75 research outputs found

    A Tale of Two Internet News Platforms-Real vs. Fake: An Elaboration Likelihood Model Perspective

    Get PDF
    This paper presents findings from a field analysis of real vs. fake news propagated on the Internet. Elaboration Likelihood Model (ELM) was used as a theoretical framework to investigate information presentation mechanisms used by real and fake content generators to persuade readers. ELM theorizes two routes through which information can inform attitudinal changes: a central route of high cognitive effort, and a peripheral route of low cognitive effort. We hypothesize that fake news sites favor the peripheral route by providing less information overall, and by providing more negative affective cues. Data was gathered from Internet platforms that publish real news and fake news. Results indicate that the amount of information disseminated by fake news platforms is lower than that of reputable platforms. Content analysis reveals that fake news with business impact are typically more negative in their valence compared to real news. Implications of our findings for theory and practice are discussed

    Dynamic Security of Virtualized Systems: An Analysis of Time-based Impact

    Get PDF
    Virtualization technologies pose time-sensitive security challenges that need to be addressed from a dynamic security perspective. Adopting a dynamic security approach can help organizations manage the security risks inherent in virutalized environments. This paper conceptually examines current thought on best practices in information security systems which explains the dynamic nature of virtualized systems and paves the way for an information security model into which virtualization can be incorporated. We suggest that a proper analysis of timebased impact of security threats would help mitigate virtualization security risks, allowing IT security professionals and users to efficiently coordinate security objectives with the larger goals of the organization

    The Use of Text Analytics to Investigate Concepts in Intra- and Inter-disciplinary Software Piracy Research Inter-disciplinary Software Piracy Research

    Get PDF
    IS research has linked collaborators from diverse domains. IS research requires selecting and addressing an appropriate intradisciplinary or interdisciplinary scope. Identifying gaps in the current literature and deciding when and how collaborations among different disciplines may be fruitful poses challenges. We propose a process to analyze a corpus of documents from any topic, to identify potential collaboration areas. A text analytics process is used to find areas of commonality and exclusivity among questions addressed in existing IS work by analyzing abstracts in papers from multiple disciplines studying \u27software piracy.\u27 We use term-term co-occurrence to find all the terms used in close proximity to the topic. We identify which terms are most prominent in each discipline, show quantitatively how these usages coincide or diverge across disciplines, measure the overlap between pairs of disciplines, and identify clusters of terms shared among disciplines. Specific findings from this case of software piracy are presented

    How Does the Authenticity in an Online Review Affect Its Helpfulness? A Decision Tree Induction Theory Development Approach

    Get PDF
    Drawing on multi-dimensionality of authenticity, this study focuses on the role of two distinct authenticities: nominal and expressive. We propose that the type of authenticity in a review will vary based on the reviews’ lexical density (word level) and breadth (sentence level). Using the decision tree induction approach, the main and interaction effects of the dimensions and forms of authenticity are examined for their effect on review helpfulness. The preliminary analysis of 470 reviews demonstrate that the lexical density form of expressive authenticity is a predominant predictor of online review helpfulness. Additionally, the effects of expressive authenticity depth, nominal authenticity breadth and depth on online review helpfulness, vary based on the expressive breadth. The decision tree induction approach provides new theoretical insights that extends the frontiers of authenticity and practical implications on online review helpfulness

    How Does the Authenticity in an Online Review Affect Its Helpfulness? A Decision Tree Induction Theory Development Approach

    Get PDF
    Drawing on multi-dimensionality of authenticity, this study focuses on the role of two distinct authenticities: nominal and expressive. We propose that the type of authenticity in a review will vary based on the reviews’ lexical density (word level) and breadth (sentence level). Using the decision tree induction approach, the main and interaction effects of the dimensions and forms of authenticity are examined for their effect on review helpfulness. The preliminary analysis of 470 reviews demonstrate that the lexical density form of expressive authenticity is a predominant predictor of online review helpfulness. Additionally, the effects of expressive authenticity depth, nominal authenticity breadth and depth on online review helpfulness, vary based on the expressive breadth. The decision tree induction approach provides new theoretical insights that extends the frontiers of authenticity and practical implications on online review helpfulness

    The Use of Text Analytics to Investigate Concepts in Intra- and Inter-disciplinary Software Piracy Research

    Get PDF
    IS research has linked collaborators from diverse domains. IS research requires selecting and addressing an appropriate intradisciplinary or interdisciplinary scope. Identifying gaps in the current literature and deciding when and how collaborations among different disciplines may be fruitful poses challenges. We propose a process to analyze a corpus of documents from any topic, to identify potential collaboration areas. A text analytics process is used to find areas of commonality and exclusivity among questions addressed in existing IS work by analyzing abstracts in papers from multiple disciplines studying \u27software piracy.\u27 We use term-term co-occurrence to find all the terms used in close proximity to the topic. We identify which terms are most prominent in each discipline, show quantitatively how these usages coincide or diverge across disciplines, measure the overlap between pairs of disciplines, and identify clusters of terms shared among disciplines. Specific findings from this case of software piracy are presented
    corecore