133 research outputs found

    Cultural Implications of Electronic Communication Usage: A Theory-Based Empirical Analysis

    Get PDF
    Based on two popular theoretical frameworks regarding media choices of rational choice and social influence (Markus 1987; Trevino et al. 2000) the main theme of this paper is to investigate applicability of these frameworks on a case where the pattern in usage and collective meaning of a medium is shaped in the cultural context. Focusing on the phenomenon of many Asians preferring not to send electronic mail to their supervisors, we compared media choice behaviors in the upward channel between a U.S. and a Korean organization. The empirical results suggest that the theories based on those frameworks are not sufficient to explain the phenomenon of individuals not sending electronic mail to their supervisors in the Korean organization. As a result of the study, we reconsider and refine those previous theories in such a way that we ask questions like (1) when is the rational choice model more pronounced than social influences in choosing a medium, and (2) how do rational choices and social influences interact through social symbolisms constructed in one particular organization? We believe that this research plays an important role in further extending our knowledge on media choice, and thus managers’ communication issues

    The Competitiveness of the Information Systems Major: An Analytic Hierarchy Process

    Get PDF
    A sharp reduction in student enrollment in the information systems major has become an urgent issue in the information systems (IS) community. This study investigates the factors affecting the selection of major by business students, the relative strengths and weaknesses of the IS major with respect to those factors, and the short-term and long-term strategy to counteract this phenomenon. A questionnaire-based field survey of 246 students at twelve universities in the United States was conducted. The data was analyzed using an analytic hierarchy process. The results demonstrate that the IS major retains its share of strength in factors like personal interest, aptitude, starting salary, and job flexibility. However, the study also shows that factors like most difficult major, hard to find jobs, insufficient promotional efforts, and indifference to institutional reputation are of concern and these issues need further addressing for improving the competitiveness of the IS major. Referent group also had pessimistic opinions in majoring the IS. The short-term and long-term suggestions to enhance the competitiveness of the IS major are provided

    Developing a Theory of Website Usability: An Exploratory Study to Identify Constructs and Nomological Networks

    Get PDF
    Developing a usable website is pivotal for e-business success, yet previous studies have reported that current websites contain numerous usability problems. There are many reasons for poorly designed websites, but this research focuses on the lack of a good theory of website usability, a theory that explains and predicts the effects of website usability on online customer perceptions. To propose a good theory of website usability, this exploratory study first investigated website usability constructs by integrating the findings of previous studies and the results of interviews with website usability experts. Instruments to measure the constructs were developed and empirically validated. Then nomological networks between website usability constructs and online customer perceptions, focused on purchase intention and purchase, were examined. Three field studies including two questionnaire surveys and a causal mapping analysis were conducted. This study identified 10 website usability factors with strong psychometric properties through conducting a confirmatory factor analysis. Factors include consistency, navigability, supportability, learnability, simplicity, interactivity, telepresence, content relevance, credibility, and readability. Based on these constructs, this study found nomological networks that explain a large amount of variance of purchase intention and purchase through performing a causal mapping analysis and a path analysis (see Figure 1). This research could aid researchers and practitioners of website usability by providing useful knowledge for usable website design. From a theoretical perspective, this study proposed and validated the nomological networks which could be used to develop alternative theoretical models of website usability or enhance the current theoretical models to provide a better understanding of the website usability phenomenon. From a practitioner perspective, using the identified instruments and nomological networks, management of e-business companies can evaluate the usability level of their own website and at the same time, compare the usability level of a company’s website with that of competitors to establish industrial standards. By gauging website usability levels and comparing with competitors’ sites, e-business companies can make strategic decisions on how to improve current websites

    The Effect of Self Identity and Social Identity on Technology Acceptance

    Get PDF
    While the effect of social factors on information technology (IT) acceptance behavior has been recognized as an important issue, only a few studies examined this topic in the context of the technology acceptance model. In this study, we incorporate two social factors, self identity and social identity, in the model and address their impacts on IT acceptance decision. An empirical study investigating the impact these social factors have on the acceptance of a web-based class support system is in progress. Upon completion of this study, we expect to provide further understanding on the role of social influence on individual technology acceptance decisions

    Chinese Perceptions on Website Design Quality

    Get PDF

    The Evolving Intellectual Diversity of the IS Discipline: Evidence from the Referent Disciplines

    Get PDF
    For over 20 years, researchers expressed their concern for the lack of theoretical development in the Information Systems discipline and the lack of a cumulative research tradition. The aim of this study is to investigate the intellectual structure of the IS discipline through an analysis of 993 mainstream research articles published in selected journals and proceedings during the previous decade (1991-2000). We explore the variety of researcher perspectives in the discipline, based on the theoretical frameworks adopted by these studies. This examination shows the relative mindshare of different theoretical frameworks and informs the self-reflection that is frequently undertaken in our discipline. The study generates categorizations to map theories to frameworks, which are then located in a three-dimensional ontology. The resulting mappings should help researchers understand the scope of past IS research and identify gaps in theoretical development

    A Study of Integrating the Security Engineering Process into the Software Lifecycle Process Standard (IEEE/EIA 12207)

    Get PDF
    In developing an information systems (IS), most organizations have preferred a traditional add-on approach that adds commercial security products after an IS development project is finished. However, a number of recent incidents with regard to IS security indicate that this approach does not guarantee IS security because commercial products are not designed for the specific organizational IS environments. As an alternative solution, previous studies suggested that organizations integrate both the security engineering (SE) process and software development lifecycle (SDLC) process standards. Unfortunately, a few studies tried to suggest the limited integration models. In this paper, as a practical way for the development of secure IS, we suggest two SE process models. First, we develop the generalized SE model that includes all SE activities through the whole SDLC. Secondly, we suggest the process integration model that interweaves SE with IEEE/EIA 12207 through Delphi analysis

    Security Knowledge Management Systems: A Solid Shield Against Computer Abuse

    Get PDF
    Even though organizations have developed and implemented a number of security countermeasures, computer abuse continues to be a problem, and information systems in organizations today remain in jeopardy. Researchers recommend security awareness programs as a means to increase security interest and knowledge, but this has not provided satisfactory results. In this paper, we introduce the concept of security knowledge management systems (SKMS). These systems overcome time and place limitations, consider different levels of security knowledge among users, promote voluntary participation, and provide a positive framework for learning security knowledge. SKMS gives users a way to overcome the limitations of traditional awareness programs through the ability to acquire the most current, diversified security knowledge, to search the knowledge more quickly and accurately, to store it more securely, to share it conveniently, and to maintain it cost effectively. As a result, SKMS allows users to acquire better security knowledge, while giving organizations a cost-effective way of reducing computer abuse
    • …
    corecore