4,952 research outputs found

    Assessing Motivation in Ecommerce

    Get PDF
    This research-in-progress paper examines factors that affect ecommerce. The design of ecommerce web sites has offered many challenges and opportunities for organizations throughout the world. There has been a rich stream in the information systems research on the antecedents of good web design. This has included ideas of how the size of the web site (e.g. the download delay) affects users’ perceptions or even how interactive components affect consumer behavior. The contributions of this paper are two-fold. First, a conceptual model of the factors influencing online consumer motivation is presented. This model draws on Self-Determination Theory (SDT) as well as the current practices used in web design. The model adapts concepts from SDT, and references components of use of motivation in design. Second, this paper presents an instrument that has been validated in laboratory and field tests

    Revisiting the Impact of System Use on Task Performance: An Exploitative-Explorative System Use Framework

    Get PDF
    How information systems impact task performance has attracted a significant amount of attention from information systems researchers and generated high interest among practitioners. A commonly accepted view is that the potential of information systems must be realized through system use. Nevertheless, existing findings regarding the impact of system use on task performance are not yet conclusive. We attributed this to the various conceptualizations of system use and the unclear mechanisms through which system use influences task performance. Thus, this research attempts to create a better understanding of how system use influences task performance. To this end, we developed an exploitative-explorative system use framework in order to reconcile the various conceptualizations of system use and to depict how both exploitative and explorative system use influences task performance through impacting task innovation, management control, and task productivity. We created an instantiation of the framework using USAGE (exploitative system use) and adaptive system use (ASU, explorative system use). We conducted two empirical studies involving two different populations and using two different technologies. The first study consisted of 212 experienced users of MS Office, whereas the second study employed 372 new users of a video-editing tool. Our findings offer insight into how exploitative system use and explorative system use independently and jointly influence task performance constructs and also have implications for research and practices

    Bait the hook to suit the phish, not the phisherman: A field experiment on security networks of teams to withstand spear phishing attacks on online social networks

    Get PDF
    In this paper, we present our research in progress of a field experiment conducted to observe the impact of collective security behavior of teams when being targeted with a spear phishing attack on online social networks. To observe the shaping of security networks in teams, fifteen different honeypot profiles were created to send spear phishing messages after an initial bonding of eight weeks to the target group of 76 people. The experiment simulated a regular communication on online social networks of three teams of an international organization. The team members were entangled in personal and individual chats on an online social network to later react to an unexpected and unforeseen spear phishing message. As previous research has shown, various aspects influence the spear phishing susceptibility, but the collective security behavior has currently been neglected. This work plans to evaluate how security networks are being formed, the factors relevant to shape those networks and efforts to protect against spear phishing attacks

    Phishing Training: A Preliminary Look at the Effects of Different Types of Training

    Get PDF
    In this paper, we present the preliminary results of an experiment conducted to observe the impact of the different training techniques to increase the likelihood of participants identifying and reporting phishing messages. Three different training approaches were used – general video/quiz training, just-in-time training with simulated phishing emails, and a leaderboard, which awarded users points for forwarding correct phishing messages and penalized them for incorrect ones. The experiment emulated a normal working day of an executive assistant of a manager in an organization. Each participant was expected to accomplish work tasks and respond to work-related emails while watching for and reporting phishing messages. We observed that both general training and the presence of a leaderboard decreased the propensity to click on a phishing message, while we found no effect for different types of just-in-time training

    The Role of Dislodgement in the Territorial Ecology of the Owl Limpet, \u3cem\u3eLottia gigantea\u3c/em\u3e

    Get PDF
    Ascertaining the risks and benefits of different behaviors is a central goal of research on territoriality. Although most territorial behavior is ritualized, with concomitant reduced risks for both residents and intruders, this ritualization is generally found to be underpinned by rare, highly consequential, interactions. The agonistic behavior of the intertidal owl limpet, Lottia gigantea, involves defense of a feeding territory, and includes a relatively explosive thrusting response by territory holders against intruding conspecifics. We here ask whether this thrusting behavior is capable of entirely dislodging intruders from their rocky wave-swept substratum, thereby ridding the resident of future challenges by that intruder. Our field measurements of the strength of territorial thrusts, as well as thrust resistance, indicate that territorial limpets are strong enough to overcome the resistance of small to medium sized (\u3c40 mm) conspecifics encountered on their territories. Interestingly, at least 44% of the limpets dislodged from the rock substratum during a retreat or territorial response survived in a new location. Growth of these survivors was at least as rapid as that of undisturbed limpets in the old location. We conclude that shell thrusting during the territorial response of Lottia gigantea can reduce the cost of territorial defense by dislodging smaller conspecifics, thereby eliminating them from all future interactions. Conversely, the risk incurred by these smaller conspecifics while intruding onto territories of larger individuals is likely mitigated by the surprisingly high survival rate, and subsequent normal growth, of dislodged limpets

    Photon-weighted barycentric correction and its importance for precise radial velocities

    Get PDF
    When applying the barycentric correction to a precise radial velocity measurement, it is common practice to calculate its value only at the photon-weighted midpoint time of the observation instead of integrating over the entire exposure. However, since the barycentric correction does not change linearly with time, this leads to systematic errors in the derived radial velocities. The typical magnitude of this second-order effect is of order 10 cm s−1^{-1}, but it depends on several parameters, e.g. the latitude of the observatory, the position of the target on the sky, and the exposure time. We show that there are realistic observing scenarios, where the errors can amount to more than 1 ms−1^{-1}. We therefore recommend that instruments operating in this regime always record and store the exposure meter flux curve (or a similar measure) to be used as photon-weights for the barycentric correction. In existing data, if the flux curve is no longer available, we argue that second-order errors in the barycentric correction can be mitigated by adding a correction term assuming constant flux.Comment: 9 pages, 7 figures, accepted to MNRA

    'Swimmability' : a key element for communities to safely engage with Australian urban rivers

    Get PDF
    Australia’s largest cities are growing, and this is placing increasing pressure on urban waterways. There is a growing awareness that the quality of life in Australian urban communities is enhanced through the engagement of people with healthy urban rivers. Swimming, boating, and fishing in many Australian urban waterways are popular recreational activities. Swimming and other activities associated with waterways contributes to quality of life in urban communities. Swimming in urban rivers can be risky. Hazards include dangerous currents, aquatic plants, submerged hazards, algal blooms, and unsuitable water quality. In Sydney, Australia’s largest City, swimming is popular in the Hawkesbury-Nepean River. Data from showed that E. coli levels in the river occasionally exceeded safe recreational guidelines for human health. The results are not reported to the public. We believe that it is more important than ever that government, industry and scientific bodies work to protect and improve the water quality of Australian urban rivers as our cities grow. Sharing this information with the community needs to consider education programs, public forums, and timely communication of the current state of local Australian urban rivers regarding their ‘swimmability’

    Future of Master’s Level Education in Information Systems Panel Presentation

    Get PDF
    Panels concerning Information System (IS) education issues and curriculum recommendations are part of a rich tradition and they have been well attended at past AIS conferences. This panel hopes to continue build on this foundation by focusing on master’s level programs and curricula in IS. Specifically, this panel will: 1) give the members of the audience an opportunity to review state-of-the-art practices in and innovative ideas related to master’s level education in IS, 2) start to engage the IS community in the process of revising the graduate level model curriculum and 3) present a number of alternative approaches to master’s level graduate programs in IS and to stimulate a discussion that will encourage the audience to consider different options for their programs

    The Influence of Interactivity on E-service Offerings: An Empirical Examination of Benefits and Risks

    Get PDF
    News reports of Internet-based security breaches, identity theft, fraud, and other dangers may increase the perceived risk and decrease the perceived benefits of using electronic services (or e-services). We examine whether interactivity serves as a means to diminish the perceived risks and increase the perceived benefits of using e-services. To examine interactivity’s influence on consumers’ perceptions, we conducted a laboratory experiment using a simulated web-based, online payment system. When compared to a non-interactive preview of an online payment system, we found that consumers who used an interactive e-service simulation reported higher perceived involvement and authenticity as well as higher intangibility and risks of e-services. Further, we found that interactivity moderated relationships such that consumers were more likely to report higher intentions to use e-services. The paper concludes with implications for research and practice
    • …
    corecore