463 research outputs found

    Cognitive Stopping Rules in a New Online Reality

    Get PDF
    This research is a conceptual replication of a study by Browne, Pitts, and Wetherbe (2007) that explores information stopping rules in an online search context. Information stopping rules consider the cognitive reasons decision makers determine when enough information is collected to make a decision. Previous research outlines five stopping rules decision makers use and applies them in different decision context. The original research considers three information search tasks (search for a television, map, and job) and hypothesizes the relationship between structure of the task and the stopping rule employed. This research replicates that study in a new information environment with new search methodologies and technology. We find that structured tasks use similar stopping rules to the original study; however further analysis shows distinct differences in the nature of the two tasks presented. Poorly structured tasks potentially involve the use of different stopping rules than previously determined. The updated findings suggest information systems used for poorly structured search tasks might also benefit from highlighting the uniqueness of information in order to encourage a user to continue searching for information

    Multidimensional Decision Model for Investment in Cloud Computing

    Get PDF
    Cloud computing is an exciting phenomenon currently gaining popularity. Many organizations consider the option of migrating some of their infrastructure to cloud. However, it is absolutely essential to understand the promises of cloud computing, and its actual capabilities offered by modern-day cloud providers beforehand. This paper investigates the phenomenon of cloud computing from the perspective of “cloudonomics”. It describes the basic premises of cloud computing; these foundations allow us to frame the main research goal of this study – the investigation of costs associated with utilizing cloud services offered by external providers in contrast to meeting the needs in-house. We discuss how these topics have been approached by other researchers, and we identify the directions that future research should follow in order to provide valuable information for both IS practitioners and IS researchers. Finally, we propose a discrete multidimensional decision model that helps researchers and decision-makers in evaluating services offered by cloud vendors

    Identifying and measuring the dimensions of risky IT behavior

    Get PDF
    As the use of personal mobile computing devices is growing exponentially, many organizations are implementing BYOD programs that allow employees access corporate networks using their mobile devices. Consequently, these devices can become a vehicle to transfer the risky IT behavior of individuals to enterprises. The ubiquitous, multifunctional, and highly-connected nature of mobile devices create a unique context for studying risky use of these devices. Previous IS security research has studied adoption of protective technologies. However, there is a lack of research on measuring different dimensions of risky IT behavior and how they can be influenced by using protective technologies. To address this gap, we develop a survey to identify and measure the individuals’ risky IT behaviors on mobile devices. We will then extend our research to investigate antecedents of users’ risky IT behaviors across different devices

    An Investigation on the User’s Willingness to Pay on Hedonic Social Network Sites

    Get PDF
    In the current study, we investigated the effects of several factors on the user’s willingness to pay (WTP) on hedonic social network sites (HSNSs), which includes WTP for HSNSs and WTP online contacts on HSNSs. Integrating the hedonic system use perspective with the social capital based view, we find that a user’s WTP for HSNSs is significantly positively influenced by the user’s perceived value of online social connections and perceived ease of use of the system. A user’s WTP online contacts on HSNSs is significantly positively influenced by the user’s perceived value of online social connections and perceived playfulness. The findings provide a theoretical foundation for the future economic value research of HSNSs, and provide several implications to practitioners

    Revisiting Client/Server Computing

    Get PDF
    The role of the Information Technology department is changing as it continues to mature and adapt to changes in technology, much of that change dealing with its interaction with corporate end-users. IT departments must continue to move in a more user friendly direction or they are going to encounter serious political problems with top management. The increased interest in cloud computing, green computing, and in outsourcing are further indicators of the problems that IT departments are currently facing.   Information Technology departments must approach client/server with a clear view of the lasting business benefits that it can bring rather than opposing or resisting the migratio

    Empirical Evaluation of Information Security Planning and Integration

    Get PDF
    Organizations can choose how to integrate information security through planning and structuring of the information security function. This study aims to examine how the planning and structuring choices of the organization impacts the effective utilization of information security strategies. This study examines information security planning integration through a stages of growth perspective and finds that more mature information security planning integration is positively correlated with more effective utilization of information security deterrence, detection, and recovery strategies. This study also finds that a decentralized structure of information security management activities has a positive effect on the maturity of information security planning integration. This study suggest the maturity of information security planning integration that has a direct effect on the utilization of information security strategies and mediates the relationship between structure of information security management activities and utilization of information security strategies

    Investigating Information Systems Failures

    Get PDF

    Forster, John L. Secondary School Yearbook 1952-1953

    Get PDF
    Called The Spartaloguehttps://scholar.uwindsor.ca/essexcountyontariohighschoolyearbooks/1023/thumbnail.jp

    Forster, John L. Secondary School Yearbook 1958-1959

    Get PDF
    Called The Spartaloguehttps://scholar.uwindsor.ca/essexcountyontariohighschoolyearbooks/1028/thumbnail.jp
    • …
    corecore