[AISWorld] Journal of Organizational and End User Computing. 24, 1, 2012 Abstracts

Mahmood, M. Adam mmahmood at utep.edu
Thu Dec 8 19:33:08 EST 2011


The contents of the latest issue of:
Journal of Organizational and End User Computing (JOEUC), an ISI-indexed Journal 
Official Publication of the Information Resources Management Association
Volume 24 Issue 1, January-March 2012
Published: Quarterly in Print and Electronically
ISSN: 1546-2234 EISSN: 1546-5012
Published by IGI Publishing, Hershey-New York, USA
www.igi-global.com/joeuc

Editor-in-Chief: M. Adam Mahmood, University of Texas at El Paso, USA

EDITORIAL NOTE

An extended version of the abstracts for the aforementioned JOEUC issue is provided below for your information and perusal.  If you would like to submit a manuscript to the journal for publication consideration, please consult the manuscript submission guidelines provided at http://www.igi-global.com/Files/AuthorEditor/guidelinessubmission.pdf.  After reviewing the guidelines, please send an electronic version of your manuscript to us.

PAPER ONE

Post-Acceptance Intentions and Behaviors: An Empirical Investigation of Information Technology Use and Innovation

Pamela E. Carter, North Carolina A&T State University, USA
Jason Bennett Thatcher, Clemson University, USA
Katherine M. Chudoba, Utah State University, USA
Kent Marett, Mississippi State University, USA

Due to its extensive use for the study of information technology adoption and use, the Technology Acceptance Model (TAM) serves as an ideal base model for the study of post-acceptance IT diffusion outcomes. The research presented in this paper incrementally builds on TAM-based research to gain meaningful insights into the potential differences individuals' exhibit in three types of diffusion outcomes in a post-acceptance context. The authors model and test the effects of perceived usefulness and perceived ease of use on intentions to use, intentions to explore, and trying to innovate - IT diffusion outcomes proposed as vital in a post-acceptance context. In addition to TAM predictive variables, the authors investigate how autonomy, a personal control factor, and subjective norms, a social factor, influence individuals' intentions toward and behaviors associated with technology use. The findings suggest cognitive intention outcomes are more likely to be influenced by technology-related factors, while behavioral outcomes are more likely to be influenced by social and personal control factors in post-acceptance contexts. Implications of the study for practice and future research are also discussed.

To obtain a copy of the entire article, click on the link below.
http://www.igi-global.com/article/post-acceptance-intentions-behaviors/61410 

To view a sample PDF of this article, click on the link below.
http://www.igi-global.com/viewtitlesample.aspx?id=61410 
PAPER TWO

IS Security Policy Violations: A Rational Choice Perspective

Anthony Vance, Brigham Young University, USA
Mikko Siponen, University of Oulu, Finland

Employee violations of IS security policies are reported as a key concern for organizations. Although behavioral research on IS security has received increasing attention from IS scholars, little empirical research has examined this problem. To address this research gap, the authors test a model based on Rational Choice Theory (RCT)-a prominent criminological theory not yet applied in IS-which explains, in terms of a utilitarian calculation, an individual's decision to commit a violation. Empirical results show that the effects of informal sanctions, moral beliefs, and perceived benefits convincingly explain employee IS security policy violations, while the effect of formal sanctions is insignificant. Based on these findings, the authors discuss several implications for research and practice.

To obtain a copy of the entire article, click on the link below.
http://www.igi-global.com/article/security-policy-violations/61411 

To view a sample PDF of this article, click on the link below.
http://www.igi-global.com/viewtitlesample.aspx?id=61411 

PAPER THREE

Typing Biometric Keypads: Combining Keystroke Time and Pressure Features to Improve Authentication

Benjamin Ngugi, Suffolk University, USA
Peter Tarasewich, Northeastern University, USA
Michael Recce, Jersey Institute of Technology, USA

Pervasive online applications are changing the way people perform routine activities. But while providing convenience to individuals and organizations, these applications can pose a significant remote user authentication challenge. Current authentication systems can be strengthened by adding an additional biometric layer to an existing authentication process. This paper addresses implementing such a solution by 1) presenting a novel biometric method that uses key-press pressure and timing patterns from a typed password to determine whether the person typing it is its true owner (even with a compromised PIN); and 2) investigating differences in perceptions of biometric keypads between two user groups, nursing and computing majors. Results reveal that combining pressure and timing patterns leads to better authentication compared with timing patterns alone. Furthermore, nursing majors are more cautious in accepting biometric keypad technology than computing majors, suggesting that care must be taken when introducing such technologies to different groups of people.

To obtain a copy of the entire article, click on the link below.
http://www.igi-global.com/article/typing-biometric-keypads/61412 

To view a sample PDF of this article, click on the link below.
http://www.igi-global.com/viewtitlesample.aspx?id=61412 

PAPER FOUR

Technology-Mediated Collaboration, Shared Mental Model and Task Performance

Hayward P. Andres, North Carolina A&T State University, USA

This study takes a direct observation research approach to examine how the impact of collaboration mode on team productivity and process satisfaction is mediated by shared mental model. Team cognition and social impact theories are integrated to provide a framework for explaining how technology-mediated collaboration constrains or enhances team shared mental model development and its subsequent impact on task outcomes. Partial least squares analysis revealed that technology-mediated collaboration impacts shared mental model development. The results also demonstrate that timely and accurate development of shared mental model facilitates increases in both productivity and team process satisfaction. Direct observation of team process behaviors suggests that collaboration modes differ not only in their impact on communication facilitation but efficacy-based, motivational, and social influence factors (e.g., self-efficacy and team-efficacy, perceived salience and credibility of contributions, social influence on action, etc.) as well. Shared mental model development requires quality communication among team members that are motivated to participate by a positive team climate that promotes idea convergence.

To obtain a copy of the entire article, click on the link below.
http://www.igi-global.com/article/technology-mediated-collaboration-shared-mental/61413 

To view a sample PDF of this article, click on the link below.
http://www.igi-global.com/viewtitlesample.aspx?id=61413

PAPER FIVE

Exploring Choice as an Antecedent to Behavior: Incorporating Alternatives into the Technology Acceptance Process

Miguel I. Aguirre-Urreta, DePaul University, USA
George M. Marakas, University of Kansas, USA

In this paper, the authors conduct a study to explore the evaluation and choice between candidate software applications. Using business professionals, technology adoption is investigated by presenting participants with an alternative choice set using software applications relevant to the professional domain of the subjects. Results from this study, focusing on models of intentions, provide evidence to suggest the underlying process by which choice behaviors are determined and demonstrate the value of incorporating choice into models of technology adoption, particularly in situations where selection is made from a set of candidate technologies, such as in an organizational adoption decision. In addition, theoretically derived models of comparison processes are examined to develop further understanding into how individuals arrive at a specific choice behavior. A second study is conducted to further validate the obtained results. Implications for future research into the processes leading to adoption of information technologies are also presented.

To obtain a copy of the entire article, click on the link below.
http://www.igi-global.com/article/exploring-choice-antecedent-behavior/61414 

To view a sample PDF of this article, click on the link below.
http://www.igi-global.com/viewtitlesample.aspx?id=61414 

This journal is also included in the IGI Global aggregated "InfoSci-Journals" database: http://www.igi-global.com/EResources/InfoSciJournals.aspx. 

Happy holidays!

Sincerely,

M. Adam Mahmood






More information about the AISWorld mailing list