Information Systems: Behavioral & Social Methods最新文献

筛选
英文 中文
Are Social Networking Sites a Source of Online Harassment for Teens? Evidence from Survey Data 社交网站是青少年网络骚扰的来源吗?来自调查数据的证据
Information Systems: Behavioral & Social Methods Pub Date : 2008-09-01 DOI: 10.2139/ssrn.1285778
A. Sengupta, Anoshua Chaudhuri
{"title":"Are Social Networking Sites a Source of Online Harassment for Teens? Evidence from Survey Data","authors":"A. Sengupta, Anoshua Chaudhuri","doi":"10.2139/ssrn.1285778","DOIUrl":"https://doi.org/10.2139/ssrn.1285778","url":null,"abstract":"Media reports on incidences of abuse on the internet, particularly amongst teenagers, are growing at an alarming rate causing much concern among parents of teenagers and legislations aimed at regulating internet use among teenagers. Past studies have found that one in five youth were exposed to sexual solicitation, one in seventeen were harassed or threatened and only a fraction reported these cases while more than 63% reported being upset, embarrassed or stressed as a result of these unwanted contacts. Social networking sites (SNS) have been blamed to be a major source of harassment for teen users. Despite several media reports, there is a serious paucity of research in this area that explicitly identifies risk factors that make teens prone to internet abuse, and strategies for prevention and intervention. This study examines the extent to which internet use and having SNS site memberships result in incidences of stranger contact and online harassment for teens in the United States. We also determine the characteristics of teens that make them more likely to be victims of online harassment. Using parental background information, we also seek to shed light on the relationship between parental awareness and teen abuse on the internet. We use 2006 round of Pew Internet™ American Life Survey for this study. Since data on social networking has been collected fairly recently and we do not have any past information, the limitation of this study is that we cannot draw causal links between internet use and online harassment.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124406370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 145
IT-Enabled Organizational Agility and Sustainable Competitive Advantage it支持的组织敏捷性和可持续竞争优势
Information Systems: Behavioral & Social Methods Pub Date : 2008-08-23 DOI: 10.2139/ssrn.1249301
O. Lee, V. Sambamurthy, Kai H. Lim, K. Wei
{"title":"IT-Enabled Organizational Agility and Sustainable Competitive Advantage","authors":"O. Lee, V. Sambamurthy, Kai H. Lim, K. Wei","doi":"10.2139/ssrn.1249301","DOIUrl":"https://doi.org/10.2139/ssrn.1249301","url":null,"abstract":"Organizational agility has recently received a great deal of attention as a significant business capability for competing in the current dynamic business environments. Further, researchers have hypothesized that information technology management enables organizational agility and competitive success. However, few large scale empirical efforts have yet been conducted to examine the hypothesized nomological networks surrounding IT capabilities, organizational agility, and competitive performance. This research utilizes data from a large-scale field survey and archival performance data to test a model of the relationships among IT capabilities, organizational agility, and firm performance. The results of a structural equation model analysis indicate that IT capability enables operational innovation capability and operational excellence capability, which in turn affect the development of two types of agility. These two types of agility, entrepreneurial and adaptive agility, are found to be associated with firms' sustainable competitive advantage. These findings provide a better understanding of the strategic role of IT in contemporary businesses. The study benefits both academics and practitioners by providing conceptual advancements of research constructs and theoretical extension of IT-enabled organizational agility.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114481224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
A Typology of Media Users in a Multinational Corporation 跨国公司媒体用户的类型学
Information Systems: Behavioral & Social Methods Pub Date : 2008-08-13 DOI: 10.2139/ssrn.1222302
L. Biggiero
{"title":"A Typology of Media Users in a Multinational Corporation","authors":"L. Biggiero","doi":"10.2139/ssrn.1222302","DOIUrl":"https://doi.org/10.2139/ssrn.1222302","url":null,"abstract":"Due to the contemporary action of a number of variables, large organizations can be hardly considered communities of similar types of media users. Likely, they are populated by different groups, which mix in different ways within and between departments, functions and groups. The identification of the types and characteristics of media users is vital for effective internal and external communication. Among three European subsidiaries of a large American corporation three groups have been evidenced, and depicted as characterized by traditional, computer-mediated, and multi-media users. They present quite marked differences in terms of actual communication means, gender, age, and education level. It emerged that email use intensity is a good proxy to identify the types, because traditional media users are totally uncorrelated with this index, while the other two groups are positively correlated and associate with it growing from multi-media to CMC. These latter can also be identified by looking at the number of work related emails.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"455 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123636775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mining Face-to-Face Interaction Networks using Sociometric Badges: Predicting Productivity in an IT Configuration Task 使用社会计量徽章挖掘面对面交互网络:预测IT配置任务中的生产力
Information Systems: Behavioral & Social Methods Pub Date : 2008-05-07 DOI: 10.2139/ssrn.1130251
Lynn Wu, Benjamin N. Waber, Sinan Aral, E. Brynjolfsson, A. Pentland
{"title":"Mining Face-to-Face Interaction Networks using Sociometric Badges: Predicting Productivity in an IT Configuration Task","authors":"Lynn Wu, Benjamin N. Waber, Sinan Aral, E. Brynjolfsson, A. Pentland","doi":"10.2139/ssrn.1130251","DOIUrl":"https://doi.org/10.2139/ssrn.1130251","url":null,"abstract":"Social network theories (e.g. Granovetter 1973, Burt 1992) and information richness theory (Daft & Lengel 1987) have both been used independently to understand knowledge transfer in information intensive work settings. Social network theories explain how network structures covary with the diffusion and distribution of information, but largely ignore characteristics of the communication channels (or media) through which information and knowledge are transferred. Information richness theory on the other hand focuses explicitly on the communication channel requirements for different types of knowledge transfer but ignores the population level topology through which information is transferred in a network. This paper aims to bridge these two sets of theories to understand what types of social structures are most conducive to transferring knowledge and improving work performance in face-to-face communication networks. Using a novel set of data collection tools, techniques and methodologies, we were able to record precise data on the face-to-face interaction networks, tonal conversational variation and physical proximity of a group of IT configuration specialists over a one month period while they conducted their work. Linking these data to detailed performance and productivity metrics, we find four main results. First, the face-to-face communication networks of productive workers display very different topological structures compared to those discovered for email networks in previous research. In face-to-face networks, network cohesion is positively correlated with higher worker productivity, while the opposite is true in email communication. Second, network cohesion in face-to-face networks is associated with even higher work performance when executing complex tasks. This result suggests that network cohesion may complement information-rich communication media for transferring the complex or tacit knowledge needed to complete complex tasks. Third, the most effective network structures for latent social networks (those that characterize the network of available communication partners) differ from in-task social networks (those that characterize the network of communication partners that are actualized during the execution of a particular task). Finally, the effect of cohesion is much stronger in face-to-face networks than in physical proximity networks, demonstrating that information flows in actual conversations (rather than mere physical proximity) are driving our results. Our work bridges two influential bodies of research in order to contrast face-to-face network structure with network structure in electronic communication. We also contribute a novel set of tools and techniques for discovering and recording precise face-to-face interaction data in real world work settings.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115262952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 171
Regulating AdWords: Consumer Protection in a Market Where the Commodity is Speech 规范广告关键词:以言论为商品的市场中的消费者保护
Information Systems: Behavioral & Social Methods Pub Date : 2008-04-15 DOI: 10.2139/SSRN.1120880
Alexander Cannon
{"title":"Regulating AdWords: Consumer Protection in a Market Where the Commodity is Speech","authors":"Alexander Cannon","doi":"10.2139/SSRN.1120880","DOIUrl":"https://doi.org/10.2139/SSRN.1120880","url":null,"abstract":"We should be elated, we should be concerned, yet we should not be surprised. Google2 can read our minds, tell us what we want to purchase, assist us fulfilling our most personal and closely guarded desires, accelerate our businesses, update us on current events, make decisions for us, educate us, and keep us healthy. Some consumers \"can't think of anything they don't search for\". This Article hopes to increase the dialogue surrounding search engine regulation. Starting with the legal assumption that where there is a wrong there should be a remedy, this Article asserts that the judicial treatment of Google.com as a full First Amendment speaker is a dangerous precedent. Google is an advertising machine, and as a publicly traded company, its directors are obligated to increase the value of the organization by utilizing every tool at its disposal to get consumer eyes on ads. Google does not express an opinion in the traditional context of the First Amendment; by fostering a symbiotic balance between advertisers and searchers, Google amasses massive profits. Google's corporate interests, however, need to be weighed against societal values such as informational reliability and informational autonomy. Further, the traditional and often relied upon free-market checks fall apart in light of Google's rather un-savvy users. The most visceral danger would be to leave Google, with its ability to tactfully and discretely manipulate consumers, to its own devices. Finally, this Article proposes that the First Amendment does not absolutely bar potential Federal Trade Commission regulation of Google.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131904275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Collaborative Research in India: Academic Institution v/s Industry 印度的合作研究:学术机构与产业
Information Systems: Behavioral & Social Methods Pub Date : 2008-02-01 DOI: 10.2139/SSRN.1101984
Neeraj Parnami, Dr. Tapas Kumar Bandyopadhyay
{"title":"Collaborative Research in India: Academic Institution v/s Industry","authors":"Neeraj Parnami, Dr. Tapas Kumar Bandyopadhyay","doi":"10.2139/SSRN.1101984","DOIUrl":"https://doi.org/10.2139/SSRN.1101984","url":null,"abstract":"The term ‘collaboration’ is used to depict the all forms of agreement between academic institutions, corporate, universities, and any combination of such two or more parties who share the commitment to reach a common goal by using their resources available. Collaboration in Research and development (R&D) sector has been broadly used phenomenon for many years in India. In the collaborative research, the significant factors like time & cost being reduced to large extent because of sharing of the resources by the parties. Collaborative research contributes to the technological and economical development of the country. Collaboration avoids duplication in research. But there are lots of questions, may be arising in your mind like: what is actual meaning of collaborative research? Why do industries collaborate with the academic institutions? What goes on in the collaborative research? What are the effects of collaborative research? Which type of policy do they have? and simultaneously there are lots of issues - involved in collaborative research like intellectual property rights, technology licensing, confidential agreement etc. how can all these issues be resolved before or during collaboration, so that a healthy relationship may be established for the future benefits of all the parties involved? The purpose of writing this paper is to shed the light on the solutions available of all these questions and the issues arise between the parties involved in the collaborative research program.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126957785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
In Defense of Content Analysis Methodology 为内容分析方法论辩护
Information Systems: Behavioral & Social Methods Pub Date : 2008-02-01 DOI: 10.2139/ssrn.1089446
L. Nikolychuk, Pamela Y. Abbott
{"title":"In Defense of Content Analysis Methodology","authors":"L. Nikolychuk, Pamela Y. Abbott","doi":"10.2139/ssrn.1089446","DOIUrl":"https://doi.org/10.2139/ssrn.1089446","url":null,"abstract":"In this paper, we explore the methodological process and empirical outcomes of a large scale, computer-supported content analysis of consumer camera advertisements between 1980 and 2003. The study aims to address some of the criticisms of this methodology since Kassarjian (1977). In particular, we consider critical viewpoints (Kolbe and Burnett 1991; Weber 1985; Perreault and Leigh 1989), which suggest that researchers should attend to strengthening reliability of this methodology through their research design and empirical procedures. This study shows the different ways in which the overall research design contributed to achieving high inter-subjective agreement (Cohen's Kappa ratings) on a per category basis and describes the difficulties that arose. We also provide some empirical insights to how the social structures associated with consumer photography in the UK and the USA have changed over the past twenty-three years, particularly in light of the emergence of digital technology imaging. Based on this research, we offer some suggestions for advancing the use of this research method.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114466962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Online Price Dispersion: A Game Theoretic Perspective and Empirical Evidence 网络价格分散:博弈论视角与实证
Information Systems: Behavioral & Social Methods Pub Date : 2008-01-10 DOI: 10.2139/ssrn.965774
Sulin Ba, Jan Stallaert, Zhongju Zhang
{"title":"Online Price Dispersion: A Game Theoretic Perspective and Empirical Evidence","authors":"Sulin Ba, Jan Stallaert, Zhongju Zhang","doi":"10.2139/ssrn.965774","DOIUrl":"https://doi.org/10.2139/ssrn.965774","url":null,"abstract":"The Internet has changed the nature of doing business as well as the nature of competition in many industries. Consumers are more empowered than ever with valuable information such as prices, products, and store ratings. Because of this, some researchers even predicted, during the early stage of e-commerce, a frictionless economy in which online prices would be driven down to marginal costs. However, many studies have subsequently observed the wide price dispersion online, and its existence and persistence has now been well documented. Possible explanations of this price dispersion, derived mainly using hedonic price models, have seen only modest success. In this paper, we propose an alternative competitive model, based on online retailers' differentiation, to explain price dispersion. We empirically test the predictions of this model and find that the model is a viable alternative to the hedonic price model. In addition, our competitive model is able to predict and explain observations that are seemingly inconsistent with a hedonic model. Practically, our model yields important recommendations for the online etailing industry and can help an e-tailer to choose a desirable position in the competitive market.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128178595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Champions of Revealing - the Role of Open Source Developers in Commercial Firms 揭秘的拥护者——开源开发者在商业公司中的角色
Information Systems: Behavioral & Social Methods Pub Date : 2008-01-01 DOI: 10.2139/ssrn.946929
J. Henkel
{"title":"Champions of Revealing - the Role of Open Source Developers in Commercial Firms","authors":"J. Henkel","doi":"10.2139/ssrn.946929","DOIUrl":"https://doi.org/10.2139/ssrn.946929","url":null,"abstract":"The link between firms engaging in open source software (OSS) development and the OSS community is established by individual developers. This linkage might entail a principal-agent issue due to the developer's double allegiance to firm and OSS community, and expose the firm to the risk of losing intellectual property. Using both interviews and a large-scale survey, I substantiate the importance of the developer's role. However, neither interview data nor regression analysis show indications of commercially harmful revealing behavior induced by Free Software ideology. Management, on the other hand, sometimes seems to be overly concerned about openness. I conclude that a more positive stance towards openness will allow firms to better share in the benefits of open innovation processes.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"38 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134447302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Clinical and Translational Science Informatics Infrastructure: A Framework and Case Study 临床和转化科学信息基础设施:框架和案例研究
Information Systems: Behavioral & Social Methods Pub Date : 2008-01-01 DOI: 10.5220/0001038002130218
A. Ramaprasad, A. Valenta, Ian S. Brooks
{"title":"Clinical and Translational Science Informatics Infrastructure: A Framework and Case Study","authors":"A. Ramaprasad, A. Valenta, Ian S. Brooks","doi":"10.5220/0001038002130218","DOIUrl":"https://doi.org/10.5220/0001038002130218","url":null,"abstract":"This paper presents a comprehensive socio-technical framework for the design and development of a Clinical and Translational Science Informatics Infrastructure (CTSII). Based on our experience with developing and applying the framework we present a case study to illustrate the issues that arise in the creating a CTSII, and how possibly these issues can be resolved. The framework is presented as a menu with six columns, each column representing a dimension of the framework. The categories within each dimension can be concatenated, with the conjunctive phrases/words between the columns, to form sentences that describe all the functions of the CTSII. Elucidation of all the combinations will provide an exhaustive list of all the possible functions of CTSII.","PeriodicalId":193943,"journal":{"name":"Information Systems: Behavioral & Social Methods","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122616020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信