[AISWorld] The Journal of Computer Information System - Volume 55, Issue 1

Alex Koohang (JCIS) jcis at iacis.org
Thu Nov 6 22:11:19 EST 2014


See below the latest issue of the Journal of Computer Information System -
Volume 55, Issue 1.  Three complementary articles are included.


The Journal of Computer Information Systems (JCIS) is indexed in Science
Citation Index Expanded (SCI-Expanded), Science Citation Index (SCI),
Academic Search Premier (EBSCO), Proquest ABI/INFORM Global, Scopus, and
Wilson Humanities Index (Wilson).


Alex Koohang, Editor-in-Chief
Peyton Anderson Eminent Scholar and Endowed Chair in IT
Professor of Information Technology

Volume 55, Issue 1
------------------------------
Complimentary Article - Full Text PDF
<http://iacis.org/jcis/articles/JCIS55-1-1.pdf>

UNDERSTANDING IT ENTREPRENEURIAL INTENTION: AN INFORMATION SYSTEMS VIEW

Liqiang Chen

Abstract: IT (Information Technology) entrepreneurs have been contributing
greatly to economic growth and job creation. Despite this, IT
entrepreneurship remains understudied in business research. In particular,
studying IT entrepreneurial behavior has been ignored in both Information
Systems (IS) and entrepreneurship disciplines. This study for the first
time empirically examines IT entrepreneurial behavior and its antecedent
factors from the IS discipline. The findings suggest that two key IS
constructs, personal innovativeness in IT (PIIT) and computer self-efficacy
(CSE), respectively, have direct and indirect influences on IT
entrepreneurial intention. As the first step of a research effort, this
study calls for more empirical studies on IT entrepreneurial behavior from
the IS discipline. The study concludes with discussion of the limitations
and suggestions for future research.

Keywords: IT entrepreneurial intention; Personal innovativeness in IT
(PIIT); Computer self-efficacy (CSE); Entrepreneurial self-efficacy (CSE);
Risk propensity

pp. 2-12
------------------------------
Complimentary Article - Full Text PDF
<http://iacis.org/jcis/articles/JCIS55-1-2.pdf>

TRUST-DISCOUNT TRADEOFF IN THREE CONTEXTS: FRUGALITY MODERATING PRIVACY AND
SECURITY CONCERNS

Gaurav Bansal     Fatemeh Mariam Zahedi

Abstract: This study examines the role individuals’ frugality plays in
moderating the impact of privacy and security concerns on trust-discount
tradeoff. Trust-discount tradeoff measures a user’s intention on a
continuum to transact with a higher-trust, higher-premium website as
opposed to lower-trust, higher-discount website. The hypotheses are
examined in three different contexts: e-commerce, health and finance. The
findings suggest that frugality does moderate the impact of privacy and
security concerns on trust-discount tradeoff in all three contexts, such
that security concern is positively associated with preference for
higher-trust, higher-premium websites for individuals with a high level of
frugality, and that privacy concern is positively associated with
preference for higher-trust, higher-premium websites for individuals with a
low level of frugality. However, the subsequent analysis reveals that the
reasons for the above moderating impact differ depending upon the
underlying contextual sensitivity. This study is one of the first to
provide contextual examination of the role of frugality, privacy and
security concerns in trust-discount tradeoff.

Keywords: Security Concern, Privacy Concern, Frugality, Trust, Tradeoff,
Discount, Context

pp. 13-29
------------------------------
Complimentary Article - Full Text PDF
<http://iacis.org/jcis/articles/JCIS55-1-3.pdf>

REDESIGNING THE INFORMATION SYSTEMS ANALYSIS AND DESIGN COURSE: CURRICULUM
RENEWAL

Shouhong Wang     Hai Wang

Abstract: To meet the challenge of stable low enrollments in the Management
Information System (MIS) programs, the renewal of the MIS curriculum and
the pedagogies is imperative. While the MIS renewal strategies vary
depending upon the university programs, the redesign MIS major courses for
all business majors can be a feasible approach to increasing the enrollment
of MIS courses in the business programs where many business majors demand
advanced information technology courses. This paper presents a case of
redesign of the information systems analysis and design course for all
business majors. It explains the motivation of redesign, the major
consideration of redesign, and the implementation of redesign of this
course. Our preliminary study for the assessment of the redesigned course
has indicated that the information systems analysis and design course can
be a valuable MIS elective course for all non-MIS majors.

Keywords: Curriculum, course redesign, information systems analysis and
design.

pp. 30-39
------------------------------
COMPARING PERCEPTIONS OF THE SYSTEMS ANALYSIS AND DESIGN COURSE

Brandi Guidry     David P. Stevens

Abstract: Information Systems (IS) practitioners and educators have equal
interest in the content of the Systems Analysis and Design Course (“SAD”).
Previous research has examined instructors’ perceptions regarding the
skills and topics that are most important in the teaching of the SAD course
and the class time devoted to each. A similar assessment evaluated SAD
course content from a practitioner perspective. Both studies used entropy
calculations. A comparison of these studies is presented in this paper. For
traditional topics, the group (either faculty or practitioner) with greater
agreement believes the topic to be deserving of less class time. For
structured and object-oriented topics, the group with the greater agreement
also believes the topic to be of greater importance. This analysis
demonstrates that practitioners and academics agree on approximately 40% of
the SAD skills and knowledge areas.

Keywords: Systems analysis and design, Structured analysis, Object-oriented
analysis, Management Information Systems curricula, Entropy

pp. 40-47
------------------------------
MOBILE DEVICE ADAPTATION EFFORTS: THE IMPACT OF HEDONIC AND UTILITARIAN
VALUE

Dwayne Whitten     Ross Hightower     Lutfus Sayeed

Abstract: This research delves into the acceptance and use of mobile device
(MD) technology and goes beyond what is provided in the technology
acceptance literature. The hedonic and utilitarian value that an individual
assigns to a mobile device can have a significant impact on the overall
value of the device to that person. For those individuals that see the high
value of the mobile devices, a high degree of opportunity for utilizing the
mobile device is seen. Further, those who see the opportunities that exist
with the mobile devices place an added amount of effort into using the
device. In addition, it was determined that for those individuals
perceiving greater control by the organization, more user adaptation effort
was put forth. The impact of this organizational-level study could have an
impact on the use of MDs within an organization as well as the efforts used
by employees related to MD use.

Keywords: Mobile device, hedonic, utilitarian, technology acceptance,
technology adaptation, PLS

pp. 48-58
------------------------------
INFORMATION TECHNOLOGY AND HUMAN FACTORS AFFECTING ACTIVE MEDICATION LIST
ACCURACY

Robert J. Boncella     Wenying Sun     Carol Boncella

Abstract: In this paper, the sociotechnical theoretical lens was taken to
identify the human and the technology factors that affect the accuracy of
the Active Medication List (AML). A multi-method multi-study approach was
used. In Study 1, a case study was conducted and research hypotheses were
developed based on the results. In Study 2, nurses, physicians, and
pharmacists in three hospitals were surveyed to empirically test the
research model developed in Study 1. In Study 3, a qualitative analysis on
the comments from the survey was performed. The research results suggest
the two human factors, list taker and list source, have significant effects
on the accuracy of the AML. Of the two information technology factors, user
interface design is significant but system connectivity is not. In
scenarios like AML accuracy, human factors play a more important role than
technology factors.

Keywords: EHR, Active Medication List, human factors, technology factors

pp. 59-69
------------------------------
SUSTAINABILITY-FOCUSED KNOWLEDGE MANAGEMENT IN A GLOBAL ENTERPRISE

William Spangler     Robert Sroufe     Matthew Madia     Jyothsna
Singadivakkam

Abstract: Large industrial companies pursuing a strategy of ‘green’
management practices are required to balance competing interests among
stakeholders while also managing the complex impact of their operations on
the environment. We conducted a field study of the specific information
challenges facing a global Fortune 150 industrial enterprise and the extent
to which those challenges impact its sustainability efforts. We present our
analysis of these challenges within the broader context of a distributed
knowledge management (KM) framework based on the existing
Belief¬Action-Outcome (BAO) model [39], extended through the use of
Enterprise Social Networking and Web 2.0. Our framework includes aspects of
complex adaptive systems as well as a proposed set of specific technologies
that can be deployed within the framework. These technologies include
business intelligence enabled through mobile devices, tools for
collaboration and social networking, and data visualization.

Keywords: Sustainability, Knowledge Management, Belief¬Action-Outcome,
Social Networking

pp. 70-82
------------------------------
THREAT PROTECTION AND CONVENIENCE: ANTECEDENTS OF CLOUD-BASED DATA BACKUP

Philip Menard     Robert Gatlin     Merrill Warkentin

Abstract: Data loss represents a significant threat to individuals and
organizations. Based on Protection Motivation Theory (PMT) and service
convenience literature, a theoretical model is developed to empirically
assess how the threat of data loss and the convenience of cloud-based
backup solutions affect a user’s intentions to adopt the cloud as a
sufficient backup alternative. The factorial survey method was employed,
using realistic vignettes to orthogonally manipulate the independent
variables and offer more experimental control. Hypotheses were tested using
152 individuals recruited from a large southeastern university. Results
from the study indicate that users who perceive the cloud to seamlessly
back up their data with minimal effort and replicate their data across all
of their devices are more likely to adopt the cloud for data backups.
Further, it is determined that individuals who feel they are more
vulnerable to data loss and perceive the data loss as severe will also
leverage the cloud when backing up their data. Convenience is more
influential than threat perceptions when individuals are evaluating cloud
adoption, providing implications for individual users exploring the
possibility of cloud-based storage solutions.

Keywords: cloud backups, data security, convenience, factorial survey method

pp. 83-91
------------------------------
USING SOCIAL TECHNOLOGIES FOR COMPETITIVE ADVANTAGE: IMPACT ON
ORGANIZATIONS AND HIGHER EDUCATION

Jeretta Horn Nord     Joanna Paliszkiewicz     Alex Koohang

Abstract: The number of individuals engaging in social technologies for
both personal and business reasons is staggering. This phenomenon is
growing exponentially and fast becoming an integrated, cross platform
experience which will impact every individual online. Social technologies
used specifically by organizations for business support, the purposes and
the benefits realized are addressed in this paper. Based on research
results and a review of related literature, two issues are addressed: 1)
How organizations can rethink their social strategy to gain competitive
advantage; and 2) How social technologies education should be incorporated
into the curriculum so students are prepared for life beyond graduation.

Keywords: Social Technologies; Social Technology; Social Media; Facebook;
Twitter; LinkedIn; YouTube; Curriculum; Education; Social Strategy,
Organizations

pp. 92-104
------------------------------
BENEFITS AND BARRIERS TO CORPORATE PERFORMANCE MANAGEMENT SYSTEMS

William Yeoh     Gregory Richards     Shan Wang

Abstract: Corporate performance management (CPM) systems using business
intelligence technologies can help enterprises monitor and manage business
performance. In this research, we explored and presented empirical evidence
on the key benefits of, and barriers to, the use of CPM systems through a
survey of 283 organisations across North America and China. We identified
three key benefits (strategy execution, process efficiency, and fact-based
decision-making) and ten inhibiting barriers under respective project and
organisational dimensions. Moreover, we found that in regard to the use of
CPM systems, Chinese organisations perceived higher benefits, as well as
higher barriers, than did their counterparts in North America. The
socio-cultural differences between the two regions explain these issues.
The research findings are useful for multinational organisations that are
planning, or are in the process of implementing or reviewing their CPM
systems, as well as for consulting companies that are assisting with such
systems implementation in different regions.

Keywords: Corporate performance management system, Business intelligence,
Benefits, Barriers, North America, China, Empirical study

pp. 105-116
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20141106/b8b38966/attachment.html>


More information about the AISWorld mailing list