Jason Bennett Thatcher
Temple University
Internet privacyEmpirical researchInformation technologySociologyBusinessPsychologyMarketingConstruct (philosophy)Work (electrical)Political scienceInformation systemPerceptionTest (assessment)Context (language use)Computer securityPublic relationsComputer scienceSocial mediaKnowledge managementStructural equation modelingSocial psychology
194Publications
43H-index
5,892Citations
Publications 192
Newest
#1Stefan Tams (HEC Montréal)H-Index: 10
#2Varun Grover (UA: University of Arkansas)H-Index: 96
Last. Manju Ahuja (University of Louisville)H-Index: 22
view all 4 authors...
Mobile technologies have dramatically increased the number of work-related interruptions. In many organizations, employees must remain accessible and respond to these technology-mediated (T-M) interruptions even after regular work hours. Thus, demands from work interruptions can spill over into workers’ evening and family time, entailing role stress. Ultimately, workers can shy away from using the technologies they deem responsible, with negative impacts for organizations. This implies an indire...
1 CitationsSource
#1Jens MattkeH-Index: 5
#2Christian MaierH-Index: 21
Last. Jason Bennett ThatcherH-Index: 43
view all 4 authors...
Source
#1Randy Y. M. Wong (University of Auckland)H-Index: 4
#1Randy Yee Man Wong (University of Auckland)H-Index: 1
Last. Jason Bennett Thatcher (TU: Temple University)H-Index: 43
view all 4 authors...
Social media harassment, a cyberbullying behavior, poses a serious threat to users and platform owners of social media. In this paper, we contextualize the bystander intervention framework and repo...
1 CitationsSource
#1Peter BuxmannH-Index: 27
#2Thomas Hess (LMU: Ludwig Maximilian University of Munich)H-Index: 38
Last. Jason Bennett Thatcher (TU: Temple University)H-Index: 43
view all 3 authors...
Source
#1Barbara Prommegger (TUM: Technische Universität München)H-Index: 2
#2Jason Bennett Thatcher (TU: Temple University)H-Index: 43
Last. Helmut Krcmar (TUM: Technische Universität München)H-Index: 64
view all 4 authors...
Global crises, such as the COVID-19 pandemic, change the context for research and bring with them many professional challenges for IS researchers – not the least of which is disrupting carefully th...
Source
Organizations use IT to navigate uncertain, rapidly changing, and competitive environments. To achieve this, understanding the implications of the interplay among firm strategy, information technology (IT), and IT governance is critical to understanding firm success. In this work, we investigate the synergistic effects of business–IT strategic alignment (hereafter “alignment”), misalignment, and effectiveness of IT governance on firm performance among organizations with proactive/first-mover str...
Source
#1Sebastian Walter Schuetz (FIU: Florida International University)H-Index: 4
#2Paul Benjamin Lowry (Pamplin College of Business)H-Index: 63
Last. Jason Bennett Thatcher (TU: Temple University)H-Index: 43
view all 4 authors...
Information security (ISec) is a pervasive concern of individuals, organizations, and governments. To encourage individuals to engage in and learn about secure behaviors, ISec research has turned t...
3 CitationsSource
#1Sebastian Walter Schuetz (CityU: City University of Hong Kong)H-Index: 4
#2Paul Benjamin Lowry (VT: Virginia Tech)H-Index: 63
Last. Jason Bennett ThatcherH-Index: 43
view all 4 authors...
A substantial amount of previous research has examined the efficacy of fear appeals to elicit security-enhancing behaviors from users. However, despite more than a decade of research on fear appeals in security contexts, researchers have yet to understand which factors drive users’ responses to fear appeals. Instead, the literature is riddled with inconsistent findings on the antecedents that predict fear-appeal outcomes, fueling controversy over, and inhibiting progress, on the problem. This re...
Source
In this work, we investigate how social media has changed hiring processes, an important internal activity of organizations. Specifically, we probe how viewing job-relevant and job-irrelevant social media content influences hiring managers’ ratings of job applicants. To do so, we conducted an experiment that manipulated the presence of social media content on political issues and job-relevant information as well as the social media platforms on which they appear. We balanced job-relevant and job...
1 CitationsSource
Creative information technology usage by employees is the critical link between business technology investments and competitive advantage in a digital economy. However, to realize anticipated benefits, organizational leaders need a richer understanding of what drives individuals’ innovation with incumbent organizational technologies. In support of that aim, this study theorized the processes by which a new concept in IS research, IT identity, motivates different forms of IT usage in the post-ado...
2 CitationsSource