16 research outputs found

    Examination of Hedonism in TAM Research

    Get PDF
    Davis’ Technology Acceptance Model (TAM) remains a dominant model that is used extensively for addressing issues of user acceptance (Davis, 1989). Recently, hedonic1 nature of information systems was proposed as a boundary condition for TAM (van der Heijden, 2004). This paper attempts to review and evaluate the existing TAM research in light of this new boundary condition. This is accomplished by reviewing 41 articles published in six premier journals. It is argued that two types of mismatches, i.e. ‘errors of inclusion’ and ‘errors of exclusion’ could occur if the nature of system is not considered. The implications of these errors on the cumulative results of TAM research stream and directions for future research are discussed

    What and Why of Technostress: Technology Antecedents and Implications

    Get PDF
    The Bureau of Labor Statistics (2002) reports that, on average, individuals worked seven hours per week from home in addition to regular work hours. This is made possible by advances in information and communication technologies (ICTs). While the increasing workload is not unusual, it has been related to stress, including the relatively new phenomenon of stress induced by technologies (technostress). Academic literature, popular press and anecdotal evidence suggest that ICTs are responsible for increased stress levels in individuals. However, it is not very clear as to how or why ICTs create stress. Prior research on technostress has been largely descriptive. As ICTs become ubiquitous, their stressful impact can be felt at all levels of an organization. Stress related health costs are increasing dramatically and there is evidence of decreased productivity in stressed individuals (Chilton et al., 2005; Cooper et al., 2001; Jex, 1998). So, organizations have incentives to better understand stressful situations at workplace. Based on the literature from management information systems, psychology, organizational behavior, and occupational stress, a model of technostress is developed to address the question of \u27how and why information and communication technologies enable stress in individuals\u27. Person-Environment fit model (Edwards, 1996) is used as a theoretical lens to explain technostress. The research model proposes that certain technology characteristics exacerbate stressors identified in occupational stress literature leading to the manifestation of stress, referred to as strain. Specifically, technology characteristics - usability (usefulness, complexity, and reliability), intrusive (presenteeism, anonymity), and dynamic (pace of change) are proposed to be related to stressors (work overload, role ambiguity, invasion of privacy, work-home conflict, and job insecurity). Survey design methodology is used to test the proposed research model. Field data for 692 working professionals was obtained from a market research firm (Zoomerang®). In general, the results from structural equation modeling supported the hypotheses from the model. The results suggest that technostress is prevalent (and a significant predictor of overall job strain). Specifically, work overload and role ambiguity are found to be the two most dominant stressors, whereas intrusive technology characteristics are found to be the dominant predictors of stressors. The results from this study have implications for both research and practice. It opens up new avenues for research by showing that ICTs are a source of stress - thereby addressing calls to understand the stressful impacts of ICTs (Nelson, 1990; Weber, 2004). To our knowledge, it is the first empirical study to address the phenomenon of technostress that is theoretically grounded in stress research. The implications of present research to other research streams such as resistance to technologies, value of technology investments are also highlighted. Based on research findings, this research proposes certain recommendations that can influence managerial action. Foremost among these, it brings attention to presence of technostress in organizations and also provides a framework which can be used to assess the extent to which technostress is prevalent

    Risk and Demographics’ Influence on Security Behavior Intentions

    Get PDF
    Behavioral information security has become an important aspect of information security. In this study, we extend previous works on developing a comprehensive tool to measure security behaviors (i.e. Security Behavior Intentions scale - SeBIS(Egelman & Peer, 2015)). We extend the work on SeBIS by 1) proposing the use of security domain-specific risk as opposed to a generic risk measure, 2) investigating differences in SeBIS across age, gender, education and experience, and 3) providing suggestions for improving SeBIS measures. Survey results from our study provide support for security risk - device securement relationship, a previously unsupported link. We also uncover the role of demographics in influencing SeBIS. Overall, our study contributes to, and further establishes SeBIS as a predictive tool for measuring security behaviors. doi:10.17705/3JSIS.0001

    Is Seeing Believing? Training Users on Information Security: Evidence from Java Applets

    Get PDF
    Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users’ compliance to information security policies. We contribute to this literature by arguing that proper implementation of security policies requires effective training. Specifically, we argue that adherence to security policies could be improved by using training strategies where written policies are ‘shown’. To test our assertion, we use a scenario that users often face when browsing – installation of java applets. Based on previous literature, we identified key antecedents of compliance and tested their effectiveness in an experimental setting. One group of users received guidance from a written policy, whereas the other group was ‘shown’ the meaning of the written policy in the form of a video. Our contribution is simple yet powerful – effective information security training can be accomplished when users are shown the reasons behind the written policies. In other words, in addition to written policies, it is beneficial to actually ‘show’ what the policies accomplish

    About Reference Disciplines and Reference Differences: A Critique of Wade et al.

    Get PDF
    Two articles published in this issue (Wade et al. and ours) through similar analyses reach contrasting conclusions on whether Information Systems, as a field, is evolving toward a reference discipline. In this article, we provide a critique of Wade et al. We first assess our different interpretations of reference discipline, and then discuss the consequences of including highly related disciplines in citation analysis. Finally, we illustrate the sensitivity of Wade et al.\u27s results to the inclusion and exclusion of certain journals. We also consider potential interpretations of second degree citations. It is hoped that the arguments presented here reconcile the differences as we collectively advance thinking on the state of IS as a reference discipline

    A Citation Analysis of the Evolution and State of Information Systems within a Constellation of Reference Disciplines

    Get PDF
    For the past two decades notions of cumulative tradition and reference disciplines have been a significant part of the introspective debates on the IS field. We provide an exploratory test on these notions using sociometric analysis. In doing so, we extend the work of Culnan and Swanson originally carried out about 25 years ago. By using the concept of a work point and reference points to identify where an IS article is published and the extent to which it draws from or contributes to other disciplines, we can position research in the IS field. First, a quantitative analysis of over 72,600 citations spread across 1406 IS articles in 16 journals over the period 1990-2003 reveals a distinct trend toward a cumulative tradition, a changing mix of reference disciplines, and a two-way relationship between IS and some of the more mature disciplines. Second, post-hoc content analysis provides a glimpse of how IS work is being utilized by other disciplines. Overall, our analysis indicates that IS is taking up a more socio-technical persona, building upon its own knowledge base, and repaying its debts by contributing to other disciplines. We interpret the movement towards building a cumulative tradition, and informing work in other disciplines as positive, as we strive toward being part of an intellectual network and establish centrality in areas that matter to us most

    Final Report of the Information Technology Subcommittee for the Campus Master Plan

    Get PDF
    Through its work, data collection, outreach, and careful review of various studies and information, the committee is led to conclude that as it moves forward with implementation of its Master Plan, UMass Boston has a tremendous opportunity to plan for and design spaces that support and promote the learning, teaching, and research requirements of the campus community. It is hoped that the recommended guidelines and standards outlined in this report will assist and inform the planning and design of new and renovated campus facilities and specifically address the technological needs of classrooms, laboratories, offices, informal study areas, and social spaces throughout the campus. As technology transforms rapidly and the needs of the campus evolve, the committee also recommends that this report is reviewed and updated on a yearly basis

    Hands-on ERP Learning: Using OpenERP®, an Alternative to SAP®

    No full text
    Recent struggles with ERP systems (Kanaracus, 2010) highlight that teaching ERP skills is still very relevant today. Previous research suggests that knowledge of ERP concepts is more important than skills with any particular ERP package (Strong et al., 2006). However, a review of published studies in JISE shows a bias towards commercial ERP solutions (like SAP®). This gives the impression of high entry barriers to teach hands-on ERP skills. We suggest the use of freely available open source solution – OpenERP®, as an alternative for teaching hands-on ERP concepts. This provides numerous schools an avenue to teach hands-on component without the need for significant resource commitment. Our experiences from a simple role-playing exercise and related hands-on component using OpenERP® are discussed. In conclusion, we make an important contribution by providing details and experiences with using a free ERP solution – OpenERP®
    corecore