• Log In
  • Skip to main content
  • Skip to primary sidebar

MIS Distinguished Speaker Series

Temple University

You are here: Home / Archives for Sezgin Ayabakan

Sezgin Ayabakan

Dec 6 – Ning Nan to present “From Hidden Order to Hidden Solution: A Coevolutionary Perspective of Digital Competitive Moves”

December 4, 2019 By Sezgin Ayabakan

From Hidden Order to Hidden Solution: A Coevolutionary Perspective of Digital Competitive Moves

by

Ning Nan

Associate Professor
Accounting and Information Systems Division
Sauder School of Business
The University of British Columbia

Friday, December 6

10:30 – 12:00 pm | Speakman 200

Abstact:

Technological advances and hypercompetition almost inevitably drive firms to attempt increasingly complex digital competitive moves (DCMs). Against this backdrop, this study answers a basic question; does DCM complexity add to competitive advantage? We applied the coevolutionary perspective to model DCM complexity as changes in subassemblies of components and links in a DCM. We tested the research model with empirical data on 485 digital competitive moves. We found that high-performing competitive moves leverage changes in digital technologies as their generative foundation while low-performing moves rely largely on traditional strategies such as price cuts. Further, when high-performing competitive moves are deployed in conjunction with a sequence of unexpected moves, a firm tends to obtain superior financial performance. We developed propositions to formalize a few principles for firms to strategically increase the complexity of DCMs to seize fleeting competitive advantages in turbulent business environments.

Tagged With: coevolutionary perspective, digital competitive move, firm strategy

Nov 22 – Ning Su to present “The Emergence of Transactions on Crowdsourcing Platforms: A Cognitive Frame Perspective”

November 20, 2019 By Sezgin Ayabakan

The Emergence of Transactions on Crowdsourcing Platforms: A Cognitive Frame Perspective

by

Ning Su

Ning Su

Associate Professor
General Management, Strategy & Information Systems
Ivey Business School
Western University, Canada

Friday, November 22

10:30 – 12:00 pm | Speakman 200

Abstact:

Crowdsourcing has been rapidly emerging as an important model of organizing in today’s global labor market. Leveraging digital platforms as intermediary, crowdsourcing facilitates market transactions by matching solution seekers’ needs with service suppliers’ skills. This matchmaking process, however, can be complex and challenging in the presence of a multitude and variety of seekers and suppliers with diverse background and knowledge structures. Based on an in-depth qualitative case study of one of the world’s largest crowdsourcing platforms for knowledge-intensive services, especially creative services, and drawing on the concept of cognitive frame, this research unpacks how market transactions emerge on crowdsourcing platforms. The result conceptualizes crowdsourcing as a process of framing contests between potential exchange partners. By designing a portfolio of mechanisms, the digital platform facilitates the representation, negotiation and acceptance of exchange frames between potential partners. Overall, the study develops and elaborates a socially constructed view of market transactions on crowdsourcing platforms.

Tagged With: cognitive frame, crowdsourcing, digital platforms, transactions

Nov 1 – Idris Adjerid to present “Consumer Consent and Firm Targeting after GDPR: The Case of a Large Telecom Provider”

October 25, 2019 By Sezgin Ayabakan

Consumer Consent and Firm Targeting after GDPR: The Case of a Large Telecom Provider

by

 

Idris Adjerid

Associate Professor
Pamplin College of Business
Virginia Tech

Friday, November 1

10:30 – 12:00 pm | Speakman 200

Abstact:

The General Data Protection Regulation (GDRP) represents a dramatic shift in global privacy regulation. In this manuscript, we focus on the impact of GDPR’s enhanced consumer consent requirements that focus on transparent and active elicitation of data allowances. We evaluate the effect of enhanced consent on consumer opt-in behavior and firm targeting after consent is solicited. Utilizing an experiment at a large telecommunications provider with operations in Europe, we find that opt-in for different data types and uses increased once GDPR-compliant consent was elicited. We also find that firm targeting, revenue, and lock-in increased after consumer consent was elicited. Our analysis suggests that these gains to the firm are because of the ability to utilize more targeted marketing campaigns after consumers provide additional data allowances. Our results have significant implications for firms and policymakers and provide insights relevant to the emerging debate on the balance between consumer privacy protection and firms’ collection and use of personal information.

Tagged With: consumer consent, experiment, General Data Protection Regulation, privacy

Oct 11 – D.J. Wu to present “Platform Competition under Network Effects: Piggybacking and Optimal Subsidization”

October 4, 2019 By Sezgin Ayabakan

Platform Competition under Network Effects: Piggybacking and Optimal Subsidization

by

 

D. J. Wu

Ernest Scheller Jr. Chair in Innovation, Entrepreneurship and Commercialization
Professor, Area Coordinator, Information Technology Management
Georgia Institute of Technology
Scheller College of Business

Friday, October 11

10:30 – 12:00 pm | Speakman 200

Abstact:

A repeated challenge in launching a two-sided market platform is how to solve the “chicken-and-egg” problem. The solution often suggested in the literature is subsidizing one side of the market to jumpstart adoption of the platform. In this paper, using a game-theoretic framework, we study piggybacking — importing users from external networks — as a new approach to launching platforms. Our finding suggests that optimal use of the piggybacking strategy depends on the cross-side network effects. First, benchmarked with the case of no piggybacking, we find that the pricing impacts of piggybacking is non-trivial. It may help mitigate or avoid price competition. Second, we show that platform duopoly with piggybacking can become a “game of chicken” or even a prisoner’s dilemma, which implies that platforms are not always better off (sometimes even worse off) with piggybacking. Finally, when piggybacking users are fabricated (e.g., zombies or fake users), the platform strategies differ greatly from the authentic piggybacking case. It also undermines both the competing platform’s profit and the providers’ surpluses. Managerial implications for platform practitioners are also discussed

Tagged With: external networks, game-theoretic framework, piggybacking, platform

Oct 4 – Dennis Galletta to present “Which Phish will Bite? Two Studies of Individual Susceptibility to Phishing”

September 27, 2019 By Sezgin Ayabakan

 

Which Phish will Bite? Two Studies of Individual Susceptibility to Phishing

by


Dennis Galletta

Dennis Galletta

Ben L. Fryrear Faculty Fellow, Professor of Business Administration, Director of the Doctoral Program
University of Pittsburgh
Katz Graduate School of Business

Friday, October 4

10:30 – 12:00 pm | Speakman 200

Abstact:

Phishing, or the practice of sending deceptive electronic communications to acquire private information from victims, results in significant financial losses to individuals and businesses. I will cover two studies in the area of phishing. The first study attempts to identify and test situational and personality factors that might explain why certain individuals are susceptible to such attacks. We employed the Delphi method to identify seven personality factors that may influence this susceptibility (trust, distrust, curiosity, entertainment drive, boredom proneness, lack of focus, and risk propensity). Our regression model included these as well as variables examined in previous studies. We found that emails sent from a known source significantly increase user susceptibility to phishing, as does a user’s curiosity, risk propensity, general Internet usage, and Internet anxiety. In post hoc tests, we also find that trust and distrust can be significant predictors of susceptibility and that this significance is dependent on the characteristics of the message. However, the results are rather weak and do not explain more than 10% of the variance in individuals’ propensity to click on a link in a phishing message. The second study, in process, follows from the weak results of the first study, which approaches the antecedents to clicking on a phishing message in a different manner. We focus on heredity in this study and in our study of twins, preliminary analysis has found that heredity explains over 40% of the variance in the ability of people to discern real websites and emails from fake ones. Our first three phishing attempts largely failed, with a very low propensity of anyone to click (contrary to our first study). We have since expanded our sample, verifying email addresses right at the subject recruiting site, and are currently preparing to phish the subjects over two dozen further times. Discerning the role of heredity might help practitioners understand the need to follow up, rather than simply assuming that all users respond similarly (and immediately) to warnings and training provided to them.

Reference: Moody, G.D., Galletta, D.F. & Dunn, B.K. Eur J Inf Syst (2017) 26: 564. https://doi.org/10.1057/s41303-017-0058-x

Link to the first paper: Click here

Tagged With: click, delphi method, dennis galletta, heredity, phish, phishing attacks

Sep 13 – Siva Viswanathan to present “Designing Promotional Incentives to Embrace Social Sharing: Evidence from Field and Lab Experiments”

September 12, 2019 By Sezgin Ayabakan

Designing Promotional Incentives to Embrace Social Sharing:
Evidence from Field and Lab Experiments

by

Siva Viswanathan

Dean’s Professor of Information Systems and Digital Innovation & Co-Director of DIGITS
University of Maryland
Robert H. Smith School of Business

Friday, September 13

10:30 – 12:00 pm | Speakman 200

Abstact:

Despite the increasing connectivity between customers and the large volume of social shares supported by digital technologies, there is an absence of research systematically investigating how firms can design the promotional incentives that jointly consider their customers as both purchaser and sharer. In this study, we examine whether and how firms can take advantage of customers’ social connections and sharing motives to design novel incentives to engage customers in this social sharing era. In collaboration with a leading online deal platform, we conduct a large-scale randomized field experiment and two lab experiments to test the effectiveness of different incentive designs (varied by shareability and scarcity of promotion codes) in driving social sharing senders’ purchase and referrals. We find that different incentive designs have distinct impacts on senders’ purchases and further successful referrals. Specifically, providing senders with one non-shareable promo code significantly increases their purchase likelihood, but does not influence their referrals. In contrast, the senders who receive one shareable code are less likely to purchase themselves yet are more likely to make successful referrals. Surprisingly, the incentive design with two codes that has one non-shareable code and one shareable code increases neither the senders’ purchase nor their successful referrals. Very interestingly, we estimate that the one non-shareable promo code group derives the highest net revenue for the current experiment period, whereas the one shareable promo code group will derive the highest lifetime value from the new customers the incentive lures in. We further conduct two lab experiments on Amazon Mechanical Turk that replicate the field experiment’s findings and explore the underlying mechanisms of the observed relationships. We find that the exclusivity perception and social motives triggered by one promo code incentive designs mediate and explain their effect on sender’s purchase and successful referrals, respectively. Our study extends prior IS literature on social sharing that has focused on sharing information to the domain of sharing incentives, providing implications to firms on how to design promotional incentive that accommodates the dual role of customers as purchasers and sharers and sheds light on the motives underlying social sharing.

Link to the paper: Click here

Tagged With: Field Experiment, lab experiment, promo code, promotion, promotional incentives, referral, social sharing

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 3
  • Page 4
  • Page 5

Primary Sidebar

RSS MIS News

  • AIS Student Chapter Leadership Conference 2025 April 17, 2025
  • Temple AIS wins at the 2024 AIS Software Innovation Challenge! January 15, 2025
  • 10 Week Summer Internship in CyberSecurity October 7, 2024
  • Volunteer for Cybersecurity Awareness Month October 7, 2024
  • MIS faculty awarded promotions June 17, 2024

Tags

AI amrit tiwana Artificial Intelligence blockchain boston college bots brian butler carnegie mellon univ crowd culture deception Deep Learning Design experiment Field Experiment financial technology georgia state georgia tech Healthcare Human vs AI information security Innovation Institutional Theory IT Outsourcing long tail Machine Learning machines Maryland media Online Communities platform privacy productivity Quasi-natural experiment recommender systems simulation Social Capital social media social network steven johnson technology adoption temple univ user generated content UT Dallas wharton

Archives

Copyright © 2025 Department of Management Information Systems · Fox School of Business · Temple University