当前期刊: Journal of Computer Information Systems Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
  • Online Reviews: What Drives Consumers to Use Them
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-07-02
    Chuleeporn Changchit; Tim Klaus; Ravi Lonkani

    With the rapid E-commerce growth and changes in consumers’ behaviors, many businesses are forced to adapt their business model to match their target customers’ needs. To provide consumers with more product details and increase their confidence in making online purchases, online businesses offer online reviews as an alternative to customers physically interacting with a product. Although consumers have

  • A Causal Map Analysis of Supply Chain Decentralization
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-07-02
    Fernando S. Oliveira

    We study the inclusion of loops in automated theory development based on causal logic. As an area of application, we formalize a model of learning, adaptation, and selection in supply chain management. Our methodological contribution is to analyze a causal network with propositional logic, explaining the difference between material and intentional causality and considering cumulative causality. In

  • Story Analysis Using Natural Language Processing and Interactive Dashboards
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-07-02
    Michel Mitri

    This paper discusses Story Analyzer, which uses a natural language processing (NLP) library and sophisticated data visualization libraries to produce dashboards of interrelated and user-responsive visualizations depicting actors and their interactions in a textual narrative, along with locations, times, and other contexts. Story Analyzer performs information extraction using Stanford’s CoreNLP’s NLP

  • Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-06-30
    Alex Koohang; Jeretta Horn Nord; Zoroayka V. Sandoval; Joanna Paliszkiewicz

    The purpose of this paper was to first examine the reliability, validity, and strength of a unified model for information security policy compliance that includes eight constructs explaining information security policy compliance. Second, seven hypotheses were developed and tested based on the constructs in the model. An instrument with eight constructs was used to reflect the traditional survey statements

  • Team Performance and Triangle Approach: A Longitudinal Study
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-06-25
    Hamid Reza Nikkhah; Franck Loic Soh Noume; Beverly Hodges; Rajiv Sabherwal

    The literature on information systems development appears to be fragmented into three main categories: one that uses a knowledge management perspective, another one that considers social aspects of information systems development, and the last one that emphasizes the role of information technology. Such fragmentation detains the understanding of influential factors. In this paper, we synthesize the

  • Perceived Control and Perceived Risk in Self-service Technology Recovery
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-06-08
    Nghi Thuc Le; Sally Rao Hill; Indrit Troshani

    The widespread use of self-service technology (SST) has changed the way customers experience service and how they deal with recovery from service failure. A growing number of service providers offer SST-based recovery, allowing customers to fix service failures using SSTs. Yet, gaining customer acceptance for this emerging form of service recovery presents challenges. There is a need to improve current

  • Understanding the Use of Knowledge Sharing Tools
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-06-08
    Angela Siew-Hoong Lee; Shan Wang; William Yeoh; Novita Ikasari

    This paper investigates the drivers of the use of knowledge-sharing tools through the lens of task–technology fit (TTF), the role of social factors, and the cognitive and affective mechanisms. Data were collected from 294 knowledge workers and analyzed using partial least squares. This study found that cognition (i.e., perceived usefulness) and positive affect play an important role in mediating the

  • Understanding Social Media Monitoring and Online Rumors
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-05-22
    Jong-Hyun Kim; Rajiv Sabherwal; Gee-Woo Bock; Han-Min Kim

    In order to investigate the impact of social media monitoring on a firm’s market understanding and performance, and how to manage online rumors, two complementary studies are conducted on visitors’ engagement and three aspects of engagement. The first study indicates that conversations and inbound traffic positively affect visitors’ engagement, which, along with referrals, influences social media monitoring’s

  • When Agile Means Staying: A Moderated Mediated Model
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-05-22
    Tenace Kwaku Setor; Damien Joseph

    The design of software development methods focuses on improving task processes, including accommodating changing user requirements and accelerating product delivery. However, there is limited research on how the use of different software development methods impacts IT professionals’ perceptions of organizational mobility. Drawing on concepts from the agile development literature and job characteristics

  • Repurchase Intention in Online Knowledge Service: The Brand Awareness Perspective
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-05-22
    Helen S. Du; Jiahong Xu; Heng Tang; Ruixin Jiang

    This study aims to investigate the influencing factors of consumers’ repurchase intention in the context of online knowledge service. Drawing on information systems (IS) success model, social identity theory, and expectation-confirmation theory, we examine the roles of IS success factors, satisfaction, switching barrier, and brand awareness in influencing repurchase intention in the online knowledge

  • How Social Media Analytics Can Inform Content Strategies
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-04-20
    Nima Kordzadeh; Diana K. Young

    Social media has become a strategic tool for businesses and nonprofit organizations to connect with audiences. However, no comprehensive framework exists to support the continued improvement of social media outcomes. This work draws on prior studies related to social media analytics and user engagement to develop an overarching, analytics-driven process for social content strategy development and improvement

  • Users’ Knowledge Sharing on Social Networking Sites
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-04-14
    Xiaolin Lin; Xun Xu; Xuequn Wang

    As social networking sites (SNSs) have become quite popular, organizations have used SNSs to support their various business processes. A growing trend is that organizations increasingly encourage consumers to contribute knowledge via SNSs. The contributed knowledge can help organizations to improve their products/services and therefore these contributions have great business value. As consumers are

  • Trust Decision-Making in Online Social Communities: A Network-Based Model
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-04-09
    Gelareh Towhidi; Atish P. Sinha; Mark Srite; Huimin Zhao

    The unique characteristics of online social communities call for a reexamination and adaptation of established behavioral theories of trust decision-making. Guided by relevant social science and computational graph theories, we propose a conceptual model of trust decision-making in online social networks. This is the first study that integrates the existing graph-based view of trust decision-making

  • Obstacles of On-Premise Enterprise Resource Planning Systems and Solution Directions
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-04-09
    Senem Sancar Gozukara; Bedir Tekinerdogan; Cagatay Catal

    The article presents the results of a Systematic Literature Review (SLR) that has been carried out to identify and present the state-of-the-art of ERP systems, describe the obstacles of on-premise ERP systems, and provide general solutions to tackle these challenges. Based on this SLR, 22 obstacles are identified, the dependencies and interactions among these obstacles are described, and finally the

  • Cyber Security Awareness, Knowledge and Behavior: A Comparative Study
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-14
    Moti Zwilling; Galit Klien; Dušan Lesjak; Łukasz Wiechetek; Fatih Cetin; Hamdullah Nejat Basim

    Cyber-attacks represent a potential threat to information security. As rates of data usage and internet consumption continue to increase, cyber awareness turned to be increasingly urgent. This study focuses on the relationships between cyber security awareness, knowledge and behavior with protection tools among individuals in general and across four countries: Israel, Slovenia, Poland and Turkey in

  • BYOD Policy Compliance: Risks and Strategies in Organizations
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-14
    Rathika Palanisamy; Azah Anir Norman; Miss Laiha Mat Kiah

    The proliferation of mobile devices has brought the Bring Your Own Device (BYOD) trend in organizations, along with significant challenges when employees fail to comply with security policies. Previous reviews in this research area had focused solely on the technical issues surrounding BYOD implementation while leaving out the human behavior in complying with security policies which is a major contributing

  • Optimistic Bias and Exposure Affect Security Incidents on Home Computer
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-14
    Barbara Hewitt; Garry L. White

    Individuals who are optimistically biased believe that they are less likely to experience an adverse event or more likely to experience a positive event than their peers. This paper examines whether individuals feel less likely to experience a breach on their home computers (cyber optimistic bias), have more computer and security education, apply protective more measures, and experience more security

  • A Pedagogy to Develop Effective Virtual Teams
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-13
    Raymond Angelo; Richard McCarthy

    While virtual teams dominate business environments, little attention has been paid to how team leadership, in particular shared leadership, can be reinforced in classrooms. There is a consensus that shared leadership impacts the performance of virtual groups in a positive manner. While higher education in business is aiming to prepare graduates for virtual team leadership and effectiveness, pedagogical

  • Gender, Performance, and Self-Efficacy: A Quasi-Experimental Field Study
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-13
    Matthew J. Liberatore; William P. Wagner

    With chronic labor shortages in STEM-related industries, much research has focused on how to get more women and minorities interested in STEM careers. The most recent studies seem to indicate that the actual gap in user performance between genders has narrowed, although women tend to have less self-efficacy. However, all these previous studies involved student subjects in an educational context. This

  • Perceptions of Cybersecurity Readiness among Workgroup IT Managers
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-13
    Thomas A. Chapman; Brian J. Reithel

    Any modern cybersecurity strategy relies upon IT managers who are experts in their field, who are willing to employ best practices, and who educate their users. Large corporations have developed an intrinsic understanding of these factors. However, large corporations are comprised of departmental units that are not always considered in the organization’s cybersecurity profile. This is particularly

  • Personality and Demographic Characteristics Influence on Consumers’ Social Commerce Preference
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-13
    Chuleeporn Changchit; Robert Cutshall; Anh Pham

    With the rapid growth in the number of people using social networking sites, businesses are attempting to engage their customers by establishing social commerce websites, which provide customers with a new shopping experience. This new commerce channel allows customers to share their experience and attain information from other customers. Nevertheless, not all consumers are ready to engage in this

  • Use Public Wi-Fi? Fear Arouse and Avoidance Behavior
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-13
    Chung-Yean Chiang; Xiao Tang

    This study aims to study the internet security compliance behavior in a public Wi-Fi usage condition. We developed our research framework and hypotheses with the consideration of the protection motivation theory. Assembling questions from existing literature, we collected opinions from a group of college students who know and use public Wi-Fi. Using structural equation modeling, we examined the role

  • Big Data Analytics in Cyber Security: Network Traffic and Attacks
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-01-08
    Lidong Wang; Randy Jones

    Network attacks, intrusion detection, and intrusion prevention are important topics in cyber security. Network flows and system events generate big data, which often leads to challenges in intrusion detection with high efficiency and good accuracy. This paper focuses on the ‘Volume’, ‘Veracity’, and ‘Variety’ of big data characteristics in network traffic and attacks. Datasets with various data types

  • Towards a User Experience Framework for Business Intelligence
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-12-18
    Marcus Eriksson; Bruce Ferwerda

    ABSTRACT Business intelligence (BI) systems are software applications that are used to gather and process data and to deliver the processed data in understandable way to the end users. With a younger generation of users moving into key positions in organizations and enterprises higher user experience (UX) demands are placed on BI systems interfaces. Companies developing BI systems lack standardized

  • The Influence of Social Power on Knowledge Utilization
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-12-12
    Ji-Myoun Lee; Gee-Woo Bock; Ayoung Suh

    Although many studies have reported that social power is a critical factor in facilitating or constraining social interactions among individuals, few studies have fully explored how social power influences an individual’s knowledge utilization within a work group. Social power in the workplace helps individuals recognize others’ knowledge and utilize it in a business context. By integrating the theory

  • The Role of Attitude toward Challenge in Serious Game Design
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-12-09
    Philip Tin Yun Lee; Michael Chau; Richard Wing Cheung Lui

    This paper proposes that challenge, an orthogonal game attribute, can be used to improve game effectiveness. The results of our study suggest that attitude toward challenge should be considered when we tune challenge in the serious game for better learning results. A significant moderating role of attitude toward challenge is found in the relationship between challenge and self-efficacy. Investigating

  • Towards a Cashless Society: The Imminent Role of Wearable Technology
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-12-09
    Xiu-Ming Loh; Voon-Hsien Lee; Garry Wei-Han Tan; Jun-Jie Hew; Keng-Boon Ooi

    Wearable payment, which is the use of wearable technology to make payment, is anticipated to be the future of proximity mobile payment. However, the acceptance and use of wearable payment in Malaysia leave much to be desired. Additionally, this area of research is currently under-addressed. Thus, this study looks into the elements that influence the intention to adopt wearable payment in Malaysia.

  • IT Ethics Perceptions and Behavior: An International Comparison
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-12-09
    Milos Ulman; C. G. Marreiros; R. Quaresma; A. L. Harris

    The paper discusses differences in IT ethics perceptions and behavior of college students. The study is one of the few that examine multicultural differences in IT ethics on a convenience sample of 1,648 individuals from seven countries in three continents. We adopted an Ethics Decision-Making Model with Cultural Impacts and applied it on the examination of relations between IT ethics perceptions,

  • Data-driven Begins with DATA; Potential of Data Assets
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-11-25
    Hannu Hannila; Risto Silvola; Janne Harkonen; Harri Haapasalo

    The objective of this study is to analyze the potential of company data assets for data-driven, fact-based decision-making in product portfolio management (PPM). Data assets are categorized from the PPM standpoint, including (product/customer/ …) master data, transactional data, and interaction data (e.g., IoT data). The study combines literature review and qualitative analysis of eight international

  • Motivating Information Security Policy Compliance: Insights from Perceived Organizational Formalization
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-11-21
    Yuxiang Hong; Steven Furnell

    Psychological and behavioral characteristics are among the most important factors that instigate information security incidents. Although many previous studies have discussed the influencing factors of information security policy compliance behavior in an organization, few have considered the influence of organizational structures. In this study, the mechanism by which information security policy compliance

  • Methods of Metabolite Identification Using MS/MS Data
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-11-07
    Myungjae Kwak; Kyungwoo Kang; Yingfeng Wang

    Researchers in bioinformatics and medical science fields have been developing various innovative information systems and software tools using emerging technologies. Metabolite profiling is one of the fields in which bioinformatics researchers are intensely developing various innovative methods and software tools. Metabolites are the intermediate and end products of metabolism, which is the set of life-sustaining

  • Mobile Social Cyberbullying: Why are Keyboard Warriors Raging?
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-11-07
    Keng-Boon Ooi; Voon-Hsien Lee; Jun-Jie Hew; Binshan Lin

    Cyberbullying on social media has become a serious matter and is the most rampant form of bullying among students nowadays. Accordingly, this study examines mobile social cyberbullying perpetration, a new form of cyberbullying perpetration that is conducted over mobile social media, through the theoretical lenses of Barlett and Gentile Cyberbullying Model (BGCM) and Mobile Technology Acceptance Model

  • A Review of IS Strategy Literature: Current Trends and Future Opportunities
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-11-06
    Jason A. Williams; Henry G. Torres; Traci Carte

    In this paper, we examine the IS strategy literature since 2008. Using Chen, Mocker, Preston, and Teubner’s (2010) review as a starting point, we identified 31 IS strategy studies published since 2008. Further, we evaluated previous frameworks for evaluating IS strategy research. Using the conceptions proposed by Chen, et al. (2010), IS Strategy as competitive advantage (I), IS functional strategy

  • Virtual Brand Community Experience, Identification, and Electronic Word-of-mouth
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-10-09
    Lin Qiao; Mengmeng Song; Nan (Tina) Wang

    Despite recognizing the importance of virtual brand community (VBC) and the existence of different types of electronic word-of-mouth (eWOM) behaviors (e.g., opinion giving, opinion passing and opinion seeking), the existing literature remains inadequate regarding the influences of VBC experiences and identification on eWOM. This study, incorporating stimulus–organism–response theory and related research

  • Antecedents of Technology Selection for Project Use
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-09-16
    Michael J. Cuellar; Manoucheher Tabatabaei; Thomas Case

    The adoption and use of technology have been an important topic of research in Information Systems. However, projects create a different environment for technology adoption in that they are temporary organizations which are formed specifically for the project and then disbanded as opposed to the continuing organizations which have been traditionally studied. We term this adoption and use in temporary

  • Security Awareness: The First Step in Information Security Compliance Behavior
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-08-13
    Inho Hwang; Robin Wakefield; Sanghyun Kim; Taeha Kim

    In this study, we use the attentional phase of social learning theory to link workplace security-related experiences and observations to employees’ security awareness. The responses of 398 organizational employees serve to test our research model using structural equational modeling with AMOS 22.0. The results show security awareness arises from both explicit and subjective security experiences in

  • Information Technology Operational Risk: A Teaching Case
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-08-13
    Janice C. Sipior; Danielle R. Lombardi; Renata Gabryelczyk

    IT operational risk refers to any threat that could lead to the inappropriate modification, lack of availability, destruction, or theft of IT assets. This paper presents a real-world teaching case study, based upon an actual consulting engagement of risk assurance professionals working at a multinational professional services provider, to bring practical experience with managing IT operational risk

  • Can Online Rating Reflect Authentic Customer Purchase Feelings? Understanding How Customer Dissatisfaction Relates to Negative Reviews
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-08-07
    Huosong Xia; Xiaoting Pan; Wuyue An; Zuopeng (Justin) Zhang

    The fast growth in online word of mouth (online WOM) reviews has witnessed their wide applications in assisting customers in their purchases. While many positive factors about these reviews have been identified, biases may result from reviewers’ self-selection behavior. To examine whether online WOM ratings reflect authentic customer purchase feelings, this study focuses on the relation between customer

  • Information Technology Work Value Differences
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-08-07
    Katarzyna Toskin; Richard V. McCarthy

    This study investigates reasons behind high employee turnover of IT professionals through the value placed on intrinsic, extrinsic, leisure, and social rewards. It addresses two questions; what are the most preferred work values by IT professionals, and how do they differ from other professions. Data was collected via a survey using subjects from Amazon Mechanical Turk. A sample of 380 respondents

  • Factors Activating Big Data Adoption by Korean Firms
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-07-29
    Jong-Hyun Park; Yun Bae Kim

    Big data is expected to drive the new digital transformation of society, government, and business. The proportion of firms implementing and utilizing big data, however, is not high. There are many challenges and obstacles related to firm adoption of big data. The purpose of this study is to identify the factors influencing the adoption of big data among Korean firms using the technology-organization-environment

  • Literature Review about Intention Mining in Information Systems
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-06-24
    Oswaldo E. Diaz; María Gabriela Perez; Jorge Edison Lascano

    Based on the event log, the process mining techniques allow the discovery of the real processes, the verification of conformity with the prescribed processes and the improvement them. Also, in the current literature has evidenced the development of some works of process mining to the discovery of user intentions (intention mining). The purpose of this work is to conduct a literature review about the

  • Understanding Consumers’ Post-Adoption Behavior in Sharing Economy Services
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-06-24
    Xuequn Wang; Xiaolin Lin; Zilong Liu

    Sharing economy services such as bicycle-sharing have become quite popular. In these services, companies maintain systems which allow consumers to conduct sharing activities. Based upon expectation-confirmation theory, we develop a model investigating the antecedents of consumer confirmation and its consequences in the sharing economy context. Specially, we identify two antecedents including perceived

  • Investigating Factors of Twitter Use among Municipal Governments
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-06-24
    Jeffrey A. Stone; S. Hakan Can

    This study investigates predictors of Twitter adoption and use by municipalities for citizen communication, considering both the level of municipal Twitter presence and the level of Twitter activity. Possible predictors included municipal characteristics as well as citizenry characteristics. Participants included 100 Pennsylvania municipalities drawn from a disproportionate stratified sample, evenly

  • Project Control, Coordination, and Performance in Complex Information Systems Outsourcing
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-05-20
    Dong-Gil Ko; Gwanhoo Lee; Mark Keil; Weidong Xia

    Information systems outsourcing has not only become prevalent but also involves an increasingly wide range of activities beyond the traditional programming, testing, documentation, and localization activities to include complex business-focused project planning, process design, requirements determination, and logical and physical systems designs. Such complex IS outsourcing often requires interactions

  • Computer Science in ASEAN: A Ten-Year Bibliometric Analysis (2009–2018)
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-05-20
    Jun-Jie Hew; Voon-Hsien Lee; Keng-Boon Ooi; Binshan Lin

    The growth of a country is heavily depending on its investment over science and technology. In fact, the progress in computer science research serves as a vital factor in the development of a country. Interestingly, despite that the Association of Southeast Asian Nations (ASEAN) is located near each other, they do not share a similar level of ICT development, which leads to a digital divide among them

  • Trust in C2C Electronic Commerce: Ten Years Later
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-04-15
    Lori N. K. Leonard; Kiku Jones

    In 2008, Jones and Leonard developed and tested a model of trust in consumer-to-consumer (C2C) electronic commerce (e-commerce). The authors expected that natural propensity to trust (NPT) and perception of website quality (PWSQ) and others’ trust of buyers/sellers (OTBS) and third party recognition (TPR) would impact a person’s trust in C2C e-commerce. They only found support for PWSQ and TPR. Much

  • Knowledge Management for Cybersecurity in Business Organizations: A Case Study
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-04-12
    Shouhong Wang; Hai Wang

    Knowledge management (KM) plays important roles in cybersecurity. This study collects five real-life cases of good practices of KM for the domain of cybersecurity in business organizations. Through an iterative process of team-based qualitative data analysis of the five cases, the study develops a model of KM for cybersecurity that conceptualizes three common aspects of KM practices for cybersecurity

  • Retraction: Gender Reputation Differences on Online Programming Q&A Communities
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-04-04

    (2019). Retraction: Gender Reputation Differences on Online Programming Q&A Communities. Journal of Computer Information Systems. Ahead of Print.

  • Formulating Knowledge-Based Cloud Identity Selection
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-04-02
    Brian Cusack; Eghbal Ghazizadeh

    Cloud identity is critical in the adoption of cloud computing. Identity providers provide identity as a service for the cloud customers to facilitate the access to resources, but often provide no informed choice of the supply arrangements. The cloud customer requires a say in the elements of service that impact their expectations and quality of service – particularly in relation to the security and

  • Affordances of Recommender Systems for Disorientation in Large Online Conversations
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-04-02
    Evren Eryilmaz; Brian Thoms; Zafor Ahmed; Kuo-Hao Lee

    In the context of large annotation-based literature discussions, this research examines the affordances of recommender systems on users’ disorientation. Drawing insights from literature on group cognition, knowledge building, and recommender systems, we developed three recommender systems and tested these systems on 136 users. Results indicate that the recommender system with constrained Pearson correlation

  • Employees’ Mobile Cyberslacking and Their Commitment to the Organization
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-03-25
    Saleh Alharthi; Yair Levy; Ling Wang; Inkyoung Hur

    While the introduction of the Internet facilitated communication channels at the workplace to improve employees’ productivity, it also raised new challenges, such as cyberslacking. The problem that this research study addresses is mobile device cyberslacking at the workplace as it relates to productivity. A mobile cyberslacking-commitment taxonomy (MCCT) was developed to classify employees’ potential

  • Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-03-21
    Carlene Blackwood-Brown; Yair Levy; John D’Arcy

    Senior citizens are one of the most vulnerable groups of Internet users who are prone to cyberattacks. Thus, assessing senior citizens’ motivation to acquire cybersecurity skills is critical to help them understand the risks of cyber-attacks. This study investigated a set of constructs that contribute to senior citizens’ motivation to acquire cybersecurity skills and assessed the actual cybersecurity

  • Assessing IT Students’ Intentions to Commit Unethical Actions
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-03-13
    Cheryl Aasheim; Jeffrey Kaleta; Paige Rutner

    With the increased volume of and access to electronically held assets, ethical behavior of information technology (IT) professionals is critical. The importance of ethical behavior in the workplace has emphasized the need for coverage of ethics in IT-related academic programs. To better understand how academic IT programs support the teaching of ethics, this study examines people’s desires and intentions

  • A High-Reliability Approach to Risk Management in an IT Project
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-03-11
    Kathleen S. Hartzel; William E. Spangler

    This article describes how an organization successfully managed a particularly high-risk and complex IT implementation project using an approach found in High-Reliability Organizations (HROs). HROs include organizations such as nuclear power plants and air traffic control systems, which typically operate within high-complexity, high-risk, and high-cost-of-failure environments. As such, HROs develop

  • Market Share Strategies for Cloud Computing Providers
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-02-15
    Derek L. Nazareth; Jae Choi

    The cloud computing industry is characterized by a small number of dominant providers and a host of small-to-medium providers. As the demand grows, additional providers are expected to enter the market. The need for 24/7 support and competitive pricing allows established providers to maintain defensible industry positions. This paper examines the impact of adopting growth and equilibrium market share

  • Attitudinal and Behavioral Loyalty Toward Virtual Goods
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-02-15
    Puneet Kaur; Amandeep Dhir; Sufen Chen; Risto Rajala

    The relationship between loyalty, purchasing of virtual goods, and use behavior of mobile instant messaging (MIM) was examined. Two forms of loyalty, attitudinal and behavioral loyalty, were considered. The study tested the model where attitudinal loyalty, including electronic word of mouth and sense of belonging, led to behavioral loyalty, including purchase intention (PI) and continuation intention

  • The Spectrum of Big Data Analytics
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-02-12
    Zhaohao Sun; Yanxia Huo

    Big data analytics is playing a pivotal role in big data, artificial intelligence, management, governance, and society with the dramatic development of big data, analytics, artificial intelligence. However, what is the spectrum of big data analytics and how to develop the spectrum are still a fundamental issue in the academic community. This article addresses these issues by presenting a big data derived

  • The Effect of Leadership and Teamwork on ISD Project Success
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-02-04
    Junyoung Oh; Hwansoo Lee; Hangjung Zo

    This study aims to analyze how the quality of leadership and teamwork influences project success in information systems development (ISD). The proposed research model endeavors to substantiate the heterogeneity of project success in the public and private sectors to assist project managers. We surveyed experienced Korean project managers in both the public and private sectors and applied a partial

  • Social Networking Site Use, Positive Emotions, and Job Performance
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-02-01
    Ned Kock; Murad Moqbel

    With the increasing use of social networking sites, within and outside work hours, it is reasonable to ask whether that use has any impact on job performance and why. This study draws on the technology acceptance model and theory of positive emotions to develop an extended theoretical model centered on social networking site use. We focus on use, but not excessive use, recognizing that negative outcomes

  • Determinants of News Sharing Behavior on Social Media
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-02-01
    Nik Thompson; Xuequn Wang; Pratiq Daya

    Social media is relied upon as a single portal for entertainment, communication, and news. To understand determinants of new sharing, we empirically evaluate data from 188 Facebook users with PLS structural equation modelling. Results support the significant influence of information sharing and status seeking gratifications on news sharing, and that this significance varies across contexts. We find

Contents have been reproduced by permission of the publishers.