2023 | Information Systems Research | Citations: 0
Authors: Yang, Yi; Zhang, Kunpeng; Fan, Yangyang
Abstract: Topic modeling methods such as latent Dirichlet allocation (LDA) are powerful to ... Expand
Topics: online review open source user-generated content Wikipedia accounting
Methods: topic model deep learning machine learning BERT data transformation
2023 | International Journal of Information Management | Citations: 0
Authors: Yang, Zaoli; Chang, Jinping; Huang, Lucheng; Mardani, Abbas
Abstract: The digital transformation of enterprises has become an inevitable development t ... Expand
Topics: digital transformation cloud computing IT strategic planning decision making smart manufacturing
Methods: computational algorithm expert evaluation design science theoretical contribution synthesis
Theories: fuzzy set theory
2023 | HICSS | Citations: 0
Authors: Yasuoka, M.
Abstract: Along with the progress of digitalization, it becomes essential for everyone to ... Expand
Topics: information system use digital divide mobile application technology adoption digital signature
Methods: cross sectional research survey qualitative interview literature study mixed method
2023 | European Journal of Information Systems | Citations: 0
Authors: Yazdanmehr, Adel; Li, Yuan; Wang, Jingguo
Abstract: Past research suggests that the demands of information security policies (ISPs) ... Expand
Topics: problem solving self efficacy data security security policy technostress
Methods: survey chi squared test SEM tool data transformation structural equation modeling
Theories: organizational behavior theory
2023 | Information Systems Journal | Citations: 1
Authors: Yazdanmehr, Adel; Li, Yuan; Wang, Jingguo
Abstract: Studies on employee responses to the information security policy (ISP) demands t ... Expand
Topics: self efficacy security policy data security problem solving internet technology
Methods: survey descriptive statistic partial least squares regression survey design factor analysis
Theories: technology threat avoidance theory
2023 | European Journal of Information Systems | Citations: 0
Authors: Yazdanmehr, Adel; Wang, Jingguo
Abstract: Peers may help others avoid violating organisational information security polici ... Expand
Topics: data security password social capital workstation team productivity
Methods: survey SEM tool expert panel theoretical contribution factor analysis
Theories: motivation theory
2023 | International Conference on Information Systems | Citations: 0
Authors: Ye, Kai; Koh, Tat Koon
Abstract: Problem specification is a key aspect in crowdsourcing contests through which s ... Expand
Topics: crowdsourcing web page self efficacy task characteristic web crawling
Methods: theory development experimental group longitudinal research natural experiment event study
2023 | Electronic Markets | Citations: 0
Authors: Ye, Qing; Wu, Hong
Abstract: Only the online-to-offline process has been explored, the literature is largely ... Expand
Topics: service quality data quality internet technology healthcare data electronic health
Methods: regression analysis method robustness check descriptive statistic cross sectional research statistical hypothesis test
Theories: information integration theory
2023 | International Conference on Information Systems | Citations: 0
Authors: Ye, Xingchen; LI, Andy Tao; Li, Ting
Abstract: Although displaying local popularity is wildly adopted by major platforms, the ... Expand
Topics: participatory design mobile application marketing management data breach privacy
Methods: design methodology field experiment experiment experimental group robustness check
2023 | European Conference On Information Systems | Citations: 0
Authors: Yeh, Yi-Ting; Eden, Rebekah; Fielt, Erwin; Syed, Rehan; Donovan, Raelene; Eley, Robert; Staib, Andrew
Abstract: Big Data Analytics (BDA) has attracted significant attention from healthcare or ... Expand
Topics: information technology capability organizational value data quality information system use value creation
Methods: qualitative interview case study qualitative coding single case study conceptual modelling
Theories: theory of affordance