354 research outputs found

    Citation Analyses in Information Systems

    Get PDF
    Few scientists that specialize in information systems would recognize the name one of the field’s most cited authors, Ike Antkare. It is not that Antkare is from an obscure discipline. This aberration is the result of a vulnerability of citation analyses. A vulnerability proven with a computer program. Today, funding, promotion and tenure extension depend on the results of these analyses. This paper explores the nature of citation analyses in the information systems (IS) field and classifies them based on an adapted framework of Zupic and Cater (2015). The results illustrate two types of citation analyses. The first type contains ranking studies using measures of the h-family index calculated on citation networks. The second type involves co-citation analysis applying cluster or factor analysis to determine the intellectual structure, trajectory or maturity

    Unanticipated Software Use by Adolescents Following Mandatory Adoption

    Get PDF
    This research proposes a model to predict unanticipated use of software by high school students after mandatory adoption. We define unanticipated use as voluntarily extending the use of a software product to new tasks and new settings after mandatory adoption for a specific task in a specific setting. We are basing our model on TAM2 (Venkatesh and Davis 2000), which is an extension of the original technology acceptance model (TAM) (Davis 1986). Typically, research in this area investigates technology acceptance in voluntary settings. However, a few studies have looked at acceptance in mandatory settings (Rawstorne et al. 2000). Our research involves actual behavior so we have removed the intention to use construct from the original TAM2 model. Due to the nature of our subjects and the educational setting, we have also removed the following original TAM2 constructs: output quality, voluntariness, and job relevance. We have added personal innovativeness in the domain of information technology (PIIT) (Agarwal and Prasad 1998) and computer self- efficacy (CSE) (Compeau and Higgins 1995)

    The Role of the Doctoral Consortium: An Information Systems Signature Pedagogy?

    Get PDF
    The doctoral consortium is a well-established, widely endorsed event in the information systems (IS) discipline that occurs adjunct to mainstream IS conferences (e.g., ICIS, ECIS, PACIS, AMCIS). Anecdotal evidence suggests that PhD students’ experience of these events is almost universally positive; some have referred to the events as “life changing” or “magical”. Further, both participating students and scholars strongly perceive the events’ value. To extend the experience to more PhD students, doctoral consortia are more recently being run locally and unaffiliated with any conference. By reviewing the literature and historical documents and conducting a series of interviews and email exchanges with past conference co-chairs, we explore the merits of IS doctoral consortia (consortia). We position the IS doctoral consortium as distinct from forms of doctoral student development in other disciplines, a veritable “signature pedagogy” for IS. In examining the practices and motivations underlying doctoral consortia, we explain related phenomena to improving future consortia. In addition, by appending much historical detail, we add to the IS discipline’s organizational memory

    An Empirical Study of Electronic Commerce Intrapreneurship Within the IT Units of Large Organizations

    Get PDF
    The rapid growth of the electronic commerce (EC) sector saw the traditional business models of many large organizations being challenged by internet technology-based dot.com start-ups. One reason that can be identified for this is the inability of the information technology (IT) units of these large organizations to respond in a timely manner to the technological innovation and entrepreneurial challenge of electronic commerce. There is therefore a need for chief information officers (CIOs) and information systems managers in large organizations to pay greater attention to nurturing electronic commerce ìintrapreneurshipî (also known as corporate entrepreneurship) within their IT units. This study develops and empirically validates a theoretical model for electronic commerce intrapreneurship within the IT units of large organizations through an empirical survey of chief information officers. The survey focuses on measuring the level of EC intrapreneurship within the IT unit as represented by its four theoretical components: new business venturing, innovativeness, self- renewal and proactiveness. The study also investigates other constructs representing the environmental and organizational antecedents of IT unit intrapreneurship, as well as its effects on both electronic commerce assimilation and organizational performance. The results clarify the role that the IT units of large corporations have played in the organizational response to the business and technical innovation challenge of electronic commerce

    Effect of Website Characteristics on Consumer Behavior: A Multilevel Analysis

    Get PDF
    This paper uses a hierarchical linear modeling approach to examine factors that affect Website effectiveness from a customer viewpoint. Use of hierarchical linear modeling allows analysis of multilevel and cross-level interactions that have not been explicitly considered in previous research. Our preliminary analysis of online Web survey data suggests that the relative importance of different Website features may vary depending on the domain in which Websites are nested

    Is Music Piracy Normal? Behavioral Effects of Social and Technological Barriers

    Get PDF
    Music piracy, once a novel issue covered in technology magazines, has become an issue of considerable importance and is discussed regularly in mainstream media. Despite the strategies and alternatives aimed at reducing piracy behaviour, the phenomenon remains a major issue for the industry. This paper continues from previous work by testing a further section of the previously proposed model using Structural Equation Modelling (SEM). The Economic and Complexity factors were found to be relevant, but, surprisingly, age was unexpectedly found not to be significant. Users from lower income brackets were more likely to engage in music piracy, and the relative complexity of the legal process of music downloading was found to be a barrier to legally downloading music, thus operating to turn users toward music piracy. Our work and other studies suggest that some degree of music piracy is actually beneficial to the industry, and further research should confirm this notion and determine whether an optimum level exists

    What Drives Waves in Information Systems: The Organizing Vision Perspective

    Get PDF
    Waves of fashionable ideas shape the practice and research of information systems (IS). What forces drive idea waves in IS? This research takes the first step to empirically study IS idea waves in inter-organizational com- munities through the lens of organizing visions. Introduced by Swanson and Ramiller (1997), an organizing vision is a focal community idea for applying information technologies in organizations. Each organizing vision is produced and sustained through a discourse whose popularity often runs a wave-like lifecycle. By studying the discourse promoting enterprise resource planning (ERP), I examine the influence of four forces on the upswing phase of an organizing vision discourse wave: (1) a business problematic highlighted by discourse, (2) the early market for an IS innovation, (3) core technologies, and (4) the collapse of old organizing visions in a problem domain. A better understanding of the relationship between key forces and organizing vision development will help both practitioners and researchers monitor and relate to the exciting waves in our field

    An Exploratory Study of Ideology and Trust in Open Source Development Groups

    Get PDF
    Open source (OS) software development has been the subject of heightened interest among organizational scholars because of the novel social coordination practices that signal a departure from traditional proprietary software development. We propose that trust among group members in open source development groups (OSDGs) plays a key role in facilitating their success. Trust is important in this context because of the risk of opportunistic behavior by other members who volunteers may not have met and may never expect to meet, as well as a lack of explicit market contracts or common organizational affiliation. The open source community is differentiated by a coherent ideology that emphasizes a distinct set of interrelated norms, beliefs, and values. These serve to create incentives for open source practices that eschew conventional transactional norms in favor of a gift culture and a focus on reputations. In this study, we primarily examine the role of the shared ideology in enabling the development of affective and cognitive trust in OSDGs. We further examine how this trust leads to desired outcomes ñ group efficacy and effectiveness. The study is based on exploratory interviews, examination of archival records and a preliminary survey to understand the specific conditions of open source efforts on which this work-in-progress report is based. This is being followed-up by empirical testing of our research model through a survey of a broad variety of OSDGs. This study would contribute to a clarification of the role of trust in enabling software groups to work effectively and help to understand the bases of trust in ideology-permeated groups

    Research Ethics in Information Systems: Would a Code of Practice Help?

    Get PDF
    The ethical conduct of research is a mark of integrity in the academic and professional worlds. This paper, which draws upon discussions conducted in a panel at the 21st ICIS conference in Brisbane, examines ethical issues associated with three key components of the research process: design, data collection and analysis; writing; and reviewing. The implications of these issues for the IS research community are discussed. Example scenarios are used to illuminate the issues faced by authors and reviewers. After considering the alternatives of strict guidelines enforced by bureaucratic structures, self regulation without guidelines and self regulation through norms set by a code of practice, the last option is recommended because it can lead to better practice in a constructive fashion without either excessive bureaucratic intervention or a free-for-all where anything goes

    Enterprise Systems Success: A Measurement Model

    Get PDF
    This paper presents a validated measurement model and instrument for assessing enterprise systems success from multiple perspectives. The final validated study model employs 27 measures of the four dimensions: information quality, system quality, individual impact, and organizational impact. The model is empirically tested with survey data gathered from 27 public sector organizations that implemented SAP R/3 in the late 1990s. The study consists of an exploratory inventory survey (model building) to identify the salient success dimensions and measures, followed by a confirmatory weights survey, for testing model validity (model testing). Test results demonstrate the discriminant validity of the four dimensions, as well as their convergence on a single higher-order phenomenon: enterprise systems success (ESS). Criterion validity testing further demonstrates the additivity of the four dimensions of success, and the completeness of the resultant over- arching, second-order measure of ESS
    • 

    corecore