The proliferation and adoption of phones and other emerging technologies in health care is significantly growing in Ghana. Though tapping into this technology innovation could tremendously improve health care in resource deficient settings, there is a dearth of research on adoption antecedents. Drawing strength from behavior studies anchored on the theory of planned behavior (TPB), our study proposed a model, and further sampled 386 respondents to predict mobile health adoption behavior. Empirical results of our study revealed that attitude, subjective norm, perceived behavior control, personal moral norm, and language all had a significant positive relationship with adoption intention. Furthermore, adoption intention was also revealed to have a significant positive relationship with behavior. And finally, Internet bandwidth was revealed to significantly moderate the relationship between adoption intention and actual adoption behavior. Based on the results, further insights for stakeholders and policy, implications for accelerating mobile health adoption, and suggestions for future research are subsequently delineated.
{"title":"Consumers' Mobile Health Adoption Intention Prediction Utilizing an Extended Version of The Theory of Planned Behavior","authors":"V. Arkorful, Shu-rong Zhao, B. Lugu, Jianxun Chu","doi":"10.1145/3533692.3533699","DOIUrl":"https://doi.org/10.1145/3533692.3533699","url":null,"abstract":"The proliferation and adoption of phones and other emerging technologies in health care is significantly growing in Ghana. Though tapping into this technology innovation could tremendously improve health care in resource deficient settings, there is a dearth of research on adoption antecedents. Drawing strength from behavior studies anchored on the theory of planned behavior (TPB), our study proposed a model, and further sampled 386 respondents to predict mobile health adoption behavior. Empirical results of our study revealed that attitude, subjective norm, perceived behavior control, personal moral norm, and language all had a significant positive relationship with adoption intention. Furthermore, adoption intention was also revealed to have a significant positive relationship with behavior. And finally, Internet bandwidth was revealed to significantly moderate the relationship between adoption intention and actual adoption behavior. Based on the results, further insights for stakeholders and policy, implications for accelerating mobile health adoption, and suggestions for future research are subsequently delineated.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75138408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Password manager applications have the potential to alleviate password pain and improve password strength, yet they are not widely adopted. Password managers are dissimilar to other kinds of software tools, given that the leakage of the credentials they store could give a hacker access to all the individual's online accounts. Moreover, adoption requires a deliberate switch away from an existing (manual) password management routine. As such, traditional technology adoption models are unlikely to model password manager adoption accurately. In this paper, we propose and explain how we validated a theoretical model of smartphone password manager adoption. We commenced by carrying out exploratory interviews with 30 smartphone owners to identify factors that influence adoption. These were used to develop a model that reflects the password manager adoption process, building on migration theory. The proposed model, MIGRANT (MIGRation pAssword maNager adopTion), was validated and subsequently refined in a week-long study with 198 smartphone owners, combining self-report and observation to measure constructs. This study contributes to the information security behavioral literature by isolating the main factors that encourage or deter password manager adoption, and those that moor smartphone owners in their current practices, hindering switching. With this investigation, we introduce migration theory as a reference theory for future studies in the information security behavioral field.
{"title":"MIGRANT","authors":"Nora Alkaldi, K. Renaud","doi":"10.1145/3533692.3533698","DOIUrl":"https://doi.org/10.1145/3533692.3533698","url":null,"abstract":"Password manager applications have the potential to alleviate password pain and improve password strength, yet they are not widely adopted. Password managers are dissimilar to other kinds of software tools, given that the leakage of the credentials they store could give a hacker access to all the individual's online accounts. Moreover, adoption requires a deliberate switch away from an existing (manual) password management routine. As such, traditional technology adoption models are unlikely to model password manager adoption accurately. In this paper, we propose and explain how we validated a theoretical model of smartphone password manager adoption. We commenced by carrying out exploratory interviews with 30 smartphone owners to identify factors that influence adoption. These were used to develop a model that reflects the password manager adoption process, building on migration theory. The proposed model, MIGRANT (MIGRation pAssword maNager adopTion), was validated and subsequently refined in a week-long study with 198 smartphone owners, combining self-report and observation to measure constructs. This study contributes to the information security behavioral literature by isolating the main factors that encourage or deter password manager adoption, and those that moor smartphone owners in their current practices, hindering switching. With this investigation, we introduce migration theory as a reference theory for future studies in the information security behavioral field.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78923334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bruno Latour is a key proponent of the Actor-Network Theory, which challenges many of the commonly held beliefs and practices in IS. Though there have been a few studies in IS using his approach, his thinking is deeper and richer than what has initially been explored. This essay highlights key issues raised by Latour and explains how they may provide insight and value for IS researchers.
{"title":"The Philosopher's Corner","authors":"F. Niederman","doi":"10.1145/3533692.3533695","DOIUrl":"https://doi.org/10.1145/3533692.3533695","url":null,"abstract":"Bruno Latour is a key proponent of the Actor-Network Theory, which challenges many of the commonly held beliefs and practices in IS. Though there have been a few studies in IS using his approach, his thinking is deeper and richer than what has initially been explored. This essay highlights key issues raised by Latour and explains how they may provide insight and value for IS researchers.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84877766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Explorative information systems behaviors are the ways in which individuals actively revise their usage and discover creative means of applying the system, extending the potentials of the system, and enhancing task performance. This study has developed a specific concept of explorative system behavior-explorative information technology (IT) learning-to describe users' post-training learning behavior-novel use. Adapting a herding lens, we study the individual and team-level triggers of explorative learning cognitions. The study tests the proposed cross-level model and collects data from 225 individuals who are divided into 51 teams. The results indicate that individuals tend to innovatively use a system through developed exploration cognitions in team settings as a response to examined herd behavior triggers. The study uncovered that members of cohesive teams and learners with high uncertainty perceptions are more likely to imitate the observed explorative learning behaviors of their peers and reproduce such behaviors in the long term.
{"title":"Explore to Learn","authors":"M. Darban","doi":"10.1145/3533692.3533697","DOIUrl":"https://doi.org/10.1145/3533692.3533697","url":null,"abstract":"Explorative information systems behaviors are the ways in which individuals actively revise their usage and discover creative means of applying the system, extending the potentials of the system, and enhancing task performance. This study has developed a specific concept of explorative system behavior-explorative information technology (IT) learning-to describe users' post-training learning behavior-novel use. Adapting a herding lens, we study the individual and team-level triggers of explorative learning cognitions. The study tests the proposed cross-level model and collects data from 225 individuals who are divided into 51 teams. The results indicate that individuals tend to innovatively use a system through developed exploration cognitions in team settings as a response to examined herd behavior triggers. The study uncovered that members of cohesive teams and learners with high uncertainty perceptions are more likely to imitate the observed explorative learning behaviors of their peers and reproduce such behaviors in the long term.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77299223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The idea of "intersectionality" seeks to capture both the structural and dynamic consequences of the interaction between two or more forms of discrimination or systems of subordination. It specifically addresses the manner in which racism, patriarchy, economic disadvantages and other discriminatory systems contribute to create layers of inequality that structures the relative positions of women and men, races, and other groups. Moreover, it addresses the way that specific acts and policies create burdens that flow along these intersecting axes contributing actively to create a dynamic of disempowerment. (United Nations, 2000)
{"title":"Conceptualizing the Marginalized Context in Information Systems Research","authors":"K. D. Joshi","doi":"10.1145/3533692.3533694","DOIUrl":"https://doi.org/10.1145/3533692.3533694","url":null,"abstract":"The idea of \"intersectionality\" seeks to capture both the structural and dynamic consequences of the interaction between two or more forms of discrimination or systems of subordination. It specifically addresses the manner in which racism, patriarchy, economic disadvantages and other discriminatory systems contribute to create layers of inequality that structures the relative positions of women and men, races, and other groups. Moreover, it addresses the way that specific acts and policies create burdens that flow along these intersecting axes contributing actively to create a dynamic of disempowerment. (United Nations, 2000)","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77823296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The obligation to tackle biases and injustices rooted in the publishing ecosystem has reached the academic communities' consciousness (Royal Society, 2022; APA, 2021; Nature, 2022). Similarly, the IS community is institutionalizing governance mechanisms to demonstrate its commitment to Diversity, Equity and Inclusion (DEI) (Burton-Jones & Sarker, 2021; Association for Information Systems, 2021), in hopes of reversing the unwanted effects of explicit and implicit biases in communicating and publishing IS scholarship.
解决根植于出版生态系统的偏见和不公正的义务已经达到了学术界的意识(皇家学会,2022;APA, 2021;自然,2022)。同样,信息系统社区正在将治理机制制度化,以表明其对多样性、公平和包容(DEI)的承诺(Burton-Jones & Sarker, 2021;信息系统协会(Association for Information Systems, 2021),希望扭转信息系统学术交流和出版中显性和隐性偏见的不良影响。
{"title":"Are We Doing Enough?","authors":"K. D. Joshi","doi":"10.1145/3514097.3514099","DOIUrl":"https://doi.org/10.1145/3514097.3514099","url":null,"abstract":"The obligation to tackle biases and injustices rooted in the publishing ecosystem has reached the academic communities' consciousness (Royal Society, 2022; APA, 2021; Nature, 2022). Similarly, the IS community is institutionalizing governance mechanisms to demonstrate its commitment to Diversity, Equity and Inclusion (DEI) (Burton-Jones & Sarker, 2021; Association for Information Systems, 2021), in hopes of reversing the unwanted effects of explicit and implicit biases in communicating and publishing IS scholarship.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84833196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cyber-loafing is a workplace deviant behavior that may impose perennial losses and security threats to organizations. Due to the destructive impact, organizations take controls to manage employees' cyber-loafing behavior. While previous research concerning these cyber-loafing controls has yielded inconsistent results, this research further advances this line of research through two primarily adopted organizational controls: computer monitoring and Internet usage policy. We contend that the inconsistent results of the effects of computer monitoring and Internet usage policy on cyber-loafing behavior are due to ignoring the influence of individual differences. Motivated thus, we draw on pertaining literature of trait mindfulness to propose that trait mindfulness moderates the effect of perceived computer monitoring and perceived Internet usage policy on behavioral automaticity towards cyber-loafing, which leads to employees' cyber-loafing behavior. In essence, this paper sheds new light on the relationships amid organizational controls, cyber-loafing behavior, and the moderating effects of trait mindfulness. 450 responses were collected to test these hypotheses. Our results show that trait mindfulness enhances the negative effect of perceived Internet usage policy on behavioral automaticity towards cyber-loafing. In addition, we find out that trait mindfulness has an indirect effect on employees' cyber-loafing behavior by reducing behavioral automaticity.
{"title":"Effects of Organizational Controls on Employees' Cyber-loafing","authors":"X. Luo, Feng Xu, Junmei Zhang, Shan Xiao, B. Xue","doi":"10.1145/3514097.3514102","DOIUrl":"https://doi.org/10.1145/3514097.3514102","url":null,"abstract":"Cyber-loafing is a workplace deviant behavior that may impose perennial losses and security threats to organizations. Due to the destructive impact, organizations take controls to manage employees' cyber-loafing behavior. While previous research concerning these cyber-loafing controls has yielded inconsistent results, this research further advances this line of research through two primarily adopted organizational controls: computer monitoring and Internet usage policy. We contend that the inconsistent results of the effects of computer monitoring and Internet usage policy on cyber-loafing behavior are due to ignoring the influence of individual differences. Motivated thus, we draw on pertaining literature of trait mindfulness to propose that trait mindfulness moderates the effect of perceived computer monitoring and perceived Internet usage policy on behavioral automaticity towards cyber-loafing, which leads to employees' cyber-loafing behavior. In essence, this paper sheds new light on the relationships amid organizational controls, cyber-loafing behavior, and the moderating effects of trait mindfulness. 450 responses were collected to test these hypotheses. Our results show that trait mindfulness enhances the negative effect of perceived Internet usage policy on behavioral automaticity towards cyber-loafing. In addition, we find out that trait mindfulness has an indirect effect on employees' cyber-loafing behavior by reducing behavioral automaticity.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85572369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Does formal IT governance encourage innovation in the traditional domains of the IT function at the expense of new forms of "digital" innovation? We report on a study of 158 IT managers and leaders to understand the conditions under which transformational IT leadership can drive innovation in traditional forms of IT, as well as in the emerging "digital" domain. We find that highly formal IT governance practices can reduce ability of transformational IT managers and leaders to innovate in both domains, and this effect is greater for digital innovation. In stable cultures the moderation effect was strengthened, while insignificant in change cultures. We distinguish between IT innovation and digital innovation and operationalize this distinction, finding that in contexts with stability culture, the moderation is stronger for digital innovation than for traditional IT innovation.
{"title":"Transformational IT Leaders and Digital Innovation","authors":"L. Pittenger, N. Berente, James Gaskin","doi":"10.1145/3514097.3514104","DOIUrl":"https://doi.org/10.1145/3514097.3514104","url":null,"abstract":"Does formal IT governance encourage innovation in the traditional domains of the IT function at the expense of new forms of \"digital\" innovation? We report on a study of 158 IT managers and leaders to understand the conditions under which transformational IT leadership can drive innovation in traditional forms of IT, as well as in the emerging \"digital\" domain. We find that highly formal IT governance practices can reduce ability of transformational IT managers and leaders to innovate in both domains, and this effect is greater for digital innovation. In stable cultures the moderation effect was strengthened, while insignificant in change cultures. We distinguish between IT innovation and digital innovation and operationalize this distinction, finding that in contexts with stability culture, the moderation is stronger for digital innovation than for traditional IT innovation.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83314157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stefan Reining, F. Ahlemann, B. Mueller, Rahul Thakurta
Design science research (DSR) is increasingly prominent in the information systems discipline. However, despite a lively discourse, and methodical and conceptual advances notwithstanding, DSR contributions are rarely cumulative and mostly remain isolated. This lack of cumulative research impedes scientific progress and practical impact. Our goal in this paper is to help establish a cumulative tradition in DSR by proposing (1) a general, consensus-oriented, evolutionary process model of scientific progress based on a synthesis of different streams in the philosophy of science, (2) quality criteria for DSR contributions corresponding to the individual steps in the process model, (3) actions that the IS community as a whole can take to facilitate adherence to these quality criteria. We expect that our work can pave the way towards developing a more cumulative research tradition in DSR and thereby foster genuine scientific progress in the field.
{"title":"Knowledge Accumulation in Design Science Research","authors":"Stefan Reining, F. Ahlemann, B. Mueller, Rahul Thakurta","doi":"10.1145/3514097.3514100","DOIUrl":"https://doi.org/10.1145/3514097.3514100","url":null,"abstract":"Design science research (DSR) is increasingly prominent in the information systems discipline. However, despite a lively discourse, and methodical and conceptual advances notwithstanding, DSR contributions are rarely cumulative and mostly remain isolated. This lack of cumulative research impedes scientific progress and practical impact. Our goal in this paper is to help establish a cumulative tradition in DSR by proposing (1) a general, consensus-oriented, evolutionary process model of scientific progress based on a synthesis of different streams in the philosophy of science, (2) quality criteria for DSR contributions corresponding to the individual steps in the process model, (3) actions that the IS community as a whole can take to facilitate adherence to these quality criteria. We expect that our work can pave the way towards developing a more cumulative research tradition in DSR and thereby foster genuine scientific progress in the field.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88112129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of IS research applying DT highlights that many fundamental assumptions of DT are unrecognized and therefore unexamined. This may have resulted in misunderstandings and conceptual confusions regarding some of the basic concepts of DT. For example, some IS studies confuse general deterrence with specific deterrence or do not recognize the difference between the two. Moreover, these fundamental assumptions, when directly examined, may provide important information about the applicability of DT in certain IS security contexts. This research commentary aims to identify and discuss some of the fundamental assumptions of DT and their implications for IS research. By examining these assumptions, IS researchers can study the previously unexplored aspects of DT in different IS contexts. Further, by recognizing these assumptions, IS scholars can revise them and build new variants of DT to better account for specific characteristics of IS behaviors and contexts.
{"title":"Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions","authors":"M. Siponen, Wael Soliman, Anthony Vance","doi":"10.1145/3514097.3514101","DOIUrl":"https://doi.org/10.1145/3514097.3514101","url":null,"abstract":"In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of IS research applying DT highlights that many fundamental assumptions of DT are unrecognized and therefore unexamined. This may have resulted in misunderstandings and conceptual confusions regarding some of the basic concepts of DT. For example, some IS studies confuse general deterrence with specific deterrence or do not recognize the difference between the two. Moreover, these fundamental assumptions, when directly examined, may provide important information about the applicability of DT in certain IS security contexts. This research commentary aims to identify and discuss some of the fundamental assumptions of DT and their implications for IS research. By examining these assumptions, IS researchers can study the previously unexplored aspects of DT in different IS contexts. Further, by recognizing these assumptions, IS scholars can revise them and build new variants of DT to better account for specific characteristics of IS behaviors and contexts.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90032605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}