当前期刊: Journal of Computer Information Systems Go to current issue    加入关注    本刊投稿指南
显示样式:        排序: IF: - GO 导出
  • Utilizing a Simulation Approach for Data Analytics Pedagogy
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-12-09
    Daniel Adomako Asamoah

    ABSTRACT Disciplines such as information systems, finance, and accounting largely depend on analytics processes and applications to create value. Nevertheless, most organizations underutilize their analytics potential for decision making due to insufficient human resource. Reflecting on the role of academia in alleviating the human resource issue, I used a simulation approach to design a master’s level

  • A Risk Management Tool for Agile Software Development
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-12-07
    Breno Gontijo Tavares; Mark Keil; Carlos Eduardo Sanches da Silva; Adler Diniz de Souza

    ABSTRACT Lack of risk management or its inadequate application is one reason that software development projects fail. Agile methods, which have become increasingly popular, do not offer specific activities to manage risks. We develop and evaluate a tool for managing risks in software development projects that use agile methods. The proposed tool provides a collection of risk management practices and

  • Hacker Definitions in Information Systems Research
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-12-07
    DeJarvis Oliver; Adriane. B. Randolph

    ABSTRACT The IS research community has called for more research on hackers and their behavioral motivations. One of the reasons that research on hackers has been so limited is that there is no clear definition of what a hacker is, or who may or may not be considered a hacker. Researchers have attempted to define the term hacker, yet overall attempts to craft a definition have been inconsistent and

  • Traditional and New ICT Spending and Its Impact on Economy
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-12-07
    Nuša Erman; Katarina Rojko; Dušan Lesjak

    ABSTRACT This paper presents the research of the new technologies’ impact on information and communication technology (ICT) spending and economy. We found that new technologies drive demand for ICT on general, while individual ICT segments’ shares changed significantly due to development of the field and due to different stages of maturity process (diffusion) of individual ICT segments. New technologies

  • A Cyber-Security Culture Framework for Assessing Organization Readiness
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-11-23
    Anna Georgiadou; Spiros Mouzakitis; Kanaris Bounas; Dimitrios Askounis

    ABSTRACT This paper presents a cyber-security culture framework for assessing and evaluating the current security readiness of an organization’s workforce. Having conducted a thorough review of the most commonly used security frameworks, we identify core security human-related elements and classify them by constructing a domain agnostic security model. We then proceed by presenting in detail each component

  • Personality Types in Learning Enterprise Resource Planning (ERP) Systems
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-11-09
    Bih-Ru Lea; Dinesh Mirchandani; Mary Sumner; Katherine Yu

    ABSTRACT This research explores the influence of personality types on ERP system learning performance in a university setting. Four personality types (labeled Type 1 to 4) were identified using cluster analysis of 176 survey respondents’ Big Five personality traits, i.e., conscientiousness, neuroticism, extraversion, openness, and agreeableness. These four personality types were found to be significantly

  • The Dynamics Information Technology and Systematic Risk
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-11-09
    Matthew Wimble; Young K. Ro; Cheong Kyu Park

    ABSTRACT Systematic risk is the degree to which a firm is sensitive to changes in the overall economy. It is a core concept in finance theory, and is an important measure of firm performance. While much research has looked at the relationship between IT and direct risk measures such as earnings volatility, research is lacking on this core outcome. Additionally, we know from prior research that impacts

  • Employees’ Behavior in Phishing Attacks: What Individual, Organizational, and Technological Factors Matter?
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-10-29
    Hamidreza Shahbaznezhad; Farzan Kolini; Mona Rashidirad

    ABSTRACT Phishing, as a social engineering attack has become an increasing threat to organizations in cyberspace. To prevent this, a well-designed continuous security training and educational program needs to be established and enforced in organizations. Prior studies have focused on phishing attack from a limited view of technology countermeasure, e-mail’s characteristic, information processing, and

  • Responding to Information System Obsolescence: Should We Upgrade or Replace?
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-10-06
    Brent Furneaux; Sophia Mannina; Lars Rieser

    ABSTRACT As information systems (IS) age, managers must determine whether to continue upgrading these systems or replace them with systems that have greater potential to offer organizational value. Given the widespread use of information systems and the challenges that IS replacement can present, understanding the forces that encourage managers to continue to upgrade existing systems is of considerable

  • How Perceived Pressure Affects Users’ Social Media Fatigue Behavior: A Case on WeChat
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-10-05
    Yanfeng Zhang; Wu He; Lihui Peng

    ABSTRACT The paper describes a study that examines the factors affecting Chinese users’ online social media fatigue on WeChat from the perspective of perceived pressure. This study is based on the S-S-O (Stressor-Strain-Outcome) theoretical framework and uses the structural equation modeling to analyze the factors affecting Chinese users’ online social media fatigue on WeChat. The results show that

  • Supporting Mobile Innovation in the Middle: Hospital IT Manager Attitudes
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-10-02
    Dominic Thomas; Yurong Yao

    ABSTRACT This study investigates external factors influencing IT manager support for deploying mobile services innovations in hospitals. It develops and tests a research model representing the relevant elements of the Technology-Organization-Environment (T-O-E) framework in different innovation diffusion stages. Uniquely, this model hypothesizes how domain-relevant vendor interactions would relate

  • Media-Generating Activities and Follower Growth within Social Networks
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-10-02
    E. Mitchell Church; Xia Zhao; Lakshmi Iyer

    ABSTRACT Social network followers represent a valuable asset for any organization. Followers improve the diffusion of information, enhance customer engagement opportunities and allow for observation of competitor actions. Yet, despite their practical value, our understanding of how one gains followers online remains varied and fragmented. New functionality for the display and management of rich media

  • Factors Influencing Consumer Adoption of Electronic Health Records
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-09-30
    Neethu Mathai; Tanya McGill; Danny Toohey

    ABSTRACT Electronic health records (EHRs) are electronic versions of longitudinal individual health records that are easily accessible and can be shared among relevant stakeholders. Their use can contribute to improved health outcomes. This research aimed to identify the key factors influencing healthcare consumer adoption of EHRs by testing an EHR consumer adoption model that extends the Decomposed

  • How Repurchase Intention Is Affected in Social Commerce?: An Empirical Study
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-09-29
    Bo Shang; Zheshi Bao

    ABSTRACT Social commerce provides an innovative approach for business activities in e-commerce. The aim of this study is to explore the mechanism regarding repurchase intention in social commerce by developing a research model from perspectives of swift guanxi, alternative attraction, perceived value, and customer satisfaction. Customers who have social commerce experience were investigated through

  • Factors Influencing Consumers’ Participation in Social Commerce
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-09-18
    Robert Cutshall; Chuleeporn Changchit; Anh Pham

    Social networking websites are enjoying widespread usage throughout the world. Its applications are playing a significant role in marketing by allowing users to share information about products and services such as reviews, opinions, and even purchasing behavior with their network of friends and family. These social networks provide new opportunities to communicate with existing customers and attract

  • Digital OER Impact on Learning Outcomes for Social Inclusion
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-09-18
    Elizabeth White Baker; Christopher J. Sibona

    The Information Systems field has long been positioned globally as a particularly powerful instrument to promote social inclusion. While individual identity characteristics have been the primary research focus on social inclusion, our research study directly investigates an external environmental influence in social inclusion, course materials cost, and its impact on learning outcomes. General theories

  • Factors Affecting Coproduction Resentment within a Self-checkout Environment
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-09-16
    Vess L. Johnson; Angelina Kiser; Richard W. Woolridge

    Self-service technologies allow organizations to shift work from employees to the consumer, creating a coproduction environment where the consumer is an active participant in the delivery of a service, which they ultimately consume. While these technologies can have benefits for both consumers and the organizations, they can also present challenges (e.g., value erosion, feelings of coercion) that may

  • Consumer Engagement in Business Process Innovation–ICT Companies Cases from Poland and UK
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-09-11
    Ewa Ziemba; Monika Eisenbardt; Roisin Mullins; Sandra Dettmer

    The major premise of the study is a recognition that competitive companies increasingly engage consumers to create business innovation. This study aims to develop a framework for analyzing consumer engagement in business process innovation and apply this framework to ICT companies in Poland and the UK to analyze how they practice consumer engagement and what differences are exhibited between the two

  • Statistically Significant! But Is Trust of Practical Significance?
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-08-18
    Dapeng Liu; Heinz Roland Weistroffer

    Trust, such as trust in a technology or believing that a technology has trustworthy utility, manifests its importance by affecting user behaviors toward information systems (IS). There is no dearth of evidence showing that the effect of trust is statistically “significant;” however, statistical significance, different from practical significance is nothing but a failure to reject the Fisherian null

  • Effect of Competitors’ eWOM in the Mobile Game Market
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-08-13
    Hsun-Ming Lee; Peiqin Zhang; Mayur R. Mehta

    The competition among the products is common in the business environment. However, the impact of a product’s competitors in consumers’ electronic word-of-mouth (eWOM) communications has received little attention. Drawing from the theory of distinctive processing, this research examines how eWOM affects a product’s success in the competitive mobile game market. Based on a dataset obtained from searchman

  • Do We Trust in AI? Role of Anthropomorphism and Intelligence
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-08-10
    Indrit Troshani; Sally Rao Hill; Claire Sherman; Damien Arthur

    AI applications are radically transforming the manner in which service providers and consumers interact. We explore how the humanness of AI applications affects consumers’ trust in these applications. Qualitative evidence collected with focus groups provides fresh insights into the roles of anthropomorphism and intelligence, as key constructs representing humanness. Our findings reveal the consumers’

  • ICTs, Empowerment, and Success: Women’s Perceptions across Eight Countries
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-08-04
    Fatih Çetin; Tara Urich; Joanna Paliszkiewicz; Magdalena Mądra-Sawicka; Jeretta Horn Nord

    The purpose of this study was to explore and compare women’s perceptions of Information and Communication Technologies (ICTs), empowerment, and success among respondents in eight countries. The research sample consisted of 969 participants (137 from Georgia, 105 from Poland, 130 from Romania, 152 from Slovenia, 102 from Spain, 123 from Taiwan, 120 from Turkey, and 100 from the United States). Qualitative

  • Social Networking Sites and Researcher’s Success
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-08-04
    Grzegorz Mazurek; Anna Górska; Paweł Korzyński; Susana Silva

    Universities are evaluated more often basing on the citation scores of their employees, schools translate this pressure onto the scholars. The purpose of this paper is twofold: to identify whether how the use of social networking sites (SNS) may enhance the impact of the research and thus contribute to the academic success in terms of citations; and to gain a more comprehensive understanding of which

  • Empirical Study on Initial Trust of Wearable Devices Based on Product Characteristics
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-08-04
    Zhongwei Gu; June Wei

    Product characteristics of wearable devices have large impacts on users’ initial trust as users intend to adopt wearable devices, which further impacts wearable devices' use intention. This paper aims at investigating the impacts of wearable device product characteristics on consumers’ initial trust based on four factors: wearability, functionality, personalization, and integration. Through a questionnaire

  • Confucian Values, Social Fear, and Knowledge Sharing in Korean Organizations
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-08-04
    Jinyoung Han; Anat Hovav; Martin Hemmert

    The purpose of this study is to examine the effects of Confucian values, social fear and organizational knowledge sharing culture on the knowledge sharing intention of Information Systems (IS) professionals in an East Asian context. We surveyed 187 professionals working in IS in South Korean companies and applied partial least squares structural equation modeling for testing our hypotheses. The results

  • Online Reviews: What Drives Consumers to Use Them
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-07-02
    Chuleeporn Changchit; Tim Klaus; Ravi Lonkani

    With the rapid E-commerce growth and changes in consumers’ behaviors, many businesses are forced to adapt their business model to match their target customers’ needs. To provide consumers with more product details and increase their confidence in making online purchases, online businesses offer online reviews as an alternative to customers physically interacting with a product. Although consumers have

  • A Causal Map Analysis of Supply Chain Decentralization
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-07-02
    Fernando S. Oliveira

    We study the inclusion of loops in automated theory development based on causal logic. As an area of application, we formalize a model of learning, adaptation, and selection in supply chain management. Our methodological contribution is to analyze a causal network with propositional logic, explaining the difference between material and intentional causality and considering cumulative causality. In

  • Story Analysis Using Natural Language Processing and Interactive Dashboards
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-07-02
    Michel Mitri

    This paper discusses Story Analyzer, which uses a natural language processing (NLP) library and sophisticated data visualization libraries to produce dashboards of interrelated and user-responsive visualizations depicting actors and their interactions in a textual narrative, along with locations, times, and other contexts. Story Analyzer performs information extraction using Stanford’s CoreNLP’s NLP

  • Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-06-30
    Alex Koohang; Jeretta Horn Nord; Zoroayka V. Sandoval; Joanna Paliszkiewicz

    The purpose of this paper was to first examine the reliability, validity, and strength of a unified model for information security policy compliance that includes eight constructs explaining information security policy compliance. Second, seven hypotheses were developed and tested based on the constructs in the model. An instrument with eight constructs was used to reflect the traditional survey statements

  • Team Performance and Triangle Approach: A Longitudinal Study
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-06-25
    Hamid Reza Nikkhah; Franck Loic Soh Noume; Beverly Hodges; Rajiv Sabherwal

    The literature on information systems development appears to be fragmented into three main categories: one that uses a knowledge management perspective, another one that considers social aspects of information systems development, and the last one that emphasizes the role of information technology. Such fragmentation detains the understanding of influential factors. In this paper, we synthesize the

  • Perceived Control and Perceived Risk in Self-service Technology Recovery
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-06-08
    Nghi Thuc Le; Sally Rao Hill; Indrit Troshani

    The widespread use of self-service technology (SST) has changed the way customers experience service and how they deal with recovery from service failure. A growing number of service providers offer SST-based recovery, allowing customers to fix service failures using SSTs. Yet, gaining customer acceptance for this emerging form of service recovery presents challenges. There is a need to improve current

  • Understanding the Use of Knowledge Sharing Tools
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-06-08
    Angela Siew-Hoong Lee; Shan Wang; William Yeoh; Novita Ikasari

    This paper investigates the drivers of the use of knowledge-sharing tools through the lens of task–technology fit (TTF), the role of social factors, and the cognitive and affective mechanisms. Data were collected from 294 knowledge workers and analyzed using partial least squares. This study found that cognition (i.e., perceived usefulness) and positive affect play an important role in mediating the

  • Understanding Social Media Monitoring and Online Rumors
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-05-22
    Jong-Hyun Kim; Rajiv Sabherwal; Gee-Woo Bock; Han-Min Kim

    In order to investigate the impact of social media monitoring on a firm’s market understanding and performance, and how to manage online rumors, two complementary studies are conducted on visitors’ engagement and three aspects of engagement. The first study indicates that conversations and inbound traffic positively affect visitors’ engagement, which, along with referrals, influences social media monitoring’s

  • When Agile Means Staying: A Moderated Mediated Model
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-05-22
    Tenace Kwaku Setor; Damien Joseph

    The design of software development methods focuses on improving task processes, including accommodating changing user requirements and accelerating product delivery. However, there is limited research on how the use of different software development methods impacts IT professionals’ perceptions of organizational mobility. Drawing on concepts from the agile development literature and job characteristics

  • Repurchase Intention in Online Knowledge Service: The Brand Awareness Perspective
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-05-22
    Helen S. Du; Jiahong Xu; Heng Tang; Ruixin Jiang

    This study aims to investigate the influencing factors of consumers’ repurchase intention in the context of online knowledge service. Drawing on information systems (IS) success model, social identity theory, and expectation-confirmation theory, we examine the roles of IS success factors, satisfaction, switching barrier, and brand awareness in influencing repurchase intention in the online knowledge

  • How Social Media Analytics Can Inform Content Strategies
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-04-20
    Nima Kordzadeh; Diana K. Young

    Social media has become a strategic tool for businesses and nonprofit organizations to connect with audiences. However, no comprehensive framework exists to support the continued improvement of social media outcomes. This work draws on prior studies related to social media analytics and user engagement to develop an overarching, analytics-driven process for social content strategy development and improvement

  • Users’ Knowledge Sharing on Social Networking Sites
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-04-14
    Xiaolin Lin; Xun Xu; Xuequn Wang

    As social networking sites (SNSs) have become quite popular, organizations have used SNSs to support their various business processes. A growing trend is that organizations increasingly encourage consumers to contribute knowledge via SNSs. The contributed knowledge can help organizations to improve their products/services and therefore these contributions have great business value. As consumers are

  • Trust Decision-Making in Online Social Communities: A Network-Based Model
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-04-09
    Gelareh Towhidi; Atish P. Sinha; Mark Srite; Huimin Zhao

    The unique characteristics of online social communities call for a reexamination and adaptation of established behavioral theories of trust decision-making. Guided by relevant social science and computational graph theories, we propose a conceptual model of trust decision-making in online social networks. This is the first study that integrates the existing graph-based view of trust decision-making

  • Obstacles of On-Premise Enterprise Resource Planning Systems and Solution Directions
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-04-09
    Senem Sancar Gozukara; Bedir Tekinerdogan; Cagatay Catal

    The article presents the results of a Systematic Literature Review (SLR) that has been carried out to identify and present the state-of-the-art of ERP systems, describe the obstacles of on-premise ERP systems, and provide general solutions to tackle these challenges. Based on this SLR, 22 obstacles are identified, the dependencies and interactions among these obstacles are described, and finally the

  • Cyber Security Awareness, Knowledge and Behavior: A Comparative Study
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-14
    Moti Zwilling; Galit Klien; Dušan Lesjak; Łukasz Wiechetek; Fatih Cetin; Hamdullah Nejat Basim

    Cyber-attacks represent a potential threat to information security. As rates of data usage and internet consumption continue to increase, cyber awareness turned to be increasingly urgent. This study focuses on the relationships between cyber security awareness, knowledge and behavior with protection tools among individuals in general and across four countries: Israel, Slovenia, Poland and Turkey in

  • BYOD Policy Compliance: Risks and Strategies in Organizations
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-14
    Rathika Palanisamy; Azah Anir Norman; Miss Laiha Mat Kiah

    The proliferation of mobile devices has brought the Bring Your Own Device (BYOD) trend in organizations, along with significant challenges when employees fail to comply with security policies. Previous reviews in this research area had focused solely on the technical issues surrounding BYOD implementation while leaving out the human behavior in complying with security policies which is a major contributing

  • Optimistic Bias and Exposure Affect Security Incidents on Home Computer
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-14
    Barbara Hewitt; Garry L. White

    Individuals who are optimistically biased believe that they are less likely to experience an adverse event or more likely to experience a positive event than their peers. This paper examines whether individuals feel less likely to experience a breach on their home computers (cyber optimistic bias), have more computer and security education, apply protective more measures, and experience more security

  • A Pedagogy to Develop Effective Virtual Teams
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-13
    Raymond Angelo; Richard McCarthy

    While virtual teams dominate business environments, little attention has been paid to how team leadership, in particular shared leadership, can be reinforced in classrooms. There is a consensus that shared leadership impacts the performance of virtual groups in a positive manner. While higher education in business is aiming to prepare graduates for virtual team leadership and effectiveness, pedagogical

  • Gender, Performance, and Self-Efficacy: A Quasi-Experimental Field Study
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-13
    Matthew J. Liberatore; William P. Wagner

    With chronic labor shortages in STEM-related industries, much research has focused on how to get more women and minorities interested in STEM careers. The most recent studies seem to indicate that the actual gap in user performance between genders has narrowed, although women tend to have less self-efficacy. However, all these previous studies involved student subjects in an educational context. This

  • Perceptions of Cybersecurity Readiness among Workgroup IT Managers
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-13
    Thomas A. Chapman; Brian J. Reithel

    Any modern cybersecurity strategy relies upon IT managers who are experts in their field, who are willing to employ best practices, and who educate their users. Large corporations have developed an intrinsic understanding of these factors. However, large corporations are comprised of departmental units that are not always considered in the organization’s cybersecurity profile. This is particularly

  • Personality and Demographic Characteristics Influence on Consumers’ Social Commerce Preference
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-13
    Chuleeporn Changchit; Robert Cutshall; Anh Pham

    With the rapid growth in the number of people using social networking sites, businesses are attempting to engage their customers by establishing social commerce websites, which provide customers with a new shopping experience. This new commerce channel allows customers to share their experience and attain information from other customers. Nevertheless, not all consumers are ready to engage in this

  • Use Public Wi-Fi? Fear Arouse and Avoidance Behavior
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-02-13
    Chung-Yean Chiang; Xiao Tang

    This study aims to study the internet security compliance behavior in a public Wi-Fi usage condition. We developed our research framework and hypotheses with the consideration of the protection motivation theory. Assembling questions from existing literature, we collected opinions from a group of college students who know and use public Wi-Fi. Using structural equation modeling, we examined the role

  • Big Data Analytics in Cyber Security: Network Traffic and Attacks
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2020-01-08
    Lidong Wang; Randy Jones

    Network attacks, intrusion detection, and intrusion prevention are important topics in cyber security. Network flows and system events generate big data, which often leads to challenges in intrusion detection with high efficiency and good accuracy. This paper focuses on the ‘Volume’, ‘Veracity’, and ‘Variety’ of big data characteristics in network traffic and attacks. Datasets with various data types

  • Towards a User Experience Framework for Business Intelligence
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-12-18
    Marcus Eriksson; Bruce Ferwerda

    ABSTRACT Business intelligence (BI) systems are software applications that are used to gather and process data and to deliver the processed data in understandable way to the end users. With a younger generation of users moving into key positions in organizations and enterprises higher user experience (UX) demands are placed on BI systems interfaces. Companies developing BI systems lack standardized

  • The Influence of Social Power on Knowledge Utilization
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-12-12
    Ji-Myoun Lee; Gee-Woo Bock; Ayoung Suh

    Although many studies have reported that social power is a critical factor in facilitating or constraining social interactions among individuals, few studies have fully explored how social power influences an individual’s knowledge utilization within a work group. Social power in the workplace helps individuals recognize others’ knowledge and utilize it in a business context. By integrating the theory

  • The Role of Attitude toward Challenge in Serious Game Design
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-12-09
    Philip Tin Yun Lee; Michael Chau; Richard Wing Cheung Lui

    This paper proposes that challenge, an orthogonal game attribute, can be used to improve game effectiveness. The results of our study suggest that attitude toward challenge should be considered when we tune challenge in the serious game for better learning results. A significant moderating role of attitude toward challenge is found in the relationship between challenge and self-efficacy. Investigating

  • Towards a Cashless Society: The Imminent Role of Wearable Technology
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-12-09
    Xiu-Ming Loh; Voon-Hsien Lee; Garry Wei-Han Tan; Jun-Jie Hew; Keng-Boon Ooi

    Wearable payment, which is the use of wearable technology to make payment, is anticipated to be the future of proximity mobile payment. However, the acceptance and use of wearable payment in Malaysia leave much to be desired. Additionally, this area of research is currently under-addressed. Thus, this study looks into the elements that influence the intention to adopt wearable payment in Malaysia.

  • IT Ethics Perceptions and Behavior: An International Comparison
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-12-09
    Milos Ulman; C. G. Marreiros; R. Quaresma; A. L. Harris

    The paper discusses differences in IT ethics perceptions and behavior of college students. The study is one of the few that examine multicultural differences in IT ethics on a convenience sample of 1,648 individuals from seven countries in three continents. We adopted an Ethics Decision-Making Model with Cultural Impacts and applied it on the examination of relations between IT ethics perceptions,

  • Data-driven Begins with DATA; Potential of Data Assets
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-11-25
    Hannu Hannila; Risto Silvola; Janne Harkonen; Harri Haapasalo

    The objective of this study is to analyze the potential of company data assets for data-driven, fact-based decision-making in product portfolio management (PPM). Data assets are categorized from the PPM standpoint, including (product/customer/ …) master data, transactional data, and interaction data (e.g., IoT data). The study combines literature review and qualitative analysis of eight international

  • Motivating Information Security Policy Compliance: Insights from Perceived Organizational Formalization
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-11-21
    Yuxiang Hong; Steven Furnell

    Psychological and behavioral characteristics are among the most important factors that instigate information security incidents. Although many previous studies have discussed the influencing factors of information security policy compliance behavior in an organization, few have considered the influence of organizational structures. In this study, the mechanism by which information security policy compliance

  • Methods of Metabolite Identification Using MS/MS Data
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-11-07
    Myungjae Kwak; Kyungwoo Kang; Yingfeng Wang

    Researchers in bioinformatics and medical science fields have been developing various innovative information systems and software tools using emerging technologies. Metabolite profiling is one of the fields in which bioinformatics researchers are intensely developing various innovative methods and software tools. Metabolites are the intermediate and end products of metabolism, which is the set of life-sustaining

  • Mobile Social Cyberbullying: Why are Keyboard Warriors Raging?
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-11-07
    Keng-Boon Ooi; Voon-Hsien Lee; Jun-Jie Hew; Binshan Lin

    Cyberbullying on social media has become a serious matter and is the most rampant form of bullying among students nowadays. Accordingly, this study examines mobile social cyberbullying perpetration, a new form of cyberbullying perpetration that is conducted over mobile social media, through the theoretical lenses of Barlett and Gentile Cyberbullying Model (BGCM) and Mobile Technology Acceptance Model

  • A Review of IS Strategy Literature: Current Trends and Future Opportunities
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-11-06
    Jason A. Williams; Henry G. Torres; Traci Carte

    In this paper, we examine the IS strategy literature since 2008. Using Chen, Mocker, Preston, and Teubner’s (2010) review as a starting point, we identified 31 IS strategy studies published since 2008. Further, we evaluated previous frameworks for evaluating IS strategy research. Using the conceptions proposed by Chen, et al. (2010), IS Strategy as competitive advantage (I), IS functional strategy

  • Virtual Brand Community Experience, Identification, and Electronic Word-of-mouth
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-10-09
    Lin Qiao; Mengmeng Song; Nan (Tina) Wang

    Despite recognizing the importance of virtual brand community (VBC) and the existence of different types of electronic word-of-mouth (eWOM) behaviors (e.g., opinion giving, opinion passing and opinion seeking), the existing literature remains inadequate regarding the influences of VBC experiences and identification on eWOM. This study, incorporating stimulus–organism–response theory and related research

  • Antecedents of Technology Selection for Project Use
    J. Comput. Inform. Syst. (IF 1.582) Pub Date : 2019-09-16
    Michael J. Cuellar; Manoucheher Tabatabaei; Thomas Case

    The adoption and use of technology have been an important topic of research in Information Systems. However, projects create a different environment for technology adoption in that they are temporary organizations which are formed specifically for the project and then disbanded as opposed to the continuing organizations which have been traditionally studied. We term this adoption and use in temporary

Contents have been reproduced by permission of the publishers.
Springer 纳米技术权威期刊征稿
ACS ES&T Engineering
ACS ES&T Water