{"title":"Effects of Adaptivity and Other External Variables on Mobile Service Adoption","authors":"E. Polat, N. Basoglu, T. Daim","doi":"10.4018/jisss.2011070105","DOIUrl":"https://doi.org/10.4018/jisss.2011070105","url":null,"abstract":"User Interface between user and information systems has a great role in system adoption. Based on technology acceptance model, acceptance of a system is explained as a function of perceived usefulness and perceived ease of use. Since there are several external variables that have an impact on perceived usefulness and perceived ease of use, the content and interface design of every single application should be addressed accordingly to enhance users' intention to use the system. We propose that adding adaptive features into systems may be one of the approaches to address this phenomenon. This paper identifies external variables including adaptive behavior impacting acceptance of mobile reservation system through two prototypes.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121826307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Privacy Control Theory for Online Environments","authors":"M. Moloney, F. Bannister","doi":"10.2139/ssrn.2227595","DOIUrl":"https://doi.org/10.2139/ssrn.2227595","url":null,"abstract":"Extant literature in Information Systems often reports a significant level of unease among the Internet community with regard to threats to online privacy but fails to identify a comprehensive set of specific online privacy concerns. Moreover, out of the concerns that have been identified by a number of surveys, it is unclear whether any have adequate theoretical foundations. This paper uses the existing privacy literature and in particular the work of two prominent privacy theorists, Westin and Altman, to devise an online privacy model which outlines the components of the online privacy concept and their interdependencies. A theory for online privacy is then derived from this model.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125697434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Running Code as Part of an Open Standards Policy","authors":"Rajiv C. Shah, J. Kesan","doi":"10.5210/fm.v14i6.2414","DOIUrl":"https://doi.org/10.5210/fm.v14i6.2414","url":null,"abstract":"Governments around the world are considering implementing or even mandating open standards policies. They believe these policies will provide economic, socio-political, and technical benefits. In this article, we analyze Massachusetts's open standards policy as applied to document formats. This policy was known as the open formats policy, and Massachusetts believed it would offer substantial economic and technological benefits. However, our analysis shows these benefits never emerged. The failure of the open formats policy is due to the lack of running code. Running code refers to multiple independent, interoperable implementations of an open standard. With running code, users have choice in their adoption of a software product. Choice brings about economic and technological benefits. Consequently, we urge governments to incorporate a \"running code\" requirement when adopting an open standards policy.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126935444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposition of a Faceted Classification Model to Support Corporate Information Organization and Digital Records Management","authors":"Sabine Mas, Yves Marleau","doi":"10.1109/HICSS.2009.874","DOIUrl":"https://doi.org/10.1109/HICSS.2009.874","url":null,"abstract":"The employees of an organization often use a personal hierarchical classification scheme to organize digital documents that are stored on their own workstations. As this may make it hard for other employees to retrieve these documents, there is a risk that the organization will lose track of needed documentation. Furthermore, the inherent boundaries of such a hierarchical structure require making arbitrary decisions about which specific criteria the classification will be based on (for instance, the administrative activity or the document type, although a document can have several attributes and require classification in several classes).A faceted classification model to support corporate information organization is proposed. Partially based on Ranganathan's facets theory, this model aims not only to standardize the organization of digital documents, but also to simplify the management of a document throughout its life cycle for both individuals and organizations, while ensuring compliance to regulatory and policy requirements.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114966121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eric Gleave, Howard T. Welser, Thomas M. Lento, Marc A. Smith
{"title":"A Conceptual and Operational Definition of 'Social Role' in Online Community","authors":"Eric Gleave, Howard T. Welser, Thomas M. Lento, Marc A. Smith","doi":"10.1109/HICSS.2009.6","DOIUrl":"https://doi.org/10.1109/HICSS.2009.6","url":null,"abstract":"Both online and off, people frequently perform particular social roles. These roles organize behavior and give structure to positions in local networks. As more of social life becomes embedded in online systems, the concept of social role becomes increasingly valuable as a tool for simplifying patterns of action, recognizing distinct user types, and cultivating and managing communities. This paper standardizes the usage of the term 'social role' in online community as a combination of social psychological, social structural, and behavioral attributes. Beyond the conceptual definition, we describe measurement and analysis strategies for identifying social roles in online community. We demonstrate this process in two domains, Usenet and Wikipedia, identifying key social roles in each domain. We conclude with directions for future research, with a particular focus on the analysis of communities as role ecologies.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115417282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction of a Technology Selection Model","authors":"M. Cochran","doi":"10.1109/HICSS.2009.787","DOIUrl":"https://doi.org/10.1109/HICSS.2009.787","url":null,"abstract":"Applications and technology have matured in the marketplace. Most organizations have a line-of-business application that manages the business area. The issue then becomes how to move from the current technology to the next technology. A number of Information System theories deal with the intentions of users or, in this context, purchasing decision makers. Generally, the goal is to optimize the selection from a technology viewpoint. These theories do not address all of the human interaction specifics of technology selection. There are additional criteria that are not considered as part of the standard Information Theories of Reasoned Action or Technology Acceptance Model. The proposed Technology Selection Model includes peer and industry evaluations, vendor marketing efforts, Satisficing, organizational fit as well as the typical technical evaluation. The model is supported by theory from consumer behavior and evaluated against Earl's Strategic Grid.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115686046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"What Is Complex About 273 Applications? Untangling Application Architecture Complexity in a Case of European Investment Banking","authors":"M. Mocker","doi":"10.1109/HICSS.2009.1022","DOIUrl":"https://doi.org/10.1109/HICSS.2009.1022","url":null,"abstract":"In this paper, we first derive propositions from the current literature addressing the causes and impacts of application architecture (AA) complexity. We then untangle AA complexity itself by differentiating four types of AA complexity that are mingled in extant literature: interdependency-, diversity-, deviation-, and overlap-related AA complexity. Based on this more differentiated view, we validate the propositions in the setting of a European Bank. Our findings suggest that only interdependency-related AA complexity behaves as currently assumed. Other types show partially opposite effects.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124460469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying a ThinkLet- and ThinXel-Based Group Process Modeling Language: A Prototype of a Universal Group Support System","authors":"S. Knoll, Martin Hörning, G. Horton","doi":"10.1109/HICSS.2009.588","DOIUrl":"https://doi.org/10.1109/HICSS.2009.588","url":null,"abstract":"Group Support Systems (GSS) can improve the productivity of Group Work by offering a variety of tools to assist a virtual group across geographical distances. Experience shows that the value of a GSS depends on how purposefully and skillfully it is used. We present a framework for a universal GSS based on a thinkLet- and thinXel-based Group Process Modeling Language (GPML). Our framework approach uses the GPML to describe different kinds of group processes in an unambiguous and compact representation and to guide the participants automatically through these processes. We assume that a GSS based on this GPML can provide the following advantages: to support the user by designing and executing a collaboration process and to increase the applicability of GSSs for different kinds of group processes. We will present a prototype and use different kinds of group processes to illustrate the application of a GPML for a universal GSS.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121809949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Max-Min Approach to the Output Evaluation of Knowledge Interaction","authors":"Travis K. Huang, E. Huang","doi":"10.1109/HICSS.2009.531","DOIUrl":"https://doi.org/10.1109/HICSS.2009.531","url":null,"abstract":"The concept of knowledge management has been flowering as information management matures. Nevertheless, up until now, more attention has been focused on knowledge management inside organizations and less on knowledge management across organizational boundaries. Attempting to fill this gap and address the problems of cross-boundary knowledge management, this research first identified key boundary objects in the context of knowledge management, and then studies how actors from different organizations interact through boundary objects. The result links the performance of collaborative acts to the frequency of boundary object encountering in the course of interaction. In this study, although the context is described with \"actors\" in mind, the unit of analysis is \"knowledge\" itself, rather than \"actors,\" and the interaction is termed \"knowledge interaction\". Student assignments of information system projects serve as the cases of analysis. To analyze the performance of ten types of knowledge interactions, a max-min approach is applied, with one output factor, namely project performance, and four input factors, which are the frequencies of the encountering of four boundary objects. The result strongly suggests that identifying, creating, and facilitating useful boundary objects is the key to successful projects. Whether tacit knowledge is converted into explicit knowledge during the process is less important in achieving effective collaboration. Also, it is not always necessary to identify specific tacit knowledge in each organization.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"48 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117064355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model for Understanding the Relationships Between Organizational Trust, KM Initiatives and Successes","authors":"V. Ribière","doi":"10.1109/HICSS.2009.533","DOIUrl":"https://doi.org/10.1109/HICSS.2009.533","url":null,"abstract":"Organizational culture and more particularly organizational trust is often mentioned as one of the main enablers for knowledge sharing and knowledge acquisition. For this research we used an empirical approach to validate this assumption. A theoretical model was developed to test the influence of organizational trust on the usage of various KM tools and practices (personalization and codification) as well as to assess its impact on KM initiative success and on the resulting benefits for organizations. Data collected among 97 US companies were used to validate this model and to demonstrate the significant role of trust in KM initiative success.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120810653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}