Newsletter Downloads
Future Business Workforce: Crafting a Generative AI-Centric Curriculum Today for Tomorrow's Business Education
In an era where generative AI is reshaping the landscape of business and technology, this editorial addresses the critical imperative for transformative reform in business education. It emphasizes the dual nature of generative AI as both a formidable ...
Explicating Geo-Tagging Behavior on Social Media: Role of Interpersonal Competence, Self-Regulation, Online Affiliation, and Privacy Calculus
Geo-tagging features in social media apps allow users to announce their precise location with great ease and convenience, but geo-tagging poses some serious risks to users' privacy since it involves revelation of one's physical location, a form of ...
A Trust-Enhanced Patent Recommendation Approach to University-Industry Technology Transfer
Technology transfer enables the technology from legal owners to be used by others, and it is essential for technology innovation in modern society. However, transferring technology from academia to industry has become a challenging task due to the "...
Mitigating Algorithm Aversion in Recruiting: A Study on Explainable AI for Conversational Agents
The use of conversational agents (CAs) based on artificial intelligence (AI) is becoming more common in the field of recruiting. Organizations are now adopting AI-based CAs for applicant (pre-)selection, but negative news coverage, especially the black-...
Integrating Scholarly Evidence and Personal Experience in Health Information Technology-Enabled Evidence-Based Patient-Care Practices: Challenges, Opportunities, and Outcomes
Scholarly evidence and personal experience are two prominent sources of knowledge informing patient-care practices in hospitals. In evidence-based patient-care practices, jointly applying both forms of knowledge is challenging due to the divergent ...
How Do Job Seekers Respond to Cybervetting? An Exploration of Threats, Fear, and Access Control
The cybervetting activities of potential employers present a significant threat to job-seeking social media users because their content becomes vulnerable to unwanted access and scrutiny. Without control over access, personal information may be gathered ...