Measuring Information Diffusion in an Online Community
Measuring peer influence in social networks is an important business and policy question that has become increasingly salient with the development of globally interconnected information and communication technology networks. However, in spite of the new ...
Decommoditization, Resonance Marketing, and Information Technology: An Empirical Study of Air Travel Services amid Channel Conflict
Digital intermediaries and Internet search technologies have commoditized many products, resulting in intense price competition and channel conflict. Firms use decommoditization strategies to regain control over distribution channels, as well as to ...
Through a Glass Clearly: Standards, Architecture, and Process Transparency in Global Supply Chains
Despite evidence that a lack of interoperable information systems results in enormous costs, development, implementation, and effective use of interorganizational systems (IOS) remain an elusive goal for many companies. Lack of interoperability across ...
R&D Versus Acquisitions: Role of Diversification in the Choice of Innovation Strategy by Information Technology Firms
This research examines the role of diversification on incumbent firms' response to the threat of new entry. When faced with threats posed by new technologies, incumbent firms in the information technology (IT) industry can either perform research and ...
A Study of Sourcing Channels for Electronic Business Transactions
There are two popular forms of business-to-business (B2B) marketplaces: public marketplaces and private channels. We study why firms choose either or both of these sourcing channels. Using a framework of decision making under uncertainty, we explain ...
Innovation and Price Competition in a Two-Sided Market
We examine a platform's optimal two-sided pricing strategy while considering seller-side innovation decisions and price competition. We model the innovation race among sellers in both finite and infinite horizons. In the finite case, we analytically ...
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
End users are said to be "the weakest link" in information systems (IS) security management in the workplace. They often knowingly engage in certain insecure uses of IS and violate security policies without malicious intentions. Few studies, however, ...
Moderated Online Communities and Quality of User-Generated Content
Online communities provide a social sphere for people to share information and knowledge. While information sharing is becoming a ubiquitous online phenomenon, how to ensure information quality or induce quality content remains a challenge because of ...
System Design Features and Repeated Use of Electronic Data Exchanges
Oftentimes researchers may not only generalize across a population, but may also extrapolate research findings across time. While either assumption can introduce difficulties, generalizing results in one time frame to another time frame may be ...
What Motivates Firms to Contribute to Consortium-Based E-Business Standardization?
E-business standards are a key infrastructure for electronic commerce. In many industries, they are collaboratively developed by firms in an open and neutral industry consortium. It is imperative to understand what drives firms' resource investments in ...