42 results on '"Jason Bennett"'
Search Results
2. How Doxing on Social Media Leads to Social Stigma and Perceived Dignity.
3. Bad Client Feedback on Digital Labor Platforms: How Freelancers Navigate the Peril Posed by Negative Reviews on Upwork.
4. Investigating the Relative Impact of Generative AI vs. Humans on Voluntary Knowledge Contributions.
5. Unraveling the Dilemma of Stigma Disclosure: The Implications of Social Media and Stigma Discovery on Hiring.
6. Designing a User-Metaverse Interface for the Industrial-Metaverse.
7. Doxing and Doxees: A Qualitative Analysis of Victim Experiences and Responses.
8. 'Jane sent me this Article, so IT Must be True!' - How Tie strength and Emotional tone Influence Information Behavior.
9. How Does Anonymizing Crowdsourced Users' Identity Affect Fact-checking on Social Media Platforms? A Regression Discontinuity Analysis.
10. You Cheered for Your Favorite Teams: Does it Get You Hired or Penalized?
11. The Training Paradox of IT Professionals - Who Leaves, Who Stays?
12. Conceptualizing Fluid Team Membership and Its Effects in IT Projects: A Preliminary Model.
13. A Taxonomy of Software Delivery Performance Profiles: Investigating the Effects of DevOps Practices.
14. A Text-Analytic Approach to Deciphering the Roles of Users in Contributing to Collective Storytelling in Social Media.
15. Deploying Machine Learning Models for Public Policy: A Framework.
16. Discovery of rare causal knowledge from financial statement summaries.
17. A Control-Alignment Model for Product Orientation in DevOps Teams-A Multinational Case Study.
18. Motivation in IT Projects: Investigating the Effect of Agile Practices on Team Members' Intrinsic Motivation.
19. Social Media and Emergency Management: Exploring State and Local Tweets.
20. The Dark Internet: Without Darkness There is No Light.
21. Power, Politics, and Knowledge: Influencing Executive Teams.
22. Examining the influence of cultural values on the post-adoptive use of knowledge management systems.
23. Contextual Factors in Post-adoption: Applying the Model of Proactive Work Behavior to the Study of End-User innovation.
24. The role of the work itself: an empirical examination of intrinsic motivation's influence on IT workers attitudes and intentions.
25. Extending Ecommerce Deception Theory to Phishing.
26. The Same, Yet Different: Using Hedonic Systems in Utilitarian Settings.
27. Information Technology Worker Turnover: An Integrative Model and Empirical Test.
28. Towards Grand Challenges in Computing Education Across Disciplines.
29. Social Inclusion in a Hyperconnected World.
30. Understanding the Impact of Individual Creativity with Information Technology upon the Deep Usage of IT Systems.
31. Defending against Spear Phishing: Motivating Users through Fear appeal Manipulations.
32. Power and Politics: Do CIOs Have What It Takes to Influence the Executive Team's Commitment to IT Initiatives?
33. Coping with interruptions in Computer-Mediated Environments: the Role of Computer Experience.
34. Unraveling the 'paradox of the active user': Determinants of individuals' innovation with it-based work routines.
35. Integrating Trust in technology and Computer Self- Efficacy within the Post-Adoption Context: An Empirical Examination.
36. Old Wine in New Bottles: Investigating how Information Technology is Enabling 'Old Criminals' to access 'New Venues'.
37. Do We Trust the Technology? People? or Both? Ruminations on Technology Trust.
38. Is Intrinsic Motivation as Important in Utilitarian Systems as It Is in Hedonic Systems? A Preliminary Meta-Analysis.
39. Impact of the Journey: IS Employee Attitudes and Perceptions as Organizations Climb the CMM Ladder.
40. Individual and Human-Assisted Computer Self Efficacy: An Empirical Examination.
41. Tying Context to Post-Adoption Behavior with Information Technology: A Conceptual and Operational Definition of Mindfulness.
42. The Pier.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.