Search Results - "Dinger, Michael"
-
1
Training to Mitigate Phishing Attacks Using Mindfulness Techniques
Published in Journal of management information systems (03-04-2017)“…Phishing attacks are at a record high and are causing billions of dollars in losses. To mitigate phishing's impact, organizations often use rule-based training…”
Get full text
Journal Article -
2
Absorptive Capacity and Information Systems Research: Review, Synthesis, and Directions for Future Research
Published in MIS quarterly (2012)“…Absorptive capacity is a firm's ability to identify, assimilate, transform, and apply valuable external knowledge. It is considered an imperative for business…”
Get full text
Journal Article -
3
Virtual customer environment design and organizational innovation: An exploration-exploitation perspective
Published in Journal of organizational computing and electronic commerce (02-01-2018)“…Many firms are developing virtual customer environments (VCEs) that provide customers the opportunity to submit, discuss, and vote for new ideas. Some studies…”
Get full text
Journal Article -
4
The Impact of Virtual Customer Community Interactivity on Organizational Innovation: An Absorptive Capacity Perspective
Published in IEEE transactions on professional communication (01-06-2016)“…Research problem: Organizations are increasingly investing in virtual customer communities that reduce communication barriers between organizations and…”
Get full text
Journal Article -
5
Influence techniques in phishing attacks: an examination of vulnerability and resistance
Published in Information systems research (01-06-2014)“…Phishing is a major threat to individuals and organizations. Along with billions of dollars lost annually, phishing attacks have led to significant data…”
Get full text
Journal Article -
6
Affect and information technology use: the impact of state affect on cognitions and IT use
Published in Internet research (19-03-2024)“…PurposeThis paper investigates the dynamics between state affect and trusting cognitive beliefs on post-adoptive information technology (IT) use behaviors in…”
Get full text
Journal Article -
7
Workgroup Embeddedness and Professionalism among IT Professionals: Impacts on Work-Life Conflict and Organizational Citizenship
Published in Journal of the Association for Information Systems (01-01-2022)“…Over the course of their careers, IT professionals become embedded in their workplace. In the organizational behavior literature, research has found that job…”
Get full text
Journal Article -
8
Electronic medical record system avoidance in a turbulent environment
Published in Information & management (01-07-2016)“…•We study the antecedents of physicians’ avoidance of electronic medical record (EMR) systems.•Our study is set in the context of the United States military's…”
Get full text
Journal Article -
9
Does Professionalism Matter in the IT Workforce? An Empirical Examination of IT Professionals
Published in Journal of the Association for Information Systems (01-04-2015)“…This paper investigates the role of professionalism in the information technology (IT) workforce. We develop a model that describes how professionalism relates…”
Get full text
Journal Article -
10
Towards an Embeddedness View of IT Professionals: An Agenda for the Next-Generation Global IT Workforce
Published in Journal of global information technology management : JGITM (03-07-2023)Get full text
Journal Article -
11
A Great Escape: The Effect of Negative Public Affiliation on Belongingness in Virtual Communities
Published in Communications of the Association for Information Systems (2020)“…In this study, we study negative public affiliation, which we define as discomfort with being publicly linked to a potentially socially stigmatized group or…”
Get full text
Journal Article -
12
Research Note-Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance
Published in Information systems research (01-06-2014)“…Phishing is a major threat to individuals and organizations. Along with billions of dollars lost annually, phishing attacks have led to significant data…”
Get full text
Journal Article -
13
The Grass is Always Greener on The Other Side: A Test of Present and Alternative Job Utility on IT Professionals' Turnover
Published in IEEE transactions on engineering management (01-08-2012)“…The costs associated with the turnover of information technology (IT) professionals continue to draw the attention of IT managers and researchers. Although a…”
Get full text
Journal Article -
14
Information Technology Worker Recruitment: An Empirical Examination of Entry-Level IT Job Seekers’ Labor Market
Published in Communications of the Association for Information Systems (2012)“…This paper investigates two actors in IT recruitment: IT job seekers and IT employers. Signaling theory and image theory inform this research. Signaling theory…”
Get full text
Journal Article -
15
A Study of Work-Family Conflict Among IT Professionals: Job Characteristics, Individual Values, and Management Practices
Published in Journal of organizational computing and electronic commerce (01-01-2010)“…In this study, we develop a model that explains the work-family conflict experienced by IT professionals. We propose two major sources of work-family conflict:…”
Get full text
Journal Article -
16
Understanding the role of embeddedness in shaping I.T. professional behavior
Published 01-01-2011“…This dissertation studies how information technology (IT) professionals become embedded and, in turn, how embeddedness influences organizational behaviors…”
Get full text
Dissertation -
17
Understanding the role of embeddedness in shaping I.T. professional behavior
Get full text
Dissertation