首页 > 最新文献

Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)最新文献

英文 中文
A Framework for the Co-design of Business and IT Systems 业务和IT系统协同设计的框架
Susan Gasson
This study deals with the intersection of knowledge and action: how knowledge is developed, transformed, interpreted and used to change systems of business process and IT so that stakeholders may make effective decisions and take effective action in their work. The co-design of business and IT systems is a process within which business systems of human activity and IT systems of information processing are mutually constituted. It requires the negotiation of competing technological frames across multiple knowledge domains. Three major challenges hinder effective innovation: (i) a mismatch between goal-driven IS design methods and the need for cross-functional knowledge-sharing, (ii) the distributed and partial knowledge possessed by stakeholders from diverse groups; (iii) the need to maintain interpretive flexibility across cycles of discovery and analysis. This paper develops an analytical framework for integrating knowledge frames across stakeholder groups, to provide a common language for the co- design of business and IT systems.
本研究涉及知识和行动的交叉点:如何开发、转换、解释和使用知识来改变业务流程和IT系统,以便利益相关者可以在他们的工作中做出有效的决策并采取有效的行动。业务和IT系统的协同设计是一个过程,在这个过程中,人类活动的业务系统和信息处理的IT系统相互构成。它需要跨多个知识领域的竞争技术框架的协商。阻碍有效创新的三大挑战:(i)目标驱动的信息系统设计方法与跨职能知识共享需求之间的不匹配;(ii)来自不同群体的利益相关者所拥有的分布式和局部知识;需要在发现和分析的各个周期中保持解释的灵活性。本文开发了一个分析框架,用于集成跨利益相关者群体的知识框架,为业务和IT系统的协同设计提供一种通用语言。
{"title":"A Framework for the Co-design of Business and IT Systems","authors":"Susan Gasson","doi":"10.1109/HICSS.2008.20","DOIUrl":"https://doi.org/10.1109/HICSS.2008.20","url":null,"abstract":"This study deals with the intersection of knowledge and action: how knowledge is developed, transformed, interpreted and used to change systems of business process and IT so that stakeholders may make effective decisions and take effective action in their work. The co-design of business and IT systems is a process within which business systems of human activity and IT systems of information processing are mutually constituted. It requires the negotiation of competing technological frames across multiple knowledge domains. Three major challenges hinder effective innovation: (i) a mismatch between goal-driven IS design methods and the need for cross-functional knowledge-sharing, (ii) the distributed and partial knowledge possessed by stakeholders from diverse groups; (iii) the need to maintain interpretive flexibility across cycles of discovery and analysis. This paper develops an analytical framework for integrating knowledge frames across stakeholder groups, to provide a common language for the co- design of business and IT systems.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121145678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
What Happened to Cross-Cultural Dyadic E-Negotiation? 跨文化双向电子谈判发生了什么?
Hsiangchu Lai, Wan-Jung Lin, Juin-Yi Lin
Ever since the boom in global e-business, and the resulting intensification of competition, cross-cultural e-negotiation has increased in popularity. Understanding how national cultures affect negotiation behaviour is becoming more and more critical for businesses. This research will explore how a negotiator's cultural background impacts its behaviour. There are four major findings: firstly, that Eastern and Western businesses have unique negotiation behaviours; secondly, that the negotiation behaviours of both Eastern and Western negotiators are impacted by their counterparts' cultural background; thirdly, that when Easterners negotiate with Westerners, there were more instances of task behaviour and persuasive behaviour, but fewer instances of procedural behaviour and private communication; and finally, that when Westerner negotiates with Easterner, there are more instances of task behaviour but fewer of private communication. In spite of the similarities, however, Western negotiators have more consistent negotiation behaviour than do their Eastern equivalents, regardless of cultural differences between the dyadic negotiators. The following research uses the content analysis method, which is more thorough than the questionnaire in terms of qualitative criteria. The total set of thought units can be analyzed from further viewpoints in the future.
自从全球电子商务蓬勃发展,竞争加剧以来,跨文化电子商务谈判越来越受欢迎。了解民族文化如何影响谈判行为对企业来说变得越来越重要。本研究将探讨谈判者的文化背景如何影响其行为。主要有四个发现:第一,东西方企业有不同的谈判行为;第二,东西方谈判者的谈判行为都受到对方文化背景的影响;东方人与西方人谈判时,任务行为和说服行为较多,程序行为和私下沟通较少;最后,当西方人和东方人谈判时,有更多的任务行为,但更少的私人交流。然而,尽管有相似之处,西方谈判者的谈判行为比他们的东方同行更一致,而不考虑二元谈判者之间的文化差异。接下来的研究采用了内容分析法,在定性标准上比问卷调查更彻底。整个思想单元集可以在将来从进一步的角度进行分析。
{"title":"What Happened to Cross-Cultural Dyadic E-Negotiation?","authors":"Hsiangchu Lai, Wan-Jung Lin, Juin-Yi Lin","doi":"10.1109/HICSS.2008.499","DOIUrl":"https://doi.org/10.1109/HICSS.2008.499","url":null,"abstract":"Ever since the boom in global e-business, and the resulting intensification of competition, cross-cultural e-negotiation has increased in popularity. Understanding how national cultures affect negotiation behaviour is becoming more and more critical for businesses. This research will explore how a negotiator's cultural background impacts its behaviour. There are four major findings: firstly, that Eastern and Western businesses have unique negotiation behaviours; secondly, that the negotiation behaviours of both Eastern and Western negotiators are impacted by their counterparts' cultural background; thirdly, that when Easterners negotiate with Westerners, there were more instances of task behaviour and persuasive behaviour, but fewer instances of procedural behaviour and private communication; and finally, that when Westerner negotiates with Easterner, there are more instances of task behaviour but fewer of private communication. In spite of the similarities, however, Western negotiators have more consistent negotiation behaviour than do their Eastern equivalents, regardless of cultural differences between the dyadic negotiators. The following research uses the content analysis method, which is more thorough than the questionnaire in terms of qualitative criteria. The total set of thought units can be analyzed from further viewpoints in the future.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121463273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Dyadic Model of Interorganizational Systems (IOS) Adoption Maturity 组织间系统采用成熟度的二元模型
Mazen Ali, S. Kurnia, R. Johnston
Interorganizational systems (IOS) adoption requires cooperation and collaboration between trading partners and, therefore, is reliant on the nature of their relationships. There has been some research that investigates relationships and how organizations progress from one level to the next level of adoption. However, these studies do not adequately justify the exclusion of other variables and are not theoretically based. This research extends the Kurnia and Johnston (2000) process model of IOS adoption by incorporating the notion of IOS adoption maturity and also modifies it from a supply chain to a dyadic level so better evaluations of progression can be performed. With this model, the dynamics of IOS adoption maturity can be better examined empirically.
组织间系统(IOS)的采用需要贸易伙伴之间的合作和协作,因此依赖于其关系的性质。已经有一些研究调查了关系以及组织如何从一个采用级别发展到下一个采用级别。然而,这些研究并不能充分证明排除其他变量是合理的,也不是基于理论的。本研究通过纳入IOS采用成熟度的概念,扩展了Kurnia和Johnston(2000)的IOS采用过程模型,并将其从供应链修改为二元水平,以便更好地评估进展。有了这个模型,IOS采用成熟度的动态就可以得到更好的实证检验。
{"title":"A Dyadic Model of Interorganizational Systems (IOS) Adoption Maturity","authors":"Mazen Ali, S. Kurnia, R. Johnston","doi":"10.1109/HICSS.2008.18","DOIUrl":"https://doi.org/10.1109/HICSS.2008.18","url":null,"abstract":"Interorganizational systems (IOS) adoption requires cooperation and collaboration between trading partners and, therefore, is reliant on the nature of their relationships. There has been some research that investigates relationships and how organizations progress from one level to the next level of adoption. However, these studies do not adequately justify the exclusion of other variables and are not theoretically based. This research extends the Kurnia and Johnston (2000) process model of IOS adoption by incorporating the notion of IOS adoption maturity and also modifies it from a supply chain to a dyadic level so better evaluations of progression can be performed. With this model, the dynamics of IOS adoption maturity can be better examined empirically.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127525099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Electricity Load and Carbon Dioxide Emissions: Effects of a Carbon Price in the Short Term 电力负荷与二氧化碳排放:短期内碳价的影响
Adam Newcomer, S. Blumsack, J. Apt, L. Lave, M. G. Morgan
Stabilizing atmospheric carbon dioxide levels at acceptable levels will require a dramatic de-carbonization of the electric generation sector in the U.S. One increasingly discussed way to meet this policy goal is to put an explicit price on carbon emissions, either through a tax or a trading scheme. Increasing demand response has also been discussed as a way to reduce carbon emissions in the U.S. electricity industry. We examine the short-run effectiveness of a policy combining demand response with a carbon tax. Using plant-level operational data, we construct short-run cost curves for three U.S. regional electric systems, and examine the impacts on prices and carbon emissions. In the short run, a carbon tax in the range of $30 - $40 and a price elasticity of demand in the range of -0.1 to -0.2 could reduce carbon emissions in coal-intensive regions by 10% to 25%. With this same set of carbon prices, achieving a 50% reduction in emissions would require a price elasticity of demand in the range of -0.25 to -0.4. Percentage reductions of this magnitude in less carbon-intensive systems are unlikely, even with highly elastic demand and high carbon prices.
将大气中的二氧化碳水平稳定在可接受的水平上,需要美国发电部门大幅去碳化。实现这一政策目标的一种日益被讨论的方法是通过税收或交易计划为碳排放设定明确的价格。增加需求响应也被作为减少美国电力行业碳排放的一种方式进行了讨论。我们考察了将需求响应与碳税相结合的政策的短期有效性。使用工厂级运行数据,我们构建了美国三个区域电力系统的短期成本曲线,并检查了对价格和碳排放的影响。在短期内,碳税在30 - 40美元之间,需求的价格弹性在-0.1 -0.2之间,可以使煤炭密集地区的碳排放量减少10% - 25%。在同样的碳价格下,实现50%的减排需要需求的价格弹性在-0.25到-0.4之间。即使在高弹性需求和高碳价格的情况下,在碳密集度较低的系统中也不太可能实现如此幅度的百分比减少。
{"title":"Electricity Load and Carbon Dioxide Emissions: Effects of a Carbon Price in the Short Term","authors":"Adam Newcomer, S. Blumsack, J. Apt, L. Lave, M. G. Morgan","doi":"10.1109/HICSS.2008.139","DOIUrl":"https://doi.org/10.1109/HICSS.2008.139","url":null,"abstract":"Stabilizing atmospheric carbon dioxide levels at acceptable levels will require a dramatic de-carbonization of the electric generation sector in the U.S. One increasingly discussed way to meet this policy goal is to put an explicit price on carbon emissions, either through a tax or a trading scheme. Increasing demand response has also been discussed as a way to reduce carbon emissions in the U.S. electricity industry. We examine the short-run effectiveness of a policy combining demand response with a carbon tax. Using plant-level operational data, we construct short-run cost curves for three U.S. regional electric systems, and examine the impacts on prices and carbon emissions. In the short run, a carbon tax in the range of $30 - $40 and a price elasticity of demand in the range of -0.1 to -0.2 could reduce carbon emissions in coal-intensive regions by 10% to 25%. With this same set of carbon prices, achieving a 50% reduction in emissions would require a price elasticity of demand in the range of -0.25 to -0.4. Percentage reductions of this magnitude in less carbon-intensive systems are unlikely, even with highly elastic demand and high carbon prices.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129204961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Are Mobile Payment and Banking the Killer Apps for Mobile Commerce? 移动支付和银行是移动商务的杀手级应用吗?
Xianpei Hu, Wenli Li, Qing Hu
Mobile commerce had been expected to become a major force of e-commerce in the 21st century. However, the rhetoric has far exceeded the reality so far. While academics and practitioners have presented many views about the lack of rapid growth of mobile commerce, we submit that the anticipated mobile commerce take-off hinges on the emergence of a few killer apps. After reviewing the recent history of technologies that have dramatically changed our way of life and work, we propose a set of criteria for identifying and evaluating killer apps. From this vantage point, we argue that mobile payment and banking are the most likely candidates for the killer apps that could bring the expectation of a world of ubiquitous mobile commerce to fruition. Challenges and opportunities associated with this argument are discussed.
移动商务有望成为21世纪电子商务的主要力量。然而,到目前为止,言论远远超过了现实。虽然学者和实践者对移动商务缺乏快速增长提出了许多观点,但我们认为,预期的移动商务起飞取决于一些杀手级应用程序的出现。在回顾了近来那些极大地改变了我们生活和工作方式的技术的历史之后,我们提出了一套识别和评估杀手级应用程序的标准。从这个角度来看,我们认为移动支付和银行是最有可能成为杀手级应用程序的候选人,它们可以实现对无处不在的移动商务世界的期望。讨论了与此相关的挑战和机遇。
{"title":"Are Mobile Payment and Banking the Killer Apps for Mobile Commerce?","authors":"Xianpei Hu, Wenli Li, Qing Hu","doi":"10.1109/HICSS.2008.69","DOIUrl":"https://doi.org/10.1109/HICSS.2008.69","url":null,"abstract":"Mobile commerce had been expected to become a major force of e-commerce in the 21st century. However, the rhetoric has far exceeded the reality so far. While academics and practitioners have presented many views about the lack of rapid growth of mobile commerce, we submit that the anticipated mobile commerce take-off hinges on the emergence of a few killer apps. After reviewing the recent history of technologies that have dramatically changed our way of life and work, we propose a set of criteria for identifying and evaluating killer apps. From this vantage point, we argue that mobile payment and banking are the most likely candidates for the killer apps that could bring the expectation of a world of ubiquitous mobile commerce to fruition. Challenges and opportunities associated with this argument are discussed.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130513317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Using FPGAs to Parallelize Dictionary Attacks for Password Cracking 利用fpga并行字典攻击破解密码
Yoginder S. Dandass
Operating systems and data protection tools are employing sophisticated password derived encryption key techniques in order to encrypt data. Such techniques impose a significant computational burden on forensic tools that attempt dictionary attacks are requiring cryptographic hash generation functions to be called several thousand times for each password attempted. In order to improve throughput, forensic analysis tools are designed to operate in a distributed manner over a dedicated network of workstations. This paper describes an FPGA-based hardware implementation of the standard CPSK#5 technique published by RSA Laboratories for generating password-derived encryption keys. This is the most computationally demanding step required when performing a dictionary attack on modern password-protected systems. The initial FPGA implementation incorporates four password-derived encryption key generation units operating at a frequency of 150 MHz and is capable of processing over 510 passwords per second. The implementation's performance can be easily improved by incorporating additional key generation units.
操作系统和数据保护工具正在采用复杂的密码衍生加密密钥技术来加密数据。这些技术给试图进行字典攻击的取证工具带来了巨大的计算负担,因为字典攻击需要为每个尝试的密码调用数千次加密散列生成函数。为了提高吞吐量,法医分析工具被设计成在专用工作站网络上以分布式方式运行。本文描述了RSA实验室发布的用于生成密码衍生加密密钥的标准cpsk# 5技术的基于fpga的硬件实现。当对现代密码保护系统执行字典攻击时,这是计算要求最高的步骤。最初的FPGA实现包含四个密码衍生加密密钥生成单元,工作频率为150 MHz,每秒能够处理超过510个密码。通过合并额外的密钥生成单元,可以很容易地提高实现的性能。
{"title":"Using FPGAs to Parallelize Dictionary Attacks for Password Cracking","authors":"Yoginder S. Dandass","doi":"10.1109/HICSS.2008.484","DOIUrl":"https://doi.org/10.1109/HICSS.2008.484","url":null,"abstract":"Operating systems and data protection tools are employing sophisticated password derived encryption key techniques in order to encrypt data. Such techniques impose a significant computational burden on forensic tools that attempt dictionary attacks are requiring cryptographic hash generation functions to be called several thousand times for each password attempted. In order to improve throughput, forensic analysis tools are designed to operate in a distributed manner over a dedicated network of workstations. This paper describes an FPGA-based hardware implementation of the standard CPSK#5 technique published by RSA Laboratories for generating password-derived encryption keys. This is the most computationally demanding step required when performing a dictionary attack on modern password-protected systems. The initial FPGA implementation incorporates four password-derived encryption key generation units operating at a frequency of 150 MHz and is capable of processing over 510 passwords per second. The implementation's performance can be easily improved by incorporating additional key generation units.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116783071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package 将遗留系统转换为COTS包的简化用例驱动方法(SUCADA)
J. D. Montero, YongSeog Kim, Jeffrey J. Johnson
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting a selected package may prove disastrous and even more expensive than building the system in house and from scratch. Building a software solution based on a COTS package not only has its risks, but it is also different from a custom development effort, and it needs to follow a rigorous methodology for a successful implementation. Therefore, it is necessary to define how to solve some of the challenges that this type of project presents, and how to balance customer requirements with the features offered by the COTS package. To successfully and efficiently convert a legacy system into a new system based on COTS package, we developed and present a methodology that utilizes a general process flow chart, simplified use cases, and a mapping to the COTS package functionality. We also present the findings of a case study on the applicability and effectiveness of the proposed methodology for the conversion of a legacy laboratory information management system (LIMS).
将遗留系统转换为基于商用现货(COTS)包的系统需要专门的指导。假设仅仅是采用选定的软件包的问题,可能会被证明是灾难性的,甚至比在内部从头开始构建系统更昂贵。基于COTS包构建软件解决方案不仅有其风险,而且它也不同于定制开发工作,并且需要遵循严格的方法才能成功实现。因此,有必要定义如何解决这种类型的项目提出的一些挑战,以及如何平衡客户需求和COTS包提供的特性。为了成功有效地将遗留系统转换为基于COTS包的新系统,我们开发并提出了一种方法,该方法利用了一般的过程流程图、简化的用例以及到COTS包功能的映射。我们还提出了一个案例研究的结果,该研究是关于传统实验室信息管理系统(LIMS)转换的拟议方法的适用性和有效性。
{"title":"Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package","authors":"J. D. Montero, YongSeog Kim, Jeffrey J. Johnson","doi":"10.1109/HICSS.2008.393","DOIUrl":"https://doi.org/10.1109/HICSS.2008.393","url":null,"abstract":"The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting a selected package may prove disastrous and even more expensive than building the system in house and from scratch. Building a software solution based on a COTS package not only has its risks, but it is also different from a custom development effort, and it needs to follow a rigorous methodology for a successful implementation. Therefore, it is necessary to define how to solve some of the challenges that this type of project presents, and how to balance customer requirements with the features offered by the COTS package. To successfully and efficiently convert a legacy system into a new system based on COTS package, we developed and present a methodology that utilizes a general process flow chart, simplified use cases, and a mapping to the COTS package functionality. We also present the findings of a case study on the applicability and effectiveness of the proposed methodology for the conversion of a legacy laboratory information management system (LIMS).","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131193986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Exploration of the Hygiene and Motivator Aspects of WebQual Constructs in Predicting Website Reuse WebQual结构在预测网站重用中的卫生和激励方面的探索
Ben Q. Liu, D. Goodhue
Most existing studies of Web site characteristics and their impact on intentions have assumed a linear relationship between them. However, motivational theories suggest that while some characteristics have linear effects, others will act as either hygiene factors or motivator factors and have non-linear effects. Drawing on motivational theory and WebQual constructs, this study looks at different methods of testing for hygiene and motivator factors and proposes a different technique that could clarify misleading results. Linear regression, quadratic regression, and piecewise regression are used in the study. The results show the hygiene effect of trust and suggest that piecewise linear regression may be superior to quadratic regression in this context.
大多数关于网站特征及其对意图的影响的现有研究都假设它们之间存在线性关系。然而,动机理论认为,虽然一些特征具有线性效应,但其他特征将作为保健因素或激励因素,并具有非线性效应。利用动机理论和WebQual结构,本研究着眼于卫生和激励因素的不同测试方法,并提出了一种不同的技术,可以澄清误导的结果。研究中使用了线性回归、二次回归和分段回归。结果显示信任的卫生效应,并表明分段线性回归可能优于二次回归。
{"title":"An Exploration of the Hygiene and Motivator Aspects of WebQual Constructs in Predicting Website Reuse","authors":"Ben Q. Liu, D. Goodhue","doi":"10.1109/HICSS.2008.54","DOIUrl":"https://doi.org/10.1109/HICSS.2008.54","url":null,"abstract":"Most existing studies of Web site characteristics and their impact on intentions have assumed a linear relationship between them. However, motivational theories suggest that while some characteristics have linear effects, others will act as either hygiene factors or motivator factors and have non-linear effects. Drawing on motivational theory and WebQual constructs, this study looks at different methods of testing for hygiene and motivator factors and proposes a different technique that could clarify misleading results. Linear regression, quadratic regression, and piecewise regression are used in the study. The results show the hygiene effect of trust and suggest that piecewise linear regression may be superior to quadratic regression in this context.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131398624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Formal Boundary Spanning and Informal Boundary Spanning in Cross-Border Knowledge Sharing: A Case Study 跨界知识共享中的正式边界跨越与非正式边界跨越:个案研究
Yongsuk Kim, S. Jarvenpaa
The paper expands theoretical and empirical understanding of the interaction between formal boundary spanning mechanism (i.e. individuals formally nominated to span boundaries for knowledge sharing) and informal boundary spanning mechanism (i.e., informal seeking of information via social ties crossing boundaries) in a far-flung operation of a global company. Through a case study of engineering groups at a U.S. based manufacturing plant, we found that both formal and informal boundary spanning mechanisms had a positive effect on the ability of dispersed groups to identify and transfer remotely situated knowledge from other sites. However, we also found that the formal boundary spanning mechanism may have a suppressing effect on the informal boundary spanning mechanism when jointly pursued in certain circumstances. The findings call into question the implicit view of the boundary spanner and virtual team literatures that has largely portrayed the effects of both mechanisms on cross-boundary knowledge transfer as independent or complementary.
本文从理论和实证两方面拓展了对跨国公司远程运营中正式边界跨越机制(即被正式提名跨越边界进行知识共享的个人)和非正式边界跨越机制(即通过跨越边界的社会关系非正式地寻求信息)之间相互作用的理解。通过对美国一家制造工厂的工程团队的案例研究,我们发现正式和非正式的边界跨越机制对分散的团队识别和从其他地点转移远程知识的能力都有积极的影响。然而,我们也发现,在某些情况下,当共同追求时,正式边界跨越机制可能对非正式边界跨越机制有抑制作用。研究结果对边界扳手和虚拟团队文献的隐含观点提出了质疑,这些文献在很大程度上将这两种机制对跨界知识转移的影响描述为独立或互补。
{"title":"Formal Boundary Spanning and Informal Boundary Spanning in Cross-Border Knowledge Sharing: A Case Study","authors":"Yongsuk Kim, S. Jarvenpaa","doi":"10.1109/HICSS.2008.172","DOIUrl":"https://doi.org/10.1109/HICSS.2008.172","url":null,"abstract":"The paper expands theoretical and empirical understanding of the interaction between formal boundary spanning mechanism (i.e. individuals formally nominated to span boundaries for knowledge sharing) and informal boundary spanning mechanism (i.e., informal seeking of information via social ties crossing boundaries) in a far-flung operation of a global company. Through a case study of engineering groups at a U.S. based manufacturing plant, we found that both formal and informal boundary spanning mechanisms had a positive effect on the ability of dispersed groups to identify and transfer remotely situated knowledge from other sites. However, we also found that the formal boundary spanning mechanism may have a suppressing effect on the informal boundary spanning mechanism when jointly pursued in certain circumstances. The findings call into question the implicit view of the boundary spanner and virtual team literatures that has largely portrayed the effects of both mechanisms on cross-boundary knowledge transfer as independent or complementary.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132706821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Can Peer-to-Peer Networks Facilitate Information Sharing in Collaborative Learning? 点对点网络能促进协作学习中的信息共享吗?
Fu-Ren Lin, Sheng-cheng Lin, Ying-fen Wang
Many peer-to-peer (P2P) networks have been widely used for file sharing. A peer acts both as a content provider and a consumer, and is granted autonomy to decide what content, with whom, and when to share. Is a P2P network an ideal vehicle for information sharing in collaborative learning? This study adopts the theory of planned behavior as a basis to study the sharing behaviors on a P2P network. Due to the lack of empirical data, we built a P2P network platform to conduct an experiment in a collaborative learning setting. Through the analysis we found the intention of sharing is only positively related with subjective norm. Based on this result, we assert that subjective norm, especially the discipline from the instructor, plays a critical role in motivating students to share knowledge on a P2P network for collaborative learning. From this empirical study, a hybrid architecture combining P2P networks with servers could be more favorable for collaborative learning.
许多点对点(P2P)网络已被广泛用于文件共享。对等体既充当内容提供者,又充当消费者,并被授予自主权,以决定与谁共享什么内容以及何时共享。P2P网络是协作学习中信息共享的理想载体吗?本研究以计划行为理论为基础,研究P2P网络中的共享行为。由于缺乏经验数据,我们搭建了一个P2P网络平台,在协作学习环境下进行实验。通过分析发现,分享意愿与主观规范之间仅存在正相关关系。基于这一结果,我们断言主观规范,特别是教师的纪律,在激励学生在P2P网络上分享知识进行协作学习方面起着至关重要的作用。从本实证研究来看,将P2P网络与服务器相结合的混合架构更有利于协同学习。
{"title":"Can Peer-to-Peer Networks Facilitate Information Sharing in Collaborative Learning?","authors":"Fu-Ren Lin, Sheng-cheng Lin, Ying-fen Wang","doi":"10.1109/HICSS.2008.87","DOIUrl":"https://doi.org/10.1109/HICSS.2008.87","url":null,"abstract":"Many peer-to-peer (P2P) networks have been widely used for file sharing. A peer acts both as a content provider and a consumer, and is granted autonomy to decide what content, with whom, and when to share. Is a P2P network an ideal vehicle for information sharing in collaborative learning? This study adopts the theory of planned behavior as a basis to study the sharing behaviors on a P2P network. Due to the lack of empirical data, we built a P2P network platform to conduct an experiment in a collaborative learning setting. Through the analysis we found the intention of sharing is only positively related with subjective norm. Based on this result, we assert that subjective norm, especially the discipline from the instructor, plays a critical role in motivating students to share knowledge on a P2P network for collaborative learning. From this empirical study, a hybrid architecture combining P2P networks with servers could be more favorable for collaborative learning.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1