scispace - formally typeset
Search or ask a question

Showing papers in "Journal of Management Information Systems in 2016"


Journal ArticleDOI
TL;DR: It is demonstrated that the dual-system theory is an appropriate theoretical perspective for explaining problematic IS use, superior to planned-behavior–based models and offers practical implications to information technology artifact designers and users.
Abstract: Problematic use of social networking sites (SNS) and its adverse consequences have become prevalent, yet little is known about the conceptualization and etiology of problematic use of SNS. ...

199 citations


Journal ArticleDOI
TL;DR: Compared with verbal features, nonverbal features of reviewers are shown to be more important for fake review detection and model pruning based on a sensitivity analysis improves the parsimony of the developedfake review detection model without sacrificing its performance.
Abstract: The value and credibility of online consumer reviews are compromised by significantly increasing yet difficult-to-identify fake reviews. Extant models for automated online fake review detection rely heavily on verbal behaviors of reviewers while largely ignoring their nonverbal behaviors. This research identifies a variety of nonverbal behavioral features of online reviewers and examines their relative importance for the detection of fake reviews in comparison to that of verbal behavioral features. The results of an empirical evaluation using real-world online reviews reveal that incorporating nonverbal features of reviewers can significantly improve the performance of online fake review detection models. Moreover, compared with verbal features, nonverbal features of reviewers are shown to be more important for fake review detection. Furthermore, model pruning based on a sensitivity analysis improves the parsimony of the developed fake review detection model without sacrificing its performance.

182 citations


Journal ArticleDOI
TL;DR: The study conducted with data collected from a large social Q&A site consisting of multiple online communities with millions of registered users shows that the effect of enjoyment in helping others on attitude toward knowledge sharing is undermined by virtual organizational rewards, while the effectof knowledge self-efficacy on attitude towards knowledge sharing are undermined by reciprocity.
Abstract: In order to motivate individuals to share their knowledge in online communities, the use of extrinsic rewards and goals is a typical approach. However, extrinsic motivation may have unintended consequences. Although past studies have examined the direct effect of extrinsic motivation on intrinsic motivation, no research to date has investigated how extrinsic motivation moderates the impact of intrinsic motivation on knowledge sharing, or how the effect of extrinsic motivation on intrinsic motivation is contingent upon whether a member is active or not. Drawing on attribution theory and theory of planned behavior, the study was conducted with data collected from a large social QA the data were analyzed with moderated regression and structural equation modeling. Results show that the effect of enjoyment in helping others on attitude toward knowledge sharing is undermined by virtual organizational rewards, while the ef...

140 citations


Journal ArticleDOI
TL;DR: This study analyzes a sample of fraudulent and nonfraudulent projects published at a leading crowdfunding platform and investigates whether content-based cues and linguistic cues are valuable for fraud detection.
Abstract: Crowdfunding platforms offer founders the possibility to collect funding for project realization. With the advent of these platforms, the risk of fraud has risen. Fraudulent founders provide inaccurate information or pretend interest toward a project. Within this study, we propose deception detection support mechanisms to address this novel type of Internet fraud. We analyze a sample of fraudulent and nonfraudulent projects published at a leading crowdfunding platform. We examine whether the analysis of dynamic communication during the funding period is valuable for identifying fraudulent behavior—apart from analyzing only the static information related to the project. We investigate whether content-based cues and linguistic cues are valuable for fraud detection. The selection of cues and the subsequent feature engineering is based on theories in areas of communication, psychology, and computational linguistics. Our results should be helpful to the stakeholders of crowdfunding platforms and resear...

130 citations


Journal ArticleDOI
TL;DR: In this article, the authors investigate the temporal interaction dynamics between electronic word-of-mouth (eWOM), popularity information (a form of action-based social interaction), and consumer decision making.
Abstract: Despite the increasing relevance of online social interactions on platforms, there is still little research on the temporal interaction dynamics between electronic word-of-mouth (eWOM, a form of opinion-based social interaction), popularity information (a form of action-based social interaction), and consumer decision making. Drawing on a panel data set of more than 23,300 crowdfunding campaigns from Indiegogo, we investigate the dynamic effects of these social interactions on consumers’ funding decisions using the panel vector autoregressive methodology. Our analysis shows that both eWOM and popularity information are critical influencing mechanisms in crowdfunding. However, our overarching finding is that eWOM surrounding crowdfunding campaigns on Indiegogo or Facebook has a significant yet substantially weaker predictive power than popularity information. We also find that whereas popularity information has a more immediate effect on consumers’ funding behavior, its effectiveness decays rather ...

121 citations


Journal ArticleDOI
TL;DR: It is found that in users’ first interaction with a website, perceived aesthetics has a larger impact on their attitudes toward the website than perceived utility, which further affects the corporate image exhibited via the website.
Abstract: Though aesthetics is generally acknowledged as an important aspect of website design, extant information systems (IS) research on web user experience has rarely studied what affects website aesthetics and how aesthetics influences users’ perceptions of the website and the organization behind the website. In this paper, we synthesize prior literature from different academic domains and propose users’ perceived quality of five design elements (i.e., unity, complexity, intensity, novelty, and interactivity) as determinants of website aesthetics. We further theorize the effects of aesthetics on users’ attitudes toward the website and their perception of the corporate image. Two studies were conducted to test the research model. In Study 1, we adopted a card sorting method and the results provide substantial support to the determinants of website aesthetics. In Study 2, we conducted a survey using ten company portal websites that were unknown to survey respondents. Our analysis further confirms the eff...

104 citations


Journal ArticleDOI
TL;DR: This study links postadoptive IS use behaviors to managerial sensing ability, an important dynamic managerial capability, and furthers the understanding of how organizational factors such as entrepreneurial orientation play a key role in determining whether, when, and how managers use IS to develop ideas for organizational innovation.
Abstract: Fast-paced environmental changes require that managers quickly sense opportunities for organizational innovation. Information systems (IS) that support business intelligence and analytics help managers access and analyze data from various sources, thereby providing insight into potential opportunities. Building on the dynamic managerial capability perspective, we investigate the extent to which two managerial IS use behaviors—routine use and innovative use—influence a manager’s volume and diversity of ideas for organizational innovation. We also examine the moderating role of three organization-level entrepreneurial orientation characteristics—autonomy, innovativeness, and risk taking. We test our research model with survey data collected from 248 managers. Our results show that routine IS use is not related to volume or diversity of ideas for organizational innovation. However, innovative IS use is positively related to idea volume and idea diversity. Furthermore, organizational autonomy and inno...

90 citations


Journal ArticleDOI
TL;DR: In this article, the authors focus on predicting the profitability of a movie to support movie-investment decisions at early stages of film production by leveraging data from various sources, and using social network analyzes.
Abstract: We focus on predicting the profitability of a movie to support movie-investment decisions at early stages of film production. By leveraging data from various sources, and using social network analy...

89 citations


Journal ArticleDOI
TL;DR: Investigation of the different influence of two sets of experiential reasons on the competence belief versus the benevolence and integrity beliefs in online recommendation agents (RAs) demonstrates that the three performance factors affect only the competence believed, whereas perceived RA transparency influences all three trusting beliefs.
Abstract: competence, integrity, and benevolence are the three key trusting beliefs that are widely acknowledged in the trust literature. Drawing on users’ different dispositional attribution of these trusting beliefs, we investigate the different influence of two sets of experiential reasons on the competence belief versus the benevolence and integrity beliefs in online recommendation agents (RAs). The two sets of experiential reasons encompass interactive reason, including three performance factors (namely, perceived cognitive effort, advice quality, and perceived strategy restrictiveness), and knowledge-based reason (i.e., perceived transparency of an RA). Data were collected through a laboratory experiment to test our hypotheses. Results demonstrate that the three performance factors affect only the competence belief, whereas perceived RA transparency influences all three trusting beliefs. In addition, the effects of perceived transparency on competence are partially mediated by perceived cognitive effo...

78 citations


Journal ArticleDOI
TL;DR: In this paper, the authors introduce an overlapping-generations model to analyze product pricing and consumer choice with and without a sharing market, and quantifies the impacts of a peer-to-peer economy on the demand for ownership, the product price, and all participants' payoffs, including consumer surplus, profits, and social welfare.
Abstract: The emergence of a collaborative economy has been driven by advances in information technology that allow consumers to borrow and rent goods among peers on a secondary sharing market. In a dynamic setting, consumers make intertemporal decisions about purchases and their participation in the sharing market. This study introduces an overlapping-generations model to analyze product pricing and consumer choice with and without a sharing market. The model quantifies the impacts of a peer-to-peer economy on the demand for ownership, the product price, and all participants’ payoffs, including consumer surplus, profits, and social welfare. Given consumers that are heterogeneous with respect to their consumption needs and valuations, it illustrates which of them are prone to participate in a sharing economy and whether a retailer (or manufacturer) can benefit from the presence of a secondary exchange. A sharing market tends to increase the price of new products by a “sharing premium,” which positively depe...

67 citations


Journal ArticleDOI
TL;DR: This research followed a design science approach and incorporated collaboration engineering into the design of the treatment and found that trust was significantly improved in the treatment group and several trust antecedents were found to explain the development.
Abstract: Trust is frequently investigated as an indicator of a mutual relationship. Trust is especially important for globally distributed collaboration in light of the lack of face-to-face interactions. As the perception of trust is a dynamic process, however, little research is conducted measuring trust development. Whether facilitation intervention is beneficial for trust development is also unknown. In order to fill the research gaps, we followed a design science approach and incorporated collaboration engineering into the design of the treatment. Data were collected in a series of experiments with Chinese and U.S. mixed teams, including a longitudinal survey, interviews, and documentation. Through the comparison of the treatment group with the control group, we found that trust was significantly improved in the treatment group. In addition, several trust antecedents were found to explain the development. The power of facilitated collaboration is also validated as helpful for trust development. This re...

Journal ArticleDOI
TL;DR: In this paper, the authors investigated the impact of online user reviews and professional reviews on online user decision making and found that a higher professional rating not only directly promotes software download but also results in more active user-generated word-of-mouth interactions, which indirectly leads to more downloads.
Abstract: With the broad reach of the Internet, online users frequently resort to various word-of-mouth (WOM) sources, such as online user reviews and professional reviews, during online decision making. Although prior studies generally agree on the importance of online WOM, we have little knowledge of the interplay between online user reviews and professional reviews. This paper empirically investigates a mediation model in which online user reviews mediate the impact of professional reviews on online user decisions. Using software download data, we show that a higher professional rating not only directly promotes software download but also results in more active user-generated WOM interactions, which indirectly lead to more downloads. The indirect impact of professional reviews can be as large as 20 percent of the corresponding total impact. These findings deepen our understanding of online WOM effect, and provide managerial suggestions about WOM marketing and the prediction of online user choices.

Journal ArticleDOI
TL;DR: In mature online markets like the United States, online shopping appears to be treated as just another form of shopping, but in China, if an online vendor can establish a reputation for quality, consumers appear to treat those merchants much as Americans do their own favorite online vendors, despite problems with Chinese shopping more generally.
Abstract: Trust underlies much of the online shopping behavior. We compare trust in online shopping in four countries: (1) the United States, a mature online market; (2) Germany; (3) China, the fastest growi...

Journal ArticleDOI
TL;DR: In this paper, a key contributor to the failure of warning messages is habituation: decrease in warning messages, which leads to ineffective warning messages and a lack of trust in the warning messages.
Abstract: Warning messages are fundamental to users’ security interactions. Unfortunately, they are largely ineffective, as shown by prior research. A key contributor to this failure is habituation: decrease...

Journal ArticleDOI
TL;DR: The proposed approach to Twitter sentiment analysis for brands using supervised feature engineering and the dynamic architecture for artificial neural networks outperforms state-of-the-art systems by wide margins and demonstrates the tweet feature representations, though consisting of only seven dimensions, are highly effective in capturing indicators of Twitter sentiment expression.
Abstract: Social media communications offer valuable feedback to firms about their brands. We present a targeted approach to Twitter sentiment analysis for brands using supervised feature engineering and the dynamic architecture for artificial neural networks. The proposed approach addresses challenges associated with the unique characteristics of the Twitter language and brand-related tweet sentiment class distribution. We demonstrate its effectiveness on Twitter data sets related to two distinctive brands. The supervised feature engineering for brands offers final tweet feature representations of only seven dimensions with greater feature density. Reducing the dimensionality of the representations reduces the complexity of the classification problem and feature sparsity. Two sets of experiments are conducted for each brand in three-class and five-class tweet sentiment classification. We examine five-class classification to target the mild sentiment expressions that are of particular interest to firms and ...

Journal ArticleDOI
TL;DR: The AZSecure text mining system has developed and identified the famous carder, Rescator, who was affiliated with the Target breach, and captured important seller characteristics in terms of product type, payment options, and contact channels.
Abstract: The past few years have witnessed millions of credit/debit cards flowing through the underground economy and ultimately causing significant financial loss. Examining key underground economy sellers has both practical and academic significance for cybercrime forensics and criminology research. Drawing on social media analytics, we have developed the AZSecure text mining system for identifying and profiling key sellers. The system identifies sellers using sentiment analysis of customer reviews and profiles sellers using topic modeling of advertisements. We evaluated the AZSecure system on eight international underground economy forums. The system significantly outperformed all benchmark machine-learning methods on identifying advertisement threads, classifying customer review sentiments, and profiling seller characteristics, with an average F-measure of about 80 percent to 90 percent. In our case study, we identified the famous carder, Rescator, who was affiliated with the Target breach, and capture...

Journal ArticleDOI
TL;DR: This work uses the extended Cox model to scrutinize cybercriminal IRC participation for better understanding of behaviors exhibited by cybercriminals of importance and results indicate that key cyber Criminals may be quickly identifiable by assessing the scale of their interaction and networks with other participants.
Abstract: To further cybersecurity, there is interest in studying online cybercriminal communities to learn more about emerging cyber threats. Literature documents the existence of many online Internet Relay Chat (IRC) cybercriminal communities where cybercriminals congregate and share hacking tools, malware, and more. However, many cybercriminal community participants appear unskilled and have fleeting interests, making it difficult to detect potential long-term or key participants. This is a challenge for researchers and practitioners to quickly identify cybercriminals that may provide credible threat intelligence. Thus, we propose a computational approach to analyze cybercriminals IRC communities in order to identify potential long-term and key participants. We use the extended Cox model to scrutinize cybercriminal IRC participation for better understanding of behaviors exhibited by cybercriminals of importance. Results indicate that key cybercriminals may be quickly identifiable by assessing the scale o...

Journal ArticleDOI
TL;DR: A model that explains how online customer behavior is influenced by a firm’s recovery endeavors when privacy breaches occur is developed and tested and shows that three types of justice perceptions, distributive, procedural, and interactional justice, jointly affect psychological responses.
Abstract: The soaring number of privacy breaches has prompted affected firms to learn how to effectively recover damaged customer relationships. In this study we develop and test a model that explains how on...

Journal ArticleDOI
TL;DR: The market equilibria is derived and it is shown that when a firm’s core product has a sufficient advantage in product quality, it is better for this firm to sell the bundle but for the other to use free strategy, and that the profitability of the firm that offers a free product always increases in network effects intensity and market size, but this is not the case for the company that sells the bundle.
Abstract: Many software firms, especially mobile app providers, offer perpetually free basic products to users, but premiums are charged for access to the additional features or functionalities. While the free offering helps capture potential customers, it might cannibalize the sales of premium goods or services. This paper adopts a game theoretical approach to examine the impact of free offering on the competition between two firms in the presence of network effects. The firms can either offer a free core product and a paid service or offer them as a bundle. The core product has stand-alone value and can be used separately but the value-added service has no value without the core product. We derive the market equilibria and present conditions under which the free offering strategy outperforms the bundling strategy. We show that when a firm’s core product has a sufficient advantage in product quality, it is better for this firm to sell the bundle but for the other to use free strategy. However, if the core ...

Journal ArticleDOI
TL;DR: It is suggested that certain language-action cues (e.g., cognitive load, affective process, latency, and wordiness) reveal patterns of information behavior manifested by deceivers in spontaneous online communication and computational approaches to analyzing these language-actions can provide significant accuracy in detecting computer-mediated deception.
Abstract: Computer-mediated deception threatens the security of online users’ private and personal information. Previous research confirms that humans are bad lie detectors, while demonstrating that certain observable linguistic features can provide crucial cues to detect deception. We designed and conducted an experiment that creates spontaneous deception scenarios in an interactive online game environment. Logistic regression, and certain classification methodologies were applied to analyzing data collected during fall 2014 through spring 2015. Our findings suggest that certain language-action cues (e.g., cognitive load, affective process, latency, and wordiness) reveal patterns of information behavior manifested by deceivers in spontaneous online communication. Moreover, computational approaches to analyzing these language-action cues can provide significant accuracy in detecting computer-mediated deception.

Journal ArticleDOI
TL;DR: It is found that, as compared to unaided individuals, IT-enabled stimuli providers enhance individual creativity more than process guides and mind mappers and the underlying creative process, stimuli providers push individuals to explore their knowledge base more deeply and more broadly, leading to more novel but, unexpectedly, also more useful ideas.
Abstract: We investigate the effectiveness of three types of IT-enabled cognitive stimulation tools for enhancing creative problem solving: mind mappers, process guides, and stimuli providers. Based on the dual pathway to creativity models, the authors examine the extent to which these tools are capable of stimulating individuals to explore their knowledge base more deeply (i.e., the persistence pathway) and more broadly (i.e., the flexibility pathway) and, hence, help to produce more novel ideas. In a laboratory study with business students, they find that, as compared to unaided individuals, IT-enabled stimuli providers enhance individual creativity more than process guides and mind mappers. As for the underlying creative process, stimuli providers push individuals to explore their knowledge base more deeply and more broadly, leading to more novel but, unexpectedly, also more useful ideas. The reported findings may facilitate the development of creativity support systems and their assignment to individual...

Journal ArticleDOI
TL;DR: The results of this study studied groups that used computer-mediated communication to investigate whether collective intelligence is similar or different when groups work using CMC, suggesting that collective intelligence manifests itself differently depending on context.
Abstract: Organizations increasingly use virtual groups for many types of work, yet little research has examined factors that make groups perform better across multiple different types of tasks. Previous research has proposed that groups, like individuals, have a general factor of collective intelligence, an ability to perform consistently across multiple types of tasks. We studied groups that used computer-mediated communication (CMC) to investigate whether collective intelligence is similar or different when groups work using CMC. A collective intelligence factor did not emerge among groups using CMC, suggesting that collective intelligence manifests itself differently depending on context. This is in contrast to previous findings. Our results surface a need for more research on boundary conditions of the construct of collective intelligence. Our findings also have practical implications: managers should take care when organizing virtual group work because groups that perform well on one type of task will...

Journal ArticleDOI
TL;DR: It is shown that restaurants with a relatively low prior average rating and a relatively small review volume have improved their online reputations by offering Groupon promotion, and the results underscore the substantial heterogeneity in the effect of deal promotion on local merchants’ online reputation.
Abstract: It is by now almost accepted as a stylized fact that offering deal promotion (such as via Groupon or LivingSocial) deteriorates local merchants’ online reputations (e.g., the average of Yelp review ratings). However, in this paper we show that the stylized fact is not true in certain circumstances. We theorize that the valence and volume of prior reviews can play an important moderating role in the effect of deal promotion. Empirically, we show that restaurants with a relatively low prior average rating and a relatively small review volume have improved their online reputations by offering Groupon promotion. The proportion of such restaurants is substantial. The findings are robust to multiple identification strategies and econometric specifications. The results underscore the substantial heterogeneity in the effect of deal promotion on local merchants’ online reputations. Merchants need to understand the moderating role of prior reviews (e.g., the valence and volume of prior reviews) and design a...

Journal ArticleDOI
TL;DR: New ways for IT and innovation researchers to explore social behavior in IT diffusion processes are offered to consider the merits or risks of such behavior alongside the conventional rational approach (i.e., evaluation) are offered.
Abstract: Enterprise resource planning (ERP) software is a platform for innovation with high failure rates due to its complexity. In China, failure rates of ERP are also high, with key differences between Ch...

Journal ArticleDOI
TL;DR: Text mining is employed to analyze 133 real-world cases of offenders from military units, intelligence agencies, and business organizations with data available to the public in order to identify common characteristics of a large number of malicious insiders.
Abstract: Malicious insiders continue to pose a great threat to organizations. With their knowledge and access to organizational resources, malicious insiders could launch attacks more easily that result in more damaging impacts compared to outsiders. However, empirical research about malicious insiders is rare due to the unavailability of data. With few exceptions, many studies focus on a small number of cases. In order to identify common characteristics of a large number of malicious insiders, this study employs text mining to analyze 133 real-world cases of offenders from military units, intelligence agencies, and business organizations with data available to the public. Contributions of this study reside in two aspects: first, we use public data from documented malicious insider cases, implying a potentially valuable data source for future studies in this domain; second, we validate malicious insider characteristics identified in previous research, thereby establishing a foundation for more comprehensiv...

Journal ArticleDOI
TL;DR: In this article, the role of channel influence and other network parameters in initiating word-of-mouth communications (WOM) communications was investigated and it was shown that factors related to a channel's ability to be a connector and a translator is most likely to result in the incidence of WOM.
Abstract: Motivated by the rise of social media platforms that achieve a fusion of content and community, we consider the role of word-of-mouth communications (WOM) structured through a network. Using a data set from YouTube, we examine how cascades of WOM interactions enhance the popularity of videos. We first estimate the impact of channel influence and other network parameters in initiating WOM communications. The probit estimation considers the selection effect in videos that are likely to be associated with a greater propensity to trigger WOM. We find that factors related to a channel’s ability to be a connector and a translator is most likely to result in the incidence of WOM. We then examine how cascades of WOM conversations have persistent impacts on subsequent video popularity. Empirically, the main issue here is heterogeneity in the epidemic potential of a video. Since the threshold might vary across videos, we use a finite mixture model. We also conduct a simultaneous estimation using latent inst...

Journal ArticleDOI
TL;DR: In this article, the authors build an empirical model of social link creation that incorporates individual characteristics and pairwise user similarities, and define four user proximity measures from biography, geography, mobility, and short messages.
Abstract: This article studies the strategic network formation in a location-based social network. We build an empirical model of social link creation that incorporates individual characteristics and pairwise user similarities. Specifically, we define four user proximity measures from biography, geography, mobility, and short messages. To construct proximity from unstructured text information, we build topic models using Latent Dirichlet Allocation. Using Gowalla data with 385,306 users, 3 million locations, and 35 million check-in records, we empirically estimate the model to find evidence on the homophily effect on network formation. To cope with possible endogeneity issues, we use exogenous weather shocks as our instrumental variables and find the empirical results are robust: network formation decisions are significantly affected by our proximity measures.

Journal ArticleDOI
TL;DR: The results show that by shifting from the control-oriented view of governance in the private sector to a more mediating view in the public sector, important practices may be portable between the public and private sector, despite their widely differing structures.
Abstract: In the private sector, research on information technology (IT) governance has frequently applied the classical view of agency theory and focused on the controlling role played by the board of direc...

Journal ArticleDOI
TL;DR: This work applies automated text analysis to archival e-mail exchanges in a CMC system to assess the ability of word use, message development, and intertextual exchange cues to detect severe deception by business partners, and empirically assess the predictive ability of the proposed framework using an ordinal multilevel regression model.
Abstract: Safeguarding organizations against opportunism and severe deception in computer-mediated communication (CMC) presents a major challenge to CIOs and IT managers. New insights into linguistic cues of deception derive from the speech acts innate to CMC. Applying automated text analysis to archival email exchanges in a CMC system as part of a reward program, we assess the ability of word use (micro-level), message development (macro-level), and intertextual exchange cues (meta-level) to detect severe deception by business partners. We empirically assess the predictive ability of our framework using an ordinal multilevel regression model. Results indicate that deceivers minimize the use of referencing and self-deprecation but include more superfluous descriptions and flattery. Deceitful channel partners also over structure their arguments and rapidly mimic the linguistic style of the account manager across dyadic e-mail exchanges. Thanks to its diagnostic value, the proposed framework can support firms’ decision-making and guide compliance monitoring system development.

Journal ArticleDOI
TL;DR: This work shows how the design features significantly influence outcomes and patients’ positive views of the design’s value and use and the design science approach to design AVDO based on the extension of media naturalness (MN) theory.
Abstract: Motivated by rising demands for medical care and the recent trends in medical care delivery, this work designs, develops, and evaluates the augmented virtual doctor office (AVDO). AVDO is intended to provide group medical visits in cyberspace (Cyber GMV). This research adopts the design science approach to design AVDO based on the extension of media naturalness (MN) theory. AVDO is implemented in an augmented world setting that integrates real visual cues with a virtual-world technology (Second Life® in this case). The assessment of AVDO is carried out in two ways: (1) through a synthesis of the extended MN theory and technology acceptance theories to assess the relationships of design features as perceived by patients with outcomes that include understanding, perceived effectiveness, trust, and behavior intentions, and (2) through the assessment of AVDO’s proof of value and proof of use as a supplementary channel for the delivery of medical care. Our work shows how the design features significant...