48 research outputs found

    Collegial Mentorship

    Get PDF
    Mentoring is typically thought of as a top-down process, but it can also be based on collegial mentorship. This article describes an example of peer-to-peer mentoring that helped advance research in the field in field of information systems

    PANEL 1 COMPUTER-SUPPORTED FACE-TO-FACE MEETINGS

    Get PDF

    Mitigating the Security Intention-Behavior Gap: The Moderating Role of Required Effort on the Intention-Behavior Relationship

    Get PDF
    Although users often express strong positive intentions to follow security policies, these positive intentions fail to consistently translate to behavior. In a security setting, the inconsistency between intentions and behavior—termed the intention-behavior gap—is particularly troublesome, as a single failure to enact positive security intentions may make a system vulnerable. We address a need in security compliance literature to better understand the intention-behavior gap by explaining how an omnipresent competing intention—the user’s desire to minimize required effort—negatively moderates the relationship between positive intentions and actual security behavior. Moreover, we posit that this moderating effect is not accounted for in extant theories used to explain behavioral information security, introducing an opportunity to broadly impact information security research to more consistently predict behavior. In three experiments, we found that high levels of required effort negatively moderated users’ intentions to follow security policies. Controlling for this moderating effect substantially increased the explained variance in security policy compliance. The results suggest that security researchers should be cognizant of the existence of competing intentions, such as the desire to minimize required effort, which may moderate the security intention-behavior relationship. Otherwise, such competing intentions may cause unexpected inconsistencies between users’ intentions to behave securely and their actual security behavior

    SUPPORTING JOINT APPLICATION DEVELOPMENT (JAD) WITH ELECTRONIC MEETING SYSTEMS: A FIELD STUDY

    Get PDF
    One of the more common approaches to involving users in the system development process is called JAE) (Joint Application DevelopmenO. The JAD approach is based on highly structured, facilitated meetings and, as such, has the potential to be supported by Electronic Meeting Systems (EMS). A multiple-site field study was conducted in which JAD meetings - both traditional and electronic - were observed. Some differences between JAD and JAD supported by EMS were found. The quality of group member participation was more equal in supported JAD meetings, but supported JAD meetings lacked the session discipline of traditional JAD, Further, conflict resolution (closure) emphasized in traditional JAD was not achieved m several electronic sessions. Overall session management activities - the responsibility of the facilitator for integration of the session with other life cycle activities - was weaker in JAD supported by EMS

    Towards a Personalized Assistance in Distributed Group Facilitation

    Get PDF
    With the advancement of group decision support systems (GDSS), facilitation has been regarded as one of the most important means in enhancing the outcome of group decisions. Many researchers have spent great efforts in creating useful methodologies and techniques to better support group facilitation. However, most of the research in the current literature deals more with facilitation targeted at a group-level than an individual level. With the increasingly available personalization techniques found in e-commerce, personalized facilitation seems to be a natural direction in group system facilitation research to deal with the needs of individual members for the overall gain of the group. In this paper, we address the needs for personalized facilitation in the context of the “EasyWinWin” framework in software requirements analysis by proposing a conceptual framework of personalized facilitation, developing a system architecture towards personalized facilitation and identifying key functions for a personalized facilitation system
    corecore