-
作者:Cummings, Jonathon N.; Espinosa, J. Alberto; Pickering, Cynthia K.
作者单位:Duke University; American University; Intel Corporation; Intel USA
摘要:In globally distributed projects, members have to deal with spatial boundaries (different cities) and temporal boundaries (different work hours) because other members are often in cities within and across time zones. For pairs of members with spatial boundaries and no temporal boundaries (those in different cities with overlapping work hours), synchronous communication technologies such as the telephone, instant messaging (IM), and Web conferencing provide a means for real-time interaction. Ho...
-
作者:Mithas, Sunil; Krishnan, M. S.
作者单位:University System of Maryland; University of Maryland College Park; University of Michigan System; University of Michigan
摘要:Despite the importance of causal analysis in building a valid knowledge base and in answering managerial questions, the issue of causality rarely receives the attention it deserves in information systems (IS) and management research that uses observational data. In this paper, we discuss a potential outcomes framework for estimating causal effects and illustrate the application of the framework in the context of a phenomenon that is also of substantive interest to IS researchers. We use a matc...
-
作者:Raghu, T. S.; Sinha, Rajiv; Vinze, Ajay; Burton, Orneita
作者单位:Arizona State University; Arizona State University-Tempe; Arizona State University; Arizona State University-Tempe; Abilene Christian University
摘要:Competition from open source software and free software (OSS/FS) alternatives is causing proprietary software producers to reevaluate product strategies. OSS/FS alternatives complicate an already complex information goods market plagued by piracy concerns. Although producer perspectives on software pricing and piracy controls have been addressed extensively, consumers' perspective and willingness to pay for commercial software is not very well understood. This paper empirically determines will...
-
作者:Harris, Michael L.; Collins, Rosann Webb; Hevner, Alan R.
作者单位:Indiana University System; Indiana University Southeast; State University System of Florida; University of South Florida
摘要:W hen should software development teams have the flexibility to modify their directions and how do we balance that flexibility with controls essential to produce acceptable outcomes? We use dynamic capabilities theory and an extension of control theory to understand these questions. This work is examined in a case study. Our results demonstrate that flexibility may be needed when the starting conditions are uncertain and that effective control in these situations requires use of traditional co...
-
作者:Vidgen, Richard; Wang, Xiaofeng
作者单位:University of New South Wales Sydney; University of Limerick
摘要:Despite the popularity of agile methods in software development and increasing adoption by organizations there is debate about what agility is and how it is achieved. The debate suffers from a lack of understanding of agile concepts and how agile software development is practiced. This paper develops a framework for the organization of agile software development that identifies enablers and inhibitors of agility and the emergent capabilities of agile teams. The work is grounded in complex adap...
-
作者:Chen, Yuanyuan; Bharadwaj, Anandhi
作者单位:National University of Singapore; Emory University
摘要:Outsourcing of information technology (IT) services has received much attention in the information systems (IS) literature. However, considerably less attention has been paid to actual contract structures used in IT outsourcing (ITO). Examining contract structures yields important insights into how the contracting parties structure the governance provisions and the factors or transaction risks that influence them. Based on insights from prior literature, from practicing legal experts, and thro...
-
作者:Conboy, Kieran
作者单位:Ollscoil na Gaillimhe-University of Galway
摘要:Awareness and use of agile methods has grown rapidly among the information systems development (ISD) community in recent years. Like most previous methods, the development and promotion of these methods have been almost entirely driven by practitioners and consultants, with little participation from the research community during the early stages of evolution. While these methods are now the focus of more and more research efforts, most studies are still based on XP, Scrum, and other industry-d...
-
作者:Agarwal, Ritu; Animesh, Animesh; Prasad, Kislaya
作者单位:University System of Maryland; University of Maryland College Park; McGill University
摘要:Given the increasingly important role of the Internet in education, healthcare, and other essential services, it is important that we develop an understanding of the digital divide. Despite the widespread diffusion of the Web and related technologies, pockets remain where the Internet is used sparingly, if at all. There are large geographic variations, as well as variations across ethnic and racial lines. Prior research suggests that individual, household, and regional differences are responsi...
-
作者:Kayande, Ujwal; De Bruyn, Arnaud; Lilien, Gary L.; Rangaswamy, Arvind; van Bruggen, Gerrit H.
作者单位:Australian National University; ESSEC Business School; Pennsylvania Commonwealth System of Higher Education (PCSHE); Pennsylvania State University; Pennsylvania State University - University Park; Erasmus University Rotterdam - Excl Erasmus MC; Erasmus University Rotterdam
摘要:Model-based decision support systems (DSS) improve performance in many contexts that are data-rich, uncertain, and require repetitive decisions. But such DSS are often not designed to help users understand and internalize the underlying factors driving DSS recommendations. Users then feel uncertain about DSS recommendations, leading them to possibly avoid using the system. We argue that a DSS must be designed to induce an alignment of a decision maker's mental model with the decision model emb...
-
作者:Cavusoglu, Huseyin; Raghunathan, Srinivasan; Cavusoglu, Hasan
作者单位:University of Texas System; University of Texas Dallas; University of British Columbia
摘要:Proper configuration of security technologies is critical to balance the needs for access and protection of information. The common practice of using a layered security architecture that has multiple technologies amplifies the need for proper configuration because the configuration decision about one security technology has ramifications for the configuration decisions about others. Furthermore, security technologies rely on each other for their operations, thereby affecting each other's contr...