41 research outputs found

    Effect of Third-Party Cloud Computing Usage on Intra-Organizational Coordination

    Get PDF
    Previous studies have established the impact of information technology on interdepartmental cooperation. However, the move from distributed computing to centralize computing as a result of cloud adoption is having an impact on the current type and level of coordination in workplaces. This study attempts to identify factors influencing the type of coordination strategy and the moderating effect of cloud computing usage. Specifically the study contends that cloud computing usage strengthens the effect of goal alignment and task interdependence on the cooperative intensity between the IT department and business line. Hopefully, data from an online survey of managers and their subordinates will be used to test hypothesis advanced in this study

    Understanding Characteristics of High Performers in Two-Sided Competitive Crowdsourcing

    Get PDF
    This study seeks to understand how professionals’ (creative) Adaption-Innovation behaviors and prior knowledge influence successful participation in two-sided competitive crowdsourcing. Using Kirton’s Adaption-Innovation Theory, the study examines the influence of creatives’ diversity, skills, experience, and activity level on crowdsourcing outcomes. Analysis of cross-sectional data of participants on a popular competitive crowdsourcing platform show that, while diversity and skills do not necessarily lead to higher performance, activity level and experience contribute to creatives’ higher performance. Contribution to literature is by extending Kirton’s Adaption-Innovation Theory objectively as a lens to understand creative participation in crowdsourcing, highlighting key features of crowdsourcing as unbounded by place and skills

    Software Development Team Dynamics: Control, Coordination, and Secure Software

    Get PDF
    In secure software has resulted of millions of dollars of company’s revenue as complex organizational systems are often software intensive. Researchers are still interested in the impact of the people involved, the process used and the project characteristics. This study looks at the security awareness and maturity level of those involved in the development process coupled with the management of the process to identify factors that lead to enhanced secure software development. Following a survey of prior literature, it is hypothesized that software development team members’ security awareness and maturity affect the design of software in a distributed context. Due to the nature of work of distributed team members, the relationship between team security awareness and maturity coordination on secure software design are also posited to be impacted by control types and coordination mechanisms. We contribute to literature by expanding the understanding of the process of creating secure software

    Secure Software Development: A Developer Level Analysis

    Get PDF
    Developing secure software is still an important issue in the computing world. Big software firms spend huge sums of money to offer secure software and systems. However, security incidents due to insecure software results in loss of revenue and reputational damages to user firms. Incorporating security requirements early in the development process is the most effective and cheapest method to build secure software. We chose a behavioral lens in order to understand antecedents to secure software development. We explicate the effects of personality, training, education and organizational culture on the development of secure software

    An Empirical Analysis of User Participation on Crowdsourcing Platform: A Two-sided Network Market Perspective

    Get PDF
    Crowdsourcing has recently emerged as a new platform for matching the demand and supply between professionals and businesses who seek external expertise for business task execution. Driven by the unique features of the two-sided crowdsourcing markets (such as auction-style competition on quality by professionals), this study seeks to examine how the dynamics of the two-sided crowdsourcing platform affect customers and professionals’ strategic behaviors and market outcomes. Using longitudinal transaction data from a crowdsourcing websites, we plan to empirically examine how the participation of professionals and customers, task reward and task completion rate are affected by the characteristics of the professionals such as distribution of the winning professionals and their reputation. The results of our study are expected to contribute to the growing literature on crowdsourcing and provide important insights on the design and assessment of the sustainability and profitability of the crowdsourcing business model

    Effect of penitence on social media trust and privacy concerns: The case of Facebook

    Get PDF
    Abuse of information entrusted to organizations can result in a variety of privacy violations and trust concerns for consumers. In the event of violations, a social media brand or organization renders an apology – a form of social account – to alleviate users’ concerns and maintain user membership and engagement with the platform. To explore the link between apology offered by a social media brand or organization and the users’ trust dynamics in the brand’s services, we study how organizational integrity can contribute to reducing individuals’ privacy concerns whiles increasing or repairing their trust. Drawing on organizational behavioral integrity literature, our proposed research model suggests that the persuasiveness of an apology following a data breach affects users’ trust or spillover trust through their perceptions of the degree of alignment between the words in the apology and the actions of the violating entity. Based on a survey of Facebook users, our findings show that persuasiveness of an apology has a significant impact on users’ perceptions of the alignment between the social media brand’s (i.e. Facebook) words and subsequent actions. These perceptions impact social media brand trust (i.e. users’ trust in Facebook and allied services such as Instagram). We also find that, post data breach incidence, while integrity of the social media organization partially mediates the relationship between persuasive apology and users’ trust, it fully mediates the relationship between the persuasive apology and the privacy concerns expressed by the users. However, users’ privacy concerns do not contribute much to the repair of trust needed to maintain their membership

    Decision Framework for Engaging Cloud-Based Big Data Analytics Vendors

    Get PDF
    Organizations face both opportunities and risks with big data analytics vendors, and the risks are now profound, as data has been likened to the oil of the digital era. The growing body of research at the nexus of big data analytics and cloud computing is examined from the economic perspective, based on agency theory (AT). A conceptual framework is developed for analyzing these opportunities and challenges regarding the use of big data analytics and cloud computing in e-business environments. This framework allows organizations to engage in contracts that target competitive parity with their service-oriented decision support system (SODSS) to achieve a competitive advantage related to their core business model. A unique contribution of this paper is its perspective on how to engage a vendor contractually to achieve this competitive advantage. The framework provides insights for a manager in selecting a vendor for cloud-based big data services

    Understanding Crowdsourcing Contest Fitness Strategic Decision Factors and Performance: An Expectation-Confirmation Theory Perspective

    Get PDF
    Contest-based intermediary crowdsourcing represents a powerful new business model for generating ideas or solutions by engaging the crowd through an online competition. Prior research has examined motivating factors such as increased monetary reward or demotivating factors such as project requirement ambiguity. However, problematic issues related to crowd contest fitness have received little attention, particularly with regard to crowd strategic decision-making and contest outcomes that are critical for success of crowdsourcing platforms as well as implementation of crowdsourcing models in organizations. Using Expectation-Confirmation Theory (ECT), we take a different approach that focuses on contest level outcomes by developing a model to explain contest duration and performance. We postulate these contest outcomes are a function of managing crowdsourcing participant contest-fitness expectations and disconfirmation, particularly during the bidding process. Our empirical results show that contest fitness expectations and disconfirmation have an overall positive effect on contest performance. This study contributes to theory by demonstrating the adaptability of ECT literature to the online crowdsourcing domain at the level of the project contest. For practice, important insights regarding strategic decision making and understanding how crowd contest-fitness are observed for enhancing outcomes related to platform viability and successful organizational implementation

    Data Security Threats Sources: An Empirical Examination of Institutional Characteristics

    Get PDF
    Driven by the difficulty in achieving complete security with technical tools, business investigators are looking into organizational and behavioral issues that could help make systems more secure. This chapter looks at the security of systems from the organizational perspective. Specifically, this study attempts to identify if different organizations have different predisposition to particular type(s) of security threat sources. Using publicly available security breach data from a privacy rights clearinghouse to investigate which organizational characteristics predisposes an institution to an external or internal threat source, it was concluded that as size of organization and the number of its valuable documents increase by one unit, the organization\u27s probability of suffering an internal attacks decrease. Furthermore, when executive members have a business degree rather than information-security-related degrees, the likelihood of suffering an internal attack increases. Also, the probability of an organization suffering an internal or external attack is not based on its industry type

    Post Data Breach Use of Protective Technologies: An Examination of Users’ Dilemma

    Get PDF
    This preliminary research addresses the technology use uncertainties that arise when users are presented with protective technologies following a data breach or privacy violation announcement. Prior studies have provided understanding of determinants of technology use through several perspectives. The study complements prior research by arguing that, beyond individual dispositions or technology features, data breach announcements bring users’ focus on the actions of the breaching organization. Fair process and information practices provide avenue for organizations to alleviate users’ concerns and increase service usage. We draw on organizational justice theory to develop a model that explicates the effect of organizational fairness process and use of technologies. We test this model using data from 200 Facebook users recruited from Amazon MTurk. We found that procedural and informational justice have differential effect on users’ desire to use protective technologies. Our findings have both theoretical and practical implications
    corecore