17 research outputs found

    Pulling the Plug: When to Call It a Day on Research Projects

    Get PDF
    Over the years, the Information Systems discipline has produced advice on how to discover projects and research topics that are worth pursuing. However, little attention has been given to sharing anecdotes and developing heuristics of when to terminate research projects. This article captures the comments of successful IS researchers about when they have pulled the plug on research projects and some of the heuristics they look for when making that decision

    Understanding Information Systems Continuance for Information-Oriented Mobile Applications

    Get PDF
    Consumers’ use of mobile data applications is expected to rise significantly in the next few years. While user acceptance and adoption of mobile applications have received growing interest from IS researchers, only a paucity of studies have focused on user continuance behaviors in the mobile commerce context. Studying the IS continuance behavior of 147 registered users of an information-oriented mobile application, this research extends the general model of IS continuance to include a number of explanatory antecedents: information quality, system quality, process quality, and hedonic value. The enhanced framework makes a significant contribution to the theory of IS continuance intention, and at the same time, it offers implications to mobile service providers for creating high quality mobile applications for consumers

    Running on Hybrid: Control Changes when Introducing an Agile Methodology in a Traditional “Waterfall” System Development Environment

    Get PDF
    Prior to implementing “Agile” software development methods, organizations rooted in traditional “Waterfall” software development employed heavy upfront project design and limited changes and feedback during and between project stages. Waterfall methods make heavy use of outcome controls primarily monitored by the information systems function (ISF). This paper explores the control mechanisms used by the ISF and business function (BF) during and after the introduction of a major Agile project at a large U.S. company steeped in the traditional Waterfall method. Outcome control, the predominant control mechanism used in the case company, gave way to a hybrid-like control that possessed mechanisms of emergent control while maintaining vestiges of some Waterfall-like outcome control. We observed that, prior to the introduction of Agile, the software-development process was firmly in the hands of the ISF. The introduction of Agile shifted some of the controller authority over the development process from the ISF to the BF. Lessons learned from the case study point to the complexity of designing control mechanisms during a transition from the Waterfall method to an Agile approach

    EFFECTS OF DEVELOPER COGNITIVE STYLE AND MOTIVATIONS ON INFORMATION SECURITY POLICY COMPLIANCE

    Get PDF
    Organizations are faced with information loss on a daily basis. Threats such as hacker attacks are mitigated by applyingpatches, improving encryption routines, closing security loop-holes in a program and keeping a constant vigil on virus andmalicious threats with up-to-date scanning techniques. Companies invest millions of dollars to keep such attacks at bay sincea loss of up-time to servers could cause a significant loss in customer revenue and thus result in catastrophic losses incustomer satisfaction and ultimately profits. Organizations that create or modify software try to deter threats to theirapplications by providing information security policies that provide guidelines to developers on what best practices need tobe adopted to make their applications safe and secure for customer consumption. This study presents a conceptual model forstudying how cognitive style impacts software developer motivations as they approach the task of complying withinformation security policies. The model is informed by the literature on information security awareness, ProtectionMotivation Theory, Kirton’s adaption-innovation theory and Herzberg’s motivation and hygiene theory

    Risky Behavior in Online Social Media: Protection Motivation and Social Influence

    Get PDF
    Online Social Media (OSM) websites have attracted millions of users by enabling them to socially interact in ways that were not possible before. While the explosion of OSM use has had many benefits, it also has a darker side where an individual\u27s personal information can potentially be misused. This study develops and tests an empirical model based on a theoretical lens provided by Protection Motivation Theory (PMT) to examine the salient factors that influence an individual\u27s perceptions of threat and their intention to use OSM websites. We investigate this model with a data set representing survey responses from 197 OSM users. Results suggest that rewards, which are largely overlooked in the IS PMT literature, are the primary influence in the perceived threat calculation in the OSM context. In addition, social influence was found to significantly influence behavioral intentions to share information on OSM websites

    Information Filtering in Electronic Networks of Practice: An fMRI Investigation of Expectation (Dis)confirmation

    Get PDF
    Online forums sponsored by electronic networks of practice (ENPs) have become an important platform for technology-mediated knowledge exchange, yet relatively little is known about how ENP participants filter and evaluate the information they encounter on these forums. This study integrates perspectives from expectation confirmation theory, prospect theory, and neuroscience research to explore how ENP forum filtering judgments are influenced when expectations formed on the basis of contextual cues are confirmed or disconfirmed by the examination of solution quality. We summarize six different models of expectation confirmation explored in previous IS literature and report the results of a neuroimaging experiment using functional MRI (fMRI) that paired both positive and negative contextual cues with high- and low-quality solutions on a mock ENP forum interface. Results show that evaluation judgments are strongest in conditions where initial contextual cue judgments are confirmed by examination of solution quality except when the perceived expectation-experience gap is large, providing evidence for an assimilation-contrast model of expectation confirmation. We also found neural activation differences for expectation confirmation vs. disconfirmation and, consistent with prospect theory, differences in filtering behaviors with respect to unexpected gains vs. unexpected losses

    Enhancing E-learning using Artifact-Based Collaboration

    Get PDF
    Given the increased focus on e-learning, educators are interested in finding new ways to incorporate techniques that foster active learning. To leverage the asynchronous nature of e-learning settings and provide collaborative learning opportunities for participants that go beyond mere information exchange, this paper proposes an integrated model of collaboration and elearning. This approach ties together two research streams, namely the distributed e-learning environment research and the information systems collaboration research. Further, descriptive categories of collaboration approaches are presented: solution-based collaboration and artifact-based collaboration. An artifact-based collaborative e-learning tool is developed and discussed with the aim to improve the collaborative, e-learning process

    An Exploratory Case Study of the Benefits of Business Rules Management Systems

    Get PDF
    Business rules engines and business rule management systems (BRMS) are gaining popularity especially in large, complex, and real-time business environments. In essence, the business rules approach represents a new paradigm for compartmentalizing the formalization of business policies and rules as a separate component from application code. Given that this phenomenon has not yet been empirically investigated from a research perspective, we report on an exploratory case study undertaken to better understand the impacts of the business rules approach on activities throughout the software development lifecycle at a large Fortune 500 corporation. Our study integrates theoretical notions from the literature on knowledge reuse and systems theory with four constructs – centralization, standardization, externalization and structuration – to categorize the benefits arising from BRMS. Our results suggest that the application of the business rules approach has the potential to facilitate information systems development activities at all stages of the software development lifecycle

    MIS-aligned Student Perspectives of Outsourcing and Offshoring

    Get PDF
    Outsourcing and offshoring (sourcing) aspects of IS functions have been common organizational activities for decades.However, the landscape is evolving. Organizations are shifting from primarily single vendor-client sourcing relationshipstoward innovative multi-vendor relationships integrated into organizational strategic plans. Current students are tomorrow’sleaders, and as such it is critical that IS programs teach cutting edge strategic sourcing concepts. We analyzed studentperceptions of the pros and cons of sourcing and found that current students largely anchor to a limited number of conceptsthat may be outdated and not representative of today’s competitive sourcing landscape. Current organizational trends insourcing require a different skill set for IS managers than those required in the past. More must be done to inform students ofcurrent trends in order to prepare them for the skills needed to be effective in their future IS roles. A framework of requiredskills for future IS managers is offered
    corecore