Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Yufei Yuan

    Online game addiction has become a common phenomenon that affects many individuals and societies. In this study we rely on the functionalist perspective of human behavior and propose and test a balanced model of the antecedents of online... more
    Online game addiction has become a common phenomenon that affects many individuals and societies. In this study we rely on the functionalist perspective of human behavior and propose and test a balanced model of the antecedents of online game addiction among adolescents, which simultaneously focuses on motivating, and prevention and harm reduction forces. First, a sample of 163 adolescents was used for validating and refining a survey instrument. Second, survey data collected from 623 adolescents were analyzed with Partial Least Squares techniques. The findings point to several functional needs (e.g., need for relationship and need for escapism) that drive online game playing and addiction, as well as to several prevention and harm reduction factors (e.g., education, attention switching activities) that reduce game playing time and alleviate online game addiction. The effects of motivation and prevention factors on online game addiction are often partially mediated by online game playing. Implications for research and practice are discussed.
    Disease management facilitated through information technology could mean a step forward towards a more effective and efficient care of patients afflicted with chronic illnesses. Focussing on diabetes, the paper explores the value... more
    Disease management facilitated through information technology  could mean a step forward towards a more effective and efficient care of patients afflicted with chronic illnesses. Focussing on diabetes, the paper explores the value proposition of wireless technology in enhancing patient
    self-management and quality of life. Diabetics’ non-compliance with prescribed treatment plans mandates the adoption of advanced tools that can support patients through automated functions (e.g., notification reminders for taking medication), decision-support (e.g., analysis of self-test data and feedback), and anytime/anywhere communication and intervention capability (e.g., emergency consultation by healthcare practitioner). A cost-benefit analysis for the mobile self-management of diabetics suggests time and financial savings for both patients and the healthcare providers.
    ABSTRACT The recent proliferation of online-based trade makes negotiations with service providers for global supply networks evermore challenging. The Internet is believed to be a viable means for enabling and facilitating these supply... more
    ABSTRACT The recent proliferation of online-based trade makes negotiations with service providers for global supply networks evermore challenging. The Internet is believed to be a viable means for enabling and facilitating these supply chain interactions. As such, commercial web-based services that support negotiation processes have emerged (i.e., e-negotiation services). Even though these services have promising benefits for supply chain participants, they have not been accepted by most business users. Current e-negotiation studies fail to capture the substantive reasons of this low acceptance as they typically ignore real-world aspects of commercial negotiations. As such, this study argues that an action research approach is a plausible means to study this issue, and to drive changes in the e-negotiations services market. Accordingly, a research plan is outlined with guidelines and recommendations for future action research projects.
    ABSTRACT The influx of e-marketplace disputes, and the decaying aptitude of court litigation to deal with these disagreements, drives the need for an Alternative Dispute Resolution (ADR) means. Thus, it is essential to conceptualise such... more
    ABSTRACT The influx of e-marketplace disputes, and the decaying aptitude of court litigation to deal with these disagreements, drives the need for an Alternative Dispute Resolution (ADR) means. Thus, it is essential to conceptualise such mechanisms, and provide guidelines for their investigation. To this end, this paper: presents the concept of Online Dispute Resolution (ODR) services; outlines a user-centric agenda for future research in this domain. This agenda breaks this important research endeavour into manageable areas of systematic exploration, and paves the way for a better understanding of user interaction with ODR services.
    Online Dispute Resolution (ODR) services are e-justice service conduits that utilize Electronic Negotiation Systems (see the chapter by Kersten and Lai, this volume). They are a key mechanism that may provide a viable solution to the... more
    Online Dispute Resolution (ODR) services are e-justice service conduits that utilize Electronic Negotiation Systems (see the chapter by Kersten and Lai, this volume). They are a key mechanism that may provide a viable solution to the flood of e-disputes. Justice is important in negotiation processes (see the chapter by Albin and Druckman, this volume).It is therefore suggested that ODR services
    Abstract While the majority of studies so far have examined the effectiveness and benefits of electronic settlement applications, this study explores factors that affect the adoption and use of online mediation services. To this end,... more
    Abstract While the majority of studies so far have examined the effectiveness and benefits of electronic settlement applications, this study explores factors that affect the adoption and use of online mediation services. To this end, structural equation modeling analysis was ...
    ... In our pilot study, we did not measure the direct impact of context and incentive on PU and PEOU. ... 2006, Volume: 2, On page(s): 42b-42b [20] Yang K., Exploring factors affecting the adoption of mobile commerce in Singapore,... more
    ... In our pilot study, we did not measure the direct impact of context and incentive on PU and PEOU. ... 2006, Volume: 2, On page(s): 42b-42b [20] Yang K., Exploring factors affecting the adoption of mobile commerce in Singapore, Telematics and Informatics,Volume 22, Issue 3 ...
    ... comparison of m-commerce with e-commerce, as they both capture the market structure of ... Table 2 outlines the major components and participants in each layer of the selected ... commerce and e-commerce industries with regards to... more
    ... comparison of m-commerce with e-commerce, as they both capture the market structure of ... Table 2 outlines the major components and participants in each layer of the selected ... commerce and e-commerce industries with regards to these attributes; and outline major antecedents ...
    As mobile devices widely used for personal and business purpose, mobile devices loss and theft have become one big security threat. In this paper, we analyze the potential risks of mobile devices loss and theft and summarize the... more
    As mobile devices widely used for personal and business purpose, mobile devices loss and theft have become one big security threat. In this paper, we analyze the potential risks of mobile devices loss and theft and summarize the countermeasures that can be used to cope with such risks. Based on protection motivation theory, we propose a research framework to investigate the factors that affect users' behavior to cope with the risk of mobile devices loss and theft.
    ... and usable mobile device. While a detailed analysis of iPhone technology is beyond the scope of this paper, there are a few major technology related factors that have contributed to the success of the iPhone. To begin with, the ...
    1) To develop a computer-based simulation to prospectively study the impacts of explicitly incorporating different equity criteria into the process of allocating kidneys to recipients, given the scarcity of this resource. 2) To assess the... more
    1) To develop a computer-based simulation to prospectively study the impacts of explicitly incorporating different equity criteria into the process of allocating kidneys to recipients, given the scarcity of this resource. 2) To assess the tradeoffs between systems that allocate kidneys based only on medical criteria, systems that allocate kidneys based only on equity criteria, and systems that consider both medical and equity criteria. A computer-based simulation was developed that describes the flows of patients and kidneys. This model provides information at various time points about the number of patients in the system who are awaiting transplants, the number of kidneys available for transplantation, the number of transplantations performed for each matching algorithm, and the number of kidneys discarded (when applicable), as well as the means and standard deviations of the HLA-match scores, number of days from registration to transplantation, and number of days (from registratio...
    ABSTRACT
    Research Interests:
    ABSTRACT
    Research Interests:
    ABSTRACT End users are said to be "the weakest link" in information systems (IS) security management in the workplace. They often knowingly engage in certain insecure uses of IS and violate security policies without... more
    ABSTRACT End users are said to be "the weakest link" in information systems (IS) security management in the workplace. They often knowingly engage in certain insecure uses of IS and violate security policies without malicious intentions. Few studies, however, have examined end user motivation to engage in such behavior. To fill this research gap, in the present study we propose and test empirically a nonmalicious security violation (NMSV) model with data from a survey of end users at work. The results suggest that utilitarian outcomes (relative advantage for job performance, perceived security risk), normative outcomes (workgroup norms), and self-identity outcomes (perceived identity match) are key determinants of end user intentions to engage in NMSVs. In contrast, the influences of attitudes toward security policy and perceived sanctions are not significant. This study makes several significant contributions to research on security-related behavior by (1) highlighting the importance of job performance goals and security risk perceptions on shaping user attitudes, (2) demonstrating the effect of workgroup norms on both user attitudes and behavioral intentions, (3) introducing and testing the effect of perceived identity match on user attitudes and behavioral intentions, and (4) identifying nonlinear relationships between constructs. This study also informs security management practices on the importance of linking security and business objectives, obtaining user buy-in of security measures, and cultivating a culture of secure behavior at local workgroup levels in organizations.
    Research Interests:
    Page 1. Journal of Management Information Systems / Spring 2008, Vol. 24, No. 4, pp. 123–151. © 2008 ME Sharpe, Inc. 0742–1222 / 2008 $9.50 + 0.00. DOI 10.2753/MIS0742-1222240405 In Justice We Trust: Predicting User Acceptance of... more
    Page 1. Journal of Management Information Systems / Spring 2008, Vol. 24, No. 4, pp. 123–151. © 2008 ME Sharpe, Inc. 0742–1222 / 2008 $9.50 + 0.00. DOI 10.2753/MIS0742-1222240405 In Justice We Trust: Predicting User Acceptance of E-Customer Services ...
    Research Interests:
    Studying the perception of health risks associated with mobile phones and the implications for usage.
    Research Interests:
    Much research in the operations research (OR) community has focused on commercial logistics or supply chain management, but there is another kind of logistics problem, dealing with emergency response, that has not as yet received much... more
    Much research in the operations research (OR) community has focused on commercial logistics or supply chain management, but there is another kind of logistics problem, dealing with emergency response, that has not as yet received much attention. In this paper, we present a literature review of emergency logistics in the context of large-scale disasters. First, we identify key characteristics of
    This study uses an artificial neural network model to forecast quarterly accounting earnings for a sample of 296 corporations trading on the New York stock exchange. The resulting forecast errors are shown to be significantly larger... more
    This study uses an artificial neural network model to forecast quarterly accounting earnings for a sample of 296 corporations trading on the New York stock exchange. The resulting forecast errors are shown to be significantly larger (smaller) than those generated by the parsimonious Brown-Rozeff and Griffin-Watts (Foster) linear time series models, bringing into question the potential usefulness of neural network
    Websites nowadays are an important and popular source of publicly available information. However, due to their exploding scale and complexity, overcoming information overload to find relevant information is a major challenge. In addition... more
    Websites nowadays are an important and popular source of publicly available information. However, due to their exploding scale and complexity, overcoming information overload to find relevant information is a major challenge. In addition to website maps and search engines, self-adaptive websites or websites with intelligent navigation aid are very useful tools in addressing this issue. In this paper, a navigation graph-based recommendation system is proposed, in which the navigation patterns of previous website visitors are utilized to provide recommendations for newcomers. The performance of the proposed recommendation algorithm is tested using the data collected from a real world website. Experimental results reveal that the proposed system can yield satisfactory recommendations, especially to the visitors in their early navigation steps.
    The aim of this study is to determine the time and financial limitations that people would accept for using a telehealth service consisting of wireless text messaging reminders to improve adherence to a recommended healthy regimen. An... more
    The aim of this study is to determine the time and financial limitations that people would accept for using a telehealth service consisting of wireless text messaging reminders to improve adherence to a recommended healthy regimen. An empirical study based on a 1-month trial of a prototype system that studied adherence to a specified healthy behaviour was conducted. Fifty-one participants received daily cell phone text messaging reminders on taking one vitamin C pill daily for preventive reasons. At the end of the trial they answered a survey regarding their willingness to pay for and to stay with such a service, if offered. If usage were free, only 45% of the participants would continue to use it for a long indefinite period of time. If the usage were for a fee, 29% of the participants would use the service just a few weeks; 28% would use it an indefinite period of time if they could see its usefulness and if the cost were reasonable. The median amount indicated by the participants as a reasonable monthly fee for such a service was $5. Although the study did not evaluate perceived usefulness to use the telehealth service explicitly, a benefit perception proved to condition participant willingness to use the service and to pay for it, if necessary. If people perceive usefulness, they want to use the service, even for a fee. A free service would not be used if it is not perceived as beneficial.
    Page 1. Journal of Management Information Systems / Spring 2008, Vol. 24, No. 4, pp. 123–151. © 2008 ME Sharpe, Inc. 0742–1222 / 2008 $9.50 + 0.00. DOI 10.2753/MIS0742-1222240405 In Justice We Trust: Predicting User Acceptance of... more
    Page 1. Journal of Management Information Systems / Spring 2008, Vol. 24, No. 4, pp. 123–151. © 2008 ME Sharpe, Inc. 0742–1222 / 2008 $9.50 + 0.00. DOI 10.2753/MIS0742-1222240405 In Justice We Trust: Predicting User Acceptance of E-Customer Services ...
    Page 1. Driving Forces for M-Commerce Success Jason J. Zhang Yufei Yuan Norm Archer ABSTRACT. Is m-commerce just an extension or a subset of e-commerce? Will it turn out to be just more hype? In this paper we discuss ...
    ABSTRACT Radio Frequency Identification (RFID), which is an automated identification technology, has received widespread attention due to its adoption by Wal-Mart and its top 100 suppliers. As the cost of this new technology falls, it is... more
    ABSTRACT Radio Frequency Identification (RFID), which is an automated identification technology, has received widespread attention due to its adoption by Wal-Mart and its top 100 suppliers. As the cost of this new technology falls, it is being implemented by a variety of industries around the world, to take advantage of its improvements in supply chain efficiency and visibility. This paper briefly introduces a number of RFID trials that have been conducted in China. In particular, a case involving an RFID application in Shanghai Port container vehicle management is discussed in detail, to demonstrate the critical implementation issues facing Chinese adopters in terms of the use of RFID technology.
    ... Through the order fulfillment and after-sales service processes, supply chain management intersects with marketing and sales. Supply chain management strategies involve businessrelationships that can be competitive, collaborative, or... more
    ... Through the order fulfillment and after-sales service processes, supply chain management intersects with marketing and sales. Supply chain management strategies involve businessrelationships that can be competitive, collaborative, or some mix of these two. ...
    ... use the information system voluntarily. Individuals rationalise their behaviour based on the rewards of compliance or the consequences of non-compliance (Rawstorne, Jayasuriya and Caputi, 2000). Many of the behaviours ...
    Widespread interest in the evaluation of human-system interfaces has led to the development of various techniques in usability engineering. Usability evaluations are usually carried out on interface prototypes. However, if the design... more
    Widespread interest in the evaluation of human-system interfaces has led to the development of various techniques in usability engineering. Usability evaluations are usually carried out on interface prototypes. However, if the design involves hardware implementation, such as a special keypad or a control panel layout, producing hardware prototypes for evaluation can be expensive and time-consuming. One solution to this problem
    ABSTRACT Marketing stimuli such as free trial has been widely used to increase user acceptance and intention to purchase information services. Information technology (IT) acceptance theories, such as the technology acceptance model and... more
    ABSTRACT Marketing stimuli such as free trial has been widely used to increase user acceptance and intention to purchase information services. Information technology (IT) acceptance theories, such as the technology acceptance model and the unified theory of acceptance and use of technology, have been widely used to explain information system (IS) usage. These theories, however, do not explicitly consider the effect of marketing stimuli that would influence and shape user beliefs, attitude and behavior towards the use and purchase of new IS/IT. Echoing calls for advancing knowledge in technology acceptance, we propose a theoretical model based on expectation conformation theory to investigate the effect of marketing stimuli in the form of free trial and price of using IS on consumers’ acceptance decision process. In this study, free trial of mobile newspaper is used as the research context. A survey sample of 192 responses is used to test the model. Results suggest that the trial experience has an impact on post-trial beliefs and attitude. Perceived fee also has an effect on the acceptance of the information service when the users need to pay for the service.
    ABSTRACT
    Trust in the context of e-negotiation is a multifaceted cognition about various trustees, including the e-negotiation website, the e-negotiation service provider, the other negotiator, and the neutral third party (if it exists). This set... more
    Trust in the context of e-negotiation is a multifaceted cognition about various trustees, including the e-negotiation website, the e-negotiation service provider, the other negotiator, and the neutral third party (if it exists). This set of trust cognitions is important because it can facilitate the adoption of e-negotiation services. As such, this manuscript presents a review of relevant trust-related literature streams,
    With the rapid growth of web-based services and global trade, there is some commercial potential for web-based Negotiation Support Services (WNSS). This market potential, however, is somewhat untapped. While previous studies had examined... more
    With the rapid growth of web-based services and global trade, there is some commercial potential for web-based Negotiation Support Services (WNSS). This market potential, however, is somewhat untapped. While previous studies had examined WNSS adoption by individual decision makers, this situation is not fully realistic, as the conformity of all negotiating partners is required for web-based negotiation to happen. Therefore,
    ... For example, efforts to teach adolescents about the risks of online game playing can take place before someone starts playing games, throughout the development of a ... Although little research has been conducted on Internet addiction... more
    ... For example, efforts to teach adolescents about the risks of online game playing can take place before someone starts playing games, throughout the development of a ... Although little research has been conducted on Internet addiction and specifically online game addiction ...

    And 10 more