Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2022
Leveraging blockchain technology to control contextualized business risks: Evidence from China
AbstractThe complexity and diversity of socio-economic environments call for a more nuanced consideration of contextualized risks confronting enterprises operating in these environments. By dissecting six cases that successfully adopted ...
- research-articleApril 2022
Factors influencing the acceptance of healthcare information technologies: A meta-analysis
AbstractHealthcare information technologies (HIT) can address several challenges faced by healthcare systems. To benefit from the advantages HIT offer, users must first accept them. This meta-analysis synthesizes previous research on HIT ...
- research-articleJanuary 2020
The adoption of NFC-based mobile payment services: an empirical analysis of Apple Pay in China
International Journal of Mobile Communications (IJMC), Volume 18, Issue 3Pages 343–371https://doi.org/10.1504/ijmc.2020.107145With the growing trend of mobile services prevailing in every sphere of our daily life, near field communication (NFC) is at the forefront of transforming the existing payment experience through providing a unified, secure transaction channel which can ...
- articleFebruary 2019
An examination of the long-term business value of investments in information technology
Information Systems Frontiers (KLU-ISFI), Volume 21, Issue 1Pages 213–227https://doi.org/10.1007/s10796-017-9735-5In this paper, we examine the effects of investments in Information Technology (IT) on the long term business values of organizations. The regression discontinuity design is used in this research to examine eight hundred and ten IT investment ...
- research-articleNovember 2016
Predicting online e-marketplace sales performances
Computers and Industrial Engineering (CINE), Volume 101, Issue CPages 565–571https://doi.org/10.1016/j.cie.2016.08.009Confirming the predictive power of product review volume and rating on sales.Examining product type, answers, discount and information usefulness as moderators.Using big data architecture to collect data for model testing. To manage supply chain ...
-
- research-articleJune 2016
Determinants of negative word-of-mouth communication using social networking sites
Information and Management (IMAN), Volume 53, Issue 4Pages 528–540https://doi.org/10.1016/j.im.2015.12.002A model was developed to examine the determinants of negative word-of-mouth intention.Data from 206 respondents were analysed using structural equation modelling (SEM).Our model was built upon the theory of cognitive dissonance and social support ...
- articleJanuary 2016
Predicting adoption of location-based social media service in travel decisions
International Journal of Mobile Communications (IJMC), Volume 14, Issue 6Pages 539–552https://doi.org/10.1504/IJMC.2016.079298Advances in location-acquisition and mobile communication technologies have empowered people to use location-based social media. However, the technologies are relatively new, and there is little literature on the relevant factors determining location-...
- articleNovember 2015
The adoption of PDA for future healthcare system: an emerging market perspective
International Journal of Mobile Communications (IJMC), Volume 13, Issue 1Pages 1–28https://doi.org/10.1504/IJMC.2015.065887The idea of using personal digital assistance (PDA) in the healthcare industry has been sparsely explored from the viewpoint of an emerging market like Malaysia. Since the potential benefits of adopting PDA are immense, this study aims to investigate ...
- articleNovember 2014
Creating technological innovation via green supply chain management: An empirical analysis
Expert Systems with Applications: An International Journal (EXWA), Volume 41, Issue 16Pages 6983–6994https://doi.org/10.1016/j.eswa.2014.05.022This study sets out to empirically test the research framework and identify the relationship between green supply chain management (GSCM) practices and technological innovation (TI) in manufacturing firms. It is one of the first studies that ...
- articleSeptember 2014
Are Chinese consumers ready to adopt mobile smart home? An empirical analysis
International Journal of Mobile Communications (IJMC), Volume 12, Issue 5Pages 496–511https://doi.org/10.1504/IJMC.2014.064595This research aims to investigate the determinants of Chinese mobile smart home adoption. This research extends technology acceptance model (TAM) by including additional variables such as social influence, perceived secure home environment, perceived ...
- articleMarch 2014
An innovative supply chain performance measurement system incorporating Research and Development (R&D) and marketing policy
Computers and Industrial Engineering (CINE), Volume 69Pages 64–70https://doi.org/10.1016/j.cie.2013.12.015Various performance measurement techniques have been developed and applied in their respective fields, but the existing performance measurement methods have failed to provide significant assistance in the context of marketing strategies and innovation ...
- articleJanuary 2014
Predicting open IOS adoption in SMEs: An integrated SEM-neural network approach
Expert Systems with Applications: An International Journal (EXWA), Volume 41, Issue 1Pages 221–229https://doi.org/10.1016/j.eswa.2013.07.023This research examines the predictors of open interorganizational systems (IOS) adoption by using RosettaNet as a case study. The model used in this research derived its theoretical supports from literature related to interorganizational relationships ...
- articleSeptember 2013
BSEM estimation of network effect and customer orientation empowerment on trust in social media and network environment
Expert Systems with Applications: An International Journal (EXWA), Volume 40, Issue 12Pages 4858–4870https://doi.org/10.1016/j.eswa.2013.02.020This paper presents a stochastic model that identifies network effect and customer orientation empowerment as strong antecedents of trustworthiness and trust in social media network environment. As Trust is emerging as a critical influencer of consumer ...
- articleAugust 2013
Simulation of cross-border competitions of free Internet content providers
Computers in Industry (CIIN), Volume 64, Issue 6Pages 754–764https://doi.org/10.1016/j.compind.2013.04.008This paper describes the cross-border competition between two of the largest free Internet content providers in China through the use of multi-agent technology. Case studies are conducted for both TENCENT and Qihoo 360, with their customers being ...
- articleJune 2013
A neural network approach to predicting price negotiation outcomes in business-to-business contexts
Expert Systems with Applications: An International Journal (EXWA), Volume 40, Issue 8Pages 3028–3035https://doi.org/10.1016/j.eswa.2012.12.018Price premiums are a key profit driver for long-term business relationships. For sellers in business-to-business (B2B) relationships, it is important to have appropriate strategies to negotiate price increases without trading off the relationships with ...
- articleMarch 2013
A two-staged SEM-neural network approach for understanding and predicting the determinants of m-commerce adoption
Expert Systems with Applications: An International Journal (EXWA), Volume 40, Issue 4Pages 1240–1247https://doi.org/10.1016/j.eswa.2012.08.067The advancement in wireless and mobile technologies has presented tremendous business opportunity for mobile-commerce (m-commerce). This research aims to examine the factors that influence consumers' m-commerce adoption intention. Variables such as ...
- articleFebruary 2013
Predicting m-commerce adoption determinants: A neural network approach
Expert Systems with Applications: An International Journal (EXWA), Volume 40, Issue 2Pages 523–530https://doi.org/10.1016/j.eswa.2012.07.068M-commerce has continued to grow at an explosive rate. This purpose of this paper is to examine the predictors of m-commerce adoption by extending the Unified Theory of Acceptance and Use of Technology (UTAUT) model. The extended model incorporates ...
- articleDecember 2012
A SEM-neural network approach for understanding determinants of interorganizational system standard adoption and performances
Decision Support Systems (DSSY), Volume 54, Issue 1Pages 621–630https://doi.org/10.1016/j.dss.2012.08.009This research examines the adoption of an interorganizational system standard and its benefits by using RosettaNet as a case study. A comprehensive research framework derived from institutional theory and a Technology-Organization-Environment model was ...
- research-articleAugust 2012
Structural equation modeling for multi-stage analysis on Radio Frequency Identification (RFID) diffusion in the health care industry
Expert Systems with Applications: An International Journal (EXWA), Volume 39, Issue 10Pages 8645–8654https://doi.org/10.1016/j.eswa.2012.01.201Highlights We model the diffusion of RFID in health care industry. SEM was applied to examine the model. Variables from TOE and DOI models have different effects on RFID diffusion stages. Decision makers can formulate appropriate RFID strategies from ...
- articleJune 2012
A two-stage analysis of the influences of employee alignment on effecting business-IT alignment
Decision Support Systems (DSSY), Volume 53, Issue 3Pages 490–498https://doi.org/10.1016/j.dss.2012.03.008The influence of employee alignment orientations on successful implementation of business-IT alignment is investigated. Based on survey data collected from employees of Indonesian manufacturing companies, a two-stage approach is applied (i) to discover ...