首页 > 最新文献

Pacific Asia Journal of the Association for Information Systems最新文献

英文 中文
On-Cloud Motherhood Clinic: A Healthcare Management Solution for Rural Communities in Developing Countries 云上母亲诊所:发展中国家农村社区的医疗保健管理解决方案
IF 1.8 Q2 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-03-31 DOI: 10.17705/1pais.12103
Nilufa Khanom, S. Miah
Background: Modern telecommunication infrastructure enables bridging of the digital divide between rural and urban healthcare services, promoting the provision of suitable medical care and support. Thus far, there has been some positive impacts to applying mobile health (m-Health) solutions, but their full potential in relation to cloud computing has is yet to be realised. It is imperative to develop an innovative approach for addressing the digital divide in a context of developing country. Method: Adopting a design science research approach (DSR), this study describes an innovative m-Health solution utilising cloud computing that enables healthcare professionals and women in rural areas to achieve comprehensive maternal healthcare support. We developed the solution framework through iterative prototyping with stakeholders’ participation, and evaluated the design using focus groups. Results: The cloud-based solution was positively evaluated as supporting healthcare professionals and service providers. It was perceived to help provide a virtual presence for evaluating and diagnosing expectant mothers’ critical healthcare data, medical history, and in providing necessary service support in a virtual clinic environment. Conclusions: The new application offers benefits to target stakeholders enabling a new practice-based paradigm applicable in other healthcare management. We demonstrated utilities to address target problems as well as the mechanism propositions for meeting the information exchange demand for better realisation of practical needs of the end users.
背景:现代电信基础设施能够弥合农村和城市保健服务之间的数字鸿沟,促进提供适当的医疗保健和支助。迄今为止,应用移动保健(移动保健)解决方案产生了一些积极影响,但它们与云计算相关的全部潜力尚未实现。必须在发展中国家的背景下制定解决数字鸿沟的创新方法。方法:本研究采用设计科学研究方法(DSR),描述了一种利用云计算的创新移动健康解决方案,使医疗保健专业人员和农村地区的妇女能够实现全面的孕产妇保健支持。我们在利益相关者的参与下通过迭代原型开发解决方案框架,并使用焦点小组评估设计。结果:基于云的解决方案被积极评价为支持医疗保健专业人员和服务提供商。它被认为有助于提供一个虚拟的存在,以评估和诊断孕妇的关键医疗保健数据、病史,并在虚拟诊所环境中提供必要的服务支持。结论:新的应用程序为目标利益相关者提供了好处,使新的基于实践的范例适用于其他医疗保健管理。我们展示了解决目标问题的实用程序,以及满足信息交换需求的机制主张,以更好地实现最终用户的实际需求。
{"title":"On-Cloud Motherhood Clinic: A Healthcare Management Solution for Rural Communities in Developing Countries","authors":"Nilufa Khanom, S. Miah","doi":"10.17705/1pais.12103","DOIUrl":"https://doi.org/10.17705/1pais.12103","url":null,"abstract":"Background: Modern telecommunication infrastructure enables bridging of the digital divide between rural and urban healthcare services, promoting the provision of suitable medical care and support. Thus far, there has been some positive impacts to applying mobile health (m-Health) solutions, but their full potential in relation to cloud computing has is yet to be realised. It is imperative to develop an innovative approach for addressing the digital divide in a context of developing country. Method: Adopting a design science research approach (DSR), this study describes an innovative m-Health solution utilising cloud computing that enables healthcare professionals and women in rural areas to achieve comprehensive maternal healthcare support. We developed the solution framework through iterative prototyping with stakeholders’ participation, and evaluated the design using focus groups. Results: The cloud-based solution was positively evaluated as supporting healthcare professionals and service providers. It was perceived to help provide a virtual presence for evaluating and diagnosing expectant mothers’ critical healthcare data, medical history, and in providing necessary service support in a virtual clinic environment. Conclusions: The new application offers benefits to target stakeholders enabling a new practice-based paradigm applicable in other healthcare management. We demonstrated utilities to address target problems as well as the mechanism propositions for meeting the information exchange demand for better realisation of practical needs of the end users.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"10882 1","pages":"3"},"PeriodicalIF":1.8,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77716149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Online Customer Trust in the Context of the General Data Protection Regulation (GDPR) 《通用数据保护条例》(GDPR)背景下的在线客户信任
IF 1.8 Q2 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-03-31 DOI: 10.17705/1pais.12104
Jingjing Zhang, Farkhondeh Hassandoust, Jocelyn E. Williams
Background: A recent global survey found that almost half of Internet users who never buy online indicated lack of trust as the main reason. The General Data Protection Regulation (GDPR) is new legislation expected to provide the opportunity for organizations to improve their customer trust through personal data governance. Few studies explore online customer trust from the GDPR perspective. This study aims to fill this gap by drawing on the Technology Acceptance Model (TAM) and Self-Determination Theory (SDT), examining the antecedents of online customer trust from the GDPR perspective. The study also attempts to derive insights about the GDPR that may affect online customer trust, but which to date have little presence in frameworks of the antecedents of online trust. The main research questions are as follows. First, what are the impacts of perceived technology, perceived risks and perceived trustworthiness on online customer trust in the GDPR context? Second, what are the GDPR-specific factors that may affect online customer trust? Method: This positivist study used a survey strategy with a deductive approach to investigate the research questions. A questionnaire was designed for primary data collection as the basis for quantitative data analysis. Results: Data analysis confirmed that several GDPR-related trust antecedents – perceived security, perceived third-party assurance and perceived openness – are positively associated with online customer trust. This study offers new insights into the SDT adaptation that suggest the value of motivation theory for trust research in the GDPR context. This study also generates insights about the GDPR that may affect online customer trust. Conclusions: This study suggests that the GDPR plays a significant role in online customer trust by bringing about stronger rights and more transparency for online customers. Both the confirmation and insights are a contribution that can lead seemingly old-fashioned trust antecedents into a new application.
背景:最近的一项全球调查发现,几乎一半从未在网上购物的互联网用户表示缺乏信任是主要原因。通用数据保护条例(GDPR)是一项新的立法,旨在为组织提供机会,通过个人数据治理来提高客户信任。很少有研究从GDPR的角度探讨在线客户信任。本研究旨在通过借鉴技术接受模型(TAM)和自决理论(SDT)来填补这一空白,从GDPR的角度审视在线客户信任的前因。该研究还试图得出可能影响在线客户信任的GDPR的见解,但迄今为止,这些见解在在线信任的前提框架中几乎没有出现。主要研究问题如下:首先,在GDPR背景下,感知技术、感知风险和感知可信度对在线客户信任的影响是什么?其次,哪些特定于gdp的因素可能会影响在线客户的信任?方法:本实证研究采用调查法和演绎法对研究问题进行调查。设计问卷进行初步数据收集,作为定量数据分析的基础。结果:数据分析证实,几个与gdp相关的信任前因——感知安全、感知第三方保证和感知开放——与在线客户信任呈正相关。本研究为SDT适应提供了新的见解,表明动机理论对GDPR背景下信任研究的价值。这项研究还对可能影响在线客户信任的GDPR产生了见解。结论:本研究表明,GDPR通过为在线客户带来更强的权利和更大的透明度,在在线客户信任方面发挥了重要作用。确认和洞察都是一种贡献,可以将看似过时的信任先决条件引入新的应用程序。
{"title":"Online Customer Trust in the Context of the General Data Protection Regulation (GDPR)","authors":"Jingjing Zhang, Farkhondeh Hassandoust, Jocelyn E. Williams","doi":"10.17705/1pais.12104","DOIUrl":"https://doi.org/10.17705/1pais.12104","url":null,"abstract":"Background: A recent global survey found that almost half of Internet users who never buy online indicated lack of trust as the main reason. The General Data Protection Regulation (GDPR) is new legislation expected to provide the opportunity for organizations to improve their customer trust through personal data governance. Few studies explore online customer trust from the GDPR perspective. This study aims to fill this gap by drawing on the Technology Acceptance Model (TAM) and Self-Determination Theory (SDT), examining the antecedents of online customer trust from the GDPR perspective. The study also attempts to derive insights about the GDPR that may affect online customer trust, but which to date have little presence in frameworks of the antecedents of online trust. The main research questions are as follows. First, what are the impacts of perceived technology, perceived risks and perceived trustworthiness on online customer trust in the GDPR context? Second, what are the GDPR-specific factors that may affect online customer trust? Method: This positivist study used a survey strategy with a deductive approach to investigate the research questions. A questionnaire was designed for primary data collection as the basis for quantitative data analysis. Results: Data analysis confirmed that several GDPR-related trust antecedents – perceived security, perceived third-party assurance and perceived openness – are positively associated with online customer trust. This study offers new insights into the SDT adaptation that suggest the value of motivation theory for trust research in the GDPR context. This study also generates insights about the GDPR that may affect online customer trust. Conclusions: This study suggests that the GDPR plays a significant role in online customer trust by bringing about stronger rights and more transparency for online customers. Both the confirmation and insights are a contribution that can lead seemingly old-fashioned trust antecedents into a new application.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"31 1","pages":"4"},"PeriodicalIF":1.8,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78917540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
How Do You Perpetuate IT-Enabled Change When Top Management Participation and Involvement Diminish? 当高层管理人员的参与和参与减少时,您如何使it驱动的变革永久化?
IF 1.8 Q2 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2019-12-23 DOI: 10.17705/1pais.11402
C. Chua, A. Yeow, C. Soh
Background: Research has demonstrated that sustained top management participation and involvement are important for IT-enabled change. However, this is not always possible. How IT-enabled change can succeed when top management participation and involvement diminish is an unsolved, but important research question. Method: We perform a 5-year exploratory longitudinal case study. Results: Our data is presented in two parts. We first present the contextual elements (goals, people, structures/processes, and artifacts) during the two years top management was actively participating and involved. For the three-year period where top management participation and involvement diminished, we present the contextual elements, and middle management’s enactment of traditional middle management roles (information broker, mediator, facilitator, change agent) on three kinds of threats to the change (deviations from change vision, emergent issues, involving new stakeholders). Conclusions: We find IT-enabled change can succeed when top management participation and involvement diminish if middle management engages in joint action, i.e., intentional collective activity where members consciously choose to coordinate to achieve a goal. We identify three kinds of joint action: Constraining, where actions of the group limit the ability of individual middle managers to deviate from shared goals, Enabling, whereby a group of middle managers adapt the project to changing circumstances, and Extending, where groups of middle managers engage with others not in their functional areas. Joint action emerges when top management embeds, in the project context, (1) key influential stakeholders who are involved in the change, (2) a common goal, (3) structures and processes that promote collective work, and (4) artifacts inscribed with the common goal and collective work.
背景:研究表明,持续的高层管理参与和参与对于it驱动的变革是重要的。然而,这并不总是可能的。当高层管理人员的参与和参与减少时,it驱动的变革如何成功是一个尚未解决但重要的研究问题。方法:我们进行了一项为期5年的探索性纵向案例研究。结果:我们的数据分为两部分。我们首先展示了两年来高层管理人员积极参与和参与的上下文元素(目标、人员、结构/过程和工件)。在高层管理人员参与和参与减少的三年期间,我们提出了背景因素,以及中层管理人员在三种变革威胁(偏离变革愿景、紧急问题、涉及新利益相关者)上扮演传统中层管理角色(信息经纪人、调解人、推动者、变革推动者)。结论:我们发现,如果中层管理人员参与联合行动,即有意的集体活动,成员有意识地选择协调以实现目标,那么当高层管理人员的参与和参与减少时,it支持的变革可以成功。我们确定了三种联合行动:约束,在这种情况下,团队的行动限制了单个中层管理人员偏离共同目标的能力;启用,在这种情况下,一组中层管理人员使项目适应不断变化的环境;扩展,在这种情况下,一组中层管理人员与其他不在其职能领域的人员进行接触。当最高管理层在项目环境中嵌入(1)参与变更的关键有影响力的利益相关者,(2)共同目标,(3)促进集体工作的结构和过程,以及(4)刻有共同目标和集体工作的工件时,联合行动就出现了。
{"title":"How Do You Perpetuate IT-Enabled Change When Top Management Participation and Involvement Diminish?","authors":"C. Chua, A. Yeow, C. Soh","doi":"10.17705/1pais.11402","DOIUrl":"https://doi.org/10.17705/1pais.11402","url":null,"abstract":"Background: Research has demonstrated that sustained top management participation and involvement are important for IT-enabled change. However, this is not always possible. How IT-enabled change can succeed when top management participation and involvement diminish is an unsolved, but important research question. Method: We perform a 5-year exploratory longitudinal case study. Results: Our data is presented in two parts. We first present the contextual elements (goals, people, structures/processes, and artifacts) during the two years top management was actively participating and involved. For the three-year period where top management participation and involvement diminished, we present the contextual elements, and middle management’s enactment of traditional middle management roles (information broker, mediator, facilitator, change agent) on three kinds of threats to the change (deviations from change vision, emergent issues, involving new stakeholders). Conclusions: We find IT-enabled change can succeed when top management participation and involvement diminish if middle management engages in joint action, i.e., intentional collective activity where members consciously choose to coordinate to achieve a goal. We identify three kinds of joint action: Constraining, where actions of the group limit the ability of individual middle managers to deviate from shared goals, Enabling, whereby a group of middle managers adapt the project to changing circumstances, and Extending, where groups of middle managers engage with others not in their functional areas. Joint action emerges when top management embeds, in the project context, (1) key influential stakeholders who are involved in the change, (2) a common goal, (3) structures and processes that promote collective work, and (4) artifacts inscribed with the common goal and collective work.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"1 1","pages":"2"},"PeriodicalIF":1.8,"publicationDate":"2019-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84200111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social Capital and ICT Intervention: A Holistic Model of Value 社会资本与ICT干预:一个整体价值模型
IF 1.8 Q2 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2019-12-23 DOI: 10.17705/1pais.11403
Z. Ahmed, Vinod Kumar, U. Kumar, Evren Eryilmaz
Background: Despite increasing popularity of Social capital, the relationship between social capital and ICT often appears to be an ambivalent one. Existing information systems (IS) literature presented various frameworks and theoretical foundations to facilitate the study of this concept, yet several contradictory findings have been reported indicating a significant knowledge gap in this domain. Current research adopts a holistic approach to address this knowledge gap by answering “How does social capital generate value or benefits in an ICT intervention?” Method: C urrent research employs a systematic literature review coupled with a grounded theory method to investigate proposed research questions. Results: Primary contributions of the current research include (1) the identification of contextual relationship between contextual factors and social capital dimensions, and (2) development of a holistic model of social capital driven benefits during ICT intervention where the ‘enablers’ and the ‘drivers’ of benefit have been identified. Conclusions: Identification of distinct roles and value-drivers related to social capital will help IS researchers in explaining “how and why” benefits are achieved while employing a social capital lens.
背景:尽管社会资本越来越受欢迎,但社会资本与信息通信技术之间的关系往往是矛盾的。现有的信息系统(IS)文献提出了各种框架和理论基础来促进这一概念的研究,然而,一些相互矛盾的发现已经被报道,表明这一领域存在重大的知识差距。目前的研究通过回答“社会资本如何在信息通信技术干预中产生价值或利益”,采用整体方法来解决这一知识差距?方法:C目前的研究采用系统的文献综述,结合扎根的理论方法来调查提出的研究问题。结果:本研究的主要贡献包括:(1)确定了背景因素与社会资本维度之间的背景关系;(2)建立了ICT干预过程中社会资本驱动收益的整体模型,其中确定了收益的“促成因素”和“驱动因素”。结论:识别与社会资本相关的不同角色和价值驱动因素将有助于IS研究人员在使用社会资本镜头时解释“如何以及为什么”实现利益。
{"title":"Social Capital and ICT Intervention: A Holistic Model of Value","authors":"Z. Ahmed, Vinod Kumar, U. Kumar, Evren Eryilmaz","doi":"10.17705/1pais.11403","DOIUrl":"https://doi.org/10.17705/1pais.11403","url":null,"abstract":"Background: Despite increasing popularity of Social capital, the relationship between social capital and ICT often appears to be an ambivalent one. Existing information systems (IS) literature presented various frameworks and theoretical foundations to facilitate the study of this concept, yet several contradictory findings have been reported indicating a significant knowledge gap in this domain. Current research adopts a holistic approach to address this knowledge gap by answering “How does social capital generate value or benefits in an ICT intervention?” Method: C urrent research employs a systematic literature review coupled with a grounded theory method to investigate proposed research questions. Results: Primary contributions of the current research include (1) the identification of contextual relationship between contextual factors and social capital dimensions, and (2) development of a holistic model of social capital driven benefits during ICT intervention where the ‘enablers’ and the ‘drivers’ of benefit have been identified. Conclusions: Identification of distinct roles and value-drivers related to social capital will help IS researchers in explaining “how and why” benefits are achieved while employing a social capital lens.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"117 1","pages":"3"},"PeriodicalIF":1.8,"publicationDate":"2019-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89424447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interactive Data and Information Visualization: Unpacking its Characteristics and Influencing Aspects on Decision-making 交互式数据与信息可视化:解析其特征及其对决策的影响
IF 1.8 Q2 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2019-12-23 DOI: 10.17705/1pais.11404
Arif Perdana, D. A. Robb, Fiona H. Rohde
Background : Interactive data and information visualization (IDIV) enhances information presentations by providing users with multiple visual representations, active controls, and analytics. Users have greater control over IDIV presentations than standard presentations and as such IDIV becomes a more popular and relevant means of supporting data analytics (DA), as well as augmenting human intellect. Thus, IDIV enables provision of information in a format better suited to users’ decision-making. Method : Synthesizing past literature, we unpack IDIV characteristics and their influence on decision-making. This study adopts a narrative review method. Our conceptualization of IDIV and the proposed decision-making model are derived from a substantial body of literature from within the information systems (IS) and psychology disciplines.  Results : We propose an IS centered model of IDIV enhanced decision-making incorporating four bases of decision-making (i.e., predictors, moderators, mediators, and outcomes). IDIV is specifically characterized by rich features compared with standard information presentations, therefore, formulating the model is critical to understanding how IDIV affects decision processes, perceptual evaluations, and decision outcomes and quality. Conclusions : This decision-making model could provide a meaningful frame of reference for further IDIV research and greater specificity in IS theorizing. Overall, we contribute to the systematic description and explanation of IDIV and discuss a potential research agenda for future IDIV research into IS.
背景:交互式数据和信息可视化(IDIV)通过向用户提供多种可视化表示、活动控制和分析来增强信息表示。与标准表示相比,用户可以更好地控制IDIV表示,因此,IDIV成为支持数据分析(DA)以及增强人类智力的更流行和相关的方法。因此,IDIV能够以更适合用户决策的格式提供信息。方法:综合以往文献,分析IDIV的特征及其对决策的影响。本研究采用叙事回顾的方法。我们对IDIV的概念化和提出的决策模型来源于信息系统(IS)和心理学学科的大量文献。结果:我们提出了一个以IS为中心的IDIV增强决策模型,该模型包含四个决策基础(即预测因子、调节因子、中介因子和结果)。与标准信息表示相比,IDIV具有丰富的特征,因此,制定模型对于理解IDIV如何影响决策过程、感知评估、决策结果和质量至关重要。结论:该决策模型可以为进一步的IDIV研究提供有意义的参考框架,并为IS理论化提供更大的特异性。总体而言,我们对IDIV的系统描述和解释做出了贡献,并讨论了未来IDIV在IS领域研究的潜在研究议程。
{"title":"Interactive Data and Information Visualization: Unpacking its Characteristics and Influencing Aspects on Decision-making","authors":"Arif Perdana, D. A. Robb, Fiona H. Rohde","doi":"10.17705/1pais.11404","DOIUrl":"https://doi.org/10.17705/1pais.11404","url":null,"abstract":"Background : Interactive data and information visualization (IDIV) enhances information presentations by providing users with multiple visual representations, active controls, and analytics. Users have greater control over IDIV presentations than standard presentations and as such IDIV becomes a more popular and relevant means of supporting data analytics (DA), as well as augmenting human intellect. Thus, IDIV enables provision of information in a format better suited to users’ decision-making. Method : Synthesizing past literature, we unpack IDIV characteristics and their influence on decision-making. This study adopts a narrative review method. Our conceptualization of IDIV and the proposed decision-making model are derived from a substantial body of literature from within the information systems (IS) and psychology disciplines.  Results : We propose an IS centered model of IDIV enhanced decision-making incorporating four bases of decision-making (i.e., predictors, moderators, mediators, and outcomes). IDIV is specifically characterized by rich features compared with standard information presentations, therefore, formulating the model is critical to understanding how IDIV affects decision processes, perceptual evaluations, and decision outcomes and quality. Conclusions : This decision-making model could provide a meaningful frame of reference for further IDIV research and greater specificity in IS theorizing. Overall, we contribute to the systematic description and explanation of IDIV and discuss a potential research agenda for future IDIV research into IS.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"50 1","pages":"4"},"PeriodicalIF":1.8,"publicationDate":"2019-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73145232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Why Are Papers Desk Rejected at PAJAIS?: A Practical Guide to Avoiding Rejection 为什么PAJAIS的论文被拒绝?:避免拒绝的实用指南
IF 1.8 Q2 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2019-12-23 DOI: 10.17705/1pais.11401
James J. Jiang, J. C. Tsai
At PAJAIS, 50 % of the new submissions are desk-rejected. As the recognition of the journal continues to grow, we believe that authors certainly can make more improvements to lessen the chances of a desk rejection in the review process. With this in mind, the aim of this editorial is to suggest and provide our future authors with the reasons and actions commonly-related to this regard so as to minimize the possibility of getting a desk rejection. After all, we, as researchers, all long to publish high-quality articles.
在PAJAIS, 50%的新提交都被拒绝了。随着期刊认知度的不断提高,我们相信作者当然可以做出更多改进,以减少审稿过程中被拒稿的机会。考虑到这一点,这篇社论的目的是建议并为我们未来的作者提供与这方面普遍相关的原因和行动,以尽量减少被办公桌拒绝的可能性。毕竟,作为研究人员,我们都渴望发表高质量的文章。
{"title":"Why Are Papers Desk Rejected at PAJAIS?: A Practical Guide to Avoiding Rejection","authors":"James J. Jiang, J. C. Tsai","doi":"10.17705/1pais.11401","DOIUrl":"https://doi.org/10.17705/1pais.11401","url":null,"abstract":"At PAJAIS, 50 % of the new submissions are desk-rejected. As the recognition of the journal continues to grow, we believe that authors certainly can make more improvements to lessen the chances of a desk rejection in the review process. With this in mind, the aim of this editorial is to suggest and provide our future authors with the reasons and actions commonly-related to this regard so as to minimize the possibility of getting a desk rejection. After all, we, as researchers, all long to publish high-quality articles.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"1 1","pages":"1"},"PeriodicalIF":1.8,"publicationDate":"2019-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76165789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Understanding the Business Value Creation Process for Business Intelligence Tools in the UAE 了解阿联酋商业智能工具的商业价值创造过程
IF 1.8 Q2 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2019-09-18 DOI: 10.17705/1pais.11304
Afrah Ahmed, S. M. Yusof, F. Oroumchian
Background: In today’s dynamically changing business environment, organizations are constantly striving to improve their organizational performance, and the use of business intelligence (BI) aids in this process. This is a key reason why BI has captured the attention of many academicians and practitioners. Most of the research on BI highlights its importance and the ways in which it facilitates decision-making; however, there is limited research on how the use of BI tools and applications benefits the organization by enabling it to convert the millions of dollars spent on BI investment into business value. This study validates the “business value of BI” framework by evaluating the business value creation process for BI tools in the UAE. Method: The data for this empirical study were collected via interviews with 15 middle managers from various industries in the UAE, with a focus on BI tools and the use of BI in their organizations. Results: The results show that a business value creation process for BI exists and that it is divided into three subprocesses: the BI conversion process, BI use process, and BI competitive process. Conclusions: The use of BI has become necessary for organizations to compete effectually. The results of this study identify the various BI tools that organizations in the UAE use. Furthermore, the results highlight the business value creation process of BI tools and how the effective use BI offers an information advantage that facilitates decision-making and eventually promotes financial and non-financial benefits for the organization.
背景:在当今动态变化的业务环境中,组织不断努力提高其组织绩效,而商业智能(BI)的使用有助于这一过程。这就是为什么BI吸引了许多学者和实践者的注意的一个关键原因。大多数关于商业智能的研究都强调了它的重要性以及它促进决策的方式;然而,关于使用BI工具和应用程序如何使组织能够将花费在BI上的数百万美元投资转化为业务价值的研究却很有限。本研究通过评估阿联酋商业智能工具的商业价值创造过程,验证了“商业智能的商业价值”框架。方法:本实证研究的数据是通过对阿联酋各行各业的15名中层管理人员的访谈收集的,重点是BI工具和BI在其组织中的使用。结果表明,商业智能的业务价值创造过程是存在的,并分为三个子过程:商业智能转换过程、商业智能使用过程和商业智能竞争过程。结论:商业智能的使用已经成为组织有效竞争的必要条件。本研究的结果确定了阿联酋组织使用的各种BI工具。此外,结果强调了商业智能工具的业务价值创造过程,以及商业智能的有效使用如何提供信息优势,从而促进决策,并最终促进组织的财务和非财务利益。
{"title":"Understanding the Business Value Creation Process for Business Intelligence Tools in the UAE","authors":"Afrah Ahmed, S. M. Yusof, F. Oroumchian","doi":"10.17705/1pais.11304","DOIUrl":"https://doi.org/10.17705/1pais.11304","url":null,"abstract":"Background: In today’s dynamically changing business environment, organizations are constantly striving to improve their organizational performance, and the use of business intelligence (BI) aids in this process. This is a key reason why BI has captured the attention of many academicians and practitioners. Most of the research on BI highlights its importance and the ways in which it facilitates decision-making; however, there is limited research on how the use of BI tools and applications benefits the organization by enabling it to convert the millions of dollars spent on BI investment into business value. This study validates the “business value of BI” framework by evaluating the business value creation process for BI tools in the UAE. Method: The data for this empirical study were collected via interviews with 15 middle managers from various industries in the UAE, with a focus on BI tools and the use of BI in their organizations. Results: The results show that a business value creation process for BI exists and that it is divided into three subprocesses: the BI conversion process, BI use process, and BI competitive process. Conclusions: The use of BI has become necessary for organizations to compete effectually. The results of this study identify the various BI tools that organizations in the UAE use. Furthermore, the results highlight the business value creation process of BI tools and how the effective use BI offers an information advantage that facilitates decision-making and eventually promotes financial and non-financial benefits for the organization.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"41 1","pages":"4"},"PeriodicalIF":1.8,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74950917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Constructing an Effective Abstract: Guidelines and New Standards in PAJAIS 构建有效摘要:PAJAIS的指南和新标准
IF 1.8 Q2 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2019-09-18 DOI: 10.17705/1pais.11301
James J. Jiang, J. C. Tsai
In the previous issue, we outlined the considerations that are a necessary part of any submission and described how future submissions will be evaluated. In each paper, the abstract contains a summary of all key information, which can provide the audience a glance at the fundamental aspects of the paper. Mastering the skill of writing an abstract is essential to increase the visibility of a research paper and convince potential readers that research issues they care about have been addressed. In this issue, we continue to provide guidelines and new standards for writing and submitting abstracts for PAJAIS. This practical guide sets out the basic elements in an abstract and the journal’s requirements.
在上一期中,我们概述了任何提交都必须考虑的因素,并描述了如何评估未来的提交。在每篇论文中,摘要包含了所有关键信息的总结,这可以让读者对论文的基本方面有一个大致的了解。掌握撰写摘要的技巧对于提高研究论文的可见度和说服潜在读者他们关心的研究问题已经得到解决是必不可少的。在本期中,我们将继续为撰写和提交PAJAIS摘要提供指导方针和新标准。这个实用指南列出了摘要的基本要素和期刊的要求。
{"title":"Constructing an Effective Abstract: Guidelines and New Standards in PAJAIS","authors":"James J. Jiang, J. C. Tsai","doi":"10.17705/1pais.11301","DOIUrl":"https://doi.org/10.17705/1pais.11301","url":null,"abstract":"In the previous issue, we outlined the considerations that are a necessary part of any submission and described how future submissions will be evaluated. In each paper, the abstract contains a summary of all key information, which can provide the audience a glance at the fundamental aspects of the paper. Mastering the skill of writing an abstract is essential to increase the visibility of a research paper and convince potential readers that research issues they care about have been addressed. In this issue, we continue to provide guidelines and new standards for writing and submitting abstracts for PAJAIS. This practical guide sets out the basic elements in an abstract and the journal’s requirements.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"1 1","pages":"1"},"PeriodicalIF":1.8,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90166705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Determinants of Cloud Computing Adoption: A Comparative Study 云计算采用的决定因素:比较研究
IF 1.8 Q2 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2019-09-18 DOI: 10.17705/1pais.11303
Shailja Tripathi
Background: This study investigates the determinants that influence the user's behavioral intention to use cloud computing in adopter and non-adopter firms. The research model is based on the theory of the Valence Framework of Behavioral Beliefs and Technology Acceptance Model (TAM). The present study examined the factors of perceived ease of use, perceived usefulness, perceived ubiquity, perceived benefits, perceived costs and perceived risks in determining behavioral intention to use cloud computing for the adopter and non-adopter firms. Method: Data were collected using a questionnaire-based survey method. The valid responses received were 458. The sample size of adopters and non-adopter of cloud computing were 239 and 219, respectively. Exploratory Factor Analysis (EFA) and Structural Equation Modeling (SEM) was used for data analysis. Data analysis was done separately for both samples of the adopter and non-adopter firms The results showed that, for adopters firms, perceived usefulness, perceived ease of use, ubiquity, perceived benefits, and perceived risks were found to have a significant and direct influence on behavioral intention to use cloud computing. For non-adopters, perceived usefulness, perceived ubiquity, perceived benefits, perceived costs, and perceived risks were found to have a significant and direct influence on behavioral intention to use cloud computing. A comparison testing was also performed by examining the difference in the strength of path coefficients between adopters and non-adopters firms. Results: The findings showed that the impact of favorable factors of perceived ubiquity and perceived benefits were found relatively more significant in the case of adopter firms than negative factors. Likewise, the impact of negative factors of perceived risks and perceived costs were found relatively more significant in the case of non-adopter firms. Conclusions : The major contribution of this study is that it contributes to the understanding of progressive changes in the impact of behavioral beliefs and cognitive factors on behavioral intention to use cloud computing in adopter and non-adopter firms. This study also provides managers' practical understandings for cloud computing adoption during each phase of the adoption process.
背景:本研究调查了在采用和未采用云计算的企业中影响用户使用云计算行为意向的决定因素。研究模型基于行为信念效价框架理论和技术接受模型(TAM)。本研究考察了感知易用性、感知有用性、感知无处不在性、感知收益、感知成本和感知风险等因素,以确定采用和非采用云计算的公司使用云计算的行为意愿。方法:采用问卷调查法收集资料。收到的有效回复为458份。云计算采用者和非采用者的样本量分别为239和219。采用探索性因子分析(EFA)和结构方程模型(SEM)进行数据分析。结果表明,对于采用云计算的公司来说,感知有用性、感知易用性、普遍性、感知收益和感知风险对使用云计算的行为意向具有显著和直接的影响。对于非采用者而言,感知有用性、感知无处不在性、感知收益、感知成本和感知风险对使用云计算的行为意向具有显著和直接的影响。比较测试也通过检查在路径系数的强度的差异采用者和非采用者之间的公司进行。结果:在采用企业中,感知无处不在和感知利益的有利因素的影响相对于负面因素的影响更为显著。同样,在非采用企业中,感知风险和感知成本的负面因素的影响相对更显著。结论:本研究的主要贡献在于它有助于理解行为信念和认知因素对采用和非采用云计算的企业使用云计算的行为意图的影响的渐进变化。本研究也提供了管理者对云计算采用过程中各个阶段的实际理解。
{"title":"Determinants of Cloud Computing Adoption: A Comparative Study","authors":"Shailja Tripathi","doi":"10.17705/1pais.11303","DOIUrl":"https://doi.org/10.17705/1pais.11303","url":null,"abstract":"Background: This study investigates the determinants that influence the user's behavioral intention to use cloud computing in adopter and non-adopter firms. The research model is based on the theory of the Valence Framework of Behavioral Beliefs and Technology Acceptance Model (TAM). The present study examined the factors of perceived ease of use, perceived usefulness, perceived ubiquity, perceived benefits, perceived costs and perceived risks in determining behavioral intention to use cloud computing for the adopter and non-adopter firms. Method: Data were collected using a questionnaire-based survey method. The valid responses received were 458. The sample size of adopters and non-adopter of cloud computing were 239 and 219, respectively. Exploratory Factor Analysis (EFA) and Structural Equation Modeling (SEM) was used for data analysis. Data analysis was done separately for both samples of the adopter and non-adopter firms The results showed that, for adopters firms, perceived usefulness, perceived ease of use, ubiquity, perceived benefits, and perceived risks were found to have a significant and direct influence on behavioral intention to use cloud computing. For non-adopters, perceived usefulness, perceived ubiquity, perceived benefits, perceived costs, and perceived risks were found to have a significant and direct influence on behavioral intention to use cloud computing. A comparison testing was also performed by examining the difference in the strength of path coefficients between adopters and non-adopters firms. Results: The findings showed that the impact of favorable factors of perceived ubiquity and perceived benefits were found relatively more significant in the case of adopter firms than negative factors. Likewise, the impact of negative factors of perceived risks and perceived costs were found relatively more significant in the case of non-adopter firms. Conclusions : The major contribution of this study is that it contributes to the understanding of progressive changes in the impact of behavioral beliefs and cognitive factors on behavioral intention to use cloud computing in adopter and non-adopter firms. This study also provides managers' practical understandings for cloud computing adoption during each phase of the adoption process.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"337 3 1","pages":"3"},"PeriodicalIF":1.8,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77414533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Length of Cloud Application Use on Functionality Expectation, Usability, Privacy, and Security: A Case of Google Docs 云应用在功能预期、可用性、隐私和安全方面的使用时长:以Google Docs为例
IF 1.8 Q2 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2019-09-18 DOI: 10.17705/1pais.11302
M. Nakayama, Charlie C. Chen
Background: Newcomers to cloud applications typically have to overcome concerns of privacy (confidentiality control) and security (safekeeping). On the one hand, end-users may be accustomed to cloud applications’ privacy and security (habituation). On the other hand, these applications quickly adapt to end-user needs on those concerns (reciprocal habituation). Does the old proverb “Custom makes all things easy” apply to privacy and security concerns about cloud application use? Method: This study focuses on Google Docs as an example of standardized, common cloud applications and collects data from 211 of its users. Results: The results show that length of use has significant associations with better usability perception and increased functionality expectation. In turn, improved usability perception leads to decreased security risk concern, while increased functionality expectation increases privacy concerns. Interestingly, usefulness perception is not influenced by privacy concern. Conclusions : Overall, the length of Google Docs use is associated with higher usefulness and increased adoption through greater usability and decreased security concern. Thus, when it comes to standardized, common cloud applications, the old proverb is valid with some exception. Also, “custom” is mutual between cloud applications and their users.
背景:云应用程序的新手通常必须克服隐私(机密性控制)和安全(安全保管)的问题。一方面,终端用户可能已经习惯了云应用程序的隐私和安全(习惯化)。另一方面,这些应用程序迅速适应最终用户对这些问题的需求(相互适应)。“自定义使一切变得简单”这句古老的谚语是否适用于使用云应用程序的隐私和安全问题?方法:本研究以谷歌Docs为例,将其作为标准化的通用云应用程序,并收集了211名用户的数据。结果:结果表明,使用时长与更好的可用性感知和增加的功能期望显著相关。反过来,改进的可用性感知导致安全风险关注的减少,而增加的功能期望增加了隐私关注。有趣的是,有用性感知不受隐私关注的影响。结论:总的来说,谷歌文档的使用时间与更高的实用性和通过更高的可用性和更少的安全问题而增加的采用率有关。因此,当涉及到标准化的、常见的云应用程序时,除了一些例外,这句古老的谚语是有效的。此外,“自定义”在云应用程序和它们的用户之间是相互的。
{"title":"Length of Cloud Application Use on Functionality Expectation, Usability, Privacy, and Security: A Case of Google Docs","authors":"M. Nakayama, Charlie C. Chen","doi":"10.17705/1pais.11302","DOIUrl":"https://doi.org/10.17705/1pais.11302","url":null,"abstract":"Background: Newcomers to cloud applications typically have to overcome concerns of privacy (confidentiality control) and security (safekeeping). On the one hand, end-users may be accustomed to cloud applications’ privacy and security (habituation). On the other hand, these applications quickly adapt to end-user needs on those concerns (reciprocal habituation). Does the old proverb “Custom makes all things easy” apply to privacy and security concerns about cloud application use? Method: This study focuses on Google Docs as an example of standardized, common cloud applications and collects data from 211 of its users. Results: The results show that length of use has significant associations with better usability perception and increased functionality expectation. In turn, improved usability perception leads to decreased security risk concern, while increased functionality expectation increases privacy concerns. Interestingly, usefulness perception is not influenced by privacy concern. Conclusions : Overall, the length of Google Docs use is associated with higher usefulness and increased adoption through greater usability and decreased security concern. Thus, when it comes to standardized, common cloud applications, the old proverb is valid with some exception. Also, “custom” is mutual between cloud applications and their users.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"35 1","pages":"2"},"PeriodicalIF":1.8,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80497210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Pacific Asia Journal of the Association for Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1