首页 > 最新文献

Journal of Organizational Computing and Electronic Commerce最新文献

英文 中文
Implementation of an Additional Factor for Secure Authentication in Online Transactions 联机交易中安全认证的附加因素的实现
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-07-29 DOI: 10.1080/10919392.2019.1633123
Vipin Khattri, D. Singh
ABSTRACT To eradicate financial fraud, governments encourage the digitization of financial transactions, which is also reinforced by the digital economy paradigm. Recently, there has been an exponential increase in the number of e-transactions, and the incidence of cyber crimes related to online transaction fraud has also been increasing. To prevent online transaction fraud, the stakeholders of financial-transaction-related companies have implemented various secured authentication and authorization practices at all levels. In this paper, an additional factor for secure authentication for online transactions has been proposed. A third authentication factor, in addition to Personal Identification Number (PIN) and one time password (OTP), has been proposed, which is based on the global positioning system (GPS) location of the user who initiates the transaction. The strategy is to approve / decline the transaction based on a specified distance constraint between the transaction device and the user’s mobile device; this distance is used as an additional authentication factor (third factor) to verify the online transaction. The main objective of this study is to prevent fraudsters from performing online transactions from devices that do not belong to the user and are not currently in the possession of the user. The simulation results show that a high detection rate, i.e., 98.55%, is obtained using the proposed method.
摘要为了根除金融欺诈,政府鼓励金融交易数字化,数字经济范式也加强了这一点。最近,电子交易数量呈指数级增长,与网络交易欺诈有关的网络犯罪发生率也在增加。为了防止网上交易欺诈,金融交易相关公司的利益相关者在各级实施了各种安全认证和授权做法。在本文中,提出了在线交易安全认证的一个附加因素。除了个人识别号(PIN)和一次性密码(OTP)之外,还提出了第三种身份验证因素,该因素基于发起交易的用户的全球定位系统(GPS)位置。该策略是基于交易设备和用户的移动设备之间的指定距离约束来批准/拒绝交易;该距离被用作验证在线交易的附加认证因素(第三因素)。本研究的主要目的是防止欺诈者使用不属于用户且当前不在用户手中的设备进行在线交易。仿真结果表明,该方法具有较高的检测率,即98.55%。
{"title":"Implementation of an Additional Factor for Secure Authentication in Online Transactions","authors":"Vipin Khattri, D. Singh","doi":"10.1080/10919392.2019.1633123","DOIUrl":"https://doi.org/10.1080/10919392.2019.1633123","url":null,"abstract":"ABSTRACT To eradicate financial fraud, governments encourage the digitization of financial transactions, which is also reinforced by the digital economy paradigm. Recently, there has been an exponential increase in the number of e-transactions, and the incidence of cyber crimes related to online transaction fraud has also been increasing. To prevent online transaction fraud, the stakeholders of financial-transaction-related companies have implemented various secured authentication and authorization practices at all levels. In this paper, an additional factor for secure authentication for online transactions has been proposed. A third authentication factor, in addition to Personal Identification Number (PIN) and one time password (OTP), has been proposed, which is based on the global positioning system (GPS) location of the user who initiates the transaction. The strategy is to approve / decline the transaction based on a specified distance constraint between the transaction device and the user’s mobile device; this distance is used as an additional authentication factor (third factor) to verify the online transaction. The main objective of this study is to prevent fraudsters from performing online transactions from devices that do not belong to the user and are not currently in the possession of the user. The simulation results show that a high detection rate, i.e., 98.55%, is obtained using the proposed method.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"258 - 273"},"PeriodicalIF":2.9,"publicationDate":"2019-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1633123","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43501119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Enterprise cybersecurity training and awareness programs: Recommendations for success 企业网络安全培训和意识计划:成功建议
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-07-29 DOI: 10.1080/10919392.2019.1611528
Wu He, Z. Zhang
ABSTRACT To help employees recognize and change their computing security behavior, organizations need to invest in cybersecurity training and awareness programs to encourage their employees’ active engagement in complying with their security policies. However, many organizations’ cybersecurity training and awareness programs fail to achieve their goals as employees feel bored with such training programs and lack enthusiasm to participate in them. Highlighting the criticality of the success of cybersecurity training and awareness programs in organizations, this paper identifies best practices and provides actionable insights (relating cyber awareness to employees’ personal life, reinforcing security procedures and guidelines, instilling a “relaxed alert” state of employees, and minimizing security fatigue for employees) that will help enterprises develop and implement economical, effective, and engaging cybersecurity training and awareness programs.
摘要为了帮助员工识别和改变他们的计算机安全行为,组织需要投资于网络安全培训和意识计划,以鼓励员工积极参与遵守其安全政策。然而,许多组织的网络安全培训和意识计划未能实现其目标,因为员工对此类培训计划感到厌倦,缺乏参与的热情。强调组织中网络安全培训和意识计划成功的关键性,本文确定了最佳实践,并提供了可操作的见解(将网络意识与员工的个人生活联系起来,加强安全程序和指南,向员工灌输“放松警惕”状态,并最大限度地减少员工的安全疲劳),这将有助于企业开发和实施经济、有效、,以及参与网络安全培训和提高认识方案。
{"title":"Enterprise cybersecurity training and awareness programs: Recommendations for success","authors":"Wu He, Z. Zhang","doi":"10.1080/10919392.2019.1611528","DOIUrl":"https://doi.org/10.1080/10919392.2019.1611528","url":null,"abstract":"ABSTRACT To help employees recognize and change their computing security behavior, organizations need to invest in cybersecurity training and awareness programs to encourage their employees’ active engagement in complying with their security policies. However, many organizations’ cybersecurity training and awareness programs fail to achieve their goals as employees feel bored with such training programs and lack enthusiasm to participate in them. Highlighting the criticality of the success of cybersecurity training and awareness programs in organizations, this paper identifies best practices and provides actionable insights (relating cyber awareness to employees’ personal life, reinforcing security procedures and guidelines, instilling a “relaxed alert” state of employees, and minimizing security fatigue for employees) that will help enterprises develop and implement economical, effective, and engaging cybersecurity training and awareness programs.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"249 - 257"},"PeriodicalIF":2.9,"publicationDate":"2019-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1611528","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48733237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD) – A Persuasion and Cognitive Elaboration Perspective 自带设备(BYOD)中的安全策略选择决策——一个说服和认知阐述的视角
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-07-18 DOI: 10.1080/10919392.2019.1639913
Xue Yang, Xinwei Wang, W. Yue, C. Sia, X. Luo
ABSTRACT Bring-Your-Own-Device (BYOD) has gained increased popularity in organizations but may engender information security concerns. To address these concerns, employees are expected to opt-in and comply with organizational BYOD security policy. This study investigates the factors that affect employees’ opt-in decisions with BYOD security policy. Drawing on the theoretical lenses of persuasion and cognitive elaboration, we propose that employees’ cognitive elaborations of BYOD security policy could be affected by the valence of justification of the BYOD security policy, the stringency of BYOD security measures, and the sequence of the introduction of BYOD security policy in relation to employees’ use of personal devices to perform organizational tasks and such cognitive elaborations would in turn affect opt-in decisions. We conducted an experimental survey to test our propositions. The results indicate that positive BYOD security policy justification framing and post-task security policy exposure would lead to more positive cognitive elaboration, decision to opt-in, and compliance with the BYOD security policy. This research has significant implications for security management with respect to the design and implementation of BYOD security policy within an organization according to the nature of security policy and the task requirements.
自带设备(BYOD)在组织中越来越受欢迎,但可能会引起信息安全问题。为了解决这些问题,员工应该选择加入并遵守组织的BYOD安全政策。本研究探讨了影响员工选择加入BYOD安全政策的因素。利用说服和认知阐述的理论视角,我们提出员工对BYOD安全政策的认知阐述会受到BYOD安全政策的正当性、BYOD安全措施的严格程度以及与员工使用个人设备执行组织任务相关的BYOD安全政策的引入顺序的影响,而这种认知阐述反过来又会影响员工的选择决策。我们进行了一项实验性调查来检验我们的主张。结果表明,积极的BYOD安全策略论证框架和任务后安全策略暴露会导致更积极的认知阐述、选择加入决策和遵守BYOD安全策略。该研究对于根据安全策略的性质和任务需求在组织内设计和实施BYOD安全策略的安全管理具有重要意义。
{"title":"Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD) – A Persuasion and Cognitive Elaboration Perspective","authors":"Xue Yang, Xinwei Wang, W. Yue, C. Sia, X. Luo","doi":"10.1080/10919392.2019.1639913","DOIUrl":"https://doi.org/10.1080/10919392.2019.1639913","url":null,"abstract":"ABSTRACT Bring-Your-Own-Device (BYOD) has gained increased popularity in organizations but may engender information security concerns. To address these concerns, employees are expected to opt-in and comply with organizational BYOD security policy. This study investigates the factors that affect employees’ opt-in decisions with BYOD security policy. Drawing on the theoretical lenses of persuasion and cognitive elaboration, we propose that employees’ cognitive elaborations of BYOD security policy could be affected by the valence of justification of the BYOD security policy, the stringency of BYOD security measures, and the sequence of the introduction of BYOD security policy in relation to employees’ use of personal devices to perform organizational tasks and such cognitive elaborations would in turn affect opt-in decisions. We conducted an experimental survey to test our propositions. The results indicate that positive BYOD security policy justification framing and post-task security policy exposure would lead to more positive cognitive elaboration, decision to opt-in, and compliance with the BYOD security policy. This research has significant implications for security management with respect to the design and implementation of BYOD security policy within an organization according to the nature of security policy and the task requirements.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"274 - 293"},"PeriodicalIF":2.9,"publicationDate":"2019-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1639913","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44744651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Negotiation protocol based on ordered weighted averaging and Fuzzy metrics 基于有序加权平均和模糊度量的协商协议
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-07-03 DOI: 10.1080/10919392.2019.1587230
José Leão e Silva Filho, Danielle Costa Morais
ABSTRACT Negotiation Support Systems are used to exchange offers and to improve the negotiation process. Some methods are based on perspectives like heuristics in order to bring the negotiation protocol gradually closer to reality. These approaches can be important in real negotiation as they can help to improve skillsespecially in distributive bargaining. This paper proposes a Negotiation Support framework to provide the negotiator with recommendations on making decisions in a negotiation process. To input this idea into negotiation protocols, this paper suggests that some concepts based on OWA (Ordered Weighted Averaging) and some of its metrics (Orness, Dispersion) be included in the heuristics of a structured negotiation schedule. It is expected that the support provided will aid the negotiator to make decisions during the negotiation process, to learn from the elicitation and his own behavior the results obtained can help the negotiator improving his skills in the negotiation process.
谈判支持系统用于交换报价和改进谈判过程。有些方法是基于启发式等视角,使协商协议逐渐接近现实。这些方法在真正的谈判中很重要,因为它们可以帮助提高技能,尤其是在分配谈判中。本文提出了一个谈判支持框架,为谈判者在谈判过程中的决策提供建议。为了将这一思想输入到协商协议中,本文建议将基于OWA(有序加权平均)的一些概念及其一些度量(Orness, Dispersion)包含在结构化协商时间表的启发式中。预期所提供的支持将帮助谈判者在谈判过程中做出决策,从启发和自己的行为中学习所获得的结果可以帮助谈判者在谈判过程中提高自己的技能。
{"title":"Negotiation protocol based on ordered weighted averaging and Fuzzy metrics","authors":"José Leão e Silva Filho, Danielle Costa Morais","doi":"10.1080/10919392.2019.1587230","DOIUrl":"https://doi.org/10.1080/10919392.2019.1587230","url":null,"abstract":"ABSTRACT Negotiation Support Systems are used to exchange offers and to improve the negotiation process. Some methods are based on perspectives like heuristics in order to bring the negotiation protocol gradually closer to reality. These approaches can be important in real negotiation as they can help to improve skillsespecially in distributive bargaining. This paper proposes a Negotiation Support framework to provide the negotiator with recommendations on making decisions in a negotiation process. To input this idea into negotiation protocols, this paper suggests that some concepts based on OWA (Ordered Weighted Averaging) and some of its metrics (Orness, Dispersion) be included in the heuristics of a structured negotiation schedule. It is expected that the support provided will aid the negotiator to make decisions during the negotiation process, to learn from the elicitation and his own behavior the results obtained can help the negotiator improving his skills in the negotiation process.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"40 1","pages":"190 - 208"},"PeriodicalIF":2.9,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79883990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Systems theoretic process analysis of information security: the case of aadhaar 信息安全的系统理论过程分析:以adhaar为例
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-07-03 DOI: 10.1080/10919392.2019.1598608
P. Tarafdar, I. Bose
ABSTRACT A new way of thinking about cybersecurity is much needed to deal with the complex and dynamic cyber-ecosystem. In this paper, we introduce a systems thinking based approach for solving problems related to cybersecurity. We adapt the powerful safety-hazard analysis method, Systems Theoretic Process Analysis (STPA) based on systems theory to analyze the cybersecurity related features of India’s massive digital identity program, Aadhaar. Our findings produce important insights. On one hand, it helps identify the security gaps of the Aadhaar system, and on the other hand, it provides controls using systems thinking to overcome these gaps. We contribute to understanding the world of cybersecurity practices and develop risk mitigation strategies that can benefit the Aadhaar.
面对复杂、动态的网络生态系统,迫切需要一种新的网络安全思维方式。在本文中,我们介绍了一种基于系统思维的方法来解决与网络安全相关的问题。我们采用基于系统理论的强大的安全危害分析方法,系统理论过程分析(STPA),来分析印度大规模数字身份计划Aadhaar的网络安全相关特征。我们的发现产生了重要的见解。一方面,它有助于识别Aadhaar系统的安全漏洞,另一方面,它提供了使用系统思维来克服这些漏洞的控制。我们致力于了解网络安全实践的世界,并制定有利于Aadhaar的风险缓解策略。
{"title":"Systems theoretic process analysis of information security: the case of aadhaar","authors":"P. Tarafdar, I. Bose","doi":"10.1080/10919392.2019.1598608","DOIUrl":"https://doi.org/10.1080/10919392.2019.1598608","url":null,"abstract":"ABSTRACT A new way of thinking about cybersecurity is much needed to deal with the complex and dynamic cyber-ecosystem. In this paper, we introduce a systems thinking based approach for solving problems related to cybersecurity. We adapt the powerful safety-hazard analysis method, Systems Theoretic Process Analysis (STPA) based on systems theory to analyze the cybersecurity related features of India’s massive digital identity program, Aadhaar. Our findings produce important insights. On one hand, it helps identify the security gaps of the Aadhaar system, and on the other hand, it provides controls using systems thinking to overcome these gaps. We contribute to understanding the world of cybersecurity practices and develop risk mitigation strategies that can benefit the Aadhaar.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"209 - 222"},"PeriodicalIF":2.9,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1598608","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41508374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
USERS’ SOCIOCULTURAL ORIENTATION AND SMART SYSTEMS ACCEPTANCE LINK: DO DEMOGRAPHICS MATTER? 用户的社会文化取向与智能系统接受度的联系:人口统计数据重要吗?
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-07-03 DOI: 10.1080/10919392.2019.1611287
Majharul Talukder, Sultan Alyammahi, Ali M. Quazi, A. Abdullah, Raechel Johns
ABSTRACT This research investigates the impact of sociocultural determinants on people’s perceptions and usage of smart systems in the United Arab Emirates (UAE). This research used the Theory of reasoned action, Unified theory of acceptance and use of technology (UTAUT) and Frambach and Schillewaert’s framework. These theories which focus on the determinants of technology acceptance behavior of users have been widely used in contemporary technology acceptance research. Data were collected from the UAE Ministries of Foreign Affairs, Health, and Economy using structured questionnaires. A total of 357 responses were analyzed using multivariate statistical techniques such as regression analysis and factor analysis. Multiple regression analysis helped to determine the direction of relationships between the constructs representing users’ sociocultural orientation, attitude toward smart systems and acceptable behavior. Factor analysis served to identify the underlying dimensions of the above constructs. The major finding of this research is that cultural values and peers’ influence significantly affect users’ perceptions and applications of technological innovations. Furthermore, the study reveals that users’ age and gender wield critical moderating effects on the relationship between cultural values and attitude toward smart systems. These findings have important implications for acceptance and implementation of smart systems in the UAE which are highlighted in this paper. This paper also identifies the limits of this research and explores the venues of further research in this field.
摘要本研究调查了阿拉伯联合酋长国(UAE)社会文化决定因素对人们对智能系统的感知和使用的影响。本研究采用了理性行动理论、技术接受和使用统一理论以及Frambach和Schillewert的框架。这些关注用户技术接受行为决定因素的理论在当代技术接受研究中得到了广泛应用。数据使用结构化问卷从阿联酋外交部、卫生部和经济部收集。使用多元统计技术,如回归分析和因子分析,共分析了357份回复。多元回归分析有助于确定代表用户社会文化取向、对智能系统的态度和可接受行为的结构之间的关系方向。因子分析用于确定上述结构的潜在维度。本研究的主要发现是,文化价值观和同伴的影响显著影响用户对技术创新的感知和应用。此外,研究表明,用户的年龄和性别对文化价值观和对智能系统的态度之间的关系具有关键的调节作用。这些发现对阿联酋智能系统的接受和实施具有重要意义,本文强调了这一点。本文还指出了这项研究的局限性,并探索了该领域进一步研究的场所。
{"title":"USERS’ SOCIOCULTURAL ORIENTATION AND SMART SYSTEMS ACCEPTANCE LINK: DO DEMOGRAPHICS MATTER?","authors":"Majharul Talukder, Sultan Alyammahi, Ali M. Quazi, A. Abdullah, Raechel Johns","doi":"10.1080/10919392.2019.1611287","DOIUrl":"https://doi.org/10.1080/10919392.2019.1611287","url":null,"abstract":"ABSTRACT This research investigates the impact of sociocultural determinants on people’s perceptions and usage of smart systems in the United Arab Emirates (UAE). This research used the Theory of reasoned action, Unified theory of acceptance and use of technology (UTAUT) and Frambach and Schillewaert’s framework. These theories which focus on the determinants of technology acceptance behavior of users have been widely used in contemporary technology acceptance research. Data were collected from the UAE Ministries of Foreign Affairs, Health, and Economy using structured questionnaires. A total of 357 responses were analyzed using multivariate statistical techniques such as regression analysis and factor analysis. Multiple regression analysis helped to determine the direction of relationships between the constructs representing users’ sociocultural orientation, attitude toward smart systems and acceptable behavior. Factor analysis served to identify the underlying dimensions of the above constructs. The major finding of this research is that cultural values and peers’ influence significantly affect users’ perceptions and applications of technological innovations. Furthermore, the study reveals that users’ age and gender wield critical moderating effects on the relationship between cultural values and attitude toward smart systems. These findings have important implications for acceptance and implementation of smart systems in the UAE which are highlighted in this paper. This paper also identifies the limits of this research and explores the venues of further research in this field.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"223 - 247"},"PeriodicalIF":2.9,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1611287","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45145581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Factors Affecting the Offshore Deployment of Interorganizational Systems in China: A Case Study Analysis 影响我国跨组织系统海外部署的因素:案例分析
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-07-03 DOI: 10.1080/10919392.2019.1583811
Hsin-Lu Chang
ABSTRACT Because of the significant market potential in China, many international enterprises are moving their production line to China. Accompanying production offshoring is the shifting of information systems to ensure that the production processes remain efficient and effective both at home and abroad. However, many enterprises encounter problems while deploying offshore information systems in China, especially when the systems are interorganizational systems (IOS) that span organizational boundaries and involve the management of relationships among participants. Therefore, this paper aims to identify critical success factors of offshore interorganizational systems in China through a case study of a supply chain relationship based on an e-procurement system between a Taiwanese personal computer manufacturer and its Chinese partners. Although this system had been well used by Taiwanese users, the performance of this system in China was relatively unsatisfactory in terms of grant complaints from Chinese users. Based on the relational view of the firm, four IOS-specific relational factors are proposed and examined: (1) IOS-specific assets, (2) IOS knowledge-sharing routines, (3) system complementarity, and (4) IOS governance. The case analysis reveals that effective IOS governance most strongly affects the results of offshoring in China, whereas system complementarity has the least influence.
摘要由于中国市场潜力巨大,许多国际企业正将生产线迁往中国。伴随着生产离岸外包的是信息系统的转变,以确保国内外的生产流程保持高效和有效。然而,许多企业在中国部署离岸信息系统时遇到了问题,尤其是当这些系统是跨组织边界的组织间系统(IOS),涉及参与者之间关系的管理时。因此,本文旨在通过台湾个人电脑制造商与其中国合作伙伴之间基于电子采购系统的供应链关系的案例研究,确定中国离岸组织间系统的关键成功因素。尽管台湾用户很好地使用了该系统,但就中国用户的拨款投诉而言,该系统在中国的表现相对不令人满意。基于公司的关系观,提出并检验了四个内部监督办公室特定的关系因素:(1)内部监督办公室的特定资产,(2)内部监督机构的知识共享程序,(3)系统互补性,以及(4)内部监督办理。案例分析表明,有效的内部监督办公室治理对中国离岸外包结果的影响最大,而系统互补性的影响最小。
{"title":"Factors Affecting the Offshore Deployment of Interorganizational Systems in China: A Case Study Analysis","authors":"Hsin-Lu Chang","doi":"10.1080/10919392.2019.1583811","DOIUrl":"https://doi.org/10.1080/10919392.2019.1583811","url":null,"abstract":"ABSTRACT Because of the significant market potential in China, many international enterprises are moving their production line to China. Accompanying production offshoring is the shifting of information systems to ensure that the production processes remain efficient and effective both at home and abroad. However, many enterprises encounter problems while deploying offshore information systems in China, especially when the systems are interorganizational systems (IOS) that span organizational boundaries and involve the management of relationships among participants. Therefore, this paper aims to identify critical success factors of offshore interorganizational systems in China through a case study of a supply chain relationship based on an e-procurement system between a Taiwanese personal computer manufacturer and its Chinese partners. Although this system had been well used by Taiwanese users, the performance of this system in China was relatively unsatisfactory in terms of grant complaints from Chinese users. Based on the relational view of the firm, four IOS-specific relational factors are proposed and examined: (1) IOS-specific assets, (2) IOS knowledge-sharing routines, (3) system complementarity, and (4) IOS governance. The case analysis reveals that effective IOS governance most strongly affects the results of offshoring in China, whereas system complementarity has the least influence.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"163 - 189"},"PeriodicalIF":2.9,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1583811","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49383405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effective use of analytic DSS and job performance: Looking beyond technology acceptance 有效使用分析DSS和工作绩效:超越技术接受
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-04-03 DOI: 10.1080/10919392.2019.1571756
Damon E. Campbell, Nicholas H. Roberts
ABSTRACT This study extends and test the work done on effective use of information systems (IS) by developing measures for this construct which expands the conceptualization of use beyond the popular technology acceptance model (TAM). Effective use posits dimensions of use (informed action, representational fidelity, and transparent interaction) which are intended to measure a user’s ability to effectively use an IS in a given context. Moving beyond simple adoption and use contexts is an important distinction that expands researcher’s and practitioner’s ability to assess usage effectiveness. In a work context, it is more important to have high performance and effective usage of systems in comparison to just having high usage rates. Therefore this study uses the context of analytic decision support systems (DSS) and tests the relationship between the proposed dimensions of effective use and job performance. A survey (N = 265) of executives with work experience using analytic DSS was conducted to maximize realism and generalizability. This study is the first to empirically test the proposed relationships of effective use to performance. Results indicate that informed action is a significant predictor of individual job performance. However, representational fidelity and transparent interaction are not significant predictors of job performance.
本研究扩展和测试了有效使用信息系统(IS)所做的工作,通过开发这一结构的措施,将使用的概念化扩展到流行的技术接受模型(TAM)之外。有效使用设定了使用的维度(知情行动、再现保真度和透明交互),旨在衡量用户在给定环境中有效使用信息系统的能力。超越简单的采用和使用上下文是一个重要的区别,它扩展了研究人员和实践者评估使用有效性的能力。在工作环境中,与仅仅拥有高使用率相比,拥有高性能和有效的系统使用更为重要。因此,本研究使用分析决策支持系统(DSS)的背景下,并测试了有效使用的维度和工作绩效之间的关系。一项调查(N = 265)高管的工作经验使用分析决策支持系统进行了最大限度的现实性和概括性。本研究首次对有效使用与绩效之间的关系进行了实证检验。结果表明,知情行为是个人工作绩效的重要预测因子。然而,表征保真度和透明互动并不是工作绩效的显著预测因子。
{"title":"Effective use of analytic DSS and job performance: Looking beyond technology acceptance","authors":"Damon E. Campbell, Nicholas H. Roberts","doi":"10.1080/10919392.2019.1571756","DOIUrl":"https://doi.org/10.1080/10919392.2019.1571756","url":null,"abstract":"ABSTRACT This study extends and test the work done on effective use of information systems (IS) by developing measures for this construct which expands the conceptualization of use beyond the popular technology acceptance model (TAM). Effective use posits dimensions of use (informed action, representational fidelity, and transparent interaction) which are intended to measure a user’s ability to effectively use an IS in a given context. Moving beyond simple adoption and use contexts is an important distinction that expands researcher’s and practitioner’s ability to assess usage effectiveness. In a work context, it is more important to have high performance and effective usage of systems in comparison to just having high usage rates. Therefore this study uses the context of analytic decision support systems (DSS) and tests the relationship between the proposed dimensions of effective use and job performance. A survey (N = 265) of executives with work experience using analytic DSS was conducted to maximize realism and generalizability. This study is the first to empirically test the proposed relationships of effective use to performance. Results indicate that informed action is a significant predictor of individual job performance. However, representational fidelity and transparent interaction are not significant predictors of job performance.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"125 - 138"},"PeriodicalIF":2.9,"publicationDate":"2019-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1571756","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43568709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The diffusion of e-participation in public administrations: A systematic literature review 电子参与在公共行政中的传播:系统文献综述
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-04-03 DOI: 10.1080/10919392.2019.1552749
M. Steinbach, J. Sieweke, Stefan Süß
ABSTRACT Research on e-participation has grown significantly in the last years. This review focuses on public administrations, which are central actors in the solicitation and organization of e-participation and in the process of diffusion of more democratic decision-making in government contexts. However, research indicates that public administrations often struggle with technological and organizational changes, which suggests that e-participation initiatives may fail due to barriers within public administrations. Although researchers have paid considerable attention to the diffusion of e-participation in public administrations, research so far is multi-disciplinary and fragmented. The aim of this literature review is to structure and systematize the literature regarding phases of e-participation diffusion (adoption, implementation and institutionalization) and levels of analysis (micro, meso, and macro) to map the extant field of e-participation diffusion research and to provide a starting point for future research. The analysis shows that research has concentrated on the phases of adoption and implementation, and on the external context of public administrations (macro) and the organizational (meso) level. Overall, the review identifies major research gaps and offers avenues for future research.
在过去的几年里,关于电子参与的研究有了显著的增长。这一审查的重点是公共行政部门,它们是征求和组织电子参与以及在政府环境中传播更民主决策过程中的核心行动者。然而,研究表明,公共行政经常与技术和组织变革作斗争,这表明电子参与倡议可能由于公共行政内部的障碍而失败。尽管研究者对电子参与在公共管理中的扩散问题给予了相当的关注,但迄今为止的研究是多学科和碎片化的。本文献综述的目的是对电子参与扩散的阶段(采用、实施和制度化)和分析层次(微观、中观和宏观)的文献进行结构化和系统化,以绘制现有的电子参与扩散研究领域,并为未来的研究提供起点。分析表明,研究集中在采用和执行阶段以及公共行政的外部背景(宏观)和组织(中观)一级。总体而言,该综述确定了主要的研究差距,并为未来的研究提供了途径。
{"title":"The diffusion of e-participation in public administrations: A systematic literature review","authors":"M. Steinbach, J. Sieweke, Stefan Süß","doi":"10.1080/10919392.2019.1552749","DOIUrl":"https://doi.org/10.1080/10919392.2019.1552749","url":null,"abstract":"ABSTRACT Research on e-participation has grown significantly in the last years. This review focuses on public administrations, which are central actors in the solicitation and organization of e-participation and in the process of diffusion of more democratic decision-making in government contexts. However, research indicates that public administrations often struggle with technological and organizational changes, which suggests that e-participation initiatives may fail due to barriers within public administrations. Although researchers have paid considerable attention to the diffusion of e-participation in public administrations, research so far is multi-disciplinary and fragmented. The aim of this literature review is to structure and systematize the literature regarding phases of e-participation diffusion (adoption, implementation and institutionalization) and levels of analysis (micro, meso, and macro) to map the extant field of e-participation diffusion research and to provide a starting point for future research. The analysis shows that research has concentrated on the phases of adoption and implementation, and on the external context of public administrations (macro) and the organizational (meso) level. Overall, the review identifies major research gaps and offers avenues for future research.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"61 - 95"},"PeriodicalIF":2.9,"publicationDate":"2019-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1552749","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42004814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Interorganizational processes in buyer–supplier dyads: An information intensity perspective 买卖双方的组织间过程:信息强度视角
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-04-03 DOI: 10.1080/10919392.2018.1554280
M. Nandy, P. Seetharaman
ABSTRACT In an increasingly global business environment, organizations interact with partners, suppliers and customers who are geographically spread and exchange information regularly. Without a robust information technology infrastructure, the speed and effectiveness of this information exchange is limited. Business-to-business (B2B) electronic business applications are a class of interorganizational information systems (IOIS) that facilitate such information exchange arising out of interorganizational processes (IOPs). The success of any e-business initiative depends on the successful implementation and the actual use of such IOIS. This study uses the concept of information intensity (II) to identify the information sharing requirements arising from IOPs, thus presenting opportunities for B2B Web site use, with specific reference to organization-specific customer-facing and supplier-facing IOIS. We use data from four buyer–supplier dyads, eight medium- to large-scale organizations in the Indian context and identify a generic set of dominant IOPs in buyer–supplier interactions. Through these we present the sources of II in IOPs along three dimensions – complexity, uncertainty and ambiguity which influence the feature set in the IOISs. We conclude with implications for IOIS design, implementation and use.
在日益全球化的商业环境中,组织与地理位置分散的合作伙伴、供应商和客户进行互动,并定期交换信息。如果没有健壮的信息技术基础设施,这种信息交换的速度和有效性就会受到限制。企业对企业(B2B)电子业务应用程序是一类组织间信息系统(IOIS),它促进了由组织间过程(IOPs)产生的信息交换。任何电子商务计划的成功都取决于这种信息系统的成功实施和实际使用。本研究使用信息强度(II)的概念来确定IOPs产生的信息共享需求,从而为B2B网站的使用提供机会,具体参考组织特定的面向客户和面向供应商的IOIS。我们使用了来自四个买方-供应商双组,八个印度中大型组织的数据,并确定了买方-供应商互动中占主导地位的通用IOPs集。通过这些,我们沿着三个维度呈现了IOPs中II的来源-复杂性,不确定性和模糊性,它们影响IOISs中的特征集。最后,我们对IOIS的设计、实施和使用提出了建议。
{"title":"Interorganizational processes in buyer–supplier dyads: An information intensity perspective","authors":"M. Nandy, P. Seetharaman","doi":"10.1080/10919392.2018.1554280","DOIUrl":"https://doi.org/10.1080/10919392.2018.1554280","url":null,"abstract":"ABSTRACT In an increasingly global business environment, organizations interact with partners, suppliers and customers who are geographically spread and exchange information regularly. Without a robust information technology infrastructure, the speed and effectiveness of this information exchange is limited. Business-to-business (B2B) electronic business applications are a class of interorganizational information systems (IOIS) that facilitate such information exchange arising out of interorganizational processes (IOPs). The success of any e-business initiative depends on the successful implementation and the actual use of such IOIS. This study uses the concept of information intensity (II) to identify the information sharing requirements arising from IOPs, thus presenting opportunities for B2B Web site use, with specific reference to organization-specific customer-facing and supplier-facing IOIS. We use data from four buyer–supplier dyads, eight medium- to large-scale organizations in the Indian context and identify a generic set of dominant IOPs in buyer–supplier interactions. Through these we present the sources of II in IOPs along three dimensions – complexity, uncertainty and ambiguity which influence the feature set in the IOISs. We conclude with implications for IOIS design, implementation and use.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"114 - 96"},"PeriodicalIF":2.9,"publicationDate":"2019-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2018.1554280","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44103920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Journal of Organizational Computing and Electronic Commerce
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1