当前期刊: Journal of Computer Information Systems Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
  • Understanding Social Media Monitoring and Online Rumors
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2020-05-22
    Jong-Hyun Kim; Rajiv Sabherwal; Gee-Woo Bock; Han-Min Kim

    In order to investigate the impact of social media monitoring on a firm’s market understanding and performance, and how to manage online rumors, two complementary studies are conducted on visitors’ engagement and three aspects of engagement. The first study indicates that conversations and inbound traffic positively affect visitors’ engagement, which, along with referrals, influences social media monitoring’s

  • When Agile Means Staying: A Moderated Mediated Model
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2020-05-22
    Tenace Kwaku Setor; Damien Joseph

    The design of software development methods focuses on improving task processes, including accommodating changing user requirements and accelerating product delivery. However, there is limited research on how the use of different software development methods impacts IT professionals’ perceptions of organizational mobility. Drawing on concepts from the agile development literature and job characteristics

  • Repurchase Intention in Online Knowledge Service: The Brand Awareness Perspective
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2020-05-22
    Helen S. Du; Jiahong Xu; Heng Tang; Ruixin Jiang

    This study aims to investigate the influencing factors of consumers’ repurchase intention in the context of online knowledge service. Drawing on information systems (IS) success model, social identity theory, and expectation-confirmation theory, we examine the roles of IS success factors, satisfaction, switching barrier, and brand awareness in influencing repurchase intention in the online knowledge

  • How Social Media Analytics Can Inform Content Strategies
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2020-04-20
    Nima Kordzadeh; Diana K. Young

    Social media has become a strategic tool for businesses and nonprofit organizations to connect with audiences. However, no comprehensive framework exists to support the continued improvement of social media outcomes. This work draws on prior studies related to social media analytics and user engagement to develop an overarching, analytics-driven process for social content strategy development and improvement

  • Users’ Knowledge Sharing on Social Networking Sites
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2020-04-14
    Xiaolin Lin; Xun Xu; Xuequn Wang

    As social networking sites (SNSs) have become quite popular, organizations have used SNSs to support their various business processes. A growing trend is that organizations increasingly encourage consumers to contribute knowledge via SNSs. The contributed knowledge can help organizations to improve their products/services and therefore these contributions have great business value. As consumers are

  • Trust Decision-Making in Online Social Communities: A Network-Based Model
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2020-04-09
    Gelareh Towhidi; Atish P. Sinha; Mark Srite; Huimin Zhao

    The unique characteristics of online social communities call for a reexamination and adaptation of established behavioral theories of trust decision-making. Guided by relevant social science and computational graph theories, we propose a conceptual model of trust decision-making in online social networks. This is the first study that integrates the existing graph-based view of trust decision-making

  • Obstacles of On-Premise Enterprise Resource Planning Systems and Solution Directions
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2020-04-09
    Senem Sancar Gozukara; Bedir Tekinerdogan; Cagatay Catal

    The article presents the results of a Systematic Literature Review (SLR) that has been carried out to identify and present the state-of-the-art of ERP systems, describe the obstacles of on-premise ERP systems, and provide general solutions to tackle these challenges. Based on this SLR, 22 obstacles are identified, the dependencies and interactions among these obstacles are described, and finally the

  • Cyber Security Awareness, Knowledge and Behavior: A Comparative Study
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2020-02-14
    Moti Zwilling; Galit Klien; Dušan Lesjak; Łukasz Wiechetek; Fatih Cetin; Hamdullah Nejat Basim

    Cyber-attacks represent a potential threat to information security. As rates of data usage and internet consumption continue to increase, cyber awareness turned to be increasingly urgent. This study focuses on the relationships between cyber security awareness, knowledge and behavior with protection tools among individuals in general and across four countries: Israel, Slovenia, Poland and Turkey in

  • BYOD Policy Compliance: Risks and Strategies in Organizations
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2020-02-14
    Rathika Palanisamy; Azah Anir Norman; Miss Laiha Mat Kiah

    The proliferation of mobile devices has brought the Bring Your Own Device (BYOD) trend in organizations, along with significant challenges when employees fail to comply with security policies. Previous reviews in this research area had focused solely on the technical issues surrounding BYOD implementation while leaving out the human behavior in complying with security policies which is a major contributing

  • Optimistic Bias and Exposure Affect Security Incidents on Home Computer
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2020-02-14
    Barbara Hewitt; Garry L. White

    Individuals who are optimistically biased believe that they are less likely to experience an adverse event or more likely to experience a positive event than their peers. This paper examines whether individuals feel less likely to experience a breach on their home computers (cyber optimistic bias), have more computer and security education, apply protective more measures, and experience more security

  • A Pedagogy to Develop Effective Virtual Teams
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2020-02-13
    Raymond Angelo; Richard McCarthy

    While virtual teams dominate business environments, little attention has been paid to how team leadership, in particular shared leadership, can be reinforced in classrooms. There is a consensus that shared leadership impacts the performance of virtual groups in a positive manner. While higher education in business is aiming to prepare graduates for virtual team leadership and effectiveness, pedagogical

  • Gender, Performance, and Self-Efficacy: A Quasi-Experimental Field Study
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2020-02-13
    Matthew J. Liberatore; William P. Wagner

    With chronic labor shortages in STEM-related industries, much research has focused on how to get more women and minorities interested in STEM careers. The most recent studies seem to indicate that the actual gap in user performance between genders has narrowed, although women tend to have less self-efficacy. However, all these previous studies involved student subjects in an educational context. This

  • Perceptions of Cybersecurity Readiness among Workgroup IT Managers
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2020-02-13
    Thomas A. Chapman; Brian J. Reithel

    Any modern cybersecurity strategy relies upon IT managers who are experts in their field, who are willing to employ best practices, and who educate their users. Large corporations have developed an intrinsic understanding of these factors. However, large corporations are comprised of departmental units that are not always considered in the organization’s cybersecurity profile. This is particularly

  • Personality and Demographic Characteristics Influence on Consumers’ Social Commerce Preference
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2020-02-13
    Chuleeporn Changchit; Robert Cutshall; Anh Pham

    With the rapid growth in the number of people using social networking sites, businesses are attempting to engage their customers by establishing social commerce websites, which provide customers with a new shopping experience. This new commerce channel allows customers to share their experience and attain information from other customers. Nevertheless, not all consumers are ready to engage in this

  • Use Public Wi-Fi? Fear Arouse and Avoidance Behavior
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2020-02-13
    Chung-Yean Chiang; Xiao Tang

    This study aims to study the internet security compliance behavior in a public Wi-Fi usage condition. We developed our research framework and hypotheses with the consideration of the protection motivation theory. Assembling questions from existing literature, we collected opinions from a group of college students who know and use public Wi-Fi. Using structural equation modeling, we examined the role

  • Big Data Analytics in Cyber Security: Network Traffic and Attacks
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2020-01-08
    Lidong Wang; Randy Jones

    Network attacks, intrusion detection, and intrusion prevention are important topics in cyber security. Network flows and system events generate big data, which often leads to challenges in intrusion detection with high efficiency and good accuracy. This paper focuses on the ‘Volume’, ‘Veracity’, and ‘Variety’ of big data characteristics in network traffic and attacks. Datasets with various data types

  • Towards a User Experience Framework for Business Intelligence
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-12-18
    Marcus Eriksson; Bruce Ferwerda

    ABSTRACT Business intelligence (BI) systems are software applications that are used to gather and process data and to deliver the processed data in understandable way to the end users. With a younger generation of users moving into key positions in organizations and enterprises higher user experience (UX) demands are placed on BI systems interfaces. Companies developing BI systems lack standardized

  • The Influence of Social Power on Knowledge Utilization
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-12-12
    Ji-Myoun Lee; Gee-Woo Bock; Ayoung Suh

    Although many studies have reported that social power is a critical factor in facilitating or constraining social interactions among individuals, few studies have fully explored how social power influences an individual’s knowledge utilization within a work group. Social power in the workplace helps individuals recognize others’ knowledge and utilize it in a business context. By integrating the theory

  • The Role of Attitude toward Challenge in Serious Game Design
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-12-09
    Philip Tin Yun Lee; Michael Chau; Richard Wing Cheung Lui

    This paper proposes that challenge, an orthogonal game attribute, can be used to improve game effectiveness. The results of our study suggest that attitude toward challenge should be considered when we tune challenge in the serious game for better learning results. A significant moderating role of attitude toward challenge is found in the relationship between challenge and self-efficacy. Investigating

  • Towards a Cashless Society: The Imminent Role of Wearable Technology
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-12-09
    Xiu-Ming Loh; Voon-Hsien Lee; Garry Wei-Han Tan; Jun-Jie Hew; Keng-Boon Ooi

    Wearable payment, which is the use of wearable technology to make payment, is anticipated to be the future of proximity mobile payment. However, the acceptance and use of wearable payment in Malaysia leave much to be desired. Additionally, this area of research is currently under-addressed. Thus, this study looks into the elements that influence the intention to adopt wearable payment in Malaysia.

  • IT Ethics Perceptions and Behavior: An International Comparison
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-12-09
    Milos Ulman; C. G. Marreiros; R. Quaresma; A. L. Harris

    The paper discusses differences in IT ethics perceptions and behavior of college students. The study is one of the few that examine multicultural differences in IT ethics on a convenience sample of 1,648 individuals from seven countries in three continents. We adopted an Ethics Decision-Making Model with Cultural Impacts and applied it on the examination of relations between IT ethics perceptions,

  • Data-driven Begins with DATA; Potential of Data Assets
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-11-25
    Hannu Hannila; Risto Silvola; Janne Harkonen; Harri Haapasalo

    The objective of this study is to analyze the potential of company data assets for data-driven, fact-based decision-making in product portfolio management (PPM). Data assets are categorized from the PPM standpoint, including (product/customer/ …) master data, transactional data, and interaction data (e.g., IoT data). The study combines literature review and qualitative analysis of eight international

  • Motivating Information Security Policy Compliance: Insights from Perceived Organizational Formalization
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-11-21
    Yuxiang Hong; Steven Furnell

    Psychological and behavioral characteristics are among the most important factors that instigate information security incidents. Although many previous studies have discussed the influencing factors of information security policy compliance behavior in an organization, few have considered the influence of organizational structures. In this study, the mechanism by which information security policy compliance

  • Methods of Metabolite Identification Using MS/MS Data
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-11-07
    Myungjae Kwak; Kyungwoo Kang; Yingfeng Wang

    Researchers in bioinformatics and medical science fields have been developing various innovative information systems and software tools using emerging technologies. Metabolite profiling is one of the fields in which bioinformatics researchers are intensely developing various innovative methods and software tools. Metabolites are the intermediate and end products of metabolism, which is the set of life-sustaining

  • Mobile Social Cyberbullying: Why are Keyboard Warriors Raging?
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-11-07
    Keng-Boon Ooi; Voon-Hsien Lee; Jun-Jie Hew; Binshan Lin

    Cyberbullying on social media has become a serious matter and is the most rampant form of bullying among students nowadays. Accordingly, this study examines mobile social cyberbullying perpetration, a new form of cyberbullying perpetration that is conducted over mobile social media, through the theoretical lenses of Barlett and Gentile Cyberbullying Model (BGCM) and Mobile Technology Acceptance Model

  • A Review of IS Strategy Literature: Current Trends and Future Opportunities
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-11-06
    Jason A. Williams; Henry G. Torres; Traci Carte

    In this paper, we examine the IS strategy literature since 2008. Using Chen, Mocker, Preston, and Teubner’s (2010) review as a starting point, we identified 31 IS strategy studies published since 2008. Further, we evaluated previous frameworks for evaluating IS strategy research. Using the conceptions proposed by Chen, et al. (2010), IS Strategy as competitive advantage (I), IS functional strategy

  • Virtual Brand Community Experience, Identification, and Electronic Word-of-mouth
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-10-09
    Lin Qiao; Mengmeng Song; Nan (Tina) Wang

    Despite recognizing the importance of virtual brand community (VBC) and the existence of different types of electronic word-of-mouth (eWOM) behaviors (e.g., opinion giving, opinion passing and opinion seeking), the existing literature remains inadequate regarding the influences of VBC experiences and identification on eWOM. This study, incorporating stimulus–organism–response theory and related research

  • Antecedents of Technology Selection for Project Use
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-09-16
    Michael J. Cuellar; Manoucheher Tabatabaei; Thomas Case

    The adoption and use of technology have been an important topic of research in Information Systems. However, projects create a different environment for technology adoption in that they are temporary organizations which are formed specifically for the project and then disbanded as opposed to the continuing organizations which have been traditionally studied. We term this adoption and use in temporary

  • Security Awareness: The First Step in Information Security Compliance Behavior
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-08-13
    Inho Hwang; Robin Wakefield; Sanghyun Kim; Taeha Kim

    In this study, we use the attentional phase of social learning theory to link workplace security-related experiences and observations to employees’ security awareness. The responses of 398 organizational employees serve to test our research model using structural equational modeling with AMOS 22.0. The results show security awareness arises from both explicit and subjective security experiences in

  • Information Technology Operational Risk: A Teaching Case
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-08-13
    Janice C. Sipior; Danielle R. Lombardi; Renata Gabryelczyk

    IT operational risk refers to any threat that could lead to the inappropriate modification, lack of availability, destruction, or theft of IT assets. This paper presents a real-world teaching case study, based upon an actual consulting engagement of risk assurance professionals working at a multinational professional services provider, to bring practical experience with managing IT operational risk

  • Can Online Rating Reflect Authentic Customer Purchase Feelings? Understanding How Customer Dissatisfaction Relates to Negative Reviews
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-08-07
    Huosong Xia; Xiaoting Pan; Wuyue An; Zuopeng (Justin) Zhang

    The fast growth in online word of mouth (online WOM) reviews has witnessed their wide applications in assisting customers in their purchases. While many positive factors about these reviews have been identified, biases may result from reviewers’ self-selection behavior. To examine whether online WOM ratings reflect authentic customer purchase feelings, this study focuses on the relation between customer

  • Information Technology Work Value Differences
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-08-07
    Katarzyna Toskin; Richard V. McCarthy

    This study investigates reasons behind high employee turnover of IT professionals through the value placed on intrinsic, extrinsic, leisure, and social rewards. It addresses two questions; what are the most preferred work values by IT professionals, and how do they differ from other professions. Data was collected via a survey using subjects from Amazon Mechanical Turk. A sample of 380 respondents

  • Factors Activating Big Data Adoption by Korean Firms
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-07-29
    Jong-Hyun Park; Yun Bae Kim

    Big data is expected to drive the new digital transformation of society, government, and business. The proportion of firms implementing and utilizing big data, however, is not high. There are many challenges and obstacles related to firm adoption of big data. The purpose of this study is to identify the factors influencing the adoption of big data among Korean firms using the technology-organization-environment

  • Literature Review about Intention Mining in Information Systems
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-06-24
    Oswaldo E. Diaz; María Gabriela Perez; Jorge Edison Lascano

    Based on the event log, the process mining techniques allow the discovery of the real processes, the verification of conformity with the prescribed processes and the improvement them. Also, in the current literature has evidenced the development of some works of process mining to the discovery of user intentions (intention mining). The purpose of this work is to conduct a literature review about the

  • Understanding Consumers’ Post-Adoption Behavior in Sharing Economy Services
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-06-24
    Xuequn Wang; Xiaolin Lin; Zilong Liu

    Sharing economy services such as bicycle-sharing have become quite popular. In these services, companies maintain systems which allow consumers to conduct sharing activities. Based upon expectation-confirmation theory, we develop a model investigating the antecedents of consumer confirmation and its consequences in the sharing economy context. Specially, we identify two antecedents including perceived

  • Investigating Factors of Twitter Use among Municipal Governments
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-06-24
    Jeffrey A. Stone; S. Hakan Can

    This study investigates predictors of Twitter adoption and use by municipalities for citizen communication, considering both the level of municipal Twitter presence and the level of Twitter activity. Possible predictors included municipal characteristics as well as citizenry characteristics. Participants included 100 Pennsylvania municipalities drawn from a disproportionate stratified sample, evenly

  • Project Control, Coordination, and Performance in Complex Information Systems Outsourcing
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-05-20
    Dong-Gil Ko; Gwanhoo Lee; Mark Keil; Weidong Xia

    Information systems outsourcing has not only become prevalent but also involves an increasingly wide range of activities beyond the traditional programming, testing, documentation, and localization activities to include complex business-focused project planning, process design, requirements determination, and logical and physical systems designs. Such complex IS outsourcing often requires interactions

  • Computer Science in ASEAN: A Ten-Year Bibliometric Analysis (2009–2018)
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-05-20
    Jun-Jie Hew; Voon-Hsien Lee; Keng-Boon Ooi; Binshan Lin

    The growth of a country is heavily depending on its investment over science and technology. In fact, the progress in computer science research serves as a vital factor in the development of a country. Interestingly, despite that the Association of Southeast Asian Nations (ASEAN) is located near each other, they do not share a similar level of ICT development, which leads to a digital divide among them

  • Trust in C2C Electronic Commerce: Ten Years Later
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-04-15
    Lori N. K. Leonard; Kiku Jones

    In 2008, Jones and Leonard developed and tested a model of trust in consumer-to-consumer (C2C) electronic commerce (e-commerce). The authors expected that natural propensity to trust (NPT) and perception of website quality (PWSQ) and others’ trust of buyers/sellers (OTBS) and third party recognition (TPR) would impact a person’s trust in C2C e-commerce. They only found support for PWSQ and TPR. Much

  • Knowledge Management for Cybersecurity in Business Organizations: A Case Study
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-04-12
    Shouhong Wang; Hai Wang

    Knowledge management (KM) plays important roles in cybersecurity. This study collects five real-life cases of good practices of KM for the domain of cybersecurity in business organizations. Through an iterative process of team-based qualitative data analysis of the five cases, the study develops a model of KM for cybersecurity that conceptualizes three common aspects of KM practices for cybersecurity

  • Retraction: Gender Reputation Differences on Online Programming Q&A Communities
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-04-04

    (2019). Retraction: Gender Reputation Differences on Online Programming Q&A Communities. Journal of Computer Information Systems. Ahead of Print.

  • Formulating Knowledge-Based Cloud Identity Selection
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-04-02
    Brian Cusack; Eghbal Ghazizadeh

    Cloud identity is critical in the adoption of cloud computing. Identity providers provide identity as a service for the cloud customers to facilitate the access to resources, but often provide no informed choice of the supply arrangements. The cloud customer requires a say in the elements of service that impact their expectations and quality of service – particularly in relation to the security and

  • Affordances of Recommender Systems for Disorientation in Large Online Conversations
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-04-02
    Evren Eryilmaz; Brian Thoms; Zafor Ahmed; Kuo-Hao Lee

    In the context of large annotation-based literature discussions, this research examines the affordances of recommender systems on users’ disorientation. Drawing insights from literature on group cognition, knowledge building, and recommender systems, we developed three recommender systems and tested these systems on 136 users. Results indicate that the recommender system with constrained Pearson correlation

  • Employees’ Mobile Cyberslacking and Their Commitment to the Organization
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-03-25
    Saleh Alharthi; Yair Levy; Ling Wang; Inkyoung Hur

    While the introduction of the Internet facilitated communication channels at the workplace to improve employees’ productivity, it also raised new challenges, such as cyberslacking. The problem that this research study addresses is mobile device cyberslacking at the workplace as it relates to productivity. A mobile cyberslacking-commitment taxonomy (MCCT) was developed to classify employees’ potential

  • Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-03-21
    Carlene Blackwood-Brown; Yair Levy; John D’Arcy

    Senior citizens are one of the most vulnerable groups of Internet users who are prone to cyberattacks. Thus, assessing senior citizens’ motivation to acquire cybersecurity skills is critical to help them understand the risks of cyber-attacks. This study investigated a set of constructs that contribute to senior citizens’ motivation to acquire cybersecurity skills and assessed the actual cybersecurity

  • Assessing IT Students’ Intentions to Commit Unethical Actions
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-03-13
    Cheryl Aasheim; Jeffrey Kaleta; Paige Rutner

    With the increased volume of and access to electronically held assets, ethical behavior of information technology (IT) professionals is critical. The importance of ethical behavior in the workplace has emphasized the need for coverage of ethics in IT-related academic programs. To better understand how academic IT programs support the teaching of ethics, this study examines people’s desires and intentions

  • A High-Reliability Approach to Risk Management in an IT Project
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-03-11
    Kathleen S. Hartzel; William E. Spangler

    This article describes how an organization successfully managed a particularly high-risk and complex IT implementation project using an approach found in High-Reliability Organizations (HROs). HROs include organizations such as nuclear power plants and air traffic control systems, which typically operate within high-complexity, high-risk, and high-cost-of-failure environments. As such, HROs develop

  • Market Share Strategies for Cloud Computing Providers
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-02-15
    Derek L. Nazareth; Jae Choi

    The cloud computing industry is characterized by a small number of dominant providers and a host of small-to-medium providers. As the demand grows, additional providers are expected to enter the market. The need for 24/7 support and competitive pricing allows established providers to maintain defensible industry positions. This paper examines the impact of adopting growth and equilibrium market share

  • Attitudinal and Behavioral Loyalty Toward Virtual Goods
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-02-15
    Puneet Kaur; Amandeep Dhir; Sufen Chen; Risto Rajala

    The relationship between loyalty, purchasing of virtual goods, and use behavior of mobile instant messaging (MIM) was examined. Two forms of loyalty, attitudinal and behavioral loyalty, were considered. The study tested the model where attitudinal loyalty, including electronic word of mouth and sense of belonging, led to behavioral loyalty, including purchase intention (PI) and continuation intention

  • The Spectrum of Big Data Analytics
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-02-12
    Zhaohao Sun; Yanxia Huo

    Big data analytics is playing a pivotal role in big data, artificial intelligence, management, governance, and society with the dramatic development of big data, analytics, artificial intelligence. However, what is the spectrum of big data analytics and how to develop the spectrum are still a fundamental issue in the academic community. This article addresses these issues by presenting a big data derived

  • The Effect of Leadership and Teamwork on ISD Project Success
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-02-04
    Junyoung Oh; Hwansoo Lee; Hangjung Zo

    This study aims to analyze how the quality of leadership and teamwork influences project success in information systems development (ISD). The proposed research model endeavors to substantiate the heterogeneity of project success in the public and private sectors to assist project managers. We surveyed experienced Korean project managers in both the public and private sectors and applied a partial

  • Social Networking Site Use, Positive Emotions, and Job Performance
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-02-01
    Ned Kock; Murad Moqbel

    With the increasing use of social networking sites, within and outside work hours, it is reasonable to ask whether that use has any impact on job performance and why. This study draws on the technology acceptance model and theory of positive emotions to develop an extended theoretical model centered on social networking site use. We focus on use, but not excessive use, recognizing that negative outcomes

  • Determinants of News Sharing Behavior on Social Media
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2019-02-01
    Nik Thompson; Xuequn Wang; Pratiq Daya

    Social media is relied upon as a single portal for entertainment, communication, and news. To understand determinants of new sharing, we empirically evaluate data from 188 Facebook users with PLS structural equation modelling. Results support the significant influence of information sharing and status seeking gratifications on news sharing, and that this significance varies across contexts. We find

  • Important Skills for Data Scientists in China: Two Delphi Studies
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2018-05-18
    Catherine Chen; Haoqiang Jiang

    Big data has emerged as a powerful tool to provide unprecedented information to help businesses make good decisions; yet, in the infancy of the new field, it is not clear to most business professionals which skills are needed to be a successful data scientist. This research presents two Delphi studies, one gathered data from data scientists and one gathered data from university faculty, to gain consensus

  • Assessing Students’ Object-Oriented Programming Skills with Java: The “Department-Employee” Project
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2018-05-11
    Xihui Zhang; John D. Crabtree; Mark G. Terwilliger; Tyler T. Redman

    Java is arguably today’s most popular and widely used object-oriented programming language. Learning Java is a daunting task for students, and teaching it is a challenging undertaking for instructors. To assess students’ object-oriented programming skills with Java, we developed the “Department-Employee” project. In this article, we review the history of object-oriented programming, provide an overview

  • Continuance of E-Textbook Use by Tertiary Students: A Qualitative Approach
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2018-05-09
    John D’Ambra; Concepcion S. Wilson; Shahriar Akter

    Textbooks are an important information resource for tertiary students. E-textbooks are now widely available and accessible to students offering them distinct advantages over print books at lower costs. However the uptake of e-textbooks has been slow and student preferences for either medium are not well understood. This study adopts a qualitative approach using an expectation-confirmation theory (ECT)

  • Women in IT Management: Significant Gains and Continuing Challenges
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2018-04-23
    Vess L. Johnson; Angelina Kiser; Leon Kappelman

    The roles of women in the workforce have changed significantly over the past several decades. While there has been considerable progress made by women into leadership positions, this progress has been slow. This article explores factors that may impact the ability of women in information technology (IT) to move into leadership positions. Data collected for the Society of Information Management IT Trend

  • The Information Systems name game revisited: Still muddled 20 years later
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2018-04-19
    Stoney Brooks; Jeff Clark; Carol Clark; Stan Gambill

    The Information Systems (IS) field has long suffered from an identity crisis. Academic programs in the field are represented with a multitude of names. For potential students interested in the field, a decision that could impact their academic path revolves around choosing the correct IS-related major. After all, why would there be different names if there were no differences in what is being taught

  • Students’ acceptance of E-books: An application of UTAUT
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2018-04-19
    Assion Lawson-Body; Lori Willoughby; Laurence Lawson-Body; Eric Matofam Tamandja

    Electronic book (e-book) technologies have been shown to improve students’ learning. The question arises as to which factors may influence accounting students when considering e-books. This study uses the unified theory of acceptance and use of technology (UTAUT), which benchmarks eight different models related to the information technology (IT) acceptance, as the theoretical bases to identify factors

  • I.S. educational game: Adoption in teaching search engine optimization (SEO)
    J. Comput. Inform. Syst. (IF 1.1) Pub Date : 2018-04-12
    Richard Lui; Cheuk Hang Au

    Educational games have been adopted in different disciplines in light of their various advantages such as engaging students and promoting learning attitudes, but their applications in Information Systems Education are relatively limited. In response to the needs for establishing new methodologies of Information Systems (I.S.) education, this study aims to explore the potential impact of educational

Contents have been reproduced by permission of the publishers.