-
作者:Boss, Scott R.; Galletta, Dennis F.; Lowry, Paul Benjamin; Moody, Gregory D.; Polak, Peter
作者单位:Bentley University; Pennsylvania Commonwealth System of Higher Education (PCSHE); University of Pittsburgh; City University of Hong Kong; Nevada System of Higher Education (NSHE); University of Nevada Las Vegas; State University System of Florida; Florida International University
摘要:Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on paramount importance. Consequently, a key focus of ISec research has been discovering ways to motivate individuals to engage in more secure behaviors. Over time, the protection motivation theory (PMT) has become a leading theoretical foundation used in ISec research to help motivate individuals to change their security-...
-
作者:Ramasubbu, Narayan; Bharadwaj, Anandhi; Tayi, Giri Kumar
作者单位:Pennsylvania Commonwealth System of Higher Education (PCSHE); University of Pittsburgh; Emory University; State University of New York (SUNY) System; University at Albany, SUNY
摘要:This article investigates software process diversity, defined as the project condition arising out of the simultaneous use of multiple software development process frameworks within a single project. Software process diversity is conceptualized as the response of a project team to such contingencies as requirements volatility, design and technological novelty, customer involvement, and the level of organizational process compliance enforced on the project. Moreover, we conceptualize that the d...
-
作者:Singh, Harpreet; Aggarwal, Rohit; Cojuharenco, Irina
作者单位:University of Texas System; University of Texas Dallas; Utah System of Higher Education; University of Utah; Northeastern University; Universidade Catolica Portuguesa
摘要:In this article, the effect of IT knowledge on the overconfidence of venture capitalists (VCs) in their IT investments is examined. Our findings show that the effect of IT knowledge on overconfidence is nonlinear. VCs with moderate levels of IT knowledge are least overconfident. At the same time, VCs with moderate levels of IT knowledge are most resistant to the biasing effects of past successes. Past failures show a negative association with overconfidence independent of the level of the VC's...
-
作者:Saar-Tsechansky, Maytal
作者单位:University of Texas System; University of Texas Austin
-
作者:Han, Wencui; Ada, Serkan; Sharman, Raj; Rao, H. Raghav
作者单位:University of Illinois System; University of Illinois Urbana-Champaign; Selcuk University; State University of New York (SUNY) System; University at Buffalo, SUNY
摘要:The increasing number of campus-related emergency incidents, in combination with the requirements imposed by the Clery Act, have prompted college campuses to develop emergency notification systems to inform community members of extreme events that may affect them. Merely deploying emergency notification systems on college campuses, however, does not guarantee that these systems will be effective; student compliance plays a very important role in establishing such effectiveness. Immediate compl...
-
作者:Leonardi, Paul M.
作者单位:University of California System; University of California Santa Barbara
摘要:The argument proffered in this paper is that use of enterprise social networking technologies can increase the accuracy of people's metaknowledge (knowledge of who knows what and who knows whom) at work. The results of a quasi-natural field experiment in which only one of two matched-sample groups within a large financial services firm was given access to the enterprise social networking technology for six months revealed that by making people's communications with specific partners visible to...
-
作者:Rai, Arun; Arikan, Ilgaz; Pye, Jessica; Tiwana, Amrit
作者单位:University System of Georgia; Georgia State University; University System of Georgia; Georgia State University; University System of Ohio; Kent State University; Kent State University Salem; Kent State University Kent; University System of Georgia; University of Georgia
摘要:Recent work has shown that a firm's plural sourcing strategy, which determines how much it chooses to make versus how much it chooses to buy, requires consideration of the complementarities and constraints that affect the differential advantages of making and buying. Elaborating on this perspective, we theorize how (mis)fit between a firm's plural sourcing strategy of simultaneously making and buying and its development of information technology (IT) enabled interfirm and intrafirm process int...
-
作者:Yeow, Adrian; Goh, Kim Huat
作者单位:Singapore University of Social Sciences (SUSS); Nanyang Technological University
摘要:While the impacts of health information technology (HIT) are widely studied, prior research presents mixed findings. In this study, a granular examination of the impact of HIT systems on how resources are allocated to healthcare tasks and processes was undertaken. A longitudinal field study that combined interview, archival, observation, and survey data was conducted. The effects of telemedicine on the input allocative efficiency of the healthcare process through the reallocation of organizati...
-
作者:Sabherwal, Rajiv; Jeyaraj, Anand
作者单位:University of Arkansas System; University of Arkansas Fayetteville; University System of Ohio; Wright State University Dayton
摘要:Despite the importance of investing in information technology, research on business value of information technology (BVIT) shows contradictory results, raising questions about the reasons for divergence. Kohli and Devaraj (2003) provided valuable insights into this issue based on a meta-analysis of 66 BVIT studies. This paper extends Kohli and Devaraj by examining the influences on BVIT through a meta-analysis of 303 studies published between 1990 and 2013. We found that BVIT increases when th...
-
作者:Carter, Michelle; Grover, Varun
作者单位:University of Washington; University of Washington Seattle; Clemson University
摘要:As social roles and relationships become increasingly inseparable from people's interactions with information technologies (ITs), new constructs representing this intertwinement are needed to expand understandings of human behavior. As part of that endeavor, this paper draws on structural symbolic interactionist identity theories to systematically develop a conceptual definition of one such construct, IT identity-defined as the extent to which an individual views use of an IT as integral to hi...