Eliciting information requirements from users is critical to timely and successful development of information systems. Despite its importance, however, users may not always be willing to cooperate during the requirements gathering process because sharing the required information may be perceived by them as detrimental to their self-interests. In the present research we investigate users' willingness to provide requirements using the Theory of Planned Behavior, ethics, and anticipated regret. We develop and test a model that draws from these three theories. Data were collected from a sample of 130 respondents and analyzed using multiple regression analysis. Results support our hypotheses that behavioral considerations, ethical considerations, and anticipated regret influence users' willingness to provide information requirements. We discuss theoretical and practical contributions of our findings and implications for future research.
{"title":"Users' Willingness to Provide Information Requirements for Systems Development","authors":"Radha Appan, Glenn J. Browne, Sreedhar Madhavaram","doi":"10.1145/3514097.3514103","DOIUrl":"https://doi.org/10.1145/3514097.3514103","url":null,"abstract":"Eliciting information requirements from users is critical to timely and successful development of information systems. Despite its importance, however, users may not always be willing to cooperate during the requirements gathering process because sharing the required information may be perceived by them as detrimental to their self-interests. In the present research we investigate users' willingness to provide requirements using the Theory of Planned Behavior, ethics, and anticipated regret. We develop and test a model that draws from these three theories. Data were collected from a sample of 130 respondents and analyzed using multiple regression analysis. Results support our hypotheses that behavioral considerations, ethical considerations, and anticipated regret influence users' willingness to provide information requirements. We discuss theoretical and practical contributions of our findings and implications for future research.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"71 1","pages":"80 - 105"},"PeriodicalIF":2.8,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84139400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It's been a long year-and-a-half or since the initial outbreak arose down here in Louisiana, right after Mardi Gras 2020, February. New Orleans and its widely attended Mardi Gras looked to be the "spreader event" of our region, it seemed like.
{"title":"Whole Lotta COVID Goin' On","authors":"T. Stafford, Mohamed Y. Tazkarji","doi":"10.1145/3508484.3508486","DOIUrl":"https://doi.org/10.1145/3508484.3508486","url":null,"abstract":"It's been a long year-and-a-half or since the initial outbreak arose down here in Louisiana, right after Mardi Gras 2020, February. New Orleans and its widely attended Mardi Gras looked to be the \"spreader event\" of our region, it seemed like.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"34 1","pages":"7 - 8"},"PeriodicalIF":2.8,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74629318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, data breaches, especially insider data breaches, have become increasingly common. However, there is a limited amount of research on the factors associated with the decrease in users' trust in response to these events. In this study, social role theory and socioemotional selectivity theory are applied to understand the role of age (younger and older), biological (male and female) and cultural (masculinity and femininity) gender, and the four dimensions of privacy concern-collection, secondary use, unauthorized access, and error-on initial trust and the corresponding decrease in trust associated with the three trust beliefs of ability, benevolence, and integrity. A scenario-based approach is used to focus on a case study of an insider breach. The findings also provide helpful insights into the comparative roles of trust builders (e.g., reputation and design) and trust crashers (e.g., privacy concerns) in the process of trust building and trust decrease in different demographics (e.g., older and younger, males and females) for overall trust and trusting beliefs. Theoretical, managerial, and social implications are discussed.
{"title":"Do You Still Trust?","authors":"G. Bansal, Merrill Warkentin","doi":"10.1145/3508484.3508487","DOIUrl":"https://doi.org/10.1145/3508484.3508487","url":null,"abstract":"Recently, data breaches, especially insider data breaches, have become increasingly common. However, there is a limited amount of research on the factors associated with the decrease in users' trust in response to these events. In this study, social role theory and socioemotional selectivity theory are applied to understand the role of age (younger and older), biological (male and female) and cultural (masculinity and femininity) gender, and the four dimensions of privacy concern-collection, secondary use, unauthorized access, and error-on initial trust and the corresponding decrease in trust associated with the three trust beliefs of ability, benevolence, and integrity. A scenario-based approach is used to focus on a case study of an insider breach. The findings also provide helpful insights into the comparative roles of trust builders (e.g., reputation and design) and trust crashers (e.g., privacy concerns) in the process of trust building and trust decrease in different demographics (e.g., older and younger, males and females) for overall trust and trusting beliefs. Theoretical, managerial, and social implications are discussed.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"25 1","pages":"9 - 44"},"PeriodicalIF":2.8,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87400348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Open source software (OSS) is increasingly being developed by hybrid teams that consist of a mix of company employees and volunteer developers. While hybrid OSS teams are becoming more prevalent, they also face unique challenges due to the involvement of different constituents. To address those challenges, this paper develops and validates a new organizing model. Specifically, the paper draws on media synchronicity theory (MST) to theorize that hybrid OSS teams would benefit from adopting an organizing model that involves practicing agile methods and using communication tools with multiple symbols sets and high transmission velocity. The paper also extends MST by conceptualizing the theory's key concept of communication convergence as consisting of two distinct dimensions: affective and cognitive convergence. Using primary survey data from hybrid OSS teams, the paper presents empirical evidence that such an organizing model can enhance those teams' affective convergence and cognitive convergence and, in turn, their development productivity and the quality of the software. In addition, the results show that affective convergence has a stronger impact on hybrid OSS teams' performance than cognitive convergence.
{"title":"Enhancing Hybrid OSS Development Through Agile Methods and High Media Synchronicity","authors":"I. Chengalur-Smith, Saggi Nevo, B. Fitzgerald","doi":"10.1145/3508484.3508490","DOIUrl":"https://doi.org/10.1145/3508484.3508490","url":null,"abstract":"Open source software (OSS) is increasingly being developed by hybrid teams that consist of a mix of company employees and volunteer developers. While hybrid OSS teams are becoming more prevalent, they also face unique challenges due to the involvement of different constituents. To address those challenges, this paper develops and validates a new organizing model. Specifically, the paper draws on media synchronicity theory (MST) to theorize that hybrid OSS teams would benefit from adopting an organizing model that involves practicing agile methods and using communication tools with multiple symbols sets and high transmission velocity. The paper also extends MST by conceptualizing the theory's key concept of communication convergence as consisting of two distinct dimensions: affective and cognitive convergence. Using primary survey data from hybrid OSS teams, the paper presents empirical evidence that such an organizing model can enhance those teams' affective convergence and cognitive convergence and, in turn, their development productivity and the quality of the software. In addition, the results show that affective convergence has a stronger impact on hybrid OSS teams' performance than cognitive convergence.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"6 1","pages":"92 - 118"},"PeriodicalIF":2.8,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89704746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A minimalist view of theory will render it more accessible for a wider range of research questions. More accessible theory will facilitate constant improvement between representations predicting particular relationships among entities of interest in IS and observations of those relationships in practice. This is needed in IS to direct research energy toward knowledge that can lead to more effective and helpful interventions for computing technology stakeholders. The paper also addresses a range of anomalies created by prevailing traditional views of theory, particularly regarding the distinction between theory existence and theory level of support. Discussion includes identifying barriers to conversion to this view of theory as well as criteria for evaluation of proposed new theory.
{"title":"The Philosopher's Corner","authors":"F. Niederman","doi":"10.1145/3508484.3508491","DOIUrl":"https://doi.org/10.1145/3508484.3508491","url":null,"abstract":"A minimalist view of theory will render it more accessible for a wider range of research questions. More accessible theory will facilitate constant improvement between representations predicting particular relationships among entities of interest in IS and observations of those relationships in practice. This is needed in IS to direct research energy toward knowledge that can lead to more effective and helpful interventions for computing technology stakeholders. The paper also addresses a range of anomalies created by prevailing traditional views of theory, particularly regarding the distinction between theory existence and theory level of support. Discussion includes identifying barriers to conversion to this view of theory as well as criteria for evaluation of proposed new theory.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"28 1","pages":"119 - 130"},"PeriodicalIF":2.8,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88178545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prior studies have primarily used "variable-centered" perspectives to identify factors underlying user responses to social networking site (SNS) addiction, their predictors and outcomes. This paper extends this perspective by taking a person-centered approach to examine (1) the prototypical subpopulations (profiles) of users' extent of SNS addiction and responses to it, (2) how affiliations with these profiles can explain user behaviors toward SNS use, and (3) how personality traits can predict affiliations with these profiles. To this end, we propose a typological theory of SNS addiction and user responses to it via two empirical, personcentered studies. Study 1 draws on survey data from 188 SNS users to develop a typology of users based on the extent of their SNS addiction and their responses to it. It further examines the relations between affiliation with these profiles and users' SNS discontinuance intention, as a typical behavioral response to SNS addiction. Study 2 uses survey data from 284 SNS users to validate the user typology developed in Study 1 and investigate its relations to users' Big Five personality traits. Our findings shed light on a typology of five prototypical profiles of SNS users-cautious, regular, consonant, dissonant, and hooked-who differ in their extent of SNS addiction and their cognitive, emotional, and behavioral responses to it. Our findings also demonstrate how Big Five personality traits can predict user affiliations with these prototypical profiles.
{"title":"Addiction to Social Networking Sites and User Responses","authors":"Hamed Qahri-Saremi, Isaac Vaghefi, Ofir Turel","doi":"10.1145/3508484.3508489","DOIUrl":"https://doi.org/10.1145/3508484.3508489","url":null,"abstract":"Prior studies have primarily used \"variable-centered\" perspectives to identify factors underlying user responses to social networking site (SNS) addiction, their predictors and outcomes. This paper extends this perspective by taking a person-centered approach to examine (1) the prototypical subpopulations (profiles) of users' extent of SNS addiction and responses to it, (2) how affiliations with these profiles can explain user behaviors toward SNS use, and (3) how personality traits can predict affiliations with these profiles. To this end, we propose a typological theory of SNS addiction and user responses to it via two empirical, personcentered studies. Study 1 draws on survey data from 188 SNS users to develop a typology of users based on the extent of their SNS addiction and their responses to it. It further examines the relations between affiliation with these profiles and users' SNS discontinuance intention, as a typical behavioral response to SNS addiction. Study 2 uses survey data from 284 SNS users to validate the user typology developed in Study 1 and investigate its relations to users' Big Five personality traits. Our findings shed light on a typology of five prototypical profiles of SNS users-cautious, regular, consonant, dissonant, and hooked-who differ in their extent of SNS addiction and their cognitive, emotional, and behavioral responses to it. Our findings also demonstrate how Big Five personality traits can predict user affiliations with these prototypical profiles.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"13 1","pages":"65 - 91"},"PeriodicalIF":2.8,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78878870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although initial adoption of an information system has been shown to influence system success, further value can be obtained when end-users move beyond adoption, utilizing more features of the system and integrating it into their work routines. Organizations can increase the post-deployment utilization of their systems by emphasizing continued interaction between developers and end-users. In this study, we develop a research model investigating the influence of shared understanding, faithfulness of appropriation, and consensus on spirit on post-deployment system utilization. Using a sample from a healthcare organization, we show that increased end-user postdeployment interaction with developers supports a shared understanding between the two groups, which ultimately impacts both the routinization and infusion of a system. This study provides a contribution by demonstrating the impact of developer/user interaction in the post-implementation phase of systems development.
{"title":"Toward an Understanding of How Post- Deployment User- Developer Interactions Influence System Utilization","authors":"C. Wolverton, James Burleson","doi":"10.1145/3508484.3508488","DOIUrl":"https://doi.org/10.1145/3508484.3508488","url":null,"abstract":"Although initial adoption of an information system has been shown to influence system success, further value can be obtained when end-users move beyond adoption, utilizing more features of the system and integrating it into their work routines. Organizations can increase the post-deployment utilization of their systems by emphasizing continued interaction between developers and end-users. In this study, we develop a research model investigating the influence of shared understanding, faithfulness of appropriation, and consensus on spirit on post-deployment system utilization. Using a sample from a healthcare organization, we show that increased end-user postdeployment interaction with developers supports a shared understanding between the two groups, which ultimately impacts both the routinization and infusion of a system. This study provides a contribution by demonstrating the impact of developer/user interaction in the post-implementation phase of systems development.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"1 1","pages":"45 - 64"},"PeriodicalIF":2.8,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83724619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Cheah, Christian Nitzl, J. Roldán, G. C. Carrion, S. Gudergan
Conditional mediation (CoMe) analysis integrates mediation and moderation analyses to examine and test hypotheses about how mediated relationships vary as a function of context, boundaries, or individual differences. Although CoMe analysis can be a crucial element of empirical studies that seek to advance theory in information systems, applications of such analysis are scarce, in general, and in partial least squares structural equation modeling (PLS-SEM), in particular. This paper clarifies conceptual fundamentals of and develops guidelines for CoMe analysis within the PLS-SEM context. Furthermore, the paper outlines the illustrative use of CoMe analysis in PLS-SEM and presents detailed step-by-step procedures to do so in the PLS-SEM setting. Overall, this paper provides researchers and practitioners with the required knowledge to properly carry out, report, and interpret CoMe analysis in PLS-SEM.
{"title":"A Primer on the Conditional Mediation Analysis in PLS-SEM","authors":"J. Cheah, Christian Nitzl, J. Roldán, G. C. Carrion, S. Gudergan","doi":"10.1145/3505639.3505645","DOIUrl":"https://doi.org/10.1145/3505639.3505645","url":null,"abstract":"Conditional mediation (CoMe) analysis integrates mediation and moderation analyses to examine and test hypotheses about how mediated relationships vary as a function of context, boundaries, or individual differences. Although CoMe analysis can be a crucial element of empirical studies that seek to advance theory in information systems, applications of such analysis are scarce, in general, and in partial least squares structural equation modeling (PLS-SEM), in particular. This paper clarifies conceptual fundamentals of and develops guidelines for CoMe analysis within the PLS-SEM context. Furthermore, the paper outlines the illustrative use of CoMe analysis in PLS-SEM and presents detailed step-by-step procedures to do so in the PLS-SEM setting. Overall, this paper provides researchers and practitioners with the required knowledge to properly carry out, report, and interpret CoMe analysis in PLS-SEM.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"366 1","pages":"43 - 100"},"PeriodicalIF":2.8,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76406225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Partial least squares (PLS) offers multiple advantages as a composite-based structural equation modeling (SEM) technique. PLS enables scholars to examine the measurement model and structural model simultaneously and often requires fewer assumptions than factor-based SEM techniques. For these reasons and more, PLS offers great power for researchers who wish to use a SEM-based approach to evaluate a research model. However, with the great power of PLS also comes great responsibility. Scholars should determine if PLS is appropriate to use within their context, and scholars should explain their rationale for employing PLS for data analysis. Recognizing the power and responsibility associated with PLS is important since many scholars have called for an abandonment of PLS within the information systems discipline and beyond. We reviewed articles from four premier journals within the information systems field from 2017-2020 that use PLS as an analysis technique. Based on this review, we identify recommendations for scholars seeking to embrace the power and responsibility of using composite-based SEM to analyze research models.
{"title":"With Great Power Comes Great Responsibility","authors":"S. Petter, Yasamin Hadavi","doi":"10.1145/3505639.3505643","DOIUrl":"https://doi.org/10.1145/3505639.3505643","url":null,"abstract":"Partial least squares (PLS) offers multiple advantages as a composite-based structural equation modeling (SEM) technique. PLS enables scholars to examine the measurement model and structural model simultaneously and often requires fewer assumptions than factor-based SEM techniques. For these reasons and more, PLS offers great power for researchers who wish to use a SEM-based approach to evaluate a research model. However, with the great power of PLS also comes great responsibility. Scholars should determine if PLS is appropriate to use within their context, and scholars should explain their rationale for employing PLS for data analysis. Recognizing the power and responsibility associated with PLS is important since many scholars have called for an abandonment of PLS within the information systems discipline and beyond. We reviewed articles from four premier journals within the information systems field from 2017-2020 that use PLS as an analysis technique. Based on this review, we identify recommendations for scholars seeking to embrace the power and responsibility of using composite-based SEM to analyze research models.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"27 1","pages":"10 - 23"},"PeriodicalIF":2.8,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72872235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Researchers are becoming cognizant of the value of conducting predictive analysis using partial least squares structural equation modeling (PLS-SEM) for both the evaluation of overfit and to illustrate the practical value of models. Mediators are a popular mechanism for adding nuance and greater explanatory power to causal models. However, mediators pose a special challenge to generating predictions as they serve a dual role of antecedent and outcome. Solutions for generating predictions from mediated PLS-SEM models have not been suitably explored or documented, nor has there been exploration of whether the added model complexity of such mediators is justified in the light of predictive performance. We address that gap by evaluating methods for generating predictions from mediated models, and propose a simple metric that quantifies the predictive contribution of the mediator (PCM). We conduct Monte Carlo simulations and then apply the methods in an empirical demonstration. We find that there is no simple best solution, but that all three approaches have strengths and weaknesses. Further, the PCM metric performs well to quantify the predictive qualities of the mediator over-and-above the non-mediated alternative. We present guidelines on selecting the most appropriate method and applying PCM for additional evidence to support research conclusions.
{"title":"The Piggy in the Middle","authors":"N. Danks","doi":"10.1145/3505639.3505644","DOIUrl":"https://doi.org/10.1145/3505639.3505644","url":null,"abstract":"Researchers are becoming cognizant of the value of conducting predictive analysis using partial least squares structural equation modeling (PLS-SEM) for both the evaluation of overfit and to illustrate the practical value of models. Mediators are a popular mechanism for adding nuance and greater explanatory power to causal models. However, mediators pose a special challenge to generating predictions as they serve a dual role of antecedent and outcome. Solutions for generating predictions from mediated PLS-SEM models have not been suitably explored or documented, nor has there been exploration of whether the added model complexity of such mediators is justified in the light of predictive performance. We address that gap by evaluating methods for generating predictions from mediated models, and propose a simple metric that quantifies the predictive contribution of the mediator (PCM). We conduct Monte Carlo simulations and then apply the methods in an empirical demonstration. We find that there is no simple best solution, but that all three approaches have strengths and weaknesses. Further, the PCM metric performs well to quantify the predictive qualities of the mediator over-and-above the non-mediated alternative. We present guidelines on selecting the most appropriate method and applying PCM for additional evidence to support research conclusions.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"111 1","pages":"24 - 42"},"PeriodicalIF":2.8,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85775791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}