29 research outputs found

    Managing Organizational Anxiety with Information Systems

    Get PDF
    This conceptual paper explores the issue of organizational anxiety as well as reactions and possible solutions. Building on the general solutions we explore how Information Systems can be used to manage organizational anxiety

    Writing IS Teaching Cases: Guidelines for JISE Submission

    Get PDF
    Over the past year, JISE began accepting Teaching Cases for publication. Many information systems (IS) academicians and professionals have valuable experiences that are ripe for translating into cases. Students and instructors would benefit from the communication of these experiences into realistic, well-written cases to promote active learning. To encourage case submissions, the purpose of this article is twofold: (1) to provide potential authors with helpful advice and suggestions for writing case manuscripts; and (2) to communicate JISE guidelines for Teaching Case submissions. This paper is designed to serve as a resource for writers who are interested in developing Teaching Cases for publication

    SME Adoption of Wireless LAN Technology: Applying the UTAUT Model

    Get PDF
    Wireless network technologies present unique opportunities and challenges for businesses, and Small & Medium Enterprises (SMEs) are no exception. Recently Vankatesh et al. (2003) proposed a more complete model for the understanding of the acceptance and adoption of Information Technology. Their model builds upon and extends beyond the well established Technology Acceptance Model (TAM). This study utilizes this new Unified Theory of Acceptance and Use of Technology (UTAUT) to further validate the model and enhance our understanding of the adoption of wireless technologies as well as SME adoption

    Virtual Organization as a Source of Competitive Advantage: A Framework from the Resource-Based View

    Get PDF
    A framework is developed for viewing the centralization issues of organizations to consider to what degree a virtual organization may help a firm obtain competitive advantage. Utilizing the concepts of flexibility and synergy, the framework can serve as a guide for practitioners to help determine what degree of synergy and flexibility a given organizational form would bring and what its suggested category of competitive advantage would be. Implications and suggestions for future research are also discussed

    Social Network Privacy: Expectations vs Reality

    Get PDF
    This study is an initial step in a larger study which explores issues associated with security and privacy in social network sites (SNSs). Sites such as Facebook, MySpace, LinkedIn, Bebo, Ning and others have increased in popularity and are receiving increased attention from industry and academics as SNSs move beyond the youth market. Most SNSs are targeted towards individuals, yet they are impacting organizations and will change the way business is conducted in the future. Utilizing a survey of MBA students from two US institutions, this study explores the issue of privacy and proposes a model which addresses the risks, expectations, and reality of social networking privacy. It also outlines an agenda for future research

    Application Of Media Richness Theory To Data Collection

    Get PDF
    Researchers and practitioners are becoming more dependent on electronic means of data collection. This study utilizes media richness theory (MRT) as a means to better understand respondent performance in data collection among adults and adolescents. Examining the differences between paper and pencil, interview and electronic form methods of data collection, the results of this study indicate that matching task type to data collection method according to MRT principles produces improved levels of response distortion as expected; however, item omissions are not influenced in the manner anticipated from MRT concepts

    An Examination of the Benefits of E-Business to Small and Medium Size Businesses

    Get PDF
    Small and Medium Sized Enterprises (SME) play a significant part in economies throughout the world. In the early developmental stages of e-commerce/e-business many believed that it would enable these SMEs to compete head-to-head with large companies. While much has been done to examine the adoption of e-commerce/e-business, few have addressed the benefit that it is providing these businesses. This study identifies the types of e-commerce that SMEs are using and examines the benefits that are received from this use

    The Drivers for Acceptance of Tablet PCs by Faculty in a College of Business

    Get PDF
    Utilizing the Unified Theory of Acceptance and Use of Technology (UTAUT) model developed by Venkatesh, et al. (2003) this study extends our understanding of technology acceptance, provides insights into the use of UTAUT as a tool to increase our understanding of acceptance, and identifies areas that administrators should consider when proposing a new technology in a College of Business setting. UTAUT is a useful tool for managers to predict the likelihood of success for new technology introductions and helps managers understand the drivers of acceptance in order to proactively design interventions targeted at users that may be less inclined to adopt and use new systems. The Tablet PC is a new technology being introduced in various settings including faculty and student use in higher education. This study applies UTAUT prescriptively as a management tool to asses the user acceptance of Tablet PCs by the faculty of a College of Business at a large university in the United States. The results largely validate UTAUT, although the findings suggest that certain variables, namely performance expectancy and voluntariness, are the most salient drivers of acceptance when applied to business faculty in higher education

    Profile of Corporate Social Media Consumer Segments

    Get PDF
    The trade and academic literature is replete with commentary about the need for companies to develop promotional strategies and to adopt media platforms that are more engaging and conversational with customers than the traditional top-down company directed one-way communication strategies of the past (Thomas, Peters, Howell and Robbins, 2012; Foster, West and Francescucci 2011; Deighton and Kornfeld, 2009). This viewpoint is supported by Christodoulides (2008) who reported that many customers view information about a company or brand that they obtained from blogs, social networking sites and the like as being more relevant, believable and important to them in their interactions with the company than similar company provided information. Social media savvy customers are by all counts a highly diverse lot and reaching them effectively requires the use of different messages for different groups (Heo and Cho, 2009; Stern, Rao and Gould 1990). For example, some social media users follow a wide variety of posts and enjoy the benefits of special offers while others have mixed feelings about being marketed to on social media websites. Interestingly, this new brand of customer also expects businesses to really know them, their life cycles, their personalities and the goods and services that they desire (Beauchamp 2013)

    SOCIAL NETWORK PRIVACY: EXPECTATIONS VS. REALITY (RESEARCH IN PROGRESS)

    Get PDF
    ABSTRACT This study is an initial step in a larger study which explores issues associated with security and privacy in social network sites (SNSs). Sites such as Facebook, MySpace, LinkedIn, Bebo, Ning and others have increased in popularity and are receiving increased attention from industry and academics as SNSs move beyond the youth market. Most SNSs are targeted towards individuals, yet they are impacting organizations and will change the way business is conducted in the future. Utilizing a survey of MBA students from two US institutions, this study explores the issue of privacy and proposes a model which addresses the risks, expectations, and reality of social networking privacy. It also outlines an agenda for future research
    corecore