Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kholekile L. Gwebu is active.

Publication


Featured researches published by Kholekile L. Gwebu.


decision support systems | 2009

An application of agent-based simulation to knowledge sharing

Jing Wang; Kholekile L. Gwebu; Murali S. Shanker; Marvin D. Troutt

This paper explores knowledge sharing using an agent-based simulation model. Built using Repast, our application allows managers to simulate employee knowledge-sharing behaviors by making parametric assumptions on employee decision strategies and organizational interventions that affect identifiability, benefits, and costs. Our results show that in the presence of non-linear and adaptive interaction, unintended and unpredictable outcomes might occur, and that knowledge sharing results from the complex interaction between employee behavior and organizational interventions.


decision support systems | 2011

Adoption of Open Source Software: The role of social identification

Kholekile L. Gwebu; Jing Wang

While the benefits of incorporating Open Source Software (OSS) into personal and organizational systems have been widely touted, OSS must be adopted and used by end users before these benefits can be realized. Drawing on research in information systems and sociology, this study develops and evaluates an integrated model for the acceptance of OSS. In addition to the traditional technology adoption variables the findings stress the importance of social identification as a key driver of OSS adoption. The proposed model provides a useful decision support tool for assessing and proactively designing interventions targeted at successful OSS adoption and diffusion.


The Information Society | 2011

A Critical Analysis of Current Indexes for Digital Divide Measurement

Giuseppe Bruno; Emilio Esposito; Andrea Genovese; Kholekile L. Gwebu

Several composite indexes grouping several variables into a single figure have been proposed for measuring the digital divide. In this article, the authors analyze shortcomings of extant indexes. Using multivariate analysis tools, they show that in the definition of composite indexes it is possible to individuate a limited set of more influencing and significant variables. This finding suggests the possibility of replacing some redundant variables with other dimensions that include other aspects of the digital divide that are not considered in extant measures.


Journal of Strategic Information Systems | 2010

Does IT outsourcing deliver economic value to firms

Kholekile L. Gwebu; Jing Wang; Li Wang

The question of whether or not IT outsourcing initiatives deliver economic value to firms is an important yet under examined one. This study extends extant outsourcing literature by evaluating how firm value is created through IT outsourcing. Using Porters Value Chain Model as the theoretical framework, the study systematically traces and measures the value added through IT outsourcing for firms in the manufacturing and retail industries. The results indicate that the effect of IT outsourcing is better detected at the intermediate process level rather than at the firm-level. Firms are able to realize economic benefits of cost savings, but less so in efficiency. Improved cost is observed in inbound logistics and supporting activities. With the exception of inbound logistics, no efficiency improvements are observed in operating activities and outbound logistics, suggesting that the positive impact of IT outsourcing is limited.


Journal of Systems and Software | 2010

Seeing eye to eye? An exploratory study of free open source software users' perceptions

Kholekile L. Gwebu; Jing Wang

This study develops a typology that permits the classification of free open source software (FOSS) users into market segments. Based on the typology the nature and extent of perception differences between core FOSS users and FOSS users in other market segments is examined. Significant perception differences are observed between users in different market segments. Consequently, the potential barriers to FOSS adoption are identified and recommendations that may drive greater FOSS adoption are proposed.


Journal of Global Information Technology Management | 2011

Strategy and Vendor Selection in IT Outsourcing: Is there a Method in the Madness?

Dev K. Dutta; Kholekile L. Gwebu; Jing Wang

Abstract Both outsourcing strategy and choice of vendors have the potential to influence the success of information technology outsourcing (ITO) initiatives. However, the ways in which these factors combine leading to success in outsourcing has not received much attention in prior research. Accordingly, this study explores the patterns of ITO strategy and vendor selection adopted by outsourcing firms having high internal IT capabilities versus those with low internal IT capabilities. Our exploratory analysis on a sample of over 200 firms reveals that maintaining strong internal IT capabilities is a defining factor for outsourcing firms when selecting an appropriate mix of ITO strategies and vendors. These findings have important implications for firms new to ITO and also those that have not realized the full benefits of ITO.


International Journal of Web-based Learning and Teaching Technologies | 2007

The Role of Organizational, Environmental and Human Factors in E-Learning Diffusion

Kholekile L. Gwebu; Jing Wang

Improvements in technology have led to innovations in training such as Electronic Learning (E-learning). E-learning aims to help organizations in their training initiatives by simplifying the training process and cutting cost. It also attempts to help employees in their learning processes by making learning readily accessible. Unfortunately, the diffusion of this innovation has not been as successful as was initially predicted. In this article we explore the drivers behind the diffusion of e-learning. Apart from the factors investigated by previous research, we believe that one more dimension—human factors—should be taken into account when evaluating the diffusion of a training innovation, since learners are, to a large extent, the central issue of training. In the case of e-learning we believe that motivation plays a key role in the diffusion of e-learning.


Behaviour & Information Technology | 2012

An experimental investigation into the effects of information revelation in multi-attribute reverse auctions

Kholekile L. Gwebu; Michael Y. Hu; Murali S. Shanker

Bid-takers in multi-attribute reverse auctions (MRA) are typically confronted with a myriad of information revelation options and must make decisions on which pieces of information to reveal to bidders and which ones to conceal. This study explores how the choice of different types and combinations of information can affect bidding behaviour and bidder perceptions in MRA. The results of a computer-based laboratory experiment suggest that by reducing the level of information asymmetry and using certain combinations of information a bid-taker can reduce bidder drop-out and spur the submission of high quality bids, i.e. bids that yield high levels of utility for the bid-taker.


Journal of Management Information Systems | 2018

The Role of Corporate Reputation and Crisis Response Strategies in Data Breach Management

Kholekile L. Gwebu; Jing Wang; Li Wang

Abstract Despite the significant financial losses associated with data breaches, little is known about the (in)effectiveness of the tools that firms have to protect their value following a breach. Drawing on cognitive dissonance theory and the research on cue diagnosticity and crisis management, this study examines the relative efficacy of firm reputation and a range of post-breach response strategies. The results indicate that firm reputation is an important asset in protecting firm value. However, only certain response strategies are found to mitigate the negative financial impact of a breach on lower-reputation firms, and response strategies are found to matter less for high-reputation firms. These findings offer practitioners evidence-based guidance for protecting firm value following data breaches and underscore the need for developing more nuanced strategies for managing breaches. The theoretical arguments developed here serve as a conceptual base for examining the efficacy of various data breach response strategies.


2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA) | 2017

Stock market reaction to data breaches: The moderating role of corporate social responsibility

Shuili Du; Jing Wang; Kholekile L. Gwebu

This study explores the potential role of corporate social responsibility (CSR) in mitigating the damage of data breach, a topic that has received scant attention from the literature. Drawing upon the literatures on CSR, stakeholder theory, and the resource-based view (cites), we conceptualize that firms with greater CSR activities accumulate goodwill and cultivate stronger stakeholder relationships, and thus during times of a crisis, such as a data breach, stakeholders are more likely to give the socially responsible firm “the benefit of doubt” and temper their sanctions, mitigating the damage of the breach.

Collaboration


Dive into the Kholekile L. Gwebu's collaboration.

Top Co-Authors

Avatar

Jing Wang

University of New Hampshire

View shared research outputs
Top Co-Authors

Avatar

Dev K. Dutta

University of New Hampshire

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jeffrey E. Sohl

University of New Hampshire

View shared research outputs
Top Co-Authors

Avatar

Lin Guo

University of New Hampshire

View shared research outputs
Top Co-Authors

Avatar

Shuili Du

University of New Hampshire

View shared research outputs
Researchain Logo
Decentralizing Knowledge