Information availability has increased consumers' informedness, the degree to which they know what is available in the marketplace, with precisely which attributes and at precisely what price. This informedness has altered the demand side of market behavior: customers discount heavily when comparable products are available from competitors and when products do not meet their wants, needs, cravings and longings, but no longer discount as heavily when purchasing unfamiliar products. Changes in the demand side are producing comparable changes in the supply side: firms earn less than their expectations when competing in traditional mass market fat spots, while earning far more than previously when entering newly created resonance marketing sweet spots. We trace the impact of hyper differentiation and resonance marketing on the structure of the supply side, with a clear progression from a limited number of fat spots, through reliance upon line extensions, and ultimately to fully differentiated market sweet spots.
{"title":"Resonance Marketing in the Age of the Truly Informed Consumer: Changes in Corporate Strategy Resulting from Changes in Customer Behavior","authors":"E. Clemons","doi":"10.1109/HICSS.2008.375","DOIUrl":"https://doi.org/10.1109/HICSS.2008.375","url":null,"abstract":"Information availability has increased consumers' informedness, the degree to which they know what is available in the marketplace, with precisely which attributes and at precisely what price. This informedness has altered the demand side of market behavior: customers discount heavily when comparable products are available from competitors and when products do not meet their wants, needs, cravings and longings, but no longer discount as heavily when purchasing unfamiliar products. Changes in the demand side are producing comparable changes in the supply side: firms earn less than their expectations when competing in traditional mass market fat spots, while earning far more than previously when entering newly created resonance marketing sweet spots. We trace the impact of hyper differentiation and resonance marketing on the structure of the supply side, with a clear progression from a limited number of fat spots, through reliance upon line extensions, and ultimately to fully differentiated market sweet spots.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124587945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In today’s highly connected global economy, IS/IT is frequently deployed across multiple organizations located in various countries. Consequently, crosssystem integration and collaboration technologies play essential roles and often determine whether or not tangible payoffs and business value are derived. Although, different aspects of IS/IT collaboration have been investigated for more than two decades, the international aspect of collaboration has received only a modest level of academic attention. The objective of this minitrack is to focus on the integration of people, systems, processes and infrastructure especially across organizations, borders, nations and world regions to enable productive teamwork toward accomplishment of mutual goals.
{"title":"Introduction to collaboration issues in cross-organizational and cross-border IS/IT minitrack","authors":"Nicholas C. Romano Jr, J. Pick, N. Roztocki","doi":"10.1109/HICSS.2008.275","DOIUrl":"https://doi.org/10.1109/HICSS.2008.275","url":null,"abstract":"In today’s highly connected global economy, IS/IT is frequently deployed across multiple organizations located in various countries. Consequently, crosssystem integration and collaboration technologies play essential roles and often determine whether or not tangible payoffs and business value are derived. Although, different aspects of IS/IT collaboration have been investigated for more than two decades, the international aspect of collaboration has received only a modest level of academic attention. The objective of this minitrack is to focus on the integration of people, systems, processes and infrastructure especially across organizations, borders, nations and world regions to enable productive teamwork toward accomplishment of mutual goals.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116793580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Outsourcing success - its all in governance reported Lauren Bielski in the ABA banking journal 2006 and consequently, governance represents the key concept when discussing outsourcing in practice. However, when analyzing the business process outsourcing practice of Swiss retail banks, governance aspects seem so far only to play a minor role in the evaluation of outsourcing decisions. This article deals with outsourcing in Swiss retail banking and raises the question whether the mode of governance does matter from the capital markets' point of view, and what modes of governance might be valued most. Our findings provide evidence that governance concepts applied in practice might divert when viewed from the executive's versus the market's perspective or in other words, outsourcing governance in the banking industry is much more a matter of coping with uncertainty than a process of truly aligning contracts in an optimal way.
{"title":"Modes of Governance in Business Process Outsourcing: Executive versus Market's Perspective","authors":"Andreas Mattig","doi":"10.1109/HICSS.2008.321","DOIUrl":"https://doi.org/10.1109/HICSS.2008.321","url":null,"abstract":"Outsourcing success - its all in governance reported Lauren Bielski in the ABA banking journal 2006 and consequently, governance represents the key concept when discussing outsourcing in practice. However, when analyzing the business process outsourcing practice of Swiss retail banks, governance aspects seem so far only to play a minor role in the evaluation of outsourcing decisions. This article deals with outsourcing in Swiss retail banking and raises the question whether the mode of governance does matter from the capital markets' point of view, and what modes of governance might be valued most. Our findings provide evidence that governance concepts applied in practice might divert when viewed from the executive's versus the market's perspective or in other words, outsourcing governance in the banking industry is much more a matter of coping with uncertainty than a process of truly aligning contracts in an optimal way.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131161663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we examine the adequacy of IS security standards to the needs of SMEs. Using the findings of literature review, we identify general criticism for the security standards. Further, we benchmark the recently published ISO 27001 IS security standard to ISO 9000 standard - a similar standard with a 20 years history - to develop expectations of how the future adoption of the recently introduced ISO 27001 standard can be fostered. We suggest, among other, that the legislative environment can play a crucial role for further growth of security standards adoption.
{"title":"Exploring the Suitability of IS Security Management Standards for SMEs","authors":"Yves Barlette, V. Fomin","doi":"10.1109/HICSS.2008.167","DOIUrl":"https://doi.org/10.1109/HICSS.2008.167","url":null,"abstract":"In this paper we examine the adequacy of IS security standards to the needs of SMEs. Using the findings of literature review, we identify general criticism for the security standards. Further, we benchmark the recently published ISO 27001 IS security standard to ISO 9000 standard - a similar standard with a 20 years history - to develop expectations of how the future adoption of the recently introduced ISO 27001 standard can be fostered. We suggest, among other, that the legislative environment can play a crucial role for further growth of security standards adoption.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115306161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E-commerce has become an important part of business. In South Korea, the market size of online shopping malls was 13,460 billion Korean Won in 2006, and this figure keeps growing. Thus, gaining loyal customers has become a rising concern. In this study, we adopted Lewicki and Bunker's three different types of trust, namely, calculus-based trust, knowledge-based trust, and identification-based trust, in order to investigate their hierarchical relationships in e-commerce and their impacts on customer satisfaction and loyalty. A total of 104 responses from university students were analyzed to test the proposed model and its hypotheses using PLS. The results showed that hierarchical relationships between different types of trust exist in the online environment, and among them, knowledge-based trust has the strongest impact on customer satisfaction. This finding implied that practitioners should focus on developing an appropriate online strategy in terms of how to build up trust-based relationships with online customers.
{"title":"Trust in Online Shopping: The Korean Student Experience","authors":"Ji-Seok Yoo, Jae-Nam Lee, Julian Hoffmann","doi":"10.1109/HICSS.2008.475","DOIUrl":"https://doi.org/10.1109/HICSS.2008.475","url":null,"abstract":"E-commerce has become an important part of business. In South Korea, the market size of online shopping malls was 13,460 billion Korean Won in 2006, and this figure keeps growing. Thus, gaining loyal customers has become a rising concern. In this study, we adopted Lewicki and Bunker's three different types of trust, namely, calculus-based trust, knowledge-based trust, and identification-based trust, in order to investigate their hierarchical relationships in e-commerce and their impacts on customer satisfaction and loyalty. A total of 104 responses from university students were analyzed to test the proposed model and its hypotheses using PLS. The results showed that hierarchical relationships between different types of trust exist in the online environment, and among them, knowledge-based trust has the strongest impact on customer satisfaction. This finding implied that practitioners should focus on developing an appropriate online strategy in terms of how to build up trust-based relationships with online customers.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123127245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper investigates the correlation between features of three types (visual, stylistic and topical types) and genre classes. The majority of previous studies in automated genre classification have created models based on an amalgamated representation of a document using a combination of features. In these models, the inseparable roles of different features make it difficult to determine a means of improving the classifier when it exhibits poor performance in detecting selected genres. In this paper we use classifiers independently modeled on three groups of features to examine six genre classes to show that the strongest features for making one classification is not necessarily the best features for carrying out another classification.
{"title":"Examining Variations of Prominent Features in Genre Classification","authors":"Yunhyong Kim, S. Ross","doi":"10.1109/HICSS.2008.157","DOIUrl":"https://doi.org/10.1109/HICSS.2008.157","url":null,"abstract":"This paper investigates the correlation between features of three types (visual, stylistic and topical types) and genre classes. The majority of previous studies in automated genre classification have created models based on an amalgamated representation of a document using a combination of features. In these models, the inseparable roles of different features make it difficult to determine a means of improving the classifier when it exhibits poor performance in detecting selected genres. In this paper we use classifiers independently modeled on three groups of features to examine six genre classes to show that the strongest features for making one classification is not necessarily the best features for carrying out another classification.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"606 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116922005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the past, field operations have mostly been a stepchild of information and communication technology (ICT) enabled organizational overhaul and process re-design. Recently, increased technological (mobile wirelessly connected) capability, economic necessity, and new external factors (such as the higher frequency of large-scale emergencies, for example, of the magnitude of hurricanes Katrina and Rita in the US) have raised interest in and commitment to on-site information management and to a drastically improved in-situ decision making capacity of field operations. Field force automation (FFA) techniques and process changes have been introduced in field operations of organizations in both the private and public sectors. This study seeks to establish a baseline of current FFA practices in both sectors. Among other areas, we explore, what the work-related and organizational specifics of field operations are, also with respect to ICTs, how process completion and efficiency are measured, and how effective FFA is with regard to information management. FFA, it appears is still in its infancy, and the full extent of potential efficiency and productivity gains might need more time to emerge.
{"title":"Current Practices in Field Force Automation: Decision Support and Information Management for the Field Force","authors":"Gwen Trentham, H. Scholl","doi":"10.1109/HICSS.2008.110","DOIUrl":"https://doi.org/10.1109/HICSS.2008.110","url":null,"abstract":"In the past, field operations have mostly been a stepchild of information and communication technology (ICT) enabled organizational overhaul and process re-design. Recently, increased technological (mobile wirelessly connected) capability, economic necessity, and new external factors (such as the higher frequency of large-scale emergencies, for example, of the magnitude of hurricanes Katrina and Rita in the US) have raised interest in and commitment to on-site information management and to a drastically improved in-situ decision making capacity of field operations. Field force automation (FFA) techniques and process changes have been introduced in field operations of organizations in both the private and public sectors. This study seeks to establish a baseline of current FFA practices in both sectors. Among other areas, we explore, what the work-related and organizational specifics of field operations are, also with respect to ICTs, how process completion and efficiency are measured, and how effective FFA is with regard to information management. FFA, it appears is still in its infancy, and the full extent of potential efficiency and productivity gains might need more time to emerge.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126187654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The aim of this paper is twofold: to provide a theoretical model to analyze obstacles, challenges, and incentives which lead a nonprofessional user to design websites and produce information that are accessible to people with disabilities, and to develop a reliable and validated instrument designed to measure the construct that are part of this model.
{"title":"Factors Influencing Users' Intentions to Make the Web Accessible to People with Disabilities","authors":"Karine Nahon, I. Benbasat, Nancy Lou","doi":"10.1109/HICSS.2008.168","DOIUrl":"https://doi.org/10.1109/HICSS.2008.168","url":null,"abstract":"The aim of this paper is twofold: to provide a theoretical model to analyze obstacles, challenges, and incentives which lead a nonprofessional user to design websites and produce information that are accessible to people with disabilities, and to develop a reliable and validated instrument designed to measure the construct that are part of this model.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123251407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Architecting security solutions for today's diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databases, e-commerce, and more. Each of these has its own threat profile and associated business risk. The complexity of the computing environment extends to the design of security solutions. Current methodologies for designing security systems include piecemeal designs and patchwork systems comprised of multiple point solutions. As the complexity of the business driven systems increase, these methods are being strained to keep up with security requirements. Systems science provides information on how complex systems interact with their environment, and this guidance can be applied to designing security architectures. Analysis and design of security systems using systems theory provides a new path to reduce the complexity.
{"title":"Systems Theory Model for Information Security","authors":"W. A. Conklin, G. Dietrich","doi":"10.1109/HICSS.2008.421","DOIUrl":"https://doi.org/10.1109/HICSS.2008.421","url":null,"abstract":"Architecting security solutions for today's diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databases, e-commerce, and more. Each of these has its own threat profile and associated business risk. The complexity of the computing environment extends to the design of security solutions. Current methodologies for designing security systems include piecemeal designs and patchwork systems comprised of multiple point solutions. As the complexity of the business driven systems increase, these methods are being strained to keep up with security requirements. Systems science provides information on how complex systems interact with their environment, and this guidance can be applied to designing security architectures. Analysis and design of security systems using systems theory provides a new path to reduce the complexity.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123417340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chi-Hoon Lee, Jung‐Hoon Lee, Jong-Sung Park, Kap-Young Jeong
In recent years, the emergence of the term IT Governance (ITG) has pointed to the increasing importance for business of effecting an alignment between its strategic direction and IT units. Many leading organizations have turned to ITG to pursue gains in efficiency, accountability, and regulatory and other forms of compliance, without, however, being able to implement coherent IT schemes on account of a number of challenging issues. Despite the growing interest of academics and practitioners in this area (as attested in recent publications), few studies have characterized the practical inhibitors frustrating the implementation of effective ITG. This paper, therefore, aims to examine empirically how inhibiting features associated with ITG affect the success of IT activities. Through a literature review, we identify 5 factors that work to restrain ITG implementation. Further, this work presents survey data gathered from 96 leading companies in Korea reporting the status of ITG practices according to a specific instrument of its own design.
{"title":"A Study of the Causal Relationship between IT Governance Inhibitors and Its Success in Korea Enterprises","authors":"Chi-Hoon Lee, Jung‐Hoon Lee, Jong-Sung Park, Kap-Young Jeong","doi":"10.1109/HICSS.2008.38","DOIUrl":"https://doi.org/10.1109/HICSS.2008.38","url":null,"abstract":"In recent years, the emergence of the term IT Governance (ITG) has pointed to the increasing importance for business of effecting an alignment between its strategic direction and IT units. Many leading organizations have turned to ITG to pursue gains in efficiency, accountability, and regulatory and other forms of compliance, without, however, being able to implement coherent IT schemes on account of a number of challenging issues. Despite the growing interest of academics and practitioners in this area (as attested in recent publications), few studies have characterized the practical inhibitors frustrating the implementation of effective ITG. This paper, therefore, aims to examine empirically how inhibiting features associated with ITG affect the success of IT activities. Through a literature review, we identify 5 factors that work to restrain ITG implementation. Further, this work presents survey data gathered from 96 leading companies in Korea reporting the status of ITG practices according to a specific instrument of its own design.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115176319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}