49 research outputs found

    The State of Theoretical Diversity

    Get PDF
    Theory provides the medium for organizing and communicating knowledge that enables scientific collaboration. Review of five years of published work in two major IS journals, Management Information Systems Quarterly and Journal of Management Information Systems, describes the nature of this theoretical diversity in IS research. Two-hundred-seventy-three articles were evaluated for theoretical citations to identify the range of theories in Information Systems. Approximately half of the papers explicitly cited one of the 111 theories identified. Thirty of the theories were cited multiple times, representing 55% of the citations. The large number of theories used and the small number used more than once indicate that theoretical diversity clearly exists in information systems research. Based on the results, no theory emerged as a potential candidate for the role of grand/unified theory of information systems

    Between a Rock and a Cell Phone: Social Media Use during Mass Protests in Iran, Tunisia and Egypt

    Get PDF
    In this paper we examine the use of social media, and especially Twitter, in Iran, Tunisia and Egypt during the mass political demonstrations and protests in June 2009, December 2010 - January 2011, and February 2011, respectively. We compare this usage with methods and findings from other studies on the use of Twitter in emergency situations, such as natural and man-made disasters. We draw on our own experiences and participant-observations as an eyewitness in Iran (first author), and on Twitter data from Iran, Tunisia and Egypt. In these three cases, Twitter filled a unique technology and communication gap at least partially. We summarize suggested directions for future research with a view of placing this work in the larger context of social media use in conditions of crisis and social convergence

    Spreadsheet Accuracy Theory

    Get PDF
    Electronic spreadsheets have made a major contribution to financial analysis and problem solving processes. Decisions made using these tools often involve substantive consequences for the organizations. However, academic literature reveals that experienced professionals and students make many errors when developing spreadsheets. Practitioners recognize the importance of accuracy and have published many techniques they use for improving the accuracy of their spreadsheets. Systematic evaluation of this literature provides a basis for understanding practitioners’ perceptions of how and why errors occur in spreadsheets and is also valuable source from which to identify a theory of spreadsheet accuracy and capture the knowledge of experienced spreadsheet developers. The analysis of this literature suggests three categories of issues spreadsheet developers must address to create more accurate spreadsheets including: planning and design; formula complexity; and testing/debugging. Spreadsheet accuracy theory explains and predicts how changes in development processes can be expected to impact spreadsheet accuracy

    The Role of Work Pressure in IT Task Groups: Identifying Theoretical Constructs

    Get PDF
    This paper introduces the study of group work pressure (GWP) in information technology (IT) task groups. We theorize that GWP arises from demands and resources in group work and that high levels of GWP inhibit group performance. To identify the constructs of a new group task demands-resources (GTD-R) model, we solicit subjects’ descriptions of factors associated with high and low pressure group work situations they have experienced. We find that GWP is composed of characteristics of the task, group, environment, and individuals in the environment. Group characteristics include expertise of the group, group history, and degree of interpersonal conflicts. Individual characteristics include task motivation, personal expertise, and positive/negative consequences. Task complexity, time pressure, and external resources available to the group complete the model tasks. The findings extend prior demands-resources research, suggesting a research model for future study and practical mechanisms for reducing undesirable effects of GWP

    Context Counts: Effects of Work versus Non-Work Context on Participants’ Perceptions of Fit in E-mail versus Face-to-Face Communication

    Get PDF
    There is a general need to understand better how context can affect evaluation, usage, and productivity of IT in research and practical settings. This paper investigates how perceived effectiveness of e-mail-style computer-mediated communication (CMC) differs between work and non-work contexts of use, and contrasts these differences with perceived effectiveness of face-to-face communication (FtFC). From the prior literature, we identified seven major activity domains that are prominent in CMC research. We developed a set of activity scales and corresponding measures of normative cognitive effort (NCE) for these domains and conducted an initial study to evaluate the overall instrument. In a second study, we measured perceived effectiveness of the communication mode within each activity domain among subjects who had communicated via e-mail and FtFC over a 15-week period. Some subjects communicated to support team-based software development (work context), and others communicated for personal interest (non-work context). We find communication technologies, activities, and contexts of use jointly determine perceived effectiveness; context influences perceived effectiveness primarily through interactions; and NCE successfully predicts perceived effectiveness based upon normative differences among activities. Our findings extend prior research in the area of task-technology fit to incorporate context effects, suggest that context is an important consideration in designing research, and introduce NCE as a method for predicting fit that can be applied even prior to system design. We conclude that the differential effects of work vs. non-work contexts are too large to be ignored, and we recommend an increased focus on context effects in CMC research and practice

    Electronic Work Papers for Audit Teams: A Study of Information Systems Adoption

    Get PDF
    The preparation of audit work papers is central to the auditing task. They provide the principle support for the auditor’s report and aid in supervising and conducting the audit process. This study reports the results of a GSS mediated study of what auditors perceive to be important issues concerning the transition from a paper-based to an electronic audit work paper system. Innovation diffusion theory provides a framework for understanding these perceptions. Four auditors used a GSS to identify the factors necessary for successful implementation of this technology. These factors were matched to the constructs of diffusion theory to reveal the relative importance of and relationships among the factors and diffusion constructs

    An Integrated Social Actor and Service Oriented Architecture (SOA) Approach for Improved Electronic Health Record (EHR) Privacy and Confidentiality in the US National Healthcare Information Network (NHIN)

    Get PDF
    The emerging US National Healthcare Information Network (NHIN) will improve healthcare’s efficacy, efficiency, and safety. The first-generation NHIN being developed has numerous advantages and limitations. One of the most difficult aspects of today’s NHIN is ensuring privacy and confidentiality for personal health data, because family and caregivers have multiple complex legal relationships to a patient. A Social Actor framework is suggested to organize and manage these legal roles, but the Social Actor framework would be very difficult to implement in today’s NHIN. Social Actor Security Management could, however, be effectively implemented using Service Oriented Architectures (SOAs), which are rapidly becoming accepted for supporting complex information exchange across heterogeneous information systems fabrics. The Department of Defense is applying SOA to all of its enterprises. It is using customized simulation and modeling tools to achieve security and robustness goals and to reduce the intrinsic design and implementation risks for SOA’s complex Systems of Systems environment. This paper integrates all of these approaches into a next-generation NHIN-2 design based on a specific Air Force SOA named MCSOA. This NHIN-2 design uses MCSOA to create Security Management, Service Discovery, and Presence Management agents to implement Social Actor support for improved confidentiality and privacy

    Understanding Manager and Developer Perceptions of the Relative Advantage, Compatibility, and Complexity of Function Points and Source Lines of Code

    Get PDF
    Software measures are recommended for the effective management of software development projects. Innovation diffusion theory (IDT) provides perspective for understanding managers’ and software developers’ perceptions of the relative advantage, complexity, and compatibility of software measures. This paper describes the results of a survey in which software developers and managers identified a software measure and then answered IDT-based questions about the measure. Two of the most commonly identified measures were source lines of code (SLOC) and function points (FP). Overall, participants indicated that FP have greater relative advantage, compatibility, and complexity than SLOC. Developers indicated that FP have greater relative advantage, compatibility, and complexity than SLOC. Managers, however, did not perceive a significantly greater relative advantage and compatibility for FP over SLOC, but did perceive FP to be more complex than SLOC

    Patient-Centered E-Health: A Status Report

    Get PDF
    Patient-Centered E-Health (PCEH) is an increasingly important part of health information technology. Yet the literature in this area is mainly descriptive and atheoretical, which limits opportunities for research advancement. This paper addresses the theoretical proposition that the benefits of PCEH can be maximized by incorporating three essential characteristics: Patient-focus, patient-activity, and patient-empowerment. We conduct a literature review of e-health research published between 2007 and 2011 to assess the relevance of these characteristics to the underlying domain and their relationships to one another. The results indicate the PCEH characteristics are generalizable to the existing research literature, are generalizable across place and time, and exhibit substantial interrelationships. These findings are encouraging to further development of a predictive theory of PCEH
    corecore