17 research outputs found

    Outsourcing Success: Psychological Contract Perspective

    Get PDF

    Social Networking Behaviors: Role of personality, perceived risk, and social influences

    Get PDF
    With the growth in use of social media, various security and privacy concerns are burgeoning. Motivated by the phenomenon of OSN use and the potentially risky behaviors it involves, the present study has two main objectives: (1) to understand the effect of individuals’ perceived risk on OSN use and risky OSN behaviors; and (2) to understand the role of social influence on OSN use and risky OSN behaviors. In this work in progress a theoretical model is developed for an empirical examination

    An Investigation of Affordances and Constraints for Continued Usage of Mobile Payment Technology

    Get PDF
    Users may continue to use or abandon a technology even after adoption. India’s historic demonetization of cash, which had forced users to adopt mobile payments, was followed by the return of cash to circulation after two years. This offers a setting to investigate users’ continued usage of mobile payment technology, since a majority of users continued using payment apps. We develop a research model that utilizes technology affordances and constraints theory (TACT) to study technology as contextually-embedded objects with respect to their capabilities perceived by humans. We identify the affordances and constraints that act as influencers or barriers to continued usage of mobile payment technology. We further analyze the effect of merchant and payment app companies on continued usage. We propose a survey-based methodology to gather empirical evidence for the developed research model. This study has important implications for IS research and practice since affordance theory, a novel theory for the field of mobile payments, provides a valuable lens for understanding action potential of a technology as an interplay between user and environment

    Justifying Spam and E-mail Virus Security Investments: A Case Study

    No full text
    Our paper investigates the problem of justifying security investments concerning spam and email virus using real life data from a midsize North American university. We formulate the spam and email virus security problem as a capital budgeting problem using operating characteristic (ROC) curves in a decision theoretic framework. Prior research has investigated the optimal configuration in a detection system focusing on hacking. In a corporate setting when making the case for information security not only the technology specific detection costs but other costs (capital expenditures, operating costs and opportunity costs) have to be considered. We contribute to the current literature by investigating the spam email and virus problem and demonstrating how theoretical research can really be applied in practice through a real life case study

    Understanding employee responses to stressful information security requirements: A coping perspective

    No full text
    We use coping theory to explore an underlying relationship between employee stress caused by burdensome, complex, and ambiguous information security requirements (termed "security-related stress" or SRS) and deliberate information security policy (ISP) violations. Results from a survey of 539 employee users suggest that SRS engenders an emotion-focused coping response in the form of moral disengagement from ISP violations, which in turn increases one's susceptibility to this behavior. Our multidimensional view of SRS—comprised of security-related overload, complexity, and uncertainty—offers a new perspective on the workplace environment factors that foster noncompliant user behavior and inspire cognitive rationalizations of such behavior. The study extends technostress research to the information systems security domain and provides a theoretical framework for the influence of SRS on user behavior. For practitioners, the results highlight the incidence of SRS in organizations and suggest potential mechanisms to counter the stressful effects of information security requirements

    Simulation Model of Knowledge Complexity in New Knowledge Transfer Performance

    No full text
    Given the importance of knowledge transfer in individual performances, we assess the effect of knowledge flows complexity on knowledge transfer performance in a simulation model. In this regard this paper seeks to contribute to knowledge literature by proposing a new knowledge complexity framework, in which we explore the structural (diversity of knowledge type and depth of knowledge) and dynamic (loss of knowledge, knowledge creation pace) dimensions of knowledge flow complexity. Using an exploratory simulation study we propose the four aspects of knowledge flow complexity and test its effects on learners’ occupation and learning system queues. As a research-in-process, our preliminary results support that knowledge creation pace with both dependent variables (busy time proportion of the learner and queue length of knowledge processing) is the strongest among all the relationships in sensitivity analysis comparison. The least change exists in the relationship from the percentage of knowledge loss to the dependent variables
    corecore