In this essay, it is suggested that a multi-level interaction perspective offers insight in answering the fundamental question, “Why do firms have IS?” The role of humancomputer interaction (HCI) in firms is recast in this context and seen to be basic to the modern firm’s interactions more broadly, with implications for firm capabilities and organizational learning.
{"title":"Why Do Firms Have Information Systems?","authors":"E. Swanson","doi":"10.4324/9781003252344-2","DOIUrl":"https://doi.org/10.4324/9781003252344-2","url":null,"abstract":"In this essay, it is suggested that a multi-level interaction perspective offers insight in answering the fundamental question, “Why do firms have IS?” The role of humancomputer interaction (HCI) in firms is recast in this context and seen to be basic to the modern firm’s interactions more broadly, with implications for firm capabilities and organizational learning.","PeriodicalId":93486,"journal":{"name":"Proceedings of the ... Americas Conference on Information Systems. Americas Conference on Information Systems","volume":"20 1","pages":"438"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85927335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haadi Mombini, Bengisu Tulu, Diane Strong, Emmanuel Agu, Clifford Lindsay, Lorraine Loretz, Peder Pedersen, Raymond Dunn
A key requirement for the successful adoption of clinical decision support systems (CDSS) is their ability to provide users with reliable explanations for any given recommendation which can be challenging for some tasks such as wound management decisions. Despite the abundance of decision guidelines, wound non-expert (novice hereafter) clinicians who usually provide most of the treatments still have decision uncertainties. Our goal is to evaluate the use of a Wound CDSS smartphone App that provides explanations for recommendations it produces. The App utilizes wound images taken by the novice clinician using smartphone camera. This study experiments with two proposed variations of rule-tracing explanations called verbose-based and gist-based. Deriving upon theories of decision making, and unlike prior literature that says rule-tracing explanations are only preferred by novices, we hypothesize that, rule-tracing explanations are preferred by both clinicians but in different forms: novices prefer verbose-based rule-tracing and experts prefer gist-based rule-tracing.
{"title":"Do Novice and Expert Users of Clinical Decision Support Tools Need Different Explanations?","authors":"Haadi Mombini, Bengisu Tulu, Diane Strong, Emmanuel Agu, Clifford Lindsay, Lorraine Loretz, Peder Pedersen, Raymond Dunn","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>A key requirement for the successful adoption of clinical decision support systems (CDSS) is their ability to provide users with reliable explanations for any given recommendation which can be challenging for some tasks such as wound management decisions. Despite the abundance of decision guidelines, wound non-expert (novice hereafter) clinicians who usually provide most of the treatments still have decision uncertainties. Our goal is to evaluate the use of a Wound CDSS smartphone App that provides explanations for recommendations it produces. The App utilizes wound images taken by the novice clinician using smartphone camera. This study experiments with two proposed variations of rule-tracing explanations called verbose-based and gist-based. Deriving upon theories of decision making, and unlike prior literature that says rule-tracing explanations are only preferred by novices, we hypothesize that, rule-tracing explanations are preferred by both clinicians but in different forms: novices prefer verbose-based rule-tracing and experts prefer gist-based rule-tracing.</p>","PeriodicalId":93486,"journal":{"name":"Proceedings of the ... Americas Conference on Information Systems. Americas Conference on Information Systems","volume":"2020 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8549570/pdf/nihms-1647735.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39573179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.18690/978-961-286-280-0.3
S. Mamonov, R. Benbunan-Fich
The adoption of smart home technologies is a growing trend in modern society. While various smart home technologies promise many potential benefits, such technologies can also expose the adopters to new information privacy and security risks. Relatively little is known about the salient factors that affect the adoption intention of the ambivalent smart home technologies that offer a range of benefits, but also entail risks. To address this gap in research, we explore the factorial structure of salient perceived benefits and concerns associated with smart locks. We examine the effects of the emergent factors on the adoption intention and we find that while potential adopters express a broad range of perceived benefits and concerns associated with smart locks, only the perceived relative advantage of smart locks vis-a-vis conventional locks in providing safety and security is significantly correlated with adoption intention. Our results indicate that this perceived relative advantage is a critical consideration in the adoption of smart home technologies that replace existing solutions. We also find that while the potential adopters voice concerns about privacy and security in relation to smart locks, these factors have no statistically significant effect on the adoption intention.
{"title":"Unlocking the Smart Home: An Examination of Factors Influencing Smart Lock Adoption Intention","authors":"S. Mamonov, R. Benbunan-Fich","doi":"10.18690/978-961-286-280-0.3","DOIUrl":"https://doi.org/10.18690/978-961-286-280-0.3","url":null,"abstract":"The adoption of smart home technologies is a growing trend in modern society. While various smart home technologies promise many potential benefits, such technologies can also expose the adopters to new information privacy and security risks. Relatively little is known about the salient factors that affect the adoption intention of the ambivalent smart home technologies that offer a range of benefits, but also entail risks. To address this gap in research, we explore the factorial structure of salient perceived benefits and concerns associated with smart locks. We examine the effects of the emergent factors on the adoption intention and we find that while potential adopters express a broad range of perceived benefits and concerns associated with smart locks, only the perceived relative advantage of smart locks vis-a-vis conventional locks in providing safety and security is significantly correlated with adoption intention. Our results indicate that this perceived relative advantage is a critical consideration in the adoption of smart home technologies that replace existing solutions. We also find that while the potential adopters voice concerns about privacy and security in relation to smart locks, these factors have no statistically significant effect on the adoption intention.","PeriodicalId":93486,"journal":{"name":"Proceedings of the ... Americas Conference on Information Systems. Americas Conference on Information Systems","volume":"66 1","pages":"58"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81577229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-10DOI: 10.1007/978-3-319-69644-7_16
Mahdi Moqri, Subhajyoti Bandyopadhyay
{"title":"Please Share! Online Word of Mouth and Charitable Crowdfunding","authors":"Mahdi Moqri, Subhajyoti Bandyopadhyay","doi":"10.1007/978-3-319-69644-7_16","DOIUrl":"https://doi.org/10.1007/978-3-319-69644-7_16","url":null,"abstract":"","PeriodicalId":93486,"journal":{"name":"Proceedings of the ... Americas Conference on Information Systems. Americas Conference on Information Systems","volume":"50 1","pages":"162-169"},"PeriodicalIF":0.0,"publicationDate":"2016-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89796330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-01DOI: 10.1504/IJISAM.2014.062284
Arthur P. Tomasino
When technology adoption takes on fad-like characteristics, large swings in demand and expectations for the technology result. Companies can see revenues skyrocket, only to fall just as fast without understanding the dynamics of the consumer adoption decision process. In this paper, we present a model for fad-like technology adoption built upon Rogers' technology adoption lifecycle, to which we add the theory of information cascades and adopter thresholds. Adopter behaviour in each stage of the lifecycle may be individualistic or holistic, as suggested by the theories of Watkins and Durkheim. Macro product and micro adopting user level case analyses of the adoption of the Apple iPhoneTM illustrate the application of the model and the individual and holistic social actions of fad-like technology adoption. The paper closes with advice for consumer technology companies and a call for further study of industry and consumer factors that complicate the interpretation and prediction of adoption lifecycle activity.
{"title":"Fad-like Technology Adoption as a Social Action","authors":"Arthur P. Tomasino","doi":"10.1504/IJISAM.2014.062284","DOIUrl":"https://doi.org/10.1504/IJISAM.2014.062284","url":null,"abstract":"When technology adoption takes on fad-like characteristics, large swings in demand and expectations for the technology result. Companies can see revenues skyrocket, only to fall just as fast without understanding the dynamics of the consumer adoption decision process. In this paper, we present a model for fad-like technology adoption built upon Rogers' technology adoption lifecycle, to which we add the theory of information cascades and adopter thresholds. Adopter behaviour in each stage of the lifecycle may be individualistic or holistic, as suggested by the theories of Watkins and Durkheim. Macro product and micro adopting user level case analyses of the adoption of the Apple iPhoneTM illustrate the application of the model and the individual and holistic social actions of fad-like technology adoption. The paper closes with advice for consumer technology companies and a call for further study of industry and consumer factors that complicate the interpretation and prediction of adoption lifecycle activity.","PeriodicalId":93486,"journal":{"name":"Proceedings of the ... Americas Conference on Information Systems. Americas Conference on Information Systems","volume":"8 1","pages":"450"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86648380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since the development of the phenomenological method by Husserl, a variety of thinkers and researchers have contributed to an intense debate regarding the ontological and epistemological bases of Phenomenology, as well as its applicability to the inquiry of the human condition. This dialogue has spun an area of phenomenological research known as existential-phenomenological psychology, which has been systematically explored by a number of researchers in different fields, in the last decades. The present paper furthers an earlier argument for the use of phenomenological methods, and in particular, those of existential-phenomenological psychology, to study IS-related phenomena. It discusses how such methods can be approached from a critical standpoint, in contrast with a pure hermeneutical one, thus allowing for the realization of emancipatory ideals in often unanticipated ways. An example from a study of IT-driven radical change is used to illustrate the argument.
{"title":"Realizing Emancipatory Ideals in Phenomenological IS Research","authors":"Valter Moreno","doi":"10.5329/1989","DOIUrl":"https://doi.org/10.5329/1989","url":null,"abstract":"Since the development of the phenomenological method by Husserl, a variety of thinkers and researchers have contributed to an intense debate regarding the ontological and epistemological bases of Phenomenology, as well as its applicability to the inquiry of the human condition. This dialogue has spun an area of phenomenological research known as existential-phenomenological psychology, which has been systematically explored by a number of researchers in different fields, in the last decades. The present paper furthers an earlier argument for the use of phenomenological methods, and in particular, those of existential-phenomenological psychology, to study IS-related phenomena. It discusses how such methods can be approached from a critical standpoint, in contrast with a pure hermeneutical one, thus allowing for the realization of emancipatory ideals in often unanticipated ways. An example from a study of IT-driven radical change is used to illustrate the argument.","PeriodicalId":93486,"journal":{"name":"Proceedings of the ... Americas Conference on Information Systems. Americas Conference on Information Systems","volume":"45 1","pages":"542"},"PeriodicalIF":0.0,"publicationDate":"2013-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90275342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-01DOI: 10.4018/978-1-4666-1915-9.CH009
David Kreps
This chapter focusses on Foucault, Butler, and video-sharing on sexual social networking sites. It argues that the use and prevalence of video-sharing technologies on sexual social networking websites, has a direct impact on our notions of sexual identity. Though sometimes pitted against one another and at times contradictory, the ideas of Michel Foucault and Judith Butler on the nature and expression of our sexuality and our gender identities in fact gel rather well, and both can help us to gain a deeper and more rounded picture of the impact and importance of the burgeoning phenomenon of internet dating websites in general, and sexual social networking in particular.
{"title":"Performing the Discourse of Sexuality Online","authors":"David Kreps","doi":"10.4018/978-1-4666-1915-9.CH009","DOIUrl":"https://doi.org/10.4018/978-1-4666-1915-9.CH009","url":null,"abstract":"This chapter focusses on Foucault, Butler, and video-sharing on sexual social networking sites. It argues that the use and prevalence of video-sharing technologies on sexual social networking websites, has a direct impact on our notions of sexual identity. Though sometimes pitted against one another and at times contradictory, the ideas of Michel Foucault and Judith Butler on the nature and expression of our sexuality and our gender identities in fact gel rather well, and both can help us to gain a deeper and more rounded picture of the impact and importance of the burgeoning phenomenon of internet dating websites in general, and sexual social networking in particular.","PeriodicalId":93486,"journal":{"name":"Proceedings of the ... Americas Conference on Information Systems. Americas Conference on Information Systems","volume":"1 1","pages":"517"},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88705227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1108/14637151211232696
R. Seethamraju
Purpose – The purpose of this paper is to analyse the inadequacies of current business education in the context of “process”. It presents an analysis of the background to business processes in historical perspective and posits the significance of business management for today's business education. It argues the importance of business processes and business process management (BPM) in the context of the current and emerging information technologies (IT) and business education and highlights its ability to offer a missing link between business, IT and strategy.Design/methodology/approach – The approach involves analysis and review of the literature and analysis of secondary data.Findings – Even though business processes have been the subject of formal study from multiple perspectives for a long time, since the start of industrial age, processes still are not well understood, left unmanaged and poorly executed. With business schools teaching primarily function specific and narrow and IT schools focused on na...
{"title":"Business Process Management - A Missing Link in Business Education","authors":"R. Seethamraju","doi":"10.1108/14637151211232696","DOIUrl":"https://doi.org/10.1108/14637151211232696","url":null,"abstract":"Purpose – The purpose of this paper is to analyse the inadequacies of current business education in the context of “process”. It presents an analysis of the background to business processes in historical perspective and posits the significance of business management for today's business education. It argues the importance of business processes and business process management (BPM) in the context of the current and emerging information technologies (IT) and business education and highlights its ability to offer a missing link between business, IT and strategy.Design/methodology/approach – The approach involves analysis and review of the literature and analysis of secondary data.Findings – Even though business processes have been the subject of formal study from multiple perspectives for a long time, since the start of industrial age, processes still are not well understood, left unmanaged and poorly executed. With business schools teaching primarily function specific and narrow and IT schools focused on na...","PeriodicalId":93486,"journal":{"name":"Proceedings of the ... Americas Conference on Information Systems. Americas Conference on Information Systems","volume":"11 1","pages":"243"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90186612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adaptive learning approaches support learners to achieve the intended learning outcomes through a personalized way. Previous studies mistakenly treat adaptive e-Learning as personalizing the presentation style of the learning materials, which is not completely correct. The main idea of adaptive learning is to personalize the earning content in a way that can cope with individual differences in aptitude. In this study, an adaptive learning model is designed based on the Aptitude-Treatment Interaction theory and Constructive Alignment Model. The model aims at improving students' learning outcomes through enhancing their intrinsic motivation to learn. This model is operationalized with a multi-agent framework and is validated under a controlled laboratory setting. The result is quite promising. The individual differences of students, especially in the experimental group, have been narrowed significantly. Students who have difficulties in learning show significant improvement after the test. However, the longitudinal effect of this model is not tested in this study and will be studied in the future.
{"title":"Intelligent Agent-Based e-Learning System For Adaptive Learning","authors":"H. Lai, Minhong Wang, Huaiqing Wang","doi":"10.4018/jiit.2011070101","DOIUrl":"https://doi.org/10.4018/jiit.2011070101","url":null,"abstract":"Adaptive learning approaches support learners to achieve the intended learning outcomes through a personalized way. Previous studies mistakenly treat adaptive e-Learning as personalizing the presentation style of the learning materials, which is not completely correct. The main idea of adaptive learning is to personalize the earning content in a way that can cope with individual differences in aptitude. In this study, an adaptive learning model is designed based on the Aptitude-Treatment Interaction theory and Constructive Alignment Model. The model aims at improving students' learning outcomes through enhancing their intrinsic motivation to learn. This model is operationalized with a multi-agent framework and is validated under a controlled laboratory setting. The result is quite promising. The individual differences of students, especially in the experimental group, have been narrowed significantly. Students who have difficulties in learning show significant improvement after the test. However, the longitudinal effect of this model is not tested in this study and will be studied in the future.","PeriodicalId":93486,"journal":{"name":"Proceedings of the ... Americas Conference on Information Systems. Americas Conference on Information Systems","volume":"31 1","pages":"495"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90672151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To enhance our understanding of the relevance of knowledge management/intellectual capital (KM/IC) academic research, this study explores the sources authors utilize to develop their book content. Ten prominent KM/IC book authors were interviewed to identify if and how the KM/IC academic literature is being disseminated through books. It was confirmed that the body of knowledge present in peer-reviewed journals is utilized in the development of book/textbook content. Thus, books serve as knowledge translation agents through which academic literature is summarized, aggregated, and transformed into a format that may be easily comprehended by non-academics. In addition to peer-reviewed journals, KM/IC book authors utilize other sources, including personal research, experts’ opinions, personal experience, practitioner magazines, conferences, books, and informal discussions with academics. The model, which was developed within this study, demonstrates that the book’s target audience and author’s motivation serve as a pure moderator of the relationship between the available content sources and actual book content. Books targeted to practitioners and inspired by a desire to bring theory to practice are based on the author’s personal experience and contain many non-peer reviewed sources, whereas books written for academic readers have content that is mostly derived from peer-reviewed journals, books, and the author’s personal research. Copyright # 2011 John Wiley & Sons, Ltd.
{"title":"Practical Relevance of Knowledge Management and Intellectual Capital Scholarly Research: Books as Knowledge Translation Agents","authors":"A. Serenko, N. Bontis, E. Hull","doi":"10.1002/KPM.363","DOIUrl":"https://doi.org/10.1002/KPM.363","url":null,"abstract":"To enhance our understanding of the relevance of knowledge management/intellectual capital (KM/IC) academic research, this study explores the sources authors utilize to develop their book content. Ten prominent KM/IC book authors were interviewed to identify if and how the KM/IC academic literature is being disseminated through books. It was confirmed that the body of knowledge present in peer-reviewed journals is utilized in the development of book/textbook content. Thus, books serve as knowledge translation agents through which academic literature is summarized, aggregated, and transformed into a format that may be easily comprehended by non-academics. In addition to peer-reviewed journals, KM/IC book authors utilize other sources, including personal research, experts’ opinions, personal experience, practitioner magazines, conferences, books, and informal discussions with academics. The model, which was developed within this study, demonstrates that the book’s target audience and author’s motivation serve as a pure moderator of the relationship between the available content sources and actual book content. Books targeted to practitioners and inspired by a desire to bring theory to practice are based on the author’s personal experience and contain many non-peer reviewed sources, whereas books written for academic readers have content that is mostly derived from peer-reviewed journals, books, and the author’s personal research. Copyright # 2011 John Wiley & Sons, Ltd.","PeriodicalId":93486,"journal":{"name":"Proceedings of the ... Americas Conference on Information Systems. Americas Conference on Information Systems","volume":"21 1","pages":"43"},"PeriodicalIF":0.0,"publicationDate":"2011-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78103948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}