<div dir="ltr">This email includes references (with abstracts) of the articles published in the Journal of Computer Information Systems - Volume 54 Issues 1, 2, 3, & 4. Full-text of some of these articles are available from <a href="http://www.iacis.org/jcis/jcis.php">http://www.iacis.org/jcis/jcis.php</a> and embedded in this email.<div><br></div><div>Journal of Computer Information Systems<br></div><div>(JCIS 2013 impact factor = 0.742) <br></div><div><div><br></div><div><p class="MsoNormal" style="margin-bottom:0.0001pt"> </p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:15pt;color:rgb(128,64,64)">Volume 54, Issue 4</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">Complimentary
Article -</span><span style="font-size:9pt;color:rgb(85,85,85)"> </span><span style="font-size:12pt"><a href="http://iacis.org/jcis/articles/JCIS54-4-1.pdf"><span style="font-size:9pt;color:rgb(36,82,137)">Full
Text PDF</span></a></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">SOCIAL CAPITAL
CHARACTERISTICS OF OPEN SOURCE SOFTWARE OPINION LEADERS</span></b><span style="font-size:9pt;color:rgb(85,85,85)"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Li
Yan </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Open Source Software (OSS) has been proved to benefit
organizations in many aspects. Given the importance of OSS opinion leaders in
influencing organizational adoption of OSS, I set out to identify the
characteristics differentiating OSS opinion leaders and non OSS opinion
leaders, so as to locate the OSS opinion leaders and better leverage their
influences. Specifically, I posit that within an organization’s IT department,
OSS opinion leaders should have different social network profiles in terms of
degree of centrality, betweenness, closeness and in-degree centrality from
their peers who are not OSS opinion leaders. I also postulate that differences
exist in the two groups’ demographic characteristics such as age, educational
level, tenure in organization, position in organization, and personality
profiles such as openness and extraversion. A field survey using Social Network
Analysis technique was carried out to test the hypotheses. Based on the
findings, important theoretical and practical implications are identified.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Open Source Software, Social Capital, Opinion Leader,
Innovation Adoption</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 1-10</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">Complimentary
Article -</span><span style="font-size:9pt;color:rgb(85,85,85)"> </span><span style="font-size:12pt"><a href="http://iacis.org/jcis/articles/JCIS54-4-2.pdf"><span style="font-size:9pt;color:rgb(36,82,137)">Full
Text PDF</span></a></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">DOES XBRL BENEFIT
FINANCIAL STATEMENT AUDITING?</span></b><span style="font-size:9pt;color:rgb(85,85,85)"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">YUAN GEORGE SHAN
Indrit Troshani </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">XBRL (eXtensible Business Reporting Language) is heralded
to significantly enhance transparency, efficiency, and accuracy in business
information supply chains which can facilitate auditing in firms. We investigate
the impact of XBRL on financial statements auditing by using empirical evidence
from firms listed in the NYSE and NASDAQ between 2009-2011, the time when the
US Securities and Exchange Commission (SEC) XBRL adoption mandate for publicly
listed firms took effect. Our results support claims that XBRL can facilitate
auditing which is manifested in reduced auditing costs. That is, XBRL adopters
are likely to pay reduced audit fees. We also find that this effect is directly
related to firm size, with larger firms benefiting more than smaller firms. As
XBRL has been in an emerging state for over a decade, our findings offer much
needed evidence concerning its economic consequences which can have important
implications for accountants, auditors, and XBRL application developers.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><span style="font-size:9pt;color:rgb(85,85,85)"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 11-21</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">Complimentary
Article -</span><span style="font-size:9pt;color:rgb(85,85,85)"> </span><span style="font-size:12pt"><a href="http://iacis.org/jcis/articles/JCIS54-4-3.pdf"><span style="font-size:9pt;color:rgb(36,82,137)">Full
Text PDF</span></a></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">CLOUD ERP: A NEW
DILEMMA TO MODERN ORGANISATIONS?</span></b><span style="font-size:9pt;color:rgb(85,85,85)"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Guo Chao Alex
Peng Chirag Gala </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">For almost two decades, on-premise ERP has been adopted
very prevalently in the industry. Accompanied with the emergence of cloud
computing technologies in the late 2000s, there is an increasing trend for
companies to migrate their hitherto internal ERP applications and databases
into the cloud. Such ERP resources re-migration, which can offer a range of
opportunities to user companies, is also associated with new challenges. The
study reported in this paper aimed to explore potential benefits and barriers
associated with the adoption of cloud ERPs. A set of in-depth interviews were
conducted with 16 ERP and cloud consultants. The findings, derived from a
thematic analysis, identified that whilst the economic and technical benefits
promised by cloud vendors are attractive, the success of cloud ERP adoption can
be affected by critical challenges related to diverse organisational factors as
well as with current legal and technical complexity in the cloud environment.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">ERP, Cloud Computing, Cloud ERP, SaaS, Benefits, Barriers</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 22-30</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">A STUDY ON EMOTION
AND MEMORY IN TECHNOLOGY ADOPTION</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">James
Rodger Stephen
Gonzalez </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">We argue that not only do attitude, perceived behavior
controls, and social norms influence intention to adopt technology, but
inspiration, memory, and their interaction (inspirational memory) do as well.
The current study aimed to determine whether inspiration can be manipulated
and, if so, how increased inspiration affects both memory and the situational
motivation of end users to accept new technology. The present paper
hypothesizes that inspiration positively influences intention to use
technology. We also postulate that memory, as measured by decreased time to
complete a test script after being exposed to an inspirational stimulus,
positively influences intention to use technology. Further, we contend that
memory, as measured by decreased number of errors in the completed script after
being exposed to an inspirational stimulus, positively influences intention to
use technology. Finally we show that the interaction of memory and inspiration
positively influences intention to use technology. The proposed study
hypotheses were examined via structural equation modeling (SEM) analyses of
data collected from 338 users. The rest of the paper will present a
comprehensive conceptual model and then build it piece by piece, presenting
hypotheses along the way.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Motivation, inspiration, adoption, training, memory</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 31-41</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">THE IMPACT OF
CONTENT TYPE AND AVAILABILITY ON eBOOK READER ADOPTION</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Russell
Torres Vess
Johnson Benjamin
Imhonde </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">eBooks and eBook readers represent a major technology
discontinuity for those involved in the creation, publication, distribution,
and consumption of written material ranging from books to magazines. Emerging
from this disruption is an important new market, ultimately driven by the
individual adoption of mobile eBook readers. This paper views mobile eBook
readers as content delivery platforms and argues that both content type and
availability, concepts underrepresented in the adoption literature, are
important in the cognitive processes that regulate adoption behavior. To that
end, a conceptual model based on the technology acceptance model (TAM),
motivation theory, and constructs representing utilitarian and hedonic content
availability is developed. The model is empirically tested using a survey of
university students and analyzed using Partial Least Squares. The study finds
that content is an important factor in eBook reader adoption and that
traditional books are still preferred over eBooks by a three to one margin.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">eBook, mobile, adoption, playfulness, TAM, content availability</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 42-51</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">JOB EMBEDDEDNESS OF
INFORMATION TECHNOLOGY PROFESSIONALS: THE EFFECTS OF GENDER</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Sherry
Ryan Gina Harden </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">There is a growing need to meet the demand for information
technology (IT) professionals at a time when supply is not only failing to keep
pace with the growth in the IT sector, but also as IT workers are finding many
opportunities to move from one job to another. It is imperative that
organizations find ways to retain these valuable and skilled employees. One
construct that has been introduced to measure reasons employees choose to stay
in their current position is job embeddedness. This research explores the
effect of gender on the dimensions of job embeddedness, including an employee’s
fit with the organization, potential sacrifice involved in leaving, and links
to others in the organization. Using data collected from a survey of a large
government agency, we found that there are significant differences between
males and females in terms of job embeddedness.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Job embeddedness, gender, turnover intention.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 52-59</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">A BUSINESS-ANALYTIC
APPROACH TO IDENTIFY CRITICAL FACTORS IN QUANTITATIVE DISCIPLINES</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Asil
Oztekin Riaz Khan </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Most business students in universities across the United
States find the quantitatively oriented courses challenging to comprehend the
course material to a degree necessary to develop capability and confidence
level to solve business problems. A determination of critical factors that influence
performance in such courses is critical to designing class instructions.
Instructors teaching these classes agonize over the fact that these courses are
amongst the most difficult to teach as they encompass relatively harder
concepts transformed into analytical skill sets with real applications to
business operations that students struggle to grasp. This study employs a
machine learning-based approach to determine critical success factors by
analyzing the dataset of a focus course and provides some guidelines to
educators for improving their teaching effectiveness. Information fusion-based
sensitivity analyses on the data mining models provide an unbiased weighting
scheme for the rank order of the variables that help predict the students’
comprehension level.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">student learning comprehension, operations management,
quantitative techniques, data mining, prediction, information fusion-based
sensitivity analysis</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 60-70</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">FACTORS INFLUENCING
BUYER’S TRUST IN CONSUMER-TO-CONSUMER E COMMMERCE</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Kiku
Jones Lori Leonard </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">C2C e-commerce is increasingly being utilized by
individuals to buy and sell products to and from one another. With this
increase in use comes the need for specific studies regarding C2C e-commerce.
This study develops and tests a model of buyer’s trust in C2C e-commerce.
Examining previous trust models, perceived web site quality, third party
recognition, fear of seller opportunism, information asymmetry, and Internet
safety training are proposed to influence buyer’s trust. Additionally, the age
the individual first started using a computer is proposed to moderate the
relationship between Internet safety training and buyer’s trust. The findings
indicate that all variables significantly influence buyer’s trust in C2C
e-commerce, except Internet safety training and the moderation of age of first
computer use. A discussion and conclusion are provided. Keywords: C2C
e-commerce, trust, Internet safety training</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><span style="font-size:9pt;color:rgb(85,85,85)"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 71-79</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">DAILY DEALS
WEBSITES: MOSTLY BUT NOT ALL ABOUT LOCATION</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Ruti
Gafni Nitza Geri Yoav
Aziz </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">This study examined the main factors that affect
purchasing of coupons on daily deals Websites. The study included a survey of
attitudes toward pictures, trust in suppliers, and trust in the intermediary,
and also examined exposure to coupons, as recalled by visitors of the Website.
A/B testing analyzed 34 offered deals, and compared the actual purchased
coupons when the offer was positioned relatively high, and when it was located
lower. The findings suggested authentic pictures of the deal are the most
important. A negative correlation between perceived trust in suppliers and
trust in the intermediary indicated that intermediary good reputation is
valuable and may enable deals with unknown suppliers. Offers located among the
first 10 deals received the highest exposure, and when the offer was displayed
higher, significantly more coupons were purchased.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Online Group Buying, Online Trust, Virtual Shopping,
Product Pictures, Attention Economy, Human-Computer Interaction, Digital
Coupons</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 80-87</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">PERSONALITY,
PROBLEMATIC SOCIAL NETWORK USE AND ACADEMIC PERFORMANCE IN CHINA</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Richard
Glass Suhong Li Rong
Pan </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">This paper is an exploratory study of the relationship
between personality and problematic social network use among Chinese university
students and the impact of problematic social network use on academic
performance. Students who scored higher on the personality traits of
agreeableness and conscientiousness were less likely to be associated with
emotional/physical problems related to social network use. In addition,
students who report spending excessive time on social networking sites and
those who believe that their academic performance suffers because of social
network use are more likely to have lower academic performance. Male students
in China who score low on agreeableness are more likely to engage in
problematic social network use. The results suggest that academic advisors
should consider counseling students on the negative impact of problematic
social network use and should plan interventions for students whose academic
performance is negatively affected by problematic social network use.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Personality, Problematic Social Network Use, Academic
Performance, China</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 88-96</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt"> </p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:15pt;color:rgb(128,64,64)">Volume 54, Issue 3</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">Complimentary
Article -</span><span style="font-size:9pt;color:rgb(85,85,85)"> </span><span style="font-size:12pt"><a href="http://iacis.org/jcis/articles/JCIS54-3-3.pdf"><span style="font-size:9pt;color:rgb(36,82,137)">Full
Text PDF</span></a></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">IMPACTS OF
CUSTOMERS' PERCEPTIONS ON INTERNET BANKING USE WITH A SMART PHONE</span></b><span style="font-size:9pt;color:rgb(85,85,85)"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Hyun
Yoon Luis Occena </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">In recent years, a smart phone has become a useful
platform to easily access banking services. However, compared to regular
Internet banking using a personal computer, the adoption of a smart phone for
Internet banking might be more vulnerable with regard to security. In this
study, we first identify two dimensions: security and usability, and
empirically test their role as determinants that affect Internet banking use
with a smart phone (IBUS). Second, we investigate whether or not security and
usage can possibly interact with each other to influence IBUS. Results
indicate: (1) security issues were found to be a significant determinant of
IBUS; (2) Perceived Usefulness (PU) and Perceived Ease of Use (PEU) as
usability had significant effects on IBUS; (3) PU and PEU moderated the
relation between users’ perception toward security and IBUS; and (4) Users’
perception toward security moderated the relation between PU/PEU and IBUS.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Internet banking, Smart phone, Security, Perceived ease of
use, perceived usefulness</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 1-9</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">Complimentary
Article -</span><span style="font-size:9pt;color:rgb(85,85,85)"> </span><span style="font-size:12pt"><a href="http://iacis.org/jcis/articles/JCIS54-3-2.pdf"><span style="font-size:9pt;color:rgb(36,82,137)">Full
Text PDF</span></a></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">TRUST AND IT
INNOVATION IN ASYMMETRIC ENVIRONMENTS OF THE SUPPLY CHAIN MANAGEMENT PROCESS</span></b><span style="font-size:9pt;color:rgb(85,85,85)"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Michalski
M. Kirill Yurov Jose
Montes Botella </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">This paper examines the effect of trust and IT innovations
on organizational performance under asymmetric conditions in the context of
collaborative agreements in the Supply Chain Management (SCM) process. Our
research effort is timely and novel as it focuses on the current transition, on
the part of SCM organizations, to a more electronically integrated environment.
IT innovations, in this respect, hold a promise to enhance quality of
inter-organizational information exchange and to make supply chains more
transparent. The results of our study indicate that the interaction between
trust and innovation varies in different markets. Having studied behaviors of
companies in asymmetric environments of the SCM process in mature and emerging
markets, we found that a higher level of maturity is more conducive for IT
innovations despite the effect of asymmetries. Our findings also indicate that
organizational performance suffers due to a slow pace of adoption of IT
innovations designed to electronically integrate disparate organizational IT
systems. Yet, we have observed that higher levels of trust do not necessarily
lead to a significant increase in IT innovations in emerging markets. Also,
trust has no effect on equilibrium of collaborative relationships in the
context of asymmetric environments in emerging markets. Finally, we have found
that power asymmetry exhibits negative influences on IT innovations for both
economy types.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Operations Strategy, IT Innovations, Organiza¬tional
Behavior, Operations Management, Structural Equation Modeling.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 10-24</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">Complimentary
Article -</span><span style="font-size:9pt;color:rgb(85,85,85)"> </span><span style="font-size:12pt"><a href="http://iacis.org/jcis/articles/JCIS54-3-1.pdf"><span style="font-size:9pt;color:rgb(36,82,137)">Full
Text PDF</span></a></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">STRATEGIC
PERFORMANCE MANAGEMENT SYSTEMS: IMPACT ON BUSINESS RESULTS</span></b><span style="font-size:9pt;color:rgb(85,85,85)"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Al
Bento Regina
Bento Lourdes Ferreira
White </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">This study proposes and tests a model to explain the
impact on business results of a specific type of information systems: Strategic
Performance Measurement Systems (SPMS). Drawing from the literatures in
management, information systems, and accounting, the model proposes that SPMS
information technology (IT) variables, which include both technical
characteristics and technical outcomes, affect business results. Those IT
variables are, in turn, affected by SPMS system variables (information quality
and system design). Finally, IT and system variables are affected by
organizational variables related to information processing capabilities and
requirements. Using path analysis, we found empirical support for the model by
analyzing data from large-scale survey with a sample of 1,990 respondents.
System effectiveness and Internet usage were the two IT variables found to have
the most impact on business results. Furthermore, system design had a
significant role in determining all IT variables that had an impact on business
results.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Impact on Business Results, Strategic Performance
Measurement Systems, Effectiveness, Usefulness, ERP, System Design,
Organization Information Processing</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 25-33</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">INNOVATION
CHARACTERISTICS INFLUENCING VETERANS’ADOPTION OF E-GOVERNMENT SERVICES</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Assion
Lawson-Body Lori
Willoughby Abdou
Illia Simon Lee </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Many authors have used the diffusion of innovation (DOI)
theory of Rogers (1995) to study factors affecting citizen e-Gov adoption. But
none of these authors studied the moderating role of the digital divide on the
relationship between innovation characteristics and veterans’ intention to
adopt e-Gov. Our research model postulates that a veteran’s intention to adopt
e-Gov services is determined by the interaction between the digital divide and
five innovation characteristics: relative advantage, perceived compatibility,
perceived complexity, subjective norms and perceived risk. Data was collected
from 183 veterans in a US state where a government website is designed to
deliver e-services to veterans. We found that the digital divide did not
moderate the effect of relative advantage and subjective norms on the veteran
decision to adopt e-Gov services. However, the digital divide moderates the
effect of some factors: perceived compatibility, perceived complexity and
perceived risk. Discussion and implications are provided.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Digital divide, E-government, IT adoption, Veterans</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 34-44</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">ASSESSING
INNOVATIONS IN CLOUD SECURITY</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Lara
Khansa Christopher
Zobel </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">The goals of this paper are to analyze the ongoing trends
in innovation related to security in cloud computing, and to identify areas for
improvement. To this end, we collect all cloud security patent applications
(about 512 patent applications) from the United States Patent Trademark Office
(USPTO) and apply data mining techniques to their titles. This allows us to
identify unique keywords that these patent applications share, and to apply
social network analysis to study the relationships between them. We then use
cluster analysis to uncover specific focal innovation areas that correspond to
the well-known confidentiality, integrity and availability (CIA) triad, thus
complementing the USPTO classification of cloud security innovations. Our
results reveal in particular that the area of cloud availability is
under-investigated, suggesting that more innovation is needed on this front.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">cloud computing; patents; innovation; social network
analysis; cluster analysis; cloud security</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 45-56</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">BROADBAND ADOPTION
IN REGIONAL AND URBAN HOUSEHOLDS</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Sally Rao
Hill Indrit
Troshani Barry
Burgan </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Broadband offers key advantages as a communication
infrastructure, including efficiency and cost savings which can stimulate
productivity, innovation, and ultimately economic growth and social well-being.
This paper presents a comparative study on the adoption of broadband in urban
and regional areas. It proposes a model concerning broadband adoption which we
validate with data collected using a computer-aided telephone survey. We find
that relative advantage, utility outcomes, and facilitating conditions play a
crucial role in explaining the broadband adoption behavior of both urban and
regional household users. In a dynamic environment where technologies are
changing quickly, our findings about broadband adoption drivers are useful to
stakeholders such as internet service providers, regulators, broadband
application developers for encouraging further broadband and application
adoption and developments in communication space in both regional and urban
areas.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">broadband adoption, regional household users, urban
household users, digital divide</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 57-66</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">AN EMPIRICAL
INVESTIGATION OF EMULATORS IN MOBILE WEB RESEARCH</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Dongsong
Zhang Jianwei
Lai Anupama Dash </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">In spite of affordability, portability, and convenience of
mobile handheld devices, there are a number of usability problems associated
with Web access through those devices, largely attributable to their inherent
physical constraints. In the past decade, there have been increasing empirical
studies on interface issues and usability of mobile handheld devices and mobile
Web. However, researchers have been frequently using emulators of handheld
devices running on desktop computers instead of real, physical handheld devices
in those studies. Such a phenomenon raises validity and generalizability
concerns given the differences between emulators and physical devices. This
research empirically investigates whether the user performance and perception
of mobile Web on an emulator is equivalent to or at least consistent with that
on a physical device. The findings suggest that an emulator may not be able to
emulate user performance and perception with physical handheld devices, and
thus should be used with caution.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Usability, Mobile Web, Handheld Devices, Emulator,
Validity</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 67-76</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">USER’S ADOPTION OF
FREE THIRD-PARTY SECURITY APPS</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Bo
Han Andy Wu John
Windsor </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Although multiple security applications (apps) are offered
by third-party developers for free, only a small portion of smart device users
have adopted these apps. The lack of relevant research urgently requires an
in-depth investigation of influential factors of the user’s adoption of the new
cyber security countermeasures. In this study, we introduce a theoretical model
by integrating factors from the user’s awareness perspective and the user’s
trust perspective. We find that the user’s technology awareness and trust in
security apps both have significant positive effects on their adoption
intention. The user’s trust in security apps also has a significant moderating
effect on the relationship between their threat awareness and their adoption
intention. These findings do not only provide a theoretical foundation for
future mobile security app adoption research, but also offer several
implications for developers to push the diffusion of their software in the
promising app based cyber security market.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Smart technology, security apps, awareness, trust,
adoption.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 77-86</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">CONSUMER ACCEPTANCE
AND CONTINUANCE OF ONLINE GROUP BUYING</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Weng
Lim Ding Hooi Ting </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">The aim of this study is to establish and examine the
significance of a consumer acceptance and continuance model for online group
buying through the integration of entertainment gratification and perceived
risk with the Technology Acceptance Model. A quantitative study was conducted
and data were obtained through a mall-intercept systematic sampling
distribution of questionnaires. The results indicate that perceived usefulness,
perceived ease of use and perceived risk all have a significant relationship with
consumer attitudes, which subsequently has a significant effect on intention to
use online group buying sites. While entertainment gratification was found to
be insignificant, we reveal some possible reasons for this finding. The
implications of the findings and future research directions are also discussed.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">online group buying; consumer acceptance and continuance.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 87-96</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">TOWARDS A SYSTEMIC
FRAMEWORK FOR DIGITAL FORENSIC READINESS</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Mohamed
Elyas Sean
Maynard Atif
Ahmad Andrew Lonie </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Although digital forensics has traditionally been
associated with law enforcement, the impact of new regulations, industry
standards and cyber-attacks, combined with a heavy reliance on digital assets,
has resulted in a more prominent role for digital forensics in organizations.
Modern organizations, therefore, need to be forensically ready in order to
maximize their potential to respond to forensic events and demonstrate
compliance with laws and regulations. However, little research exists on the
assessment of organizational digital forensic readiness. This paper describes a
comprehensive approach to identifying the factors that contribute to digital
forensic readiness and how these factors work together to achieve forensic
readiness in an organization. We develop a conceptual framework for
organizational forensic readiness and define future work towards the empirical
validation and refinement of the framework.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Organizational Digital Forensics, Digital Forensic
Readiness, Proactive Digital Forensics.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 97-105</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:15pt;color:rgb(128,64,64)">Volume 54, Issue 2</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">Complimentary
Article -</span><span style="font-size:9pt;color:rgb(85,85,85)"> </span><span style="font-size:12pt"><a href="http://iacis.org/jcis/articles/JCIS54-2-1.pdf"><span style="font-size:9pt;color:rgb(36,82,137)">Full
Text PDF</span></a></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">LOOKING INSIDE THE
“IT BLACK BOX”: TECHNOLOGICAL EFFECTS ON IT USAGE</span></b><span style="font-size:9pt;color:rgb(85,85,85)"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Yuan
Sun Anol
Bhattacherjee </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Prior research suggests the need to incorporate the
information technology (IT) artifact within extant theories of IT usage, yet
little progress has been made to that end. This study addresses this gap by
incorporating the nature and purpose of the IT artifact in terms of four
characteristics: utilitarian value, hedonic value, communication value, and
technical complexity. The moderating effects of these characteristics on
individual-level IT usage were tested using a meta-analysis method. Our
findings demonstrate how incorporating such variables can provide a richer and
more nuanced understanding of IT usage than that offered by generic models of
IT usage.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">IT Usage, IT Acceptance, Meta-Analysis, Technology
Effects, IT artifact</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 1-15</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">Complimentary
Article -</span><span style="font-size:9pt;color:rgb(85,85,85)"> </span><span style="font-size:12pt"><a href="http://iacis.org/jcis/articles/JCIS54-2-2.pdf"><span style="font-size:9pt;color:rgb(36,82,137)">Full
Text PDF</span></a></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">PERCEIVED RISKS AND
ICT USE</span></b><span style="font-size:9pt;color:rgb(85,85,85)"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Chei Sian
Lee Mary Beth
Watson-Manheim </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">The objective of this research is to investigate the types
of problems and their associated perceived risks as well as the effects of
risks perceived on frequently used information communication technologies
(ICTs) by globally distributed software development teams. We focused on
perceived risk in reception, understanding and action and studied two global
software teams that were at different software development phases (i.e.
requirements analysis versus development and maintenance). Data for this
research was collected from a leading global IT consulting company and we found
that instant messaging, email and teleconferencing system were frequently used
by the two teams. Our results indicate that perceived risks in reception and
action were encountered by members in the systems development and maintenance
phase. Additionally, we also found differences on the effects of perceived
risks on the use of instant messaging, email and teleconferencing system
between the teams.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Software Development, Distributed Teams, ICT Use,
Perceived Risk, Organization Communication</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 16-24</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">Complimentary
Article -</span><span style="font-size:9pt;color:rgb(85,85,85)"> </span><span style="font-size:12pt"><a href="http://iacis.org/jcis/articles/JCIS54-2-3.pdf"><span style="font-size:9pt;color:rgb(36,82,137)">Full
Text PDF</span></a></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">THE DEPENDENT
VARIABLE IN SOCIAL MEDIA USE</span></b><span style="font-size:9pt;color:rgb(85,85,85)"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Helana
Scheepers Rosemary
Stockdale Rens
Scheepers Nurdin
Nurdin </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">What is the dependent variable in social media use? From a
research perspective, this is a pertinent question to help explain and
understand the behaviors that underpin the widespread adoption and use of
social media throughout society. From a practical perspective, the question is
relevant for social media technology providers, for businesses that use social
media, and community organizations that turn towards social media to reach out
to their constituents. We propose the construct ‘sense of community’ as the
dependent variable, which is reflected in four sub-constructs related to the
behaviors of social media users. These behaviors are information seeking,
hedonic activities, sustaining of strong ties and extending weak ties.
Empirical evidence for these constructs comes from a survey of social media use
by 18-25 year-olds in Indonesia, a country with exceptionally high utilization
of social media. We outline practical implications of the findings and areas
for further theoretical development.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Social Media, Use, Community, Dependent Variable.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 25-34</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">A METHOD FOR
EVALUATING PERFORMANCE OF IT-CENTRIC BUSINESSES APPLIED TO THE DOMAIN OF
ELECTRONIC MARKETPLACES</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Sabine
Matook </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">We present a flexible, context-specific, theory-based
method for evaluating organizational performance that builds on the competing
values framework. Our method consists of two phases, a conceptual and empirical
phase, and is operationalized as a set of six steps, three of which address the
development of appropriate criteria, while the remaining three address the
measurement of performance. We provide a proof-of-concept for the method by
applying it to electronic marketplaces (EMPs). Our EMP performance analysis
demonstrates that EMPs with higher performance values survived, while those
with lower performance values failed. Specifically, our method for evaluating
organizational performance explains the survival or demise of 90 percent of the
EMPs we examined.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">organizational performance, IT-centric businesses,
competing values framework, performance method, survival.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 44-56</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">EXTRACTING NEWS FROM
SERVER SIDE DATABASES BY QUERY INTERFACES</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Hao
Han </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Web news has become an important information resource, and
we can collect and analyze Web news to acquire desired information. In this
paper, an effective and efficient Web-based knowledge acquisition approach is
proposed for extracting Web news full content from news site databases using
site-side news search engines as query interfaces. We do not crawl the news
sites to collect news pages. Instead, we use news search engines affiliated to
the news sites to search for the desired news articles directly from the news
site databases. We give the search keywords to the search engines and extract
the full content of the news articles without the process of machine learning
or pattern matching. This approach is applicable to general news sites, and the
experimental results show that it can extract a large amount of Web news
content from news site databases automatically, quickly, and accurately.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Web-based Tools, Knowledge Acquisition, Web News
Application, Information Extraction, Site-side Search Engine, Query Interface,
Database</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 57-65</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">CONSUMERS'
INTENTIONS TO USE E-READERS</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Michael
Williams Emma
Slade Yogesh K.
Dwivedi </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Although the e-reader marketplace has become increasingly
significant in recent years, the current lack of understanding of factors that
drive consumers’ intention to use e-readers suggests there is much to be
learned in this area. This study develops and tests a variation on the
Technology Acceptance Model in order to investigate factors influencing
consumers’ intention to use e-readers. A survey of 234 consumers revealed that
perceived usefulness and subjective norm positively influence intention to use,
whereas there was little evidence to support the significance of image, cost,
or ease of use. Findings have both theoretical and practical implications.
Results provide empirical support for some existing TAM relationships, and a
basis from which to examine additional factors in order to further develop
knowledge affecting intention to use e-readers. Confirmation of the influence
of perceived usefulness and subjective norm has implications for practitioners,
particularly in terms of product design and marketing.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">e-Readers; Consumer adoption; PLS; Technology Acceptance
Model</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 66-77</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">DECOUPLING SOFTWARE
FROM HARDWARE IN TECHNOLOGY ACCEPTANCE RESEARCH</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Shinjeng
Lin J. Christopher
Zimmer Velma Lee </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Technology convergence has become a fiery phenomenon. More
and more technologies can cohabit in the same platform and the information
becomes more portable from one platform to another. The phenomenon presses on
examining the question of what technology entails in technology acceptance
research. If the technology can be decomposed by its dimensions, e.g., hardware,
software, content, will the adoption of one dimension affect the adoption
patterns of other dimensions? Addressing this research question in the case of
podcasting for educational purposes, this study found that adoption of a mobile
device like an iPod can moderate the causal relationships among the core
constructs in the Technology Acceptance Model, and between the core constructs
and the individual differences antecedents, including subjective norms,
self-efficacy and personal innovativeness in information technology. The
research and practice implications are also discussed.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">technology dimensions, moderating effects, technology
acceptance model, Roger’s diffusion stages, escalation of commitment,
podcasting</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 77-86</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">INVESTIGATING DESIGN
ISSUES IN MOBILE COMPUTER-MEDIATED COMMUNICATION TECHNOLOGIES</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Solomon
Ogara Chang Koh </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Mobility is the new reality of business and stands to have
a significant impact on the implementation of mobile computer- mediated
communication (mCMC), such as mobile texting, mobile video, and mobile
presence. Information systems researchers are faced with the challenge of how
to design these artifacts to maximize the benefits of social interaction among
potential communication partners. We develop a theoretical model that examines
the relationship between user experience, perceived richness, perceived social
presence, interactivity, and satisfaction in mCMC. Findings suggest that user
experience, perceived richness and interactivity are important in the design of
social presence in mCMC. Both social presence and perceived richness influenced
user satisfaction with mCMC. The influence is greater in mobile instant
messaging than mobile texting.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">user experience, social presence, user satisfaction, media
richness, mobility, interactivity, computer-mediated communication.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 87-98</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">CONTINUED USE OF
MOBILE TECHNOLOGY MEDIATED SERVICES: A VALUE PERSPECTIVE</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Hua
Dai Tao Hu Xihui
Zhang </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">This study incorporates insights from services marketing
and information systems (IS) usage research, and proposes a service value
perspective of continued use of Mobile Technology Mediated Services (MTMS). Our
study illustrates that customers strongly recognize the value of MTMS in
building utilitarian and hedonic benefits, which influences their intentions to
continue using the service. Our study shows that, when assessing value of MTMS,
customers are less concerned with effort-based cost for the service use.
Instead, the effort-based cost is recognized as a negative predictor of
utilitarian and hedonic benefits of MTMS usage. Accounting for the dual role of
MTMS patrons as a service customer and a user of IT artifacts, our study
contributes to IS theory by incorporating the value perspective into IS usage
literature in the service context. The findings provide practical guidelines
for MTMS managers to develop value-based strategies for business survival and
marketing extension.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Mobile Technology Mediated Services, Value, Utilitarian
Benefit, Hedonic Benefit, Effort, Continued Use, Information Systems.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 99-109</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:15pt;color:rgb(128,64,64)"> </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:15pt;color:rgb(128,64,64)">Volume 54, Issue 1</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">Complimentary
Article -</span><span style="font-size:9pt;color:rgb(85,85,85)"> </span><span style="font-size:12pt"><a href="http://iacis.org/jcis/articles/JCIS54-1.pdf"><span style="font-size:9pt;color:rgb(36,82,137)">Full Text
PDF</span></a></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">THE DUAL ROLE OF
TRUST IN SYSTEM USE</span></b><span style="font-size:9pt;color:rgb(85,85,85)"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Ofir
Turel David Gefen </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Many studies have shown that trust is an important
cognition that drives the continued use of information systems. The theoretical
reasoning behind this effect has been that trust helps people rule out
undesirable, yet possible, opportunistic behaviors, and ultimately makes users
more at ease regarding transacting with a website. In this study, we build on
the relationship marketing literature and argue that trust may have an even
broader role in post-adoption contexts than previously assumed. Not only can
trust influence system use intentions directly (a dedication mechanism), but
also indirectly through the promotion of social investment in a relationship
with a system and its users. This social investment represents a
procedural-relational switching cost (a constraint mechanism) which further
increases continuance intent. Data collected from 382 social networking website
users support the hypotheses and validate the pro¬posed dual-role of trust.
Implications for research and practice are discussed.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Trust, Social networks, IS Continuance, Social investment,
Relationship marketing, Relational switching costs, Procedural switching costs</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 2-10</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">Complimentary
Article -</span><span style="font-size:9pt;color:rgb(85,85,85)"> </span><span style="font-size:12pt"><a href="http://iacis.org/jcis/articles/JCIS54-2.pdf"><span style="font-size:9pt;color:rgb(36,82,137)">Full Text
PDF</span></a></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">DOES SAMPLE SIzE
MATTER IN QUALITATIVE RESEARCH?: A REVIEW OF QUALITATIVE INTERVIEWS IN IS
RESEARCH</span></b><span style="font-size:9pt;color:rgb(85,85,85)"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Bryan
Marshall Peter
Cardon Amit
Poddar Renée
Fontenot </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">This study examines 83 IS qualitative studies in leading
IS journals for the following purposes: (a) identifying the extent to which IS
qualitative studies employ best practices of justifying sample size; (b)
identifying optimal ranges of interviews for various types of qualitative
research; and (c) identifying the extent to which cultural factors (such as
journal of publication, number of authors, world region) impact sample size of
interviews. Little or no rigor for justifying sample size was shown for virtually
all of the IS studies in this dataset. Furthermore, the number of interviews
conducted for qualitative studies is correlated with cultural factors, implying
the subjective nature of sample size in qualitative IS studies. Recommendations
are provided for minimally acceptable practices of justifying sample size of
interviews in qualitative IS studies.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">qualitative methodology, qualitative interviews, data
saturation, sample size</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 11-22</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">Complimentary
Article -</span><span style="font-size:9pt;color:rgb(85,85,85)"> </span><span style="font-size:12pt"><a href="http://iacis.org/jcis/articles/JCIS54-3.pdf"><span style="font-size:9pt;color:rgb(36,82,137)">Full Text
PDF</span></a></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">MOBILE BUSINESS
INTELLIGENCE: KEY CONSIDERATIONS FOR IMPLEMENTATIONS PROJECTS</span></b><span style="font-size:9pt;color:rgb(85,85,85)"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Kim
Verkooij Marco
Spruit </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">The new generation of mobile devices, such as smartphones
and tablets, is enabling employees to access business insights anytime,
anywhere. This trend in Business Intelligence (BI) is popularized under the
term mobile BI. Various studies indicate a strong increase in the adoption of
this technology. However, mobile BI implementations remain unexplored and
unsupported by implementation methods. By devising a Mobile BI Implemen¬tation
(MOBII) framework, this study aims to fill in this research gap. A systematic
literature review revealed the following major implementation themes: (1) value
creation, (2) application deployment, (3) information security, (4) workforce
mobilization, (5) information delivery and (6) device management. Moreover,
expert interviews revealed twenty key considerations, which are also included
in the framework. Using a single case study the MOBII framework was
successfully evaluated and its practical applicability was demonstrated by
adapting an actively used BI implementation method.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">business intelligence, mobile business applications,
implementation methods</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 23-33</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">RESEARCH IN
INFORMATION SYSTEMS EDUCATION: SCOPE AND PRODUCTIVITY</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">S.E.
Kruck Richard
Mathieu Michel Mitri </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Information systems (IS) education research is an integral
part of the IS academic community. Research on timely issues such as techniques
for innovative teaching, methods for addressing the recent enrollment crisis,
and revisions to the IS curriculum are vital to the IS discipline. This paper
defines the scope of information systems education research and identifies the
top research journals that publish research related to information systems
education. Ultimately, this paper reports on research productivity in
information systems education at both the institutional and individual faculty
levels for the period 2005¬2010. The results of this paper suggest that IS
education research is global in nature with several leading institutions
outside of North America including universities in Australia, Belgium, Greece,
Hong Kong, Israel, Taiwan, and the United Kingdom. In addition, several
universities prominent in overall IS research productivity were also prominent
in IS education research.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">educational research, research productivity, teaching,
institutional ranking.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 34-41</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">OSS ADOPTION:
ORGANIZATIONAL INVESTMENT IN INTERNAL HUMAN CAPITAL</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Yan
Li Chuan-Hoo Tan Xue
Yang </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Adopting Open Source Software (OSS) that has an
enterprise-wide implication could be complex and requires an organization to
possess adequate level of internal human capital before doing so. In this
study, we propose and validate two antecedents of organizational investment in
internal human capital in the context of OSS adoption. They are (1)
firm-specificity of OSS human capital, which denotes the extent to which the
internal OSS human capital is strongly tied to the organization and cannot be
equally well applied in other organizations, and (2) learning-related scale,
which reflects the extent to which the organizational cost of learning OSS can
be spread by applying the knowledge gained to other projects and business
functions within the organization. Survey data collected from 114 senior
Information Technology (IT) managers and professionals indicates that these two
factors are positively associated with the investment in cultivating internal
OSS human capital.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Open Source Software, Internal Human Capital, Firm
Specificity, Learning-Related Scale</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 42-52</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">ENTERPRISE RESOURCE
PLANNING ADOPTION: STRUCTURAL EQUATION MODELING ANALYSIS OF ANTECDANTS</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Jiwat
Ram David
Corkindale Ming-Lu
Wu </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">This study identifies the key antecedent factors for
accomplishing the adoption stage of enterprise resource planning (ERP)
systems. Five potential antecedent factors of adoption were derived from the
literature, including that on innovation theories, and data were obtained from
a sample of 217 organizations across Australia. A structural equation modeling
(SEM) technique was used to examine the complex relationships between
antecedents and the adoption decision. We found that there were three positive
drivers of a successful outcome of the ERP adoption stage. Prior findings have
shown that system quality is a key enabler for innovation adoption by
individuals, and we found that system quality is also an important driver for
organizational adoption of ERP. It was also indicated that organizations
consider adopting ERP when the market and customer patterns are relatively
stable rather than in turbulent environments.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">adoption, enterprise resource planning (ERP), structural
equation modeling (SEM), partial least square (PLS), implementation</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 53-65</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">REDUCING USER-RELATED
RISKS WITH USER-DEVELOPER PARTNERING</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Julie
Liu Ming-Hsien
Yang Gary
Klein Houn-Gee Chen </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Risks related to users are a major concern in the
development of information systems (IS). This study examines whether partnering
efforts made between users and IS developers are successful in reducing the
realization of user-related risks during system development. We employ risk
factors identified in the literature to drive a confirmation of risk reduction
via partnering efforts between users and developers. A survey of system
development project managers provides the data for confirmation. Indications
from the survey include risk reducing benefits from establishing problem
resolution, continuous improvement, and common goals at the commencement of any
new development project. This study highlights that a partnership between users
and developers during the development process mitigates certain risks and
improves eventual outcomes of IS development projects.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">User-developer partnering, project risk management,
user-related risks</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 66-74</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">PROJECT DURATION AND
RISK FACTORS ON VIRTUAL PROJECTS</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">April
Reed Linda Knight </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">This research examines how project duration relates to
specific individual risk factors that threaten virtual projects, i.e. where
team members are not co-located and must rely heavily on computer mediated
communication. A total of 557 project management practitioners completed an
online survey concerning the impact of each of 55 risk factors on one of their
recently completed virtual projects. MANOVA analysis on the ten factors with
the highest risk effect (REff) levels demonstrated a clear relationship between
project duration and six of the ten factors. These six risks were significantly
higher on longer duration projects, suggesting that (1) these risks need to be
followed more closely on longer duration projects, and (2) projects whose
schedules increase over time may be at greater risk than their risk analyses
might indicate. Reasons why some risk factors have a duration effect, while
others do not, are explored.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">risk, virtual project, virtual teams, project duration,
project risk, risk exposure, RE, risk effect, REff, project length, long
projects, large projects, project management, duration effect</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 75-83</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">TRUST AND DISTRUST
IN OPEN SOURCE SOFTWARE DEVELOPMENT</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Shuk Ying
Ho Alex Richardson </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Few open source software (OSS) projects have been great
success stories. One reason for this is project stagnation after developers
quit their projects. This fact has motivated researchers to examine the
factors that influence developers’ intention to continue their participation.
One factor is trust among developers. The effects of trust on developers’ intention
to re¬main with their projects have been studied. However, little is known
about its conceptual counterpart, distrust. This dearth of knowledge motivates
our research. First, we studied what OSS project features affect trust and
distrust among developers. Second, we examined how trust and distrust
influence developers’ intention to continue participating. We tested our
hypotheses with 451 data points from an online survey. Our findings indicate
that cooperative norms and effective communication engender trust, whereas an
accreditation mechanism eliminates distrust. Additionally, trust positively
influences their intention to continue participating, whereas distrust
negatively influences it.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">open source software; trust; distrust; cooperative norms;
communication; accreditation; governance.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 84-93</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">UNDERSTANDING
PROFESSIONAL CONNECTIONS IN LINKEDIN — A QUESTION OF TRUST</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Craig
Claybaugh William
Haseman </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">As the popularity of online social networks grow, it
becomes important to understand how context and individual participants
influence trust formation within the network. We investigate the impact that
trust — both at the individual level and network level — has on the strength of
association between members of the professional social networking site
LinkedIn. A model of trust adapted from previous literature is empirically
tested using an online survey sent to a random sample of LinkedIn members. The
findings indicate that dyadic tie strength is influenced by an individual’s
disposition to trust and by the trust belief between the respondent and the
respondent’s last connection made in LinkedIn. Trust in LinkedIn did not
influence the relationship.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">Social Networking, Trust, Trust Intention, Tie Strength,
LinkedIn, Privacy Concern</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 94-105</span></p>
<div class="MsoNormal" align="center" style="margin-bottom:0.0001pt;text-align:center"><span style="font-size:12pt">
<hr size="2" width="100%" noshade style="color:rgb(85,85,85)" align="center">
</span></div>
<p class="MsoNormal" style="margin-bottom:0.0001pt"><b><span style="font-size:9pt;color:rgb(85,85,85);background-image:initial;background-repeat:initial">THE HOLISTIC AND
SYSTEMS APPROACH TO THE SUSTAINABLE INFORMATION SOCIETY</span></b><span style="font-size:12pt"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">Ewa
Ziemba </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Abstract:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">The purpose of this research was to propound the
conceptual model of a sustainable information society. First, the essence of a
sustainable information society in the context of an information society
concept is presented. Secondly, different kinds of phenomena and trends of
sustainable information society development are identified and diagnosed.
Thirdly, assumptions for the model of a sustainable information society are
formulated. Finally, special attention is given to the presentation of the
sustainable information society model. Discussion of research findings and
future works for both researchers and practitioners complete the paper.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><b><span style="font-size:9pt;color:rgb(85,85,85)">Keywords:</span></b><b><span style="font-size:9pt;color:rgb(85,85,85)"> </span></b><span style="font-size:9pt;color:rgb(85,85,85)">information society, sustainable information society,
sustainable development, ICT</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9pt;color:rgb(85,85,85)">pp. 106-116</span></p></div></div></div>