Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 28, Issue 2Number 2 / Fall 2011
Reflects downloads up to 22 Sep 2024Bibliometrics
Skip Table Of Content Section
article
Measuring Information Diffusion in an Online Community

Measuring peer influence in social networks is an important business and policy question that has become increasingly salient with the development of globally interconnected information and communication technology networks. However, in spite of the new ...

article
Decommoditization, Resonance Marketing, and Information Technology: An Empirical Study of Air Travel Services amid Channel Conflict

Digital intermediaries and Internet search technologies have commoditized many products, resulting in intense price competition and channel conflict. Firms use decommoditization strategies to regain control over distribution channels, as well as to ...

article
Through a Glass Clearly: Standards, Architecture, and Process Transparency in Global Supply Chains

Despite evidence that a lack of interoperable information systems results in enormous costs, development, implementation, and effective use of interorganizational systems (IOS) remain an elusive goal for many companies. Lack of interoperability across ...

article
R&D Versus Acquisitions: Role of Diversification in the Choice of Innovation Strategy by Information Technology Firms

This research examines the role of diversification on incumbent firms' response to the threat of new entry. When faced with threats posed by new technologies, incumbent firms in the information technology (IT) industry can either perform research and ...

article
A Study of Sourcing Channels for Electronic Business Transactions

There are two popular forms of business-to-business (B2B) marketplaces: public marketplaces and private channels. We study why firms choose either or both of these sourcing channels. Using a framework of decision making under uncertainty, we explain ...

article
Innovation and Price Competition in a Two-Sided Market

We examine a platform's optimal two-sided pricing strategy while considering seller-side innovation decisions and price competition. We model the innovation race among sellers in both finite and infinite horizons. In the finite case, we analytically ...

article
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model

End users are said to be "the weakest link" in information systems (IS) security management in the workplace. They often knowingly engage in certain insecure uses of IS and violate security policies without malicious intentions. Few studies, however, ...

article
Moderated Online Communities and Quality of User-Generated Content

Online communities provide a social sphere for people to share information and knowledge. While information sharing is becoming a ubiquitous online phenomenon, how to ensure information quality or induce quality content remains a challenge because of ...

article
System Design Features and Repeated Use of Electronic Data Exchanges

Oftentimes researchers may not only generalize across a population, but may also extrapolate research findings across time. While either assumption can introduce difficulties, generalizing results in one time frame to another time frame may be ...

article
What Motivates Firms to Contribute to Consortium-Based E-Business Standardization?

E-business standards are a key infrastructure for electronic commerce. In many industries, they are collaboratively developed by firms in an open and neutral industry consortium. It is imperative to understand what drives firms' resource investments in ...

Comments