15 research outputs found

    The Interplay of Gender, Habit, and Individual Differences in Predicting Trying Intentions

    Get PDF
    We report results of a study investigating the interplay between gender and various aspects of individual propensity to resist change in predicting IS habit and intentions to try a new system. We also explore the relationship between habit, gender, and personal innovativeness with IT in predicting trying intentions. Our research context is student collaboration in group projects. Results indicate that gender plays a key role in affecting both habit development and trying intentions

    Counterintentional Habit as an Inhibitor of Technology Acceptance

    Get PDF
    Most behavioral models used in information systems (IS) research have focused primarily on the role of conscious intentions in determining whether users will adopt or continue using a particular IS. Only recently have IS researchers begun exploring subconscious, automatic predictors of behavior such as habit. Perhaps the biggest constraint has been the lack of a universally accepted, theoretically based, and valid measurement instrument for the study of this complex psychological phenomenon. This paper builds on recent advances in the understanding of habitual behavior from social psychology, by proposing the development of an improved habit measure to be applied in an IS setting. The validated measure will then be used to examine how habit can counteract intentions and inhibit the adoption and use of systems that have been deemed important to a companyā€™s success. Specifically, we hypothesize that habitual use of an existing system will negatively impact both intentions to use, and actual usage of, a new system. By better understanding habitā€™s inhibiting influence on IS acceptance, strategies can be developed for the specific purpose of breaking these preexisting habits, and encouraging the development of new ones

    From Real-Time BI to the Real-Time Enterprise: Organizational Enablers of Latency Reduction

    Get PDF
    Real-time business intelligence (BI) plays an important role in enabling the ā€œreal-time enterprise,ā€ and as such has received a lot of attention in the practitioner literature in recent years. However, academic research on real-time BI and its role in improving overall organizational agility is scarce today. Most research on the real-time phenomenon has focused on technological, as opposed to organizational, issues. Using practitioner models of information value as a starting point, we draw from theories on individual and organizational decision making to create a model of the components of latency that impact an organizationā€™s ability to both sense and respond to business events in real time. Failure to take all the antecedents of these latency components into account when implementing a real-time BI system can have serious consequences on a firmā€™s ability to optimize benefits from conversion to real-time BI systems. We close with suggestions for future IS research on this important emerging topic

    The Optimal Experience: Social Identity and IT Identity as Antecedents of Group Flow in Social Media Use

    Get PDF
    Social media is a popular platform for daily communication and collaboration which supports interaction with online groups and communities. Prior research has investigated flow experiences in social media but only from an individual perspective. In this article, we examine group flow in the context of social media use. The key role played by the IT artifact, as well as the social nature of such use, require the addition of two new antecedents to group flow: IT identity and social identity. We propose that in conjunction with traditional flow experiences, group membersā€™ IT identity and social identification with the group will be strong predictors of group flow experiences. We further propose that group flow will lead to increased group exploration of the focal technology. Our research thus contributes to the growing literature on group flow by further developing its nomological network in social media usage contexts

    Using Social Network Analysis to Analyze Relationships Among IS Journals

    Get PDF
    Social network analysis (SNA) offers a richer and more objective way of examining individual journal influence and relationships among journals than studies based on individual perceptions, since it avoids personal biases. This article demonstrates how SNA can be used to study the nature of the IS discipline, by presenting results from an exploratory SNA of 125 previously ranked journals from IS and allied disciplines. While many of the most prominent journals in the network are still associated with ISā€™s foundational disciplines, we identify several IS journals that play important roles in disseminating information throughout different subcomponents of the network. We also identify related groups of journals based not only on patterns of information flow, but also on similarity in citation patterns. This enables us to identify the core set of journals that is important for ā€œpure ISā€ research, as well as other subsets of journals that are important for specialty areas of interest. Overall, results indicate that the IS discipline is still somewhat fragmented and is still a net receiver, as opposed to a net provider, of information from allied disciplines. Like other forms of analysis, SNA is not entirely free from biases. However, these biases can be systematically researched in order to develop an improved, consistent tool with which to examine the IS field via citations among member journals. Thus, while many challenges remain in applying SNA techniques to the study of IS journals, the opportunity to track trends in the discipline over time, with a larger basket of journals, suggests a number of valuable future applications of SNA for understanding the IS publication system

    Uncertainty Avoidance and Consumer Perceptions of Global e-Commerce Sites: A Multi-Level Model

    Get PDF
    47 pagesOnline purchasing is a decision-making process that involves inherent uncertainty. Yet consumer tolerance for uncertainty differs across cultures, requiring e-vendors to decide whether to adapt websites to different cultures when operating globally. We examine the effect of Hofstedeā€™s cultural dimension of uncertainty avoidance (UA) on consumer perceptions of e-loyalty. Viewing information quality, trust, and system quality as uncertainty reduction mechanisms, UA is hypothesized to moderate relationships involving these constructs in a recognized model of IS success. Specifically, we posit that relationships involving these constructs will be stronger for consumers from high UA cultures. Using data drawn from over 3,500 actual consumers from 38 different countries, and controlling for the impact of other cultural dimensions, results suggest that UA moderates the effects of information quality on perceived usefulness, and of trust on e-loyalty, but not system quality relationships. We discuss practical implications of our research, in regard to designing websites intended for global use

    The Influence of Uncertainty Avoidance on Consumer Perceptions of Global E-Commerce Sites

    Get PDF
    We examine the effect of Hofstedeā€™s (2001) cultural dimension of uncertainty avoidance (UA) on consumer perceptions of eloyalty. Viewing information quality, trust, and system quality as uncertainty reduction mechanisms, UA is hypothesized to moderate relationships involving these constructs in a recognized model of IS success. Using data drawn from over 3,500 actual consumers from 38 different countries, and controlling for the impact of other cultural dimensions, results suggest that UA moderates the effects of information quality on perceived usefulness, and of trust on e-loyalty, but not system quality relationships. The moderating effect of UA on the information quality-satisfaction relationship was non-significant, indicating uncertainty reduction effects may operate via a cognitive rather than an affective route. We close with implications

    Cross-Level Moderation of Team Cohesion in Individualsā€™ Utilitarian and Hedonic Information Processing: Evidence in the Context of Team-Based Gamified Training

    Get PDF
    Firms currently use teams extensively to accomplish organizational objectives. Furthermore, gamification has recently attracted much attention as a means of persuading employees and customers to engage in desired behaviors. Despite the importance of teams and the growing interest in gamification as a persuasion tool, past researchers have paid little attention to team-based gamification from a multilevel perspective. Based on motivational consistency theories, we hypothesize that at the team level, team performance has a positive effect on team cohesion. Drawing on the elaboration likelihood model (ELM), we further hypothesize two cross-level effects in the context of team-based gamified training: first, that team cohesion positively moderates the relationship between utilitarian perceptions (i.e., perceived quality of learning) and attitude; and second, that team cohesion negatively moderates the relationship between hedonic perceptions (i.e., perceived enjoyment of learning) and attitude. We tested our research model using an enterprise resource planning (ERP) simulation game involving 232 participants in 78 teams. The results of ordinary least squares and hierarchical linear modeling analysis support our hypotheses. This study makes three substantive contributions to the team literature and to the ELM in the context of team-based gamified training. First, it theorizes and empirically tests the effect of team performance on team cohesion at the team level. Second, it extends the ELM by examining the cross-level moderation of team cohesion on human information processing. Third, it demonstrates that the utilitarian and hedonic aspects of information technology do not influence user attitudes equally

    IT Security and Espoused Cultural Values: A Comparative Analysis of Pakistan and the United States

    No full text
    Information technology (IT) security research has investigated how users perceive and address IT security threats differently based on their cultural backgrounds and espoused cultural values. We extend prior research, grounded in Protection Motivation Theory (Rogers 1975), that has examined how espoused cultural values influence the relationship between perceived coping efficacy and coping behaviors. Our research model includes two infrequently studied cultural dimensions: indulgence vs. restraint (Hofstede 2022) and survival vs. self-expression (Inglehart-Welzel 2005). The model will be tested using survey data from mid-level managers in the US and Pakistan. The study offers a more nuanced understanding of the impact of cultural factors on the adoption and implementation of IT security measures in diverse organizational contexts. It further contributes to practice by offering guidance to organizations who must design security training and other intervention strategies to modify employee security behaviors

    The Embeddedness of Information Systems Habits in Organizational and Individual Level Routines: Development and Disruption

    No full text
    Despite recent interest in studying information system habits, our understanding of how these habits develop and operate in an organizational context is still limited. Within organizations, IS habits may develop over long periods of time and are typically embedded within larger, frequently practiced, higher-level work routines or task sequences. When new systems are introduced for the purpose of at least partially replacing incumbent systems, existing IS habits embedded in these routines may inhibit adoption and use of the new systems. Therefore, understanding how work-related IS habits form, how they enable and inhibit behavior, and how they can be disrupted or encouraged requires that we examine them within the context of organizational and individual level work routines. The current study integrates psychology and organizational behavior literature on cognitive scripts and work routines to examine IS habits as they occur embedded within larger, more complex task sequences. The objective of the paper is to contribute to the IS habit literature by (1)怀situating IS habits within the context of their associated work routines and task sequences, and (2)怀providing a theoretical understanding of how incumbent system habits can be disrupted, and how development of new system habits can be encouraged, within this context. We draw from extant research in psychology, organizational behavior, and consumer behavior to offer propositions about context-focused organizational interventions to break, or otherwise discourage, the continued performance of incumbent system habits and to encourage the development of new system habits. Specifically, our theoretical development includes script disruption techniques, training-in-context, and performance goal suspension as organizational interventions that disrupt incumbent system habits. We further theorize how stabilizing contextual variables associated with modified work routines can facilitate the development of new system habits. The paper concludes by discussing the importance of combining intervention strategies to successfully disrupt incumbent system habits and encourage development of new system habits and thus facilitate adoption of new systems
    corecore