product adoption and diffusion theories. The main findings and conclusions still hold when we replicate the same procedure on reviews of a different product category. Accordingly, based on online user-generated content in the form of online reviews, this research introduces a novel empirical method for identifying the product adoption and diffusion stage. Implications of the study for theory, methodology, and practice are discussed.
      PubDate: 2017-07-01
      DOI: 10.1057/s41303-017-0045-2
      Issue No: Vol. 26, No. 4 (2017)
  • Constraint-based and dedication-based mechanisms for encouraging online
           self-disclosure: Is personalization the only thing that matters'
    • Authors: Hung-pin Shih; Kee-hung Lai; T. C. E. Cheng
      Pages: 432 - 450
      Abstract: Abstract Consumer-generated self-disclosure is better than firm-generated advertising and sales reports in increasing contact opportunities and also more credible for firms to foster alignment with future market expectations. Previous research mostly assesses online self-disclosure from the rational approach of anticipated benefits and privacy risks without considering the “privacy paradox” phenomenon (users behave contrarily to privacy concern) in social networking sites (SNSs). We develop a theoretical model, grounded in constraint-based (lock-in) and dedication-based (trust-building) mechanisms and social identity theory, to predict online self-disclosure. We test the proposed theoretical model by surveying 395 consumers with participation experience in an online SNS. Different from the rational approach behind personalization, we advance knowledge on how to apply social identity, as well as constraint-based and dedication-based mechanisms, to motivate online self-disclosure induced by consumers. We provide theoretical and practical insights based on our research findings for managing the motivational mechanisms of online self-disclosure.
      PubDate: 2017-07-01
      DOI: 10.1057/s41303-016-0031-0
      Issue No: Vol. 26, No. 4 (2017)
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762

Your IP address:
Home (Search)
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-