29,044 research outputs found

    MANAGING POLICY NETWORKS: A SOCIAL MARKETING- AND COLLECTIVE INTELLIGENCE SYSTEMS-DRIVEN VIEW

    Get PDF
    This research contributes a new view of Policy Networks (PN) management. The research object is a successful PN practice in the Basque Country (BC) over an 8-year period, in relation to Local Agenda 21 (LA21) promotion. The Basque experience is studied using a qualitative and a quantitative approach. PNs are viewed as social marketing-driven collective intelligence systems built to have an effect on municipality commitment to LA21 (in terms of value, satisfaction and loyalty). The research concludes that by fostering the co-development ‘genome’ (a mix of co-decision, co-creation, love, glory and money ‘genes’) a commitment to the new tool is achieved.

    Blind to Time? Temporal Trends in Effect Sizes in IS Research

    Get PDF
    This research-in-progress paper describes cumulative meta-analysis, or meta-trend analysis, a form of meta-analysis that considers temporal trends in effect sizes. While this method is common in medical sciences, it is just starting to gain traction in behavioral research, and temporal trends have typically not been addressed in IS research. A review of 64 meta-analysis papers from 15 IS journals confirms that IS research is generally blind to time. No IS paper has employed meta-trend analysis to test for temporal trends, and less than a quarter of the papers reviewed have any treatment or mention of the possible impact of time. Support from ecological systems theory, in particular the idea of proximal processes, is used to explain why IS researchers may expect temporal trends in effect sizes. To illustrate this, meta-trend analysis is conducted on several frequently examined relationships between IS constructs. Preliminary evidence of temporal trends is observed

    Understanding Continuous Use of Business Intelligence Systems: A Mixed Methods Investigation

    Get PDF
    Business intelligence (BI) systems play an important role in organizations’ decision-making processes. The existing literature has long focused on the continuous use of information systems (IS). However, the specificities of BI systems such as voluntary use, long-term return of investments, heterogeneity of their use cases, and innovative rather than routine use in such systems motivate our investigating continuous use in the specific context of BI systems. To theorize continuous use of BI systems, we investigate the influencing factors and their interactions. By means of an exploratory and confirmatory mixed-methods research design that comprises a literature review, a single-case study, and a survey, we integrate the identified factors and hypothesize their influence on the continuous use of BI systems in a research model. We test the research model following a partial least squares (PLS) approach to structural equation modeling (SEM). The paper makes two primary contributions: 1) it confirms certain well-established constructs and relations in the specific context of BI systems, which are generally theorized for the continuous use of IS, and 2) it introduces either new constructs or new relations through the given investigation in the context of BI systems. Future studies can test these new constructs and relations as potential input for theorizing general IS continuous use

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection

    Get PDF
    The biological immune system (BIS) is characterized by networks of cells, tissues, and organs communicating and working in synchronization. It also has the ability to learn, recognize, and remember, thus providing the solid foundation for the development of Artificial Immune System (AIS). Since the emergence of AIS, it has proved itself as an area of computational intelligence. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. The V-Detectors algorithm depends greatly on the random detectors generated in monitoring the status of a system. These randomly generated detectors suffer from not been able to adequately cover the non-self space, which diminishes the detection performance of the V-Detectors algorithm. This research therefore proposed CSDE-V-Detectors which entail the use of the hybridization of Cuckoo Search (CS) and Differential Evolution (DE) in optimizing the random detectors of the V-Detectors. The DE is integrated with CS at the population initialization by distributing the population linearly. This linear distribution gives the population a unique, stable, and progressive distribution process. Thus, each individual detector is characteristically different from the other detectors. CSDE capabilities of global search, and use of L´evy flight facilitates the effectiveness of the detector set in the search space. In comparison with V-Detectors, cuckoo search, differential evolution, support vector machine, artificial neural network, na¨ıve bayes, and k-NN, experimental results demonstrates that CSDE-V-Detectors outperforms other algorithms with an average detection rate of 95:30% on all the datasets. This signifies that CSDE-V-Detectors can efficiently attain highest detection rates and lowest false alarm rates for anomaly detection. Thus, the optimization of the randomly detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly detection tasks

    Examining the Effects among Motivation Needs, Satisfaction, and Instagram Continuance Intention in Malaysian Students

    Get PDF
    While social media platforms, notably Instagram, have gained traction among university students, this study sought to understand factors influencing their continued use among a segment of Malaysian university students. The primary purpose of this study was to examine the role of satisfaction (SAT) as a mediator in the relationship between various types of motivational needs and the continued intention (CI) to use Instagram. The motivational needs under study included cognitive needs (CN), affective needs (AN), personal integrative needs (PIN), social integrative needs (SIN), and escape needs (EN). This research was built on the foundations of the Uses and Gratifications Theory (UGT) and Expectation Confirmation Theory (ECT). Using a non-probablistic sampling strategy, this study gathered data via questionnaires from a sample of 384 students from six selected universities in Klang Valley. Within the scope of the research sample, a key finding emerged: SAT notably mediates the relationship between CN, SIN, PIN, and CI. This finding illustrates the pivotal role of SAT in the context of UGT and ECT, suggesting that SAT derived from Instagram usage is a critical factor in explaining the sustained engagement of university students, based on specific motivational needs. Within the context of this study's sampled participants, this result offers insights into how SAT, influenced by distinct motivational needs, may impact the intention to continue using Instagram. In practical terms, these insights may assist social media platform developers and educational institutions in understanding and addressing the satisfaction and engagement levels of university users. Simultaneously, the quota sampling strategy employed in this study serves as a valuable model for future research in similar contexts. However, this study recommend that future research expand the sample to include a broader cross-section of Malaysian university students to enhance representativeness and generalizability

    The Impact Of Technology Trust On The Acceptance Of Mobile Banking Technology Within Nigeria

    Get PDF
    With advancement in the use of information technology seen as a key factor in economic development, developed countries are increasingly reviewing traditional systems, in various sectors such as education, health, transport and finance, and identifying how they may be improved or replaced with automated systems. In this study, the authors examine the role of technology trust in the acceptance of mobile banking in Nigeria as the country attempts to transition into a cashless economy. For Nigeria, like many other countries, its economic growth is linked, at least in part, to its improvement in information technology infrastructure, as well as establishing secure, convenient and reliable payments systems. Utilising the Technology Acceptance Model, this study investigates causal relationships between technology trust and other factors influencing user’s intention to adopt technology; focusing on the impact of seven factors contributing to technology trust. Data from 1725 respondents was analysed using confirmatory factor analysis and the results showed that confidentiality, integrity, authentication, access control, best business practices and non-repudiation significantly influenced technology trust. Technology trust showed a direct significant influence on perceived ease of use and usefulness, a direct influence on intention to use as well as an indirect influence on intention to use through its impact on perceived usefulness and perceived ease of use. Furthermore, perceived ease of use and perceived usefulness showed significant influence on consumer’s intention to adopt the technology. With mobile banking being a key driver of Nigeria’s cashless economy goals, this study provides quantitative knowledge regarding technology trust and adoption behaviour in Nigeria as well as significant insight on areas where policy makers and mobile banking vendors can focus strategies engineered to improve trust in mobile banking and increase user adoption of their technology

    Factors Influencing the Infusion of Information Systems: A Literature Review

    Get PDF
    This paper presents a descriptive review of the information system (IS) infusion literature and proposes a structured framework of factors influencing IS infusion. The IS infusion stage, the last stage of IS implementation, is associated with IS implementation success and evidence suggests the depth of IS use leads to increased efficiency and effectiveness. Despite the introduction of the IS infusion concept in the late 1980s, we observe only a small number of empirical studies that examine factors influencing IS infusion at an organizational and an individual level. In addition, some studies show conflicting results and there is no framework to organize previous studies in a meaningful way. We believe that a descriptive review is an appropriate approach at the current state of IS infusion literature. Given the importance of IS infusion, it seems timely to develop a structured framework detailing all the key factors influencing IS infusion found in the extant literature. The framework is drawn from factors derived from theories used in previous IS infusion studies, such as the technology organization environment theory and the theory of planned behavior, to classify different types of influencing factors namely organization, technology, task-job, firm environment and the individual factors. This review paper facilitates further theory development in the IS infusion domain by highlighting under-researched areas, suggesting future directions, and providing a reference source and a classified framework for IS researchers interested in IS infusion. Available at: https://aisel.aisnet.org/pajais/vol8/iss1/2

    The Role of Social Presence and Moderating Role of Computer Self Efficacy in Predicting the Continuance Usage of E-Learning Systems

    Get PDF
    The continuous growth of the electronic learning (e-learning) market has drawn a lot of discussion about the effectiveness of virtual learning environments (VLE). The initial emphasis of e-learning in the context of information technology skills training continues to be relevant. The success of an e-learning program in information technology (IT) may require users to be equipped with a certain degree of computer self-efficacy and affect for information systems. These factors may, in turn, influence the satisfaction level of online learners and their intention to continue using the e-learning system. Therefore, it is plausible that these factors may be as important as or more important than the design of an effective VLE in an IT context. This paper blends the Computer Self-Efficacy (CSE) and Expectation-Confirmation Models (ECM), and assesses their applicability on the intention of online learners who continue using the e-learning system as a vehicle to assimilate IT skills. Second, it theorizes the causal relationship of the factors of Perceived Usefulness, Confirmation, Satisfaction, and IS Continuance in the e-learning context. Finally, it assesses the relative importance of social presence in helping online learners to prevail over the online asynchronous environment. Our results indicate that, in the context of assimilating IT skills, there is not a significant relationship among the CSE of online learners, their perceived usefulness, confirmation, and satisfaction level. As a moderating factor, computer self-efficacy does not have significant influence on learning outcomes. For knowledge long transfer, social presence was shown to have an effect in different VLEs

    Progress in information technology and tourism management: 20 years on and 10 years after the Internet—The state of eTourism research

    Get PDF
    This paper reviews the published articles on eTourism in the past 20 years. Using a wide variety of sources, mainly in the tourism literature, this paper comprehensively reviews and analyzes prior studies in the context of Internet applications to Tourism. The paper also projects future developments in eTourism and demonstrates critical changes that will influence the tourism industry structure. A major contribution of this paper is its overview of the research and development efforts that have been endeavoured in the field, and the challenges that tourism researchers are, and will be, facing
    corecore