29 research outputs found

    Cultural Implications of Electronic Communication Usage: A Theory-Based Empirical Analysis

    Get PDF
    Based on two popular theoretical frameworks regarding media choices of rational choice and social influence (Markus 1987; Trevino et al. 2000) the main theme of this paper is to investigate applicability of these frameworks on a case where the pattern in usage and collective meaning of a medium is shaped in the cultural context. Focusing on the phenomenon of many Asians preferring not to send electronic mail to their supervisors, we compared media choice behaviors in the upward channel between a U.S. and a Korean organization. The empirical results suggest that the theories based on those frameworks are not sufficient to explain the phenomenon of individuals not sending electronic mail to their supervisors in the Korean organization. As a result of the study, we reconsider and refine those previous theories in such a way that we ask questions like (1) when is the rational choice model more pronounced than social influences in choosing a medium, and (2) how do rational choices and social influences interact through social symbolisms constructed in one particular organization? We believe that this research plays an important role in further extending our knowledge on media choice, and thus managers’ communication issues

    The Evolving Intellectual Diversity of the IS Discipline: Evidence from the Referent Disciplines

    Get PDF
    For over 20 years, researchers expressed their concern for the lack of theoretical development in the Information Systems discipline and the lack of a cumulative research tradition. The aim of this study is to investigate the intellectual structure of the IS discipline through an analysis of 993 mainstream research articles published in selected journals and proceedings during the previous decade (1991-2000). We explore the variety of researcher perspectives in the discipline, based on the theoretical frameworks adopted by these studies. This examination shows the relative mindshare of different theoretical frameworks and informs the self-reflection that is frequently undertaken in our discipline. The study generates categorizations to map theories to frameworks, which are then located in a three-dimensional ontology. The resulting mappings should help researchers understand the scope of past IS research and identify gaps in theoretical development

    The Effect of Self Identity and Social Identity on Technology Acceptance

    Get PDF
    While the effect of social factors on information technology (IT) acceptance behavior has been recognized as an important issue, only a few studies examined this topic in the context of the technology acceptance model. In this study, we incorporate two social factors, self identity and social identity, in the model and address their impacts on IT acceptance decision. An empirical study investigating the impact these social factors have on the acceptance of a web-based class support system is in progress. Upon completion of this study, we expect to provide further understanding on the role of social influence on individual technology acceptance decisions

    Security Knowledge Management Systems: A Solid Shield Against Computer Abuse

    Get PDF
    Even though organizations have developed and implemented a number of security countermeasures, computer abuse continues to be a problem, and information systems in organizations today remain in jeopardy. Researchers recommend security awareness programs as a means to increase security interest and knowledge, but this has not provided satisfactory results. In this paper, we introduce the concept of security knowledge management systems (SKMS). These systems overcome time and place limitations, consider different levels of security knowledge among users, promote voluntary participation, and provide a positive framework for learning security knowledge. SKMS gives users a way to overcome the limitations of traditional awareness programs through the ability to acquire the most current, diversified security knowledge, to search the knowledge more quickly and accurately, to store it more securely, to share it conveniently, and to maintain it cost effectively. As a result, SKMS allows users to acquire better security knowledge, while giving organizations a cost-effective way of reducing computer abuse

    What Do We Mean by Information Technology Enabled Organisational Transformation?

    Get PDF
    The term of “IT enabled organizational transformaion (ITOT)” is much used in the practice and literature of information systems. Thus, we treat this variety of usage as interesting and potentially significant, but IS cholars have used ITOT construct in diverse and often contradictory ways. To discusses the meaning of ITOT, this article present a conceptual review of the ITOT literature, highlighting important concepts and theories relating to ITOT over time. We first presents the current definitions of OT in general, and then trace the evolution of the ITOT construct in the broader organizational change literature. On the basis of critical analysis and synthesis of available literature the draft of a new matrix for explaning the concept of ITOT will be proposed

    A Study of Integrating the Security Engineering Process into the Software Lifecycle Process Standard (IEEE/EIA 12207)

    Get PDF
    In developing an information systems (IS), most organizations have preferred a traditional add-on approach that adds commercial security products after an IS development project is finished. However, a number of recent incidents with regard to IS security indicate that this approach does not guarantee IS security because commercial products are not designed for the specific organizational IS environments. As an alternative solution, previous studies suggested that organizations integrate both the security engineering (SE) process and software development lifecycle (SDLC) process standards. Unfortunately, a few studies tried to suggest the limited integration models. In this paper, as a practical way for the development of secure IS, we suggest two SE process models. First, we develop the generalized SE model that includes all SE activities through the whole SDLC. Secondly, we suggest the process integration model that interweaves SE with IEEE/EIA 12207 through Delphi analysis

    The Effect of Negative Buyer Feedback on Prices in Internet Auction Markets

    Get PDF
    The success of the Internet economy depends largely on how parties establish trust in their transactions. Building on the premise that the major role of Internet intermediaries is to ensure efficient and safe transactions between buyers and sellers, this study tested how buyer’s feedback scores on sellers accumulated from previous transactions affect the final bidding prices in the electronic auction market

    Decision Support System Differences: Do They Really Matter?

    Get PDF
    corecore