Confirmatory Influence of Trust in E-commerce: A Data Collection Bias and Suggestion (open access)

Confirmatory Influence of Trust in E-commerce: A Data Collection Bias and Suggestion

Article explores the importance of investigating the impact of trust on intention to purchase from both successful and unsuccessful purchase cases in order to provide a more balanced view of the critical role of trust in e-commerce transaction decisions.
Date: January 7, 2020
Creator: Kim, Dan J. & Ogbanufe, Obi
System: The UNT Digital Library
Introduction to the Minitrack on Artificial Intelligence and Big Data Analytics Management, Governance, and Compliance (open access)

Introduction to the Minitrack on Artificial Intelligence and Big Data Analytics Management, Governance, and Compliance

This article is an introduction to the Minitrack on Artificial Intelligence and Big Data Analytics Management, Governance, and Compliance at the 53rd Hawaii International Conference on System Sciences.
Date: January 7, 2020
Creator: Sidorova, Anna; Saltz, Jeffrey & Goul, Michael
System: The UNT Digital Library
An Investigation of Predictors of Information Diffusion in Social Media: Evidence from Sentiment Mining of Twitter Messages (open access)

An Investigation of Predictors of Information Diffusion in Social Media: Evidence from Sentiment Mining of Twitter Messages

Article is a study examining how emotional arousal influences information diffusion in social media using a sentiment mining approach. The authors propose a research model and test it using data collected from Twitter.
Date: January 7, 2020
Creator: Kim, Dan J. & Salehan, Mohammad
System: The UNT Digital Library
Vice or Virtue? Exploring the Dichotomy of an Offensive Security Engineer and Government “Hack Back” Policies (open access)

Vice or Virtue? Exploring the Dichotomy of an Offensive Security Engineer and Government “Hack Back” Policies

This article uses the virtue (ethics) theory and cyber attribution to argue that there exists a dichotomy among offensive security engineers, one that appreciates organizational security practices, but at the same time violates ethics in how to retaliate against a malicious attacker.
Date: January 7, 2020
Creator: Parrish, James L.; Withers, Kim L.; Smith, James N. & Ellis, Timothy J.
System: The UNT Digital Library