1,059 research outputs found
Want-To vs. Have-To Socializations in Social Network Sites: Fear of Isolation, Jealousy, and Tie Strengths
As social network sites (SNS) expand the boundaries of one’s social life, we often observe encounters between two different types of motivations for socialization - I want-to socialize vs. I have-to socialize. SNS at present are considered commodities. People do not always start using SNS because they want to, but often because everyone else is using it; people do not wish to be isolated from social circles. This study aims to examine different types of user motivations in SNS and observe how these lead to actual socialization behaviours with different progress dynamics. We apply constraint- and dedication- based relationship framework to distinguish motivations and identify constructs for each motivation. We plan to collect data from one of the major SNS to validate how their socialization intentions are differently realized into actual behaviours. We develop a two-staged research model and this research-in-progress presents the result of the pilot study conducted for the first stage. We also discuss how the second stage of the study will be executed, and how it will benefit the related literature when the project is successfully completed
Gene Synthesis from Oligonucleotide Mixtures by Solid Phase PCR and Assembly PCR in a Microfluidic Chip System.
The conventional gene synthesis methods, chemical or PCR, usually require over 2 weeks because of the separate executions of the different procedures. An integrated microfluidic chip system was designed to reduce this processing time to only 2 days with much less reaction volumes, and experimental reagent and solvent requirements. This fast high throughput gene synthesis method considerably minimizes contamination and simplifies material handling procedures. Our overall aim in this project is using the above-mentioned advantages of this system to synthesize long genes of arbitrary sequence with high purity, and cut the lead times and cost per base from the current values by at least one order of magnitude. In order to do this, four different steps are included in the microfluidic chip system: oligonucleotide synthesis and amplification on solid phase, on-chip purification, long DNA assembly, and gene transformation. The designed oligonucleotides to form the long DNAs were synthesized via light-directed phosphoramidite chemistry, and amplified on solid phase. The amplified products were treated by on-surface hybridization using complementary probes to make single strands and purification. The purified oligonucleotides were assembled into long DNAs on chip, and amplified with polymerase chain reaction in a separate microfluidic chip chamber. Finally, the synthetic target gene was transformed on a chip for gene expression. Our results showed these individual steps in bringing the system capability to a simultaneous production level of tens of double stranded oligonucleotides of lengths ranging from 0.2 to 1.2 kb and the potential of microfluidic gene and protein synthesis system.Ph.D.Biomedical EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/75828/1/woonghl_1.pd
Examining Information Systems Infusion over the Routinization
Information systems (IS) infusion becomes important from the management perspective because organizations can leverage IS investment only at the IS infusion stage. The model for the stages of IS implementation explains that IS infusion can be achieved through IS routinization. This study examined how to achieve IS infusion through routinization based on application of the psychological empowerment theory and the unified theory of acceptance and use of technology (UTAUT), respectively. This study adds value to the IS literature by explaining how IS routinization leads to IS infusion and how their antecedents are different and related across the two stages. This study also provides guidance on how organizations can promote IS infusion beyond IS routinization, which then helps organizations leverage their IS investments
Exploring the Critical Success Factors for Customer Relationship Management and Electronic Customer Relationship Management Systems
Both customer relationship management (CRM) and electronic customer relationship management (eCRM) systems have unique characteristics that support customer-business interactions and are linked to internal business processes and systems across different areas for operational and analytical purposes. Such characteristics may imply that different critical success factors are required for both to be successfully implemented. This exploratory study identifies the factors and the interrelationships associated with the success of CRM and eCRM, compares the differences between CRM and eCRM, and discusses the reasons of the differences. Since there are only a few cases of CRM or eCRM systems fully implemented across marketing, technology, people, and business processes, an exploratory multiple-case study is conducted. The current status of CRM research and future research direction are discussed
INVESTGATING THE INTENTION OF PURCHASING DIGITAL ITEMS IN VIRTUAL COMMUNITIES
Most virtual community (VC) providers lack profitable business models. The challenge for VC providers is to generate and increase revenue from sources other than advertising. The sale of digital items (e.g., avatar) to VC members is a recent revenue generation method. This study examines how VC members decide to purchase digital items from the customer value perspective. Based on customer value theory, this study identifies six factors over three dimensions of customer value and examines their effects on VC members’ intention of purchasing digital items. Our finding suggests that the effect of value on members’ purchase intentions is significant in the functional (i.e., quality of digital items), social (i.e., social self-image), and emotional (i.e., playfulness) value dimensions. This study provides important implications for practitioners to understand how they can foster an ideal environment for customers to perceive more value in their digital items so that it would be more compelling to make purchases in a VC
A TEXT MINING APPROACH TO THE ANALYSIS OF INFORMATION SECURITY AWARENESS: KOREA, UNITED STATES, AND CHINA
Recently in Korea, the importance of information security awareness has been receiving a growing attention. Attacks such as social engineering and ransomware are hard to prevent because it cannot be solved by information security technology. Also, the profitability of information security industry has been decreasing for years. Because of this, many companies try to find a new growth-engine and an entry to the foreign market. The main purpose of this paper is to draw out some information security issues that people of each country think and to analyze it. Finally, this study identifies issues and suggests how to improve the situation in Korea. For this, Topic Modeling analysis has been used to find information security issues of each country. Moreover, the score of sentiment analysis has been used to compare each country. The study contributes to the literature by exploring and explaining what critical issues are and how to improve the situation based on the identified issues of the Korean information security industry. Also, this study adds to the literature by demonstrating how text mining can be applied to the context of information security awareness. From a pragmatic perspective, the study has the implications for information security enterprises. This study is expected to provide a new and realistic method of analyzing domestic and foreign issues using the analyzing real data of the Twitter API
A User Commitment Approach to Information Systems Infusion
Many organizations have huge investments on information systems (IS) but are unable to achieve the maximum benefits expected. The IS infusion stage refers to the state of using IS to its full potential. IS infusion is a form of organizational citizenship behavior because full utilization of IS requires extra-role behaviors (i.e., IS use beyond the mandated usage) beyond intra-role behaviors (i.e., mandated IS usage). As commitment is a key driver of organizational citizenship behavior, IS infusion requires the user’s commitment to IS usage. This study investigates the development of user commitment from the socio-technical system design perspective and the effect of user commitment on IS infusion. We identified five constructs from the socio-technical system design (job fit, task competence, technology competence, self-determination with technology, and self-determination with task). A survey of 236 enterprise system users showed that user commitment has a positive effect on IS infusion. User commitment, in turn, is influenced by job fit, technology competence, and self-determination with task. This study contributes to IS infusion research by introducing the development of user commitment from the socio-technical system design perspective. Managers can promote user commitment in order to reach the infusion stage of fully utilizing information systems
- …