首页 > 最新文献

Data Base for Advances in Information Systems最新文献

英文 中文
Privacy Maintenance in Self-Digitization 自我数字化中的隐私维护
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2021-04-28 DOI: 10.1145/3462766.3462769
F. Bélanger, Robert E. Crossler, John Correia
Individuals are increasingly using personal Internet of Things (IoT) devices that digitize their day-to-day lives. Those devices, however, often require substantial personal information to generate their intended benefits. For example, fitness technologies collect health, sleep, personal, and a vast array of other information ubiquitously, creating possible privacy issues for the users when fitness technology platform providers store or share their information, whether users know this or not. To explore the role of privacy perceptions in the context of continued use of fitness technologies, this study collected data from 212 fitness tracker users. We find empirical support for the importance of privacy perceptions in a user's intention to continue to use their fitness tracker. More specifically, consistent with privacy calculus research, privacy concern is negatively related to willingness to disclose information while perceived benefit is positively related to it. As an extension to calculus variables, users' expectations towards the data sharing practices of organizations also influences their willingness to disclose information. Importantly, willingness to disclose information has a direct effect on continued use intentions but also moderates the relationship between perceived benefit and users' intentions to continue using a fitness tracker. We discuss the implications of these findings for research and practice.
个人越来越多地使用个人物联网(IoT)设备,将他们的日常生活数字化。然而,这些设备通常需要大量的个人信息才能产生预期的好处。例如,健身技术无处不在地收集健康、睡眠、个人和大量其他信息,当健身技术平台提供商存储或共享他们的信息时,无论用户是否知道,都可能给用户带来隐私问题。为了探讨隐私感知在持续使用健身技术的背景下的作用,本研究收集了212名健身追踪器用户的数据。我们发现经验支持隐私感知在用户继续使用健身追踪器的意图中的重要性。更具体地说,与隐私微积分研究一致,隐私关注与信息披露意愿负相关,而感知利益与信息披露意愿正相关。作为微积分变量的延伸,用户对组织数据共享实践的期望也会影响其信息披露意愿。重要的是,信息披露意愿对持续使用意愿有直接影响,但也会调节感知收益与用户继续使用健身追踪器意愿之间的关系。我们将讨论这些发现对研究和实践的影响。
{"title":"Privacy Maintenance in Self-Digitization","authors":"F. Bélanger, Robert E. Crossler, John Correia","doi":"10.1145/3462766.3462769","DOIUrl":"https://doi.org/10.1145/3462766.3462769","url":null,"abstract":"Individuals are increasingly using personal Internet of Things (IoT) devices that digitize their day-to-day lives. Those devices, however, often require substantial personal information to generate their intended benefits. For example, fitness technologies collect health, sleep, personal, and a vast array of other information ubiquitously, creating possible privacy issues for the users when fitness technology platform providers store or share their information, whether users know this or not. To explore the role of privacy perceptions in the context of continued use of fitness technologies, this study collected data from 212 fitness tracker users. We find empirical support for the importance of privacy perceptions in a user's intention to continue to use their fitness tracker. More specifically, consistent with privacy calculus research, privacy concern is negatively related to willingness to disclose information while perceived benefit is positively related to it. As an extension to calculus variables, users' expectations towards the data sharing practices of organizations also influences their willingness to disclose information. Importantly, willingness to disclose information has a direct effect on continued use intentions but also moderates the relationship between perceived benefit and users' intentions to continue using a fitness tracker. We discuss the implications of these findings for research and practice.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"38 1","pages":"7 - 24"},"PeriodicalIF":2.8,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82154862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Famine of Riches in Scholarly Publication 学术出版物的财富匮乏
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2021-04-28 DOI: 10.1145/3462766.3462768
T. Stafford
I have been editing for a while. Long enough to have witnessed the evolution from pre-digital journals to the post-digital pure play. I negotiated and obtained the first online review system for this fine journal, back in 2006 when I was building my first proposal to edit The DATA BASE for Advances in Information Systems. I felt at the time that I might be a tad late coming to the digital field, seeing that the association I belonged to had already launched two digital pure-play publications which appeared to be destined for notice.
我做编辑有一段时间了。足够长的时间来见证从前数字期刊到后数字纯游戏的演变。早在2006年,当我为编辑《信息系统进展数据库》(the DATA BASE for Advances in Information Systems)撰写第一份提案时,我就为这本优秀的期刊谈判并获得了第一个在线评审系统。当时我觉得我进入数字领域可能有点晚了,因为我所属的协会已经推出了两本似乎注定要引起注意的纯数字出版物。
{"title":"A Famine of Riches in Scholarly Publication","authors":"T. Stafford","doi":"10.1145/3462766.3462768","DOIUrl":"https://doi.org/10.1145/3462766.3462768","url":null,"abstract":"I have been editing for a while. Long enough to have witnessed the evolution from pre-digital journals to the post-digital pure play. I negotiated and obtained the first online review system for this fine journal, back in 2006 when I was building my first proposal to edit The DATA BASE for Advances in Information Systems. I felt at the time that I might be a tad late coming to the digital field, seeing that the association I belonged to had already launched two digital pure-play publications which appeared to be destined for notice.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"26 1","pages":"5 - 6"},"PeriodicalIF":2.8,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73405633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Job Satisfaction of IT Workers in East Asia 东亚地区IT工作者的工作满意度研究
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2021-04-28 DOI: 10.1145/3462766.3462772
Benjamin Yeo, A. Serenko, Prashant C. Palvia, O. Sato, Hiroshi Sasaki, Jie Yu, Yue Guo
The purpose of this study is to explore the drivers of job satisfaction of IT workers in the East Asian context, particularly in Taiwan, Japan, and China. Using data collected from IT workers, decision tree inductions were employed to identify the predictors of job satisfaction. Results indicate that the level of education has no effect on job satisfaction. Overall, higher uncertainty avoidance results in lower job satisfaction, and more experienced IT workers appear to be more satisfied. In Taiwan, longer serving IT workers, who are likely to hold more senior positions and spend more time on the job, are more satisfied with their jobs. Similarly, in Japan, older IT workers are more satisfied. In China, job satisfaction of IT workers differs across job roles and industries. It is recommended that management practices and policies in Taiwan focus on bridging gaps between longer serving and newer IT workers in terms of their ability to handle ambiguous work situations; whereas in Japan, these should focus on providing work flexibility and stress management programs to allow room for family support. In China, these should be tailored to specific job roles and industries in view of their different experiences with job satisfaction determinants.
本研究旨在探讨东亚地区,特别是台湾、日本和中国的资讯科技工作者工作满意度的驱动因素。利用从IT工作者收集的数据,决策树归纳被用来识别工作满意度的预测因子。结果表明,教育程度对工作满意度没有影响。总体而言,较高的不确定性规避导致较低的工作满意度,更有经验的IT工作者似乎更满意。在台湾,服务时间较长的IT工作者,可能会担任更高的职位,花更多的时间在工作上,他们对自己的工作更满意。类似地,在日本,年龄较大的IT工作者更满意。在中国,IT工作者的工作满意度因工作角色和行业的不同而不同。我们建议台湾的管理实务与政策,应著重于缩短服务时间较长的资讯科技工作者与新入职的资讯科技工作者在处理模糊工作情境的能力上的差距;而在日本,这些措施应该侧重于提供工作灵活性和压力管理计划,为家庭支持留出空间。在中国,鉴于工作满意度决定因素的不同经验,这些应针对具体的工作角色和行业进行量身定制。
{"title":"Job Satisfaction of IT Workers in East Asia","authors":"Benjamin Yeo, A. Serenko, Prashant C. Palvia, O. Sato, Hiroshi Sasaki, Jie Yu, Yue Guo","doi":"10.1145/3462766.3462772","DOIUrl":"https://doi.org/10.1145/3462766.3462772","url":null,"abstract":"The purpose of this study is to explore the drivers of job satisfaction of IT workers in the East Asian context, particularly in Taiwan, Japan, and China. Using data collected from IT workers, decision tree inductions were employed to identify the predictors of job satisfaction. Results indicate that the level of education has no effect on job satisfaction. Overall, higher uncertainty avoidance results in lower job satisfaction, and more experienced IT workers appear to be more satisfied. In Taiwan, longer serving IT workers, who are likely to hold more senior positions and spend more time on the job, are more satisfied with their jobs. Similarly, in Japan, older IT workers are more satisfied. In China, job satisfaction of IT workers differs across job roles and industries. It is recommended that management practices and policies in Taiwan focus on bridging gaps between longer serving and newer IT workers in terms of their ability to handle ambiguous work situations; whereas in Japan, these should focus on providing work flexibility and stress management programs to allow room for family support. In China, these should be tailored to specific job roles and industries in view of their different experiences with job satisfaction determinants.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"37 1","pages":"94 - 126"},"PeriodicalIF":2.8,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85338793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Protection Motivation Theory in Information Systems Security Research 信息系统安全研究中的保护动机理论
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2021-04-28 DOI: 10.1145/3462766.3462770
Steffi Haag, M. Siponen, Fufan Liu
Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.
保护动机理论(PMT)是研究信息安全行为最常用的理论之一。我们系统地回顾了PMT在信息系统(IS)安全中的应用,并将其与几十年来在心理学中的应用进行了比较,确定了信息系统安全研究中尚未研究的五类重要问题。讨论这些问题,为什么他们是相关的和重要的IS安全,并在多大程度上IS研究没有考虑到他们,提供了新的研究机会,与PMT和IS安全威胁的研究。我们建议未来的研究如何处理每个开放的问题,为定量和定性的IS学者提供新的路线图。
{"title":"Protection Motivation Theory in Information Systems Security Research","authors":"Steffi Haag, M. Siponen, Fufan Liu","doi":"10.1145/3462766.3462770","DOIUrl":"https://doi.org/10.1145/3462766.3462770","url":null,"abstract":"Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"54 1","pages":"25 - 67"},"PeriodicalIF":2.8,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74585487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Toward a Unified View of Dynamic Information Security Behaviors 动态信息安全行为的统一观
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2021-01-22 DOI: 10.1145/3447934.3447940
Canchu Lin, X. Luo
Extant information systems security research identified and examined a variety of individual as well as organizational factors influencing information security behaviors, but rarely offered sufficient theoretical insight into the interaction of the individual factors with the organizational context in impacting information security behaviors. To fill this gap, this study proposes a theoretical framework that builds on the concepts of organizational culture and sensemaking to show that: 1) information security behaviors are outcomes of sensemaking; and 2) sensemaking is enabled as well as constrained by organizational culture. This study further epitomizes that information security diagnosing, solving, and performing behaviors emerge as outcomes of sensemaking about information security during the organization's interactions with technology. Theoretical and pragmatic contributions of this framework and future research directions are also demonstrated.
现有的信息系统安全研究识别并考察了影响信息安全行为的各种个人和组织因素,但很少对影响信息安全行为的个人因素与组织背景的相互作用提供足够的理论见解。为了填补这一空白,本研究提出了一个建立在组织文化和语义构建概念基础上的理论框架,表明:1)信息安全行为是语义构建的结果;2)组织文化使语义生成成为可能,同时也制约着语义生成。本研究进一步概括了信息安全诊断、解决和执行行为是在组织与技术交互过程中对信息安全产生意义的结果。最后指出了该框架的理论和实用贡献以及未来的研究方向。
{"title":"Toward a Unified View of Dynamic Information Security Behaviors","authors":"Canchu Lin, X. Luo","doi":"10.1145/3447934.3447940","DOIUrl":"https://doi.org/10.1145/3447934.3447940","url":null,"abstract":"Extant information systems security research identified and examined a variety of individual as well as organizational factors influencing information security behaviors, but rarely offered sufficient theoretical insight into the interaction of the individual factors with the organizational context in impacting information security behaviors. To fill this gap, this study proposes a theoretical framework that builds on the concepts of organizational culture and sensemaking to show that: 1) information security behaviors are outcomes of sensemaking; and 2) sensemaking is enabled as well as constrained by organizational culture. This study further epitomizes that information security diagnosing, solving, and performing behaviors emerge as outcomes of sensemaking about information security during the organization's interactions with technology. Theoretical and pragmatic contributions of this framework and future research directions are also demonstrated.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"60 1","pages":"65 - 90"},"PeriodicalIF":2.8,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85861900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
No Good Deed Goes Unpunished 做好事没有不受惩罚的
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2021-01-22 DOI: 10.1145/3447934.3447936
Deborah J. Armstrong
As we closed out a memorable 2020 and look to the New Year, we might say that not much good has come out of this year. But as a Monty Python fan, I love the ditty from The Life of Brian movie, "Always Look on the Bright Side of Life." While the pandemic has taken much, it has also provided opportunities to explore new ways of learning, working, and being in community. For me, the pandemic has highlighted a fact I think we have all long suspected: the current journal peer review process is broken-it's unsustainable.
当我们结束了令人难忘的2020年,展望新的一年,我们可能会说,今年没有什么好结果。但作为巨蟒剧团的粉丝,我喜欢电影《布莱恩的一生》中的那首小调,“总是看到生活的光明面。”虽然大流行造成了很大损失,但它也为探索新的学习、工作和社区生活方式提供了机会。对我来说,这场大流行凸显了一个我认为我们都怀疑已久的事实:目前的期刊同行评议程序已经失灵——它是不可持续的。
{"title":"No Good Deed Goes Unpunished","authors":"Deborah J. Armstrong","doi":"10.1145/3447934.3447936","DOIUrl":"https://doi.org/10.1145/3447934.3447936","url":null,"abstract":"As we closed out a memorable 2020 and look to the New Year, we might say that not much good has come out of this year. But as a Monty Python fan, I love the ditty from The Life of Brian movie, \"Always Look on the Bright Side of Life.\" While the pandemic has taken much, it has also provided opportunities to explore new ways of learning, working, and being in community. For me, the pandemic has highlighted a fact I think we have all long suspected: the current journal peer review process is broken-it's unsustainable.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"31 1","pages":"8 - 9"},"PeriodicalIF":2.8,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80240568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Usefulness of the Two-Step Normality Transformation in Retesting Existing Theories 两步正态变换在重新检验现有理论中的作用
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2021-01-22 DOI: 10.1145/3447934.3447939
Gary F. Templeton, Michael Brian Pope, Laurie L. Burney
The Two-Step normality transformation has been shown to reliably transform continuous variables toward normality. The procedure offers researchers a capable alternative to more prominent methods, such as winsorization, ranking, and power transformations. We demonstrate its utility in the context of the Productivity Paradox literature stream, which is renowned for inconsistent results. This paper demonstrates that the Two-Step normality transformation, which has not been used in Productivity Paradox research, may produce greater goodness-of-fit and affect theoretical understandings on the topic. We use a classic Productivity Paradox dataset to show that compared to the prominent normality transformations, the Two-Step produces unique findings, including 1) regression coefficients more closely resembling the original data, 2) different effect sizes and significance levels, and 3) strengthening evidence for fundamental theories in Productivity Paradox literature. We demonstrate results that challenge uncertainties about the relationship between IT investment and firm performance. Our results imply that the Two-Step procedure should be considered a viable transformation option in future information systems research.
两步正态变换已被证明可以可靠地将连续变量转换为正态。该程序为研究人员提供了一个有能力的替代更突出的方法,如winsorization,排序和权力转换。我们在生产力悖论文献流的背景下展示了它的实用性,该文献流以不一致的结果而闻名。本文证明,在生产率悖论研究中尚未使用的两步正态变换可能产生更大的拟合优度,并影响对该主题的理论理解。我们使用经典的生产率悖论数据集来显示,与突出的正态变换相比,两步法产生了独特的发现,包括1)回归系数更接近原始数据,2)不同的效应大小和显著性水平,以及3)加强了生产率悖论文献中基本理论的证据。我们展示的结果挑战了IT投资与企业绩效之间关系的不确定性。我们的研究结果表明,在未来的信息系统研究中,两步法应被视为一种可行的转换选择。
{"title":"The Usefulness of the Two-Step Normality Transformation in Retesting Existing Theories","authors":"Gary F. Templeton, Michael Brian Pope, Laurie L. Burney","doi":"10.1145/3447934.3447939","DOIUrl":"https://doi.org/10.1145/3447934.3447939","url":null,"abstract":"The Two-Step normality transformation has been shown to reliably transform continuous variables toward normality. The procedure offers researchers a capable alternative to more prominent methods, such as winsorization, ranking, and power transformations. We demonstrate its utility in the context of the Productivity Paradox literature stream, which is renowned for inconsistent results. This paper demonstrates that the Two-Step normality transformation, which has not been used in Productivity Paradox research, may produce greater goodness-of-fit and affect theoretical understandings on the topic. We use a classic Productivity Paradox dataset to show that compared to the prominent normality transformations, the Two-Step produces unique findings, including 1) regression coefficients more closely resembling the original data, 2) different effect sizes and significance levels, and 3) strengthening evidence for fundamental theories in Productivity Paradox literature. We demonstrate results that challenge uncertainties about the relationship between IT investment and firm performance. Our results imply that the Two-Step procedure should be considered a viable transformation option in future information systems research.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"38 1","pages":"53 - 64"},"PeriodicalIF":2.8,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73288324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Examining the Adoption of Onlineto- Offline (O2O) 检视线上到线下(O2O)的采用情况
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2021-01-22 DOI: 10.1145/3447934.3447937
Jiwat Ram, A. Manoharan, Siyao Sun
The online-to-offline (O2O) business model is rapidly growing among organizations, yet current knowledge on O2O adoption is predominantly individual focused, with little research on organizational adoption and the factors driving adoption. To address this gap, underpinned by the diffusion of innovation (DOI) theory, this study collected qualitative data (24 semistructured interviews), which were analyzed using content analysis techniques. We found that offline service quality and social network prosperity are some of the factors driving O2O adoption. Surprisingly, inefficient offline marketing was also found to drive O2O adoption, which indicates new challenges posed by the growing online business environment. We found that not all factors can be categorically classified as facilitating or impeding adoption, as some factors (such as operational challenges and costs) could play dichotomous roles of facilitating or impeding in the context of peculiar circumstances. For example, we found cost to be an impeding factor, yet the results also indicated the benefits of cost reduction resulting from O2O adoption, thereby rendering cost a contentious issue. This study extends the application of DOI theory to the O2O adoption stage, and identifies a number of new factors associated with internal/external organizational characteristics, as postulated in the DOI. Managerial implications are discussed.
线上到线下(O2O)商业模式在组织中迅速发展,但目前关于O2O采用的知识主要集中在个人身上,很少有关于组织采用和驱动采用因素的研究。为了解决这一差距,本研究以创新扩散(DOI)理论为基础,收集了定性数据(24个半结构化访谈),并使用内容分析技术对其进行了分析。我们发现,线下服务质量和社交网络的繁荣是推动O2O采用的一些因素。令人惊讶的是,低效的线下营销也被发现推动了O2O的采用,这表明不断增长的在线商业环境带来了新的挑战。我们发现,并不是所有的因素都可以被分类为促进或阻碍采用,因为一些因素(如操作挑战和成本)可以在特殊情况下发挥促进或阻碍的双重作用。例如,我们发现成本是一个阻碍因素,但结果也表明采用O2O带来的成本降低的好处,从而使成本成为一个有争议的问题。本研究将DOI理论的应用扩展到O2O采用阶段,并确定了许多与DOI中假设的内部/外部组织特征相关的新因素。讨论了管理意义。
{"title":"Examining the Adoption of Onlineto- Offline (O2O)","authors":"Jiwat Ram, A. Manoharan, Siyao Sun","doi":"10.1145/3447934.3447937","DOIUrl":"https://doi.org/10.1145/3447934.3447937","url":null,"abstract":"The online-to-offline (O2O) business model is rapidly growing among organizations, yet current knowledge on O2O adoption is predominantly individual focused, with little research on organizational adoption and the factors driving adoption. To address this gap, underpinned by the diffusion of innovation (DOI) theory, this study collected qualitative data (24 semistructured interviews), which were analyzed using content analysis techniques. We found that offline service quality and social network prosperity are some of the factors driving O2O adoption. Surprisingly, inefficient offline marketing was also found to drive O2O adoption, which indicates new challenges posed by the growing online business environment. We found that not all factors can be categorically classified as facilitating or impeding adoption, as some factors (such as operational challenges and costs) could play dichotomous roles of facilitating or impeding in the context of peculiar circumstances. For example, we found cost to be an impeding factor, yet the results also indicated the benefits of cost reduction resulting from O2O adoption, thereby rendering cost a contentious issue. This study extends the application of DOI theory to the O2O adoption stage, and identifies a number of new factors associated with internal/external organizational characteristics, as postulated in the DOI. Managerial implications are discussed.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"97 1","pages":"10 - 26"},"PeriodicalIF":2.8,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89251289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multiple-Motive Heuristic-Systematic Model for Examining How Users Process Android Data and Service Access Notifications 用于检查用户如何处理Android数据和服务访问通知的多动机启发式系统模型
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2021-01-22 DOI: 10.1145/3447934.3447941
T. James, Jennifer L. Ziegelmayer, Arianna Schuler Scott, Grace Fox
Android access notifications are presented to users to obtain permission to access data and services on smartphones. The number of 'unsafe' apps in the Android marketplaces underscores the importance of understanding what factors influence whether users engage in more effortful systematic processing of access notifications. We propose a multiple-motive heuristic-systematic model to examine how different motives impact users' processing modes. We find that the need to be accurate in making decisions (accuracy), the desire to defend preferred positions (defense), and social pressure from others (impression) influence how users process Android access notifications, and they do so in different ways.
Android访问通知是向用户提供访问智能手机上的数据和服务的权限。Android市场中“不安全”应用的数量凸显了了解影响用户是否更努力地系统处理访问通知的因素的重要性。我们提出了一个多动机启发式系统模型来研究不同动机对用户加工模式的影响。我们发现,准确决策的需求(accuracy)、捍卫优先位置的愿望(defense)以及来自他人的社会压力(impression)都会影响用户处理Android访问通知的方式,而且方式不同。
{"title":"A Multiple-Motive Heuristic-Systematic Model for Examining How Users Process Android Data and Service Access Notifications","authors":"T. James, Jennifer L. Ziegelmayer, Arianna Schuler Scott, Grace Fox","doi":"10.1145/3447934.3447941","DOIUrl":"https://doi.org/10.1145/3447934.3447941","url":null,"abstract":"Android access notifications are presented to users to obtain permission to access data and services on smartphones. The number of 'unsafe' apps in the Android marketplaces underscores the importance of understanding what factors influence whether users engage in more effortful systematic processing of access notifications. We propose a multiple-motive heuristic-systematic model to examine how different motives impact users' processing modes. We find that the need to be accurate in making decisions (accuracy), the desire to defend preferred positions (defense), and social pressure from others (impression) influence how users process Android access notifications, and they do so in different ways.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"23 1","pages":"91 - 122"},"PeriodicalIF":2.8,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81741670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
What's Next in Blockchain Research? 区块链研究的下一步是什么?
IF 2.8 4区 管理学 Q2 Business, Management and Accounting Pub Date : 2021-01-05 DOI: 10.1145/3447934.3447938
Horst Treiblmaier, M. Swan, Primavera De Filippi, Mary C Lacity, T. Hardjono, Henry Kim
Distributed ledger technology, frequently designated as 'blockchain,' is evolving from its hype phase toward greater maturity and long-term value creation. Although many academic communities were initially slow to grasp the technology's numerous potential implications, meanwhile a substantial amount of research is dedicated to investigating the development and impact of blockchain and related technologies. As undertaken, most research projects take a specific homogenous perspective, such as a technical or business viewpoint. To date, blockchain research studies are largely missing a bridge between and across academic disciplines. Given the manifold implications of blockchain technology, a fruitful crossdisciplinary exchange is therefore needed. In this paper, we bring together researchers with varying expertise to provide a vision into what may be next in terms of concepts, applications, and research agendas. We consider business, economic, societal, legal, technical, and philosophical viewpoints and propose multiple research questions as well as hypotheses arising from these diverse viewpoints. Simultaneously, we challenge various academic communities to tackle some of the most crucial issues of current blockchain research and to develop a solid foundation for future exploration.
通常被称为“区块链”的分布式账本技术正在从炒作阶段向更成熟和长期价值创造的方向发展。虽然许多学术界最初对这项技术的众多潜在影响的把握很慢,但与此同时,大量的研究致力于调查区块链和相关技术的发展和影响。作为承担,大多数研究项目采取特定的同质的观点,如技术或业务的观点。迄今为止,bbb研究在很大程度上缺乏学科之间和跨学科的桥梁。鉴于区块链技术的多种含义,因此需要进行富有成效的跨学科交流。在本文中,我们汇集了具有不同专业知识的研究人员,以提供关于概念,应用和研究议程的下一个愿景。我们考虑商业、经济、社会、法律、技术和哲学观点,并提出多种研究问题以及从这些不同观点产生的假设。同时,我们挑战不同的学术团体来解决当前区块链研究中一些最关键的问题,并为未来的探索奠定坚实的基础。
{"title":"What's Next in Blockchain Research?","authors":"Horst Treiblmaier, M. Swan, Primavera De Filippi, Mary C Lacity, T. Hardjono, Henry Kim","doi":"10.1145/3447934.3447938","DOIUrl":"https://doi.org/10.1145/3447934.3447938","url":null,"abstract":"Distributed ledger technology, frequently designated as 'blockchain,' is evolving from its hype phase toward greater maturity and long-term value creation. Although many academic communities were initially slow to grasp the technology's numerous potential implications, meanwhile a substantial amount of research is dedicated to investigating the development and impact of blockchain and related technologies. As undertaken, most research projects take a specific homogenous perspective, such as a technical or business viewpoint. To date, blockchain research studies are largely missing a bridge between and across academic disciplines. Given the manifold implications of blockchain technology, a fruitful crossdisciplinary exchange is therefore needed. In this paper, we bring together researchers with varying expertise to provide a vision into what may be next in terms of concepts, applications, and research agendas. We consider business, economic, societal, legal, technical, and philosophical viewpoints and propose multiple research questions as well as hypotheses arising from these diverse viewpoints. Simultaneously, we challenge various academic communities to tackle some of the most crucial issues of current blockchain research and to develop a solid foundation for future exploration.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"332 1","pages":"27 - 52"},"PeriodicalIF":2.8,"publicationDate":"2021-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80535263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
Data Base for Advances in Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1