Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 55, Issue 1February 2024
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0095-0033
EISSN:1532-0936
Reflects downloads up to 10 Nov 2024Bibliometrics
Skip Table Of Content Section
SESSION: Contributions
article
Future Business Workforce: Crafting a Generative AI-Centric Curriculum Today for Tomorrow's Business Education

In an era where generative AI is reshaping the landscape of business and technology, this editorial addresses the critical imperative for transformative reform in business education. It emphasizes the dual nature of generative AI as both a formidable ...

article
Explicating Geo-Tagging Behavior on Social Media: Role of Interpersonal Competence, Self-Regulation, Online Affiliation, and Privacy Calculus

Geo-tagging features in social media apps allow users to announce their precise location with great ease and convenience, but geo-tagging poses some serious risks to users' privacy since it involves revelation of one's physical location, a form of ...

article
A Trust-Enhanced Patent Recommendation Approach to University-Industry Technology Transfer

Technology transfer enables the technology from legal owners to be used by others, and it is essential for technology innovation in modern society. However, transferring technology from academia to industry has become a challenging task due to the "...

article
Mitigating Algorithm Aversion in Recruiting: A Study on Explainable AI for Conversational Agents

The use of conversational agents (CAs) based on artificial intelligence (AI) is becoming more common in the field of recruiting. Organizations are now adopting AI-based CAs for applicant (pre-)selection, but negative news coverage, especially the black-...

article
Integrating Scholarly Evidence and Personal Experience in Health Information Technology-Enabled Evidence-Based Patient-Care Practices: Challenges, Opportunities, and Outcomes

Scholarly evidence and personal experience are two prominent sources of knowledge informing patient-care practices in hospitals. In evidence-based patient-care practices, jointly applying both forms of knowledge is challenging due to the divergent ...

article
How Do Job Seekers Respond to Cybervetting? An Exploration of Threats, Fear, and Access Control

The cybervetting activities of potential employers present a significant threat to job-seeking social media users because their content becomes vulnerable to unwanted access and scrutiny. Without control over access, personal information may be gathered ...

Subjects

Comments