[AISWorld] Journal of Computer Information Systems - Volume 54 Issues 1, 2, 3, & 4
Alex Koohang (JCIS)
jcis at iacis.org
Sun Nov 2 20:24:18 EST 2014
This email includes references (with abstracts) of the articles published
in the Journal of Computer Information Systems - Volume 54 Issues 1, 2, 3,
& 4. Full-text of some of these articles are available from
http://www.iacis.org/jcis/jcis.php and embedded in this email.
Journal of Computer Information Systems
(JCIS 2013 impact factor = 0.742)
Volume 54, Issue 4
------------------------------
Complimentary Article - Full Text PDF
<http://iacis.org/jcis/articles/JCIS54-4-1.pdf>
*SOCIAL CAPITAL CHARACTERISTICS OF OPEN SOURCE SOFTWARE OPINION LEADERS*
Li Yan
*Abstract:* Open Source Software (OSS) has been proved to benefit
organizations in many aspects. Given the importance of OSS opinion leaders
in influencing organizational adoption of OSS, I set out to identify the
characteristics differentiating OSS opinion leaders and non OSS opinion
leaders, so as to locate the OSS opinion leaders and better leverage their
influences. Specifically, I posit that within an organization’s IT
department, OSS opinion leaders should have different social network
profiles in terms of degree of centrality, betweenness, closeness and
in-degree centrality from their peers who are not OSS opinion leaders. I
also postulate that differences exist in the two groups’ demographic
characteristics such as age, educational level, tenure in organization,
position in organization, and personality profiles such as openness and
extraversion. A field survey using Social Network Analysis technique was
carried out to test the hypotheses. Based on the findings, important
theoretical and practical implications are identified.
*Keywords:* Open Source Software, Social Capital, Opinion Leader,
Innovation Adoption
pp. 1-10
------------------------------
Complimentary Article - Full Text PDF
<http://iacis.org/jcis/articles/JCIS54-4-2.pdf>
*DOES XBRL BENEFIT FINANCIAL STATEMENT AUDITING?*
YUAN GEORGE SHAN Indrit Troshani
*Abstract:* XBRL (eXtensible Business Reporting Language) is heralded to
significantly enhance transparency, efficiency, and accuracy in business
information supply chains which can facilitate auditing in firms. We
investigate the impact of XBRL on financial statements auditing by using
empirical evidence from firms listed in the NYSE and NASDAQ between
2009-2011, the time when the US Securities and Exchange Commission (SEC)
XBRL adoption mandate for publicly listed firms took effect. Our results
support claims that XBRL can facilitate auditing which is manifested in
reduced auditing costs. That is, XBRL adopters are likely to pay reduced
audit fees. We also find that this effect is directly related to firm size,
with larger firms benefiting more than smaller firms. As XBRL has been in
an emerging state for over a decade, our findings offer much needed
evidence concerning its economic consequences which can have important
implications for accountants, auditors, and XBRL application developers.
*Keywords:*
pp. 11-21
------------------------------
Complimentary Article - Full Text PDF
<http://iacis.org/jcis/articles/JCIS54-4-3.pdf>
*CLOUD ERP: A NEW DILEMMA TO MODERN ORGANISATIONS?*
Guo Chao Alex Peng Chirag Gala
*Abstract:* For almost two decades, on-premise ERP has been adopted very
prevalently in the industry. Accompanied with the emergence of cloud
computing technologies in the late 2000s, there is an increasing trend for
companies to migrate their hitherto internal ERP applications and databases
into the cloud. Such ERP resources re-migration, which can offer a range of
opportunities to user companies, is also associated with new challenges.
The study reported in this paper aimed to explore potential benefits and
barriers associated with the adoption of cloud ERPs. A set of in-depth
interviews were conducted with 16 ERP and cloud consultants. The findings,
derived from a thematic analysis, identified that whilst the economic and
technical benefits promised by cloud vendors are attractive, the success of
cloud ERP adoption can be affected by critical challenges related to
diverse organisational factors as well as with current legal and technical
complexity in the cloud environment.
*Keywords:* ERP, Cloud Computing, Cloud ERP, SaaS, Benefits, Barriers
pp. 22-30
------------------------------
*A STUDY ON EMOTION AND MEMORY IN TECHNOLOGY ADOPTION*
James Rodger Stephen Gonzalez
*Abstract:* We argue that not only do attitude, perceived behavior
controls, and social norms influence intention to adopt technology, but
inspiration, memory, and their interaction (inspirational memory) do as
well. The current study aimed to determine whether inspiration can be
manipulated and, if so, how increased inspiration affects both memory and
the situational motivation of end users to accept new technology. The
present paper hypothesizes that inspiration positively influences intention
to use technology. We also postulate that memory, as measured by decreased
time to complete a test script after being exposed to an inspirational
stimulus, positively influences intention to use technology. Further, we
contend that memory, as measured by decreased number of errors in the
completed script after being exposed to an inspirational stimulus,
positively influences intention to use technology. Finally we show that the
interaction of memory and inspiration positively influences intention to
use technology. The proposed study hypotheses were examined via structural
equation modeling (SEM) analyses of data collected from 338 users. The rest
of the paper will present a comprehensive conceptual model and then build
it piece by piece, presenting hypotheses along the way.
*Keywords:* Motivation, inspiration, adoption, training, memory
pp. 31-41
------------------------------
*THE IMPACT OF CONTENT TYPE AND AVAILABILITY ON eBOOK READER ADOPTION*
Russell Torres Vess Johnson Benjamin Imhonde
*Abstract:* eBooks and eBook readers represent a major technology
discontinuity for those involved in the creation, publication,
distribution, and consumption of written material ranging from books to
magazines. Emerging from this disruption is an important new market,
ultimately driven by the individual adoption of mobile eBook readers. This
paper views mobile eBook readers as content delivery platforms and argues
that both content type and availability, concepts underrepresented in the
adoption literature, are important in the cognitive processes that regulate
adoption behavior. To that end, a conceptual model based on the technology
acceptance model (TAM), motivation theory, and constructs representing
utilitarian and hedonic content availability is developed. The model is
empirically tested using a survey of university students and analyzed using
Partial Least Squares. The study finds that content is an important factor
in eBook reader adoption and that traditional books are still preferred
over eBooks by a three to one margin.
*Keywords:* eBook, mobile, adoption, playfulness, TAM, content availability
pp. 42-51
------------------------------
*JOB EMBEDDEDNESS OF INFORMATION TECHNOLOGY PROFESSIONALS: THE EFFECTS OF
GENDER*
Sherry Ryan Gina Harden
*Abstract:* There is a growing need to meet the demand for information
technology (IT) professionals at a time when supply is not only failing to
keep pace with the growth in the IT sector, but also as IT workers are
finding many opportunities to move from one job to another. It is
imperative that organizations find ways to retain these valuable and
skilled employees. One construct that has been introduced to measure
reasons employees choose to stay in their current position is job
embeddedness. This research explores the effect of gender on the dimensions
of job embeddedness, including an employee’s fit with the organization,
potential sacrifice involved in leaving, and links to others in the
organization. Using data collected from a survey of a large government
agency, we found that there are significant differences between males and
females in terms of job embeddedness.
*Keywords:* Job embeddedness, gender, turnover intention.
pp. 52-59
------------------------------
*A BUSINESS-ANALYTIC APPROACH TO IDENTIFY CRITICAL FACTORS IN QUANTITATIVE
DISCIPLINES*
Asil Oztekin Riaz Khan
*Abstract:* Most business students in universities across the United States
find the quantitatively oriented courses challenging to comprehend the
course material to a degree necessary to develop capability and confidence
level to solve business problems. A determination of critical factors that
influence performance in such courses is critical to designing class
instructions. Instructors teaching these classes agonize over the fact that
these courses are amongst the most difficult to teach as they encompass
relatively harder concepts transformed into analytical skill sets with real
applications to business operations that students struggle to grasp. This
study employs a machine learning-based approach to determine critical
success factors by analyzing the dataset of a focus course and provides
some guidelines to educators for improving their teaching effectiveness.
Information fusion-based sensitivity analyses on the data mining models
provide an unbiased weighting scheme for the rank order of the variables
that help predict the students’ comprehension level.
*Keywords:* student learning comprehension, operations management,
quantitative techniques, data mining, prediction, information fusion-based
sensitivity analysis
pp. 60-70
------------------------------
*FACTORS INFLUENCING BUYER’S TRUST IN CONSUMER-TO-CONSUMER E COMMMERCE*
Kiku Jones Lori Leonard
*Abstract:* C2C e-commerce is increasingly being utilized by individuals to
buy and sell products to and from one another. With this increase in use
comes the need for specific studies regarding C2C e-commerce. This study
develops and tests a model of buyer’s trust in C2C e-commerce. Examining
previous trust models, perceived web site quality, third party recognition,
fear of seller opportunism, information asymmetry, and Internet safety
training are proposed to influence buyer’s trust. Additionally, the age the
individual first started using a computer is proposed to moderate the
relationship between Internet safety training and buyer’s trust. The
findings indicate that all variables significantly influence buyer’s trust
in C2C e-commerce, except Internet safety training and the moderation of
age of first computer use. A discussion and conclusion are provided.
Keywords: C2C e-commerce, trust, Internet safety training
*Keywords:*
pp. 71-79
------------------------------
*DAILY DEALS WEBSITES: MOSTLY BUT NOT ALL ABOUT LOCATION*
Ruti Gafni Nitza Geri Yoav Aziz
*Abstract:* This study examined the main factors that affect purchasing of
coupons on daily deals Websites. The study included a survey of attitudes
toward pictures, trust in suppliers, and trust in the intermediary, and
also examined exposure to coupons, as recalled by visitors of the Website.
A/B testing analyzed 34 offered deals, and compared the actual purchased
coupons when the offer was positioned relatively high, and when it was
located lower. The findings suggested authentic pictures of the deal are
the most important. A negative correlation between perceived trust in
suppliers and trust in the intermediary indicated that intermediary good
reputation is valuable and may enable deals with unknown suppliers. Offers
located among the first 10 deals received the highest exposure, and when
the offer was displayed higher, significantly more coupons were purchased.
*Keywords:* Online Group Buying, Online Trust, Virtual Shopping, Product
Pictures, Attention Economy, Human-Computer Interaction, Digital Coupons
pp. 80-87
------------------------------
*PERSONALITY, PROBLEMATIC SOCIAL NETWORK USE AND ACADEMIC PERFORMANCE IN
CHINA*
Richard Glass Suhong Li Rong Pan
*Abstract:* This paper is an exploratory study of the relationship between
personality and problematic social network use among Chinese university
students and the impact of problematic social network use on academic
performance. Students who scored higher on the personality traits of
agreeableness and conscientiousness were less likely to be associated with
emotional/physical problems related to social network use. In addition,
students who report spending excessive time on social networking sites and
those who believe that their academic performance suffers because of social
network use are more likely to have lower academic performance. Male
students in China who score low on agreeableness are more likely to engage
in problematic social network use. The results suggest that academic
advisors should consider counseling students on the negative impact of
problematic social network use and should plan interventions for students
whose academic performance is negatively affected by problematic social
network use.
*Keywords:* Personality, Problematic Social Network Use, Academic
Performance, China
pp. 88-96
Volume 54, Issue 3
------------------------------
Complimentary Article - Full Text PDF
<http://iacis.org/jcis/articles/JCIS54-3-3.pdf>
*IMPACTS OF CUSTOMERS' PERCEPTIONS ON INTERNET BANKING USE WITH A SMART
PHONE*
Hyun Yoon Luis Occena
*Abstract:* In recent years, a smart phone has become a useful platform to
easily access banking services. However, compared to regular Internet
banking using a personal computer, the adoption of a smart phone for
Internet banking might be more vulnerable with regard to security. In this
study, we first identify two dimensions: security and usability, and
empirically test their role as determinants that affect Internet banking
use with a smart phone (IBUS). Second, we investigate whether or not
security and usage can possibly interact with each other to influence IBUS.
Results indicate: (1) security issues were found to be a significant
determinant of IBUS; (2) Perceived Usefulness (PU) and Perceived Ease of
Use (PEU) as usability had significant effects on IBUS; (3) PU and PEU
moderated the relation between users’ perception toward security and IBUS;
and (4) Users’ perception toward security moderated the relation between
PU/PEU and IBUS.
*Keywords:* Internet banking, Smart phone, Security, Perceived ease of use,
perceived usefulness
pp. 1-9
------------------------------
Complimentary Article - Full Text PDF
<http://iacis.org/jcis/articles/JCIS54-3-2.pdf>
*TRUST AND IT INNOVATION IN ASYMMETRIC ENVIRONMENTS OF THE SUPPLY CHAIN
MANAGEMENT PROCESS*
Michalski M. Kirill Yurov Jose Montes Botella
*Abstract:* This paper examines the effect of trust and IT innovations on
organizational performance under asymmetric conditions in the context of
collaborative agreements in the Supply Chain Management (SCM) process. Our
research effort is timely and novel as it focuses on the current
transition, on the part of SCM organizations, to a more electronically
integrated environment. IT innovations, in this respect, hold a promise to
enhance quality of inter-organizational information exchange and to make
supply chains more transparent. The results of our study indicate that the
interaction between trust and innovation varies in different markets.
Having studied behaviors of companies in asymmetric environments of the SCM
process in mature and emerging markets, we found that a higher level of
maturity is more conducive for IT innovations despite the effect of
asymmetries. Our findings also indicate that organizational performance
suffers due to a slow pace of adoption of IT innovations designed to
electronically integrate disparate organizational IT systems. Yet, we have
observed that higher levels of trust do not necessarily lead to a
significant increase in IT innovations in emerging markets. Also, trust has
no effect on equilibrium of collaborative relationships in the context of
asymmetric environments in emerging markets. Finally, we have found that
power asymmetry exhibits negative influences on IT innovations for both
economy types.
*Keywords:* Operations Strategy, IT Innovations, Organiza¬tional Behavior,
Operations Management, Structural Equation Modeling.
pp. 10-24
------------------------------
Complimentary Article - Full Text PDF
<http://iacis.org/jcis/articles/JCIS54-3-1.pdf>
*STRATEGIC PERFORMANCE MANAGEMENT SYSTEMS: IMPACT ON BUSINESS RESULTS*
Al Bento Regina Bento Lourdes Ferreira White
*Abstract:* This study proposes and tests a model to explain the impact on
business results of a specific type of information systems: Strategic
Performance Measurement Systems (SPMS). Drawing from the literatures in
management, information systems, and accounting, the model proposes that
SPMS information technology (IT) variables, which include both technical
characteristics and technical outcomes, affect business results. Those IT
variables are, in turn, affected by SPMS system variables (information
quality and system design). Finally, IT and system variables are affected
by organizational variables related to information processing capabilities
and requirements. Using path analysis, we found empirical support for the
model by analyzing data from large-scale survey with a sample of 1,990
respondents. System effectiveness and Internet usage were the two IT
variables found to have the most impact on business results. Furthermore,
system design had a significant role in determining all IT variables that
had an impact on business results.
*Keywords:* Impact on Business Results, Strategic Performance Measurement
Systems, Effectiveness, Usefulness, ERP, System Design, Organization
Information Processing
pp. 25-33
------------------------------
*INNOVATION CHARACTERISTICS INFLUENCING VETERANS’ADOPTION OF E-GOVERNMENT
SERVICES*
Assion Lawson-Body Lori Willoughby Abdou Illia Simon Lee
*Abstract:* Many authors have used the diffusion of innovation (DOI) theory
of Rogers (1995) to study factors affecting citizen e-Gov adoption. But
none of these authors studied the moderating role of the digital divide on
the relationship between innovation characteristics and veterans’ intention
to adopt e-Gov. Our research model postulates that a veteran’s intention to
adopt e-Gov services is determined by the interaction between the digital
divide and five innovation characteristics: relative advantage, perceived
compatibility, perceived complexity, subjective norms and perceived risk.
Data was collected from 183 veterans in a US state where a government
website is designed to deliver e-services to veterans. We found that the
digital divide did not moderate the effect of relative advantage and
subjective norms on the veteran decision to adopt e-Gov services. However,
the digital divide moderates the effect of some factors: perceived
compatibility, perceived complexity and perceived risk. Discussion and
implications are provided.
*Keywords:* Digital divide, E-government, IT adoption, Veterans
pp. 34-44
------------------------------
*ASSESSING INNOVATIONS IN CLOUD SECURITY*
Lara Khansa Christopher Zobel
*Abstract:* The goals of this paper are to analyze the ongoing trends in
innovation related to security in cloud computing, and to identify areas
for improvement. To this end, we collect all cloud security patent
applications (about 512 patent applications) from the United States Patent
Trademark Office (USPTO) and apply data mining techniques to their titles.
This allows us to identify unique keywords that these patent applications
share, and to apply social network analysis to study the relationships
between them. We then use cluster analysis to uncover specific focal
innovation areas that correspond to the well-known confidentiality,
integrity and availability (CIA) triad, thus complementing the USPTO
classification of cloud security innovations. Our results reveal in
particular that the area of cloud availability is under-investigated,
suggesting that more innovation is needed on this front.
*Keywords:* cloud computing; patents; innovation; social network analysis;
cluster analysis; cloud security
pp. 45-56
------------------------------
*BROADBAND ADOPTION IN REGIONAL AND URBAN HOUSEHOLDS*
Sally Rao Hill Indrit Troshani Barry Burgan
*Abstract:* Broadband offers key advantages as a communication
infrastructure, including efficiency and cost savings which can stimulate
productivity, innovation, and ultimately economic growth and social
well-being. This paper presents a comparative study on the adoption of
broadband in urban and regional areas. It proposes a model concerning
broadband adoption which we validate with data collected using a
computer-aided telephone survey. We find that relative advantage, utility
outcomes, and facilitating conditions play a crucial role in explaining the
broadband adoption behavior of both urban and regional household users. In
a dynamic environment where technologies are changing quickly, our findings
about broadband adoption drivers are useful to stakeholders such as
internet service providers, regulators, broadband application developers
for encouraging further broadband and application adoption and developments
in communication space in both regional and urban areas.
*Keywords:* broadband adoption, regional household users, urban household
users, digital divide
pp. 57-66
------------------------------
*AN EMPIRICAL INVESTIGATION OF EMULATORS IN MOBILE WEB RESEARCH*
Dongsong Zhang Jianwei Lai Anupama Dash
*Abstract:* In spite of affordability, portability, and convenience of
mobile handheld devices, there are a number of usability problems
associated with Web access through those devices, largely attributable to
their inherent physical constraints. In the past decade, there have been
increasing empirical studies on interface issues and usability of mobile
handheld devices and mobile Web. However, researchers have been frequently
using emulators of handheld devices running on desktop computers instead of
real, physical handheld devices in those studies. Such a phenomenon raises
validity and generalizability concerns given the differences between
emulators and physical devices. This research empirically investigates
whether the user performance and perception of mobile Web on an emulator is
equivalent to or at least consistent with that on a physical device. The
findings suggest that an emulator may not be able to emulate user
performance and perception with physical handheld devices, and thus should
be used with caution.
*Keywords:* Usability, Mobile Web, Handheld Devices, Emulator, Validity
pp. 67-76
------------------------------
*USER’S ADOPTION OF FREE THIRD-PARTY SECURITY APPS*
Bo Han Andy Wu John Windsor
*Abstract:* Although multiple security applications (apps) are offered by
third-party developers for free, only a small portion of smart device users
have adopted these apps. The lack of relevant research urgently requires an
in-depth investigation of influential factors of the user’s adoption of the
new cyber security countermeasures. In this study, we introduce a
theoretical model by integrating factors from the user’s awareness
perspective and the user’s trust perspective. We find that the user’s
technology awareness and trust in security apps both have significant
positive effects on their adoption intention. The user’s trust in security
apps also has a significant moderating effect on the relationship between
their threat awareness and their adoption intention. These findings do not
only provide a theoretical foundation for future mobile security app
adoption research, but also offer several implications for developers to
push the diffusion of their software in the promising app based cyber
security market.
*Keywords:* Smart technology, security apps, awareness, trust, adoption.
pp. 77-86
------------------------------
*CONSUMER ACCEPTANCE AND CONTINUANCE OF ONLINE GROUP BUYING*
Weng Lim Ding Hooi Ting
*Abstract:* The aim of this study is to establish and examine the
significance of a consumer acceptance and continuance model for online
group buying through the integration of entertainment gratification and
perceived risk with the Technology Acceptance Model. A quantitative study
was conducted and data were obtained through a mall-intercept systematic
sampling distribution of questionnaires. The results indicate that
perceived usefulness, perceived ease of use and perceived risk all have a
significant relationship with consumer attitudes, which subsequently has a
significant effect on intention to use online group buying sites. While
entertainment gratification was found to be insignificant, we reveal some
possible reasons for this finding. The implications of the findings and
future research directions are also discussed.
*Keywords:* online group buying; consumer acceptance and continuance.
pp. 87-96
------------------------------
*TOWARDS A SYSTEMIC FRAMEWORK FOR DIGITAL FORENSIC READINESS*
Mohamed Elyas Sean Maynard Atif Ahmad Andrew Lonie
*Abstract:* Although digital forensics has traditionally been associated
with law enforcement, the impact of new regulations, industry standards and
cyber-attacks, combined with a heavy reliance on digital assets, has
resulted in a more prominent role for digital forensics in organizations.
Modern organizations, therefore, need to be forensically ready in order to
maximize their potential to respond to forensic events and demonstrate
compliance with laws and regulations. However, little research exists on
the assessment of organizational digital forensic readiness. This paper
describes a comprehensive approach to identifying the factors that
contribute to digital forensic readiness and how these factors work
together to achieve forensic readiness in an organization. We develop a
conceptual framework for organizational forensic readiness and define
future work towards the empirical validation and refinement of the
framework.
*Keywords:* Organizational Digital Forensics, Digital Forensic Readiness,
Proactive Digital Forensics.
pp. 97-105
Volume 54, Issue 2
------------------------------
Complimentary Article - Full Text PDF
<http://iacis.org/jcis/articles/JCIS54-2-1.pdf>
*LOOKING INSIDE THE “IT BLACK BOX”: TECHNOLOGICAL EFFECTS ON IT USAGE*
Yuan Sun Anol Bhattacherjee
*Abstract:* Prior research suggests the need to incorporate the information
technology (IT) artifact within extant theories of IT usage, yet little
progress has been made to that end. This study addresses this gap by
incorporating the nature and purpose of the IT artifact in terms of four
characteristics: utilitarian value, hedonic value, communication value, and
technical complexity. The moderating effects of these characteristics on
individual-level IT usage were tested using a meta-analysis method. Our
findings demonstrate how incorporating such variables can provide a richer
and more nuanced understanding of IT usage than that offered by generic
models of IT usage.
*Keywords:* IT Usage, IT Acceptance, Meta-Analysis, Technology Effects, IT
artifact
pp. 1-15
------------------------------
Complimentary Article - Full Text PDF
<http://iacis.org/jcis/articles/JCIS54-2-2.pdf>
*PERCEIVED RISKS AND ICT USE*
Chei Sian Lee Mary Beth Watson-Manheim
*Abstract:* The objective of this research is to investigate the types of
problems and their associated perceived risks as well as the effects of
risks perceived on frequently used information communication technologies
(ICTs) by globally distributed software development teams. We focused on
perceived risk in reception, understanding and action and studied two
global software teams that were at different software development phases
(i.e. requirements analysis versus development and maintenance). Data for
this research was collected from a leading global IT consulting company and
we found that instant messaging, email and teleconferencing system were
frequently used by the two teams. Our results indicate that perceived risks
in reception and action were encountered by members in the systems
development and maintenance phase. Additionally, we also found differences
on the effects of perceived risks on the use of instant messaging, email
and teleconferencing system between the teams.
*Keywords:* Software Development, Distributed Teams, ICT Use, Perceived
Risk, Organization Communication
pp. 16-24
------------------------------
Complimentary Article - Full Text PDF
<http://iacis.org/jcis/articles/JCIS54-2-3.pdf>
*THE DEPENDENT VARIABLE IN SOCIAL MEDIA USE*
Helana Scheepers Rosemary Stockdale Rens Scheepers Nurdin
Nurdin
*Abstract:* What is the dependent variable in social media use? From a
research perspective, this is a pertinent question to help explain and
understand the behaviors that underpin the widespread adoption and use of
social media throughout society. From a practical perspective, the question
is relevant for social media technology providers, for businesses that use
social media, and community organizations that turn towards social media to
reach out to their constituents. We propose the construct ‘sense of
community’ as the dependent variable, which is reflected in four
sub-constructs related to the behaviors of social media users. These
behaviors are information seeking, hedonic activities, sustaining of strong
ties and extending weak ties. Empirical evidence for these constructs comes
from a survey of social media use by 18-25 year-olds in Indonesia, a
country with exceptionally high utilization of social media. We outline
practical implications of the findings and areas for further theoretical
development.
*Keywords:* Social Media, Use, Community, Dependent Variable.
pp. 25-34
------------------------------
*A METHOD FOR EVALUATING PERFORMANCE OF IT-CENTRIC BUSINESSES APPLIED TO
THE DOMAIN OF ELECTRONIC MARKETPLACES*
Sabine Matook
*Abstract:* We present a flexible, context-specific, theory-based method
for evaluating organizational performance that builds on the competing
values framework. Our method consists of two phases, a conceptual and
empirical phase, and is operationalized as a set of six steps, three of
which address the development of appropriate criteria, while the remaining
three address the measurement of performance. We provide a proof-of-concept
for the method by applying it to electronic marketplaces (EMPs). Our EMP
performance analysis demonstrates that EMPs with higher performance values
survived, while those with lower performance values failed. Specifically,
our method for evaluating organizational performance explains the survival
or demise of 90 percent of the EMPs we examined.
*Keywords:* organizational performance, IT-centric businesses, competing
values framework, performance method, survival.
pp. 44-56
------------------------------
*EXTRACTING NEWS FROM SERVER SIDE DATABASES BY QUERY INTERFACES*
Hao Han
*Abstract:* Web news has become an important information resource, and we
can collect and analyze Web news to acquire desired information. In this
paper, an effective and efficient Web-based knowledge acquisition approach
is proposed for extracting Web news full content from news site databases
using site-side news search engines as query interfaces. We do not crawl
the news sites to collect news pages. Instead, we use news search engines
affiliated to the news sites to search for the desired news articles
directly from the news site databases. We give the search keywords to the
search engines and extract the full content of the news articles without
the process of machine learning or pattern matching. This approach is
applicable to general news sites, and the experimental results show that it
can extract a large amount of Web news content from news site databases
automatically, quickly, and accurately.
*Keywords:* Web-based Tools, Knowledge Acquisition, Web News Application,
Information Extraction, Site-side Search Engine, Query Interface, Database
pp. 57-65
------------------------------
*CONSUMERS' INTENTIONS TO USE E-READERS*
Michael Williams Emma Slade Yogesh K. Dwivedi
*Abstract:* Although the e-reader marketplace has become increasingly
significant in recent years, the current lack of understanding of factors
that drive consumers’ intention to use e-readers suggests there is much to
be learned in this area. This study develops and tests a variation on the
Technology Acceptance Model in order to investigate factors influencing
consumers’ intention to use e-readers. A survey of 234 consumers revealed
that perceived usefulness and subjective norm positively influence
intention to use, whereas there was little evidence to support the
significance of image, cost, or ease of use. Findings have both theoretical
and practical implications. Results provide empirical support for some
existing TAM relationships, and a basis from which to examine additional
factors in order to further develop knowledge affecting intention to use
e-readers. Confirmation of the influence of perceived usefulness and
subjective norm has implications for practitioners, particularly in terms
of product design and marketing.
*Keywords:* e-Readers; Consumer adoption; PLS; Technology Acceptance Model
pp. 66-77
------------------------------
*DECOUPLING SOFTWARE FROM HARDWARE IN TECHNOLOGY ACCEPTANCE RESEARCH*
Shinjeng Lin J. Christopher Zimmer Velma Lee
*Abstract:* Technology convergence has become a fiery phenomenon. More and
more technologies can cohabit in the same platform and the information
becomes more portable from one platform to another. The phenomenon presses
on examining the question of what technology entails in technology
acceptance research. If the technology can be decomposed by its dimensions,
e.g., hardware, software, content, will the adoption of one dimension
affect the adoption patterns of other dimensions? Addressing this research
question in the case of podcasting for educational purposes, this study
found that adoption of a mobile device like an iPod can moderate the causal
relationships among the core constructs in the Technology Acceptance Model,
and between the core constructs and the individual differences antecedents,
including subjective norms, self-efficacy and personal innovativeness in
information technology. The research and practice implications are also
discussed.
*Keywords:* technology dimensions, moderating effects, technology
acceptance model, Roger’s diffusion stages, escalation of commitment,
podcasting
pp. 77-86
------------------------------
*INVESTIGATING DESIGN ISSUES IN MOBILE COMPUTER-MEDIATED COMMUNICATION
TECHNOLOGIES*
Solomon Ogara Chang Koh
*Abstract:* Mobility is the new reality of business and stands to have a
significant impact on the implementation of mobile computer- mediated
communication (mCMC), such as mobile texting, mobile video, and mobile
presence. Information systems researchers are faced with the challenge of
how to design these artifacts to maximize the benefits of social
interaction among potential communication partners. We develop a
theoretical model that examines the relationship between user experience,
perceived richness, perceived social presence, interactivity, and
satisfaction in mCMC. Findings suggest that user experience, perceived
richness and interactivity are important in the design of social presence
in mCMC. Both social presence and perceived richness influenced user
satisfaction with mCMC. The influence is greater in mobile instant
messaging than mobile texting.
*Keywords:* user experience, social presence, user satisfaction, media
richness, mobility, interactivity, computer-mediated communication.
pp. 87-98
------------------------------
*CONTINUED USE OF MOBILE TECHNOLOGY MEDIATED SERVICES: A VALUE PERSPECTIVE*
Hua Dai Tao Hu Xihui Zhang
*Abstract:* This study incorporates insights from services marketing and
information systems (IS) usage research, and proposes a service value
perspective of continued use of Mobile Technology Mediated Services (MTMS).
Our study illustrates that customers strongly recognize the value of MTMS
in building utilitarian and hedonic benefits, which influences their
intentions to continue using the service. Our study shows that, when
assessing value of MTMS, customers are less concerned with effort-based
cost for the service use. Instead, the effort-based cost is recognized as a
negative predictor of utilitarian and hedonic benefits of MTMS usage.
Accounting for the dual role of MTMS patrons as a service customer and a
user of IT artifacts, our study contributes to IS theory by incorporating
the value perspective into IS usage literature in the service context. The
findings provide practical guidelines for MTMS managers to develop
value-based strategies for business survival and marketing extension.
*Keywords:* Mobile Technology Mediated Services, Value, Utilitarian
Benefit, Hedonic Benefit, Effort, Continued Use, Information Systems.
pp. 99-109
Volume 54, Issue 1
------------------------------
Complimentary Article - Full Text PDF
<http://iacis.org/jcis/articles/JCIS54-1.pdf>
*THE DUAL ROLE OF TRUST IN SYSTEM USE*
Ofir Turel David Gefen
*Abstract:* Many studies have shown that trust is an important cognition
that drives the continued use of information systems. The theoretical
reasoning behind this effect has been that trust helps people rule out
undesirable, yet possible, opportunistic behaviors, and ultimately makes
users more at ease regarding transacting with a website. In this study, we
build on the relationship marketing literature and argue that trust may
have an even broader role in post-adoption contexts than previously
assumed. Not only can trust influence system use intentions directly (a
dedication mechanism), but also indirectly through the promotion of social
investment in a relationship with a system and its users. This social
investment represents a procedural-relational switching cost (a constraint
mechanism) which further increases continuance intent. Data collected from
382 social networking website users support the hypotheses and validate the
pro¬posed dual-role of trust. Implications for research and practice are
discussed.
*Keywords:* Trust, Social networks, IS Continuance, Social investment,
Relationship marketing, Relational switching costs, Procedural switching
costs
pp. 2-10
------------------------------
Complimentary Article - Full Text PDF
<http://iacis.org/jcis/articles/JCIS54-2.pdf>
*DOES SAMPLE SIzE MATTER IN QUALITATIVE RESEARCH?: A REVIEW OF QUALITATIVE
INTERVIEWS IN IS RESEARCH*
Bryan Marshall Peter Cardon Amit Poddar Renée Fontenot
*Abstract:* This study examines 83 IS qualitative studies in leading IS
journals for the following purposes: (a) identifying the extent to which IS
qualitative studies employ best practices of justifying sample size; (b)
identifying optimal ranges of interviews for various types of qualitative
research; and (c) identifying the extent to which cultural factors (such as
journal of publication, number of authors, world region) impact sample size
of interviews. Little or no rigor for justifying sample size was shown for
virtually all of the IS studies in this dataset. Furthermore, the number of
interviews conducted for qualitative studies is correlated with cultural
factors, implying the subjective nature of sample size in qualitative IS
studies. Recommendations are provided for minimally acceptable practices of
justifying sample size of interviews in qualitative IS studies.
*Keywords:* qualitative methodology, qualitative interviews, data
saturation, sample size
pp. 11-22
------------------------------
Complimentary Article - Full Text PDF
<http://iacis.org/jcis/articles/JCIS54-3.pdf>
*MOBILE BUSINESS INTELLIGENCE: KEY CONSIDERATIONS FOR IMPLEMENTATIONS
PROJECTS*
Kim Verkooij Marco Spruit
*Abstract:* The new generation of mobile devices, such as smartphones and
tablets, is enabling employees to access business insights anytime,
anywhere. This trend in Business Intelligence (BI) is popularized under the
term mobile BI. Various studies indicate a strong increase in the adoption
of this technology. However, mobile BI implementations remain unexplored
and unsupported by implementation methods. By devising a Mobile BI
Implemen¬tation (MOBII) framework, this study aims to fill in this research
gap. A systematic literature review revealed the following major
implementation themes: (1) value creation, (2) application deployment, (3)
information security, (4) workforce mobilization, (5) information delivery
and (6) device management. Moreover, expert interviews revealed twenty key
considerations, which are also included in the framework. Using a single
case study the MOBII framework was successfully evaluated and its practical
applicability was demonstrated by adapting an actively used BI
implementation method.
*Keywords:* business intelligence, mobile business applications,
implementation methods
pp. 23-33
------------------------------
*RESEARCH IN INFORMATION SYSTEMS EDUCATION: SCOPE AND PRODUCTIVITY*
S.E. Kruck Richard Mathieu Michel Mitri
*Abstract:* Information systems (IS) education research is an integral part
of the IS academic community. Research on timely issues such as techniques
for innovative teaching, methods for addressing the recent enrollment
crisis, and revisions to the IS curriculum are vital to the IS discipline.
This paper defines the scope of information systems education research and
identifies the top research journals that publish research related to
information systems education. Ultimately, this paper reports on research
productivity in information systems education at both the institutional and
individual faculty levels for the period 2005¬2010. The results of this
paper suggest that IS education research is global in nature with several
leading institutions outside of North America including universities in
Australia, Belgium, Greece, Hong Kong, Israel, Taiwan, and the United
Kingdom. In addition, several universities prominent in overall IS research
productivity were also prominent in IS education research.
*Keywords:* educational research, research productivity, teaching,
institutional ranking.
pp. 34-41
------------------------------
*OSS ADOPTION: ORGANIZATIONAL INVESTMENT IN INTERNAL HUMAN CAPITAL*
Yan Li Chuan-Hoo Tan Xue Yang
*Abstract:* Adopting Open Source Software (OSS) that has an enterprise-wide
implication could be complex and requires an organization to possess
adequate level of internal human capital before doing so. In this study, we
propose and validate two antecedents of organizational investment in
internal human capital in the context of OSS adoption. They are (1)
firm-specificity of OSS human capital, which denotes the extent to which
the internal OSS human capital is strongly tied to the organization and
cannot be equally well applied in other organizations, and (2)
learning-related scale, which reflects the extent to which the
organizational cost of learning OSS can be spread by applying the knowledge
gained to other projects and business functions within the organization.
Survey data collected from 114 senior Information Technology (IT) managers
and professionals indicates that these two factors are positively
associated with the investment in cultivating internal OSS human capital.
*Keywords:* Open Source Software, Internal Human Capital, Firm Specificity,
Learning-Related Scale
pp. 42-52
------------------------------
*ENTERPRISE RESOURCE PLANNING ADOPTION: STRUCTURAL EQUATION MODELING
ANALYSIS OF ANTECDANTS*
Jiwat Ram David Corkindale Ming-Lu Wu
*Abstract:* This study identifies the key antecedent factors for
accomplishing the adoption stage of enterprise resource planning (ERP)
systems. Five potential antecedent factors of adoption were derived from
the literature, including that on innovation theories, and data were
obtained from a sample of 217 organizations across Australia. A structural
equation modeling (SEM) technique was used to examine the complex
relationships between antecedents and the adoption decision. We found that
there were three positive drivers of a successful outcome of the ERP
adoption stage. Prior findings have shown that system quality is a key
enabler for innovation adoption by individuals, and we found that system
quality is also an important driver for organizational adoption of ERP. It
was also indicated that organizations consider adopting ERP when the market
and customer patterns are relatively stable rather than in turbulent
environments.
*Keywords:* adoption, enterprise resource planning (ERP), structural
equation modeling (SEM), partial least square (PLS), implementation
pp. 53-65
------------------------------
*REDUCING USER-RELATED RISKS WITH USER-DEVELOPER PARTNERING*
Julie Liu Ming-Hsien Yang Gary Klein Houn-Gee Chen
*Abstract:* Risks related to users are a major concern in the development
of information systems (IS). This study examines whether partnering efforts
made between users and IS developers are successful in reducing the
realization of user-related risks during system development. We employ risk
factors identified in the literature to drive a confirmation of risk
reduction via partnering efforts between users and developers. A survey of
system development project managers provides the data for confirmation.
Indications from the survey include risk reducing benefits from
establishing problem resolution, continuous improvement, and common goals
at the commencement of any new development project. This study highlights
that a partnership between users and developers during the development
process mitigates certain risks and improves eventual outcomes of IS
development projects.
*Keywords:* User-developer partnering, project risk management,
user-related risks
pp. 66-74
------------------------------
*PROJECT DURATION AND RISK FACTORS ON VIRTUAL PROJECTS*
April Reed Linda Knight
*Abstract:* This research examines how project duration relates to specific
individual risk factors that threaten virtual projects, i.e. where team
members are not co-located and must rely heavily on computer mediated
communication. A total of 557 project management practitioners completed an
online survey concerning the impact of each of 55 risk factors on one of
their recently completed virtual projects. MANOVA analysis on the ten
factors with the highest risk effect (REff) levels demonstrated a clear
relationship between project duration and six of the ten factors. These six
risks were significantly higher on longer duration projects, suggesting
that (1) these risks need to be followed more closely on longer duration
projects, and (2) projects whose schedules increase over time may be at
greater risk than their risk analyses might indicate. Reasons why some risk
factors have a duration effect, while others do not, are explored.
*Keywords:* risk, virtual project, virtual teams, project duration, project
risk, risk exposure, RE, risk effect, REff, project length, long projects,
large projects, project management, duration effect
pp. 75-83
------------------------------
*TRUST AND DISTRUST IN OPEN SOURCE SOFTWARE DEVELOPMENT*
Shuk Ying Ho Alex Richardson
*Abstract:* Few open source software (OSS) projects have been great success
stories. One reason for this is project stagnation after developers quit
their projects. This fact has motivated researchers to examine the factors
that influence developers’ intention to continue their participation. One
factor is trust among developers. The effects of trust on developers’
intention to re¬main with their projects have been studied. However, little
is known about its conceptual counterpart, distrust. This dearth of
knowledge motivates our research. First, we studied what OSS project
features affect trust and distrust among developers. Second, we examined
how trust and distrust influence developers’ intention to continue
participating. We tested our hypotheses with 451 data points from an online
survey. Our findings indicate that cooperative norms and effective
communication engender trust, whereas an accreditation mechanism eliminates
distrust. Additionally, trust positively influences their intention to
continue participating, whereas distrust negatively influences it.
*Keywords:* open source software; trust; distrust; cooperative norms;
communication; accreditation; governance.
pp. 84-93
------------------------------
*UNDERSTANDING PROFESSIONAL CONNECTIONS IN LINKEDIN — A QUESTION OF TRUST*
Craig Claybaugh William Haseman
*Abstract:* As the popularity of online social networks grow, it becomes
important to understand how context and individual participants influence
trust formation within the network. We investigate the impact that trust —
both at the individual level and network level — has on the strength of
association between members of the professional social networking site
LinkedIn. A model of trust adapted from previous literature is empirically
tested using an online survey sent to a random sample of LinkedIn members.
The findings indicate that dyadic tie strength is influenced by an
individual’s disposition to trust and by the trust belief between the
respondent and the respondent’s last connection made in LinkedIn. Trust in
LinkedIn did not influence the relationship.
*Keywords:* Social Networking, Trust, Trust Intention, Tie Strength,
LinkedIn, Privacy Concern
pp. 94-105
------------------------------
*THE HOLISTIC AND SYSTEMS APPROACH TO THE SUSTAINABLE INFORMATION SOCIETY*
Ewa Ziemba
*Abstract:* The purpose of this research was to propound the conceptual
model of a sustainable information society. First, the essence of a
sustainable information society in the context of an information society
concept is presented. Secondly, different kinds of phenomena and trends of
sustainable information society development are identified and diagnosed.
Thirdly, assumptions for the model of a sustainable information society are
formulated. Finally, special attention is given to the presentation of the
sustainable information society model. Discussion of research findings and
future works for both researchers and practitioners complete the paper.
*Keywords:* information society, sustainable information society,
sustainable development, ICT
pp. 106-116
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20141102/22c44e20/attachment.htm>
More information about the AISWorld
mailing list