48 research outputs found
How Espoused Culture Influences Misuse Intention: A Micro-Institutional Theory Perspective
Following Willson and Warkentinâs [42] call for understanding the interaction between employees and the organization in the context of computer abuse, this paper investigates the effect of espoused institutional pressure on misuse intention in South Korea. In addition, we hypothesize the effect of culture in the form of self-construal, power distance and Confucian dynamism on usersâ perceptions of organizational coercive, normative and mimetic pressures. We collected 232 usable surveys. Since the sample was mostly a convenience sample, the response rate was close to a 100%. Our analysis found that coercive pressure has no effect on misuse intention, while normative pressures has significant deterring effect and mimetic has significant motivating effect on misuse intention. As to culture, self-construal had the strongest effect on institutional pressure and subsequently on misuse intention
Organizational Informal Structure Influence On Project Success: Social Capital Approach
Knowledge sharing and organizational citizenship behavior (OCB) among project team members are crucial for project success. The IS project team is a temporary organization and has to produce outcomes in a limited time. we investigate how internal and external social capital (SoC) influence knowledge sharing and OCB within a team and how OCB and knowledge sharing affect project success. We also analyze the relationships between the three social capital dimensions. Our investigation will be analyzed using multi-level approach, which can make up for shortcomings of single-level analysis. This research adds to the current body of knowledge by examining the facilitation of knowledge sharing in the organization through informal interaction and citizenship. A statistical testing has not been complete. We will explore both HLM6 and MPLUS for multiple structural equation modeling and introduce a comparative analysis of each set of results. We expect the results of the research can provide project managers with insights on how to encourage project team members to share their knowledge and build teamwork more efficiently
The Effect of Paradoxical Tensions Between Confucian Culture and Organizational Culture on Fear and Knowledge Sharing Intention
Individuals often encounter challenges balancing collaboration and competition in organizational life. Although paradoxes exist in all organizations, there is minimal empirical research investigating paradoxical tensions at the micro level. Furthermore, previous organizational studies have overlooked employees emotionally driven acts. To fill these research gap, this study examined the paradoxical relationships between espoused cultural values, perceived organizational culture, negative emotions (fear of social exclusion), and knowledge sharing in South Korean organizations. The results show that paradoxical tensions between espoused Confucian culture and knowledge sharing supportive culture result in fear of social exclusion. Subsequently, fear of social exclusion has a negative association with knowledge sharing intention. This study contributes to micro-level research of paradoxes by examining the paradoxes of belonging and of performance at the individual level and their influence on employeesâ knowledge-sharing behavior
From Hindsight to Foresight: Applying Futures Research Techniques in Information Systems
Although much IS research deals with evaluating and improving existing information systems, researchers are also called upon to think about the future, particularly beyond organizational boundaries. Examples include: the potential impact of socio-technical phenomena such as the digital divide, digital rights management, security, and privacy. One way of forecasting the future is to extrapolate empirically observed relations (e.g. Mooreâs law). However, such extrapolations assume that the future is an immutable extension of the present and are usually limited to one or two dimensions. Externalities due to disruptive inventions, changes in regulations, tastes, competition, required skills, and more also need to be considered. This tutorial presents and explains three methodologies that take these possible changes into account to improve our understanding of the future: Delphi, cross impact analysis, and scenarios
The Ripple Effect of an Information Security Breach Event: A Stakeholder Analysis
While unfortunate physical events result in a negative market reaction, cyber events rarely do. It is our contention that a security attack is a complex intervention that ripples through the attacked companyâs ecosystem. Over time, new information about the incident is revealed which might change the trajectory of the effect. This study aims to understand the impact of a security breach on the attacked company, its ecosystem (e.g., consumers, vendors, banks, and hackers), and surrounding society. By utilizing a stakeholder analysis as a methodological framework, we found that, while some stakeholders are losers, other are winners. Our analysis also implies that, depending on subsequent events, the effect of a security breach on the attacked firm varies over time, suggesting a âwait and seeâ attitude by the market
Identity Management
Identity Management (IdM) has been a serious problem since the establishment of the Internet as a global network used for business and pleasure. Originally identified in a Peter Steinersâ 1993 New Yorker cartoon âOn the Internet nobody knows youâre a dogâ, the problem is over 15 years old. Yet, little progress has been made towards an optimal solution. In its early stages, IdM was designed to address the problem of controlling access to resources and managing the matching of capabilities with people in well defined situations (e.g., Access Control Lists). In todayâs computing environment, IdM involves a variety of user centric, distinct, personal forms of digital identities. Starting with the basics of traditional access control often assimilated to âdirectory entriesâ (i.e., ID, password and capability) IdM is generalized to the global networked society we now live in. With the advent Inter-organizational systems (IOS), social networks, e-commerce, m-commerce, service oriented computing and automated agents (such as botnets), the characteristics of IdM evolved to include people, devices, and services. In addition, as the complexity of IdM increases so did related social issues such as legitimacy, authoritativeness, privacy rights, personal information protection as well as broader problems of cyber predators and threats. The tutorial addresses the following IdM topics: history and background (access control), what is IdM, technical challenges, social issues, life cycle, standards, research projects, industry initiatives, paradigms, vendor solutions, implementation challenges, emerging trends, and research concepts
Global Diffusion of the Internet V - The Changing Dynamic of the Internet: Early and Late Adopters of the IPv6 Standard
The introduction of a new network level protocol called Internet Protocol version 6 (IPv6) represents a significant step forward in the development of the Internet. While IPv6 offers a number of advantages over the current standard (IPv4), its adoption has been inconsistent, often varying by geographic and political region. Through an investigation of early and late adopters of IPv6, this paper seeks to understand the factors that influence the time of adoption decision. The study was conducted in two stages. In the first stage, we interviewed Internet thought leaders. Based on previous literature about the characteristics of early and late adopters, and characteristics specific to IPv6 derived from the interviews, we developed a set of initial notions describing the conditions that are likely to encourage early adoption of IPv6. In stage two we tested those conditions through interviews with eight ISPs in six countries. We found that relative advantage, uncertainty and risk, crisis, and power relationships influence an organization\u27s time of adoption while organizational age does not impact the time of adoption. In addition, we found that sponsorship and availability of information indirectly affect time of adoption by mitigating the perceived risk of early adoption
Academic Electronic Publishing: A Framework
This paper introduces a comprehensive research framework for academic electronic publishing (AEP). Eisenhart (1994) suggested a framework to study and guide commercial electronic publishing. Considering the unique nature of academic publishing, Eisenhartâs framework is extended to include social, managerial and economic factors distinct to academia. The framework leads to a set of guidelines. The guidelines are applied to the new Communications of AIS. A longer version of the paper is available
Tutorial: Identity Management Systems and Secured Access Control
Identity Management has been a serious problem since the establishment of the Internet. Yet little progress has been made toward an acceptable solution. Early Identity Management Systems (IdMS) were designed to control access to resources and match capabilities with people in well-defined situations, Todayâs computing environment involves a variety of user and machine centric forms of digital identities and fuzzy organizational boundaries. With the advent of inter-organizational systems, social networks, e-commerce, m-commerce, service oriented computing, and automated agents, the characteristics of IdMS face a large number of technical and social challenges. The first part of the tutorial describes the history and conceptualization of IdMS, current trends and proposed paradigms, identity lifecycle, implementation challenges and social issues. The second part addresses standards, industry initia-tives, and vendor solutions. We conclude that there is disconnect between the need for a universal, seamless, trans-parent IdMS and current proposed standards and vendor solutions
Academic Electronic Publishing: Scenarios for 2007
Traditional academic publishing in refereed journals, such as those used in promotion decisions, faces major obstacles such as time lags from submission to publication and distribution costs. Although electronic publishing can reduce cost and time to print, it presents new issues and problems, such as:â˘How tocontrol the quality of the publication? â˘What is the best medium for electronic publishing? â˘How should copyrights be protected? This paper presents four scenarios for 2007 to explore these issue