48 research outputs found

    How Espoused Culture Influences Misuse Intention: A Micro-Institutional Theory Perspective

    Get PDF
    Following Willson and Warkentin’s [42] call for understanding the interaction between employees and the organization in the context of computer abuse, this paper investigates the effect of espoused institutional pressure on misuse intention in South Korea. In addition, we hypothesize the effect of culture in the form of self-construal, power distance and Confucian dynamism on users’ perceptions of organizational coercive, normative and mimetic pressures. We collected 232 usable surveys. Since the sample was mostly a convenience sample, the response rate was close to a 100%. Our analysis found that coercive pressure has no effect on misuse intention, while normative pressures has significant deterring effect and mimetic has significant motivating effect on misuse intention. As to culture, self-construal had the strongest effect on institutional pressure and subsequently on misuse intention

    Organizational Informal Structure Influence On Project Success: Social Capital Approach

    Get PDF
    Knowledge sharing and organizational citizenship behavior (OCB) among project team members are crucial for project success. The IS project team is a temporary organization and has to produce outcomes in a limited time. we investigate how internal and external social capital (SoC) influence knowledge sharing and OCB within a team and how OCB and knowledge sharing affect project success. We also analyze the relationships between the three social capital dimensions. Our investigation will be analyzed using multi-level approach, which can make up for shortcomings of single-level analysis. This research adds to the current body of knowledge by examining the facilitation of knowledge sharing in the organization through informal interaction and citizenship. A statistical testing has not been complete. We will explore both HLM6 and MPLUS for multiple structural equation modeling and introduce a comparative analysis of each set of results. We expect the results of the research can provide project managers with insights on how to encourage project team members to share their knowledge and build teamwork more efficiently

    The Effect of Paradoxical Tensions Between Confucian Culture and Organizational Culture on Fear and Knowledge Sharing Intention

    Get PDF
    Individuals often encounter challenges balancing collaboration and competition in organizational life. Although paradoxes exist in all organizations, there is minimal empirical research investigating paradoxical tensions at the micro level. Furthermore, previous organizational studies have overlooked employees emotionally driven acts. To fill these research gap, this study examined the paradoxical relationships between espoused cultural values, perceived organizational culture, negative emotions (fear of social exclusion), and knowledge sharing in South Korean organizations. The results show that paradoxical tensions between espoused Confucian culture and knowledge sharing supportive culture result in fear of social exclusion. Subsequently, fear of social exclusion has a negative association with knowledge sharing intention. This study contributes to micro-level research of paradoxes by examining the paradoxes of belonging and of performance at the individual level and their influence on employees’ knowledge-sharing behavior

    From Hindsight to Foresight: Applying Futures Research Techniques in Information Systems

    Get PDF
    Although much IS research deals with evaluating and improving existing information systems, researchers are also called upon to think about the future, particularly beyond organizational boundaries. Examples include: the potential impact of socio-technical phenomena such as the digital divide, digital rights management, security, and privacy. One way of forecasting the future is to extrapolate empirically observed relations (e.g. Moore’s law). However, such extrapolations assume that the future is an immutable extension of the present and are usually limited to one or two dimensions. Externalities due to disruptive inventions, changes in regulations, tastes, competition, required skills, and more also need to be considered. This tutorial presents and explains three methodologies that take these possible changes into account to improve our understanding of the future: Delphi, cross impact analysis, and scenarios

    The Ripple Effect of an Information Security Breach Event: A Stakeholder Analysis

    Get PDF
    While unfortunate physical events result in a negative market reaction, cyber events rarely do. It is our contention that a security attack is a complex intervention that ripples through the attacked company’s ecosystem. Over time, new information about the incident is revealed which might change the trajectory of the effect. This study aims to understand the impact of a security breach on the attacked company, its ecosystem (e.g., consumers, vendors, banks, and hackers), and surrounding society. By utilizing a stakeholder analysis as a methodological framework, we found that, while some stakeholders are losers, other are winners. Our analysis also implies that, depending on subsequent events, the effect of a security breach on the attacked firm varies over time, suggesting a “wait and see” attitude by the market

    Identity Management

    Get PDF
    Identity Management (IdM) has been a serious problem since the establishment of the Internet as a global network used for business and pleasure. Originally identified in a Peter Steiners’ 1993 New Yorker cartoon “On the Internet nobody knows you’re a dog”, the problem is over 15 years old. Yet, little progress has been made towards an optimal solution. In its early stages, IdM was designed to address the problem of controlling access to resources and managing the matching of capabilities with people in well defined situations (e.g., Access Control Lists). In today’s computing environment, IdM involves a variety of user centric, distinct, personal forms of digital identities. Starting with the basics of traditional access control often assimilated to “directory entries” (i.e., ID, password and capability) IdM is generalized to the global networked society we now live in. With the advent Inter-organizational systems (IOS), social networks, e-commerce, m-commerce, service oriented computing and automated agents (such as botnets), the characteristics of IdM evolved to include people, devices, and services. In addition, as the complexity of IdM increases so did related social issues such as legitimacy, authoritativeness, privacy rights, personal information protection as well as broader problems of cyber predators and threats. The tutorial addresses the following IdM topics: history and background (access control), what is IdM, technical challenges, social issues, life cycle, standards, research projects, industry initiatives, paradigms, vendor solutions, implementation challenges, emerging trends, and research concepts

    Global Diffusion of the Internet V - The Changing Dynamic of the Internet: Early and Late Adopters of the IPv6 Standard

    Get PDF
    The introduction of a new network level protocol called Internet Protocol version 6 (IPv6) represents a significant step forward in the development of the Internet. While IPv6 offers a number of advantages over the current standard (IPv4), its adoption has been inconsistent, often varying by geographic and political region. Through an investigation of early and late adopters of IPv6, this paper seeks to understand the factors that influence the time of adoption decision. The study was conducted in two stages. In the first stage, we interviewed Internet thought leaders. Based on previous literature about the characteristics of early and late adopters, and characteristics specific to IPv6 derived from the interviews, we developed a set of initial notions describing the conditions that are likely to encourage early adoption of IPv6. In stage two we tested those conditions through interviews with eight ISPs in six countries. We found that relative advantage, uncertainty and risk, crisis, and power relationships influence an organization\u27s time of adoption while organizational age does not impact the time of adoption. In addition, we found that sponsorship and availability of information indirectly affect time of adoption by mitigating the perceived risk of early adoption

    Academic Electronic Publishing: A Framework

    Get PDF
    This paper introduces a comprehensive research framework for academic electronic publishing (AEP). Eisenhart (1994) suggested a framework to study and guide commercial electronic publishing. Considering the unique nature of academic publishing, Eisenhart’s framework is extended to include social, managerial and economic factors distinct to academia. The framework leads to a set of guidelines. The guidelines are applied to the new Communications of AIS. A longer version of the paper is available

    Tutorial: Identity Management Systems and Secured Access Control

    Get PDF
    Identity Management has been a serious problem since the establishment of the Internet. Yet little progress has been made toward an acceptable solution. Early Identity Management Systems (IdMS) were designed to control access to resources and match capabilities with people in well-defined situations, Today’s computing environment involves a variety of user and machine centric forms of digital identities and fuzzy organizational boundaries. With the advent of inter-organizational systems, social networks, e-commerce, m-commerce, service oriented computing, and automated agents, the characteristics of IdMS face a large number of technical and social challenges. The first part of the tutorial describes the history and conceptualization of IdMS, current trends and proposed paradigms, identity lifecycle, implementation challenges and social issues. The second part addresses standards, industry initia-tives, and vendor solutions. We conclude that there is disconnect between the need for a universal, seamless, trans-parent IdMS and current proposed standards and vendor solutions

    Academic Electronic Publishing: Scenarios for 2007

    Get PDF
    Traditional academic publishing in refereed journals, such as those used in promotion decisions, faces major obstacles such as time lags from submission to publication and distribution costs. Although electronic publishing can reduce cost and time to print, it presents new issues and problems, such as:•How tocontrol the quality of the publication? •What is the best medium for electronic publishing? •How should copyrights be protected? This paper presents four scenarios for 2007 to explore these issue
    corecore