{"title":"Are Social Networking Sites a Source of Online Harassment for Teens? Evidence from Survey Data","authors":"A. Sengupta, Anoshua Chaudhuri","doi":"10.2139/ssrn.1285778","DOIUrl":"https://doi.org/10.2139/ssrn.1285778","url":null,"abstract":"Media reports on incidences of abuse on the internet, particularly amongst teenagers, are growing at an alarming rate causing much concern among parents of teenagers and legislations aimed at regulating internet use among teenagers. Past studies have found that one in five youth were exposed to sexual solicitation, one in seventeen were harassed or threatened and only a fraction reported these cases while more than 63% reported being upset, embarrassed or stressed as a result of these unwanted contacts. Social networking sites (SNS) have been blamed to be a major source of harassment for teen users. Despite several media reports, there is a serious paucity of research in this area that explicitly identifies risk factors that make teens prone to internet abuse, and strategies for prevention and intervention. This study examines the extent to which internet use and having SNS site memberships result in incidences of stranger contact and online harassment for teens in the United States. We also determine the characteristics of teens that make them more likely to be victims of online harassment. Using parental background information, we also seek to shed light on the relationship between parental awareness and teen abuse on the internet. We use 2006 round of Pew Internet™ American Life Survey for this study. Since data on social networking has been collected fairly recently and we do not have any past information, the limitation of this study is that we cannot draw causal links between internet use and online harassment.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124406370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT-Enabled Organizational Agility and Sustainable Competitive Advantage","authors":"O. Lee, V. Sambamurthy, Kai H. Lim, K. Wei","doi":"10.2139/ssrn.1249301","DOIUrl":"https://doi.org/10.2139/ssrn.1249301","url":null,"abstract":"Organizational agility has recently received a great deal of attention as a significant business capability for competing in the current dynamic business environments. Further, researchers have hypothesized that information technology management enables organizational agility and competitive success. However, few large scale empirical efforts have yet been conducted to examine the hypothesized nomological networks surrounding IT capabilities, organizational agility, and competitive performance. This research utilizes data from a large-scale field survey and archival performance data to test a model of the relationships among IT capabilities, organizational agility, and firm performance. The results of a structural equation model analysis indicate that IT capability enables operational innovation capability and operational excellence capability, which in turn affect the development of two types of agility. These two types of agility, entrepreneurial and adaptive agility, are found to be associated with firms' sustainable competitive advantage. These findings provide a better understanding of the strategic role of IT in contemporary businesses. The study benefits both academics and practitioners by providing conceptual advancements of research constructs and theoretical extension of IT-enabled organizational agility.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114481224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Typology of Media Users in a Multinational Corporation","authors":"L. Biggiero","doi":"10.2139/ssrn.1222302","DOIUrl":"https://doi.org/10.2139/ssrn.1222302","url":null,"abstract":"Due to the contemporary action of a number of variables, large organizations can be hardly considered communities of similar types of media users. Likely, they are populated by different groups, which mix in different ways within and between departments, functions and groups. The identification of the types and characteristics of media users is vital for effective internal and external communication. Among three European subsidiaries of a large American corporation three groups have been evidenced, and depicted as characterized by traditional, computer-mediated, and multi-media users. They present quite marked differences in terms of actual communication means, gender, age, and education level. It emerged that email use intensity is a good proxy to identify the types, because traditional media users are totally uncorrelated with this index, while the other two groups are positively correlated and associate with it growing from multi-media to CMC. These latter can also be identified by looking at the number of work related emails.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"455 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123636775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lynn Wu, Benjamin N. Waber, Sinan Aral, E. Brynjolfsson, A. Pentland
{"title":"Mining Face-to-Face Interaction Networks using Sociometric Badges: Predicting Productivity in an IT Configuration Task","authors":"Lynn Wu, Benjamin N. Waber, Sinan Aral, E. Brynjolfsson, A. Pentland","doi":"10.2139/ssrn.1130251","DOIUrl":"https://doi.org/10.2139/ssrn.1130251","url":null,"abstract":"Social network theories (e.g. Granovetter 1973, Burt 1992) and information richness theory (Daft & Lengel 1987) have both been used independently to understand knowledge transfer in information intensive work settings. Social network theories explain how network structures covary with the diffusion and distribution of information, but largely ignore characteristics of the communication channels (or media) through which information and knowledge are transferred. Information richness theory on the other hand focuses explicitly on the communication channel requirements for different types of knowledge transfer but ignores the population level topology through which information is transferred in a network. This paper aims to bridge these two sets of theories to understand what types of social structures are most conducive to transferring knowledge and improving work performance in face-to-face communication networks. Using a novel set of data collection tools, techniques and methodologies, we were able to record precise data on the face-to-face interaction networks, tonal conversational variation and physical proximity of a group of IT configuration specialists over a one month period while they conducted their work. Linking these data to detailed performance and productivity metrics, we find four main results. First, the face-to-face communication networks of productive workers display very different topological structures compared to those discovered for email networks in previous research. In face-to-face networks, network cohesion is positively correlated with higher worker productivity, while the opposite is true in email communication. Second, network cohesion in face-to-face networks is associated with even higher work performance when executing complex tasks. This result suggests that network cohesion may complement information-rich communication media for transferring the complex or tacit knowledge needed to complete complex tasks. Third, the most effective network structures for latent social networks (those that characterize the network of available communication partners) differ from in-task social networks (those that characterize the network of communication partners that are actualized during the execution of a particular task). Finally, the effect of cohesion is much stronger in face-to-face networks than in physical proximity networks, demonstrating that information flows in actual conversations (rather than mere physical proximity) are driving our results. Our work bridges two influential bodies of research in order to contrast face-to-face network structure with network structure in electronic communication. We also contribute a novel set of tools and techniques for discovering and recording precise face-to-face interaction data in real world work settings.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115262952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Regulating AdWords: Consumer Protection in a Market Where the Commodity is Speech","authors":"Alexander Cannon","doi":"10.2139/SSRN.1120880","DOIUrl":"https://doi.org/10.2139/SSRN.1120880","url":null,"abstract":"We should be elated, we should be concerned, yet we should not be surprised. Google2 can read our minds, tell us what we want to purchase, assist us fulfilling our most personal and closely guarded desires, accelerate our businesses, update us on current events, make decisions for us, educate us, and keep us healthy. Some consumers \"can't think of anything they don't search for\". This Article hopes to increase the dialogue surrounding search engine regulation. Starting with the legal assumption that where there is a wrong there should be a remedy, this Article asserts that the judicial treatment of Google.com as a full First Amendment speaker is a dangerous precedent. Google is an advertising machine, and as a publicly traded company, its directors are obligated to increase the value of the organization by utilizing every tool at its disposal to get consumer eyes on ads. Google does not express an opinion in the traditional context of the First Amendment; by fostering a symbiotic balance between advertisers and searchers, Google amasses massive profits. Google's corporate interests, however, need to be weighed against societal values such as informational reliability and informational autonomy. Further, the traditional and often relied upon free-market checks fall apart in light of Google's rather un-savvy users. The most visceral danger would be to leave Google, with its ability to tactfully and discretely manipulate consumers, to its own devices. Finally, this Article proposes that the First Amendment does not absolutely bar potential Federal Trade Commission regulation of Google.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131904275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaborative Research in India: Academic Institution v/s Industry","authors":"Neeraj Parnami, Dr. Tapas Kumar Bandyopadhyay","doi":"10.2139/SSRN.1101984","DOIUrl":"https://doi.org/10.2139/SSRN.1101984","url":null,"abstract":"The term ‘collaboration’ is used to depict the all forms of agreement between academic institutions, corporate, universities, and any combination of such two or more parties who share the commitment to reach a common goal by using their resources available. Collaboration in Research and development (R&D) sector has been broadly used phenomenon for many years in India. In the collaborative research, the significant factors like time & cost being reduced to large extent because of sharing of the resources by the parties. Collaborative research contributes to the technological and economical development of the country. Collaboration avoids duplication in research. But there are lots of questions, may be arising in your mind like: what is actual meaning of collaborative research? Why do industries collaborate with the academic institutions? What goes on in the collaborative research? What are the effects of collaborative research? Which type of policy do they have? and simultaneously there are lots of issues - involved in collaborative research like intellectual property rights, technology licensing, confidential agreement etc. how can all these issues be resolved before or during collaboration, so that a healthy relationship may be established for the future benefits of all the parties involved? The purpose of writing this paper is to shed the light on the solutions available of all these questions and the issues arise between the parties involved in the collaborative research program.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126957785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"In Defense of Content Analysis Methodology","authors":"L. Nikolychuk, Pamela Y. Abbott","doi":"10.2139/ssrn.1089446","DOIUrl":"https://doi.org/10.2139/ssrn.1089446","url":null,"abstract":"In this paper, we explore the methodological process and empirical outcomes of a large scale, computer-supported content analysis of consumer camera advertisements between 1980 and 2003. The study aims to address some of the criticisms of this methodology since Kassarjian (1977). In particular, we consider critical viewpoints (Kolbe and Burnett 1991; Weber 1985; Perreault and Leigh 1989), which suggest that researchers should attend to strengthening reliability of this methodology through their research design and empirical procedures. This study shows the different ways in which the overall research design contributed to achieving high inter-subjective agreement (Cohen's Kappa ratings) on a per category basis and describes the difficulties that arose. We also provide some empirical insights to how the social structures associated with consumer photography in the UK and the USA have changed over the past twenty-three years, particularly in light of the emergence of digital technology imaging. Based on this research, we offer some suggestions for advancing the use of this research method.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114466962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Price Dispersion: A Game Theoretic Perspective and Empirical Evidence","authors":"Sulin Ba, Jan Stallaert, Zhongju Zhang","doi":"10.2139/ssrn.965774","DOIUrl":"https://doi.org/10.2139/ssrn.965774","url":null,"abstract":"The Internet has changed the nature of doing business as well as the nature of competition in many industries. Consumers are more empowered than ever with valuable information such as prices, products, and store ratings. Because of this, some researchers even predicted, during the early stage of e-commerce, a frictionless economy in which online prices would be driven down to marginal costs. However, many studies have subsequently observed the wide price dispersion online, and its existence and persistence has now been well documented. Possible explanations of this price dispersion, derived mainly using hedonic price models, have seen only modest success. In this paper, we propose an alternative competitive model, based on online retailers' differentiation, to explain price dispersion. We empirically test the predictions of this model and find that the model is a viable alternative to the hedonic price model. In addition, our competitive model is able to predict and explain observations that are seemingly inconsistent with a hedonic model. Practically, our model yields important recommendations for the online etailing industry and can help an e-tailer to choose a desirable position in the competitive market.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128178595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Champions of Revealing - the Role of Open Source Developers in Commercial Firms","authors":"J. Henkel","doi":"10.2139/ssrn.946929","DOIUrl":"https://doi.org/10.2139/ssrn.946929","url":null,"abstract":"The link between firms engaging in open source software (OSS) development and the OSS community is established by individual developers. This linkage might entail a principal-agent issue due to the developer's double allegiance to firm and OSS community, and expose the firm to the risk of losing intellectual property. Using both interviews and a large-scale survey, I substantiate the importance of the developer's role. However, neither interview data nor regression analysis show indications of commercially harmful revealing behavior induced by Free Software ideology. Management, on the other hand, sometimes seems to be overly concerned about openness. I conclude that a more positive stance towards openness will allow firms to better share in the benefits of open innovation processes.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"38 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134447302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clinical and Translational Science Informatics Infrastructure: A Framework and Case Study","authors":"A. Ramaprasad, A. Valenta, Ian S. Brooks","doi":"10.5220/0001038002130218","DOIUrl":"https://doi.org/10.5220/0001038002130218","url":null,"abstract":"This paper presents a comprehensive socio-technical framework for the design and development of a Clinical and Translational Science Informatics Infrastructure (CTSII). Based on our experience with developing and applying the framework we present a case study to illustrate the issues that arise in the creating a CTSII, and how possibly these issues can be resolved. The framework is presented as a menu with six columns, each column representing a dimension of the framework. The categories within each dimension can be concatenated, with the conjunctive phrases/words between the columns, to form sentences that describe all the functions of the CTSII. Elucidation of all the combinations will provide an exhaustive list of all the possible functions of CTSII.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122616020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}