18 research outputs found

    The Co-Creation of Value: Exploring User Engagement in User-Generated Content Websites

    Get PDF
    Organizational interest in user-generated content (UGC) websites is growing, as organizations face highly competitive markets, uncertain economic environments, and a growing user base accustomed to active engagement rather than passive acceptance of products and services. Organizations are now exploring ways to provide a platform (website) through which users generate and contribute content, resulting in a co-created experience between users and organizations. However, organizations interested in leveraging UGC websites are facing a new challenge – getting users to actively engage through content contribution, retrieval, and exploration. Thus, the research questions guiding this manuscript are: what factors influence an individual’s user experience in UGC websites and how does the user experience impact individual engagement behavior? This manuscript develops a theory of co-created value to examine how social interactions, operationalized as perceived dialogue, social accessibility, transparency, and risk, and technical features, operationalized as the perceived granularity, extensibility, integration, and evolvability, of a UGC website influence an individual’s user experience and subsequent engagement behaviors. A theoretical model is proposed and propositions are presented for the individual relationships. Implications and future directions for research are also discussed

    Applying Team-Based Learning in Online Introductory Information Systems Courses

    Get PDF
    Over the last two decades, the academy has experienced a renaissance of diversity in pedagogical techniques with the introduction of experiential learning, active learning, flipping the classroom, and, more recently, team-based learning (TBL). TBL adopts a two-stage process that incorporates individual learning with team collaboration. While frequently implemented in a face-to-face classroom, TBL has received limited attention in the online learning environment where geographically distributed, asynchronous learning poses challenges to its fundamental design. In particular, coordination costs and sequential inter-dependencies within the learning experience create unique challenges to online environments where students use limited communication channels compared to the traditional, face-to-face environments. This teaching tip discusses the authors’ experiences translating the principles of TBL and its learning sequence to an online introductory information systems course. We present instructor observations and qualitative feedback from students as the approach was implemented, including a model that outlines key activities in its implementation. We then conclude with a series of teaching suggestions to fellow academics seeking to adapt TBL to the online environment in their courses

    User innovations through online communities from the perspective of social network analysis

    Get PDF
    Organizations have begun to leverage both internal and external sources for innovation. Specifically, organizations are increasingly relying on end users that engage via user innovation communities to identify potentially valuable ideas for an organization to adopt. However, research has shown that organizational success in leveraging these communities relies on a thorough understanding of how users behave within the community. The purpose of this manuscript is to provide further analysis and develop a richer understanding of user behavior in the Dell IdeaStorm user innovation community. Findings illustrate different patterns of user behaviors when they comments or rate posted idea

    Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation

    Get PDF
    Developing and advancing theory in the information systems (IS) discipline requires scholars to use and contribute to theory. While few IS scholars create new theories, many borrow and adapt theories from other disciplines to study a variety of phenomena in the realm of IS. Over time, this practice has raised concerns as to the appropriateness and quality of theories adapted in the discipline. In particular, this practice causes issues when one considers conflicting results from many studies that claim to leverage the same theoretical foundation. We examine the issues surrounding theory adaptation in IS and provide a set of integrated theory adaptation guidelines to help scholars successfully and reliably adapt theory. We illustrate how one might use our guidelines via using Protection Motivation Theory in an organizational information security setting

    Risk perceptions about personal Internet-of-Things: Research directions from a multi-panel Delphi study

    Get PDF
    Internet-of-Things (IoT) research has primarily focused on identifying IoT devices\u27 organizational risks with little attention to consumer perceptions about IoT device risks. The purpose of this study is to understand consumer risk perceptions for personal IoT devices and translate these perceptions into guidance for future research directions. We conduct a sequential, mixed-methods study using multi-panel Delphi and thematic analysis techniques to understand consumer risk perceptions. The results identify four themes focused on data exposure and user experiences within IoT devices. Our thematic analysis also identified several emerging risks associated with the evolution of IoT device functionality and its potential positioning as a resource for malicious actors to conduct security attacks

    Cousins Separated by a Common Language: Perceptions of Information Technology Risk

    No full text

    Cousins separated by a common language : perceptions of information technology risk

    Get PDF
    The authors employ a seeded, ranking type Delphi to answer the following research question: how do each of the major stakeholder groups within organizations (representing both strategic and operational levels) conceptualize the risks associated with IT in operations? Using three expert panels drawn from Big 4 IT audit groups and Fortune 1000 business/IT managers, we identify the IT risks most salient to these groups, explore areas of convergence/divergence among them, and offer theoretical and practical implications from this research
    corecore