-
作者:Wang, Ping
作者单位:University System of Maryland; University of Maryland College Park
摘要:What happens to organizations that chase the hottest information technologies? This study examines some of the important organizational impacts of the fashion phenomenon in IT. An IT fashion is a transitory collective belief that an information technology is new, efficient, and at the forefront of practice. Using data collected from published discourse and annual IT budgets of 109 large companies for a decade, I have found that firms whose names were associated with IT fashions in the press di...
-
作者:Choi, Sue Young; Lee, Heeseok; Yoo, Youngjin
作者单位:Samsung; Korea Advanced Institute of Science & Technology (KAIST); Pennsylvania Commonwealth System of Higher Education (PCSHE); Temple University
摘要:In contemporary knowledge-based organizations, teams often play an essential role in leveraging knowledge resources. Organizations make significant investments in information technology to support knowledge management practices in teams. At the same time, recent studies show that the transactive memory system (TMS) the specialized division of cognitive labor among team members that relates to the encoding, storage, and retrieval of knowledge is an important factor that affects a team's perform...
-
作者:Venkatesh, Viswanath; Goyal, Sandeep
作者单位:University of Arkansas System; University of Arkansas Fayetteville; University Southern Indiana
摘要:Individual-level information systems adoption research has recently seen the introduction of expectation disconfirmation theory (EDT) to explain how and why user reactions change over time. This prior research has produced valuable in-sights into the phenomenon of technology adoption beyond traditional models, such as the technology acceptance model. First, we identify gaps in EDT research that present potential opportunities advances specifically, we discuss methodological and analytical limi...
-
作者:Siponen, Mikko; Vance, Anthony
作者单位:University of Oulu; Brigham Young University
摘要:Employees' failure to comply with information systems security policies is a major concern for information technology security managers. In efforts to understand this problem, IS security researchers have traditionally viewed violations of IS security policies through the lens of deterrence theory. In this article, we show that neutralization theory. a theory prominent in Criminology but not yet applied in the context of IS, provides a compelling explanation for IS security policy violations a...
-
作者:McKinney, Earl H., Jr.; Yoos, Charles J., II
作者单位:University System of Ohio; Bowling Green State University; Fort Lewis College
摘要:Information is poorly defined in the Information Systems research literature, and is almost always unspecified, a reflexive, all-purpose but indiscriminant solution to an unbounded variety of problems. We present a taxonomy of four views token, syntax, representation, and adaptation to enable scholars and practitioners to specify their concept of information. This taxonomy is normative, but we also provide a background review of the etymology and chronology of information, and we sample uses o...
-
作者:Bulgurcu, Burcu; Cavusoglu, Hasan; Benbasat, Izak
作者单位:University of British Columbia
摘要:Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information security. Since employees who comply with the information security rules and regulations of the organization are the key to strengthening information security, understanding compliance behavior is crucial for organizations that want to leverage their human capital. This research identifies the antecede...
-
作者:Mahmood, M. Adam; Siponen, Mikko; Straub, Detmar; Rao, H. Raghav; Raghu, T. S.
作者单位:University of Texas System; University of Texas El Paso; University of Oulu; University System of Georgia; Georgia State University; State University of New York (SUNY) System; University at Buffalo, SUNY; Arizona State University; Arizona State University-Tempe
-
作者:Riedl, Rene; Hubert, Marco; Kenning, Peter
作者单位:Johannes Kepler University Linz; Zeppelin University
摘要:Research provides increasing evidence that women and men differ in their decisions to trust. However, information systems research does not satisfactorily explain why these gender differences exist. One possible reason is that, surprisingly, theoretical concepts often do not address the most obvious factor that influences human behavior: biology. Given the essential role of biological factors-and specifically those of the brain in decisions to trust, the biological influences should naturally ...
-
作者:Lee, Gwanhoo; Xia, Weidong
作者单位:American University; State University System of Florida; Florida International University
摘要:As business and technology environments change at an unprecedented rate, software development agility to respond to changing user requirements has become increasingly critical for software development performance. Agile software development approaches, which emphasize sense-and-respond, self-organization, cross-functional teams, and continuous adaptation, have been adopted by an increasing number of organizations to improve their software development agility. However, the agile development lit...
-
作者:Smith, Stephen; Winchester, Donald; Bunker, Deborah; Jamieson, Rodger
作者单位:University of New South Wales Sydney; University of Sydney
摘要:Organizations need to protect information assets against cyber crime, denial-of-service attacks, web hackers, data breaches, identity and credit card theft, and fraud. Criminals often try to achieve financial, political, or personal gain through these attacks, so the threats that their actions prompt are insidious motivators for organizations to adopt information systems security (ISS) approaches. Extant ISS research has traditionally examined ISS in e-commerce business organizations. The pres...