Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Weiyin Hong is active.

Publication


Featured researches published by Weiyin Hong.


Management Information Systems Quarterly | 2013

Internet privacy concerns: an integrated conceptualization and four empirical studies

Weiyin Hong; James Y.L. Thong

Internet privacy concerns (IPC) is an area of study that is receiving increased attention due to the huge amount of personal information being gathered, stored, transmitted, and published on the Internet. While there is an emerging literature on IPC, there is limited agreement about its conceptualization in terms of its key dimensions and its factor structure. Based on the multidimensional developmental theory and a review of the prior literature, we identify alternative conceptualizations of IPC. We examine the various conceptualizations of IPC with four online surveys involving nearly 4,000 Internet users. As a baseline, study 1 compares the integrated conceptualization of IPC to two existing conceptualizations in the literature. While the results provide support for the integrated conceptualization, the second-order factor model does not outperform the correlated first-order factor model. Study 2 replicates the study on a different sample and confirms the results of study 1. We also investigate whether the prior results are affected by the different perspectives adopted in the wording of items in the original instruments. In study 3, we find that focusing on ones concern for website behavior (rather than ones expectation of website behavior) and adopting a consistent perspective in the wording of the items help to improve the validity of the factor structure. We then examine the hypothesized third-order conceptualizations of IPC through a number of alternative higher-order models. The empirical results confirm that, in general, the third-order conceptualizations of IPC outperform their lower-order alternatives. In addition, the conceptualization of IPC that has the best fit with the data contains a third-order general IPC factor, two second-order factors of interaction management and information management, and six first-order factors (i.e., collection, secondary usage, errors, improper access, control, and awareness). Study 4 cross-validates the results with another data set and examines IPC within the context of a nomological network. The results confirm that the third-order conceptualization of IPC has nomological validity, and it is a significant determinant of both trusting beliefs and risk beliefs. Our research helps to resolve inconsistencies in the key underlying dimensions of IPC, the factor structure of IPC, and the wording of the original items in prior instruments of IPC. Finally, we discuss the implications of this research.


Information Systems Research | 2014

A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research

Weiyin Hong; Frank Kwok Yue Chan; James Y.L. Thong; Lewis C. Chasalow; Gurpreet Dhillon

This paper discusses the value of context in theory development in information systems IS research. We examine how prior research has incorporated context in theorizing and develop a framework to classify existing approaches to contextualization. In addition, we expound on a decomposition approach to contextualization and put forth a set of guidelines for developing context-specific models. We illustrate the application of the guidelines by constructing and comparing various context-specific variations of the technology acceptance model TAM---i.e., the decomposed TAM that incorporates interaction effects between context-specific factors, the extended TAM with context-specific antecedents, and the integrated TAM that incorporates mediated moderation and moderated mediation effects of context-specific factors. We tested the models on 972 individuals in two technology usage contexts: a digital library and an agile Web portal. The results show that the decomposed TAM provides a better understanding of the contexts by revealing the direct and interaction effects of context-specific factors on behavioral intention that are not mediated by the TAM constructs of perceived usefulness and perceived ease of use. This work contributes to the ongoing discussion about the importance of context in theory development and provides guidance for context-specific theorizing in IS research.


Communications of The ACM | 2004

What leads to user acceptance of digital libraries

James Y.L. Thong; Weiyin Hong; Kar Yan Tam

While millions of dollars have been spent building digital libraries, research indicates that millions of potential users may still be ignoring them.


hawaii international conference on system sciences | 2007

Identifying Governance Dimensions to Evaluate Information Systems Security in Organizations

Gurpreet Dhillon; Gurvirender Tejay; Weiyin Hong

Prior studies in information systems security have a limited emphasis on empirically identifying security dimensions. This research paper presents the results of an empirical study to understand governance dimensions of information systems security. The research study was conducted in three phases involving interviews, an exploratory phase and a confirmatory phase. The exploratory phase generated a 4-factor, 16-item model for behavioral security of an organization. The confirmatory phase involving structural equation modeling validated the impact of governance dimensions on the overall information systems security of an organization. Data was collected from two different samples of 163 and 175 respondents for each phase respectively. The results suggest that the governance dimensions impact information system security of an organization through behavioral security


International Journal of Human-computer Interaction | 2008

Special Issue Introduction: HCI Studies in MIS

Fiona Fui-Hoon Nah; Xiaowen Fang; Traci J. Hess; Weiyin Hong

Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.


Journal of Management Information Systems | 2002

Determinants of User Acceptance of Digital Libraries: An Empirical Examination of Individual Differences and System Characteristics

Weiyin Hong; James Y.L. Thong; Wai Man Wong; Kar Yan Tam


International Journal of Human-computer Studies \/ International Journal of Man-machine Studies | 2002

Understanding user acceptance of digital libraries: what are the roles of interface characteristics, organizational context, and individual differences?

James Y.L. Thong; Weiyin Hong; Kar Yan Tam


Information & Management | 2006

Migrating to internet-based e-commerce: factors affecting e-commerce adoption and migration at the firm level

Weiyin Hong; Kevin Zhu


Journal of Management Information Systems | 2004

The Effects of Information Format and Shopping Task on Consumers' Online Shopping Behavior: A Cognitive Fit Perspective

Weiyin Hong; James Y.L. Thong; Kar Yan Tam


Information Systems Research | 2004

Does Animation Attract Online Users' Attention? The Effects of Flash on Information Search Performance and Perceptions

Weiyin Hong; James Y.L. Thong; Kar Yan Tam

Collaboration


Dive into the Weiyin Hong's collaboration.

Top Co-Authors

Avatar

James Y.L. Thong

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Kar Yan Tam

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Gurpreet Dhillon

Virginia Commonwealth University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Traci J. Hess

Washington State University

View shared research outputs
Top Co-Authors

Avatar

Muller Yat Ming Cheung

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Fiona Fui-Hoon Nah

Missouri University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Gurvirender Tejay

Virginia Commonwealth University

View shared research outputs
Top Co-Authors

Avatar

Kevin Zhu

University of California

View shared research outputs
Researchain Logo
Decentralizing Knowledge