[AISWorld] New Issue: The Journal of Organizational Computing and Electronic Commerce

Holsapple, Clyde W cwhols at email.uky.edu
Thu May 24 14:08:57 EDT 2012


Dear Colleagues:

I am pleased to announce publication of Volume 22, Issue 2 of the

Journal of Organizational Computing and Electronic Commerce<http://www.informaworld.com/smpp/title~db=all~content=t775653688>

Abstracted/indexed in:
ISI Science Citation Index; ISI Science Citation Index Expanded;
Journal Citation Reports: Science - Computing & Technology; Scopus;
INSPEC; Cabell's Directory; PsycINFO/Psychological Abstracts.


Silence or Knowing in IT-Facilitated Face-to-Face Meetings

Arjan Raven
Omar A. El Sawy

An increasing proportion of work in organizations has shifted from repetitive, structured, individually focused activities to what is now known as knowledge work. This has been accompanied by a stronger need for collaboration and coordination as well as new information technology (IT) tools. It has changed the nature of face-to-face meetings and the ways in which IT can support them. This study investigates how shared knowledge creation (SKC) operates and is supported by IT in face-to-face meetings. Two scenarios, "Silence" and "Knowing," are used to illustrate the extremes of the types of collaboration that can take place. The article extends Wenger's theory of communities of practice to the domain of IT-facilitated face-to-face meetings. It develops and operationalizes the community-behavior constructs of participation and documentation reification in this context. The article develops a number of hypotheses around SKC effectiveness. The hypotheses are tested in the context of new product development practices in two companies.

The empirical results show that community behavior leads to higher speed of SKC and higher quality of output from SKC. The study further indicates that IT tools affect participation and documentation reification differently. IT tools are shown to only work for participation during formal meetings. The study shows the importance for a team to act as a community of practice in the SKC environment as well as the need for new IT tools and the better use of existing tools. The article concludes with implications for practice and research for IT support in face-to-face meetings.



Are You Still with Us?
A Study of the Post-Adoption Determinants of Sustained Use of Mobile-Banking Services

Hyunjeong Kang
Min Jae Lee
Jin Kyu Lee

This research develops and empirically tests a theoretical model that explains sustained use of mobile banking services. While an extensive array of research has examined various theoretical antecedents of the intention to adopt and use new technologies, only a handful of studies have examined the extent of current usage of a system. Moreover, despite the huge market potential of and recent technological advancements seen in the mobile-commerce market, little is known about the factors that can influence sustained use of integrated mobile financial services after adoption. The present research examines the extent of mobile banking service usage of 370 Korean mobile-baking users in the post-adoption stage. The results of the study indicate that perceived usability, channel preference, and perceived value are three major determinants of sustained mobile banking use. The model further extends and explains that good menu design is a dominant factor in perceived usability of m-banking services, while low monetary costs (i.e., charges and fees) and provision of various banking functions can improve m-banking users' perception of the value of m-banking services. Along with the suggested model, the presented case of factors promoting successful m-banking services will help many mobile industries around the world envisage a successful and stable mobile-financial services market and accelerate their development. Implications of the findings and future research directions are also discussed.


eBay as the "Terminator":
Determining User Suspension from Feedback Ratings



Stephen C. Hayne

Haonan Wang

Sybil Mendonca

Good reputations are won and lost by individuals and companies in various forms on the Internet. eBay has the earliest and most well-known formal ecommerce reputation system and "terminates" members who do not play by the rules. We examine a dataset of 102,035 Not-A-Registered-User (NARU) eBay account feedback ratings from eight different countries. Careful investigation of feedback density over time reveals that threshold values for termination can be detected from feedback history. Several modeling approaches are studied and the Local Polynomial Regression Model (LPRM) is chosen for analysis because it is data driven and no prespecified parametric functional form is assumed. Analyzing US data, we find that large-volume sellers have a higher overall negative feedback compared to those of medium volume sellers. We use the second derivative of the LPRM to explicitly determine the threshold points, that is, the point where a seller's negative feedback increases significantly. These thresholds vary from as much as 18.5 weeks prior to termination (for Medium sellers), to as little as 8.5 weeks (for Large sellers). We find similar results in the other countries. These threshold points provide valuable information for buyers when choosing a seller. Our analysis suggests that eBay's termination policy appears to be correlated to fee revenue.


Context-Sensitive Access Control Model for Government Services


Stevan Gostojić

Goran Sladić

Branko Milosavljević

Zora Konjović

During the past two decades, e-government information systems have become less paper-based and more computer-based. Those information systems usually take the form of workflow systems. Due to the large social impact of e-government systems, computer security plays a pivotal role in ensuring its efficiency and effectiveness. Access control is one of the key aspects of computer security. Current access control models do not take into account the context of the system and its environment. In this article, we argue that a formal context-sensitive access control model can improve the development of e-government workflow systems and present a particular context-sensitive access control model. The subject of the article is a specification of the context-sensitive access control model for business processes (COBAC). By using a context-sensitive access control, it is possible to define more sophisticated access control policies that cannot be implemented by existing access control models. The COBAC's context is modeled using Web Ontology Language (OWL) in order to provide formal representation of context, rich representation of diverse contextual information, semantic interoperability between various context-aware systems, and a high degree of inference making. The presented model is applicable in different e-government systems, and supports the definition of access control policies for both simple and complex business processes. The model's prototype is verified by a case study on a real e-government business process-the national petty offense trial proceedings.

These articles are presently available at http://www.tandfonline.com/toc/hoce20/current

Please consider JOCEC as a possible outlet for your own high-quality innovative research dealing with multiparticipant, inter-personal, distributed, organizational, and inter-organizational digital systems.


Clyde W. Holsapple
Editor-in-Chief, Journal of Organizational Computing and Electronic Commerce<http://www.leaonline.com/loi/joce>
Gatton College of Business and Economics
University of Kentucky


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120524/60ae5cb8/attachment.htm>


More information about the AISWorld mailing list