{"title":"Freelisting: A Research Guide for Information Systems Researchers","authors":"Christopher B. Califf, T. S. Stumpf","doi":"10.1145/3631341.3631346","DOIUrl":"https://doi.org/10.1145/3631341.3631346","url":null,"abstract":"Freelisting is a widely used ethnographic data elicitation and analysis technique that can help researchers quickly and systematically collect and quantify qualitative cultural data. The paper discusses the value of freelisting for IS researchers who conduct qualitative and/or quantitative research. Specifically, the paper provides an overview of freelisting; examines how prior research has used freelisting; gives step-by-step instructions about how to collect, analyze, and present freelist data; and describes the benefits of freelisting in the context of IS research. The following items are explained in detail: (1) how to understand when freelisting can be an appropriate choice; (2) the different types of freelists; (3) how to focus freelists on a specific phenomenon; (4) how to analyze freelists; and (5) how to triangulate freelist data. Additionally, the paper details seven ways IS researchers can benefit from using freelisting: (1) creating culturally salient surveys; (2) revisiting or generating new field-specific theories; (3) enhancing a mixed-method research design; (4) uncovering information about cultural similarities and differences in intracultural and cross-cultural research designs; (5) consciously considering the importance of context; (6) developing more robust quantitative analysis techniques; and (7) eliciting culturally relevant data about development or refinement of technology in applied settings.","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"11 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135460276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quick-and-Wide Propagation of Disaster Tweets: Why It Matters and How to Measure It","authors":"Jaebong Son","doi":"10.1145/3631341.3631344","DOIUrl":"https://doi.org/10.1145/3631341.3631344","url":null,"abstract":"As dynamic, non-routine disaster events appear and disappear in a short period, quickly and widely disseminating emergency warnings and alerts to the public is a critical communication goal for emergency management officers and citizen journalists. Twitter has become a prominent communication medium to achieve such a communication goal, attracting academic scholars, government agencies, and industry practitioners. However, most academic research and government reports have relied on either the retweet count or retweet time to understand factors affecting the propagation of disaster information. We argue that neither measure is sufficient to reflect the extent to which disaster tweets are quickly and widely propagated. Hence, we propose a new measure called the Propagation Index (PI) to better evaluate quick and wide propagation of disaster information. Using two Twitter datasets, we empirically examine the proposed measure in association with the Twitter features and compare its statistical results with those of the retweet count and retweet time. Our findings suggest that the PI more accurately captures how quickly and widely disaster tweets are propagated than the other measures. Therefore, this study contributes to academia, governments, and industry to improve their understanding of the propagation of disaster information on Twitter.","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"52 11-12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135460416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prashant Palvia, Jaideep Ghosh, Tim Jacks, Alexander Serenko, Aykut H. Turan
{"title":"Are IT Workers from Mars? An Examination of Their National Culture Dimensions","authors":"Prashant Palvia, Jaideep Ghosh, Tim Jacks, Alexander Serenko, Aykut H. Turan","doi":"10.1145/3631341.3631345","DOIUrl":"https://doi.org/10.1145/3631341.3631345","url":null,"abstract":"The information technology (IT) workforce is characterized by several unique and contextual factors, such as the technology, the occupation itself, and the human factors. Among the human factors, global information systems (IS) studies have examined the role of national culture to explain many workforce differences and nuances across nations. In such cross-cultural research, IS researchers have primarily utilized the published scores of national culture dimensions as provided by the preeminent social psychologist and culture scholar Geert Hofstede and have applied them to various IT populations within a country. Given that the IT profession is unique in many respects, and there is cultural heterogeneity within a country, our study embarked on independently measuring and verifying the national culture values of IT employees in 37 countries. By using the original Hofstede scales, scores were obtained on five national culture dimensions: power distance, uncertainty avoidance, individualism, masculinity, and long-term orientation. We found significant differences between the national culture scores of IT employees and those available in the literature for the general population. Our results are novel and have profound significance. There are major implications for both past and future studies in cross-cultural research as well as for practitioners who interpret and utilize the findings of such research.","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135460129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kelly J. Fadel, Matthew L. Jensen, Thomas O. Meservy
{"title":"Online Information Filtering: The Role of Contextual Cues in Electronic Networks of Practice","authors":"Kelly J. Fadel, Matthew L. Jensen, Thomas O. Meservy","doi":"10.1145/3631341.3631347","DOIUrl":"https://doi.org/10.1145/3631341.3631347","url":null,"abstract":"Online forums sponsored by Electronic Networks of Practice are commonly used to exchange information related to problem solving, but the quality of solutions posted on forums can vary widely. To assist knowledge seekers, most forums offer contextual cues that signal solution quality, such as endorsements by the question poster, experts, or other community members. However, the influence of these cues on information-filtering decisions, particularly when presented simultaneously, remains poorly understood. This study draws on signaling theory to develop hypotheses about how four cue dimensions-source, valence, format, and volume-shape information filtering on an online forum. Results from three choice-based conjoint studies show that some sources are more influential than others and that positive cues weigh more heavily on filtering decisions than negative cues. Results also show that cues tend to be more influential when they employ a more granular format and reflect the input of a larger number of individuals.","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135460110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Taxonomy of SETA Methods and Linkage to Delivery Preferences","authors":"Joakim Kävrestad, Marcus Nohlberg, Steven Furnell","doi":"10.1145/3631341.3631348","DOIUrl":"https://doi.org/10.1145/3631341.3631348","url":null,"abstract":"Cybersecurity threats targeting users are common in today's information systems. Threat actors exploit human behavior to gain unauthorized access to systems and data. The common suggestion for addressing this problem is to train users to behave better using SETA programs. The notion of training users is old, and several SETA methods are described in scientific literature. Yet, incidents stemming from insecure user behavior continue to happen and are reported as one of the most common types of incidents. Researchers argue that empirically proven SETA programs are needed and point out focus on knowledge rather than behavior, along with poor user adoption, as problems with existing programs. The present study aims to research user preferences regarding SETA methods, with the motivation that a user is more likely to adopt a program perceived positively. A qualitative approach is used to identify existing SETA methods, and a quantitative approach is used to measure user preferences regarding SETA delivery. We show that users prefer SETA methods to be effortless and flexible and outline how existing methods meet that preference. The results outline how SETA methods respond to user preferences and how different SETA methods can be implemented to maximize user perception, thereby supporting user adoption.","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135460112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Obligations of Tenured Faculty in Restoring the Public's Faith in American Public Universities: Honoring Our Side of the Commitment","authors":"K.D. Joshi","doi":"10.1145/3631341.3631343","DOIUrl":"https://doi.org/10.1145/3631341.3631343","url":null,"abstract":"This editorial delves into the critical role of tenured faculty in American public universities in restoring the public's faith in these institutions. This editorial emphasizes that preserving the founding ideals of American public universities is both an obligation and a lasting legacy. It calls upon tenured faculty to rekindle the public spirit and actively contribute to the preservation of the American dream for future generations.","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"90 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135460111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithm of mining sequential patterns for web personalization services","authors":"Cui Wei, Wu Sen, Zhang Yuan, Chen Lian-Chang","doi":"10.1145/1531817.1531825","DOIUrl":"https://doi.org/10.1145/1531817.1531825","url":null,"abstract":"This paper focuses on the requirements of web personalization service for sequential patterns and sequential mining algorithms. Previous sequential mining algorithms treated sequential patterns uniformly, but individual patterns in sequences often have different importance weights. To solve this problem, we propose a new algorithm to identify weighted maximal frequent sequential patterns. First, frequency of frequent single items is used to calculate the weights of frequent sequences. Then, the frequent weighted sequence is defined, leading not only to the discovery of important maximal sequences, but the property of anti-monotony. Web usage mining has been used effectively to inform web personalization and recommender systems, and this new algorithm provides an effective method for optimizing these services. A variety of recommendation frameworks have been proposed previously, including some based on non-sequential models such as association rules, as well as sequential models. In this paper, we present a hybrid web personalization system based on clustering and contiguous sequential patterns. Our system clusters log files to determine the basic architecture of websites, and for each cluster, we use contiguous sequential pattern mining to further optimize the topologies of websites. Finally, we propose two evaluating parameters to test the performance of our system.","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123621124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The perceptual evaluation of information systems using the construct of user satisfaction: case study of a large french group","authors":"A. Leclercq","doi":"10.1145/1240616.1240621","DOIUrl":"https://doi.org/10.1145/1240616.1240621","url":null,"abstract":"This research work concerns the perceptual evaluation of the performance of information systems (IS) and more particularly, the construct of user satisfaction. Faced with the difficulty of obtaining objective measures for the success of IS, user satisfaction appeared as a substitutive measure of IS performance (DeLone & McLean, 1992). Some researchers have indeed shown that the evaluation of an IS could not happen without an analysis of the feelings and perceptions of individuals who make use of it. Consequently, the concept of satisfaction has been considered as a guarantee of the performance of an IS. Also it has become necessary to ponder the drivers of user satisfaction. The analysis of models and measurement tools for satisfaction as well as the adoption of a contingency perspective has allowed the description of principal dimensions that have a direct or less direct impact on user perceptions\u0000 The case study of a large French group, carried out through an interpretativist approach conducted by way of 41 semi-structured interviews, allowed the conceptualization of the problematique of perceptual evaluation of IS in a particular field study. This study led us to confirm the impact of certain factors (such as perceived usefulness, participation, the quality of relations with the IS Function and its resources and also the fit of IS with user needs). On the contrary, other dimensions regarded as fundamental do not receive any consideration or see their influence nuanced in the case studied (the properties of IS, the ease of use, the quality of information). Lastly, this study has allowed for the identification of the influence of certain contingency and contextual variables on user satisfaction and, above all, for the description of the importance of interactions between the IS Function and the users","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AIS President's report at the end of 1998","authors":"G. Davis","doi":"10.1145/335505.335506","DOIUrl":"https://doi.org/10.1145/335505.335506","url":null,"abstract":"This report is on AIS's activities to the end of 1998. It gives substance to the emergence of AIS as the international academic society for information systems. For updates on current activities, see http:// www.aisnet.org/. The report summarizes four years and highlights some 1998 results and initiatives begun in 1998. As such, it reflects the work of past and current officers and member volunteers.","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124632486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PRIISM: recent developments with the Internet in Vietnam","authors":"T. Bui","doi":"10.1145/277339.277340","DOIUrl":"https://doi.org/10.1145/277339.277340","url":null,"abstract":"After years of debate and preparation, Vietnam recently opened its borders to full Internet access. In addition to the normal technological barriers faced in installing the infrastructure necessary for national Internet access, Vietnam had to overcome significant political and economic barriers. Faced with the very difficult challenge of advancing Vietnam's role in the world economy, while maintaining cultural and social stability, Vietnam's governmental leaders wrestled with the role of the Internet.","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126817684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}