The positive and negative sides of information technology and systems are of interest to the researchers across different domains. Technostress, being a negative and unintended consequence rendered by the use of various information systems, has recently obtained significant attention in the information systems (IS) literature. It has been demonstrated in various studies how technostress affects the overall organizational performance by increasing role stress and reducing employees' job satisfaction, productivity, and performance. We extend the existing literature on technostress by reasoning that certain information technologies (IT) and systems may induce technostress that can be inhibited by certain other IT and systems such as social media. Drawing on coping theory, we explain the role of social media as technostress inhibitor. We thus provide the research model depicting the moderating role of social media, in which, we posit that the negative impact of technostress creators on employee productivity can be mitigated by the use of social media. We also provide the potential implications of the study and outline the research methodology that will be taken up in the next stage of our present research.
{"title":"The Impact of Social Media as Technostress Inhibitor on Employee Productivity","authors":"Anupriya Khan, M. Mahapatra","doi":"10.1145/3084381.3084407","DOIUrl":"https://doi.org/10.1145/3084381.3084407","url":null,"abstract":"The positive and negative sides of information technology and systems are of interest to the researchers across different domains. Technostress, being a negative and unintended consequence rendered by the use of various information systems, has recently obtained significant attention in the information systems (IS) literature. It has been demonstrated in various studies how technostress affects the overall organizational performance by increasing role stress and reducing employees' job satisfaction, productivity, and performance. We extend the existing literature on technostress by reasoning that certain information technologies (IT) and systems may induce technostress that can be inhibited by certain other IT and systems such as social media. Drawing on coping theory, we explain the role of social media as technostress inhibitor. We thus provide the research model depicting the moderating role of social media, in which, we posit that the negative impact of technostress creators on employee productivity can be mitigated by the use of social media. We also provide the potential implications of the study and outline the research methodology that will be taken up in the next stage of our present research.","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116753326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Increasingly, smartphones and mobile commerce are changing consumer transaction behaviors and shifting the ways in which users interact with business. Similarly, the banking and financial industry is now empowered by FinTech applications to improve their consumer experience and banking services to solidify the role for mobile banking (MB) for years to come. In this study, we are taking an integrated approach by combining two IT adoption models: UTAUT and IS Success, and using both subjective and objective measures for mobile banking usage. Our regression results for a sample of 472 bank users in a mid-size US bank find a strong support for satisfaction, objective actual use, and loyalty but not for subjective actual use. These results provide interesting implications for both IS adoption theory and banking institutions for improving satisfaction and use of MB.
{"title":"Understanding Mobile Banking Usage: An Integrative Perspective","authors":"M. Albashrawi, L. Motiwalla","doi":"10.1145/3084381.3084405","DOIUrl":"https://doi.org/10.1145/3084381.3084405","url":null,"abstract":"Increasingly, smartphones and mobile commerce are changing consumer transaction behaviors and shifting the ways in which users interact with business. Similarly, the banking and financial industry is now empowered by FinTech applications to improve their consumer experience and banking services to solidify the role for mobile banking (MB) for years to come. In this study, we are taking an integrated approach by combining two IT adoption models: UTAUT and IS Success, and using both subjective and objective measures for mobile banking usage. Our regression results for a sample of 472 bank users in a mid-size US bank find a strong support for satisfaction, objective actual use, and loyalty but not for subjective actual use. These results provide interesting implications for both IS adoption theory and banking institutions for improving satisfaction and use of MB.","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"7 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128422425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A wave of protest movements in recent years leveraging the potential of social media reveals the evolution in the process of collective identity in social networks, including the radical shift in the content and semantics of protest identity. The interplay of social media with social movements needs to be studied not only by illuminating the structural notion of networks in digital activism but also the actual content that flows through the medium such as the discourses and the iconographies pertaining to the social movement. With an aim to achieve this understanding, we propose a generic framework for the study of social media movements focusing on structure and content of social networks specifically characteristics such as homophily, structural capital and media richness along with the process of resource mobilization. We suggest a mixed-method approach to help answer the proposed research questions and validate the framework. The paper also discusses possible implications for research and practice.
{"title":"Social Movements in the Age of Social Media: A Structural and Content-based Analysis","authors":"P. Tarafdar, P. Seetharaman","doi":"10.1145/3084381.3084406","DOIUrl":"https://doi.org/10.1145/3084381.3084406","url":null,"abstract":"A wave of protest movements in recent years leveraging the potential of social media reveals the evolution in the process of collective identity in social networks, including the radical shift in the content and semantics of protest identity. The interplay of social media with social movements needs to be studied not only by illuminating the structural notion of networks in digital activism but also the actual content that flows through the medium such as the discourses and the iconographies pertaining to the social movement. With an aim to achieve this understanding, we propose a generic framework for the study of social media movements focusing on structure and content of social networks specifically characteristics such as homophily, structural capital and media richness along with the process of resource mobilization. We suggest a mixed-method approach to help answer the proposed research questions and validate the framework. The paper also discusses possible implications for research and practice.","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121443747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of Technology to facilitate better learning and training is gaining momentum worldwide, reducing the temporal and spatial problems associated with traditional learning. Despite its several benefits, retaining students in online platforms is challenging. This paper discusses an integration of online learning with virtual communities and mobile platforms to foster student engagement for obtaining better learning outcomes in blended learning platforms as well as to understand the public sentiments regarding the pure online learning platforms and finding the factors to improve the learning outcome. The potential utility of the study is discussed in terms of the contribution to the theory and practice.
{"title":"Online Learning: Improving the Learning Outcomes","authors":"Ritanjali Panigrahi","doi":"10.1145/3084381.3084434","DOIUrl":"https://doi.org/10.1145/3084381.3084434","url":null,"abstract":"The use of Technology to facilitate better learning and training is gaining momentum worldwide, reducing the temporal and spatial problems associated with traditional learning. Despite its several benefits, retaining students in online platforms is challenging. This paper discusses an integration of online learning with virtual communities and mobile platforms to foster student engagement for obtaining better learning outcomes in blended learning platforms as well as to understand the public sentiments regarding the pure online learning platforms and finding the factors to improve the learning outcome. The potential utility of the study is discussed in terms of the contribution to the theory and practice.","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134505707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Paper Session 4.2: Software Projects and Outsourcing","authors":"D. Beimborn","doi":"10.1145/3248724","DOIUrl":"https://doi.org/10.1145/3248724","url":null,"abstract":"","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124167292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper aims to identify some emerging sectors that apply big-data analytics through a systematic literature review conducted by capturing the existing work done in this subject area by academicians and industry experts worldwide and specifically in India backed by a detailed domain-wise, nation-wise and within India, an institute-wise analysis of the contributions made. Based on the existing work, the need for applying analytics in Banking and Finance is emphasized through the paper and a premise is provided for conducting future research in this domain.
{"title":"Systematic Literature Review of Big Data Analytics","authors":"Prajwal Eachempati, Praveen Ranjan Srivastava","doi":"10.1145/3084381.3084422","DOIUrl":"https://doi.org/10.1145/3084381.3084422","url":null,"abstract":"This paper aims to identify some emerging sectors that apply big-data analytics through a systematic literature review conducted by capturing the existing work done in this subject area by academicians and industry experts worldwide and specifically in India backed by a detailed domain-wise, nation-wise and within India, an institute-wise analysis of the contributions made. Based on the existing work, the need for applying analytics in Banking and Finance is emphasized through the paper and a premise is provided for conducting future research in this domain.","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128526653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Expecting tremendous social and economic implications of digital platforms and infrastructures, firms and governments across the world are making huge investments in creating and maintaining these infrastructures, health information systems and the Internet being the two striking examples. However, with growth, concerns related to their standardization, control and governance become significant. The Internet is a global information infrastructure [5] and to restrict its unintended consequences, positive steps towards its design and governance is being sought by researchers [6] and practitioners alike. I study three different aspects of Internet governance. The three questions that I analyze in my dissertation are: (1) What country level factors (institutional quality) impact a nation’s choice of Internet governance structure and what is the role of Internet affordances in the relationship?; (2) How does the proportion of Internet-deprived population (i.e. the extent of digital divide) affect the impact which zero-rating plans can have on an economy?; (3) Critically analyzing the current discourse on net neutrality and questioning the assumptions on which it is defined currently.
{"title":"Essays on Internet Governance","authors":"Neena Pandey","doi":"10.1145/3084381.3084431","DOIUrl":"https://doi.org/10.1145/3084381.3084431","url":null,"abstract":"Expecting tremendous social and economic implications of digital platforms and infrastructures, firms and governments across the world are making huge investments in creating and maintaining these infrastructures, health information systems and the Internet being the two striking examples. However, with growth, concerns related to their standardization, control and governance become significant. The Internet is a global information infrastructure [5] and to restrict its unintended consequences, positive steps towards its design and governance is being sought by researchers [6] and practitioners alike. I study three different aspects of Internet governance. The three questions that I analyze in my dissertation are: (1) What country level factors (institutional quality) impact a nation’s choice of Internet governance structure and what is the role of Internet affordances in the relationship?; (2) How does the proportion of Internet-deprived population (i.e. the extent of digital divide) affect the impact which zero-rating plans can have on an economy?; (3) Critically analyzing the current discourse on net neutrality and questioning the assumptions on which it is defined currently.","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"468 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130476700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Paper Session 3.1: IT Security","authors":"D. Joseph","doi":"10.1145/3248721","DOIUrl":"https://doi.org/10.1145/3248721","url":null,"abstract":"","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123213448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Disastrous consequences tend to befall organizations whose employees participate in information systems security deviant behavior (ISSDB) (e.g., connecting computers to the Internet through an insecure wireless network and opening emails from unverified senders). Although organizations recognize that ISSDB poses a serious problem, understanding what motivates its occurrence continues to be a key concern. While studies on information technology (IT) misuse abounds, research specifically focusing on the drivers of ISSDB remains scant in the literature. Using self-control theory, augmented with knowledge of relevant factors, this study examined the effects of employees' self-control, knowledge of computers/IT, and information systems (IS) security threats and risks on participation in ISSDB. A research model, including the aforementioned factors, was proposed and tested using the partial least squares technique. Data was collected from a survey of Canadian professionals. The results show that low self-control and lower levels of knowledge of computers/IT are related to employees' involvement in ISSDB. The data did not provide a meaningful relationship between employees' knowledge of IS security threats/risks and desire to participate in ISSDB.
{"title":"Effects of Organization Insiders' Self-Control and Relevant Knowledge on Participation in Information Systems Security Deviant Behavior: [Best Paper Nominee]","authors":"P. Ifinedo","doi":"10.1145/3084381.3084384","DOIUrl":"https://doi.org/10.1145/3084381.3084384","url":null,"abstract":"Disastrous consequences tend to befall organizations whose employees participate in information systems security deviant behavior (ISSDB) (e.g., connecting computers to the Internet through an insecure wireless network and opening emails from unverified senders). Although organizations recognize that ISSDB poses a serious problem, understanding what motivates its occurrence continues to be a key concern. While studies on information technology (IT) misuse abounds, research specifically focusing on the drivers of ISSDB remains scant in the literature. Using self-control theory, augmented with knowledge of relevant factors, this study examined the effects of employees' self-control, knowledge of computers/IT, and information systems (IS) security threats and risks on participation in ISSDB. A research model, including the aforementioned factors, was proposed and tested using the partial least squares technique. Data was collected from a survey of Canadian professionals. The results show that low self-control and lower levels of knowledge of computers/IT are related to employees' involvement in ISSDB. The data did not provide a meaningful relationship between employees' knowledge of IS security threats/risks and desire to participate in ISSDB.","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125202737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Paper Session 5.2: Institutions & Organizations","authors":"P. Ifinedo","doi":"10.1145/3248726","DOIUrl":"https://doi.org/10.1145/3248726","url":null,"abstract":"","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134631213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}