Chao-Min Chiu - Academia.edu (original) (raw)
Papers by Chao-Min Chiu
Online Information Review, Aug 12, 2019
Industrial Management and Data Systems, Dec 1, 2004
This study examines motivational factors influencing one's intention to continue using WWW ap... more This study examines motivational factors influencing one's intention to continue using WWW applications. Social cognitive theory is adapted and integrated with expectancy disconfirmation theory and empirical findings from prior studies about continued use of information systems. Research hypotheses derived from this model are empirically validated using the responses to a survey on WWW usage, collected from 235 users. Results suggest that users’ continuance intention is determined by their satisfaction with prior use, internet self‐efficacy, and outcome expectations. Outcome expectation, in turn, is influenced by their satisfaction with prior use and prior perceived confirmation. This study draws attention to the substantial differences between acceptance and continuance. Implications for practice and further research are considered.
Job insecurity is increasingly prevalent among IT/IS employees in the modern workforce because of... more Job insecurity is increasingly prevalent among IT/IS employees in the modern workforce because of the rapid development of IT. This study aims to examine how job insecurity drives IT employees’ strain and presenteeism—an activity that is costly for organizations. We will develop and test a two-dimensional cognitive appraisal model in the context of IT employees. The research model differentiates between types of appraisals, and proposes a technology characteristic-stressor-appraisal-emotion-strain-presenteeism relationship. We propose that job insecurity may be appraised as both a challenge and a threat. Challenge and threat appraisals lead to IT employees’ job strain through positive and negative emotions. In addition, job strain increases IT employees’ presenteeism. We further propose that the pace of IT change leads to job insecurity and their relationship is moderated by IT employees’ resilience. This study will empirically test the model with data collected from 300 IT employees in Taiwa
International Journal of Information Management, 2015
International Journal of Information Management, 2013
ABSTRACT This study aims to investigate users’ subjective well-being and loyalty towards social n... more ABSTRACT This study aims to investigate users’ subjective well-being and loyalty towards social network sites (SNSs). Despite the growing role of network externalities in SNS continuance decisions, the SNS usage literature has paid scant attention to the relationship between network externalities, SNS identification, and users’ subjective well-being. In this study, we identify four components of network externalities: perceived network size, external prestige, compatibility, and complementarity. In the research model, both network size and external prestige are hypothesized positively to affect SNS identification. Perceived compatibility and perceived complementarity are hypothesized positively to affect user satisfaction. Satisfaction and SNS identification are hypothesized positively to affect user subjective well-being and loyalty towards the SNS. Users’ subjective well-being is hypothesized positively to affect their loyalty towards the SNS. Data collected from 615 valid users of Facebook provide strong support for most of these hypotheses. The findings indicate that perceived network size negatively affects users’ SNS identifications. Other components of network externalities have positive effects on SNS identification and satisfaction, which in turn have positive effects on users’ subjective well-being and loyalty towards SNS. Implications for theory and practice and suggestions for future research are also discussed.
Information Systems Journal, 2012
Customer loyalty or repeat purchasing is critical for the survival and success of any store. By f... more Customer loyalty or repeat purchasing is critical for the survival and success of any store. By focusing on online stores, this study investigates the repeat purchase intention of experienced online buyers based on means‐end chain theory and prospect theory. In the research model, both utilitarian value and hedonic value are hypothesised to affect repeat purchase intention positively. Perceived risk is hypothesised to affect repeat purchase intention negatively and moderate the effects of utilitarian and hedonic values on repeat purchase intention. Utilitarian value is proposed as a formative second‐order construct formed by product offerings, product information, monetary savings and convenience. Hedonic value is also proposed as a formative second‐order construct formed by the six hedonic benefits that have been identified in prior research. Data collected from 782 Yahoo!Kimo customers provide strong support for the research model. The results indicate that both the utilitarian va...
Industrial Management & Data Systems, 2004
This study examines motivational factors influencing one's intention to continue using WWW ap... more This study examines motivational factors influencing one's intention to continue using WWW applications. Social cognitive theory is adapted and integrated with expectancy disconfirmation theory and empirical findings from prior studies about continued use of information systems. Research hypotheses derived from this model are empirically validated using the responses to a survey on WWW usage, collected from 235 users. Results suggest that users’ continuance intention is determined by their satisfaction with prior use, internet self‐efficacy, and outcome expectations. Outcome expectation, in turn, is influenced by their satisfaction with prior use and prior perceived confirmation. This study draws attention to the substantial differences between acceptance and continuance. Implications for practice and further research are considered.
In this paper we propose a conceptual architecture that integrates with both third-party applicat... more In this paper we propose a conceptual architecture that integrates with both third-party applications and information systems. We believe that integrating information systems with the Web will go a long way toward making information systems more understandable. We also believe that integrating third-party applications with the Web will lessen the problem that users have to discard applications they use everyday to navigate and publish in the cyberspace.
Pacific Asia Conference on Information Systems, 2010
Information Technology and Management
Our overall research goal is providing hypertext functionality through the WWW to hypertext-unawa... more Our overall research goal is providing hypertext functionality through the WWW to hypertext-unaware information systems with minimal or no changes to the information systems. Information systems dynamically generate their contents and thus require some mapping mechanism to automatically map the generated contents to hypertext constructs (nodes, links, and link markers) instead of hypertext links being hard-coded over static contents. No systematic approach exists, however, for building mapping routines to create useful links that give users direct access to the ISs' primary functionality, give access to metainformation about IS objects, and enable annotation and ad hoc (user-declared) linking. This paper contributes a procedure for analyzing ISs and building mapping routines that supplement information systems with hypertext support. This paper also contributes an eXtensible Markup Language (XML) DTD that declares a set of elements and attributes for representing mapped informat...
Decision Support Systems, 2004
Behaviour & Information Technology, 2004
... Decomposed theory of planned behaviour (DTPB) is adapted from social psychology and integrate... more ... Decomposed theory of planned behaviour (DTPB) is adapted from social psychology and integrated with theoretical and empirical findings from prior information systems (IS) usage research to theorize a model of e-service continuance. ...
Behaviour & Information Technology, 2009
Online Information Review, Aug 12, 2019
Industrial Management and Data Systems, Dec 1, 2004
This study examines motivational factors influencing one's intention to continue using WWW ap... more This study examines motivational factors influencing one's intention to continue using WWW applications. Social cognitive theory is adapted and integrated with expectancy disconfirmation theory and empirical findings from prior studies about continued use of information systems. Research hypotheses derived from this model are empirically validated using the responses to a survey on WWW usage, collected from 235 users. Results suggest that users’ continuance intention is determined by their satisfaction with prior use, internet self‐efficacy, and outcome expectations. Outcome expectation, in turn, is influenced by their satisfaction with prior use and prior perceived confirmation. This study draws attention to the substantial differences between acceptance and continuance. Implications for practice and further research are considered.
Job insecurity is increasingly prevalent among IT/IS employees in the modern workforce because of... more Job insecurity is increasingly prevalent among IT/IS employees in the modern workforce because of the rapid development of IT. This study aims to examine how job insecurity drives IT employees’ strain and presenteeism—an activity that is costly for organizations. We will develop and test a two-dimensional cognitive appraisal model in the context of IT employees. The research model differentiates between types of appraisals, and proposes a technology characteristic-stressor-appraisal-emotion-strain-presenteeism relationship. We propose that job insecurity may be appraised as both a challenge and a threat. Challenge and threat appraisals lead to IT employees’ job strain through positive and negative emotions. In addition, job strain increases IT employees’ presenteeism. We further propose that the pace of IT change leads to job insecurity and their relationship is moderated by IT employees’ resilience. This study will empirically test the model with data collected from 300 IT employees in Taiwa
International Journal of Information Management, 2015
International Journal of Information Management, 2013
ABSTRACT This study aims to investigate users’ subjective well-being and loyalty towards social n... more ABSTRACT This study aims to investigate users’ subjective well-being and loyalty towards social network sites (SNSs). Despite the growing role of network externalities in SNS continuance decisions, the SNS usage literature has paid scant attention to the relationship between network externalities, SNS identification, and users’ subjective well-being. In this study, we identify four components of network externalities: perceived network size, external prestige, compatibility, and complementarity. In the research model, both network size and external prestige are hypothesized positively to affect SNS identification. Perceived compatibility and perceived complementarity are hypothesized positively to affect user satisfaction. Satisfaction and SNS identification are hypothesized positively to affect user subjective well-being and loyalty towards the SNS. Users’ subjective well-being is hypothesized positively to affect their loyalty towards the SNS. Data collected from 615 valid users of Facebook provide strong support for most of these hypotheses. The findings indicate that perceived network size negatively affects users’ SNS identifications. Other components of network externalities have positive effects on SNS identification and satisfaction, which in turn have positive effects on users’ subjective well-being and loyalty towards SNS. Implications for theory and practice and suggestions for future research are also discussed.
Information Systems Journal, 2012
Customer loyalty or repeat purchasing is critical for the survival and success of any store. By f... more Customer loyalty or repeat purchasing is critical for the survival and success of any store. By focusing on online stores, this study investigates the repeat purchase intention of experienced online buyers based on means‐end chain theory and prospect theory. In the research model, both utilitarian value and hedonic value are hypothesised to affect repeat purchase intention positively. Perceived risk is hypothesised to affect repeat purchase intention negatively and moderate the effects of utilitarian and hedonic values on repeat purchase intention. Utilitarian value is proposed as a formative second‐order construct formed by product offerings, product information, monetary savings and convenience. Hedonic value is also proposed as a formative second‐order construct formed by the six hedonic benefits that have been identified in prior research. Data collected from 782 Yahoo!Kimo customers provide strong support for the research model. The results indicate that both the utilitarian va...
Industrial Management & Data Systems, 2004
This study examines motivational factors influencing one's intention to continue using WWW ap... more This study examines motivational factors influencing one's intention to continue using WWW applications. Social cognitive theory is adapted and integrated with expectancy disconfirmation theory and empirical findings from prior studies about continued use of information systems. Research hypotheses derived from this model are empirically validated using the responses to a survey on WWW usage, collected from 235 users. Results suggest that users’ continuance intention is determined by their satisfaction with prior use, internet self‐efficacy, and outcome expectations. Outcome expectation, in turn, is influenced by their satisfaction with prior use and prior perceived confirmation. This study draws attention to the substantial differences between acceptance and continuance. Implications for practice and further research are considered.
In this paper we propose a conceptual architecture that integrates with both third-party applicat... more In this paper we propose a conceptual architecture that integrates with both third-party applications and information systems. We believe that integrating information systems with the Web will go a long way toward making information systems more understandable. We also believe that integrating third-party applications with the Web will lessen the problem that users have to discard applications they use everyday to navigate and publish in the cyberspace.
Pacific Asia Conference on Information Systems, 2010
Information Technology and Management
Our overall research goal is providing hypertext functionality through the WWW to hypertext-unawa... more Our overall research goal is providing hypertext functionality through the WWW to hypertext-unaware information systems with minimal or no changes to the information systems. Information systems dynamically generate their contents and thus require some mapping mechanism to automatically map the generated contents to hypertext constructs (nodes, links, and link markers) instead of hypertext links being hard-coded over static contents. No systematic approach exists, however, for building mapping routines to create useful links that give users direct access to the ISs' primary functionality, give access to metainformation about IS objects, and enable annotation and ad hoc (user-declared) linking. This paper contributes a procedure for analyzing ISs and building mapping routines that supplement information systems with hypertext support. This paper also contributes an eXtensible Markup Language (XML) DTD that declares a set of elements and attributes for representing mapped informat...
Decision Support Systems, 2004
Behaviour & Information Technology, 2004
... Decomposed theory of planned behaviour (DTPB) is adapted from social psychology and integrate... more ... Decomposed theory of planned behaviour (DTPB) is adapted from social psychology and integrated with theoretical and empirical findings from prior information systems (IS) usage research to theorize a model of e-service continuance. ...
Behaviour & Information Technology, 2009