-
作者:Sarker, Saonee; Valacich, Joseph S.
作者单位:Washington State University
摘要:Studies on groups within the MIS discipline have largely been based on the paradigm of methodological individualism. Commentaries on methodological individualism within the reference disciplines suggest that studies embracing this paradigm can lead to potentially misleading or incorrect conclusions. This study illustrates the appropriateness of the alternate non-reductionist approach to investigating group-related phenomenon, specifically in the context of technology adoption. Drawing on theor...
-
作者:Wattal, Sunil; Schuff, David; Mandviwalla, Munir; Williams, Christine B.
作者单位:Pennsylvania Commonwealth System of Higher Education (PCSHE); Temple University; Bentley University
摘要:The Internet was a major factor in the 2008 U.S. presidential campaign and has become an important tool for political communication and persuasion. Yet, information systems research is generally silent on the role of the Internet in politics. In this paper, we argue that IS is positioned to enhance understanding of the influence of the Internet on politics, and, more specifically, the process of election campaigning using Internet-based technologies such as Web 2.0. In this paper, we discuss h...
-
作者:Spears, Janine L.; Barki, Henri
作者单位:DePaul University; Universite de Montreal; HEC Montreal
摘要:This paper examines user participation in information systems security risk management and its influence in the context of regulatory compliance via a multi-method study at the organizational level. First, eleven informants across five organizations were interviewed to gain an understanding of the types of activities and security controls in which users participated as part of Sarbanes-Oxley compliance, along with associated outcomes. A research model was developed based on the findings of the...
-
作者:Seddon, Peter B.; Calvert, Cheryl; Yang, Song
作者单位:University of Melbourne; Monash University
摘要:This paper develops a long-term, multi-project model of factors affecting organizational benefits from enterprise systems (ES), then reports a preliminary test of the model. In the shorter-term half of the model, it is hypothesized that once a system has gone live, two factors, namely functional fit and overcoming organizational inertia, drive organizational benefits flowing from each major ES improvement project. The importance of these Actors may vary from project to project. In the long-ter...
-
作者:Anderson, Catherine L.; Agarwal, Ritu
作者单位:University System of Maryland; University of Maryland College Park; University System of Maryland; University of Maryland College Park
摘要:Although firms are expending substantial resources to develop technology and processes that can help safeguard the security of their computing assets, increased attention is being focused on the role people play in maintaining a safe computing environment. Unlike employees in a work setting, home users are not subject to training, nor are they protected by a technical staff dedicated to keeping security software and hardware current. Thus, with over one billion people with access to the Intern...
-
作者:Galbreth, Michael R.; Shor, Mikhael
作者单位:University of South Carolina System; University of South Carolina Columbia; Vanderbilt University
摘要:In this paper, a competitive software market that includes horizontal and quality differentiation, as well as a negative network effect driven by the presence of malicious agents, is modeled. Software products with larger installed bases, and therefore more potential computers to attack, present more appealing targets for malicious agents. One finding is that software firms may profit from increased malicious activity. Software products in a more competitive market are less likely to invest in...
-
作者:Thomas, Dominic M.; Bostrom, Robert P.
作者单位:Emory University; University System of Georgia; University of Georgia
摘要:This study explores how team leaders sense the need for technology adaptation intervention in distributed, computer mediated (virtual') teams. Analysis and coding of critical incident data collected in interviews of practicing leaders produce a five-trigger model including (1) external constraint, (2) internal constraint, (3) information and communication technology (ICT) inadequacy, (4) ICT knowledge, skills, and abilities inadequacy, and (5) trust and relationship inadequacies. The resulting...
-
作者:Mani, Deepa; Barua, Anitesh; Whinston, Andrew
作者单位:Indian School of Business (ISB); University of Texas System; University of Texas Austin
摘要:Organizations today outsource diverse business processes to achieve a wide variety of business objectives ranging from reduction of costs to innovation and business tran formation. We build on the information processing view of the firm to theorize that performance heterogeneity across business process outsourcing (BPO) exchanges is a function of the design of information capabilities (IC) that fit the unique information requirement (IR) of the exchange. Further, we compare performance effects...
-
作者:Gordon, Lawrence A.; Loeb, Martin P.; Sohail, Tashfeen
作者单位:University System of Maryland; University of Maryland College Park; IE University
摘要:Information security is a fundamental concern for corporations operating in today's digital economy. The number of firms disclosing items concerning their information security on reports filed with the U. S. Securities and Exchange Commission (SEC) has increased in recent years. A question then arises as to whether or not there is value to the voluntary disclosures concerning information security. Thus, the primary objective of this paper is to assess empirically the market value of voluntary ...
-
作者:Mudambi, Susan M.; Schuff, David
作者单位:Pennsylvania Commonwealth System of Higher Education (PCSHE); Temple University; Pennsylvania Commonwealth System of Higher Education (PCSHE); Temple University
摘要:Customer reviews are increasingly available online for a wide range of products and services. They supplement other information provided by electronic storefronts such as product descriptions, reviews from experts, and personalized advice generated by automated recommendation systems. While researchers have demonstrated the benefits of the presence of customer reviews to an online retailer, a largely uninvestigated issue is what makes customer reviews helpful to a consumer in the process of ma...