首页 > 最新文献

Data Base for Advances in Information Systems最新文献

英文 中文
Consumers' Mobile Health Adoption Intention Prediction Utilizing an Extended Version of The Theory of Planned Behavior 基于扩展版计划行为理论的消费者移动健康采用意愿预测
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2022-04-22 DOI: 10.1145/3533692.3533699
V. Arkorful, Shu-rong Zhao, B. Lugu, Jianxun Chu
The proliferation and adoption of phones and other emerging technologies in health care is significantly growing in Ghana. Though tapping into this technology innovation could tremendously improve health care in resource deficient settings, there is a dearth of research on adoption antecedents. Drawing strength from behavior studies anchored on the theory of planned behavior (TPB), our study proposed a model, and further sampled 386 respondents to predict mobile health adoption behavior. Empirical results of our study revealed that attitude, subjective norm, perceived behavior control, personal moral norm, and language all had a significant positive relationship with adoption intention. Furthermore, adoption intention was also revealed to have a significant positive relationship with behavior. And finally, Internet bandwidth was revealed to significantly moderate the relationship between adoption intention and actual adoption behavior. Based on the results, further insights for stakeholders and policy, implications for accelerating mobile health adoption, and suggestions for future research are subsequently delineated.
在加纳,电话和其他新兴技术在保健领域的普及和采用正在显著增加。虽然利用这一技术创新可以极大地改善资源匮乏地区的卫生保健,但缺乏对采用前因的研究。借鉴基于计划行为理论(TPB)的行为研究,本研究提出了一个模型,并进一步抽样了386名受访者来预测移动医疗采用行为。实证结果表明,态度、主观规范、感知行为控制、个人道德规范和语言均与收养意愿呈显著正相关。此外,领养意向与行为也有显著的正相关。网络带宽对实际收养行为与收养意愿之间的关系具有显著调节作用。在此基础上,对利益相关者和政策的进一步见解、对加速移动医疗采用的影响以及对未来研究的建议进行了阐述。
{"title":"Consumers' Mobile Health Adoption Intention Prediction Utilizing an Extended Version of The Theory of Planned Behavior","authors":"V. Arkorful, Shu-rong Zhao, B. Lugu, Jianxun Chu","doi":"10.1145/3533692.3533699","DOIUrl":"https://doi.org/10.1145/3533692.3533699","url":null,"abstract":"The proliferation and adoption of phones and other emerging technologies in health care is significantly growing in Ghana. Though tapping into this technology innovation could tremendously improve health care in resource deficient settings, there is a dearth of research on adoption antecedents. Drawing strength from behavior studies anchored on the theory of planned behavior (TPB), our study proposed a model, and further sampled 386 respondents to predict mobile health adoption behavior. Empirical results of our study revealed that attitude, subjective norm, perceived behavior control, personal moral norm, and language all had a significant positive relationship with adoption intention. Furthermore, adoption intention was also revealed to have a significant positive relationship with behavior. And finally, Internet bandwidth was revealed to significantly moderate the relationship between adoption intention and actual adoption behavior. Based on the results, further insights for stakeholders and policy, implications for accelerating mobile health adoption, and suggestions for future research are subsequently delineated.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75138408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MIGRANT 移民
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2022-04-22 DOI: 10.1145/3533692.3533698
Nora Alkaldi, K. Renaud
Password manager applications have the potential to alleviate password pain and improve password strength, yet they are not widely adopted. Password managers are dissimilar to other kinds of software tools, given that the leakage of the credentials they store could give a hacker access to all the individual's online accounts. Moreover, adoption requires a deliberate switch away from an existing (manual) password management routine. As such, traditional technology adoption models are unlikely to model password manager adoption accurately. In this paper, we propose and explain how we validated a theoretical model of smartphone password manager adoption. We commenced by carrying out exploratory interviews with 30 smartphone owners to identify factors that influence adoption. These were used to develop a model that reflects the password manager adoption process, building on migration theory. The proposed model, MIGRANT (MIGRation pAssword maNager adopTion), was validated and subsequently refined in a week-long study with 198 smartphone owners, combining self-report and observation to measure constructs. This study contributes to the information security behavioral literature by isolating the main factors that encourage or deter password manager adoption, and those that moor smartphone owners in their current practices, hindering switching. With this investigation, we introduce migration theory as a reference theory for future studies in the information security behavioral field.
密码管理器应用程序有可能减轻密码痛苦并提高密码强度,但它们并没有被广泛采用。密码管理器与其他类型的软件工具不同,因为它们存储的凭证泄露可能会让黑客访问个人的所有在线帐户。此外,采用需要有意地从现有的(手动)密码管理例程切换。因此,传统的技术采用模型不太可能准确地模拟密码管理器的采用。在本文中,我们提出并解释了我们如何验证智能手机密码管理器采用的理论模型。我们首先对30位智能手机用户进行了探索性访谈,以确定影响采用的因素。这些数据被用来开发一个模型,该模型反映了基于迁移理论的密码管理器采用过程。提出的模型,移民(迁移密码管理器采用),经过验证,并随后在为期一周的研究中完善了198智能手机用户,结合自我报告和观察来测量结构。这项研究通过隔离鼓励或阻止密码管理器采用的主要因素,以及那些将智能手机用户禁锢在他们目前的做法中,阻碍切换的因素,为信息安全行为文献做出了贡献。通过本研究,我们将引入迁移理论,作为未来信息安全行为领域研究的参考理论。
{"title":"MIGRANT","authors":"Nora Alkaldi, K. Renaud","doi":"10.1145/3533692.3533698","DOIUrl":"https://doi.org/10.1145/3533692.3533698","url":null,"abstract":"Password manager applications have the potential to alleviate password pain and improve password strength, yet they are not widely adopted. Password managers are dissimilar to other kinds of software tools, given that the leakage of the credentials they store could give a hacker access to all the individual's online accounts. Moreover, adoption requires a deliberate switch away from an existing (manual) password management routine. As such, traditional technology adoption models are unlikely to model password manager adoption accurately. In this paper, we propose and explain how we validated a theoretical model of smartphone password manager adoption. We commenced by carrying out exploratory interviews with 30 smartphone owners to identify factors that influence adoption. These were used to develop a model that reflects the password manager adoption process, building on migration theory. The proposed model, MIGRANT (MIGRation pAssword maNager adopTion), was validated and subsequently refined in a week-long study with 198 smartphone owners, combining self-report and observation to measure constructs. This study contributes to the information security behavioral literature by isolating the main factors that encourage or deter password manager adoption, and those that moor smartphone owners in their current practices, hindering switching. With this investigation, we introduce migration theory as a reference theory for future studies in the information security behavioral field.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78923334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Philosopher's Corner 哲学家的角落
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2022-04-22 DOI: 10.1145/3533692.3533695
F. Niederman
Bruno Latour is a key proponent of the Actor-Network Theory, which challenges many of the commonly held beliefs and practices in IS. Though there have been a few studies in IS using his approach, his thinking is deeper and richer than what has initially been explored. This essay highlights key issues raised by Latour and explains how they may provide insight and value for IS researchers.
布鲁诺·拉图尔是行动者网络理论的主要支持者,该理论挑战了is中许多普遍持有的信念和实践。虽然已经有一些关于IS的研究使用了他的方法,但他的想法比最初的探索更深刻、更丰富。这篇文章强调了拉图尔提出的关键问题,并解释了它们如何为IS研究人员提供见解和价值。
{"title":"The Philosopher's Corner","authors":"F. Niederman","doi":"10.1145/3533692.3533695","DOIUrl":"https://doi.org/10.1145/3533692.3533695","url":null,"abstract":"Bruno Latour is a key proponent of the Actor-Network Theory, which challenges many of the commonly held beliefs and practices in IS. Though there have been a few studies in IS using his approach, his thinking is deeper and richer than what has initially been explored. This essay highlights key issues raised by Latour and explains how they may provide insight and value for IS researchers.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84877766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explore to Learn 探索学习
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2022-04-22 DOI: 10.1145/3533692.3533697
M. Darban
Explorative information systems behaviors are the ways in which individuals actively revise their usage and discover creative means of applying the system, extending the potentials of the system, and enhancing task performance. This study has developed a specific concept of explorative system behavior-explorative information technology (IT) learning-to describe users' post-training learning behavior-novel use. Adapting a herding lens, we study the individual and team-level triggers of explorative learning cognitions. The study tests the proposed cross-level model and collects data from 225 individuals who are divided into 51 teams. The results indicate that individuals tend to innovatively use a system through developed exploration cognitions in team settings as a response to examined herd behavior triggers. The study uncovered that members of cohesive teams and learners with high uncertainty perceptions are more likely to imitate the observed explorative learning behaviors of their peers and reproduce such behaviors in the long term.
探索性信息系统行为是指个人积极地修改他们的使用方式,发现应用系统的创造性方法,扩展系统的潜力,提高任务绩效的方式。本研究提出了探索性系统行为-探索性信息技术(IT)学习-描述用户训练后学习行为-新颖使用的具体概念。采用群体视角,我们研究了探索性学习认知的个体和团队层面的触发因素。这项研究测试了提出的跨层次模型,并收集了225个人的数据,这些人被分为51个团队。结果表明,个体倾向于通过在团队环境中开发的探索认知来创新地使用系统,作为对被检查的群体行为触发器的反应。研究发现,凝聚力团队成员和具有高不确定性认知的学习者更有可能模仿观察到的同伴的探索性学习行为,并在长期内复制这种行为。
{"title":"Explore to Learn","authors":"M. Darban","doi":"10.1145/3533692.3533697","DOIUrl":"https://doi.org/10.1145/3533692.3533697","url":null,"abstract":"Explorative information systems behaviors are the ways in which individuals actively revise their usage and discover creative means of applying the system, extending the potentials of the system, and enhancing task performance. This study has developed a specific concept of explorative system behavior-explorative information technology (IT) learning-to describe users' post-training learning behavior-novel use. Adapting a herding lens, we study the individual and team-level triggers of explorative learning cognitions. The study tests the proposed cross-level model and collects data from 225 individuals who are divided into 51 teams. The results indicate that individuals tend to innovatively use a system through developed exploration cognitions in team settings as a response to examined herd behavior triggers. The study uncovered that members of cohesive teams and learners with high uncertainty perceptions are more likely to imitate the observed explorative learning behaviors of their peers and reproduce such behaviors in the long term.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77299223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conceptualizing the Marginalized Context in Information Systems Research 信息系统研究中边缘化语境的概念化
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2022-04-22 DOI: 10.1145/3533692.3533694
K. D. Joshi
The idea of "intersectionality" seeks to capture both the structural and dynamic consequences of the interaction between two or more forms of discrimination or systems of subordination. It specifically addresses the manner in which racism, patriarchy, economic disadvantages and other discriminatory systems contribute to create layers of inequality that structures the relative positions of women and men, races, and other groups. Moreover, it addresses the way that specific acts and policies create burdens that flow along these intersecting axes contributing actively to create a dynamic of disempowerment. (United Nations, 2000)
“交叉性”的概念试图捕捉两种或两种以上形式的歧视或从属制度之间相互作用的结构和动态后果。它具体阐述了种族主义、父权制、经济劣势和其他歧视性制度是如何造成男女、种族和其他群体相对地位的不平等。此外,它还讨论了具体行为和政策如何造成负担,这些负担沿着这些交叉轴流动,积极地促成了一种剥夺权力的动态。(联合国,2000年)
{"title":"Conceptualizing the Marginalized Context in Information Systems Research","authors":"K. D. Joshi","doi":"10.1145/3533692.3533694","DOIUrl":"https://doi.org/10.1145/3533692.3533694","url":null,"abstract":"The idea of \"intersectionality\" seeks to capture both the structural and dynamic consequences of the interaction between two or more forms of discrimination or systems of subordination. It specifically addresses the manner in which racism, patriarchy, economic disadvantages and other discriminatory systems contribute to create layers of inequality that structures the relative positions of women and men, races, and other groups. Moreover, it addresses the way that specific acts and policies create burdens that flow along these intersecting axes contributing actively to create a dynamic of disempowerment. (United Nations, 2000)","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77823296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Are We Doing Enough? 我们做得够不够?
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2022-01-24 DOI: 10.1145/3514097.3514099
K. D. Joshi
The obligation to tackle biases and injustices rooted in the publishing ecosystem has reached the academic communities' consciousness (Royal Society, 2022; APA, 2021; Nature, 2022). Similarly, the IS community is institutionalizing governance mechanisms to demonstrate its commitment to Diversity, Equity and Inclusion (DEI) (Burton-Jones & Sarker, 2021; Association for Information Systems, 2021), in hopes of reversing the unwanted effects of explicit and implicit biases in communicating and publishing IS scholarship.
解决根植于出版生态系统的偏见和不公正的义务已经达到了学术界的意识(皇家学会,2022;APA, 2021;自然,2022)。同样,信息系统社区正在将治理机制制度化,以表明其对多样性、公平和包容(DEI)的承诺(Burton-Jones & Sarker, 2021;信息系统协会(Association for Information Systems, 2021),希望扭转信息系统学术交流和出版中显性和隐性偏见的不良影响。
{"title":"Are We Doing Enough?","authors":"K. D. Joshi","doi":"10.1145/3514097.3514099","DOIUrl":"https://doi.org/10.1145/3514097.3514099","url":null,"abstract":"The obligation to tackle biases and injustices rooted in the publishing ecosystem has reached the academic communities' consciousness (Royal Society, 2022; APA, 2021; Nature, 2022). Similarly, the IS community is institutionalizing governance mechanisms to demonstrate its commitment to Diversity, Equity and Inclusion (DEI) (Burton-Jones & Sarker, 2021; Association for Information Systems, 2021), in hopes of reversing the unwanted effects of explicit and implicit biases in communicating and publishing IS scholarship.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84833196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects of Organizational Controls on Employees' Cyber-loafing 组织控制对员工网络闲逛的影响
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2022-01-24 DOI: 10.1145/3514097.3514102
X. Luo, Feng Xu, Junmei Zhang, Shan Xiao, B. Xue
Cyber-loafing is a workplace deviant behavior that may impose perennial losses and security threats to organizations. Due to the destructive impact, organizations take controls to manage employees' cyber-loafing behavior. While previous research concerning these cyber-loafing controls has yielded inconsistent results, this research further advances this line of research through two primarily adopted organizational controls: computer monitoring and Internet usage policy. We contend that the inconsistent results of the effects of computer monitoring and Internet usage policy on cyber-loafing behavior are due to ignoring the influence of individual differences. Motivated thus, we draw on pertaining literature of trait mindfulness to propose that trait mindfulness moderates the effect of perceived computer monitoring and perceived Internet usage policy on behavioral automaticity towards cyber-loafing, which leads to employees' cyber-loafing behavior. In essence, this paper sheds new light on the relationships amid organizational controls, cyber-loafing behavior, and the moderating effects of trait mindfulness. 450 responses were collected to test these hypotheses. Our results show that trait mindfulness enhances the negative effect of perceived Internet usage policy on behavioral automaticity towards cyber-loafing. In addition, we find out that trait mindfulness has an indirect effect on employees' cyber-loafing behavior by reducing behavioral automaticity.
网络闲逛是一种职场越轨行为,可能会给组织带来长期的损失和安全威胁。由于破坏性的影响,组织采取控制措施来管理员工的网络闲逛行为。虽然之前关于这些网络闲逛控制的研究得出了不一致的结果,但本研究通过两种主要采用的组织控制:计算机监控和互联网使用政策,进一步推进了这条研究路线。我们认为,计算机监控和互联网使用政策对网络闲逛行为的影响结果不一致是由于忽视了个体差异的影响。因此,我们借鉴特质正念的相关文献,提出特质正念调节感知的计算机监控和感知的网络使用政策对网络闲逛行为自动性的影响,从而导致员工的网络闲逛行为。从本质上讲,本研究揭示了组织控制、网络闲逛行为以及特质正念的调节作用之间的关系。我们收集了450份回复来验证这些假设。结果表明,特质正念增强了网络使用政策感知对网络闲逛行为自动性的负向影响。此外,我们发现特质正念通过降低行为自动性而间接影响员工的网络闲逛行为。
{"title":"Effects of Organizational Controls on Employees' Cyber-loafing","authors":"X. Luo, Feng Xu, Junmei Zhang, Shan Xiao, B. Xue","doi":"10.1145/3514097.3514102","DOIUrl":"https://doi.org/10.1145/3514097.3514102","url":null,"abstract":"Cyber-loafing is a workplace deviant behavior that may impose perennial losses and security threats to organizations. Due to the destructive impact, organizations take controls to manage employees' cyber-loafing behavior. While previous research concerning these cyber-loafing controls has yielded inconsistent results, this research further advances this line of research through two primarily adopted organizational controls: computer monitoring and Internet usage policy. We contend that the inconsistent results of the effects of computer monitoring and Internet usage policy on cyber-loafing behavior are due to ignoring the influence of individual differences. Motivated thus, we draw on pertaining literature of trait mindfulness to propose that trait mindfulness moderates the effect of perceived computer monitoring and perceived Internet usage policy on behavioral automaticity towards cyber-loafing, which leads to employees' cyber-loafing behavior. In essence, this paper sheds new light on the relationships amid organizational controls, cyber-loafing behavior, and the moderating effects of trait mindfulness. 450 responses were collected to test these hypotheses. Our results show that trait mindfulness enhances the negative effect of perceived Internet usage policy on behavioral automaticity towards cyber-loafing. In addition, we find out that trait mindfulness has an indirect effect on employees' cyber-loafing behavior by reducing behavioral automaticity.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85572369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Transformational IT Leaders and Digital Innovation 转型的IT领导者和数字创新
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2022-01-24 DOI: 10.1145/3514097.3514104
L. Pittenger, N. Berente, James Gaskin
Does formal IT governance encourage innovation in the traditional domains of the IT function at the expense of new forms of "digital" innovation? We report on a study of 158 IT managers and leaders to understand the conditions under which transformational IT leadership can drive innovation in traditional forms of IT, as well as in the emerging "digital" domain. We find that highly formal IT governance practices can reduce ability of transformational IT managers and leaders to innovate in both domains, and this effect is greater for digital innovation. In stable cultures the moderation effect was strengthened, while insignificant in change cultures. We distinguish between IT innovation and digital innovation and operationalize this distinction, finding that in contexts with stability culture, the moderation is stronger for digital innovation than for traditional IT innovation.
正式的IT治理是否以牺牲新形式的“数字”创新为代价,鼓励传统IT功能领域的创新?我们报告了一项对158位IT经理和领导者的研究,以了解转型IT领导在传统IT形式以及新兴“数字”领域推动创新的条件。我们发现,高度正式的IT治理实践会降低转型IT经理和领导者在这两个领域的创新能力,这种影响对数字创新的影响更大。在稳定的文化中,调节效应得到加强,而在变化的文化中则不明显。我们区分了IT创新和数字创新,并对这一区分进行了操作,发现在稳定文化背景下,数字创新的适度性强于传统IT创新。
{"title":"Transformational IT Leaders and Digital Innovation","authors":"L. Pittenger, N. Berente, James Gaskin","doi":"10.1145/3514097.3514104","DOIUrl":"https://doi.org/10.1145/3514097.3514104","url":null,"abstract":"Does formal IT governance encourage innovation in the traditional domains of the IT function at the expense of new forms of \"digital\" innovation? We report on a study of 158 IT managers and leaders to understand the conditions under which transformational IT leadership can drive innovation in traditional forms of IT, as well as in the emerging \"digital\" domain. We find that highly formal IT governance practices can reduce ability of transformational IT managers and leaders to innovate in both domains, and this effect is greater for digital innovation. In stable cultures the moderation effect was strengthened, while insignificant in change cultures. We distinguish between IT innovation and digital innovation and operationalize this distinction, finding that in contexts with stability culture, the moderation is stronger for digital innovation than for traditional IT innovation.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83314157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Knowledge Accumulation in Design Science Research 设计科学研究中的知识积累
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2022-01-24 DOI: 10.1145/3514097.3514100
Stefan Reining, F. Ahlemann, B. Mueller, Rahul Thakurta
Design science research (DSR) is increasingly prominent in the information systems discipline. However, despite a lively discourse, and methodical and conceptual advances notwithstanding, DSR contributions are rarely cumulative and mostly remain isolated. This lack of cumulative research impedes scientific progress and practical impact. Our goal in this paper is to help establish a cumulative tradition in DSR by proposing (1) a general, consensus-oriented, evolutionary process model of scientific progress based on a synthesis of different streams in the philosophy of science, (2) quality criteria for DSR contributions corresponding to the individual steps in the process model, (3) actions that the IS community as a whole can take to facilitate adherence to these quality criteria. We expect that our work can pave the way towards developing a more cumulative research tradition in DSR and thereby foster genuine scientific progress in the field.
设计科学研究(DSR)在信息系统学科中日益突出。然而,尽管有生动的论述,尽管有方法和概念上的进步,但DSR的贡献很少是累积的,而且大多是孤立的。这种累积研究的缺乏阻碍了科学进步和实际影响。我们在本文中的目标是通过提出以下建议来帮助建立DSR的累积传统:(1)基于科学哲学中不同流的综合的一般的、以共识为导向的、科学进步的进化过程模型;(2)与过程模型中各个步骤相对应的DSR贡献的质量标准;(3)为促进遵守这些质量标准,is社区作为一个整体可以采取的行动。我们期望我们的工作能够为在DSR中发展一个更加累积的研究传统铺平道路,从而促进该领域真正的科学进步。
{"title":"Knowledge Accumulation in Design Science Research","authors":"Stefan Reining, F. Ahlemann, B. Mueller, Rahul Thakurta","doi":"10.1145/3514097.3514100","DOIUrl":"https://doi.org/10.1145/3514097.3514100","url":null,"abstract":"Design science research (DSR) is increasingly prominent in the information systems discipline. However, despite a lively discourse, and methodical and conceptual advances notwithstanding, DSR contributions are rarely cumulative and mostly remain isolated. This lack of cumulative research impedes scientific progress and practical impact. Our goal in this paper is to help establish a cumulative tradition in DSR by proposing (1) a general, consensus-oriented, evolutionary process model of scientific progress based on a synthesis of different streams in the philosophy of science, (2) quality criteria for DSR contributions corresponding to the individual steps in the process model, (3) actions that the IS community as a whole can take to facilitate adherence to these quality criteria. We expect that our work can pave the way towards developing a more cumulative research tradition in DSR and thereby foster genuine scientific progress in the field.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88112129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions 信息系统研究中威慑理论的常见误区及未来研究方向
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2022-01-24 DOI: 10.1145/3514097.3514101
M. Siponen, Wael Soliman, Anthony Vance
In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of IS research applying DT highlights that many fundamental assumptions of DT are unrecognized and therefore unexamined. This may have resulted in misunderstandings and conceptual confusions regarding some of the basic concepts of DT. For example, some IS studies confuse general deterrence with specific deterrence or do not recognize the difference between the two. Moreover, these fundamental assumptions, when directly examined, may provide important information about the applicability of DT in certain IS security contexts. This research commentary aims to identify and discuss some of the fundamental assumptions of DT and their implications for IS research. By examining these assumptions, IS researchers can study the previously unexplored aspects of DT in different IS contexts. Further, by recognizing these assumptions, IS scholars can revise them and build new variants of DT to better account for specific characteristics of IS behaviors and contexts.
20世纪80年代,信息系统(IS)从犯罪学领域借用威慑理论(DT)来解释信息安全行为(或意图)。今天,DT是is安全研究中最常用的理论之一。我们对应用DT的IS研究的回顾强调了DT的许多基本假设未被认识,因此未被检验。这可能会导致关于DT的一些基本概念的误解和概念混淆。例如,一些IS研究混淆了一般威慑和特定威慑,或者不承认两者之间的区别。此外,当直接检查这些基本假设时,可以提供关于DT在某些IS安全环境中的适用性的重要信息。本研究评论旨在识别和讨论DT的一些基本假设及其对IS研究的影响。通过检查这些假设,IS研究人员可以在不同的IS背景下研究以前未被探索的DT方面。此外,通过认识到这些假设,IS学者可以修改它们并构建新的DT变体,以更好地解释IS行为和背景的特定特征。
{"title":"Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions","authors":"M. Siponen, Wael Soliman, Anthony Vance","doi":"10.1145/3514097.3514101","DOIUrl":"https://doi.org/10.1145/3514097.3514101","url":null,"abstract":"In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of IS research applying DT highlights that many fundamental assumptions of DT are unrecognized and therefore unexamined. This may have resulted in misunderstandings and conceptual confusions regarding some of the basic concepts of DT. For example, some IS studies confuse general deterrence with specific deterrence or do not recognize the difference between the two. Moreover, these fundamental assumptions, when directly examined, may provide important information about the applicability of DT in certain IS security contexts. This research commentary aims to identify and discuss some of the fundamental assumptions of DT and their implications for IS research. By examining these assumptions, IS researchers can study the previously unexplored aspects of DT in different IS contexts. Further, by recognizing these assumptions, IS scholars can revise them and build new variants of DT to better account for specific characteristics of IS behaviors and contexts.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":null,"pages":null},"PeriodicalIF":2.8,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90032605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Data Base for Advances in Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1