Jens Mattke

ORCID: 0000-0003-3857-2488
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital Marketing and Social Media
  • Technology Adoption and User Behaviour
  • Qualitative Comparative Analysis Research
  • Blockchain Technology Applications and Security
  • Technostress in Professional Settings
  • Innovation and Knowledge Management
  • Innovation Diffusion and Forecasting
  • Behavioral Health and Interventions
  • AI in Service Interactions
  • Educational Games and Gamification
  • Job Satisfaction and Organizational Behavior
  • Management and Organizational Studies
  • Privacy, Security, and Data Protection
  • Human Mobility and Location-Based Analysis
  • Crime, Illicit Activities, and Governance
  • Transportation and Mobility Innovations
  • Artificial Intelligence in Healthcare and Education
  • Personality Traits and Psychology
  • Digital Platforms and Economics
  • Psychology of Development and Education
  • Cultural Differences and Values
  • Market Dynamics and Volatility
  • Consumer Market Behavior and Pricing
  • Consumer Behavior in Brand Consumption and Identification
  • Social and Intergroup Psychology

University of Bamberg
2017-2024

AID Atlanta
2022

Qualitative comparative analysis (QCA) allows researchers to study how configurations of conditions lead outcomes and, thereby, richly explain the dynamics complex digital phenomena. To advance discussion on QCA in information systems (IS) discipline, we introduce its fundamental concepts and offer guidelines for authors apply IS research. We also provide checklists reviewers papers. illustrate our through two exemplar studies. In first study, focus IT-business strategic alignment influence...

10.17705/1cais.05008 article EN Communications of the Association for Information Systems 2022-01-01

10.1080/0960085x.2020.1787109 article EN European Journal of Information Systems 2020-07-14

The MediLedger Project has built a blockchain ecosystem application that prevents counterfeit pharmaceuticals from entering the U.S. supply chain. From lessons learned, we make four recommendations: 1) use “benevolent dictator” and base governance on “consensus through collaboration”; 2) store verification of transactions, not transactions themselves, blockchain; 3) zero-knowledge proofs to verify product transaction authenticity while preserving full privacy; 4) capabilities found in...

10.17705/2msqe.00019 article EN MIS Quarterly Executive 2019-12-01

Understanding how technostressors lead to technostrain, such as high job burnout or low performance, has become a core question in information systems (IS) research and practice. To unpack this relationship, we build on general theory argue that the next step for technostress is go beyond examining independent influences of discuss their interdependencies technostrain. illustrate our argument empirically, use fuzzy-set qualitative comparative analysis (fsQCA) identify four configurations...

10.25300/misq/2023/16978 article EN cc-by MIS Quarterly 2024-06-01

Integrating artificial intelligence (AI) into existing work routines involves invasive changes, and the resulting user resistance can lead to project failure. We describe a failed AI at large hospital implement cognitive agent identify root causes of that led Based on lessons learned, we provide recommendations for addressing three types AI-automation, decision support engagement.

10.17705/2msqe.00038 article EN MIS Quarterly Executive 2020-12-01

Abstract Some information systems research has considered that individual personality traits influence whether users feel stressed by and communication technologies. Personality suggests, however, do not act individually, but interact interdependently to constitute a profile guides perceptions behavior. The study relies on the differential exposure-reactivity model investigate which profiles of Big Five predispose perceive techno-stressors. Using questionnaire, data was collected from 221...

10.1007/s12599-020-00668-7 article EN cc-by Business & Information Systems Engineering 2020-11-17

Post-acceptance IS use is the key to leveraging value from investments. However, it also poses many demands on user. Drawing challenge-hindrance stressor framework, this study develops a theory explain how and why stressors influence post-acceptance use. We identify two different types of stressors: challenge hindrance stressors. hypothesize that they are appraised through appraisal appraisal, respectively, which routine innovative evaluate our hypotheses by surveying 178 users working in...

10.17705/1jais.00709 article EN Journal of the Association for Information Systems 2021-01-01

Recent statistics indicate that most organizations prefer to fill IT vacancies by rehiring professionals who previously worked in the organization. Less is known about what drives “turnback,” a term we define as returning employment with former employer. To explain this important and rarely considered job mobility behavior, build on embeddedness theory concepts of shocks dissatisfaction from, among others, unfolding model voluntary turnover develop professional turnback. We perform fuzzy-set...

10.25300/misq/2021/16033 article EN MIS Quarterly 2021-10-14

According to industry reports, the lack of trust in non-human interaction prevents widespread Chatbot acceptance. Since willingness and ability varies between individuals, this study examines what extent Chatbots accordingly different personality profiles. Drawing on HEXACO dimensions personality, we apply a latent profile analysis identify three distinct profiles, which significantly vary their Chatbots. A high level Chatbots, e.g. Alexa, is mainly affected by two Extraversion Agreeableness...

10.1145/3322385.3322392 article EN 2019-06-12

Gamification is one specific way to increase mobile app users' brand loyalty. We propose that the frequency with which uses immersion-, achievement- and social-related features relates To provide empirical evidence for this proposal, we obtained quantitative data from surveying 243 users on application Duolingo conducted a fuzzy-set qualitative comparative analysis (fsQCA). found need frequently use immersion- achievement-related result in high On contrary, who infrequently at least two...

10.17705/1thci.00142 article EN AIS Transactions on Human-Computer Interaction 2021-03-31

This paper examines how companies can use paid media (referring to sponsored posts), owned (company posts) and earned (influencer post) create a positive brand attitude. Based on the advertising value model, this takes configurational approach uses fuzzy set qualitative comparative analysis (fsQCA). The reveals typology of five types media, which influence consumers' attitude positively. We contribute research by providing paid, guide

10.24251/hicss.2019.098 article EN cc-by-nc-nd Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences 2019-01-01

Cryptocurrencies, such as Bitcoin, Ethereum or Ripple, are discussed a new form of money. Typically, money fulfills three core functions: 1) medium exchange, 2) store value, and 3) unit account. To examine whether individuals consider cryptocurrencies money, we conduct studies. Study 1 (N=57) provides valid reliable measurement items for the functions 2 (N=95) shows that general perception about fulfillment is rather positive cryptocurrencies. The results from 3 (N=99) furthermore reveal...

10.1145/3378539.3393859 article EN 2020-06-07

Purpose Individuals only click on a very small fraction of the in-app advertisements (ads) they are exposed to. Despite this fact, organizations spend generously placing ads without theoretical knowledge how structure and semantics influence individuals’ clicking behavior. This study aims to identify processing structural semantic factors leads Design/methodology/approach Based limited capacity theory, paper proposes that sequential To mirror process, applies process-oriented configurational...

10.1108/ejm-03-2020-0210 article EN European Journal of Marketing 2021-04-08

Tracking and tracing (TnT) in supply chains (SCs) is often mentioned as a very promising area of application for blockchains. At the same time, there also much reticence even disillusionment practice. In this context, we present literature meta-review discuss advantages disadvantages using blockchains SCs. We find that public permissionless offer new functionalities (e.g. pseudonymity), which however are not desired. Moreover, blockchain loses value context SCs because physical level (goods)...

10.24251/hicss.2021.678 article EN cc-by-nc-nd Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences 2021-01-01

Online multiplayer computer game competitions—so-called esports—attract millions of spectators around the world and show spectator numbers comparable to Super Bowl. Despite that, publishers, which often organize these large-scale competitions, still struggle establish esports as a profitable business venture. One way they can do so involves how position fee-based streaming services for watching online. To draw their services, organizers need focus on attracting with high willingness pay...

10.17705/1cais.05011 article EN Communications of the Association for Information Systems 2022-01-01

Some individuals actively avoid social media advertising, for instance by scrolling over ads or ignoring ads. Therefore, this research aims to identify distinct profiles of avoiding advertising. We build upon the advertising avoidance model and take a person-centered approach, using latent profile analysis different individuals, who identified three differing in their perception level avoidance: unconcerned users, playful users goal-oriented users. contribute characterizing SMA, so that...

10.1145/3209626.3209705 article EN 2018-06-13
Coming Soon ...