17 research outputs found

    Assessing The Factors That Have An Impact On Stickiness In Online Game Communities

    Get PDF
    How to attract players has been of interest to practitioners, online game designers and game site constructors. The objective of this research is to explore factors that effect stickiness in online game communities. This study applies social cohesion theory, social identity theory and motivational theory to propose a research model. Structural equation modeling results indicate that stickiness is influenced by social cohesion, playfulness and habit. In addition, social identification, social need and offline social interaction have a significant impact on social cohesion. Practical implications and limitations are also discussed

    Which Factors Explain Employees’ Adherence to Information Security Policies? An Empirical Study

    Get PDF
    It is widely agreed that a key threat to information security is caused by careless employees who do not adhere to the information security policies of their organizations. In order to ensure that employees comply with the organization’s information security procedures, a number of information security policy compliance measures have been proposed in the past. Prior research has, however, criticized these measures as lacking theoretically and empirically grounded principles. To fill this gap in research, the present study advances a novel model that explains employees’ adherence to information security policies. This model modifies and combines the Protection Motivation Theory, the General Deterrence Theory, the Theory of Reasoned Action, the Innovation Diffusion Theory and Rewards. In order to empirically validate this model, we collected data (N=917) from four different companies. The findings show that direct paths from threat appraisal, self-efficacy, normative beliefs, and visibility to the intention to comply with IS security policies were significant. Response efficacy, on the other hand, did not have a significant effect on the intention to comply with IS security policies. Sanctions have a significant effect on actual compliance with IS security policies, whereas rewards did not have a significant effect on actual compliance with the IS security policies. Finally, the intention to comply with IS security policies has a significant effect on actual compliance with the IS security policies

    Open Innovation In Online Brand Communities

    Get PDF
    The explosive growth of social media and online communities offers companies new unique opportunities to utilize information and knowledge capital by involving users in the company’s innovation activities. Companies started to realize the huge potential of online brand communities as a source of R&D innovations, and the ability to utilize and manage customer knowledge effectively can create competitive advantage for companies. The objective of this research is to identify factors which explain community members’ participation in open innovation activities in online brand communities. It is important from the research and business viewpoint to identify the factors which motivate users to participate in open innovation and enable new value creation for the company’s services and products. Structural equation modeling results indicate that both task involvement and utility explain significantly information and knowledge sharing and willingness to participate in open innovation activities. In addition, information and knowledge sharing has a strong significant impact on participation in open innovation. Implications for research and practice are suggested

    Information Security Behavior: Towards Multi-Stage Models

    Get PDF
    In order to ensure that employees abide by their organizations’ Information Security Policies (ISP), a number of information security policy compliance measures have been proposed in the past. If different factors can explain/predict the information security behavior of those employees who do know the ISP and of those who do not know the ISP, such as is suggested by stage theories, and the existing studies do not control for this issue, then the practical relevance of the existing models will be decreased. In order to test whether different factors explain/predict the information security behavior of those employees who do know the ISP and of those who do not know the ISP, we designed a study using the Protection Motivation Theory (PMT) as the baseline theory. Employees’ ISP knowledge was tested by asking a few questions related to their organization’s ISP. We divided the data (N=513) into that related to a low knowledge group (regarding the organizations’ ISP) and that of a high knowledge group. The results show that the findings between the low knowledge group and the high knowledge group differ substantially. Our results provide an explanation for the inconsistent results in previous IS security research

    Integrating Habit into UTAUT: The Chinese eBay Case

    Get PDF
    Technology acceptance has received considerable attention in the Information Systems (IS) literature. Accordingly, a number of theories and models have been advanced to explain technology acceptance. Recently, the Unified Theory of Acceptance and Use of Technology (UTAUT) has been put forward on the basis of integrating eight technology-acceptance models. The developersof UTAUT have suggested that future research should extend UTAUT by integrating habit into it in order to increase the explanatory value of UTAUT. To date, we have found no studies that have attempted to integrate habit into UTAUT. As a step in remedying this gap in the literature, we first developed such an integrated model and then tested it (N = 180). Our results support the integration: the extended UTAUT provides better explanatory value thanUTAUT without habit. Implications for research and practice are suggested based on the findings. Available at: https://aisel.aisnet.org/pajais/vol3/iss2/2

    A New Model for Understanding Users’ IS Security Compliance

    Get PDF
    The literature agrees that the major threat to IS security is constituted by careless employees. Therefore, effective IS security requires that users are not only aware of, but also comply with organizations’ IS security policies and procedures. To address this important concern, different IS security awareness, education and enforcement approaches have been proposed. Prior research on IS security compliance has criticized these extant IS security awareness approaches as lacking theoretically and empirically grounded principles to ensure that employees comply with IS security policies. This research-in-progress study proposes a new model that contains the factors that explain employees’ IS security compliance

    Participating in open innovation of services in social media

    Get PDF
    Services are becoming more information and knowledge intensive. The ability to utilize and manage customer information and knowledge effectively can create competitive advantage for companies. On the other hand, the explosive growth of social media users has created a revolutionary new trend which offers companies new unique opportunities to utilize the information and knowledge capital of social media. Companies started to realize the huge potential of social media as a source of R&D service innovations and as a long-term customer relationships generator. The objective of this research in progress paper is to focus on the factors, which explain brand community members\u27 participation in open innovation of services in social media environments. It is important from both the research and business viewpoint to identify the factors, which motivate users to participate in open innovation activities of brand communities and in generating value for the company. According to preliminary results, the suggested constructs explain preceding factors for participation in open innovation of services

    THE INFLUENCE OF INDIVIDUALISTIC AND COLLECTIVISTIC VALUES TO UTAUT: THE CASE OF THE CHINESE EBAY

    Get PDF
    Individuals are more willing to accept an information system if they perceive that the system can be of value to them. Values are individual, motivational constructs that guide and set criteria to individual’s behaviour. The Unified Theory of Acceptance and Use of Technology (UTAUT) has been advanced on the basis of integrating eight technology-acceptance models. The objective of this research is to study the influence of the value dimensions on the UTAUT model. Accordingly, we first developed such an integrated model and then tested it in the context of the Chinese auction site Tao Bao. Our results suggest that individualistic and collectivistic values yield important influences on the constructs of the UTAUT. Implications for research and practices are then suggested based on the findings

    Measuring Effectiveness of Information Systems Security: An Empirical Research

    Get PDF
    The objective of the present research is to put forth a theoretical model that measures information systems security effectiveness in minimizing security breaches. Very few studies were undertaken in this area. The model includes a number of literature-supported constructs. A number of hypotheses based on the influence of these constructs on IS security effectiveness are presented. These hypotheses are grounded using the appropriate literature. In the next phase of the study, we intend to revise and empirically validate the model using a pilot study utilizing a number of practitioners from Brazil, Finland, and the United States. The data obtained from the pilot study will be used to make improvements on the initial instrument designed for the study. In the third stage of the research a large sample of data will be collected from the aforementioned countries and a regression analysis will be conducted on the data to investigate which constructs influence IS security effectiveness

    Assessing the usage of personalized web information systems

    No full text
    Abstract The focus of this thesis is to assess factors which have an influence on the acceptance of personalized Web information systems (WIS). This study is primarily based on the widely used and accepted Technology Acceptance Model (TAM). The qualitative part of the study presents an approach for developing dynamic Web information systems. The development process was based on the work done in the OWLA (Open Web/Wireless Adaptive Hypermedia Applications) research project in 2000–2002. The quantitative part of the study, which includes the main objective of the study, is related to assessment of user acceptance of the given system. The researcher performed a field study in 2003 in which data was collected using a web questionnaire. The field study resulted in a sample size of 209 responses. Moreover we carried out a comparison with the 2002/2003 field study aiming to study possible differences in respondents' attitude toward personalization. The previous field study was carried out during the OWLA research project. The responses were analyzed using SPSS and AMOS. Results of the quantitative part of the study show that the respondents accept personalization but they like to and want to adapt and personalize the content themselves. This was one of the most important findings of the study. Respondents do not want the system to provide content automatically; they want to control the content themselves. The results of the 2003 field study indicate that respondents do not consider layout adaptation, whether automatic or manual, to be important or desirable. The formulated model reveals that perceived relevance is one of the most important aspects that have an effect on attitude toward using and intention to use the given IS. Perceived expectancy and intention to use the given WIS are significant antecedents of actual use. Perceived behavioral control and normative beliefs also have a significant effect on intention to use portal. Enjoyment has a significant effect on attitude. Overall, we have identified in this study some significant factors which will provide useful information to IS practitioners studying the voluntary adoption of specific personalized systems. The results will also provide useful information for systems designers and will contribute towards assessing possible individual barriers to the use of personalized information systems. The study includes several proposals for future research including developing deeper understanding activities related to presented development approach, creating a more detailed view of factors which have an influence on the user's decision to use or not to use personalized information system, studying several systems
    corecore