Positions

Research Areas research areas

Overview

  • Khole L. Gwebu is an associate professor of decision sciences at the Peter T. Paul College of Business and Economics, University of New Hampshire. His research focuses on data security management, information privacy, and information technology adoption and use. His publications appear in the Journal of Management Information Systems, Journal of Strategic Information Systems and Decision Support Systems, among others.
  • Selected Publications

    Academic Article

    Year Title
    2024 Differential Market Reaction to Data Security Breaches: A Screening PerspectiveCommunications of the Association for Information Systems.  54:376-401. 2024
    2021 Can warnings curb the spread of fake news? The interplay between warning, trust and confirmation biasBehaviour and Information Technology.  41:3552-3573. 2021
    2020 Data breaches in hospitality: is the industry different?Journal of Hospitality and Tourism Technology.  11:511-527. 2020
    2020 Information security policy noncompliance: An integrative social influence modelInformation Systems Journal: an international journal promoting the study and practice of information systems.  30:220-269. 2020
    2019 Differential performance of science park firms: an integrative modelSmall Business Economics: an international journal.  52:193-211. 2019
    2018 The Role of Corporate Reputation and Crisis Response Strategies in Data Breach ManagementJournal of Management Information Systems.  35:683-714. 2018
    2015 Personal innovativeness in technology, related knowledge and experience, and entrepreneurial intentions in emerging technology industries: a process of causation or effectuation?The International Entrepreneurship and Management Journal.  11:529-555. 2015
    2014 Continued usage intention of multifunctional friend networking services: A test of a dual-process model using FacebookDecision Support Systems.  67:66-77. 2014
    2012 An experimental investigation into the effects of information revelation in multi-attribute reverse auctionsBehaviour and Information Technology.  31:631-644. 2012
    2011 Adoption of Open Source Software: The role of social identificationDecision Support Systems.  51:220-229. 2011
    2011 A Critical Analysis of Current Indexes for Digital Divide MeasurementThe Information Society.  27:16-28. 2011
    2011 Does IT outsourcing deliver economic value to firms?Operations Research Management Science.  51:391-391. 2011
    2011 EFFECTS OF PRICE RECOMMENDATIONS IN NAME-YOUR-OWN-PRICE AUCTIONSJournal of Electronic Commerce Research.  12:61-77. 2011
    2011 IMPACT OF VIRTUAL BRAND EXPERIENCE ON PURCHASE INTENTIONS: THE ROLE OF MULTICHANNEL CONGRUENCEJournal of Electronic Commerce Research.  12:302-319. 2011
    2011 Some experiments on subjective optimisationInternational Journal of Operational Research.  12:79-103. 2011
    2011 Strategy and Vendor Selection in IT Outsourcing: Is there a Method in the Madness?Journal of Global Information Technology Management.  14:6-26. 2011
    2011 Strategy and vendor selection in IT outsourcing: is there a method in the madness?Journal of Global Information Technology Management.  14:6-25. 2011
    2010 Seeing eye to eye? An exploratory study of free open source software users' perceptionsJournal of Systems and Software.  83:2287-2296. 2010
    2010 Does IT outsourcing deliver economic value to firms?Journal of Strategic Information Systems.  19:109-123. 2010
    2009 An application of agent-based simulation to knowledge sharingDecision Support Systems.  46:532-541. 2009
    2009 DECISION SUPPORT IN MULTI-ATTRIBUTE REVERSE AUCTIONSJournal of Electronic Commerce Research.  10:252-264. 2009
    2008 The Aftermath of Information Technology Outsourcing: An Empirical Study of Firm Performance Following Outsourcing DecisionsThe Journal of Information Systems.  22:125-159. 2008
    2007 The Role of Organizational, Environmental and Human Factors in E-Learning DiffusionInternational Journal of Web-Based Learning and Teaching Technologies.  2:59-78. 2007
    2007 A conceptual framework for understanding trust building and maintenance in virtual organizationsJITTA: Journal of Information Technology Theory and Application.  9:43-43. 2007
    Differential Market Reaction to Data Security Breaches: A Screening PerspectiveCommunications of the Association for Information Systems.  54:376-401.
    The Defining Features of a Robust Information Security ClimateComputers and Security.  142.

    Article

    Year Title
    2022 Linguistic Characteristics of Data Breach Disclosures: An Exploratory Study 2022
    2014 Users’ Extended and Exploratory Use of Software Services 2014
    2013 Understanding E-Learning Adoption and Post Adoption Intentions. 2013
    2013 Understanding E-Learning Adoption and Post Adoption Intentions 2013
    2012 Data Security Breach Impact and Disclosure. 2012
    Understanding E-Learning Adoption and Post Adoption Intentions.
    Users’ Extended and Exploratory Use of Software Services

    Chapter

    Year Title
    2017 Strategy and Vendor Selection in IT Outsourcing: Is There a Method in the Madness?.  451-477. 2017
    2008 Multi-Attribute Auctions: Research Challenges and Opportunities.  133-149. 2008
    2006 Establishing and sustaining trust in virtual organizations.  198-203. 2006
    2005 Constructing a multi-agent system: an architecture for a virtual marketplace 2005
    2005 Intelligent Decision Support Systems in Agent-Mediated Environments 105 GE Phillips-Wren andL. C. Jain (Eds.) IOS Press. 2005.  105-105. 2005

    Conference Paper

    Year Title
    2017 Stock Market Reaction to Data Breaches: The Moderating Role of Corporate Social ResponsibilityCyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2017 International Conference On. 1-2. 2017
    2014 Understanding the Cost associated with Data Security Breaches.PACIS. 386-386. 2014
    Designing Effective Misinformation Warning Labels: A Word-of-Mouth Perspective
    Science Parks and Firm Performance: The Moderating Role of Endowments and Environmental Conditions
    The Language of Privacy Policies: Uncovering Hidden Meaning with NLP

    Teaching Activities

  • Communication of Data Taught course
  • Communication of Data Taught course
  • Data Mgmt & Visualization Taught course
  • Management Information Systems Taught course
  • Communication of Data Taught course 2022
  • Data Mgmt & Visualization Taught course 2022
  • Management Information Systems Taught course 2022
  • Communication of Data Taught course 2021
  • E-Business Taught course 2021
  • Data Mgmt & Visualization Taught course 2021
  • Management Information Systems Taught course 2021
  • Topics/E-Business Taught course 2020
  • Communication of Data Taught course 2020
  • Data Mgmt & Visualization Taught course 2020
  • Management Information Systems Taught course 2020
  • Corporate Project Experience Taught course 2020
  • Independent Study Taught course 2020
  • E-Business Taught course 2019
  • PAUL Assessm't Core Knowledge Taught course 2019
  • Data Mgmt & Visualization Taught course 2019
  • Management Information Systems Taught course 2019
  • Management Information Systems Taught course 2019
  • PAUL Assessm't Core Knowledge Taught course 2019
  • Corporate Project Experience Taught course 2019
  • PAUL Assessm't Core Knowledge Taught course 2019
  • PAUL Assessm't Core Knowledge Taught course 2019
  • E-Business Taught course 2018
  • PAUL Assessm't Core Knowledge Taught course 2018
  • Management Information Systems Taught course 2018
  • Management Information Systems Taught course 2018
  • PAUL Assessm't Core Knowledge Taught course 2018
  • Corporate Project Experience Taught course 2018
  • Corporate Project Experience Taught course 2018
  • Corporate Project Experience Taught course 2018
  • PAUL Assessm't Core Knowledge Taught course 2018
  • PAUL Assessm't Core Knowledge Taught course 2018
  • E-Business Taught course 2017
  • E-Business Taught course 2017
  • PAUL Assessm't Core Knowledge Taught course 2017
  • Management Information Systems Taught course 2017
  • Management Information Systems Taught course 2017
  • Corporate Project Experience Taught course 2017
  • Corporate Project Experience Taught course 2017
  • Corporate Project Experience Taught course 2017
  • Independent Study Taught course 2017
  • Business Appl Development Taught course 2016
  • E-Business Taught course 2016
  • Management Information Systems Taught course 2016
  • Management Information Systems Taught course 2016
  • Corporate Project Experience Taught course 2016
  • Corporate Project Experience Taught course 2016
  • Corporate Project Experience Taught course 2016
  • Business Appl Development Taught course 2015
  • E-Business Strategies & Solutn Taught course 2015
  • Management Information Systems Taught course 2015
  • Corporate Project Experience Taught course 2015
  • Corporate Project Experience Taught course 2015
  • Info Sys &Enterprise Integratn Taught course 2015
  • Business Appl Development Taught course 2014
  • E-Business Strategies & Solutn Taught course 2014
  • Management Information Systems Taught course 2014
  • Corporate Project Experience Taught course 2014
  • Info Sys &Enterprise Integratn Taught course 2014
  • Info Sys &Enterprise Integratn Taught course 2014
  • Education And Training

  • B. Com. Accounting, National University of Lesotho
  • M.B.A. Management Information Systems, Kent State University
  • Ph.D. Management Information Systems, Kent State University
  • Full Name

  • Kholekile Gwebu