Within the last year
Within the past 3 years
1 - 9 of 9 articles
No abstract available.
Given that information technology (IT) security has emerged as an important issue in the last few years, the subject of security information sharing among firms, as a tool to minimize security breaches, has gained the interest of practitioners and academics. To promote the disclosure and sharing...
The synergistic relationship between Information Systems Research and the Information Systems Society is an important element of the information systems academic community. A call is made for members of the community to strengthen this relationship. Further, the efforts of the “founding”...
Research on group behavior has identified social loafing, i.e., the tendency of members to do less than their potential, as a particularly serious problem plaguing groups. Social Impact Theory (SIT) helps explain social loafing in terms of two theoretical dimensions—the dilution effect (where...
This paper offers a systematic exploration of reputation mechanism design in trading environments with opportunistic sellers of commonly known cost and ability parameters, imperfect monitoring of a seller's actions, and two possible seller effort levels, one of which has no value to buyers. The...
Growth of Web-based applications has drawn a great number of diverse stakeholders and specialists into the information systems development (ISD) practice. Marketing, strategy, and graphic design professionals have joined technical developers, business managers, and users in the development of...
Many auctions involve selling several distinct items simultaneously, where bidders can bid on the whole or any part of the lot. Such auctions are referred to as combinatorial auctions. Examples of such auctions include truck delivery routes, industrial procurement, and FCC spectrum. Determining...
We consider a new variety of sequential information gathering problems that are applicable for Web-based applications in which data provided as input may be distorted by the system user, such as an applicant for a credit card. We propose two methods to compensate for input distortion. The first...
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.