{"title":"Exploring a causal model for the understanding of partnership","authors":"Jae-Nam Lee, Young-Gul Kim","doi":"10.1109/HICSS.2003.1174790","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174790","url":null,"abstract":"This study explores the sources of influence in a successful outsourcing partnership based on a behavioral-attitudinal theory of IS success. Six major partnership-related variables were identified from the literature in terms of social exchange theory, which has been mainly applied to the study of outsourcing partnerships. A causal model of outsourcing success was proposed in which three attitudinal variables (mutual benefits, commitment, and predisposition) were introduced as intervening variables into the relationship between behavioral variables (shared knowledge, mutual dependency, and organizational linkage) and outsourcing success. This model was then tested using a sample of 225 organizations in Korea. The proposed model was compared with a rival model without such intervening variables. The findings indicate that the proposed model has more significant paths and power than the rival model in assessing the relationship between partnership and outsourcing success.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127705083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Community collective efficacy: structure and consequences of perceived capacities in the Blacksburg Electronic Village","authors":"John Millar Carroll, D. Reese","doi":"10.1109/HICSS.2003.1174585","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174585","url":null,"abstract":"Bandura's social cognitive construct \"perceived self-efficacy\" has been used widely to understand individual behavior as a function of domain-specific beliefs about personal capacities. Collective efficacy is the extension of the self-efficacy construct to organizations and groups; it refers to beliefs about collective capacities in specific domains. Our research is investigating the use of collective efficacy in understanding attitudes and behaviors of members of proximal residential communities with respect to issues like attachment, engagement, and sociality, specifically as modulated by use of the Internet and community networks. This paper describes our analysis of the structure and external validity of the collective efficacy construct.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127503372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Does e-business modeling really help?","authors":"J. Gordijn, H. Akkermans","doi":"10.1109/HICSS.2003.1174398","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174398","url":null,"abstract":"Many innovative e-business ideas are hardly understood by their stakeholders when articulated, just by words. To create a better, also shared, understanding, and to enhance confidence in the feasibility of such verbal ideas, we have developed a model-based e-business development approach called e/sup 3/-value. But does a model-based approach really contribute to the development of innovative e-business ideas? To answer this question, we report on an innovative e-business idea about online news provisioning which has been explored, using our e/sup 3/-value approach, and which has been implemented afterwards. To see the merits of e/sup 3/-value we revisited, this project one-year-and-a-half after its implementation. It then shows up that indeed a modeling approach contributes to e-business development, but also some important lessons can be learned, to improve our methodology.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134604494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Balancing safety against performance: tradeoffs in Internet security","authors":"Vu A. Ha, D. Musliner","doi":"10.1109/HICSS.2003.1174465","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174465","url":null,"abstract":"All Internet-accessible computing systems are currently faced with incessant threats ranging from simple script-kiddies to highly sophisticated criminal enterprises. In response to these threats, sites must perform extensive intrusion monitoring. This intrusion monitoring can have significant costs in terms of bandwidth, computing power, storage space, and licensing fees. Furthermore, when exploits are detected, the victims must take actions that can consume further resources and compromise their objectives (e.g., by reducing e-commerce server throughput). In this paper, we explore techniques for modeling the costs and benefits of various security monitoring and response actions. Given these models and stochastic expectations about the types of attacks that a site is likely to face, our CIRCADIA (cooperative intelligent real-time control architecture for dynamic information assurance) automatic security control system is able to make real-time tradeoffs between the level of safety and security that is enforced, and the level of system resources/performance that are applied to the main computational objectives (e.g., e-commerce transactions). We show how CIRCADIA is able to dynamically adjust its security activities to account for changing threat profiles and objectives. The result: a continually-optimized balance of security-maintaining activity that reduces risk while still allowing the system to meet its goals.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"28 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114041079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting parameterised roles with object-based access control","authors":"M. Evered","doi":"10.1109/HICSS.2003.1174463","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174463","url":null,"abstract":"The per-method access control lists of standard Internet technologies allow only simple forms of access control to be expressed and enforced. They also fail to enforce a strict need-to-know view of persistent data. Real applications require more flexible security constraints including parameter restrictions, logging of accesses and state-dependent access constraints. In particular, the concept of parameterised roles, central to a fine-grained specification of access rules and compliance with privacy laws, should be supported in a natural way. In this paper, we demonstrate how an object-based approach using the mechanism of bracket capabilities can be used to enforce various kinds of access constraints including discretionary, mandatory and parameterised role-based access control. We give examples from a health information system incorporating secure patient access and secure access by appropriate medical and administrative personnel.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123919534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Roles of formal/informal networks and perceived compatibility in the diffusion of World Wide Web: the case of Indonesian banks","authors":"D. Achjari, M. Quaddus","doi":"10.1109/HICSS.2003.1174428","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174428","url":null,"abstract":"This study takes a cultural perspective to derive formal and informal networks and aims to investigate their roles in the diffusion of World Wide Web (WWW) among Indonesian bank employees. The study also investigates the impact of perceived compatibility on WWW diffusion. To achieve these aims, a research model, which is based on the technology acceptance model (TAM) is developed. Data is collected from 360 nonMIS staff in six Indonesian banks via questionnaire. The responses are analysed using PLS. The results suggest that informal network affects individual's self-efficacy, and perceived compatibility impacts user's perception regarding WWW. Surprisingly, the impact of formal network on self-efficacy is negligible. The implications of the results are discussed taking a cultural perspective.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128545091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to information systems in global business","authors":"P. Ribbers, C. Holland","doi":"10.1109/HICSS.2003.1174614","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174614","url":null,"abstract":"This year’s mini-track on information systems in global business continues the tradition of applied research and original data analysis in a wide range of information technology and international business contexts. The papers cover many of the topical issues facing academics and managers working in information systems: outsourcing; productivity issues; Business to Business and supply chain innovations; implementation of ERP; marketing strategies and the emergence of global market networks. However these topics are examined with an emphasis on their global dimension. How does outsourcing change as it becomes a global process? What are the differences of B2B implementation in a developing economy compared with B2B systems in the US? How do country differences affect the global deployment of an ERP system? These are the types of issues that will be covered and discussed in the IS in global business mini-track. The downturn of stock-markets worldwide has reduced business spending on information systems and had a dramatic effect on the value and in some cases, viability of information technology companies. It has also raised the urgency for cost reduction, and in particular encouraged the use of offshore, or global, outsourcing services. The paper by Currie and Khan investigates the supply side of IT outsourcing services based on case research in twenty Indian companies. They argue that for Indian technology companies to succeed in the global outsourcing market, they must develop capabilities that enable them to move away from simple commoditized products to offer more sophisticated services that involve extensive research and development. The papers by Ganley, Kraemer and Wong, and Shao and Shu are related insofar as they analyze the economic effects of the IT industry in different countries. Ganleey et al assess the impact of IT production on the diffusion of IT within individual countries, and found a positive relationship in developed countries, and no relation in developing countries where it is assumed that the IT industry is focused on export rather than domestic use. Shao and Shu examine the productivity of the IT industry itself (rather than the more common study of how IT affects the general economy) and found that most of the increase in productivity within the IT industry is due to technological innovation in the production process. Both of these papers have significant implications on government policy and business strategy of IT companies. The second session is focused on large-scale infrastructure systems in the areas of ERP and business to business systems. The first paper by Reimers is concerned with the development and evolution of electronic commerce in China. It explores a fascinating concept of an industry-wide information system in which a set of standards for electronic commerce are agreed before the internal infrastructures centred on ERP are finalised. In the US and Europe, companies are grappling with the issues of defining i","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128442765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure and survivable software systems","authors":"A. Krings, P. Oman","doi":"10.1109/HICSS.2003.1174907","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174907","url":null,"abstract":"With malicious computer and network attacks reaching epidemic proportions, issues of security and survivability of software systems have surfaced in a variety of application domains. Of real concern is the increasing reliance of critical applications on networked computer systems. Failure or compromises of such systems could cause threats to national infrastructures or lead to catastrophe ( e.g., loss of life, damage to the environment, or unacceptable financial losses). Driven by market speed and feature demand, commercial software developers have high pressures to deliver products rapidly, usually at the expense of quality and security. Given these market pressures and the increasing complexity of today’s software, it is unrealistic to assume total security and robustness. Hence, the research area of secure and survivable systems has addressed the ability of systems to fulfill their missions even in the presence of failures, accidents or malicious attacks. Whereas resilience to failures and accidents has been the focus of research in fault-tolerant systems design, resilience to malicious attacks has become a challenge in the field of system survivability. Principally, essential services must be designed to withstand attacks. This requirement goes beyond the scope of computer and network security, which has been traditionally addressing detection and resistance to attacks.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117208850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An individual view on cooperation networks","authors":"Tim Weitzel, D. Beimborn, W. König","doi":"10.1109/HICSS.2003.1174385","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174385","url":null,"abstract":"Networks utilizing modern communication technologies can offer competitive advantages to those using them wisely. But due to the existence of network effects, planning and operating networks is difficult. In this paper, the strategic situation of individual agents deciding on network participation is analyzed. A systematic equilibrium analysis using computer-based simulations reveals principal solution scenarios for network agents and shows that network cooperation problems might frequently be not as difficult to resolve as often feared. In particular, strategic situations are identified showing that a majority of individuals might be better off getting the optimal solution from a central principal and that in many cases simple information intermediation can solve the start-up problem notorious in network economics.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115617990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The conceptualization of trust, risk and their electronic commerce: the need for clarifications","authors":"D. Gefen, V. Rao, N. Tractinsky","doi":"10.1109/HICSS.2003.1174442","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174442","url":null,"abstract":"In recent years, significant advances have been made in the understanding of trust and risk in electronic commerce. However, in examining the published research, some troublesome trends surface. These trends include: (a) the tendency to treat conceptualizations of trust and risk as unidimensional constructs, ignoring the large body of literature suggesting that they are complex, multidimensional constructs; (b) the tendency to ignore whether trustworthiness is part of trust or a possibly different construct; and (c) the tendency to articulate relationships between trust and risk idiosyncratically without attention to prior articulations. These trends are troublesome because they have the potential to hamper the field's ability to do cumulative research in the long run. The goal of this article is to highlight these trends and call for greater attention to the issues raised in future research.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115167634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}