519 research outputs found

    The Effectiveness of Using Computers for Software Training: An Exploratory Study

    Get PDF
    Both academic institutions and corporations have invested huge amounts of resources in computer-based training and education. The evidence in support of the effectiveness of computers and instructional technology in the classroom is mixed at best, and much of the practice is based on faith and ongoing trends in education. In this study, we conduct an exploratory experimental investigation into the effectiveness of four computer-based software training methods; traditional, delayed, asynchronous, and synchronous. We do not find any evidence to support the commonly held beliefs that there is an improvement in the computing literacy scores of students if the instructor has access to computers or if the students have access to computers during the software lesson. On the other hand, students find the practice of using computers both by themselves and by the instructors more satisfying than not being able to use them in the classroom. Our results have serious implications for instructors and decision-makers in both education and industry. While our results are directed at the lower levels of the Bloom\u27s taxonomy of learning, we recommend research into higher levels in order to assess the full impact of computer-based education

    Journal Self-Citation IV: Citations Analysis of IS Journals – Separating Facts from Fiction

    Get PDF
    This article is inspired by a recent posting on the AISWorld listserv eliciting thoughts on the practice of self-citations by journals in the IS field. While emotions ran high in the ensuing online discussion, we try to provide an objective and informed analysis of the actual citation patterns of both top tier journals and non-top tier journals. Results show that the practice of self-citation is fairly common among both types of journals. Additional analyses showed that the preference for top-tier citations was more prevalent in top-tier journals than in non-top-tier journals. Supported by the data, we provide several arguments for these practices

    Learning Spreadsheet Software in the Traditional & Synchronous Modes: A Model and A Pilot Study to Investigate End User\u27s Performance & Satisfaction

    Get PDF
    A survey of U.S. senior information systems (IS) executives found that, organizational learning and use of IS technologies, ranked fifth out of a list of 20 critical IS management issues (Niederman, et al., 1991, p. 480). In the global context, this issue ranked sixth out of a list of 20 critical IS issues facing IS executives in India during 1988 (Palvia and Palvia, 1992); training and education of DP Personnel ranked fifth most important issue in Singapore around 1987 (Rao et al, 1987); retaining, recruiting, and training was the number one issue for Hong Kong around 1989 (Burn et al, 1993); and recruiting, training, and promoting IS staff ranked eighteenth most important issue among 20 critical issues around 1994 in Taiwan (Palvia and Wang, 1995)

    Learning Spreadsheet Software in the Traditional and Synchronous Modes: A Model and a Pilot Study to Investigate End User\u27s Performance and Satisfaction

    Get PDF
    Organizational learning and use of IS technologies ranked fifth in a list of 20 critical IS management issues in U.S.A. (Niederman et al., 1991). A very recent study (Kim and Kim, 1999) ranked organizational learning as 13th and IS Education and Training as 14th most important in a list of 30 issues. Globally, this issue ranked first in Hong Kong (Burn et al, 1993); fifth in Singapore (Rao et al., 1987); and sixth in India (Palvia and Palvia, 1992). Knowledge of and skills in the use of software such as word processing, spreadsheet, and database represent the basic computer literacy requirements for end users. Both academic institutions and corporations have been investing significant time and dollars to provide the necessary education in the use of these software products. This paper articulates four approaches - traditional, asynchronous, delayed, and synchronous - to impart computer software education in a group setting. It then describes instruments developed to measure relatively distinct areas of computer software knowledge and skills - memory recall, critical thinking, and computing literacy. Finally, the paper provides an analysis of data collected to compare and contrast the effectiveness of the traditional and synchronous modes for spreadsheet software (Excel) education. The findings are: (a) the traditional mode does not individually contribute to improving memory recall and recognition, or critical thinking whereas synchronous mode does; (b) both traditional and synchronous approaches individually contribute to improving computing literacy; (c) there is no evidence to suggest that either mode is superior in contributing to these improvements, and (d) the end users find the synchronous mode to be more satisfying than the traditional mode for learning spreadsheet software

    Classification of Computers and Computing Architectures:

    Get PDF
    Different terms or buzzwords have existed for the several classes of computers. Should our view of the classes of computers be so complicated and potentially confusing? Based on literature survey, empirical research, and authors\u27 combined accumulated experience in teaching and consulting, this paper recommends that for most situations, a simple dichotomyof computers as CLIENT and SERVER is adequate. The CLIENT computer is primarily for the use of and under the control of an individual, while the SERVER computer is meant for the use of more than one individual -a group, department, corporation, or government agency. This paper contends that this simple dichotomy facilitates initial learning for all computer users. Based on empirical research, the results were statistically significant to substantiate that --(a) computer classification confusion exists, (b) the dichotomy works, and (c) the dichotomy is preferred. This paper also proposes a hierarchical classification of computers based on different levels of perspective. Just as the general view of the classes of computers was technical in the beginning,the view of the computing architecture has been also technical. The technical classifications were based on criteria like network topologies, type of protocol, etc. This paper contends that again the user-oriented view for the classification of computing architecture should prevail. We suggest a simple dichotomy of computing architectures: Server/Client and Client/Server. The proposed dichotomy is based on end users\u27 view: who is at the center of information processing: Server or Client. In the Server/Client architecture, the server is at the center and the clients revolved around it in the sense that these are dependent on the capacity and capabilities of the server. With the fusion of computer and telecommunication technologies, a new paradigm of Client/Sever architecture has evolved. In this architecture, the client is at the center and there are several local or remote servers catering to the needs of this KING called the client

    Critical Issues of IT Outsourcing Vendors in India

    Get PDF
    Global outsourcing of IT and IT-enabled services (ITES) has now become an accepted corporate strategy of a vast majority of firms around the world. The functions being offshored have increased in scope and magnitude and have climbed the value chain ladder. However, the literature has overwhelmingly focused on client-centric issues to the neglect of vendor concerns. There is a rich tradition of ranking critical issues confronting Information Systems executives, and some studies have even explored critical issues of outsourcing clients. These rankings have significant implications for both researchers and practitioners. Our study focuses on the nascent area of IT outsourcing vendors. We examine the issues from the standpoint of IT outsourcing vendors in India, currently the primary destination for IT offshoring. The results suggest that for the Indian vendors, the most critical issues are not related to cultural, language, and time-zone differences as suggested in many writings. Rather, the most critical concerns are issues dealing with work arrangements and relationships with the client, and issues related to the client’s organizational readiness for offshoring. Clearly the understanding of such issues is important to the vendors, but also to the clients in order to maintain an effective dyadic relationship

    Regulatory Value from Cognitive Engagement in Electronic Commerce

    Get PDF

    The Impact of Mobile Payment on Consumer Behavior: A Unified Model

    Get PDF
    The adoption of mobile payment solutions is increasing worldwide at a rapid rate. However, in comparison to the research on the impact of traditional payment methods on consumer behavior, research examining the impact of mobile payment is scarce. In this study, based on psychology literature and mobile payment literature, we develop a unified model to examine the impact of mobile payment on consumer behavior that incorporates both pain and pleasure and their antecedents: payment transparency and payment decoupling. We also include the value perception of the payment method (a second order construct) to understand its relationship with the two hedonic constructs. The model is evaluated using the positivist survey method. Results show that the value perception of mobile payment affects purchase intention through its positive relationship with payment decoupling. Payment transparency positively affects pain of payment, while payment decoupling moderates (positive) the relationship (negative) between pain and pleasure. Pain and pleasure then jointly affect mobile payment user’s purchase intention. This research contributes to both the literature on the post adoption impact of mobile payment as well as the literature on the psychological effects of payment method

    Influence Factors and Control in International IT Outsourcing Management: A Contingency Perspective

    Get PDF
    Rapid advances in technology and increased globalization and competitive pressures have forced many firms to search for alternatives that will reduce organizational cost, and at the same time create and/or maintain their competitive advantage in the global market. In this respect, many firms are turning to global outsourcing as a means of leveraging information technology (IT) for competitive advantage without having to worry about factors like technological obsolescence and skyrocketing IT expenditures. Of course, jumping onto an outsourcing deal without prior analysis of the situation and the vendor could make the organization worse off than before. Recent studies and anecdotal evidence point to the fact that even though a ‘watertight’ contract can absolve the client from many would be problems, the success and outcome of the outsourcing partnership ultimately depends on the management of the relationship. The management of the outsourcing contract becomes more complicated in cases where the vendor is based in a foreign country (International Outsourcing). The focus of this article is to present a contingency perspective of global IT outsourcing management (vis-a-vis control mechanisms) under various scenarios of the outsourcing context. Additionally, this study identifies a number of future research areas and proposes a direction for future research in the area of global IT outsourcing management
    • …
    corecore