当前期刊: Journal of Computer Information Systems Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
我的关注
我的收藏
您暂时未登录!
登录
  • Responding to Information System Obsolescence: Should We Upgrade or Replace?
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-10-06
    Brent Furneaux; Sophia Mannina; Lars Rieser

    ABSTRACT As information systems (IS) age, managers must determine whether to continue upgrading these systems or replace them with systems that have greater potential to offer organizational value. Given the widespread use of information systems and the challenges that IS replacement can present, understanding the forces that encourage managers to continue to upgrade existing systems is of considerable

    更新日期:2020-10-06
  • How Perceived Pressure Affects Users’ Social Media Fatigue Behavior: A Case on WeChat
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-10-05
    Yanfeng Zhang; Wu He; Lihui Peng

    ABSTRACT The paper describes a study that examines the factors affecting Chinese users’ online social media fatigue on WeChat from the perspective of perceived pressure. This study is based on the S-S-O (Stressor-Strain-Outcome) theoretical framework and uses the structural equation modeling to analyze the factors affecting Chinese users’ online social media fatigue on WeChat. The results show that

    更新日期:2020-10-06
  • Supporting Mobile Innovation in the Middle: Hospital IT Manager Attitudes
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-10-02
    Dominic Thomas; Yurong Yao

    ABSTRACT This study investigates external factors influencing IT manager support for deploying mobile services innovations in hospitals. It develops and tests a research model representing the relevant elements of the Technology-Organization-Environment (T-O-E) framework in different innovation diffusion stages. Uniquely, this model hypothesizes how domain-relevant vendor interactions would relate

    更新日期:2020-10-04
  • Media-Generating Activities and Follower Growth within Social Networks
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-10-02
    E. Mitchell Church; Xia Zhao; Lakshmi Iyer

    ABSTRACT Social network followers represent a valuable asset for any organization. Followers improve the diffusion of information, enhance customer engagement opportunities and allow for observation of competitor actions. Yet, despite their practical value, our understanding of how one gains followers online remains varied and fragmented. New functionality for the display and management of rich media

    更新日期:2020-10-04
  • Factors Influencing Consumer Adoption of Electronic Health Records
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-09-30
    Neethu Mathai; Tanya McGill; Danny Toohey

    ABSTRACT Electronic health records (EHRs) are electronic versions of longitudinal individual health records that are easily accessible and can be shared among relevant stakeholders. Their use can contribute to improved health outcomes. This research aimed to identify the key factors influencing healthcare consumer adoption of EHRs by testing an EHR consumer adoption model that extends the Decomposed

    更新日期:2020-09-30
  • How Repurchase Intention Is Affected in Social Commerce?: An Empirical Study
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-09-29
    Bo Shang; Zheshi Bao

    ABSTRACT Social commerce provides an innovative approach for business activities in e-commerce. The aim of this study is to explore the mechanism regarding repurchase intention in social commerce by developing a research model from perspectives of swift guanxi, alternative attraction, perceived value, and customer satisfaction. Customers who have social commerce experience were investigated through

    更新日期:2020-09-29
  • Factors Influencing Consumers’ Participation in Social Commerce
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-09-18
    Robert Cutshall; Chuleeporn Changchit; Anh Pham

    Social networking websites are enjoying widespread usage throughout the world. Its applications are playing a significant role in marketing by allowing users to share information about products and services such as reviews, opinions, and even purchasing behavior with their network of friends and family. These social networks provide new opportunities to communicate with existing customers and attract

    更新日期:2020-09-20
  • Digital OER Impact on Learning Outcomes for Social Inclusion
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-09-18
    Elizabeth White Baker; Christopher J. Sibona

    The Information Systems field has long been positioned globally as a particularly powerful instrument to promote social inclusion. While individual identity characteristics have been the primary research focus on social inclusion, our research study directly investigates an external environmental influence in social inclusion, course materials cost, and its impact on learning outcomes. General theories

    更新日期:2020-09-20
  • Factors Affecting Coproduction Resentment within a Self-checkout Environment
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-09-16
    Vess L. Johnson; Angelina Kiser; Richard W. Woolridge

    Self-service technologies allow organizations to shift work from employees to the consumer, creating a coproduction environment where the consumer is an active participant in the delivery of a service, which they ultimately consume. While these technologies can have benefits for both consumers and the organizations, they can also present challenges (e.g., value erosion, feelings of coercion) that may

    更新日期:2020-09-16
  • Consumer Engagement in Business Process Innovation–ICT Companies Cases from Poland and UK
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-09-11
    Ewa Ziemba; Monika Eisenbardt; Roisin Mullins; Sandra Dettmer

    The major premise of the study is a recognition that competitive companies increasingly engage consumers to create business innovation. This study aims to develop a framework for analyzing consumer engagement in business process innovation and apply this framework to ICT companies in Poland and the UK to analyze how they practice consumer engagement and what differences are exhibited between the two

    更新日期:2020-09-12
  • Statistically Significant! But Is Trust of Practical Significance?
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-08-18
    Dapeng Liu; Heinz Roland Weistroffer

    Trust, such as trust in a technology or believing that a technology has trustworthy utility, manifests its importance by affecting user behaviors toward information systems (IS). There is no dearth of evidence showing that the effect of trust is statistically “significant;” however, statistical significance, different from practical significance is nothing but a failure to reject the Fisherian null

    更新日期:2020-08-19
  • Effect of Competitors’ eWOM in the Mobile Game Market
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-08-13
    Hsun-Ming Lee; Peiqin Zhang; Mayur R. Mehta

    The competition among the products is common in the business environment. However, the impact of a product’s competitors in consumers’ electronic word-of-mouth (eWOM) communications has received little attention. Drawing from the theory of distinctive processing, this research examines how eWOM affects a product’s success in the competitive mobile game market. Based on a dataset obtained from searchman

    更新日期:2020-08-14
  • Do We Trust in AI? Role of Anthropomorphism and Intelligence
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-08-10
    Indrit Troshani; Sally Rao Hill; Claire Sherman; Damien Arthur

    AI applications are radically transforming the manner in which service providers and consumers interact. We explore how the humanness of AI applications affects consumers’ trust in these applications. Qualitative evidence collected with focus groups provides fresh insights into the roles of anthropomorphism and intelligence, as key constructs representing humanness. Our findings reveal the consumers’

    更新日期:2020-08-11
  • ICTs, Empowerment, and Success: Women’s Perceptions across Eight Countries
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-08-04
    Fatih Çetin; Tara Urich; Joanna Paliszkiewicz; Magdalena Mądra-Sawicka; Jeretta Horn Nord

    The purpose of this study was to explore and compare women’s perceptions of Information and Communication Technologies (ICTs), empowerment, and success among respondents in eight countries. The research sample consisted of 969 participants (137 from Georgia, 105 from Poland, 130 from Romania, 152 from Slovenia, 102 from Spain, 123 from Taiwan, 120 from Turkey, and 100 from the United States). Qualitative

    更新日期:2020-08-05
  • Social Networking Sites and Researcher’s Success
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-08-04
    Grzegorz Mazurek; Anna Górska; Paweł Korzyński; Susana Silva

    Universities are evaluated more often basing on the citation scores of their employees, schools translate this pressure onto the scholars. The purpose of this paper is twofold: to identify whether how the use of social networking sites (SNS) may enhance the impact of the research and thus contribute to the academic success in terms of citations; and to gain a more comprehensive understanding of which

    更新日期:2020-08-05
  • Empirical Study on Initial Trust of Wearable Devices Based on Product Characteristics
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-08-04
    Zhongwei Gu; June Wei

    Product characteristics of wearable devices have large impacts on users’ initial trust as users intend to adopt wearable devices, which further impacts wearable devices' use intention. This paper aims at investigating the impacts of wearable device product characteristics on consumers’ initial trust based on four factors: wearability, functionality, personalization, and integration. Through a questionnaire

    更新日期:2020-08-05
  • Confucian Values, Social Fear, and Knowledge Sharing in Korean Organizations
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-08-04
    Jinyoung Han; Anat Hovav; Martin Hemmert

    The purpose of this study is to examine the effects of Confucian values, social fear and organizational knowledge sharing culture on the knowledge sharing intention of Information Systems (IS) professionals in an East Asian context. We surveyed 187 professionals working in IS in South Korean companies and applied partial least squares structural equation modeling for testing our hypotheses. The results

    更新日期:2020-08-05
  • Online Reviews: What Drives Consumers to Use Them
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-07-02
    Chuleeporn Changchit; Tim Klaus; Ravi Lonkani

    With the rapid E-commerce growth and changes in consumers’ behaviors, many businesses are forced to adapt their business model to match their target customers’ needs. To provide consumers with more product details and increase their confidence in making online purchases, online businesses offer online reviews as an alternative to customers physically interacting with a product. Although consumers have

    更新日期:2020-07-03
  • A Causal Map Analysis of Supply Chain Decentralization
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-07-02
    Fernando S. Oliveira

    We study the inclusion of loops in automated theory development based on causal logic. As an area of application, we formalize a model of learning, adaptation, and selection in supply chain management. Our methodological contribution is to analyze a causal network with propositional logic, explaining the difference between material and intentional causality and considering cumulative causality. In

    更新日期:2020-07-03
  • Story Analysis Using Natural Language Processing and Interactive Dashboards
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-07-02
    Michel Mitri

    This paper discusses Story Analyzer, which uses a natural language processing (NLP) library and sophisticated data visualization libraries to produce dashboards of interrelated and user-responsive visualizations depicting actors and their interactions in a textual narrative, along with locations, times, and other contexts. Story Analyzer performs information extraction using Stanford’s CoreNLP’s NLP

    更新日期:2020-07-03
  • Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-06-30
    Alex Koohang; Jeretta Horn Nord; Zoroayka V. Sandoval; Joanna Paliszkiewicz

    The purpose of this paper was to first examine the reliability, validity, and strength of a unified model for information security policy compliance that includes eight constructs explaining information security policy compliance. Second, seven hypotheses were developed and tested based on the constructs in the model. An instrument with eight constructs was used to reflect the traditional survey statements

    更新日期:2020-06-30
  • Team Performance and Triangle Approach: A Longitudinal Study
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-06-25
    Hamid Reza Nikkhah; Franck Loic Soh Noume; Beverly Hodges; Rajiv Sabherwal

    The literature on information systems development appears to be fragmented into three main categories: one that uses a knowledge management perspective, another one that considers social aspects of information systems development, and the last one that emphasizes the role of information technology. Such fragmentation detains the understanding of influential factors. In this paper, we synthesize the

    更新日期:2020-06-25
  • Perceived Control and Perceived Risk in Self-service Technology Recovery
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-06-08
    Nghi Thuc Le; Sally Rao Hill; Indrit Troshani

    The widespread use of self-service technology (SST) has changed the way customers experience service and how they deal with recovery from service failure. A growing number of service providers offer SST-based recovery, allowing customers to fix service failures using SSTs. Yet, gaining customer acceptance for this emerging form of service recovery presents challenges. There is a need to improve current

    更新日期:2020-06-08
  • Understanding the Use of Knowledge Sharing Tools
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-06-08
    Angela Siew-Hoong Lee; Shan Wang; William Yeoh; Novita Ikasari

    This paper investigates the drivers of the use of knowledge-sharing tools through the lens of task–technology fit (TTF), the role of social factors, and the cognitive and affective mechanisms. Data were collected from 294 knowledge workers and analyzed using partial least squares. This study found that cognition (i.e., perceived usefulness) and positive affect play an important role in mediating the

    更新日期:2020-06-08
  • Understanding Social Media Monitoring and Online Rumors
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-05-22
    Jong-Hyun Kim; Rajiv Sabherwal; Gee-Woo Bock; Han-Min Kim

    In order to investigate the impact of social media monitoring on a firm’s market understanding and performance, and how to manage online rumors, two complementary studies are conducted on visitors’ engagement and three aspects of engagement. The first study indicates that conversations and inbound traffic positively affect visitors’ engagement, which, along with referrals, influences social media monitoring’s

    更新日期:2020-05-22
  • When Agile Means Staying: A Moderated Mediated Model
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-05-22
    Tenace Kwaku Setor; Damien Joseph

    The design of software development methods focuses on improving task processes, including accommodating changing user requirements and accelerating product delivery. However, there is limited research on how the use of different software development methods impacts IT professionals’ perceptions of organizational mobility. Drawing on concepts from the agile development literature and job characteristics

    更新日期:2020-05-22
  • Repurchase Intention in Online Knowledge Service: The Brand Awareness Perspective
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-05-22
    Helen S. Du; Jiahong Xu; Heng Tang; Ruixin Jiang

    This study aims to investigate the influencing factors of consumers’ repurchase intention in the context of online knowledge service. Drawing on information systems (IS) success model, social identity theory, and expectation-confirmation theory, we examine the roles of IS success factors, satisfaction, switching barrier, and brand awareness in influencing repurchase intention in the online knowledge

    更新日期:2020-05-22
  • How Social Media Analytics Can Inform Content Strategies
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-04-20
    Nima Kordzadeh; Diana K. Young

    Social media has become a strategic tool for businesses and nonprofit organizations to connect with audiences. However, no comprehensive framework exists to support the continued improvement of social media outcomes. This work draws on prior studies related to social media analytics and user engagement to develop an overarching, analytics-driven process for social content strategy development and improvement

    更新日期:2020-04-20
  • Users’ Knowledge Sharing on Social Networking Sites
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-04-14
    Xiaolin Lin; Xun Xu; Xuequn Wang

    As social networking sites (SNSs) have become quite popular, organizations have used SNSs to support their various business processes. A growing trend is that organizations increasingly encourage consumers to contribute knowledge via SNSs. The contributed knowledge can help organizations to improve their products/services and therefore these contributions have great business value. As consumers are

    更新日期:2020-04-14
  • Trust Decision-Making in Online Social Communities: A Network-Based Model
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-04-09
    Gelareh Towhidi; Atish P. Sinha; Mark Srite; Huimin Zhao

    The unique characteristics of online social communities call for a reexamination and adaptation of established behavioral theories of trust decision-making. Guided by relevant social science and computational graph theories, we propose a conceptual model of trust decision-making in online social networks. This is the first study that integrates the existing graph-based view of trust decision-making

    更新日期:2020-04-09
  • Obstacles of On-Premise Enterprise Resource Planning Systems and Solution Directions
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-04-09
    Senem Sancar Gozukara; Bedir Tekinerdogan; Cagatay Catal

    The article presents the results of a Systematic Literature Review (SLR) that has been carried out to identify and present the state-of-the-art of ERP systems, describe the obstacles of on-premise ERP systems, and provide general solutions to tackle these challenges. Based on this SLR, 22 obstacles are identified, the dependencies and interactions among these obstacles are described, and finally the

    更新日期:2020-04-09
  • Cyber Security Awareness, Knowledge and Behavior: A Comparative Study
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-14
    Moti Zwilling; Galit Klien; Dušan Lesjak; Łukasz Wiechetek; Fatih Cetin; Hamdullah Nejat Basim

    Cyber-attacks represent a potential threat to information security. As rates of data usage and internet consumption continue to increase, cyber awareness turned to be increasingly urgent. This study focuses on the relationships between cyber security awareness, knowledge and behavior with protection tools among individuals in general and across four countries: Israel, Slovenia, Poland and Turkey in

    更新日期:2020-02-14
  • BYOD Policy Compliance: Risks and Strategies in Organizations
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-14
    Rathika Palanisamy; Azah Anir Norman; Miss Laiha Mat Kiah

    The proliferation of mobile devices has brought the Bring Your Own Device (BYOD) trend in organizations, along with significant challenges when employees fail to comply with security policies. Previous reviews in this research area had focused solely on the technical issues surrounding BYOD implementation while leaving out the human behavior in complying with security policies which is a major contributing

    更新日期:2020-02-14
  • Optimistic Bias and Exposure Affect Security Incidents on Home Computer
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-14
    Barbara Hewitt; Garry L. White

    Individuals who are optimistically biased believe that they are less likely to experience an adverse event or more likely to experience a positive event than their peers. This paper examines whether individuals feel less likely to experience a breach on their home computers (cyber optimistic bias), have more computer and security education, apply protective more measures, and experience more security

    更新日期:2020-02-14
  • A Pedagogy to Develop Effective Virtual Teams
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-13
    Raymond Angelo; Richard McCarthy

    While virtual teams dominate business environments, little attention has been paid to how team leadership, in particular shared leadership, can be reinforced in classrooms. There is a consensus that shared leadership impacts the performance of virtual groups in a positive manner. While higher education in business is aiming to prepare graduates for virtual team leadership and effectiveness, pedagogical

    更新日期:2020-02-13
  • Gender, Performance, and Self-Efficacy: A Quasi-Experimental Field Study
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-13
    Matthew J. Liberatore; William P. Wagner

    With chronic labor shortages in STEM-related industries, much research has focused on how to get more women and minorities interested in STEM careers. The most recent studies seem to indicate that the actual gap in user performance between genders has narrowed, although women tend to have less self-efficacy. However, all these previous studies involved student subjects in an educational context. This

    更新日期:2020-02-13
  • Perceptions of Cybersecurity Readiness among Workgroup IT Managers
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-13
    Thomas A. Chapman; Brian J. Reithel

    Any modern cybersecurity strategy relies upon IT managers who are experts in their field, who are willing to employ best practices, and who educate their users. Large corporations have developed an intrinsic understanding of these factors. However, large corporations are comprised of departmental units that are not always considered in the organization’s cybersecurity profile. This is particularly

    更新日期:2020-02-13
  • Personality and Demographic Characteristics Influence on Consumers’ Social Commerce Preference
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-13
    Chuleeporn Changchit; Robert Cutshall; Anh Pham

    With the rapid growth in the number of people using social networking sites, businesses are attempting to engage their customers by establishing social commerce websites, which provide customers with a new shopping experience. This new commerce channel allows customers to share their experience and attain information from other customers. Nevertheless, not all consumers are ready to engage in this

    更新日期:2020-02-13
  • Use Public Wi-Fi? Fear Arouse and Avoidance Behavior
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-13
    Chung-Yean Chiang; Xiao Tang

    This study aims to study the internet security compliance behavior in a public Wi-Fi usage condition. We developed our research framework and hypotheses with the consideration of the protection motivation theory. Assembling questions from existing literature, we collected opinions from a group of college students who know and use public Wi-Fi. Using structural equation modeling, we examined the role

    更新日期:2020-02-13
  • Big Data Analytics in Cyber Security: Network Traffic and Attacks
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-01-08
    Lidong Wang; Randy Jones

    Network attacks, intrusion detection, and intrusion prevention are important topics in cyber security. Network flows and system events generate big data, which often leads to challenges in intrusion detection with high efficiency and good accuracy. This paper focuses on the ‘Volume’, ‘Veracity’, and ‘Variety’ of big data characteristics in network traffic and attacks. Datasets with various data types

    更新日期:2020-01-08
  • Towards a User Experience Framework for Business Intelligence
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-12-18
    Marcus Eriksson; Bruce Ferwerda

    ABSTRACT Business intelligence (BI) systems are software applications that are used to gather and process data and to deliver the processed data in understandable way to the end users. With a younger generation of users moving into key positions in organizations and enterprises higher user experience (UX) demands are placed on BI systems interfaces. Companies developing BI systems lack standardized

    更新日期:2019-12-18
  • The Influence of Social Power on Knowledge Utilization
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-12-12
    Ji-Myoun Lee; Gee-Woo Bock; Ayoung Suh

    Although many studies have reported that social power is a critical factor in facilitating or constraining social interactions among individuals, few studies have fully explored how social power influences an individual’s knowledge utilization within a work group. Social power in the workplace helps individuals recognize others’ knowledge and utilize it in a business context. By integrating the theory

    更新日期:2019-12-12
  • The Role of Attitude toward Challenge in Serious Game Design
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-12-09
    Philip Tin Yun Lee; Michael Chau; Richard Wing Cheung Lui

    This paper proposes that challenge, an orthogonal game attribute, can be used to improve game effectiveness. The results of our study suggest that attitude toward challenge should be considered when we tune challenge in the serious game for better learning results. A significant moderating role of attitude toward challenge is found in the relationship between challenge and self-efficacy. Investigating

    更新日期:2019-12-09
  • Towards a Cashless Society: The Imminent Role of Wearable Technology
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-12-09
    Xiu-Ming Loh; Voon-Hsien Lee; Garry Wei-Han Tan; Jun-Jie Hew; Keng-Boon Ooi

    Wearable payment, which is the use of wearable technology to make payment, is anticipated to be the future of proximity mobile payment. However, the acceptance and use of wearable payment in Malaysia leave much to be desired. Additionally, this area of research is currently under-addressed. Thus, this study looks into the elements that influence the intention to adopt wearable payment in Malaysia.

    更新日期:2019-12-09
  • IT Ethics Perceptions and Behavior: An International Comparison
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-12-09
    Milos Ulman; C. G. Marreiros; R. Quaresma; A. L. Harris

    The paper discusses differences in IT ethics perceptions and behavior of college students. The study is one of the few that examine multicultural differences in IT ethics on a convenience sample of 1,648 individuals from seven countries in three continents. We adopted an Ethics Decision-Making Model with Cultural Impacts and applied it on the examination of relations between IT ethics perceptions,

    更新日期:2019-12-09
  • Data-driven Begins with DATA; Potential of Data Assets
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-11-25
    Hannu Hannila; Risto Silvola; Janne Harkonen; Harri Haapasalo

    The objective of this study is to analyze the potential of company data assets for data-driven, fact-based decision-making in product portfolio management (PPM). Data assets are categorized from the PPM standpoint, including (product/customer/ …) master data, transactional data, and interaction data (e.g., IoT data). The study combines literature review and qualitative analysis of eight international

    更新日期:2019-11-25
  • Motivating Information Security Policy Compliance: Insights from Perceived Organizational Formalization
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-11-21
    Yuxiang Hong; Steven Furnell

    Psychological and behavioral characteristics are among the most important factors that instigate information security incidents. Although many previous studies have discussed the influencing factors of information security policy compliance behavior in an organization, few have considered the influence of organizational structures. In this study, the mechanism by which information security policy compliance

    更新日期:2019-11-21
  • Methods of Metabolite Identification Using MS/MS Data
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-11-07
    Myungjae Kwak; Kyungwoo Kang; Yingfeng Wang

    Researchers in bioinformatics and medical science fields have been developing various innovative information systems and software tools using emerging technologies. Metabolite profiling is one of the fields in which bioinformatics researchers are intensely developing various innovative methods and software tools. Metabolites are the intermediate and end products of metabolism, which is the set of life-sustaining

    更新日期:2019-11-07
  • Mobile Social Cyberbullying: Why are Keyboard Warriors Raging?
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-11-07
    Keng-Boon Ooi; Voon-Hsien Lee; Jun-Jie Hew; Binshan Lin

    Cyberbullying on social media has become a serious matter and is the most rampant form of bullying among students nowadays. Accordingly, this study examines mobile social cyberbullying perpetration, a new form of cyberbullying perpetration that is conducted over mobile social media, through the theoretical lenses of Barlett and Gentile Cyberbullying Model (BGCM) and Mobile Technology Acceptance Model

    更新日期:2019-11-07
  • A Review of IS Strategy Literature: Current Trends and Future Opportunities
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-11-06
    Jason A. Williams; Henry G. Torres; Traci Carte

    In this paper, we examine the IS strategy literature since 2008. Using Chen, Mocker, Preston, and Teubner’s (2010) review as a starting point, we identified 31 IS strategy studies published since 2008. Further, we evaluated previous frameworks for evaluating IS strategy research. Using the conceptions proposed by Chen, et al. (2010), IS Strategy as competitive advantage (I), IS functional strategy

    更新日期:2019-11-06
  • Virtual Brand Community Experience, Identification, and Electronic Word-of-mouth
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-10-09
    Lin Qiao; Mengmeng Song; Nan (Tina) Wang

    Despite recognizing the importance of virtual brand community (VBC) and the existence of different types of electronic word-of-mouth (eWOM) behaviors (e.g., opinion giving, opinion passing and opinion seeking), the existing literature remains inadequate regarding the influences of VBC experiences and identification on eWOM. This study, incorporating stimulus–organism–response theory and related research

    更新日期:2019-10-09
  • Antecedents of Technology Selection for Project Use
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-09-16
    Michael J. Cuellar; Manoucheher Tabatabaei; Thomas Case

    The adoption and use of technology have been an important topic of research in Information Systems. However, projects create a different environment for technology adoption in that they are temporary organizations which are formed specifically for the project and then disbanded as opposed to the continuing organizations which have been traditionally studied. We term this adoption and use in temporary

    更新日期:2019-09-16
  • Security Awareness: The First Step in Information Security Compliance Behavior
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-08-13
    Inho Hwang; Robin Wakefield; Sanghyun Kim; Taeha Kim

    In this study, we use the attentional phase of social learning theory to link workplace security-related experiences and observations to employees’ security awareness. The responses of 398 organizational employees serve to test our research model using structural equational modeling with AMOS 22.0. The results show security awareness arises from both explicit and subjective security experiences in

    更新日期:2019-08-13
  • Information Technology Operational Risk: A Teaching Case
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-08-13
    Janice C. Sipior; Danielle R. Lombardi; Renata Gabryelczyk

    IT operational risk refers to any threat that could lead to the inappropriate modification, lack of availability, destruction, or theft of IT assets. This paper presents a real-world teaching case study, based upon an actual consulting engagement of risk assurance professionals working at a multinational professional services provider, to bring practical experience with managing IT operational risk

    更新日期:2019-08-13
  • Can Online Rating Reflect Authentic Customer Purchase Feelings? Understanding How Customer Dissatisfaction Relates to Negative Reviews
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-08-07
    Huosong Xia; Xiaoting Pan; Wuyue An; Zuopeng (Justin) Zhang

    The fast growth in online word of mouth (online WOM) reviews has witnessed their wide applications in assisting customers in their purchases. While many positive factors about these reviews have been identified, biases may result from reviewers’ self-selection behavior. To examine whether online WOM ratings reflect authentic customer purchase feelings, this study focuses on the relation between customer

    更新日期:2019-08-07
  • Information Technology Work Value Differences
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-08-07
    Katarzyna Toskin; Richard V. McCarthy

    This study investigates reasons behind high employee turnover of IT professionals through the value placed on intrinsic, extrinsic, leisure, and social rewards. It addresses two questions; what are the most preferred work values by IT professionals, and how do they differ from other professions. Data was collected via a survey using subjects from Amazon Mechanical Turk. A sample of 380 respondents

    更新日期:2019-08-07
  • Factors Activating Big Data Adoption by Korean Firms
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-07-29
    Jong-Hyun Park; Yun Bae Kim

    Big data is expected to drive the new digital transformation of society, government, and business. The proportion of firms implementing and utilizing big data, however, is not high. There are many challenges and obstacles related to firm adoption of big data. The purpose of this study is to identify the factors influencing the adoption of big data among Korean firms using the technology-organization-environment

    更新日期:2019-07-29
  • Literature Review about Intention Mining in Information Systems
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-06-24
    Oswaldo E. Diaz; María Gabriela Perez; Jorge Edison Lascano

    Based on the event log, the process mining techniques allow the discovery of the real processes, the verification of conformity with the prescribed processes and the improvement them. Also, in the current literature has evidenced the development of some works of process mining to the discovery of user intentions (intention mining). The purpose of this work is to conduct a literature review about the

    更新日期:2019-06-24
  • Understanding Consumers’ Post-Adoption Behavior in Sharing Economy Services
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-06-24
    Xuequn Wang; Xiaolin Lin; Zilong Liu

    Sharing economy services such as bicycle-sharing have become quite popular. In these services, companies maintain systems which allow consumers to conduct sharing activities. Based upon expectation-confirmation theory, we develop a model investigating the antecedents of consumer confirmation and its consequences in the sharing economy context. Specially, we identify two antecedents including perceived

    更新日期:2019-06-24
  • Investigating Factors of Twitter Use among Municipal Governments
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-06-24
    Jeffrey A. Stone; S. Hakan Can

    This study investigates predictors of Twitter adoption and use by municipalities for citizen communication, considering both the level of municipal Twitter presence and the level of Twitter activity. Possible predictors included municipal characteristics as well as citizenry characteristics. Participants included 100 Pennsylvania municipalities drawn from a disproportionate stratified sample, evenly

    更新日期:2019-06-24
Contents have been reproduced by permission of the publishers.
导出
全部期刊列表>>
Springer 纳米技术权威期刊征稿
全球视野覆盖
施普林格·自然新
chemistry
3分钟学术视频演讲大赛
物理学研究前沿热点精选期刊推荐
自然职位线上招聘会
欢迎报名注册2020量子在线大会
化学领域亟待解决的问题
材料学研究精选新
GIANT
ACS ES&T Engineering
ACS ES&T Water
屿渡论文,编辑服务
ACS Publications填问卷
阿拉丁试剂right
麻省大学
西北大学
湖南大学
华东师范大学
王要兵
化学所
隐藏1h前已浏览文章
课题组网站
新版X-MOL期刊搜索和高级搜索功能介绍
ACS材料视界
天合科研
x-mol收录
陆军军医大学
杨财广
廖矿标
试剂库存
down
wechat
bug