88 research outputs found

    Effect of Presentation Flaws on Users’ Perception of Quality of On-Line Stores’ Web Sites: Is it Perception that Really Counts?

    Get PDF
    Presentation flaws are abundant in web sites, but there has been no study to determine how presentation flaws affect consumers’ perceptions of quality of an on-line store, trust in the store, and ultimately the intention to purchase. The theoretical foundation stems from various relevant streams of literature: trust and credibility, impression formation, and impression management. A laboratory experiment examined three main factors, incompleteness, error, and poor style, and used 160 student subjects in a completely balanced, fully factorial design (2x2x2). It was found that error, incompleteness, and poor style affected consumers’ perceived quality of the web site. Furthermore, it was found that the relationship between the factors and perceived quality was mediated by the perception of the flaws. The perception of flaws rather than the actual flaws influenced users’ perception of quality

    Genetic Basis of Behavioral Security

    Get PDF
    Behavioral genetics offers numerous opportunities to bridge gaps in biological research of IS and to shed light on the nature versus nurture debate. This study seeks to explain persistent weaknesses in behavioral security from a genetic perspective. A synthesis of current literatures on cognitive neuroscience, decision making, and fraud victimization suggests a genetic basis for user susceptibility to security risks such as phishing scams. Using the classic twin design, this study reports estimated heritability of behavioral security to be at least 29.15% by comparing concordance between 144 pairs of monozygotic (MZ) twins and that between 52 pairs of same-sex dyzygotic (DZ) twins. Zygosity of the twin pairs serves as the primary independent variable in the behavioral genetics analysis, while performance on a behavioral security test serves as the dependent measure. Implications of the study results are discussed with respect to IS research as well as managerial practices

    Introducing AIS Transactions on Human-Computer Interaction

    Get PDF

    An Empirical Investigation of Antecedents of Internet Abuse in the Workplace

    Get PDF
    engage in Internet abuse, and whether any of 15 antecedents predict the amount of that abuse. Data were collected from 571 Usenet users in an on-line survey. Aggregating the time for each of the eleven listed methods of Internet abuse revealed a total of 5.8 hours per week, on average. Most of the antecedents in two of the three Theory of Planned Behavior (TPB) categories (Attitudes and Subjective Norms), were significant, and none of the antecedents in the third TPB category (Perceived Behavioral Control) showed significance. addiction, self-justification, job satisfaction, peer culture, and supervisor culture were significant predictors of Internet abuse. Exploratory demographic factors computer experience, gender, and firm revenue also showed predictive power

    Role of Commitment and Motivation in Knowledge Management Systems Implementation: Theory, Conceptualization, and Measurement of Antecedents of Success

    Get PDF
    Our ignorance exceeds our knowledge where issues of motivation and commitment of knowledge workers are concerned in the context of knowledge management systems (KMS) implementation [1,16,17,18]. This study is motivated by the pervasive confusion about the role of knowledge workers \u27 motivation and commitment in KMS implementation and sparse, if any, theoretical or empirical research on these issues. This paper proposes a theoretical framework for understanding how knowledge workers\u27 commitment and motivation affect the use of KMS and resulting organizational performance of the KMS. The theoretical and empirical validation of the framework require first and foremost the theoretical development of the knowledge workers \u27 commitment and motivation constructs and empirical validation of these constructs in the context of a real world organizational study of KMS implementation. The authors attempt to fulfill these specific goals within the scope of this paper. Future empirical research on the integration of motivation and commitment within diverse implementation contexts of KMS and organizational knowledge management programs is expected to further advance the theoretical and empirical development of the proposed framework

    Assessing Smartphone Ease of Use and Learning from the Perspective of Novice and Expert Users: Development and Illustration of Mobile Benchmark Tasks

    Get PDF
    Assessing usability of device types with novel function sets that are adopted by diverse user groups requires one to explore a variety of approaches. In this paper, we develop such an approach to assess usability of smartphone devices. Using a three-stage Delphi-method study, we identify sets of benchmark tasks that can be used to assess usability for various user types. These task sets enable one to evaluate smartphone platforms from two perspectives: ease of learning (for those unfamiliar with smartphone use) and ease of use (for experienced users). We then demonstrate an approach for using this task set by performing an exploratory study of both inexperienced smartphone users (using a convenience sample) and experienced users (using the keystroke model). Our exploration illustrates the methodology for using such a task set and, in so doing, reveals significant differences among the leading smartphone platforms between novice and expert users. As such, we provide some preliminary evidence that ease of use is indeed significantly different from ease of learning

    CHANGING ROLES IN IS: A ROLE THEORY PERSPECTIVE

    Get PDF
    The recent dramatic and interesting advances in computer technology have significantly altered the roles of both users and developers. Role theory might be applied to more fully understand and more effectively investigate organizational, behavioral, and social issues related to these changes. A framework for categorizing information systems roles is built from a matrix of information system and organizational activities. The information system activity dimension is composed of indirect user, direct user, autonomous developer, traditional developer, and facilitator categories. The organizational activity dimension contains clerical, professional, and managerial categories. The resulting matrix can facilitate descriptive research, model building, and hypothesis testing

    Research Exchange - March 15, 2021 Bringing Science to Practice with Dennis Galletta, Dov Te\u27eni, Stefan Seidel and moderated by Alan Dennis

    Get PDF
    This Research Exchange includes a discussion of the founders and creators of Bringing Science to Practice by Dennis Galletta, Stefan Seidel and Dov Te\u27eni. The panel discussion is moderated by Alan Dennis. The AIS In Practice: Bringing Science to Practice site can be found here (https://ais-inpractice.org/)
    • …
    corecore