136 research outputs found

    Journal Self-Citation XIV: Right Versus Right – Gaining Clarity into the Ethical Dilemma of Editorial Self-Referencing

    Get PDF
    The practice of editorial “self-referencing” – journal editors requiring that authors include in their papers a specific number of citations from the journal in which they seek to publish – has recently garnered significant interest within the IS academic community. A recent survey of AISWorld suggests that the vast majority of respondents find this practice inappropriate and unethical. Rather than dismissing this behavior as patently unethical, this paper seeks to better understand the possible motivations for this editorial behavior. The notion of the ethical dilemma is introduced, as well as a framework to assist in analyzing them. Ultimately, the analysis suggests that while editors may feel they have worthwhile reasons for requiring self-references, the potential long term risks to the journal, the academy, and the body of knowledge outweigh those reasons

    Information Systems and Healthcare XVI: Physician Adoption of Electronic Medical Records: Applying the UTAUT Model in a Healthcare Context

    Get PDF
    This study applies the Unified Theory of Acceptance and Use of Technology (UTAUT) to the phenomenon of physician adoption of electronic medical records (EMR) technology. UTAUT integrates eight theories of individual acceptance into one comprehensive model designed to assist in understanding what factors either enable or hinder technology adoption and use. As such, it provides a useful lens through which to view what is currently taking place in the healthcare industry regarding EMR adoption. This is mutually beneficial to both the healthcare and MIS communities, as UTAUT offers valuable practical insight to the healthcare industry in explaining why EMR technology has not been more widely adopted as well as what prescriptions may facilitate future adoption, while offering the MIS community the opportunity to strengthen existing theory through an illustration of its application

    IS Students in Demand: Products of the Reengineered IS Classroom

    Get PDF
    Research suggests that IS people have lower social needsthan people in other occupations. Indeed, personal research on what motivates IS professionals reveals that interacting with other people and establishing relationships are some of the lower-rated motivational factors. Perhaps then, it should not be too surprising to learn that one of the most often heard complaints of IS majors relates to the inadequacy of their communication skills. Corroborating evidence is abundant. For example, IS departments, consulting companies, and computer vendors often recruit people who do not major in IS. These firms instead overlook the best and brightest IS students to recruit non-IS students that have developed interpersonal skills through other means --experience with student organizations, fraternities or sororities, or membership in student chapters of professional business societies on campus. When asked why this is the case, recruiters indicate that the ability to communicate effectively is a critical skill in their organizations, and that the interpersonal skills possessed by their candidates were fundamentally more important than the technical skills possessed by IS graduates. Recruiters feel that technical deficiencies possessed by their newly-hired employees can be overcome in training programs, whereas deficienciesin the ability to communicate effectively present a much larger training challenge. This is consistent with recent literature which reports that of all skills, the following are the most sought after by employers [1]: •listening and oral communication •group effectiveness: interpersonal skills, negotiation, and teamwork •adaptability: creative thinking and problem solving •personal management of career development Consequently, we as IS educators owe it to our students to begin to consider developing these skills within the IS curriculu

    INTERNET EDI ADOPTION: TRUST IN TECHNOLOGY AND APPLICATION KNOWLEDGE

    Get PDF

    Organizational Impact of Enterprise User Interface Approach in Healthcare

    Get PDF
    Delivering systems that are consistent across the enterprise represents a challenge all organizations deal with today. The healthcare industry is no different. The authors present a case study coupled with survey data to explore the notion of the “Enterprise User Interface (EUI) Architecture” implemented at nation-wide hospital system. The study describes how the organization utilized this architecture to take advantage of today’s technology coupled with its pre-existing legacy applications to deliver updated systems that end users could quickly use to take control of information across the organization. In addition, this study presents the findings of an empirical study of factors to measure explicitly how end users felt about the architecture and the ensuing technology solution. Using the Technology Acceptance Model (TAM), two essential variables were used to examine end-user sentiments: usefulness and ease of use. The findings indicate that users responded positively to both factors, and through the case study, users were observed not only aggressively driving system implementation but also system use. Implications of the findings from both a research and a managerial perspective are discussed

    Incorporating Self-Interest Into Information Systems Development: A Research Model

    Get PDF
    Information systems (IS) analysis and design has much to do with “people factors.” Basically, human beings are creatures of self-interest. This paper first proposes a theory of self-interest as the theoretical base and integrative approach to understand the phenomenon of IS development. Based upon the theory proposed, a series of research propositions are then advanced to lay the basis of specifying variables and hypotheses in future research. The two research questions explored are: (1) How does IS analysis and design connote self-interest? (2) How does self-interest affect IS quality

    Themes in Information Security Research in the Information Systems Discipline: A Topic Modeling Approach

    Get PDF
    Information security continues to grow in importance in all aspects of society, and therefore evolves as a prevalent research area. The Information Systems (IS) discipline offers a unique perspective from which to move this stream of literature forward. Using a semi-automated thematic analysis approach based on the topic modeling technique, we review a broad range of information security literature to investigate how we might theorize about information security on a grander scale. Five themes resulted from our analysis: Software Security Decisions, Firm Security Strategy, Susceptibility, Information Security Policy Compliance, and Other Developing Themes. Implications of our findings and future research directions are discussed

    GSS Facilitation: Avoiding Intrusion in the Public Sector Task Domain

    Get PDF
    GSS is widely used and researched in the private sector; however, public sector GSS is lagging in both use and research. Public policy groups, legislative bodies, commissions and councils, etc., could all potentially benefit from GSS, yet their use of GSS is somewhere between infrequent and rare. Many of these groups might lack knowledge of GSS or access to the technology, but many of these groups might also be uncomfortable with the control that a facilitator has over the decision process. Before these groups can be comfortable with the prospect of improved decision-making through GSS, they need assurance that the facilitator will aid the decision process without biasing the outcomes of their deliberations. In this paper, we introduce three dimensions of facilitator intrusion and present a position that these intrusion effects warrant further research within the context of the public sector. Specifically, we posit that in public sector contexts, where fair and impartial processes are critical to the acceptance of decision outcomes, the potential for facilitator bias might be inhibiting the use of the technology
    corecore