首页 > 最新文献

Data Base for Advances in Information Systems最新文献

英文 中文
An Exploration of the Drivers of Non-Adoption Behavior: A Discriminant Analysis Approach 非收养行为驱动因素的探索:一种判别分析方法
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2019-07-30 DOI: 10.1145/3353401.3353405
C. Wolverton, Ronald T. Cenfetelli
While there has been a substantial amount of attention within the information systems research community towards understanding the phenomenon of adoption, much less is known about non-adoption. This study examines the factors surrounding the decision to not adopt a technology and whether certain factors exert differing effects on individuals in particular ways such that concurrent factors could be identified to develop a classification of the specific types of non-adoption behavior. Utilizing inhibitor theory and the symbolic adoption model as a foundational framework for the different types of non-adoption, we posit that different types of non-adoption exist which is demonstrated by determining the perceptions towards technology that coalesce around different types of non-adoption. We conducted a two-phase investigation into non-adoption with two goals in mind: 1) identify and explore specific factors of the IT that are associated with the rejection decision and are distinct from the adoption decision, and 2) determine the extent to which these factors (along with traditional enablers) differentiate between different types of non-adoption. The results from a discriminant function analysis (DFA) indicate the coalescence of specific perceptual variables according to the types of non-adoption behavior, specifically, the discriminatory power of differing perceptions of IT between trial rejecters, symbolic rejecters, trial accepters, symbolic adopters, and adopters. The implications for research and implications for practice are discussed.
虽然在信息系统研究界对理解采用现象有相当多的关注,但对非采用的了解却少得多。本研究考察了决定不采用一项技术的因素,以及某些因素是否以特定的方式对个人产生不同的影响,从而可以识别出同时存在的因素,从而对特定类型的不采用行为进行分类。利用抑制剂理论和象征性采用模型作为不同类型的不采用的基本框架,我们假设存在不同类型的不采用,这通过确定围绕不同类型的不采用合并的技术感知来证明。我们对非采用进行了两个阶段的调查,并牢记两个目标:1)识别和探索与拒绝决策相关的IT的特定因素,并且与采用决策不同,2)确定这些因素(以及传统的促成因素)区分不同类型的非采用的程度。判别函数分析(DFA)的结果表明,根据非采用行为的类型,特定感知变量的结合,特别是在尝试拒绝者、象征性拒绝者、尝试接受者、象征性采纳者和采纳者之间,对IT的不同感知的歧视性力量。讨论了对研究和实践的影响。
{"title":"An Exploration of the Drivers of Non-Adoption Behavior: A Discriminant Analysis Approach","authors":"C. Wolverton, Ronald T. Cenfetelli","doi":"10.1145/3353401.3353405","DOIUrl":"https://doi.org/10.1145/3353401.3353405","url":null,"abstract":"While there has been a substantial amount of attention within the information systems research community towards understanding the phenomenon of adoption, much less is known about non-adoption. This study examines the factors surrounding the decision to not adopt a technology and whether certain factors exert differing effects on individuals in particular ways such that concurrent factors could be identified to develop a classification of the specific types of non-adoption behavior. Utilizing inhibitor theory and the symbolic adoption model as a foundational framework for the different types of non-adoption, we posit that different types of non-adoption exist which is demonstrated by determining the perceptions towards technology that coalesce around different types of non-adoption. We conducted a two-phase investigation into non-adoption with two goals in mind: 1) identify and explore specific factors of the IT that are associated with the rejection decision and are distinct from the adoption decision, and 2) determine the extent to which these factors (along with traditional enablers) differentiate between different types of non-adoption. The results from a discriminant function analysis (DFA) indicate the coalescence of specific perceptual variables according to the types of non-adoption behavior, specifically, the discriminatory power of differing perceptions of IT between trial rejecters, symbolic rejecters, trial accepters, symbolic adopters, and adopters. The implications for research and implications for practice are discussed.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2019-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87196483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
It's in the Cloud: Theorizing Context-Specific Factors Influencing the Perception of Mobile Cloud Storage 它在云中:理论化影响移动云存储感知的特定环境因素
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2019-07-30 DOI: 10.1145/3353401.3353408
O. Ogbanufe, Catalin C. Dinulescu, Xiaotong Liu, Carullah Y. Kucuk
This paper examines the impact of mobile device characteristics on perceptions of cloud storage. Following the framework and guidelines for context-specific theorizing in information systems research, we develop and test a model that examines the following research questions: How does the individual's experience with mobile devices impact perceptions of mobile cloud storage? How do mobile context-specific factors influence the individual's adoption of cloud storage? The model incorporates context-specific factors such as ease of file storage, ease of file transfer, multiple device use, and mobile device use. Our study contributes to the literature on theorizing context-specific factors by highlighting the importance of mobile device characteristics and usage contexts in individual technology adoption research. We also identify both performance increases and security challenges in providing access to cloud storage through mobile devices to individuals.
本文考察了移动设备特性对云存储感知的影响。根据信息系统研究中上下文特定理论的框架和指导方针,我们开发并测试了一个模型,该模型检验了以下研究问题:个人使用移动设备的经验如何影响对移动云存储的看法?移动环境的特定因素如何影响个人对云存储的采用?该模型结合了特定于上下文的因素,如文件存储的便利性、文件传输的便利性、多设备使用和移动设备使用。我们的研究通过强调移动设备特征和使用背景在个人技术采用研究中的重要性,为理论化情境特定因素的文献做出了贡献。我们还确定了通过移动设备向个人提供云存储访问的性能提升和安全挑战。
{"title":"It's in the Cloud: Theorizing Context-Specific Factors Influencing the Perception of Mobile Cloud Storage","authors":"O. Ogbanufe, Catalin C. Dinulescu, Xiaotong Liu, Carullah Y. Kucuk","doi":"10.1145/3353401.3353408","DOIUrl":"https://doi.org/10.1145/3353401.3353408","url":null,"abstract":"This paper examines the impact of mobile device characteristics on perceptions of cloud storage. Following the framework and guidelines for context-specific theorizing in information systems research, we develop and test a model that examines the following research questions: How does the individual's experience with mobile devices impact perceptions of mobile cloud storage? How do mobile context-specific factors influence the individual's adoption of cloud storage? The model incorporates context-specific factors such as ease of file storage, ease of file transfer, multiple device use, and mobile device use. Our study contributes to the literature on theorizing context-specific factors by highlighting the importance of mobile device characteristics and usage contexts in individual technology adoption research. We also identify both performance increases and security challenges in providing access to cloud storage through mobile devices to individuals.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2019-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88105868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Post-Positivist Answering Back.: Part 2: A Demo in R of the Importance of Enabling Replication in PLS and LISREL 一个后实证主义者的回应。第2部分:用R演示在PLS和LISREL中启用复制的重要性
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2019-07-30 DOI: 10.1145/3353401.3353404
D. Gefen
In Part 1 the argument was made for the core Positivist principle of enabling falsification, specifically that data, or at least correlation or covariance matrices, should be made public so that others can attempt to falsify at least the statistical analyses. Doing so could provide a semblance of the direction of what might constitute the desired Positivist aspects of intellectual integrity in science: making your claims and putting your data in the public domain so others may put its propositions to the test and try to falsify or improve on them. Part 2 demonstrates the importance of such disclosure. The demo begins with replicating the model in Structural Equation Modeling and Regression: Guidelines for Research Practice (Gefen et al., 2000) in PLS and CBSEM R packages, producing equivalent results as the original paper. Showing the point about the need to have the data in the public domain, a set of incorrectly specified models on the same data are then run. Both PLS and CBSEM converge and produce plausibly believable results if the data were not available to test alternative models, opening the possibility of pulling the wool over readers' eyes if such a correlation or covariance matrix is not provided.
在第一部分中,论证了实证主义的核心原则,即允许证伪,特别是数据,或至少相关或协方差矩阵,应该公开,以便其他人可以尝试证伪至少统计分析。这样做可以提供一个表面上的方向,可能构成科学知识完整性的理想的实证主义方面:提出你的主张,把你的数据放在公共领域,这样别人就可以把它的命题进行测试,并试图证伪或改进它们。第2部分说明了这种披露的重要性。演示首先在PLS和CBSEM R包中复制结构方程建模和回归:研究实践指南(Gefen等人,2000)中的模型,产生与原始论文相同的结果。为了说明需要将数据置于公共领域,然后在相同的数据上运行一组指定不正确的模型。如果数据无法用于测试替代模型,那么PLS和CBSEM都会收敛并产生可信的结果,如果没有提供这样的相关或协方差矩阵,则可能会蒙蔽读者的眼睛。
{"title":"A Post-Positivist Answering Back.: Part 2: A Demo in R of the Importance of Enabling Replication in PLS and LISREL","authors":"D. Gefen","doi":"10.1145/3353401.3353404","DOIUrl":"https://doi.org/10.1145/3353401.3353404","url":null,"abstract":"In Part 1 the argument was made for the core Positivist principle of enabling falsification, specifically that data, or at least correlation or covariance matrices, should be made public so that others can attempt to falsify at least the statistical analyses. Doing so could provide a semblance of the direction of what might constitute the desired Positivist aspects of intellectual integrity in science: making your claims and putting your data in the public domain so others may put its propositions to the test and try to falsify or improve on them. Part 2 demonstrates the importance of such disclosure. The demo begins with replicating the model in Structural Equation Modeling and Regression: Guidelines for Research Practice (Gefen et al., 2000) in PLS and CBSEM R packages, producing equivalent results as the original paper. Showing the point about the need to have the data in the public domain, a set of incorrectly specified models on the same data are then run. Both PLS and CBSEM converge and produce plausibly believable results if the data were not available to test alternative models, opening the possibility of pulling the wool over readers' eyes if such a correlation or covariance matrix is not provided.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2019-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74378750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
He Said, She Said: Communication Theory of Identity and the Challenges Men Face in the Information Systems Workplace 他说,她说:身份的传播理论和男性在信息系统工作场所面临的挑战
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2019-07-30 DOI: 10.1145/3353401.3353407
Cynthia K. Riemenschneider, M. Buche, Deborah J. Armstrong
The preponderance of the academic research focused on diversity in the IS field has emphasized the perspectives of women and racioethnic minorities. Recent research has found that following the appointment of a female CEO, white male top managers provided less help to colleagues, particularly those identified as minority-status (McDonald, Keeves, & Westphal, 2018). Additionally, Collison and Hearn (1994) assert that white men's universal status and their occupancy of the normative standard state have rendered them invisible as objects of analysis. To develop a more holistic view of the IS workplace, we expand the academic exploration by looking at the challenges men face in the Information Systems (IS) workplace. Using a cognitive lens, we evoke the challenges men perceive they face at work and cast them into revealed causal maps. We then repeat the process evoking women's perspectives of men's challenges. The findings are analyzed using the Communication Theory of Identity (CTI) to determine the areas of overlap and identity gaps. This study advances our understanding of the cognitive overlap (and lack thereof) regarding the challenges facing men in the IS field, and provides another step toward developing a more inclusive IS work environment.
侧重于IS领域多样性的学术研究占主导地位,强调了妇女和少数民族的观点。最近的研究发现,在任命女性首席执行官后,白人男性高管对同事的帮助减少了,尤其是那些被认定为少数族裔的同事(McDonald, Keeves, & Westphal, 2018)。此外,Collison和Hearn(1994)断言白人男性的普遍地位和他们对规范性标准状态的占有使他们作为分析对象不可见。为了更全面地了解信息系统工作场所,我们通过研究男性在信息系统(IS)工作场所面临的挑战来扩展学术探索。通过认知视角,我们唤起了男性认为他们在工作中面临的挑战,并将它们投射到揭示的因果图中。然后,我们重复这个过程,唤起女性对男性挑战的看法。研究结果使用身份沟通理论(CTI)进行分析,以确定重叠和身份差距的区域。这项研究促进了我们对男性在信息系统领域面临的挑战的认知重叠(或缺乏认知重叠)的理解,并为开发更具包容性的信息系统工作环境提供了又一步。
{"title":"He Said, She Said: Communication Theory of Identity and the Challenges Men Face in the Information Systems Workplace","authors":"Cynthia K. Riemenschneider, M. Buche, Deborah J. Armstrong","doi":"10.1145/3353401.3353407","DOIUrl":"https://doi.org/10.1145/3353401.3353407","url":null,"abstract":"The preponderance of the academic research focused on diversity in the IS field has emphasized the perspectives of women and racioethnic minorities. Recent research has found that following the appointment of a female CEO, white male top managers provided less help to colleagues, particularly those identified as minority-status (McDonald, Keeves, & Westphal, 2018). Additionally, Collison and Hearn (1994) assert that white men's universal status and their occupancy of the normative standard state have rendered them invisible as objects of analysis. To develop a more holistic view of the IS workplace, we expand the academic exploration by looking at the challenges men face in the Information Systems (IS) workplace. Using a cognitive lens, we evoke the challenges men perceive they face at work and cast them into revealed causal maps. We then repeat the process evoking women's perspectives of men's challenges. The findings are analyzed using the Communication Theory of Identity (CTI) to determine the areas of overlap and identity gaps. This study advances our understanding of the cognitive overlap (and lack thereof) regarding the challenges facing men in the IS field, and provides another step toward developing a more inclusive IS work environment.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2019-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75030171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Recognizing Experts on Social Media: A Heuristics-Based Approach 识别社会媒体上的专家:一种基于启发式的方法
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2019-07-30 DOI: 10.1145/3353401.3353406
Benjamin D. Horne, Dorit Nevo, Sibel Adali
Knowing who is an expert on social media is a challenging yet important task, especially in a world where misleading information is commonplace and where social media is an important information source for knowledge seekers. In this paper we investigate expertise heuristics by comparing features of experts versus non-experts in big data settings. We employ a large set of features to classify experts and non-experts using data collected on two social media platform (Twitter and reddit). Our results show a good ability to predict who is an expert, especially using language-based features, validating that heuristics can be developed to differentiate experts from novices organically, based on social media use. Our results contribute to the development of expertise location and identification systems as well as our understanding on how experts present themselves on social media.
了解谁是社交媒体专家是一项具有挑战性但又很重要的任务,尤其是在一个误导性信息司空见惯的世界里,社交媒体是求知者的重要信息来源。在本文中,我们通过比较大数据环境中专家与非专家的特征来研究专家启发式。我们使用从两个社交媒体平台(Twitter和reddit)收集的数据,采用大量的特征来对专家和非专家进行分类。我们的结果显示了一个很好的预测谁是专家的能力,特别是使用基于语言的特征,验证了基于社交媒体使用的启发式方法可以有机地区分专家和新手。我们的研究结果有助于专业知识定位和识别系统的发展,以及我们对专家如何在社交媒体上展示自己的理解。
{"title":"Recognizing Experts on Social Media: A Heuristics-Based Approach","authors":"Benjamin D. Horne, Dorit Nevo, Sibel Adali","doi":"10.1145/3353401.3353406","DOIUrl":"https://doi.org/10.1145/3353401.3353406","url":null,"abstract":"Knowing who is an expert on social media is a challenging yet important task, especially in a world where misleading information is commonplace and where social media is an important information source for knowledge seekers. In this paper we investigate expertise heuristics by comparing features of experts versus non-experts in big data settings. We employ a large set of features to classify experts and non-experts using data collected on two social media platform (Twitter and reddit). Our results show a good ability to predict who is an expert, especially using language-based features, validating that heuristics can be developed to differentiate experts from novices organically, based on social media use. Our results contribute to the development of expertise location and identification systems as well as our understanding on how experts present themselves on social media.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2019-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76319110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Philosopher's Corner: A Post-Positivist Answering Back. Part 1: Good for You, Karl Popper! 哲学家的角落:一个后实证主义者的回应。第一部分:卡尔·波普尔,好样的!
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2019-05-06 DOI: 10.1145/3330472.3330475
D. Gefen
I am a critical post-Positivist ? and hold it as a badge of honor. To be a Positivist means that you are humbly willing to put your theory to a test that can falsify it ? that is, to show that it is wrong despite all that you have put into it. To be a post-Positivist means believing in that standard but also acknowledging the limitations of Positivism, including limitations of measurement and its theory-dependence as well as acknowledging that there are social processes in science too. A post- Positivist does not claim that other epistemologies are necessarily wrong. It is just that researchers who adhere to the falsification principle are willing to put their money where their claims are, rather than allowing in the temptation to endlessly massage theories so that they are constantly updated to be consistent with new facts. In that vein, Positivism, despite its limitations, can by virtue of the falsification principle put a dent in confirmation bias and the kind of heuristics suggested by Tversky and Kahneman that prejudice our seeing patterns even when they do not exist. It is in that spirit that this paper is written.
我是一个批判的后实证主义者?拿着它作为荣誉徽章。成为一个实证主义者意味着你愿意谦卑地将你的理论付诸检验,从而证伪它。也就是说,尽管你为它付出了一切,但它是错误的。成为一名后实证主义者意味着相信这个标准,但也承认实证主义的局限性,包括测量的局限性及其对理论的依赖,以及承认科学中也存在社会过程。后实证主义者并不主张其他的认识论必然是错误的。只是那些坚持证伪原则的研究人员愿意把他们的钱投入到他们的主张中,而不是允许无休止地按摩理论的诱惑,以便他们不断更新以与新的事实一致。在这种情况下,实证主义尽管有其局限性,但凭借证伪原则,可以削弱确认偏见,以及特沃斯基和卡尼曼提出的那种对我们的观察模式产生偏见的启发式,即使它们不存在。这篇论文就是本着这种精神写的。
{"title":"The Philosopher's Corner: A Post-Positivist Answering Back. Part 1: Good for You, Karl Popper!","authors":"D. Gefen","doi":"10.1145/3330472.3330475","DOIUrl":"https://doi.org/10.1145/3330472.3330475","url":null,"abstract":"I am a critical post-Positivist ? and hold it as a badge of honor. To be a Positivist means that you are humbly willing to put your theory to a test that can falsify it ? that is, to show that it is wrong despite all that you have put into it. To be a post-Positivist means believing in that standard but also acknowledging the limitations of Positivism, including limitations of measurement and its theory-dependence as well as acknowledging that there are social processes in science too. A post- Positivist does not claim that other epistemologies are necessarily wrong. It is just that researchers who adhere to the falsification principle are willing to put their money where their claims are, rather than allowing in the temptation to endlessly massage theories so that they are constantly updated to be consistent with new facts. In that vein, Positivism, despite its limitations, can by virtue of the falsification principle put a dent in confirmation bias and the kind of heuristics suggested by Tversky and Kahneman that prejudice our seeing patterns even when they do not exist. It is in that spirit that this paper is written.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78517030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Philosophy that Guides our Science? 指导我们科学的哲学?
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2019-05-06 DOI: 10.1145/3330472.3330474
T. Stafford
I come before you in this forum as the Jester in the Court of the Philosopher Kings. Keeping in mind the medieval commensuration of the term ?fool" with ?jester" and you will have a closer appreciation of the self-deprecating point I seek to make in this sense. I am but a lay reader of the literature of philosophy. However much I appreciate it, enthuse over it, or embrace it as the principle upon which my science is grounded, all the same, I am a simple journeyman, to borrow from Eric Clapton's similar self-deprecation, when it comes to the field of philosophy.
在这个论坛上,我以哲人王庭上的弄臣的身份出现在你们面前。记住中世纪对“傻瓜”和“小丑”的比较,你就会对我在这个意义上试图表达的自嘲观点有更深入的了解。我只是一个外行的哲学文献读者。无论我多么欣赏它,对它充满热情,或者把它作为我的科学基础的原则,我都是一个简单的熟客,借用埃里克·克莱普顿类似的自嘲,当涉及到哲学领域时。
{"title":"The Philosophy that Guides our Science?","authors":"T. Stafford","doi":"10.1145/3330472.3330474","DOIUrl":"https://doi.org/10.1145/3330472.3330474","url":null,"abstract":"I come before you in this forum as the Jester in the Court of the Philosopher Kings.\u0000 Keeping in mind the medieval commensuration of the term ?fool\" with ?jester\" and you will have a closer appreciation of the self-deprecating point I seek to make in this sense. I am but a lay reader of the literature of philosophy. However much I appreciate it, enthuse over it, or embrace it as the principle upon which my science is grounded, all the same, I am a simple journeyman, to borrow from Eric Clapton's similar self-deprecation, when it comes to the field of philosophy.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88768335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Common Method Bias: Performance of the Harman's Single-Factor Test 共同方法偏差的检测:哈曼单因素检验的性能
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2019-05-06 DOI: 10.1145/3330472.3330477
Miguel I. Aguirre-Urreta, Jiang Hu
Lack of careful consideration of common method effects in empirical research can lead to several negative consequences for the interpretation of research outcomes, such as biased estimates of the validity and reliability of the measures employed as well as bias in the estimates of the relationships between constructs of interest, which in turn can affect hypothesis testing. Taken together, these make it very difficult to make any interpretations of the results when those are affected by substantive common method effects. In the literature, there are several preventive, detective, and corrective techniques that can be employed to assuage concerns about the possibility of common method effects underlying observed results. Among these, the most popular has been Harman's Single-Factor Test. Though researchers have argued against its effectiveness in the past, the technique has continued to be very popular in the discipline. Moreover, there is a dearth of empirical evidence on the actual effectiveness of the technique, which we sought to remedy with this research. Our results, based on extensive Monte Carlo simulations, indicate that the approach shows limited effectiveness in detecting the presence of common method effects and may thus be providing a false sense of security to researchers. We therefore argue against the use of the technique moving forward and provide evidence to support our position.
在实证研究中缺乏对共同方法效应的仔细考虑可能会导致对研究结果的解释产生一些负面后果,例如对所采用措施的效度和可靠性的估计有偏差,以及对感兴趣的构念之间关系的估计有偏差,这反过来又会影响假设检验。综上所述,当这些结果受到实质性共同方法效应的影响时,很难对结果作出任何解释。在文献中,有几种预防、检测和纠正技术可以用来减轻对普通方法影响观察结果的可能性的担忧。其中,最受欢迎的是哈曼的单因素测试。尽管研究人员过去曾反对其有效性,但该技术在该学科中仍然非常受欢迎。此外,缺乏关于该技术实际有效性的经验证据,我们试图通过本研究弥补这一点。我们的结果,基于广泛的蒙特卡罗模拟,表明该方法在检测共同方法效应的存在方面显示出有限的有效性,因此可能为研究人员提供一种虚假的安全感。因此,我们反对使用这项技术,并提供证据来支持我们的立场。
{"title":"Detecting Common Method Bias: Performance of the Harman's Single-Factor Test","authors":"Miguel I. Aguirre-Urreta, Jiang Hu","doi":"10.1145/3330472.3330477","DOIUrl":"https://doi.org/10.1145/3330472.3330477","url":null,"abstract":"Lack of careful consideration of common method effects in empirical research can lead to several negative consequences for the interpretation of research outcomes, such as biased estimates of the validity and reliability of the measures employed as well as bias in the estimates of the relationships between constructs of interest, which in turn can affect hypothesis testing. Taken together, these make it very difficult to make any interpretations of the results when those are affected by substantive common method effects. In the literature, there are several preventive, detective, and corrective techniques that can be employed to assuage concerns about the possibility of common method effects underlying observed results. Among these, the most popular has been Harman's Single-Factor Test. Though researchers have argued against its effectiveness in the past, the technique has continued to be very popular in the discipline. Moreover, there is a dearth of empirical evidence on the actual effectiveness of the technique, which we sought to remedy with this research. Our results, based on extensive Monte Carlo simulations, indicate that the approach shows limited effectiveness in detecting the presence of common method effects and may thus be providing a false sense of security to researchers. We therefore argue against the use of the technique moving forward and provide evidence to support our position.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82105031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 172
A Revision of Computer Self-Efficacy Conceptualizations in Information Systems 信息系统中计算机自我效能概念的修正
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2019-05-06 DOI: 10.1145/3330472.3330478
Saurabh Gupta, R. Bostrom
Computer self-efficacy is one of the more important constructs in information systems (IS) research. Over the years, IS researchers have debated about its multifaceted nature. Yet, despite, extensive debate, we contend that for information systems, the conceptualization of various self-efficacy dimensions is incomplete. The primary dimension currently focused on is the specificity of the technology. This has resulted in two types of self-efficacy being investigated: computer self-efficacy and specific computer self-efficacy. However, the task being performed with technology has received limited attention in information systems self-efficacy research and discussions. We argue that there are four distinct types of computer self-efficacy constructs that are derived from combining the dimensions of specificity of information technology (specific/general) and task type (simple/complex) into a 2x2 model. Using data gathered from a quasi-experimental study, we illustrate how these constructs are not only theoretically different but also have a distinct measurement item set. Implications for expanding self-efficacy research are discussed at the end.
计算机自我效能感是信息系统研究中较为重要的概念之一。多年来,IS研究人员一直在争论它的多面性。然而,尽管有广泛的争论,我们认为,对于信息系统,各种自我效能感维度的概念化是不完整的。目前关注的主要方面是技术的特殊性。这导致了两种类型的自我效能被调查:计算机自我效能和特定计算机自我效能。然而,在信息系统自我效能的研究和讨论中,利用技术所执行的任务受到的关注有限。我们认为,将信息技术的特异性维度(特定/一般)和任务类型维度(简单/复杂)结合成一个2x2模型,得到了四种不同类型的计算机自我效能结构。使用从准实验研究中收集的数据,我们说明了这些结构不仅在理论上不同,而且具有不同的测量项目集。最后讨论了扩大自我效能研究的意义。
{"title":"A Revision of Computer Self-Efficacy Conceptualizations in Information Systems","authors":"Saurabh Gupta, R. Bostrom","doi":"10.1145/3330472.3330478","DOIUrl":"https://doi.org/10.1145/3330472.3330478","url":null,"abstract":"Computer self-efficacy is one of the more important constructs in information systems (IS) research. Over the years, IS researchers have debated about its multifaceted nature. Yet, despite, extensive debate, we contend that for information systems, the conceptualization of various self-efficacy dimensions is incomplete. The primary dimension currently focused on is the specificity of the technology. This has resulted in two types of self-efficacy being investigated: computer self-efficacy and specific computer self-efficacy. However, the task being performed with technology has received limited attention in information systems self-efficacy research and discussions. We argue that there are four distinct types of computer self-efficacy constructs that are derived from combining the dimensions of specificity of information technology (specific/general) and task type (simple/complex) into a 2x2 model. Using data gathered from a quasi-experimental study, we illustrate how these constructs are not only theoretically different but also have a distinct measurement item set. Implications for expanding self-efficacy research are discussed at the end.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90444875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Organization Improvisational Capability: Scale Development and Validation 组织即兴能力:规模开发与验证
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2019-05-06 DOI: 10.1145/3330472.3330479
LeeAnn Kung, Hsiang-Jui Kung
This study develops and validates an instrument for assessing organization improvisational capability (OIC) for potential use in future empirical studies. A definition of OIC and its dimensions are proposed based on an intensive literature review. An initial three-dimension, nine-item OIC scale derived from the literature is validated iteratively and then refined through a rigorous process into a two-factor, eight-item scale. The final scale demonstrates adequate psychometric properties, including reliability and convergent and discriminant validity. As such, this study contributes to a deeper theoretical understanding of the OIC construct and the appropriate application of such scales in future empirical studies. Future research on organization performance, agility, and strategy could utilize the proposed scale to study how OIC creates business value.
本研究开发并验证了一种评估组织即兴能力(OIC)的工具,以备在未来的实证研究中使用。在大量文献回顾的基础上,提出了OIC及其维度的定义。最初的三个维度,九个项目的OIC量表是从文献中衍生出来的,经过反复验证,然后通过严格的过程提炼成两个因素,八个项目的量表。最终的量表具有足够的心理测量特性,包括信度、收敛效度和判别效度。因此,本研究有助于加深对合作关系结构的理论认识,并有助于在未来的实证研究中适当地应用这些量表。未来关于组织绩效、敏捷性和战略的研究可以利用所提出的量表来研究OIC如何创造业务价值。
{"title":"Organization Improvisational Capability: Scale Development and Validation","authors":"LeeAnn Kung, Hsiang-Jui Kung","doi":"10.1145/3330472.3330479","DOIUrl":"https://doi.org/10.1145/3330472.3330479","url":null,"abstract":"This study develops and validates an instrument for assessing organization improvisational capability (OIC) for potential use in future empirical studies. A definition of OIC and its dimensions are proposed based on an intensive literature review. An initial three-dimension, nine-item OIC scale derived from the literature is validated iteratively and then refined through a rigorous process into a two-factor, eight-item scale. The final scale demonstrates adequate psychometric properties, including reliability and convergent and discriminant validity. As such, this study contributes to a deeper theoretical understanding of the OIC construct and the appropriate application of such scales in future empirical studies. Future research on organization performance, agility, and strategy could utilize the proposed scale to study how OIC creates business value.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75161644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Data Base for Advances in Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1