Information & Management最新文献

筛选
英文 中文
How does response to work communication impact employees’ collaborative performance? A view of the social connectivity paradox 对工作交流的回应如何影响员工的协作绩效?对社会联系悖论的看法
IF 9.9 2区 管理学
Information & Management Pub Date : 2024-05-11 DOI: 10.1016/j.im.2024.103983
Pengzhen Yin , Yulin Fang , Wangchun Zhang , Liang Liang
{"title":"How does response to work communication impact employees’ collaborative performance? A view of the social connectivity paradox","authors":"Pengzhen Yin ,&nbsp;Yulin Fang ,&nbsp;Wangchun Zhang ,&nbsp;Liang Liang","doi":"10.1016/j.im.2024.103983","DOIUrl":"https://doi.org/10.1016/j.im.2024.103983","url":null,"abstract":"<div><p>Contemporary digital work practices increasingly necessitate prompt responses by employees to work-related communication. The impact of employees’ response behavior to work communication (RBWC) on collaborative performance remains underexplored. To address this gap, we propose a theoretical model integrating the theories of person-environment fit, social support, and conservation of resources. RBWC is conceptualized as the degree of communication response (in)congruence, representing the (mis)fit between rapid response expectations and the employee's ability to respond rapidly. We investigate the diverse effects of various states of response congruence on collaborative performance, mediated by the social connectivity paradox manifested as social support and social overload, while grounding this work on social support theory. The results from surveying 268 professionals and employing polynomial regression and surface response analysis demonstrate that different response congruence states significantly influence the social connectivity paradox and subsequently impact collaborative performance. Social support mediates the relationship between response congruence and collaborative performance, while social overload mediates the linear association between response ability and collaborative performance. Theoretical and practical implications are discussed.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103983"},"PeriodicalIF":9.9,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140948210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An enhanced governance measure for deep synthesis applications: Addressing the moderating effect of moral sensitivity through message framing 深度综合应用的强化治理措施:通过信息框架解决道德敏感性的调节作用
IF 9.9 2区 管理学
Information & Management Pub Date : 2024-05-11 DOI: 10.1016/j.im.2024.103982
Minghui Li , Yan Wan , Liufang Zhou , Hengyi Rao
{"title":"An enhanced governance measure for deep synthesis applications: Addressing the moderating effect of moral sensitivity through message framing","authors":"Minghui Li ,&nbsp;Yan Wan ,&nbsp;Liufang Zhou ,&nbsp;Hengyi Rao","doi":"10.1016/j.im.2024.103982","DOIUrl":"10.1016/j.im.2024.103982","url":null,"abstract":"<div><p>The risk of malicious deep synthesis lurks in hedonic applications, yet people tend to be ethically tolerant, leaving governance in a quandary. This study explores the reason for this from the perspective of moral judgment and finds that hedonic applications reduce people's sensitivity to ethical norms. We then explore the mechanism of the governance measure labels, using moral sensitivity as a moderating variable, and find that people with low moral sensitivity are immune. Finally, we propose and validate the inclusion of message framing as an enhancement. This study explains the governance dilemma from a moral-psychological perspective and provides practical governance improvements.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103982"},"PeriodicalIF":9.9,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141033679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demystifying data governance for process mining: Insights from a Delphi study 揭开流程挖掘数据管理的神秘面纱:德尔菲研究的启示
IF 9.9 2区 管理学
Information & Management Pub Date : 2024-05-07 DOI: 10.1016/j.im.2024.103973
Kanika Goel , Niels Martin , Arthur ter Hofstede
{"title":"Demystifying data governance for process mining: Insights from a Delphi study","authors":"Kanika Goel ,&nbsp;Niels Martin ,&nbsp;Arthur ter Hofstede","doi":"10.1016/j.im.2024.103973","DOIUrl":"10.1016/j.im.2024.103973","url":null,"abstract":"<div><p>Data governance is recognised as a new capability for organisations to maximize the value of data. Process mining is essential for the resilient growth of businesses, making process data a strategic asset for organisations. Even though the availability of reliable process data is vital for obtaining dependable insights into process mining techniques, there exists no framework that explains how to govern process data holistically. We address this gap by presenting the first data governance framework for process mining that was derived from a Delphi study conducted with a panel of academics and practitioners from around the world. The framework provides multiple avenues for future research.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103973"},"PeriodicalIF":9.9,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0378720624000557/pdfft?md5=91cc6c706f5cfbee767513d9c2592c17&pid=1-s2.0-S0378720624000557-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141037867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The power of prediction with Google searches and social media posts: Retail investor interest and IPO pricing 利用谷歌搜索和社交媒体帖子的预测能力:散户投资者兴趣与 IPO 定价
IF 9.9 2区 管理学
Information & Management Pub Date : 2024-05-06 DOI: 10.1016/j.im.2024.103972
Ka Wai (Stanley) Choi , Wentao Ma , Shuk Ying Ho , Dickson Wu
{"title":"The power of prediction with Google searches and social media posts: Retail investor interest and IPO pricing","authors":"Ka Wai (Stanley) Choi ,&nbsp;Wentao Ma ,&nbsp;Shuk Ying Ho ,&nbsp;Dickson Wu","doi":"10.1016/j.im.2024.103972","DOIUrl":"https://doi.org/10.1016/j.im.2024.103972","url":null,"abstract":"<div><p>This paper investigates the association between retail investors’ online activity and the pricing of initial public offerings (IPOs). We utilize data from Google Trends and StockTwits to analyze price revision for 901 U.S. IPOs, and find that the online search count, social media post count, and post sentiment are positively associated with IPO pricing. One-standard-deviation increases in these variables correspond to price revision increases of 9.02 %, 50.73 %, and 70.22 %, respectively. Additionally, online search plays a more significant role in influencing IPO price revision when social media discussions about a specific IPO exhibit higher sentiment inequality among participants.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103972"},"PeriodicalIF":9.9,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0378720624000545/pdfft?md5=c6627ae1a6b06cc7c0322e2cc8c74ee3&pid=1-s2.0-S0378720624000545-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140948211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The diffusion of malicious content on Twitter and its impact on security 推特上恶意内容的传播及其对安全的影响
IF 9.9 2区 管理学
Information & Management Pub Date : 2024-05-03 DOI: 10.1016/j.im.2024.103971
Yaman Roumani
{"title":"The diffusion of malicious content on Twitter and its impact on security","authors":"Yaman Roumani","doi":"10.1016/j.im.2024.103971","DOIUrl":"https://doi.org/10.1016/j.im.2024.103971","url":null,"abstract":"<div><p>While Twitter remains one of the most popular social media networks within the information security community, threat actors continue to abuse the platform to create, share, and spread malicious contents. In this study, we focus on whether Twitter- and vulnerability-related features can help predict vulnerabilities known to be actively exploited. Using a sample of 6004 tweets, results show that Twitter features (tweets and quote tweets) that combine the benefits of both content creation and sharing can predict active exploitation of vulnerabilities. Furthermore, findings show that certain technical and vulnerability-related features are also capable of predicting active exploitations.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103971"},"PeriodicalIF":9.9,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ethics-based AI auditing: A systematic literature review on conceptualizations of ethical principles and knowledge contributions to stakeholders 基于伦理的人工智能审计:关于伦理原则概念化和对利益相关者的知识贡献的系统文献综述
IF 9.9 2区 管理学
Information & Management Pub Date : 2024-05-01 DOI: 10.1016/j.im.2024.103969
Joakim Laine, Matti Minkkinen, Matti Mäntymäki
{"title":"Ethics-based AI auditing: A systematic literature review on conceptualizations of ethical principles and knowledge contributions to stakeholders","authors":"Joakim Laine,&nbsp;Matti Minkkinen,&nbsp;Matti Mäntymäki","doi":"10.1016/j.im.2024.103969","DOIUrl":"https://doi.org/10.1016/j.im.2024.103969","url":null,"abstract":"<div><p>This systematic literature review synthesizes the conceptualizations of ethical principles in AI auditing literature and the knowledge contributions to the stakeholders of AI auditing. We explain how the literature discusses fairness, transparency, non-maleficence, responsibility, privacy, trust, beneficence, and freedom/autonomy. Conceptualizations vary along social/technical- and process/outcome-oriented dimensions. The main stakeholders of ethics-based AI auditing are system developers and deployers, the wider public, researchers, auditors, AI system users, and regulators. AI auditing provides three types of knowledge contributions to stakeholders: 1) guidance; 2) methods, tools, and frameworks; and 3) awareness and empowerment.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103969"},"PeriodicalIF":9.9,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital human resource strategy: Conceptualization, theoretical development, and an empirical examination of its impact on firm performance 数字化人力资源战略:概念化、理论发展及其对企业绩效影响的实证研究
IF 9.9 2区 管理学
Information & Management Pub Date : 2024-05-01 DOI: 10.1016/j.im.2024.103966
Laura Ruiz , Jose Benitez , Ana Castillo , Jessica Braojos
{"title":"Digital human resource strategy: Conceptualization, theoretical development, and an empirical examination of its impact on firm performance","authors":"Laura Ruiz ,&nbsp;Jose Benitez ,&nbsp;Ana Castillo ,&nbsp;Jessica Braojos","doi":"10.1016/j.im.2024.103966","DOIUrl":"https://doi.org/10.1016/j.im.2024.103966","url":null,"abstract":"<div><p>Companies increasingly rely on individuals' skills, enthusiasm, and creativity, all the while striving to fully embrace digitalization as an integral aspect of the business. Technological mediation has altered the design and functionality of work, although the Information Systems (IS) literature about human resource management (HRM) provides little empirical evidence of the synergy between the two fields. To shed light on how these interlinked systems generate performance gains, we draw on the sociotechnical perspective to propose the concept of <em>digital HR strategy</em> as an explicit recognition of the fusion and integration of HR processes and digital technologies. This paper also theorizes and empirically demonstrates that a digital HR strategy improves organizational performance. The model is empirically tested using archival data from a sample of 351 firms.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 4","pages":"Article 103966"},"PeriodicalIF":9.9,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S037872062400048X/pdfft?md5=250c997354d98d8f9baaacb235c9430e&pid=1-s2.0-S037872062400048X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140822207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The SmartSI Compass: A method for generating smart service innovation ideas 智能服务创新指南针:产生智能服务创新想法的方法
IF 9.9 2区 管理学
Information & Management Pub Date : 2024-05-01 DOI: 10.1016/j.im.2024.103965
Felicitas Kuch , Anna-Katharina Lindenthal , Anna Maria Oberländer , Annette Cortenraad-Wenninger , Christoph Buck
{"title":"The SmartSI Compass: A method for generating smart service innovation ideas","authors":"Felicitas Kuch ,&nbsp;Anna-Katharina Lindenthal ,&nbsp;Anna Maria Oberländer ,&nbsp;Annette Cortenraad-Wenninger ,&nbsp;Christoph Buck","doi":"10.1016/j.im.2024.103965","DOIUrl":"https://doi.org/10.1016/j.im.2024.103965","url":null,"abstract":"<div><p>Smart Service Innovations (SmartSIs) are crucial for future competitiveness, but established organizations often struggle with the complexity of generating SmartSI ideas. Thus, we propose the <em>SmartSI Compass,</em> a method for systematically generating SmartSI ideas drawing from current smart service research and being theoretically anchored in technological, value creation, and systems perspectives. We developed the method in collaboration with practitioners according to design science research. With the <em>SmartSI Compass</em>, we make a prescriptive contribution to the body of knowledge on the initiation phase of digital innovation and support practitioners in generating SmartSI ideas.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103965"},"PeriodicalIF":9.9,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0378720624000478/pdfft?md5=eed84ca6fbb7d8b94d0b7219a228aaa0&pid=1-s2.0-S0378720624000478-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140948209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to strategically respond to online hotel reviews: A strategy-aware deep learning approach 如何有策略地回应在线酒店评论:具有战略意识的深度学习方法
IF 9.9 2区 管理学
Information & Management Pub Date : 2024-05-01 DOI: 10.1016/j.im.2024.103970
Chih-Hao Ku , Yung-Chun Chang , Yichuan Wang
{"title":"How to strategically respond to online hotel reviews: A strategy-aware deep learning approach","authors":"Chih-Hao Ku ,&nbsp;Yung-Chun Chang ,&nbsp;Yichuan Wang","doi":"10.1016/j.im.2024.103970","DOIUrl":"10.1016/j.im.2024.103970","url":null,"abstract":"<div><p>Online reviews exert a considerable influence on consumer purchase behavior, yet there remains ambiguity about the most effective managerial response strategies for positive and negative reviews. Addressing this gap, our study introduces a Strategy-Aware, Deep Learning-Based Natural Language Processing (Sa-DLNLP) model designed to optimize firm responses. The proposed model underwent rigorous evaluation through a human-coded study and was subsequently validated by a separate user response study. Our findings reveal that active-constructive responses significantly enhance the impact of positive reviews, whereas passive-constructive strategies are more effective in mitigating the damage from negative reviews. Additionally, the study underscores the importance of concise, personalized, and prompt responses across the board. Interestingly, responses that are overly explanatory, excessively empathetic, or challenge customers were found to be counterproductive when dealing with negative reviews. This study not only demystifies the art of managing online reviews but also offers an advanced deep learning methodology that can directly benefit the disciplines of Information Systems and Management.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103970"},"PeriodicalIF":9.9,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141027258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fostering information security compliance as organizational citizenship behavior 将促进信息安全合规作为组织公民行为
IF 9.9 2区 管理学
Information & Management Pub Date : 2024-04-29 DOI: 10.1016/j.im.2024.103968
Ali Vedadi , Merrill Warkentin , Detmar W. Straub , Jordan Shropshire
{"title":"Fostering information security compliance as organizational citizenship behavior","authors":"Ali Vedadi ,&nbsp;Merrill Warkentin ,&nbsp;Detmar W. Straub ,&nbsp;Jordan Shropshire","doi":"10.1016/j.im.2024.103968","DOIUrl":"https://doi.org/10.1016/j.im.2024.103968","url":null,"abstract":"<div><p>Information security is heightened when employees develop a strong sense of information stewardship for information assets, a form of organizational citizenship behavior, suggesting that compliance should be perceived as a symbiotic relationship between organizations and employees. We conducted a field study by collecting multi-source, match-paired survey data from 487 employees paired with their supervisor's ratings. Results showed that affective commitment, job satisfaction, perceived organizational support, and social influence were positively related to compliance behavior. This research contributes to the information security literature by showing that employees with strong organizational bond are more likely to exhibit higher levels of security policy compliance.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103968"},"PeriodicalIF":9.9,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141078037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信