Semantic Filter
show all semantic filters
Found 57399 articles
  • sDTM: A Supervised Bayesian Deep Topic Model for Text Analytics

    PDF

    2023 | Information Systems Research | Citations: 0

    Authors: Yang, Yi; Zhang, Kunpeng; Fan, Yangyang

    Abstract: Topic modeling methods such as latent Dirichlet allocation (LDA) are powerful to ... Expand

    Topics: online review open source user-generated content Wikipedia accounting

    Methods: topic model deep learning machine learning BERT data transformation

  • Digital transformation solutions of entrepreneurial SMEs based on an information error-driven T-spherical fuzzy cloud algorithm

    PDF

    2023 | International Journal of Information Management | Citations: 0

    Authors: Yang, Zaoli; Chang, Jinping; Huang, Lucheng; Mardani, Abbas

    Abstract: The digital transformation of enterprises has become an inevitable development t ... Expand

    Topics: digital transformation cloud computing IT strategic planning decision making smart manufacturing

    Methods: computational algorithm expert evaluation design science theoretical contribution synthesis

    Theories: fuzzy set theory

  • Information Technology Adaption by Senior Citizens: Why Seniors Use IT

    2023 | HICSS | Citations: 0

    Authors: Yasuoka, M.

    Abstract: Along with the progress of digitalization, it becomes essential for everyone to ... Expand

    Topics: information system use digital divide mobile application technology adoption digital signature

    Methods: cross sectional research survey qualitative interview literature study mixed method

  • Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies

    PDF

    2023 | European Journal of Information Systems | Citations: 0

    Authors: Yazdanmehr, Adel; Li, Yuan; Wang, Jingguo

    Abstract: Past research suggests that the demands of information security policies (ISPs) ... Expand

    Topics: problem solving self efficacy data security security policy technostress

    Methods: survey chi squared test SEM tool data transformation structural equation modeling

    Theories: organizational behavior theory

  • Employee responses to information security related stress: Coping and violation intention

    PDF

    2023 | Information Systems Journal | Citations: 1

    Authors: Yazdanmehr, Adel; Li, Yuan; Wang, Jingguo

    Abstract: Studies on employee responses to the information security policy (ISP) demands t ... Expand

    Topics: self efficacy security policy data security problem solving internet technology

    Methods: survey descriptive statistic partial least squares regression survey design factor analysis

    Theories: technology threat avoidance theory

  • Can peers help reduce violations of information security policies? The role of peer monitoring

    PDF

    2023 | European Journal of Information Systems | Citations: 0

    Authors: Yazdanmehr, Adel; Wang, Jingguo

    Abstract: Peers may help others avoid violating organisational information security polici ... Expand

    Topics: data security password social capital workstation team productivity

    Methods: survey SEM tool expert panel theoretical contribution factor analysis

    Theories: motivation theory

  • Problem Specification in Crowdsourcing Contests: A Natural Experiment

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Ye, Kai; Koh, Tat Koon

    Abstract: Problem specification is a key aspect in crowdsourcing contests through which s ... Expand

    Topics: crowdsourcing web page self efficacy task characteristic web crawling

    Methods: theory development experimental group longitudinal research natural experiment event study

  • Offline to online: The impacts of offline visit experience on online behaviors and service in an Internet hospital

    PDF

    2023 | Electronic Markets | Citations: 0

    Authors: Ye, Qing; Wu, Hong

    Abstract: Only the online-to-offline process has been explored, the literature is largely ... Expand

    Topics: service quality data quality internet technology healthcare data electronic health

    Methods: regression analysis method robustness check descriptive statistic cross sectional research statistical hypothesis test

    Theories: information integration theory

  • Local Popularity: A Double-edged Tool in Platform Operation

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Ye, Xingchen; LI, Andy Tao; Li, Ting

    Abstract: Although displaying local popularity is wildly adopted by major platforms, the ... Expand

    Topics: participatory design mobile application marketing management data breach privacy

    Methods: design methodology field experiment experiment experimental group robustness check

  • Unveiling the value of big data analytics use: A digital hospital case study

    2023 | European Conference On Information Systems | Citations: 0

    Authors: Yeh, Yi-Ting; Eden, Rebekah; Fielt, Erwin; Syed, Rehan; Donovan, Raelene; Eley, Robert; Staib, Andrew

    Abstract: Big Data Analytics (BDA) has attracted significant attention from healthcare or ... Expand

    Topics: information technology capability organizational value data quality information system use value creation

    Methods: qualitative interview case study qualitative coding single case study conceptual modelling

    Theories: theory of affordance