- E-Government and Public Services
- Local Government Finance and Decentralization
- Digital Platforms and Economics
- Information Technology Governance and Strategy
- ICT Impact and Policies
- Misinformation and Its Impacts
- Public Policy and Administration Research
- Technology Adoption and User Behaviour
- Social Media and Politics
- Crime Patterns and Interventions
- Consumer Market Behavior and Pricing
- Cybercrime and Law Enforcement Studies
- Customer Service Quality and Loyalty
- Information and Cyber Security
- Privacy, Security, and Data Protection
- Spam and Phishing Detection
- Web Applications and Data Management
- Traffic Prediction and Management Techniques
- Aviation Industry Analysis and Trends
- Corporate Finance and Governance
- Political Influence and Corporate Strategies
- Corporate Taxation and Avoidance
- Merger and Competition Analysis
- Innovation and Knowledge Management
- Transport and Economic Policies
University of Wisconsin–Madison
2025
Temple University
2014-2024
London School of Economics and Political Science
2020
University of Houston
2020
Temple College
2018
George Mason University
2012-2014
University of Michigan
2008-2010
Ann Arbor Center for Independent Living
2008-2010
Ross School
2009
What value does information technology (IT) create in governments and how it do so? While business of IT has been extensively studied the systems field, this not case for public value. This is part due to a lack theoretical bases investigating sector. To address issue, we present conceptual model on mechanism by which resources contribute creation public-sector organizations. We propose that relationship between organizational performance mediated capabilities develop delineates paths from...
Mitigating Traffic Congestion: The Role of Intelligent Transportation Systems
A growing number of firms are strategically utilizing information technology and the Internet to provide online services consumers who buy their products. Online differ from traditional because they often promote interactivity among users exhibit positive network effects. While service increases value obtained by consumers, effects known intensify price competition thus may reduce firms' profits. In this paper, we model between two that sell a differentiated product when each firm can offer...
Research Spotlight
This paper examines the information security implications of hospitals participating in health exchanges (HIE). While data threats may increase when join HIEs to share across organizational boundaries, institute “secure exchange” and promote practices among participants. Due these countervailing effects, it is unclear how joining an HIE affects hospitals’ breach risk. study seeks understand from lens governance coordination. We compiled a panel dataset more than 3,000 over six years. By...
Traffic safety poses a persistent challenge for society and public policy. Conventional law enforcement by human police is often cost-ineffective because of information asymmetry negative externalities unsafe driving behaviors. Automated enforcement, in the form traffic cameras on road, has gained prominence recent decades, yet its effectiveness underlying mechanisms remain debated. This study examines impact road using longitudinal data from metropolitan city China. We distinguish between...
This paper explores value creation from government use of information technologies (IT). While the majority studies in systems (IS) discipline have focused on discovering IT business for-profit organizations, performance e
The proliferation of fake news on social media has become a major societal and political problem. Meanwhile, platforms have started to require identity verification from users label the verified with badge, making more responsible for their online behavior. In this study, we empirically investigate two research questions: 1) What is impact users' propensity post news? 2) How does badge moderate verification? Results suggest that while without negative posting news, significantly weakened...
In this study, we model firms that sell a product and complementary online service, where only the latter displays positive network effects. That is, value each consumer derives from service increases with total number of consumers subscribe to service. addition, is valuable who buy product. We consider two pricing strategies: (1) bundle pricing, in which firm charges single price for (2) separate sets prices separately, self-select whether both or show contrast common result bundling...
Social media platforms, such as Facebook, Instagram, and Twitter, are combating the spread of fakennews by developing systems that allow their users to report fake news. However, it remains unclear whether these reporting harness “wisdom crowd” effective. Notably, concerns have been raised popularity videos may hamper users’ The persuasive power render news more deceptive less likely be reported in practice. this is neither theoretically nor empirically straightforward, not only affect...
In this introduction to the special issue, we propose a framework for researching interplay between digital technologies and social justice, which offers unique fruitful opportunity information systems (IS) researchers make contributions theory practice, with meaningful policy impacts. The draws upon prior definitions typologies of previous IS research on studies included in issue. positions as playing key roles revealing, orchestrating, enabling, inhibiting justice. We also theoretical...
Given the recent concern on “big governments” and rising budget deficits in United States European nations, there has been a fundamental economic debate proper boundary role of governments society. Inspired by this debate, we study relationship between information technology (IT) government size. Drawing broad range literature from multiple disciplines such as systems, industrial organization, political sciences, present several theoretical mechanisms that explain impact IT expenditures....
Information technologies (IT) act as an enabler for policy implementation in the U.S. federal government. While agencies increasingly rely on advanced digital to execute new initiatives, many are struggling with maintaining decades old legacy systems. This study investigates how national politics affects IT investment profiles agencies. Drawing a range of literature from political science, public administration, and information systems (IS) disciplines, we hypothesize that agency’s...
Abstract Benchmarking is a critical activity in Web site development and has been employed for requirement analysis variety of renewal projects. By comparing their current with competitors' cutting-edge sites, managers can attain improvement quality. Despite the importance popularity benchmarking, however, literature sheds little light on incorporation its techniques into methodologies. This paper proposes benchmarking-based methodology coupled goal-driven approach. The works through three...
Many information technology (IT) projects in the U.S. federal government have been plagued with failures and overruns recent years, wasting a large amount of tax revenues undermining public’s confidence government’s ability to manage such resources deliver on its commitments. What affects performance IT government? We find that prior literature project management from private sector setting is inadequate answer this question. In addition, best our knowledge, systems (IS) research thus far...
Fake news is increasingly prevalent on social media, and the anonymity of Internet a major enabler. Social media platforms seek to reduce online with identity verification by verifying user identities email addresses, phone numbers, or government-issued photo identification. However, we ask: Is effective in deterring fake news? Using unique dataset (spanning from 2009 2016) large-scale platform, empirically investigate impact creation sharing news. In doing so, exploit an exogenous policy...
Abstract Research Summary We study the effect of firm disruptions on competitor performance in presence shared resources U.S. airline industry. While scholars have investigated both effects industry‐wide and firm‐specific disruptions, little work has examined competitors, who are increasingly reliant interconnected digital age. Results from a series recent information technology (IT) outages indicate that is materially affected by competitor's disruption. disruption full‐service carrier...
Sexual assault is one of the most repellant and costly crimes, which inflicts irrecoverable harms on victims society. This study examines effect IT-enabled ride-sharing platforms sexual assaults. Drawing upon routine activity theory from criminology literature, we posit that can reduce a passenger’s risk being suitable target by providing more reliable timely transportation option for traveling to safer place. By exploiting nationwide quasi-experimental setting Uber’s city-by-city rollouts...
We are witnessing an interesting and unique phenomenon in enterprise information technology (IT) adoption management public-sector organizations: shared IT services. Instead of implementing separate services, governments come together to pool their resources into one single service. In this study, we develop a game-theoretic model analyze the governments’ decision share services understand how introduction transforms strategic interactions between vendor. study three common regimes used...
Many organizations run their core business operations on decades-old legacy IT systems. Some security professionals argue that systems significantly increase risks because they are not designed to address contemporary cybersecurity risks. Others counter the might be "secure by antiquity" and due lack of adequate documentation systems, it is very difficult for potential attackers discover exploit vulnerabilities. There a shortage empirical evidence either argument. Routine activity theory...