Data Base for Advances in Information Systems最新文献

筛选
英文 中文
Privacy Maintenance in Self-Digitization 自我数字化中的隐私维护
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2021-04-28 DOI: 10.1145/3462766.3462769
F. Bélanger, Robert E. Crossler, John Correia
{"title":"Privacy Maintenance in Self-Digitization","authors":"F. Bélanger, Robert E. Crossler, John Correia","doi":"10.1145/3462766.3462769","DOIUrl":"https://doi.org/10.1145/3462766.3462769","url":null,"abstract":"Individuals are increasingly using personal Internet of Things (IoT) devices that digitize their day-to-day lives. Those devices, however, often require substantial personal information to generate their intended benefits. For example, fitness technologies collect health, sleep, personal, and a vast array of other information ubiquitously, creating possible privacy issues for the users when fitness technology platform providers store or share their information, whether users know this or not. To explore the role of privacy perceptions in the context of continued use of fitness technologies, this study collected data from 212 fitness tracker users. We find empirical support for the importance of privacy perceptions in a user's intention to continue to use their fitness tracker. More specifically, consistent with privacy calculus research, privacy concern is negatively related to willingness to disclose information while perceived benefit is positively related to it. As an extension to calculus variables, users' expectations towards the data sharing practices of organizations also influences their willingness to disclose information. Importantly, willingness to disclose information has a direct effect on continued use intentions but also moderates the relationship between perceived benefit and users' intentions to continue using a fitness tracker. We discuss the implications of these findings for research and practice.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"38 1","pages":"7 - 24"},"PeriodicalIF":2.8,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82154862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Famine of Riches in Scholarly Publication 学术出版物的财富匮乏
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2021-04-28 DOI: 10.1145/3462766.3462768
T. Stafford
{"title":"A Famine of Riches in Scholarly Publication","authors":"T. Stafford","doi":"10.1145/3462766.3462768","DOIUrl":"https://doi.org/10.1145/3462766.3462768","url":null,"abstract":"I have been editing for a while. Long enough to have witnessed the evolution from pre-digital journals to the post-digital pure play. I negotiated and obtained the first online review system for this fine journal, back in 2006 when I was building my first proposal to edit The DATA BASE for Advances in Information Systems. I felt at the time that I might be a tad late coming to the digital field, seeing that the association I belonged to had already launched two digital pure-play publications which appeared to be destined for notice.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"26 1","pages":"5 - 6"},"PeriodicalIF":2.8,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73405633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Job Satisfaction of IT Workers in East Asia 东亚地区IT工作者的工作满意度研究
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2021-04-28 DOI: 10.1145/3462766.3462772
Benjamin Yeo, A. Serenko, Prashant C. Palvia, O. Sato, Hiroshi Sasaki, Jie Yu, Yue Guo
{"title":"Job Satisfaction of IT Workers in East Asia","authors":"Benjamin Yeo, A. Serenko, Prashant C. Palvia, O. Sato, Hiroshi Sasaki, Jie Yu, Yue Guo","doi":"10.1145/3462766.3462772","DOIUrl":"https://doi.org/10.1145/3462766.3462772","url":null,"abstract":"The purpose of this study is to explore the drivers of job satisfaction of IT workers in the East Asian context, particularly in Taiwan, Japan, and China. Using data collected from IT workers, decision tree inductions were employed to identify the predictors of job satisfaction. Results indicate that the level of education has no effect on job satisfaction. Overall, higher uncertainty avoidance results in lower job satisfaction, and more experienced IT workers appear to be more satisfied. In Taiwan, longer serving IT workers, who are likely to hold more senior positions and spend more time on the job, are more satisfied with their jobs. Similarly, in Japan, older IT workers are more satisfied. In China, job satisfaction of IT workers differs across job roles and industries. It is recommended that management practices and policies in Taiwan focus on bridging gaps between longer serving and newer IT workers in terms of their ability to handle ambiguous work situations; whereas in Japan, these should focus on providing work flexibility and stress management programs to allow room for family support. In China, these should be tailored to specific job roles and industries in view of their different experiences with job satisfaction determinants.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"37 1","pages":"94 - 126"},"PeriodicalIF":2.8,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85338793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Protection Motivation Theory in Information Systems Security Research 信息系统安全研究中的保护动机理论
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2021-04-28 DOI: 10.1145/3462766.3462770
Steffi Haag, M. Siponen, Fufan Liu
{"title":"Protection Motivation Theory in Information Systems Security Research","authors":"Steffi Haag, M. Siponen, Fufan Liu","doi":"10.1145/3462766.3462770","DOIUrl":"https://doi.org/10.1145/3462766.3462770","url":null,"abstract":"Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"54 1","pages":"25 - 67"},"PeriodicalIF":2.8,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74585487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Toward a Unified View of Dynamic Information Security Behaviors 动态信息安全行为的统一观
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2021-01-22 DOI: 10.1145/3447934.3447940
Canchu Lin, X. Luo
{"title":"Toward a Unified View of Dynamic Information Security Behaviors","authors":"Canchu Lin, X. Luo","doi":"10.1145/3447934.3447940","DOIUrl":"https://doi.org/10.1145/3447934.3447940","url":null,"abstract":"Extant information systems security research identified and examined a variety of individual as well as organizational factors influencing information security behaviors, but rarely offered sufficient theoretical insight into the interaction of the individual factors with the organizational context in impacting information security behaviors. To fill this gap, this study proposes a theoretical framework that builds on the concepts of organizational culture and sensemaking to show that: 1) information security behaviors are outcomes of sensemaking; and 2) sensemaking is enabled as well as constrained by organizational culture. This study further epitomizes that information security diagnosing, solving, and performing behaviors emerge as outcomes of sensemaking about information security during the organization's interactions with technology. Theoretical and pragmatic contributions of this framework and future research directions are also demonstrated.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"60 1","pages":"65 - 90"},"PeriodicalIF":2.8,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85861900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
No Good Deed Goes Unpunished 做好事没有不受惩罚的
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2021-01-22 DOI: 10.1145/3447934.3447936
Deborah J. Armstrong
{"title":"No Good Deed Goes Unpunished","authors":"Deborah J. Armstrong","doi":"10.1145/3447934.3447936","DOIUrl":"https://doi.org/10.1145/3447934.3447936","url":null,"abstract":"As we closed out a memorable 2020 and look to the New Year, we might say that not much good has come out of this year. But as a Monty Python fan, I love the ditty from The Life of Brian movie, \"Always Look on the Bright Side of Life.\" While the pandemic has taken much, it has also provided opportunities to explore new ways of learning, working, and being in community. For me, the pandemic has highlighted a fact I think we have all long suspected: the current journal peer review process is broken-it's unsustainable.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"31 1","pages":"8 - 9"},"PeriodicalIF":2.8,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80240568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Usefulness of the Two-Step Normality Transformation in Retesting Existing Theories 两步正态变换在重新检验现有理论中的作用
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2021-01-22 DOI: 10.1145/3447934.3447939
Gary F. Templeton, Michael Brian Pope, Laurie L. Burney
{"title":"The Usefulness of the Two-Step Normality Transformation in Retesting Existing Theories","authors":"Gary F. Templeton, Michael Brian Pope, Laurie L. Burney","doi":"10.1145/3447934.3447939","DOIUrl":"https://doi.org/10.1145/3447934.3447939","url":null,"abstract":"The Two-Step normality transformation has been shown to reliably transform continuous variables toward normality. The procedure offers researchers a capable alternative to more prominent methods, such as winsorization, ranking, and power transformations. We demonstrate its utility in the context of the Productivity Paradox literature stream, which is renowned for inconsistent results. This paper demonstrates that the Two-Step normality transformation, which has not been used in Productivity Paradox research, may produce greater goodness-of-fit and affect theoretical understandings on the topic. We use a classic Productivity Paradox dataset to show that compared to the prominent normality transformations, the Two-Step produces unique findings, including 1) regression coefficients more closely resembling the original data, 2) different effect sizes and significance levels, and 3) strengthening evidence for fundamental theories in Productivity Paradox literature. We demonstrate results that challenge uncertainties about the relationship between IT investment and firm performance. Our results imply that the Two-Step procedure should be considered a viable transformation option in future information systems research.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"38 1","pages":"53 - 64"},"PeriodicalIF":2.8,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73288324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Examining the Adoption of Onlineto- Offline (O2O) 检视线上到线下(O2O)的采用情况
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2021-01-22 DOI: 10.1145/3447934.3447937
Jiwat Ram, A. Manoharan, Siyao Sun
{"title":"Examining the Adoption of Onlineto- Offline (O2O)","authors":"Jiwat Ram, A. Manoharan, Siyao Sun","doi":"10.1145/3447934.3447937","DOIUrl":"https://doi.org/10.1145/3447934.3447937","url":null,"abstract":"The online-to-offline (O2O) business model is rapidly growing among organizations, yet current knowledge on O2O adoption is predominantly individual focused, with little research on organizational adoption and the factors driving adoption. To address this gap, underpinned by the diffusion of innovation (DOI) theory, this study collected qualitative data (24 semistructured interviews), which were analyzed using content analysis techniques. We found that offline service quality and social network prosperity are some of the factors driving O2O adoption. Surprisingly, inefficient offline marketing was also found to drive O2O adoption, which indicates new challenges posed by the growing online business environment. We found that not all factors can be categorically classified as facilitating or impeding adoption, as some factors (such as operational challenges and costs) could play dichotomous roles of facilitating or impeding in the context of peculiar circumstances. For example, we found cost to be an impeding factor, yet the results also indicated the benefits of cost reduction resulting from O2O adoption, thereby rendering cost a contentious issue. This study extends the application of DOI theory to the O2O adoption stage, and identifies a number of new factors associated with internal/external organizational characteristics, as postulated in the DOI. Managerial implications are discussed.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"97 1","pages":"10 - 26"},"PeriodicalIF":2.8,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89251289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multiple-Motive Heuristic-Systematic Model for Examining How Users Process Android Data and Service Access Notifications 用于检查用户如何处理Android数据和服务访问通知的多动机启发式系统模型
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2021-01-22 DOI: 10.1145/3447934.3447941
T. James, Jennifer L. Ziegelmayer, Arianna Schuler Scott, Grace Fox
{"title":"A Multiple-Motive Heuristic-Systematic Model for Examining How Users Process Android Data and Service Access Notifications","authors":"T. James, Jennifer L. Ziegelmayer, Arianna Schuler Scott, Grace Fox","doi":"10.1145/3447934.3447941","DOIUrl":"https://doi.org/10.1145/3447934.3447941","url":null,"abstract":"Android access notifications are presented to users to obtain permission to access data and services on smartphones. The number of 'unsafe' apps in the Android marketplaces underscores the importance of understanding what factors influence whether users engage in more effortful systematic processing of access notifications. We propose a multiple-motive heuristic-systematic model to examine how different motives impact users' processing modes. We find that the need to be accurate in making decisions (accuracy), the desire to defend preferred positions (defense), and social pressure from others (impression) influence how users process Android access notifications, and they do so in different ways.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"23 1","pages":"91 - 122"},"PeriodicalIF":2.8,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81741670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
What's Next in Blockchain Research? 区块链研究的下一步是什么?
IF 2.8 4区 管理学
Data Base for Advances in Information Systems Pub Date : 2021-01-05 DOI: 10.1145/3447934.3447938
Horst Treiblmaier, M. Swan, Primavera De Filippi, Mary C Lacity, T. Hardjono, Henry Kim
{"title":"What's Next in Blockchain Research?","authors":"Horst Treiblmaier, M. Swan, Primavera De Filippi, Mary C Lacity, T. Hardjono, Henry Kim","doi":"10.1145/3447934.3447938","DOIUrl":"https://doi.org/10.1145/3447934.3447938","url":null,"abstract":"Distributed ledger technology, frequently designated as 'blockchain,' is evolving from its hype phase toward greater maturity and long-term value creation. Although many academic communities were initially slow to grasp the technology's numerous potential implications, meanwhile a substantial amount of research is dedicated to investigating the development and impact of blockchain and related technologies. As undertaken, most research projects take a specific homogenous perspective, such as a technical or business viewpoint. To date, blockchain research studies are largely missing a bridge between and across academic disciplines. Given the manifold implications of blockchain technology, a fruitful crossdisciplinary exchange is therefore needed. In this paper, we bring together researchers with varying expertise to provide a vision into what may be next in terms of concepts, applications, and research agendas. We consider business, economic, societal, legal, technical, and philosophical viewpoints and propose multiple research questions as well as hypotheses arising from these diverse viewpoints. Simultaneously, we challenge various academic communities to tackle some of the most crucial issues of current blockchain research and to develop a solid foundation for future exploration.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"332 1","pages":"27 - 52"},"PeriodicalIF":2.8,"publicationDate":"2021-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80535263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信