Nancy K Lankton

Nancy K Lankton
Marshall University · Division of Accountancy and Legal Environment

About

51
Publications
22,928
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,242
Citations
Introduction
Skills and Expertise
Additional affiliations
August 2010 - December 2016
Marshall University
Position
  • Professor (Full)

Publications

Publications (51)
Article
Full-text available
While many factors drive the sharing economy’s growth, trust and motivations play critical roles. However, which factors are more important to young consumers? This research compares a trust model with a motivation model for predicting intention to use Airbnb, Uber, and TaskRabbit, comparing within each platform, not between them. The study uses a...
Article
Cybersecurity is a serious and growing risk for organizations. Firms with board of director involvement in information technology governance (ITG) may be better equipped to deal with this risk. Yet little is known about the audit committee's role in ITG. This study uses efficiency and institutional theories to investigate the influence of security...
Article
Purpose Organizational insiders play a critical role in protecting sensitive information. Prior research finds that moral beliefs influence compliance decisions. Yet, it is less clear what factors influence moral beliefs and the conditions under which those factors have stronger/weaker effects. Using an ethical decision-making model and value congr...
Article
Full-text available
IT governance is important to the success of most business enterprises. One form of IT governance is the use of board-level IT committees. This study examines committee charters, which are the basic foundation for an effective committee. Based on prior literature and theory, we develop a framework and six propositions for assessing IY committee cha...
Article
Full-text available
Abstract While the information systems (IS) community,has examined,the role of interpersonal trust in e-commerce acceptance, IS researchers are just beginning to examine the role of humantechnology trust in technology acceptance. Trust in technology is an increasingly important concept as systems become,more complex,and harder for any one human,to...
Article
Full-text available
Trust in technology is an emerging research domain that examines trust in the technology artifact instead of trust in people. Although previous research finds that trust in technology can predict important outcomes, littleresearch has examined the effect of unmet trust in technology expectations on trusting intentions. Furthermore, both trust and e...
Article
Full-text available
Information systems (IS) research has demonstrated that humans can and do trust technology. The current trust in technology literature employs two different types of trust in technology constructs. Some researchers use human-like trust constructs (e.g., benevolence, integrity, and ability), while other researchers use system-like trust constructs (...
Article
Full-text available
Although growth in U.S. consumers' overall use of e-health is strong, it is being driven by only a portion of the e-health services that are offered through online health portals. Fine-grained, longitudinal analysis of three representative e-health services shows that, while online communication with medical personnel has grown consistently between...
Article
Full-text available
Evaluations of participant samples for experiments in information systems research often appear to be informal and intuitive. Appropriate participant choice becomes a more salient issue as the population of information technology professionals and users grows increasingly diverse, and the distribution of relevant characteristics in participant samp...
Article
Full-text available
This article is motivated by the desire to integrate and expand two literature streams, one that models effects of prior information technology (IT) use and habit strength on continued IT use and another that studies how to apply such models to IT that are used in a characteristically sporadic manner. We find that joint predictions of continuance i...
Article
Information privacy is a complex and important phenomenon to understand. Because of this, several recent review articles have integrated findings across various studies and contexts. In this study we investigate information privacy in the online social networking context using the Antecedent-Privacy Concern-Outcome (APCO) Macro Model as the theoret...
Article
While some online social networking (OSN) websites, such as Facebook, have reported sustained growth, others, such as Bebo, have not. This study investigates the factors that influence users' intentions to continue using these websites. We adapt the theory of reasoned action and develop a model depicting how trusting beliefs, habit, attitude, and s...
Article
Internet tools used as knowledge retrieval mechanisms can be beneficial for knowledge acquisition (KA). This study applies the concepts of decisional guidance and restrictiveness to three commonly used tools to predict perceived information overload, task quality, and task speed for tasks that differ in complexity. In an experimental setting we fin...
Article
Full-text available
Expectation Disconfirmation Theory (EDT) posits that expectations, disconfirmation, and performance influence customer satisfaction. While information systems researchers have adopted EDT to explain user information technology (IT) satisfaction, they often use various EDT model subsets. Leaving out one or more key variables, or key relationships am...
Article
Full-text available
Not all individuals log into an online social networking (OSN) website because they have deliberately reflected on how useful and fun it will be. For some users, this post-adoptive use decision requires a less deliberate process based on past experience. For still others, the decision is automatic and requires little, if any, reflection on beliefs...
Article
Arranging survey items to group measures of the same construct together has several benefits, including ease of administration and enhanced statistical reliability and validity of constructs. Yet some IS researchers claim this practice contributes to common methods bias and camouflages "true" measures of reliability. Our study takes a new approach...
Article
Full-text available
Researchers have recently studied technology trust in terms of the technological artifact itself. Two different kinds of trusting beliefs could apply to a website artifact. First, the trusting beliefs may relate to the interpersonal characteristics--competence, integrity, and benevolence. Second, they may relate to corresponding technology characte...
Conference Paper
Full-text available
This paper tests a privacy calculus model for Facebook users. The model posits that both the costs and benefits related to privacy will influence users' information disclosure and their usage continuance intention. In a sample of business college students, we find that the privacy calculus model is not well-supported. Instead, two factors (privacy...
Article
IT researchers have recently distinguished habits from prior behavior frequency. We expanded this research by examining habit's antecedents and investigating the simultaneous effect of habit and prior IT use on continued IT use. We found that the research model was relatively robust over four specific use activities of one software application. Ind...
Conference Paper
This paper presents a fine-grained, longitudinal analysis of demographic factors contributing to adoption by patients of advanced e-health services in the areas of transaction, communication, and personal support. The research uses Health Information National Trends Survey (HINTS), conducted in 2003, 2005, and 2007 by the U.S. National Cancer Insti...
Conference Paper
Full-text available
This paper examines trust’s role in predicting Facebook continuance intention. We examine the relative influence of two types of trusting beliefs including interpersonal-related trust beliefs and technology-related trust beliefs on technology trusting intentions. Interpersonal trusting beliefs include integrity, competence, and benevolence. Technol...
Conference Paper
It has become common for healthcare providers to offer e-health services to patients and other consumers. Experts suggest these services are desired by users, and this has been confirmed generally through empirical research. However, most empirical studies of e-health adoption have focused on demographically homogeneous populations and have been im...
Article
Real options analysis is an important but costly tool for valuing many information technology (IT) investments. As a low-cost substitute for real options-based methods, firms often depend on managerial intuition, which sometimes approximates real options-based valuations and sometimes does not. Making good choices about how to value IT investments...
Conference Paper
Full-text available
Several researchers have studied technology trust in terms of the technological artifact of the technology. Two different types of trusting beliefs could apply to websites. First, the trusting beliefs may relate to interpersonal characteristics such as benevolence, competence, and integrity. Second, they may relate to technology characteristics suc...
Article
This chapter presents a new rational-objective (R-O) model of e-health use that accounts for effects of facilitating conditions as well as patients' behavioral intention. An online questionnaire measured patients' behavioral intention to use a new e-health application as well as proxy measures of facilitating conditions that assess prior use of and...
Article
Researchers find that customer satisfaction with both offline and online services can be modeled effectively based on expectations of future service performance, perceptions of actual performance, and a comparison of customers' initial expectations to subsequent perceptions of performance known as disconfirmation. Research has examined antecedents...
Article
Researchers find customer satisfaction with service-oriented Web sites (e-services) can be modeled effectively based on the match between customers' initial expectations and subsequent perceptions of performance. However, little is known about the factors leading to expectations or the ability of such factors to provide early predictions of satisfa...
Article
Full-text available
While information and communication technologies can increase the health care provided to underserved populations, research concerning these technologies often involves only those patients who possess access to technology or who are otherwise willing and able to use it. This issue is important for both researchers and practitioners because non-user...
Article
Health care providers are beginning to deliver a range of Internet-based services to patients; however, it is not clear which of these e-health services patients need or desire. The authors propose that patients' acceptance of provider-delivered e-health can be modeled in advance of application development by measuring the effects of several key an...
Article
Full-text available
Healthcare is a large and growing industry that is experiencing major transformation in its information technology base. IS confronted similar transformations in other industries and developed theories and methods that should prove useful in healthcare applications. In turn, IS may benefit from incorporating knowledge from health informatics, a dis...
Article
Full-text available
Asynchronous online communication technologies are likely to cause major changes in the way patients and their healthcare providers communicate. Initially, these technologies will be applied to undemanding communication uses, such as requesting prescription refills. In the longer term, however, the technologies may provide strategic benefits to hea...

Network

Cited By