102 research outputs found

    Testing an Integrity-Checking DSS Component for Organizational Memory Building

    Get PDF
    Organizational Memory (OM) has become a critical component of organizations attempting to maintain a competitive advantage. The ability to retrieve accurate information, and interpret it from different perspectives, will both facilitate efficient problem solving and support efficient organizational learning. This research examines the effect of an informationbuilding and decision aid. The results indicate that the system positively affects OM by promoting user-entered knowledge bases with more accurate statements. However, the system did not significantly improve the ability of the users to solve a problem. These findings have important implications for designing information systems to support and expand OM while increasing the organization’s capacity to learn and solve problems

    How Do Social Networking Sites Users Become Loyal? A Social Exchange Perspective

    Get PDF
    Since its emergence as a new electronic communication media supported by Web 2.0, social media has become a popular means of communication among the public. Among different types of social media that depend on user-generated content (UGC), social networking sites (SNS) are becoming the best-known communication mode. While many researchers have examined significant factors affecting SNS users’ behaviors and their impact on SNS usage, the current research extends the traditional concept of IS loyalty and examines factors impacting SNS users’ creation of SNS loyalty through a lens of social exchange theory (SET) and satisfaction. A total of 291 college students participated in an empirical test. The findings indicate that SET has an effect on creation of loyalty in the context of Facebook, which is currently the most popular SNS. Implications of these findings and limitations of the research are discussed

    Does Trustworthy Social Networking Sites Draw User’s Persistency Behaviors? Examining Role of Trust in Social Networking Sites Continuance Usage

    Get PDF
    While many researchers pointed out the importance of trust on Information Systems (IS) usage, this study explored the role of trust on usage of CMC media in the context of social networking sites (SNS). Social exchange theory (SET) and the expectation confirmation model of IS continuance (ECM-IS) were employed in the research model. The research model investigated SNS users’ continuous usage behaviors under antecedents from supporting theories and the impact of trust on all those antecedents simultaneously. The empirical research findings, using a Web survey in the context of Facebook, which is the most popular SNS, revealed that users trust in SNS impacts on overall perceptions of SNS and their usage. Discussions and limitation of research is addressed

    Decision Support Systems for Inquiring Organizations

    Get PDF
    For many years, organizations have been faced with increasing amounts of information but have not been able to adequately use that information in a way that allows for organizational growth. The ability of an organization to learn is likely to be the only competitive advantage left in an economy where technology can be a significant leveling factor. Integrating decision support systems and inquiring systems will produce support for a learning organization that is capable of complex problem formulation and solution. There are many similarities between inquiring systems and decision support systems. This paper suggests that decision support will be enhanced by integrating the theory of decision support in a comprehensive inquiring system that is capable of adapting to changes in the business environment. Development of such a system will ensure that decisionmakers and managers can focus on the task of guiding an organization to its ultimate success rather than expending energy sorting through information to make accurate and timely decisions

    Human/Technology Adaptation Fit Theory for Healthcare

    Get PDF
    In this document we extend and join Adaptive Structuration Theory with Task Technology Fit Theory and apply it to a health information technology setting. In our model, Human/Technology Adaptation Fit (HTAF) Theory, we assess the interactions between individual users and health information technologies. We develop HTAF, a model that focuses on the intersection of user adaptation and technology adaptation under the contexts of voluntary or mandatory health information technology, which both scholars and practitioners can use to determine the effects of the implementation of new technologies

    Job Applicants’ Information Privacy Protection Responses: Using Social Media for Candidate Screening

    Get PDF
    For human resource (HR) departments, screening job applicants is an integral role in acquiring talent. Many HR departments have begun to turn to social networks to better understand job candidates’ character. Using social networks as a screening tool might provide insights not readily available from resumes or initial interviews. However, requiring access to an applicants’ social networks and the private activities occurring therein—a practice currently legal in 29 U.S. states (Deschenaux, 2015)—could induce strong moral reactions from the job candidates because of a perceived loss of information privacy. Subsequently, such disclosure requests could induce job candidates to respond in a multitude of ways to protect their privacy. Given that an estimated 2.55 billion individuals will use social media worldwide by 2017 (eMarketer, 2013), the repercussions from requests for access social media environments have potentially far-reaching effects. In this research, we examine how one such disclosure request impacted six information privacy protective responses (IPPRs) (Son & Kim, 2008) based on the job candidates’ perceived moral judgment and the perceived moral intensity of the HR disclosure request. These responses occurred when we asked respondents to provide personal login information during a hypothetical interview. By modeling data derived from a sample of 250 participants in PLS-SEM, we found that the five IPPRs (i.e., refusal, negative word of mouth, complaining to friends, complaining to the company, and complaining to third parties) were all significant responses when one judged the request to be immoral and perceived the moral intensity concept of immediate harm. The amount of variance explained by these five IPPRs ranged from 17.7 percent to 38.7 percent, which indicates a solid initial foundation from which future research can expand on this HR issue. Implications for academia and practice are discussed

    Job Applicants\u27 Information Privacy Protection Responses: Using Socia Media for Candidate Screening

    Get PDF
    For human resource (HR) departments, screening job applicants is an integral role in acquiring talent. Many HR departments have begun to turn to social networks to better understand job candidates’ character. Using social networks as a screening tool might provide insights not readily available from resumes or initial interviews. However, requiring access to an applicants’ social networks and the private activities occurring therein—a practice currently legal in 29 U.S. states (Deschenaux, 2015)—could induce strong moral reactions from the job candidates because of a perceived loss of information privacy. Subsequently, such disclosure requests could induce job candidates to respond in a multitude of ways to protect their privacy. Given that an estimated 2.55 billion individuals will use social media worldwide by 2017 (eMarketer, 2013), the repercussions from requests for access social media environments have potentially far-reaching effects. In this research, we examine how one such disclosure request impacted six information privacy protective responses (IPPRs) (Son & Kim, 2008) based on the job candidates’ perceived moral judgment and the perceived moral intensity of the HR disclosure request. These responses occurred when we asked respondents to provide personal login information during a hypothetical interview. By modeling data derived from a sample of 250 participants in PLS-SEM, we found that the five IPPRs (i.e., refusal, negative word of mouth, complaining to friends, complaining to the company, and complaining to third parties) were all significant responses when one judged the request to be immoral and perceived the moral intensity concept of immediate harm. The amount of variance explained by these five IPPRs ranged from 17.7 percent to 38.7 percent, which indicates a solid initial foundation from which future research can expand on this HR issue. Implications for academia and practice are discussed

    Exploring Satisfaction with and Trust in Social Networking Sites through the Lens of Fan Pages: Uncertainty Reduction and General Systems Theory Perspective

    Get PDF
    The purpose of this study is to examine social networking sites (SNS) users’ overall satisfaction with and trust in SNS, as related to their activities of visiting fan pages. We employ two theories—uncertainty reduction theory (URT) and general systems theory (GST)—to examine antecedents affecting overall satisfaction with and trust in SNS. Using a web-based survey, we analyzed 200 SNS users who follow at least one company’s fan page, and utilized seemingly unrelated regression (SUR) models to empirically test our hypotheses. Our findings indicate that uncertainty reduction strategies supported by URT are significantly associated with perceived usefulness of companies’ posts in their fan pages. In turn, perceived usefulness of those posts promotes more visits to the fan page. Finally, users’ perceived usefulness of fan page posts eventually accounts for the overall satisfaction with and trust in SNS. The implications and limitations are discussed at the end of this study

    Diffusion of Innovations and the Theory of Planned Behavior in Information Systems Research: A Metaanalysis

    Get PDF
    Diffusion of Innovations and the Theory of Planned Behavior provide the foundation on which a preponderance of information systems (IS) theory and research is built. IS scholars often assume that the basic factors proffered by these theories are significant determinants of innovation adoption. However, there has yet to be a meta-analytic examination of research in the IS field to validate this assumption. Herein, we use Tornatzky and Klein’s seminal 1982 meta-analysis of innovation characteristics as the starting point for our meta-analytic examination of Diffusion of Innovations and Theory of Planned Behavior models in IS research. In order to focus our investigation on a common criterion variable, adoption propensity, we use antecedents from both models to develop a model of innovation adoption-behavior (IAB). After describing the relationships encompassed by the IAB model, we step through a bare-bones meta-analysis. Considering the data reported in fifty-eight empirical articles, we calculate the estimated true correlations with the criterion variable to be .53 for attitude toward behavior, .33 for subjective norm, .41 for perceived behavioral control, .42 for relative advantage, .43 for compatibility, -.28 for complexity, .32 for trialability, and .38 for observability. With the exception of complexity, all correlations generalize across studies
    • …
    corecore