352 research outputs found

    DESIGNING QUANTIFIED-SELF 2.0 RUNNING PLATFORM TO ENSURE PHYSICAL ACTIVITY MAINTENANCE: THE ROLE OF ACHIEVEMENT GOALS AND ACHIEVEMENT MOTIVATIONAL AFFORDANCE

    Get PDF
    With the rapid development of wearable technologies, people can nowadays easily track and record their health-related information—particularly their athletic performance. The quantified-self 2.0 (QS 2.0) movement encourages running website or mobile application users to share their athletic information with other online community members to ensure the sustainable use of the technology and the maintenance of physical activity. However, the health literature claims that health behavior maintenance is difficult because it is easy for people to give up on the regular physical exercise during the maintenance stage, considering the unforeseen barriers and temptations that may occur in the long term. Drawing upon a motivational affordance perspective and the achievement goal theory (AGT), this theory-based manuscript provides design principles for QS 2.0 running platforms, with the purpose to increase users’ physical activity maintenance (PAM). Additionally, we propose a conceptual model explaining the underlying mechanism in terms of how these affordance design principles serve as the sources of two kinds of achievement goals, namely mastery goals and performance goals, which has distinct roles in determining users’ longitudinal exercise performances

    The Voice Effect” in Groups

    Get PDF
    This study looks at how collaborative technology, proximity choices, and group size can affect voicing in groups. Results of the study, involving two experiments with 550 participants, show that collaborative technology can improve an individual’s desire to voice, instrumental motives to voice, non-instrumental motives to voice, and the opportunity to voice in face-to-face groups. The results also show that the use of collaborative technology can lesson individual voice losses as groups increase in size especially in distributed environments. These findings have important implications in group interactions using technology

    Using the Control Balance Theory to Explain Social Media Deviance

    Get PDF
    Online Social Media Deviance (OSMD) is one the rise; however, research in this area traditionally has lacked a strong theoretical foundation. Following calls to reveal the theoretical underpinnings of this complex phenomenon, our study examines the causes of OSMD from several novel angles not used in the literature before, including: (1) the influence of control imbalances (CIs) on deviant behavior, (2) the role of perceived accountability and deindividuation in engendering CI, (3) and the role of IT in influencing accountability and deindividuation. Using an innovative factorial survey method that enabled us to manipulate the IT artifacts for a nuanced view, we tested our model with 507 adults and found strong support for our model. The results should thus have a strong impetus not only on future SM research but also for social media (SM) designers who can use these ideas to further develop SM networks that are safe, supportive, responsible, and constructive

    Global Journal Prestige and Supporting Disciplines: A Scientometric Study of Information Systems Journals

    Get PDF
    Many argue that the Information Systems (IS) field is at a critical juncture in its evolving identity. In debating whether the IS field is in crisis, we agree with Hirschheim and Klein (2003) that ¥°reflective analysis¥± will contribute to the fieldÂĄÂŻs continued prosperity. Indeed, reflective analysis is needed to evaluate the journals of the field as well as IS journal rankings, which evaluate the effectiveness and productivity of researchers and the effectiveness and productivity of journals in communicating research results. After all, where and how we publish are fundamental aspects of the identity of the IS fieldÂĄÂȘreflecting our value systems, paradigms, cultural practices, reward systems, political hierarchy, and aspirations. This article reviews the results of the largest global, scientometric survey to date of IS journal rankings that targeted 8741 faculty from 414 IS departments world-wide, and resulted in 2559 responses, or a 32% response rate. Rather than using predetermined journal lists, the study required respondents to freely recall their top-four research journals. This research improves on the usual scientometric journal ranking studies by providing a foundation for further reflection and self-analysis. For instance, it first examines the global structure of the IS field and investigates perceptions among global IS academics concerning current research outlets. Specific results then illustrate the values and cultural norms in the global IS community that affect the evaluation of research and publication outlets. Finally, in addition to rankings of scholarly journals by the entire world-wide sample of IS academics, rankings are provided for top IS practitioner journals, most frequently read IS journals, top journals for the major IS supporting disciplines, and top journals by world region

    Dependability Auditing with Model Checking

    Get PDF
    Model checking offers a methodology for determining whether a model satisfies a list of correctness requirements. We propose a theory of dependability auditing with model checking based on four principles: (1) The modeling process should be partitioned into computational components and behavioral components as an aid to system understanding; (2) The complex system will be abstracted to create a model; (3) A language must be available that can represent and evaluate states and processes that evolve over time; (4) Given an adequate model and temporal specifications, a model checker can verify whether or not the input model is a model of that specification: the specification will not fail in the model. We demonstrate this theoretical framework with Web Services and electronic contracting

    A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research

    Get PDF
    This research-perspective article reviews and contributes to the literature that explains how to deter internal computer abuse (ICA), which is criminal computer behavior committed by organizational insiders. ICA accounts for a large portion of insider trading, fraud, embezzlement, the selling of trade secrets, customer privacy violations, and other criminal behaviors, all of which are highly damaging to organizations. Although ICA represents a momentous threat for organizations, and despite numerous calls to examine this behavior, the academic response has thus far been lukewarm. However, a few security researchers have examined ICA’s influence in an organizational context and addressed potential means of deterring it. However, the results of these studies have been mixed, leading to a debate on the applicability of deterrence theory (DT) to ICA. We argue that more compelling opportunities will arise in DT research if security researchers more deeply study its assumptions and more carefully recontextualize it. The purpose of this article is to advance a deterrence research agenda that is grounded in the pivotal criminological deterrence literature. Drawing on the distinction between absolute and restrictive deterrence and aligning them with rational choice theory (RCT), this paper shows how deterrence can be used to mitigate the participation in and frequency of ICA. We thus propose that future research on the deterrent effects of ICA should be anchored in a more general RCT, rather than in examinations of deterrence as an isolated construct. We then explain how adopting RCT with DT opens up new avenues of research. Consequently, we propose three areas for future research, which cover not only the implications for the study of ICA deterrence, but also the potential motivations for these types of offenses and the skills required to undertake them

    Useful Products in Information Systems Theorizing: A Discursive Formation Perspective

    Get PDF
    Although there is a growing understanding of theory building in the information systems (IS) field, what constitutes IS theory remains the subject of intense debate. Following Weick recommendation to focus on the products of theorizing rather than on what theories are, we assemble and analyze 12 products (question, paradigm, law, framework, myth, analogy, metaphor, model, concept, construct, statement, and hypothesis) that are rarely discussed together in any depth in the IS field and combine them into a coherent theorizing framework. Drawing on Foucault thesis of discursive formation we characterize the unique role of each product in IS theorizing and illustrate the usefulness of the framework in relation to both classical IS theorizing in the form of media richness theory as well as next-generation theorizing

    Automated and Participative Decision Support in Computer-aided Credibility Assessment

    Get PDF
    History has shown that inaccurate assessments of credibility can result in tremendous costs to businesses and society. This study uses Signal Detection Theory (SDT) to improve the accuracy of credibility assessments through combining automated and participatory decision support. Participatory decision support is also proposed to encourage acceptance of the decision aid’s recommendation. A new hybrid decision aid is designed to perform automated linguistic analysis and elicit and analyze perceptual cues (i.e., indirect cues) from an observer. The results suggest that decision aids that collect both linguistic and indirect cues perform better than decision aids that collect only one type of cue. Users of systems that collect linguistic cues experience improved credibility assessment accuracy; yet, users of systems that collect both types of cues or only indirect cues do not experience higher accuracy. However, collecting indirect cues increases the user’s acceptance of decision-aid recommendations

    How Moral Intensity and Impulsivity Moderate the Influence of Accountability on Access Policy Violations in Information Systems

    Get PDF
    A persistent threat to the security of information systems is that of malicious insiders. These insiders, who by definition are trusted, are a major concern for organizations because of their ability to misuse access privileges, steal intellectual property, and commit fraud. The recent high-profile cases of Private Manning and Edward Snowden have further raised organizations’ concerns of the insider threat. Consequently, it is important to identify ways to reduce insiders’ abuse of information systems. Previous research has shown the potential of perceived accountability within systems to reduce access policy violations, one common form of insider abuse (Vance et al. 2013). This research expands on this previous effort by showing how the constructs of moral intensity and impulsivity moderate the influence of accountability mechanisms on access policy violations

    Research Commentary: Setting a Definition, Context, and Theory-Based Research Agenda for the Gamification of Non-Gaming Applications

    Get PDF
    As a nascent area of study, gamification has attracted the interest of researchers in several fields, but such researchers have scarcely focused on creating a theoretical foundation for gamification research. Gamification involves using game-like features in non-game contexts to motivate users and improve performance outcomes. As a boundary-spanning subject by nature, gamification has drawn the interest of scholars from diverse communities, such as information systems, education, marketing, computer science, and business administration. To establish a theoretical foundation, we need to clearly define and explain gamification in comparison with similar concepts and areas of research. Likewise, we need to define the scope of the domain and develop a research agenda that explicitly considers theory’s important role. In this review paper, we set forth the pre-theoretical structures necessary for theory building in this area. Accordingly, we engaged an interdisciplinary group of discussants to evaluate and select the most relevant theories for gamification. Moreover, we developed exemplary research questions to help create a research agenda for gamification. We conclude that using a multi-theoretical perspective in creating a research agenda should help and encourage IS researchers to take a lead role in this promising and emerging area
    • 

    corecore