224 research outputs found
Political brand transgression: An expanded stimuli-organism-response (SOR) framework perspective
This study examines political brand transgression (BT) using the Stimuli-Organism-Response (SOR) framework. It explores how voters and opponents perceive political BT and respond through anti-brand behaviors. Understanding these dynamics is essential for political entities to manage their brand and sustain voter support. Employing a qualitative case study with netnographic practices, this research analyzes perceived political BT by Taiwan’s Democratic Progressive Party, particularly regarding migration policies and unmet domestic promises. It identifies key stimuli—expectation disconfirmation and relationship norm violations—that trigger perceptions of transgression. The findings highlight core belief misalignments and performance failures as common drivers of political BT, leading to voter disappointment, switching intentions, and opposition-led criticisms, word-of-mouth damage, and efforts to unseat the party. This study extends the SOR framework by outlining the stimuli, process, and outcomes of political BT while identifying factors that moderate post-transgression behavior. Practically, it offers insights for political brand owners on maintaining self-consistency, assessing their governance capabilities, and curbing excessive zeal among supporters. By bridging brand management and political branding, this research provides a novel perspective on how political entities can navigate transgressions and maintain brand integrity, ultimately strengthening electoral resilience
The Development of P2P Lending Platforms: Strategies and Implications
Peer-to-Peer (P2P) lending is part of the broader Fintech revolution that is sweeping across the globe in recent years. Due to its immense potential for generating economic and social benefits, it is gaining plenty of attention from academics and practitioners alike. And yet, our knowledge on how to develop and manage the digital platforms that makes P2P lending possible is limited. To address this knowledge gap, we conducted a case study of Tuodao, one of the leading P2P lending platforms in China. Based on the preliminary data from this ongoing study, we constructed a process model that suggests the process of P2P lending platform development can traverse across three sequential stages. Each of the stages are marked by the employment of a distinct strategy that emphasizes the development of a particular side of the platform, which in turn, leads to a specific platform configuration and its associated developmental outcomes
What drive the successes and adoption of cryptocurrencies?
Since 2008 when Bitcoin was launched, cryptocurrencies (crypto) is increasingly being noticed. Seeing the growth of the crypto-world, different developers have launched their new crypto, possibly motivated by their potential of raising capital or other business opportunities. However, not all crypto can get proliferated. Some cryptos have become valueless gradually after being introduced. To realize the business opportunities brought by launching new cryptos, it is necessary for us to identify the factors that contribute to the success and proliferation of cryptos. In this research-in-progress paper, we presented an ongoing case study based on EOS, a proliferating crypto which has been adopted by different users. We discussed the role and impact of (1) Security, (2) High transaction speed, (3) Low cost and (4) Gamification on how a crypto may be adopted and invested by more users
Revealing stablecoin successes: Lessons from a case study on USDT
Stablecoins, a type of cryptocurrency tethered to real-world currencies, have garnered attention in the cryptocurrency sphere. Despite being designed for price stability, as seen in the 2022 UST case, this is not always guaranteed. To prevent such incidents, understanding the vital factors behind stablecoin\u27s success is crucial. This article examines the case of USDT, a prominent stablecoin. Preliminary findings indicate several internal factors (Early-mover advantages, Price maintenance reserve, Recognition-seeking, Resilience gained through challenges and Choice of multiple blockchains) and external factors (Emergence of the cryptocurrency ecosystem, Regulatory constraints) that drive the success of stablecoin
Deliberation in Mobile Messaging Application: A Case in Hong Kong
Considering the increasing penetration of Internet and mobile technologies, we can foresee that more online debates and political discussions, such as online deliberations, will occur in the future. However, prior research does not illustrate or provide empirical evidence to support steps that that online deliberation should take. To address this gap, we conduct a case study on Project ThunderGo, an online deliberation campaign related to the 2016 Hong Kong Legislative Election. Via analyzing data obtained from their deliberation groups, the relevant news articles, and the election results, we establish a four-stage building, engineering, arriving, and reaching (BEAR) model of online deliberation and provide some practical implications for future deliberation host. The model and implications articulate ICT’s role in addressing complicated and multi-facet social problems
The Internet Architype “Karen” as an Enabler of Consumer Online Brand Defending – A Case Study on Costco Taiwan
The Internet\u27s growth enables consumers to critique brands openly, but these criticisms may be deemed unsubstantiated by others who label these consumers as Karen, signifying them as problematic. Occasionally, consumers may voluntarily defend the brand. These critiques and defenses, part of online reviews, significantly shape the brand\u27s eWOM. Despite the widespread use of the term Karen for problematic consumers, prior research did not clearly show how Karen triggers consumer online brand defending. Our case study on Costco Taiwan indicates that consumer actions prompting online brand defending can be categorized into three groups: (1) Disruption, (2) Critics, and (3) Abuse. Further details on these behaviors and potential responses are provided
When Stablecoin is No Longer Stable - A Case Study on the Failure of TerraUSD
Comparing to other price-volatile cryptocurrencies, stablecoins provide a reliable way to store value and make transactions, and thus are more suitable for daily-life usage and investment risk control. However, there remains a lack of understanding of how stablecoin can gain success. This may lead to the introduction of stablecoins based on uninformed proposals, which may eventually fail. In turn, owners of these stablecoins may suffer from significant financial losses. Using theories of Information Systems and digital startups failures as the theoretical foundation, our study identified four underlying factors (lack of scarcity, lack of fiat reserve backup, decentralization, and failure of value creation) and two triggers (massive selling by major investors and algorithm malfunction) behind the collapse of a stablecoin, based on the case of TerraUSD’s collapse. Our findings provide implications for stablecoins issuers to prioritize maintenance and foster user adoption, thus increasing the likelihood of success of stablecoins
Seizing new possibilities for expanding the scope of Cybersecurity Research in Information Systems
As Cybersecurity continues to have a significant impact on modern society, there is a pressing need for a more comprehensive research agenda in Information Systems (IS). In this study, we conducted a thorough literature review of prominent IS journals to identify gaps in Cybersecurity research practices. Our findings indicate that there is a significant gap between research and practice, particularly in terms of focus on Cybersecurity behavioural factors in the past decade. To address this gap, we recommend that future Cybersecurity research in IS should adopt a broader perspective that incorporates relevant sociotechnical knowledge areas and theories. We provide an example of Cybersecurity research topics that go beyond behavioural aspects and suggest mapping of Cybersecurity sociotechnical research knowledge areas in Information Systems to guide future research efforts. This study highlights the importance of broadening the scope of Cybersecurity research in IS to address the complex Cybersecurity challenges in contemporary practice
Exploring Crowdfunding Campaign Success – A Signaling Theory Perspective
Crowdfunding has emerged as a disruptive financing model that enables individuals to fund ventures directly over the Internet. By bypassing traditional intermediaries, crowdfunding platforms connect project creators with a global audience, propelling the growth of this market. However, not all crowdfunding campaigns meet their funding goals. This study applies signaling theory to identify the strategic communication strategies that motivate backing and drive crowdfunding success. Through examination of 14 most successful Kickstarter campaigns, we explored what signals crowdfunding campaign creator(s) employ and how they influence backers’ motivation. Our findings provide practical guidance for crowdfunding stakeholders on effectively conveying value through targeted signals. By understanding which communication strategies resonate most with backers, crowdfunding campaigns can optimize their approaches to cultivate support. This research contributes important insights for both crowdfunding platform design and project creation by shedding light on the signaling dynamics that improve funding outcomes
- …
