{"title":"Keynote: Changes in Globalisation & Indian IT Industry Transformation","authors":"S. Gopalakrishnan","doi":"10.1145/3084381.3084382","DOIUrl":"https://doi.org/10.1145/3084381.3084382","url":null,"abstract":"Indian IT industry was built on a strategy to create the workforce required to scale the industry rapidly. The financial model included the costs of training and retraining the workforce as technology evolves. Today India is the preferred location for knowledge work for the world. How can India continue to evolve the model as the business of IT evolves? How can India evolve with changes in globalisation?","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124890728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"\"RISE IT for Social Good\": An Experimental Investigation of Context to Improve Programming Skills","authors":"L. Iyer, Indika Dissanayake, Rudolph T. Bedeley","doi":"10.1145/3084381.3084415","DOIUrl":"https://doi.org/10.1145/3084381.3084415","url":null,"abstract":"Despite increases in female labor force participation, Information Technology (IT) remains heavily male-dominated field. Given the rapid growth in IT career opportunities, it is important find ways to increase the IT female talent pipeline. As a solution that might help mitigate the problem, we proposed the \"RISE IT for Social Good\" project to examine possible pedagogical interventions to improve the experience female students have in programming. Specifically, this paper uses experimental method to examine whether context plays a role on enhancing female students' performance in IT related tasks.","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123435843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Failure of Success Factors: Lessons from Success and Failure Cases of Enterprise Architecture Implementation [Best Paper Nominee]","authors":"Tom Hope, E. Chew, Rajeev Sharma","doi":"10.1145/3084381.3084392","DOIUrl":"https://doi.org/10.1145/3084381.3084392","url":null,"abstract":"Many Enterprise Architecture programmes fail to meet expectations. While much has been written about the factors influencing the success of EA programmes, there are few empirical investigations of the role of critical success factors (CSFs) in the success of EA programmes. This study condensed the very broad literature on CSFs for EA identifying six key CSFs that share a broad consensus in the literature. A qualitative case study was conducted to test the hypothesis that the six key CSFs would distinguish between the successful and the unsuccessful programmes. Analysis of the case study data reveals that three key CSFs associated with the use of EA tools did not distinguish between successful and unsuccessful cases while three key CSFs related to the process of EA programme implementation did so. The study concludes that success in EA programmes comes more from how architecture is practiced than what is practiced. The findings have important implications for EA suggesting that the methodological skills of architects need to be supplemented with an understanding of practice.","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Paper Session 3.2: Digital Health","authors":"Friedrich Holotiuk","doi":"10.1145/3248722","DOIUrl":"https://doi.org/10.1145/3248722","url":null,"abstract":"","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116478058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tejaswini C. Herath, Hemantha S. B. Herath, J. D'Arcy
{"title":"Managing Security in Organizations: Adoption of Information Security Solutions","authors":"Tejaswini C. Herath, Hemantha S. B. Herath, J. D'Arcy","doi":"10.1145/3084381.3084390","DOIUrl":"https://doi.org/10.1145/3084381.3084390","url":null,"abstract":"We develop an integrative model grounded in two theoretical perspectives -- the diffusion of innovation theory and the technology-organization-environment framework -- to examine the diffusion of information security solutions (ISS) in organizations. We specify four innovation characteristics that are specific to ISS (compatibility, complexity, costs, and relative advantage), two organizational factors (organizational readiness and top management support), and two environmental factors (external pressure and visibility) as drivers of ISS diffusion. The model will be tested using data collected through survey questionnaires. We hope to share the results at the workshop in June.","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121050048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust and Risk in E-Commerce: A Re-examination and Theoretical Integration","authors":"Ruochen Liao, R. Kishore","doi":"10.1145/3084381.3084385","DOIUrl":"https://doi.org/10.1145/3084381.3084385","url":null,"abstract":"Feedback system plays an important role in E-commerce as decision support for buyers. In this paper we examine the role of feedback system in building trust towards unknown E-vendors when buyers are making purchase for the first time. We adopted Signaling theory from marketing literature to breakdown the cognitive process of buyers when they face a mixture of true and fake advertisements and guarantees from the E-vendor, and how they perceive the signals to be honest and true. We posit that Social Presence signals from reviewers in the feedback system possess the bonding ability that makes the cost/difficulty in sending fake signals prohibitively high in given feedback system. This perceived credibility in feedback system then positively influence the perceived credibility of trust-building signals, as the cost for sending fake signal without being exposed by the feedback system is extremely high. Finally, the perceived level of trust in the E-vendor positively influence the perceived credibility of risk-reducing signals, because the potential loss of sending out fake signals will jeopardise established consumer trust, which is highly sought after and valuable. By identifying the reinforcing effect between these constructs rather than parallel constructs, we hypothesize that interpersonal signals serve as a \"primer\" that can trigger this chain reaction, and feedback system has a much broader implication in the formation of online trust than previously recognized. For practitioners of e-commerce, this study provides an alternative source of trust-building tools apart from costly traditional signaling behaviors.","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124961559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Media and Online Political Participation of Citizens","authors":"Vidushi Pandey","doi":"10.1145/3084381.3084427","DOIUrl":"https://doi.org/10.1145/3084381.3084427","url":null,"abstract":"This research aims to explore the role of social media platforms on citizen's political participation behaviour. The three essays in this work explore the nature of political participation on social media, identify the mechanism through which social media impacts online political participation and study how technological feature of social media impact costs and benefits perceived by citizens in political participation. The results of this work will add to the literature of political participation as well information systems by identifying the link between social media's features and its impact on online political participation of citizens","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117261657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT Enabled Frugal Effectuation","authors":"P. B. Khanal, Jean-Grégoire Bernard, B. Aubert","doi":"10.1145/3084381.3084396","DOIUrl":"https://doi.org/10.1145/3084381.3084396","url":null,"abstract":"To succeed, entrepreneurs operating in frugal contexts tend to adopt an effectual logic of action. Such entrepreneurs also increasingly rely on digital technologies to pursue opportunities.Yet, despite a flurry of scholarly attention to effectuation tactics and their outcomes, surprisingly little is known about how digital technologies support effectuation, and with what outcomes. This paper sketches a theoretical model of how IT affordances support effectuation in frugal contexts.The model extends entrepreneurship and information systems theories of frugal entrepreneurship by linking specific IT affordances to dimensions of effectuation. The paper also discusses how the model could be refined by empirical studies and extended across levels of analysis.","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128902787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Paper Session 1.1: IT Workforce Management","authors":"S. S. Bharadwaj","doi":"10.1145/3248717","DOIUrl":"https://doi.org/10.1145/3248717","url":null,"abstract":"","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131922136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Individual Information Privacy and Personalization on Online Buying Behavior: An Experimental Study.","authors":"Kanishka Priyadharshini Annamalai, Saji K. Mathew","doi":"10.1145/3084381.3084423","DOIUrl":"https://doi.org/10.1145/3084381.3084423","url":null,"abstract":"We study the relationship between web personalization and individual information privacy on the customer's online buying behavior. Following a laboratory experiment we tested the differences for number of clicks and number of products added to cart with respect to two factors, namely Web Personalization and Information privacy related to a product. Our results show significant mean differences with respect to clicks and number of products added to the cart for privacy and non privacy products.","PeriodicalId":441637,"journal":{"name":"Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research","volume":"86 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132984264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}