Papers by Victor Prybutok
European Journal of Operational Research, Oct 1, 2005
Behaviour & Information Technology, May 1, 2013
Journal of Systems and Information Technology, May 5, 2022
Purpose This study aims to investigate the determinants of cloud computing usage behavior by expl... more Purpose This study aims to investigate the determinants of cloud computing usage behavior by exploring trust, several trust antecedents, risk perceptions and the direct and mediating relationships of trust and perceived risk on the intention toward the behavior. Design/methodology/approach An online survey was administered to 1,228 cloud technology users. Using structural equation modeling, a proposed framework of 13 factors that have a direct and indirect influence on the usage behavior was introduced and tested. Findings It was observed that the intention toward the usage was influenced by trust and performance expectancy. Additionally, trust was affected by perceived accessibility and perceived technical support. The findings provided evidence on the diminished effect of perceived privacy and the insignificance of the mediating relationship of trust and perceived risk on the intention. Research limitations/implications The study provides multiple implications for researchers by highlighting the concept of trust in this context and enriching their understanding of the relationship between risk and trust. Practical implications The research provides valuable guidelines for service providers toward introducing major concerns and the importance of dependable technical support. Originality/value This study contributes to the cloud computing literature by exploring the effect of perceived technical support on the usage and examining the relationship between trust and risk.
Information Technology & People, Apr 15, 2022
PurposeThis study aims to examine the relationship between emotional attachment (EA) and intellig... more PurposeThis study aims to examine the relationship between emotional attachment (EA) and intelligent personal assistant (IPA) continuance intention. While existing theories emphasize purely rational and goal-oriented factors in terms of information technology (IT) continuance intention, this research examines how users' EA toward technology impacts their continuance intention in the absence of cognitive and habitual factors.Design/methodology/approachThis study contextualizes attachment theory from the social psychology/consumer psychology literature to an IT application and formulates and tests a new model that is proposed in the context of IPA continuance. Five research hypotheses developed from contextualization and application of the theory were posited in a structural model and empirically validated using survey results from IPA users.FindingsThe results show that users' EA to IPA use significantly influences their IPA continuance intention, along with emotional trust and interaction quality with the IPA.Originality/valueThis study contextualizes attachment theory developed in the social psychology/consumer psychology literature to formulate and test a new model in the context of IPA continuance. This work contributes to the theoretical understanding by investigating IPA continuance intention in the absence of cognitive or habitual factors and fills a critical research gap in IT post-adoption literature. IPA is just one example of technologies to which individuals can form attachments and this research provides an important foundation for future research by positing and testing the value of EA in IT post-adoption behavior. This research also contributes to practical knowledge by inferring that IPA manufacturers, managers and vendors could extend their revenue streams by integrating product features that capture emotion.
Journal of Nonprofit & Public Sector Marketing, Mar 31, 2021
Socio-economic Planning Sciences, Dec 1, 1994
Information Systems and E-business Management, Nov 29, 2021
Computers & society, Mar 1, 1996
Nutrition & Food Science, Jul 8, 2014
Purpose – The purpose of this paper is to investigate the influence of visual information cues su... more Purpose – The purpose of this paper is to investigate the influence of visual information cues such as a heart icon vs the calories and fat content on the selection of healthy food in fast-food restaurants (FFRs). Design/methodology/approach – An online survey design providing a fast-food menu was implemented to collect responses from the participants. The survey respondents were recruited from a large South-western university in the USA. The research model was tested using logistic regression. Findings – Data analysis shows that visual information plays a significant role in healthy food selection in FFRs. The authors findings show that the heart icons have a statistically significant effect on food choices, while calories and fat content information did not affect the participants’ selections vs no information. Originality/value – Dietary choices and obesity are a serious social concern. This study provides support for the effect of a heart icon symbol on food choice in fast-food selection. The implication is that labelling FFR menus with symbols such as our heart icon will have a positive impact on healthy food selection vs the more usual inclusion of calorie and fat information.
The Journal of Marketing Theory and Practice, Aug 17, 2021
International Journal of Services and Standards, 2011
Information Systems Management, May 12, 2016
Information & Management, Sep 1, 2022
Decision Sciences, Jan 27, 2016
Quality & Quantity, Feb 17, 2014
ABSTRACT The use of polar extremes as a data segmentation approach is a common practice to maximi... more ABSTRACT The use of polar extremes as a data segmentation approach is a common practice to maximize variance within multivariate analysis. In this research, we propose the first application of the polar extremes methodology within Partial Least Squares Structural Equation Modeling (PLS-SEM). Discussed is the impact of unequal weights of indicators among latent constructs within PLS-SEM and the importance of this methodology upon the current established PLS-SEM analysis approach. Using a case study approach, we demonstrate the method. Developing two different models within the case allows comparison of the path coefficients and percentage of variance explained between the current PLS-SEM application and the proposed polar extremes methodology.
Sexuality Research and Social Policy
Introduction Compared to straight people, older sexual minorities are at a higher risk of experie... more Introduction Compared to straight people, older sexual minorities are at a higher risk of experiencing depression because they encounter additional stressors related to sexual minority status. Nonetheless, the stressor appraisal process and the coping mechanism employed by sexual minority older adults remain understudied. Additionally, research on forgiveness in sexual minorities is scant, especially among older populations. This study examines the extent to which negative social interactions and shame about sexual minority identity explain perceived stress that underlines depression and the relative importance of forgiveness, social support, and resilience in forming adaptive coping, which moderates between stress and depression among sexual minority older adults. Methods We used hierarchical component models in structural equation modeling to analyze data—collected in 2017—from a sample of 50 lesbian women and 50 gay men older than 50 years. Results Negative social interactions an...
Information & Computer Security, 2021
Purpose Information security is a growing issue that impacts organizations in virtually all indus... more Purpose Information security is a growing issue that impacts organizations in virtually all industries, and data breaches impact millions of customers and cost organizations millions of dollars. Within the past several years alone, huge data breaches have been experienced by organizations such as Marriot, Equifax, eBay, JP Morgan Chase, Home Depot, Target and Yahoo, the latter of which impacted three billion users. This study aims to examine the utilization of pre-employment screening to identify potential hires that may require enhanced information security training to avoid such costs. Design/methodology/approach The authors hypothesize that an individual’s work ethic predicts a person’s information security behavior. The authors test this hypothesis using structural equation modeling with bootstrapping techniques. Findings Data analysis suggests that certain dimensions of work ethic do indeed predict information security posture, and thus, simple pre-employment screening techniqu...
Computers in Human Behavior, 2021
Abstract This research develops and tests a social networking site (SNS) responsible impression m... more Abstract This research develops and tests a social networking site (SNS) responsible impression management (SNS-RIM) model to investigate the impact of social networking site impression management (IM) on users' continued SNS engagement, thereby contributing to information systems research. To collect data, the authors administered a customized survey instrument over three weeks and gathered 456 responses. A total of fifty-seven incomplete responses were removed, resulting in 399 useable responses, with which to calibrate and test the model. The model increases understanding of SNS-RIM patterns which are strategies for protecting privacy. Findings indicate that users desire both privacy and an active social media presence, and there is a tradeoff between having an overall active social media presence and protecting personal information privacy. This study determines that SNS impression management, SNS stalking awareness, and technological SNS privacy controls are good predictors of online SNS behaviors. The methodology employs factor analysis and PLS/SEM to test and confirm that the SNS-RIM model creates responsible impressions in SNS environments. This research increases model complexity over previous work, mediating behavioral relationships posited in this study. It demonstrates the complexity of social networking behavior and IM theory's appropriateness to explain dynamic changing social structures, complementing existing SNS research, and how social capital influences IM.
Uploads
Papers by Victor Prybutok