Data Base for Advances in Information Systems最新文献

筛选
英文 中文
Consumers' Mobile Health Adoption Intention Prediction Utilizing an Extended Version of The Theory of Planned Behavior 基于扩展版计划行为理论的消费者移动健康采用意愿预测
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2022-04-22 DOI: 10.1145/3533692.3533699
V. Arkorful, Shu-rong Zhao, B. Lugu, Jianxun Chu
{"title":"Consumers' Mobile Health Adoption Intention Prediction Utilizing an Extended Version of The Theory of Planned Behavior","authors":"V. Arkorful, Shu-rong Zhao, B. Lugu, Jianxun Chu","doi":"10.1145/3533692.3533699","DOIUrl":"https://doi.org/10.1145/3533692.3533699","url":null,"abstract":"The proliferation and adoption of phones and other emerging technologies in health care is significantly growing in Ghana. Though tapping into this technology innovation could tremendously improve health care in resource deficient settings, there is a dearth of research on adoption antecedents. Drawing strength from behavior studies anchored on the theory of planned behavior (TPB), our study proposed a model, and further sampled 386 respondents to predict mobile health adoption behavior. Empirical results of our study revealed that attitude, subjective norm, perceived behavior control, personal moral norm, and language all had a significant positive relationship with adoption intention. Furthermore, adoption intention was also revealed to have a significant positive relationship with behavior. And finally, Internet bandwidth was revealed to significantly moderate the relationship between adoption intention and actual adoption behavior. Based on the results, further insights for stakeholders and policy, implications for accelerating mobile health adoption, and suggestions for future research are subsequently delineated.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"15 1","pages":"96 - 114"},"PeriodicalIF":2.8,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75138408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MIGRANT 移民
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2022-04-22 DOI: 10.1145/3533692.3533698
Nora Alkaldi, K. Renaud
{"title":"MIGRANT","authors":"Nora Alkaldi, K. Renaud","doi":"10.1145/3533692.3533698","DOIUrl":"https://doi.org/10.1145/3533692.3533698","url":null,"abstract":"Password manager applications have the potential to alleviate password pain and improve password strength, yet they are not widely adopted. Password managers are dissimilar to other kinds of software tools, given that the leakage of the credentials they store could give a hacker access to all the individual's online accounts. Moreover, adoption requires a deliberate switch away from an existing (manual) password management routine. As such, traditional technology adoption models are unlikely to model password manager adoption accurately. In this paper, we propose and explain how we validated a theoretical model of smartphone password manager adoption. We commenced by carrying out exploratory interviews with 30 smartphone owners to identify factors that influence adoption. These were used to develop a model that reflects the password manager adoption process, building on migration theory. The proposed model, MIGRANT (MIGRation pAssword maNager adopTion), was validated and subsequently refined in a week-long study with 198 smartphone owners, combining self-report and observation to measure constructs. This study contributes to the information security behavioral literature by isolating the main factors that encourage or deter password manager adoption, and those that moor smartphone owners in their current practices, hindering switching. With this investigation, we introduce migration theory as a reference theory for future studies in the information security behavioral field.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"8 1","pages":"63 - 95"},"PeriodicalIF":2.8,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78923334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Philosopher's Corner 哲学家的角落
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2022-04-22 DOI: 10.1145/3533692.3533695
F. Niederman
{"title":"The Philosopher's Corner","authors":"F. Niederman","doi":"10.1145/3533692.3533695","DOIUrl":"https://doi.org/10.1145/3533692.3533695","url":null,"abstract":"Bruno Latour is a key proponent of the Actor-Network Theory, which challenges many of the commonly held beliefs and practices in IS. Though there have been a few studies in IS using his approach, his thinking is deeper and richer than what has initially been explored. This essay highlights key issues raised by Latour and explains how they may provide insight and value for IS researchers.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"353 1","pages":"11 - 25"},"PeriodicalIF":2.8,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84877766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explore to Learn 探索学习
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2022-04-22 DOI: 10.1145/3533692.3533697
M. Darban
{"title":"Explore to Learn","authors":"M. Darban","doi":"10.1145/3533692.3533697","DOIUrl":"https://doi.org/10.1145/3533692.3533697","url":null,"abstract":"Explorative information systems behaviors are the ways in which individuals actively revise their usage and discover creative means of applying the system, extending the potentials of the system, and enhancing task performance. This study has developed a specific concept of explorative system behavior-explorative information technology (IT) learning-to describe users' post-training learning behavior-novel use. Adapting a herding lens, we study the individual and team-level triggers of explorative learning cognitions. The study tests the proposed cross-level model and collects data from 225 individuals who are divided into 51 teams. The results indicate that individuals tend to innovatively use a system through developed exploration cognitions in team settings as a response to examined herd behavior triggers. The study uncovered that members of cohesive teams and learners with high uncertainty perceptions are more likely to imitate the observed explorative learning behaviors of their peers and reproduce such behaviors in the long term.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"583 1","pages":"41 - 62"},"PeriodicalIF":2.8,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77299223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conceptualizing the Marginalized Context in Information Systems Research 信息系统研究中边缘化语境的概念化
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2022-04-22 DOI: 10.1145/3533692.3533694
K. D. Joshi
{"title":"Conceptualizing the Marginalized Context in Information Systems Research","authors":"K. D. Joshi","doi":"10.1145/3533692.3533694","DOIUrl":"https://doi.org/10.1145/3533692.3533694","url":null,"abstract":"The idea of \"intersectionality\" seeks to capture both the structural and dynamic consequences of the interaction between two or more forms of discrimination or systems of subordination. It specifically addresses the manner in which racism, patriarchy, economic disadvantages and other discriminatory systems contribute to create layers of inequality that structures the relative positions of women and men, races, and other groups. Moreover, it addresses the way that specific acts and policies create burdens that flow along these intersecting axes contributing actively to create a dynamic of disempowerment. (United Nations, 2000)","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"46 1","pages":"7 - 10"},"PeriodicalIF":2.8,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77823296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Are We Doing Enough? 我们做得够不够?
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2022-01-24 DOI: 10.1145/3514097.3514099
K. D. Joshi
{"title":"Are We Doing Enough?","authors":"K. D. Joshi","doi":"10.1145/3514097.3514099","DOIUrl":"https://doi.org/10.1145/3514097.3514099","url":null,"abstract":"The obligation to tackle biases and injustices rooted in the publishing ecosystem has reached the academic communities' consciousness (Royal Society, 2022; APA, 2021; Nature, 2022). Similarly, the IS community is institutionalizing governance mechanisms to demonstrate its commitment to Diversity, Equity and Inclusion (DEI) (Burton-Jones & Sarker, 2021; Association for Information Systems, 2021), in hopes of reversing the unwanted effects of explicit and implicit biases in communicating and publishing IS scholarship.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"13 1","pages":"7 - 9"},"PeriodicalIF":2.8,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84833196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects of Organizational Controls on Employees' Cyber-loafing 组织控制对员工网络闲逛的影响
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2022-01-24 DOI: 10.1145/3514097.3514102
X. Luo, Feng Xu, Junmei Zhang, Shan Xiao, B. Xue
{"title":"Effects of Organizational Controls on Employees' Cyber-loafing","authors":"X. Luo, Feng Xu, Junmei Zhang, Shan Xiao, B. Xue","doi":"10.1145/3514097.3514102","DOIUrl":"https://doi.org/10.1145/3514097.3514102","url":null,"abstract":"Cyber-loafing is a workplace deviant behavior that may impose perennial losses and security threats to organizations. Due to the destructive impact, organizations take controls to manage employees' cyber-loafing behavior. While previous research concerning these cyber-loafing controls has yielded inconsistent results, this research further advances this line of research through two primarily adopted organizational controls: computer monitoring and Internet usage policy. We contend that the inconsistent results of the effects of computer monitoring and Internet usage policy on cyber-loafing behavior are due to ignoring the influence of individual differences. Motivated thus, we draw on pertaining literature of trait mindfulness to propose that trait mindfulness moderates the effect of perceived computer monitoring and perceived Internet usage policy on behavioral automaticity towards cyber-loafing, which leads to employees' cyber-loafing behavior. In essence, this paper sheds new light on the relationships amid organizational controls, cyber-loafing behavior, and the moderating effects of trait mindfulness. 450 responses were collected to test these hypotheses. Our results show that trait mindfulness enhances the negative effect of perceived Internet usage policy on behavioral automaticity towards cyber-loafing. In addition, we find out that trait mindfulness has an indirect effect on employees' cyber-loafing behavior by reducing behavioral automaticity.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"24 1","pages":"61 - 79"},"PeriodicalIF":2.8,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85572369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Transformational IT Leaders and Digital Innovation 转型的IT领导者和数字创新
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2022-01-24 DOI: 10.1145/3514097.3514104
L. Pittenger, N. Berente, James Gaskin
{"title":"Transformational IT Leaders and Digital Innovation","authors":"L. Pittenger, N. Berente, James Gaskin","doi":"10.1145/3514097.3514104","DOIUrl":"https://doi.org/10.1145/3514097.3514104","url":null,"abstract":"Does formal IT governance encourage innovation in the traditional domains of the IT function at the expense of new forms of \"digital\" innovation? We report on a study of 158 IT managers and leaders to understand the conditions under which transformational IT leadership can drive innovation in traditional forms of IT, as well as in the emerging \"digital\" domain. We find that highly formal IT governance practices can reduce ability of transformational IT managers and leaders to innovate in both domains, and this effect is greater for digital innovation. In stable cultures the moderation effect was strengthened, while insignificant in change cultures. We distinguish between IT innovation and digital innovation and operationalize this distinction, finding that in contexts with stability culture, the moderation is stronger for digital innovation than for traditional IT innovation.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"24 1","pages":"106 - 133"},"PeriodicalIF":2.8,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83314157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Knowledge Accumulation in Design Science Research 设计科学研究中的知识积累
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2022-01-24 DOI: 10.1145/3514097.3514100
Stefan Reining, F. Ahlemann, B. Mueller, Rahul Thakurta
{"title":"Knowledge Accumulation in Design Science Research","authors":"Stefan Reining, F. Ahlemann, B. Mueller, Rahul Thakurta","doi":"10.1145/3514097.3514100","DOIUrl":"https://doi.org/10.1145/3514097.3514100","url":null,"abstract":"Design science research (DSR) is increasingly prominent in the information systems discipline. However, despite a lively discourse, and methodical and conceptual advances notwithstanding, DSR contributions are rarely cumulative and mostly remain isolated. This lack of cumulative research impedes scientific progress and practical impact. Our goal in this paper is to help establish a cumulative tradition in DSR by proposing (1) a general, consensus-oriented, evolutionary process model of scientific progress based on a synthesis of different streams in the philosophy of science, (2) quality criteria for DSR contributions corresponding to the individual steps in the process model, (3) actions that the IS community as a whole can take to facilitate adherence to these quality criteria. We expect that our work can pave the way towards developing a more cumulative research tradition in DSR and thereby foster genuine scientific progress in the field.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"11 1","pages":"10 - 24"},"PeriodicalIF":2.8,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88112129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions 信息系统研究中威慑理论的常见误区及未来研究方向
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2022-01-24 DOI: 10.1145/3514097.3514101
M. Siponen, Wael Soliman, Anthony Vance
{"title":"Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions","authors":"M. Siponen, Wael Soliman, Anthony Vance","doi":"10.1145/3514097.3514101","DOIUrl":"https://doi.org/10.1145/3514097.3514101","url":null,"abstract":"In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of IS research applying DT highlights that many fundamental assumptions of DT are unrecognized and therefore unexamined. This may have resulted in misunderstandings and conceptual confusions regarding some of the basic concepts of DT. For example, some IS studies confuse general deterrence with specific deterrence or do not recognize the difference between the two. Moreover, these fundamental assumptions, when directly examined, may provide important information about the applicability of DT in certain IS security contexts. This research commentary aims to identify and discuss some of the fundamental assumptions of DT and their implications for IS research. By examining these assumptions, IS researchers can study the previously unexplored aspects of DT in different IS contexts. Further, by recognizing these assumptions, IS scholars can revise them and build new variants of DT to better account for specific characteristics of IS behaviors and contexts.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"73 1","pages":"25 - 60"},"PeriodicalIF":2.8,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90032605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信