58 results on '"Jason Bennett"'
Search Results
2. The Impact of Social Comparison on Turnover Among Information Technology Professionals.
- Author
-
Wiesche, Manuel, Pflügler, Christoph, and Thatcher, Jason Bennett
- Subjects
SOCIAL comparison ,INFORMATION technology ,INFORMATION technology personnel ,INFORMATION professionals ,NEW employees - Abstract
While IT workforce research often examines job- and organizational-related reasons for turnover, studies rarely connect the immediate social context of IT work to IT professionals' workplace behavior. To understand the influence of the immediate social context, we develop a social comparison model that connects the social influence of co-worker who have left an organization to turnover among IT professionals who remain. We test our model using a social network of 4,011 IT professionals employed in a large IT firm over four years. We complement our analysis of this data with a multiple-case study with five software development teams. Across the two studies, our results suggest that the departure of an IT professional increases the probability of turnover among remaining coworkers; further, we found that turnover is even more likely when the remaining IT professionals are similar in technical abilities and demographic attributes to the co-worker who left. Our results direct attention to the immediate social context as an influence on the turnover behavior of IT professionals and explain how similarity in domain-specific attributes shapes this turnover behavior. Practitioners should know that a single departure may cause a chain reaction in IT work teams and organizations and find suggestions for assigning new employees. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Information Technology Innovativeness and Data-Breach Risk: A Longitudinal Study.
- Author
-
Wang, Qian, Ngai, Eric W. T., Pienta, Daniel, and Thatcher, Jason Bennett
- Subjects
INFORMATION technology ,DATA security failures ,TECHNOLOGICAL innovations ,ORGANIZATIONAL learning ,LONGITUDINAL method ,SECURITY systems - Abstract
The adoption of new Information Technology (IT) innovations has led to increased uncertainty among employees, a greater demand for security measures, and more entry points for cyber-attacks, which all increase the risk of data breaches for firms. Despite the prevalence of discussions around this issue, there has been a lack of empirical research examining the data breach risk associated with IT innovations. To address this gap, we have developed arguments based on an organizational learning theoretical framework that explains how IT innovativeness can exacerbate data breach risk. Through our analysis of a sample of data breaches that occurred between 2013 and 2021, we have discovered that there is a positive association between firm IT innovativeness and the risk of data breaches. We also find that the effects of IT innovativeness can vary under certain conditions. For example, we find that the positive relationship between IT innovativeness and data breach risk is mitigated when managers possess IT expertise or when firms have established extensive board connections with cybersecurity managers. Moreover, we find that the relationship between IT innovativeness and data breach risk is amplified in complex environments but not in dynamic or munificent ones. This study takes the lead in advancing the theoretical understanding and empirical validation of security-related risks associated with IT innovations. Moreover, our findings serve as a timely reminder for research and practice to carefully consider the implications of introducing novel technologies into firms and the potential dark side consequences that may arise. Additionally, this study underscores the importance of understanding organizational learning in risk assessment and change management, as well as the critical role of contextual factors in moderating the unintended security-related consequences linked to IT innovations. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. Cooking a telework theory with causal recipes: Explaining telework success with ICT, work and family related stress.
- Author
-
Meier, Marco, Maier, Christian, Thatcher, Jason Bennett, and Weitzel, Tim
- Subjects
TELECOMMUTING ,FAMILY-work relationship ,INFORMATION & communication technologies - Abstract
Employees want to be able to telework and organisations want to provide the ideal environment to make it a success story. While some teleworkers experience telework success, that is, are satisfied and perform well, others do not. To understand the drivers of successful and unsuccessful telework, we used a mixed methods approach, taking a stress‐theoretic and configurational perspective. In Study 1, we conducted a quantitative analysis of data collected in a survey of 375 teleworkers to identify configurations of information and communication technology (ICT), work and family related challenge and hindrance stressors that lead to high and low telework success. In Study 2, we analysed qualitative data collected in interviews with 52 teleworkers to shed light on the interplay among ICT, work and family related challenge and hindrance stressors in the configurations that lead to high and low telework success. We contribute to telework research by showing that high and low telework success results from configurations of ICT, work and family related challenge and hindrance stressors. We extend the literature by showing that teleworkers benefit from challenge stressors only when they do not experience hindrance stressors. Methodologically, we provide a blueprint for an innovative approach using deductive fsQCA to refine, extend and delimit theory. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Affect and information technology use: the impact of state affect on cognitions and IT use.
- Author
-
Dinger, Michael, Wade, Julie T., Dinger, Steven, Carter, Michelle, and Thatcher, Jason Bennett
- Subjects
INFORMATION technology ,AFFECT (Psychology) ,STRUCTURAL equation modeling ,COGNITION ,WORK environment - Abstract
Purpose: This paper investigates the dynamics between state affect and trusting cognitive beliefs on post-adoptive information technology (IT) use behaviors in the form of intention to explore and deep structure usage. That state affect can influence behaviors is recognized in practice. In fact, some studies examine the impact of affective constructs, but the way state affect impacts how individuals use IT remains largely unexplored. The authors theorize that state affect, in the form of positive and negative affect, will influence trusting cognitive beliefs regarding an IT artifact (in terms of perceived helpfulness, capability and reliability) and, more importantly, directly influence intention to explore and deep structure usage. Design/methodology/approach: The authors test the model using a sample of 357 IT users. Survey items were derived from established measures, and the data were analyzed using structural equation modeling. Findings: Results of this study suggest that positive affect and negative affect impact trusting cognitive beliefs. Trusting cognitive beliefs positively impact intention to explore with an IT and deep structure usage of an IT. Even in the presence of trusting beliefs, though, positive affect directly impacts intention to explore. Positive affect and negative affect both also have various indirect, mediated effects on intention to explore and deep structure usage. Originality/value: In order to maximize value from workplace IT, the results suggest managers foster an authentic, positive work environment in order to harness or redirect employees' emotional energies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. ALGORITHMIC PROCESSES OF SOCIAL ALERTNESS AND SOCIAL TRANSMISSION: HOW BOTS DISSEMINATE INFORMATION ON TWITTER.
- Author
-
Salge, Carolina Alves de Lima, Karahanna, Elena, and Thatcher, Jason Bennett
- Published
- 2022
- Full Text
- View/download PDF
7. STRATEGIC DIRECTIONS FOR AI: THE ROLE OF CIOS AND BOARDS OF DIRECTORS.
- Author
-
Jingyu Li, Mengxiang Li, Xincheng Wang, and Thatcher, Jason Bennett
- Published
- 2021
- Full Text
- View/download PDF
8. THE EFFECTS OF BUSINESS–IT STRATEGIC ALIGNMENT AND IT GOVERNANCE ON FIRM PERFORMANCE: A MODERATED POLYNOMIAL REGRESSION ANALYSIS.
- Author
-
Chau, Dorothy C. K., Ngai, Eric W. T., Gerow, Jennifer E., and Thatcher, Jason Bennett
- Published
- 2020
- Full Text
- View/download PDF
9. SOCIAL MEDIA AND SELECTION: POLITICAL ISSUE SIMILARITY, LIKING, AND THE MODERATING EFFECT OF SOCIAL MEDIA PLATFORM.
- Author
-
Wade, Julie T., Roth, Philip L., Thatcher, Jason Bennett, and Dinger, Michael
- Published
- 2020
- Full Text
- View/download PDF
10. INFORMATION TECHNOLOGY IDENTITY: A KEY DETERMINANT OF IT FEATURE AND EXPLORATORY USAGE.
- Author
-
Carter, Michelle, Petter, Stacie, Grover, Varun, and Thatcher, Jason Bennett
- Published
- 2020
- Full Text
- View/download PDF
11. Towards an Embeddedness View of IT Professionals: An Agenda for the Next-Generation Global IT Workforce.
- Author
-
Dinger, Michael, Wade, Julie T., and Thatcher, Jason Bennett
- Subjects
INFORMATION technology personnel ,MANAGEMENT information systems ,INFORMATION resources management ,WORKING hours ,INFORMATION technology outsourcing - Abstract
So, combined with a potential shift toward more commoditized skillsets as well as toward workplace culture and norms that are less impactful on the lives of IT workers, to what extent will fit contribute to embedding IT professionals within organizations? In this editorial, we suggest taking an embeddedness approach to study IT professionals will offer a more nuanced view of the changing nature of IT labor and the dynamics between IT talent and employers worldwide (Pratt, [15]). So let's consider how the global hunger for IT talent combines with the inherently flexible and digital nature of IT work to shift power toward IT workers in terms of demanding more accommodations from employers. These modern, global IT talent-sourcing structures and work arrangements directly impact IT professionals' work experiences, behaviors, and decision-making. [Extracted from the article]
- Published
- 2023
- Full Text
- View/download PDF
12. The Janus Effect of Generative AI: Charting the Path for Responsible Conduct of Scholarly Activities in Information Systems.
- Author
-
Susarla, Anjana, Gopal, Ram, Thatcher, Jason Bennett, and Sarker, Suprateek
- Subjects
INFORMATION storage & retrieval systems ,ARTIFICIAL intelligence ,GRANTS (Money) - Abstract
Funding: A. Susarla was funded by an R01 grant from the National Library of Medicine, through [Grant R01LM013443]. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
13. DOXING AND DOXEES: A QUALITATIVE ANALYSIS OF VICTIM EXPERIENCES AND RESPONSES.
- Author
-
Franz, Anjuli and Thatcher, Jason Bennett
- Subjects
INFORMATION storage & retrieval systems ,PERSONAL information management ,CYBERSPACE ,QUALITATIVE research ,DATA management - Abstract
Doxing, a form of adversarial online behavior, is the aggregation and release of an individual's personal information with malicious intent. It is increasingly used to intimidate, punish, or silence individuals. Such weaponization of personal information can result in extreme and intertwined cyber harassment and physical threats, significantly affecting doxees' participation in both cyber and physical communities. While prior research has examined the underlying motives of the doxer, the doxee's perspective has remained largely unexplored. Drawing on data from 14 individuals who have experienced doxing, this study examines the consequences of doxing from the doxee's point of view. Employing the lens of approach and avoidance coping, we explore how doxees respond to doxing threats and adapt their behavior. Our research provides novel insight and themes related to doxing. Based on our analysis, we offer an agenda for information systems (IS) research and practice, paving the way for exploring doxing and potential remedies. [ABSTRACT FROM AUTHOR]
- Published
- 2023
14. Designing a User-Metaverse Interface for the Industrial-Metaverse.
- Author
-
Hönemann, Kay, Thatcher, Jason Bennett, Konopka, Björn, and Wiesche, Manuel
- Subjects
SHARED virtual environments ,SOCIAL cognitive theory ,COMPUTER interfaces ,SOCIAL perception ,VIRTUAL reality - Abstract
The Industrial-Metaverse will create interactions between the physical and virtual worlds to extend operations in the physical industry. This particularity and the demand for increasing immersion in the Metaverse require using XR technologies called User-Metaverse interfaces (UMI). How such a UMI must be designed for the industrial-Metaverse is unknown. This study adopts a design science approach to design a UMI based on social-cognitive theory (SCT). According to SCT, creating user-generated Metaverse content is crucial to the UMI design. It empowers users to generate content through their efforts, leading to higher self-efficacy and user engagement. We formulate two theoretically based design principles and instantiate a software artifact, which we evaluate in a laboratory experiment with 57 participants. Our study shows the importance of belief in success in the design of future UMI. Furthermore, our design principles show significant positive outcome expectations of users in their interaction with the software artifact. [ABSTRACT FROM AUTHOR]
- Published
- 2023
15. Shocks and IS user behavior: a taxonomy and future research directions.
- Author
-
Meier, Marco, Maier, Christian, Thatcher, Jason Bennett, and Weitzel, Tim
- Subjects
LITERATURE reviews ,TAXONOMY ,COVID-19 pandemic ,INFORMATION storage & retrieval systems ,MECHANICAL shock ,INFORMATION technology personnel - Abstract
Purpose: Jarring events, be they global crises such as COVID-19 or technological events such as the Cambridge Analytica data incident, have bullwhip effects on billions of people's daily lives. Such "shocks" vary in their characteristics. While some shocks cause, for example, widespread adoption of information systems (IS) as diverse as Netflix and Teams, others lead users to stop using IS, such as Facebook. To offer insights into the multifaceted ways shocks influence user behavior, this study aims to assess the status quo of shock-related literature in the IS discipline and develop a taxonomy that paves the path for future IS research on shocks. Design/methodology/approach: This study conducted a literature review (N = 70) to assess the status quo of shock-related research in the IS discipline. Through a qualitative study based on users who experienced shocks (N = 39), it confirmed the findings of previous literature in an illustrative IS research context. Integrating the findings of the literature review and qualitative study, this study informs a taxonomy of shocks impacting IS use. Findings: This study identifies different ways that shocks influence user behavior. The taxonomy reveals that IS research could profit from considering environmental, private and work shocks and shedding light on positive shocks. IS research could also benefit from examining the urgency of shocks, as there are indications that this influences how and when individuals react to a specific shock. Originality/value: Findings complement previous rational explanations for user behavior by showing technology use can be influenced by shocks. This study offers a foundation for forward-looking research that connects jarring events to patterns of technology use. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
16. The IT Identity Threat: A Conceptual Definition and Operational Measure.
- Author
-
Craig, Kevin, Thatcher, Jason Bennett, and Grover, Varun
- Subjects
INFORMATION technology ,IDENTITY (Psychology) ,SELF-esteem ,INFORMATION storage & retrieval systems ,SOCIAL factors ,SOCIAL structure ,SOCIAL groups ,GROUP identity - Abstract
As individuals' relationships with information technology (IT) grow more complex and personal, our understanding of the problem of resistance to IT continues to evolve. Current approaches to resistance are based on perceived threats to work tasks and social structure. This work enhances our understanding of resistance by developing a definition and measure of the IT Identity Threat, a new construct that integrates social, task-related, and personal factors of resistance. Grounded in identity theory, the IT Identity Threat offers a parsimonious means to explain and predict IT resistance behaviors. Using data from two independent studies conducted among students and faculty at a large university in the Southeastern United States, we validate an operational measure of IT Identity Threat as a second-order construct and demonstrate that it successfully predicts resistance to IT. Our findings provide support for the IT Identity Threat construct as a simple mechanism to study resistance to IT. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
17. Grace, place and space: fostering employee technological innovation in the new normal.
- Author
-
Burleson, James, Greenbaum, Bruce E., and Thatcher, Jason Bennett
- Subjects
TECHNOLOGICAL innovations ,EMPLOYEE selection ,TELECOMMUTING - Abstract
Purpose: The ongoing shift to telework has brought about tremendous opportunities for employees to reimagine their use of technology. Opportunities abound for both discovering new technologies and new uses of existing technologies. However, opportunity alone is not enough to turn ideas into action. This opinion paper aims to identify grace, place and space as key concepts that can help managers navigate challenges and opportunities for technological innovation posed by telework. Design/methodology/approach: The authors provide a concise review of related research and events that inform the selection of conditions necessary to foster employee technological innovation. Findings: The authors identify three primary conditions necessary to foster employee technological innovation – grace, place and space. "Grace" refers to employee autonomy, "place" refers to networking and "space" refers to a reduction of overload. While telework may create opportunities for innovation, it also presents difficulties. Therefore, for each condition, the authors discuss inherent tensions and advise managers regarding how they can resolve those tensions and bring about innovation with a decentralized workforce. Originality/value: The authors situate the discussion on facilitating conditions that foster employee technological innovation in today's current environment, one in which a rapid expansion of telework among employees is creating difficulties for managers. This paper addresses the "new normal" that managers will face for the foreseeable future. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
18. MINDFULNESS IN INFORMATION TECHNOLOGY USE: DEFINITIONS, DISTINCTIONS, AND A NEW MEASURE.
- Author
-
Thatcher, Jason Bennett, Wright, Ryan T., Heshan Sun, Zagenczyk, Thomas J., and Klein, Richard
- Published
- 2018
- Full Text
- View/download PDF
19. Human versus AI? Investigating the Heterogeneous Effects of Live Streaming E-commerce.
- Author
-
Mei-Xian Wang, Guohou Shan, and Thatcher, Jason Bennett
- Subjects
ELECTRONIC commerce ,ARTIFICIAL intelligence ,BUSINESS models ,INFORMATION technology ,HUMAN beings - Abstract
Live Streaming E-commerce (LSE) refers to a technology-enabled business model that embeds live streaming into e-commerce, where streamers sell products and interact with the viewers in real-time. When stores use human streamers, they benefit from high Synchronicity Interaction (SI), which causes users’ engagement. However, when stores use artificial intelligence (AI) streamers to replace human streamers, it is unclear whether high SI human streamers are more effective than low SI AI streamers at selling products. This study examines drivers of whether AI streamers are more or less effective at selling products than human streamers. We find that human and AI streamers perform differently, and product categories moderate this effect. Our results contribute to the LSE and business value of AI literature and offer insight to platforms and stores seeking to better leverage AI technology and technology designers interested in developing more effective AI streamers. [ABSTRACT FROM AUTHOR]
- Published
- 2022
20. Can you see opportunity knocking? An examination of technology-based political skill on opportunity recognition in online communities for MTurk workers.
- Author
-
Di Gangi, Paul M., McAllister, Charn P., Howard, Jack L., Thatcher, Jason Bennett, and Ferris, Gerald R.
- Subjects
VIRTUAL communities ,INFORMATION sharing ,RECOGNITION (Philosophy) ,INFORMATION storage & retrieval systems - Abstract
Purpose: Political skill has emerged as a concept of interest within the information systems literature to explain individual performance outcomes. The purpose of this paper is to adapt political skill to technology-mediated contexts. Specifically, the authors seek to understand political skill's role in shaping microtask workers' opportunity recognition when utilizing online communities in microtask work environments. Design/methodology/approach: The authors tested their research model using a survey of 348 Amazon Mechanical Turk (MTurk) workers who participate in microtask-related online communities. MTurk is a large, popular microtasking platform used by thousands of microtask workers daily, with several online communities supporting microtask workers. Findings: Technology-based political skill plays a critical role in shaping the resources microtasking workers rely upon from online communities, including opportunity recognition and knowledge sharing. The ability to develop opportunity recognition positively impacts a microtask worker's ability to leverage online communities for microtask worker performance. Tenure in the community acts as a moderator within the model. Originality/value: The present study makes several contributions. First, the authors adapt political skill to an online community to account for how microtask workers understand a community's socio-technical environment. Second, the authors demonstrate the antecedent role of political skill for opportunity recognition and knowledge sharing. Third, the authors provide empirical validation of the link between online communities and microtask worker performance. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
21. Training to Mitigate Phishing Attacks Using Mindfulness Techniques.
- Author
-
Jensen, Matthew L., Dinger, Michael, Wright, Ryan T., and Thatcher, Jason Bennett
- Subjects
PHISHING ,PHISHING prevention ,TRAINING ,INFORMATION technology security ,SIGNAL detection ,UNIVERSITIES & colleges ,COLLEGE students - Abstract
Phishing attacks are at a record high and are causing billions of dollars in losses. To mitigate phishing’s impact, organizations often use rule-based training to teach individuals to identify certain cues or apply a set of rules to avoid phishing attacks. The rule-based approach has improved organizational defenses against phishing; however, regular repetition of rule-based training may not yield increasing resistance to attacks. To expand the toolkit available to combat phishing attacks, we used mindfulness theory to develop a novel training approach that can be performed after individuals are familiar with rule-based training. The mindfulness approach teaches individuals to dynamically allocate attention during message evaluation, increase awareness of context, and forestall judgment of suspicious messages—techniques that are critical to detecting phishing attacks in organizational settings, but are unaddressed in rule-based instruction. To evaluate the efficacy of our approach, we compared rule-based and mindfulness training programs in a field study at a U.S. university that involved 355 students, faculty, and staff who were familiar with phishing attacks and received regular rule-based guidance. To evaluate the robustness of the training, we delivered each program in text-only or text-plus-graphics formats. Ten days later, we conducted a phishing attack on participants that used both generic and customized phishing messages. We found that participants who received mindfulness training were better able to avoid the phishing attack. In particular, improvement was observed for participants who were already confident in their detection ability and those who reported low e-mail mindfulness and low perceptions of Internet risk. This work introduces and provides evidence supporting a new approach that may be used to develop anti-phishing training. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
22. Qualitative comparative analysis in the information systems discipline: a literature review and methodological recommendations.
- Author
-
Mattke, Jens, Maier, Christian, Weitzel, Tim, and Thatcher, Jason Bennett
- Subjects
LITERATURE reviews ,INFORMATION storage & retrieval systems ,COMPARATIVE studies ,EMPIRICAL research ,FUZZY sets - Abstract
Purpose: Qualitative Comparative Analysis (QCA) is a promising, powerful method that is increasingly used for IS research. However, the Information Systems (IS) discipline still lacks a shared understanding of how to conduct and report QCA. This paper introduces the fundamental concepts of QCA, summarizes the status quo, and derives recommendations for future research. Design/methodology/approach: A descriptive literature review in major IS outlets summarizes how and why QCA has been used in the IS discipline, critically evaluates the status quo, and derives recommendations for future QCA studies. Findings: The literature review reveals 32 empirical research articles in major IS journals that have used the QCA method. Articles applied QCA to a broad range of research topics at the individual and organizational levels, mainly as a standalone analysis for theory development, elaboration and testing. The authors also provide evidence that most published IS research articles do not take full advantage of the potential QCA, such as analyzing necessary causal conditions or testing the robustness of QCA results. The authors provide seven actionable recommendations for future IS research using QCA. Originality/value: The literature review assesses the status quo of QCA's application in the IS discipline and provides specific recommendations on how IS researchers can leverage the full potential of QCA. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
23. Motivation in IT Projects: Investigating the Effect of Agile Practices on Team Members' Intrinsic Motivation.
- Author
-
Memeti, Armela, Huck-Fries, Veronika, Wiesche, Manuel, Thatcher, Jason Bennett, and Krcmar, Helmut
- Subjects
MOTIVATION (Psychology) ,STRUCTURAL equation modeling ,PSYCHOLOGY ,AUTONOMY (Psychology) ,INFORMATION & communication technologies - Abstract
Many information technology (IT) projects are still failing, even after attempting to structure work using agile practices. Using a quantitative analysis of data drawn from 74 IT workers, we investigate the direct and indirect effect of agile practices on team members' intrinsic motivation, an important driver of IT worker performance. We investigate how agile practices directly impact self-determination and indirectly shape intrinsic motivation by using structural equation modelling. Our results indicate that agile practices increase professional efficacy and perceived control, while they diminish psychological ownership. These are then positively related to team members' intrinsic motivation. We extend earlier research on agile information systems development by suggesting that self-determination serves as an intermediary between agile practices and intrinsic motivation. For practitioners, our study expounds on why and how agile practices can be used to strengthen the fulfilment of the employees' self-determination needs. [ABSTRACT FROM AUTHOR]
- Published
- 2021
24. You Cheered for Your Favorite Teams: Does it Get You Hired or Penalized?.
- Author
-
Kwon, Youngjin, Thatcher, Jason Bennett, Roth, Philip L., and Pienta, Daniel
- Abstract
The proliferation of personal data on social media affords hiring managers great opportunities to gather various information about job applicants, resulting in the popularization of social media assessments. Hiring managers inevitably come across nondiagnostic information that is of little diagnostic value for their evaluation of job applicants during the process. In this study, we examine how nondiagnostic information job applicants' social media impacts hiring managers' assessments of them. Drawing upon dilution effects literature and stereotypical fit theory, we hypothesize that viewing nondiagnostic information would dilute stereotype-based evaluation of job applicants, and such dilution effects would be more pronounced if nondiagnostic information is pseudorelevant and presented on professional social media rather than personal. This study would contribute to the IS and management literature by suggesting the role of nondiagnostic information in social media assessments. [ABSTRACT FROM AUTHOR]
- Published
- 2021
25. Standing Up or Standing By: Understanding Bystanders' Proactive Reporting Responses to Social Media Harassment.
- Author
-
Wong, Randy Yee Man, Cheung, Christy M. K., Xiao, Bo, and Thatcher, Jason Bennett
- Subjects
HARASSMENT ,BYSTANDER involvement ,DEVIANT behavior ,SOCIAL media ,HYACINTHOIDES ,SOCIAL context ,AUTHORSHIP in literature - Abstract
Social media harassment, a cyberbullying behavior, poses a serious threat to users and platform owners of social media. In this paper, we contextualize the bystander intervention framework and reporting literature to social media in order to understand why bystanders report social media harassment. Our contextualized intervention framework focuses on three sociotechnical aspects—the online social environment, characteristics of the technology platform, and their interplay—that explain bystander reporting on social media platforms. We tested the model using data gathered from active Facebook users. Our findings direct practitioners' attention to the role of the platform in encouraging bystanders to help stop social media harassment. For policy makers, our findings direct attention to supporting programs that encourage social media users to feel responsible for reporting harassment and making transparent the outcomes of reporting social media harassment using anonymous reporting tools. For platform owners, our findings direct attention to investing in tools that enable anonymous reporting, to fostering a climate that encourages reporting, and to ensuring that all users understand that reporting social media harassment results in swift, effective responses from platform owners. Taken together, we believe our research offer insight into how to build safer and secure social media platforms. Social media harassment, a cyberbullying behavior, poses a serious threat to users and platform owners of social media. A growing body of research suggests involving bystanders in interventions to combat deviant behaviors. In this paper, we contextualize the bystander intervention framework and reporting literature to social media in order to understand why bystanders report social media harassment. Our contextualized intervention framework focuses on three sociotechnical aspects—the online social environment, characteristics of the technology platform, and their interplay—that explain bystander reporting on social media platforms. We tested the model using data gathered from 291 active Facebook users. We found that four contextualized factors, (1) perceived emergency of the social media harassment incident, (2) perceived responsibility to report, (3) perceived self-efficacy in using built-in reporting functions, and (4) perceived outcome effectiveness of built-in reporting functions for tackling social media harassment, shaped bystanders' willingness to intervene against social media harassment. In addition, we showed that perceived anonymity of the reporting system counterbalances the negative influence of the presence of others on bystanders' willingness to intervene. For research, we contribute to the cyberbullying literature by offering a novel sociotechnical explanation of mechanisms that shape bystanders' willingness to report social media harassment. For practice, we offer insight into how to build safer and secure social media platforms for all users. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
26. CONCEPTUALIZING FLUID TEAM MEMBERSHIP AND ITS EFFECTS IN IT PROJECTS: A PRELIMINARY MODEL.
- Author
-
Przybilla, Leonard, Wiesche, Manuel, and Thatcher, Jason Bennett
- Subjects
INFORMATION storage & retrieval systems ,COMPUTER software development ,DIGITAL technology ,MENTAL representation ,INFORMATION technology - Abstract
IT projects frequently add and subtract team members to take advantage of diverse knowledge stocks in solving complex problems. In this paper, we examine how such "fluid" changes in team membership impact the performance of IT projects. In doing so, we offer a conceptual definition of team fluidity and propose a theoretical model of fluid membership's impact on IT project performance. We argue the effects of fluidity depend on the project setting, such as project type and familiarity of members, and characteristics of the fluidity event, that is centrality of members involved and timing. We propose that fluidity likely affects IT work through its impact on team cognition. Going beyond the common assumption that teams are stable entities with clearly defined membership, our propositions bring research on IT project teams as well as on teams in general closer to reality. By shedding light on how fluid team membership relates to project performance, we additionally contribute to the body of knowledge on the design and management of IT project teams to achieve high performance. [ABSTRACT FROM AUTHOR]
- Published
- 2020
27. AI-Based Information Systems.
- Author
-
Buxmann, Peter, Hess, Thomas, and Thatcher, Jason Bennett
- Published
- 2021
- Full Text
- View/download PDF
28. Protecting a whale in a sea of phish.
- Author
-
Pienta, Daniel, Thatcher, Jason Bennett, and Johnston, Allen
- Subjects
EMAIL ,INTERNET security ,PHISHING prevention ,CYBERCRIMINALS ,COMPUTER crimes - Published
- 2020
- Full Text
- View/download PDF
29. ASSESSING COMMON METHOD BIAS: PROBLEMS WITH THE ULMC TECHNIQUE.
- Author
-
Chin, Wynne W., Thatcher, Jason Bennett, and Wright, Ryan T.
- Published
- 2012
- Full Text
- View/download PDF
30. How Much is Too Much: Employee Monitoring, Surveillance, and Strain.
- Author
-
Singh, Tripti, Johnston, Allen C., and Thatcher, Jason Bennett
- Subjects
SECURITY management ,EMPLOYEE surveillance ,STRAIN theory (Sociology) ,ELECTRONIC monitoring in the workplace ,SOCIAL media - Abstract
To maintain security, organizations use increasingly sophisticated methods to monitor employees, such as checking emails, tracking employee's website connections, collecting keystrokes, and surveilling social media activity. While electronic monitoring and surveillance (EM/S) practices represent an attempt to secure the firm's data and more, they also may have an unintended consequence of creating strain among employees. In this study, we examine EM/S practices, the characteristics of those practices which cause strain and the negative, deviant and non-compliant behaviors the strain evoke in the EM/S subjected employees. We draw from the techno-stress and EM/S literature to build a research model that describes the relationship between EM/S, strain, and employees' EM/S related deviant and non-compliant outcomes. The research concludes with the discussion of our plan for testing the research model and its potential implications for research. [ABSTRACT FROM AUTHOR]
- Published
- 2019
31. Advancing operations management theory using exploratory structural equation modelling techniques.
- Author
-
Roberts, Nicholas, Thatcher, Jason Bennett, and Grover, Varun
- Subjects
STRUCTURAL equation modeling ,EMPIRICAL research ,SAMPLE size (Statistics) ,LEAST squares ,THEORY ,MEASUREMENT - Abstract
The structural equation modelling (SEM) technique has been touted as a useful tool for tightening links between theoretical and empirical operations management (OM) research. Despite SEM's increasing prominence in the field, leading scholars continue to call for a deeper infusion of theory into empirical OM research. To strengthen ties between theory and analysis in OM research, this study evaluates previous OM applications of SEM and identifies specific ways we can use SEM to advance operations management theory. Through judicious use of SEM techniques, we believe that OM researchers have the opportunity to confirm and extend existing theoretical frameworks. Further, we offer guidance on how to operationalise measurement models such that researchers accurately depict the causality of a construct. To demonstrate how to advance theory, we use an illustrative example of SEM in an OM context based upon data gathered from a survey of over 200 respondents. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
32. MOVING BEYOND INTENTIONS AND TOWARD THE THEORY OF TRYING: EFFECTS OF WORK ENVIRONMENT AND GENDER ON POST-ADOPTION INFORMATION TECHNOLOGY USE.
- Author
-
Ahuja, Manju K. and Thatcher, Jason Bennett
- Published
- 2005
- Full Text
- View/download PDF
33. AN EMPIRICAL EXAMINATION OF INDIVIDUAL TRAITS AS ANTECEDENTS TO COMPUTER ANXIETY AND COMPUTER SELF-EFFICACY.
- Author
-
Thatcher, Jason Bennett and Perrewe, Pamela L.
- Published
- 2002
- Full Text
- View/download PDF
34. Turnover of Information Technology Workers: Examining Empirically the Influence of Attitudes, Job Characteristics, and External Markets.
- Author
-
Thatcher, Jason Bennett, Stepina, Lee P., and Boyle, Randall J.
- Subjects
INFORMATION technology ,LABOR turnover ,JOB descriptions ,JOB satisfaction ,ORGANIZATIONAL commitment ,EMPLOYEE attitudes - Abstract
This paper presents and tests a conceptual model linking perceptions of the internal work environment and external markets to information technology (IT) worker turnover. The model focuses on organizational commitment (OC) as the primary predictor of turnover intention. We suggest that OC mediates perceptions of the workplace and external environment on turnover intention. Specifically, we hypothesize that OC mediates the influence of (1) job satisfaction, (2) perceived job characteristics, (3) perceived competitiveness of pay, and (4) perceived job alternatives on turnover intention. Also, perceived job alternatives are modeled as having a direct effect on turnover intention. Analysis provides moderate empirical support for the research model. OC and perceived job alternatives demonstrated distinct effects on turnover intention. In addition, OC mediated the influence of job satisfaction, perceived job characteristics, and perceived competitiveness of pay on turnover intention. Findings suggest that through cultivating positive beliefs about the job and attitudes toward the employer, managers may counter the influence of external markets on IT workers' turnover intention. [ABSTRACT FROM AUTHOR]
- Published
- 2002
- Full Text
- View/download PDF
35. Phishing Tests Are Necessary. But They Don't Need to Be Evil.
- Author
-
Wright, Ryan and Thatcher, Jason Bennett
- Subjects
PHISHING ,MANAGEMENT information systems ,INFORMATION resources management ,TEAMS in the workplace - Abstract
When done correctly, phishing test are important part of any cybersecurity program, but companies need to reconsider how to empower employees rather than to disenfranchise them. When security teams foster direct communication lines with employees they protect, they are likely to get a better streetlevel view of how countermeasures, such as phishing tests, impact company culture. Given that phishing tests routinely help cybersecurity professionals spot gaps in defenses and shore them up, how can organizations stop employees from regarding them as unfair, unethical, and unjust?. [Extracted from the article]
- Published
- 2021
36. UPDATE YOUR ASSUMPTIONS: HOW PH.D. STUDENTS CAN ACHIEVE SUCCESS DURING THEIR PH.D. PROGRAM STUDIES IN A BUSINESS FIELD.
- Author
-
Lowry, Paul Benjamin and Thatcher, Jason Bennett
- Subjects
STUDENTS ,PERSONNEL management ,EDUCATORS ,MANAGERIAL economics - Published
- 2020
37. Understanding social networking site (SNS) identity from a dual systems perspective: an investigation of the dark side of SNS use.
- Author
-
Polites, Greta L., Serrano, Christina, Thatcher, Jason Bennett, and Matthews, Kevin
- Abstract
Using a pathological perspective (e.g., addiction), some research suggests that technology engagement leads to poor self-regulation of behaviours. Rather than pathologise predictors of negative outcomes of IT use, we offer an alternative, identity-based explanation to investigate the role of identity in relation to an individual’s perceptions of his/her media use and the potential negative consequences of such use. We build on recent advances in conceptualising IT identity, defined as the extent to which one perceives an IT as central to who he/she is, to explore one’s self-identification with social networking sites (SNS) within a broader nomological net of deficient self-regulation, IS habit, use, and normative pressures. Results of a survey of 214 college students indicate that if an individual has strong self-identification with a particular SNS, it will increase perceptions of poor self-control over his/her time. Our study contributes to the literature by highlighting the utility of an identity-based (vs. pathology-based) explanation for such outcomes, which has distinct implications for interventions aimed at improving these outcomes. We suggest future research to advance understanding of IT identity’s antecedents and consequences, and discuss practical implications for managing SNS use in workplace and academic settings. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
38. Social media listening and Title IX training crisis: Implications for discourse of renewal.
- Author
-
Mazer, Joseph P., Dutchak, Iaroslava, and Thatcher, Jason Bennett
- Subjects
CRISIS communication ,PUBLIC relations ,SOCIAL media ,UNDERGRADUATES ,GRADUATES - Abstract
Courses: Undergraduate or graduate organizational/crisis communication or public relations courses Objective: The goal for this single class activity is for students to apply discourse of renewal to an organizational crisis fueled through social media. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
39. Can Political Skill Enhance Business and IT Knowledge?
- Author
-
Gerow, Jennifer E., Grover, Varun, and Thatcher, Jason Bennett
- Subjects
CHIEF information officers ,INFORMATION technology ,DECISION making in business ,INFLUENCE ,INFORMATION technology projects - Abstract
We examine whether Chief Information Officers’ (CIOs’) political skill enhances their IT and business knowledge as a means of influencing executive teams’ commitment to strategic and operational IT initiatives. We empirically examine these relationships using data collected from 139 CIOs. The results suggest CIOs’ business and IT knowledge is significantly related to influencing executive team commitment to strategic and operational IT initiatives, but political skill only enhances business knowledge for influencing executive team commitment to operational IT initiatives. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
40. Social Media and Emergency Management: Exploring State and Local Tweets.
- Author
-
Carter, Lemuria, Thatcher, Jason Bennett, and Wright, Ryan
- Published
- 2014
- Full Text
- View/download PDF
41. Six types of IT-business strategic alignment: an investigation of the constructs and their measurement.
- Author
-
Gerow, Jennifer E, Thatcher, Jason Bennett, and Grover, Varun
- Abstract
Top management has been concerned with IT-business strategic alignment (hereafter referred to as alignment) for the past 30 years. Consequently, alignment researchers have developed many models to explain how alignment generates value for firms. However, these models use inconsistent definitions and measures of alignment, which has led to conflicting results and has potentially inhibited the progress of research on this critical topic. This paper emphasizes the importance of demarcating the six alignment types that are sometimes confused in the literature into a single, unified model. It also reports on the development of definitions and measures of these six types of alignment including alignment between IT and business strategies (i.e., intellectual alignment), between IT and business infrastructures and processes (i.e., operational alignment), and across these two domains such that strategies are linked with infrastructures and processes (i.e., four types of cross-domain alignment). Analyzing survey data collected from 140 Chief Information Officers, we found each measure possesses desirable psychometric properties. Implications for theory and practice are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
42. Morphometric variability of neuroimaging features in Children with Agenesis of the Corpus Callosum.
- Author
-
Neal, Jason Bennett, Filippi, Christopher G., and Mayeux, Richard
- Subjects
CORPUS callosum abnormalities ,BRAIN imaging ,MORPHOMETRICS ,HUMAN abnormalities ,JUVENILE diseases ,BRAIN abnormalities - Abstract
Background: Agenesis of the corpus callosum (ACC) is a developmental brain malformation associated with a wide spectrum of structural brain abnormalities and genetic loci. To characterize the diverse callosal morphologies and malformations of brain development associated with ACC, we report on the neuroimaging findings of 201 individuals diagnosed with corpus callosal abnormalities. Methods: We searched through medical records of individuals seen at New York Presbyterian Hospital between 2002 and 2013 and thought to have ACC. We confirmed 201 individuals meeting criteria and used magnetic resonance imaging to characterize morphological variants of the corpus callosum and associated brain malformations. Results: The majority of individuals displayed hypoplasia or dysplasia of the corpus callosum (N = 160, 80 %). Forty-one (20 %) displayed complete agenesis of the corpus callosum with other abnormalities, while only 18 (9 %) displayed complete agenesis without associated brain abnormalities. White matter abnormalities were more frequent in hypoplasia or dysplasia group than complete agenesis (28.2 % vs 9.8 %, p < 0.05). In contrast, hippocampal abnormalities, colpocephaly, and Probst bundles were significantly more frequent in complete agenesis compared to hypoplasia or dysplasia group. Conclusions: Collectively, our results underscore the broad diversity of morphological variants of the corpus callosum and associated brain abnormalities in individuals with ACC. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
43. The role of the work itself.
- Author
-
Thatcher, Jason Bennett, Liu, Yongmei, and Stepina, Lee P.
- Published
- 2002
- Full Text
- View/download PDF
44. Understanding online customers' ties to merchants: the moderating influence of trust on the relationship between switching costs and e-loyalty.
- Author
-
Carter, Michelle, Wright, Ryan, Thatcher, Jason Bennett, and Klein, Richard
- Abstract
Fostering customer loyalty is a key objective for online businesses. Initial transactions with new customers are less profitable than transactions with existing customers, making loyalty an important strategy. Drawing on research examining online customer loyalty (termed e-loyalty), switching costs, and trust, this study provides an empirical test of the relative influence of trust vs switching costs on e-loyalty for e-service providers. We further examine whether trust moderates the relationship between switching costs and e-loyalty. We propose that in the presence of high customer trust, e-service providers should have less need to rely on switching costs as a driver of e-loyalty. We test the hypothesized relationships using data collected from 299 repeat users of online travel services. Our results confirm that trust is a more important predictor of e-loyalty than switching costs. In addition, we find that the impact of switching costs on e-loyalty depends on the level of trust felt by customers. This study extends our understanding of customer loyalty, switching costs, and trust in e-commerce environments and provides practical, theory-driven guidelines to e-businesses seeking to develop customer loyalty programmes. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
45. The Influence of Social Aversion and Institution- Based Trust on Computer Self- Efficacy, Computer Anxiety and Antecedents to IT Use.
- Author
-
Baker, Elizabeth White, Thatcher, Jason Bennett, Gundlach, Michael J., and Harrison McKnight, D.
- Subjects
AVERSION ,PSYCHOLOGICAL stress ,INFORMATION technology ,SOCIAL cognition theory (Communication) ,SELF-efficacy ,COMPUTER science - Abstract
Prior research has shown that proximal states are important mechanisms through which distal states relate to IT usage. In particular, the influence of distal traits tied to social activity has not been incorporated into the nomological network surrounding information technology (IT) use. Addressing this literature gap, the authors develop their research model using Social Cognitive Theory and examine how two distal traits, social aversion (SA) and institution-based trust (TRIT), influence computer self-efficacy (CSE) and other proximal state-like differences related to IT use. The authors' results show that SA and TRIT demonstrated influence on CSE and CA at the general and specific levels of analysis, and that CSE mediates the influence of SA and TRIT on PU and PEOU, yet does not fully mediate the influence of CA on PU and PEOU. The implications of their findings for research and practice are discussed, as well as avenues for future research. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
46. Can we have fun @ work? The role of intrinsic motivation for utilitarian systems.
- Author
-
Gerow, Jennifer E, Ayyagari, Ramakrishna, Thatcher, Jason Bennett, and Roth, Philip L
- Published
- 2013
- Full Text
- View/download PDF
47. The Moderating Effects of Privacy Restrictiveness and Experience on Trusting Beliefs and Habit: An Empirical Test of Intention to Continue Using a Social Networking Website.
- Author
-
Lankton, Nancy K., McKnight, D. Harrison, and Thatcher, Jason Bennett
- Subjects
ONLINE social networks research ,RESEARCH on Internet users ,RIGHT of privacy ,HABIT (Philosophy) ,BELIEF & doubt - Abstract
While some online social networking (OSN) websites, such as Facebook, have reported sustained growth, others, such as Bebo, have not. This study investigates the factors that influence users’ intentions to continue using these websites. We adapt the theory of reasoned action and develop a model depicting how trusting beliefs, habit, attitude, and subjective norm lead to continuance intention. We propose that trusting beliefs and habit will have differential effects depending on the levels of privacy restrictiveness and site experience. An analysis of data collected from Facebook users shows that the effects of trusting beliefs on continuance intention diminish as OSN users become more experienced, yet, do not diminish when users set privacy controls high. The latter finding contradicts theory positing control and trusting beliefs are substitutes. The finding that the trusting belief-continuance intention relationship is not significant when experience is high demonstrates that trusting beliefs and experience interact. We also show that habit is a stronger predictor when users restrict their personal information. However, contrary to predictions, habit shapes intention among users with both high and low experience. These findings explain how habit and trusting beliefs predict continuance intention in the new OSN environment and have both practical and research implications. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
48. The Grass is Always Greener on The Other Side: A Test of Present and Alternative Job Utility on IT Professionals’ Turnover.
- Author
-
Dinger, Michael, Thatcher, Jason Bennett, Stepina, Lee P., and Craig, Kevin
- Subjects
INFORMATION technology ,LABOR turnover ,PERSONNEL management ,PROFESSIONALISM ,UTILITY theory - Abstract
The costs associated with the turnover of information technology (IT) professionals continue to draw the attention of IT managers and researchers. Although a weak labor market has limited the quantity of turnover, organizations’ most skilled IT personnel are still coveted and valuable resources. These IT professionals are also those most equipped to leave their firm and find new work. In order to reduce costs, retain key employees, and manage turnover, managers need to understand the factors that drive quitting behavior. The research model suggests that the utility of present and alternative IT work are key cognitive influences on an IT professional's decision to search for new employment, intention to quit, and, ultimately, turnover. We test the research model using longitudinal data that include actual turnover behavior. The research model explains 44% of the variance in intention to quit and 13% of the variance in actual turnover. After establishing the influence of utility on the quitting process, we conduct additional analyses to identify the elements of present and alternative job utility that are the most salient for IT professionals’ quitting processes. From the additional analyses, we derive specific guidance to practice on the management of IT professionals. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
49. Post-Acceptance Intentions and Behaviors: An Empirical Investigation of Information Technology Use and Innovation.
- Author
-
Carter, Pamela E., Thatcher, Jason Bennett, Chudoba, Katherine M., and Mareit, Kent
- Subjects
INFORMATION technology ,TECHNOLOGICAL innovations ,TECHNOLOGY Acceptance Model ,SOCIAL norms ,SOCIAL factors - Abstract
Due to its extensive use for the study ofinformation technology adoption and use, the Technology Acceptance Model (TAM) serves as an ideal base model for tile study of post-acceptance IT diffusion outcomes. The research presented in this paper incrementally builds on TAM-based research to gain meaningful insights into the potential differences individuals exhibit in three types of diffusion outcomes in a post-acceptance context. The authors model and test the effects ofperceived usefulness and perceived ease of use on inten- (ions to use, intentions to explore, and trying to innovate - IT diffusion outcomes proposed as vital in a post-acceptance context. In addition to TAM predictive variables, the authors investigate how autonomy, a personal control factor and subjective norms, a social factor, influence individuals' intentions toward and behaviors associated with technology use. The findings suggest cognitive intention outcomes are more likely to be influenced by technology-related factors, while behavioral outcomes are more likely to be influenced by social and personal controlfactors in post-acceptance contexts. Implications ofthe studyfor practice and future research are also discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
50. The Role of Trust in Postadoption IT Exploration: An Empirical Examination of Knowledge Management Systems.
- Author
-
Thatcher, Jason Bennett, McKnight, D. Harrison, Baker, Elizabeth White, Arsal, Riza Ergün, and Roberts, Nicholas H.
- Subjects
TRUST ,INFORMATION technology ,KNOWLEDGE management ,INFORMATION resources management ,TECHNOLOGY - Abstract
In this study, we examine trust in information technology's (IT) relationship with postadoption exploration of knowledge management systems (KMS). We introduce and distinguish between trust in IT and trust in IT support staff as object-specific beliefs that influence technology's infusion into organizations. We suggest that these object-specific beliefs’ influence on intention to explore KMS is mediated by behavioral beliefs about IT (e.g., perceived usefulness and perceived ease of use). To test the model, we completed two studies. Study 1 examined users’ perceptions of a knowledge portal. Study 2 examined IT professionals’ perceptions of KMS. Across studies, our analysis suggests that trust in IT exerts direct effects on behavioral beliefs leading to intentions to explore KMS. Further, when compared to trust in IT support, we found that trust in IT played a more central role in shaping behavioral beliefs leading to exploration of IT. Implications for research and practice are offered. [ABSTRACT FROM PUBLISHER]
- Published
- 2011
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.