首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Enterprise social media (ESM) has blurred employees’ work–life distinction; however, limited research has investigated the impact of social-related ESM use during work time and the management measures. We propose such use consumes employees’ work resources. Our survey of a research and development company in China confirms that such use decreases individuals’ collaboration and increases information overload, harming work performance. To mitigate the negative influence, we focus on ESM functionalities, conceptualize the action possibilities permitted by functionalities as attention regulation affordance, and investigate the moderating role of the affordance actualization. The results revealed that affordance actualization reduces negative ESM use effects.  相似文献   

2.
We are living in an era where data lead to opportunities, especially customer data. According to privacy laws, however, without customers’ authorisation, organisations face many limitations in using identifiable information for secondary purposes. Consequently, organisations are missing out on many potential business opportunities to capitalise on customer data. Privacy concerns have become the biggest roadblock to gain customer consent because of the potential risks associated with the use of personal information. This situation underscores the importance of devising effective information practices and strategies in dealing with the use of customer data. Privacy literature suggests that information practices may influence individuals’ intentions to participate in situations requiring the collection and use of personal data. Yet, existing research has not systematically analysed the role of these strategies in influencing intention. Also, previous studies focus primarily on the disclosure of personal data. Issues surrounding ‘authorisation of personal data for secondary use’ remain unexplored. The purpose of our study is to examine the role of information practices on intention to authorise secondary use of personal data. The results show that privacy concerns and trusting beliefs significantly affect individual perceptions of information practices. Perception of information practices in turn exerts significant effect on intention to authorise secondary use of personal data. Both theoretical and managerial implications of the results are discussed.  相似文献   

3.
Cognition, Technology & Work - Despite the rapid rise in social engineering attacks, not all employees are as compliant with information security policies (ISPs) to the extent that...  相似文献   

4.
This study examined relationships among daily stress (i.e., school- and family-related stress), social support seeking through Facebook, perceived social support through Facebook, and depressed mood among adolescents (N = 910). Structural equation modeling showed that daily stress positively predicted adolescents’ seeking of social support through Facebook. In addition, when social support was sought on Facebook and subsequently perceived, social support seeking through Facebook decreased adolescents’ depressed mood. However, when social support was sought on Facebook, but not perceived, social support seeking through Facebook increased adolescents’ depressed mood. When comparing these relationships with similar relationships in a traditional social support context, results showed that the exacerbating impact of social support seeking on depressed mood exclusively transpires in a social networking site context. The discussion focuses on the understanding and explanation of these findings, and directions for future research.  相似文献   

5.
This study focuses on examining client citizenship behaviors (CCBs) from a psychological contract perspective in enterprise systems (ES) vendor–client relationships. Using polynomial modeling to capture the discrepancy between expected obligations and delivered fulfillments, this stud unpacks psychological contract and investigates the impacts of psychological contract under-fulfillment, fulfillment, and over-fulfillment on CCBs. The results show that both under-fulfillment and over-fulfillment of psychological contract are negatively related to CCBs. CCBs are shown to be higher when expected obligation and delivered fulfillment are both high than when both are low. The theoretical contributions and practical implications are discussed.  相似文献   

6.
Much computer science literature addresses the mechanics of the Unified Modelling Language (UML) and requirements modelling, but little research has addressed the role of UML in the broader organizational and project development context. This study uses a socio-technical approach to consider UML as a technology embedded in a social environment. In this study, project developers were interviewed in detail about their use of UML along with influences on their decisions to use this approach and the results of using it. Data were analyzed using causal mapping. Major findings included: (1) that definitions of success may differ by unit of analysis (e.g., developer, project, organization) and that the relationship among these definitions are complex; (2) a very large number of variables impacting project success were identified; (3) a number of important variables exist in complex (non-linear) relationships with project success; and (4) the majority of interviewees linked the use of UML to project success.  相似文献   

7.
We examined the positive impact of transformational leadership on IS success in organizations via two psychological mechanisms of system users’—perceived organizational support and systems self-efficacy. Our conceptual model was assessed using a sample of 251 employees from a multi-national bank in Korea. Overall, our results supported the hypothesized relationships: transformational leadership was positively related to system users’ IS success, and both perceived organizational support and systems self-efficacy of the system users mediated the relationship between transformational leadership and IS success. The results call for manager's attention to the importance of transformational leadership development in organizations.  相似文献   

8.
This study aims to understand how individuals’ perceptions of the severity of cyberbullying they endure affects their experience with the Information and Communication Technology (ICT) medium through which cyberbullying occurs. To this end, it proposes a theoretical model based on Transactional Theory of Stress and Coping and Expectation-Confirmation Theory. A survey-based study involving 115 cyberbullying victims is employed to empirically validate the proposed model. Results indicate that victims’ perceptions of the severity of a cyberbullying episode negatively impact their satisfaction with ICT. Implications of these results for academics and practitioners are discussed and directions for future research are outlined.  相似文献   

9.
10.
In this paper we examine consumer attitudes towards a payment method, which is a key factor affecting the probability of completing a transaction offline and online. More specifically, we constructed a model that surveyed the offline and online usage of prepaid e-cash, debit cards, credit cards and cash. User perceptions of the attractiveness of e-cash and various traditional payment means were also empirically assessed. Consumer attitudes towards a payment technology were found to be influential on users’ perceptions in both online and offline environments. User perceptions of offline purchases with a payment technology had significant and positive effects on the corresponding online usage perceptions. The effects of our research model are contingent on the income level of users. Our findings have significant implications, as they could help shed light on why consumers abandon their shopping carts and do not complete their transactions, which could potentially play a significant role when it comes to designing applications targeting sspecific consumer segments.  相似文献   

11.
Previous studies in information systems research and service marketing treat customer behaviour towards technology-based services (TBS) homogeneously. However, recent studies recognize that users have different attitude towards different technologies even if these technologies used to support the same service. Drawing on literature from service marketing (i.e. customer contact theory), information systems (unified theory of technology acceptance), and organizational behaviour (task complexity theory), this study proposes a construct that classifies TBS according to the level of customer–technology interaction they require, namely the customer–technology contact (CTC). The moderating effect of this construct on the relationship between individual characteristics – that is technology readiness and attitude towards TBS – is examined through an empirical study. Technology-based retail services scenarios, with different levels of technology contact, are presented to supermarket shoppers (n=600). Results show that CTC, as a unique service attribute, moderates the effect of personality traits to customers’ attitude. The current study introduces this new service attribute that is applicable to ubiquitous computing services, application and design.  相似文献   

12.
13.
This paper describes an innovative teaching project that was developed and implemented to help MIS students improve their systems development “soft skills” in areas such as teamwork, group development, and project management. The project focused on improving students’ understanding of Systems Analysis and Design (SA&D) concepts by training and assigning students in an advanced SA&D course as formal team leaders and project managers for student groups in the introductory SA&D course. Students used CASE and Project Management tools to understand and apply course concepts. Faculty and students used e-mail facilities and interactive World Wide Web pages to facilitate both personal and broadcast communication among the multiple participants. This approach was used in two different semesters, with insights from the first implementation serving as the basis for improvements in the classroom activities the second time. Results suggest the pedagogical approach has significant conceptual value, but major logistical and operational problems must be overcome for successful implementation. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   

14.
As office workers’ use of social networking sites (SNSs) has increased, so has research interest in the effect of SNS use on job performance. The present study employs data collected from South Korean office workers to examine how the use of the SNS Facebook affects job performance and to investigate the moderating effects of task characteristics (task equivocality and task interdependence). The results show that Facebook use for work has a positive effect on job performance, although the time spent on Facebook use does not have a significant effect on job performance. Moreover, task interdependence is associated with a decrease in the effect of Facebook use for work on job performance. In other words, task interdependence has a negative moderating effect on the impact of Facebook use for work on job performance. The reason is that Facebook is particularly advantageous for enhancing performance in tasks where the level of interdependence is low because it is a medium with relatively low synchrony and is unsuitable for one-to-one relationship building. This study has implications for companies that are concerned about formulating policies related to employees’ use of SNSs.  相似文献   

15.
Research indicates that social isolation and loneliness have a negative effect on health and wellbeing among older people. Various technology-based interventions have been offered to reduce social isolation; however, research demonstrating the role of various types of technologies and their effectiveness in dealing with social isolation among seniors is scarce. This study undertakes a systematic literature review of empirical studies on various types of technologies and their effectiveness in alleviating social isolation among seniors. Relevant electronic databases were searched and through 6886 initial set of studies published from 2000 to 2015 we have found eight different technologies that have been applied to alleviate social isolation, namely, general ICT, video game, robotics, personal reminder information and social management system, asynchronous peer support chat room, social network sites, Telecare and 3D virtual environment. We further evaluated the effectiveness of the technologies with social isolation among seniors. Findings show that technologies can be used to reduce social isolation among seniors. However, more studies are needed to evaluate the effectiveness of new technologies.  相似文献   

16.
This study proposes and validates a new industry taxonomy to understand the use of IT that generates superior economic returns based on the specific economic and competitive characteristics of four different industry types and the strategic role of IT in each of these industry environments. Our findings extend the well-established industry taxonomy on the strategic role of IT (Automate, Informate, Transform) by considering how IT is changing the nature of the product/service in industries where transformational logics prevail. We found that in industries where the product/service is digital in nature, the firms that achieve higher economic returns are those where IT is used to support dual strategies based on the integration of cost leadership and differentiation. Conversely, in other industries – with the exception of those producing commodities – the firms that achieve superior returns are those that use IT to support differentiation. The results of this study can help managers make intelligent decisions about competitive strategies and IT investments, depending on the business environment of the sector in which the firm operates and the generative potential of emerging technologies to do new things.  相似文献   

17.
Journal hijacking, which refers to the attempted brand takeover of a journal by a third party, is a nascent threat confronting the information systems (IS) community, as evidenced by cybercriminals having established an online presence, masquerading as the Scandinavian Journal of Information Systems (SJIS). The SJIS hijacking damages the journal's reputation, leads to payment and publication scams, involves identity theft among unsuspecting IS researchers, and results in tarnished author reputations. Beyond SJIS, journal hijacking presents a threat, not only to the IS community, but also to science and academic integrity in general if researchers and readers cannot distinguish between fake publications by hijacked journals and real publications by legitimate journals. In this opinion article, we relate the story of the SJIS hijacking from the victims' perspectives. We describe its many aspects, draw attention to the key factors that contribute to the problem, and offer our perspectives on different response strategies in the absence of simple solutions. We hope to create awareness about the problem and stimulate a discussion in the IS community, not least in the face of digital innovations, such as ChatGPT and other artificial intelligence technologies that may inadvertently support paper mills and the production of fake research results.  相似文献   

18.
Previous studies in an e-commerce context suggest that there are biological differences (i.e. whether one is a man or a woman) with respect to perceptions of websites. In other research, there is evidence that psychological gender (i.e. values such as masculinity or femininity) likewise influences website perceptions. It is the aim of the current investigation to explore the possibility that both biological sex and psychological gender influence user perceptions, and to examine the predictive power of each on our model. To test these assumptions, we use an augmented technology acceptance model (TAM). To maximise variance in our sample, participants are selected from two countries that are significantly different in masculinity–femininity. As expected, psychological gender better predicted trust and TAM than biological sex. Moreover, this study validates that the masculinity–femininity dimension as originally developed by Hofstede [1980. Culture’s Consequences: International Differences in Work-Related Values. Beverly Hills, CA: Sage] can be separated into two scales – one each for masculinity and femininity. The results suggest the need for additional research into the differentiation between psychological gender and sex.  相似文献   

19.
Despite growing public health concerns data on excessive Internet use (EIU) allowing for comparison between countries and over time are scarce. Our study is the first attempt to evaluate the changes and the impact of mobile access on EIU in Europe. It is based on data from 2 surveys of adolescents implemented in 2010 and 2013 in 7 European countries that used identical methodology; a total of 7663 adolescents were recruited by random stratified sampling. The levels of EIU were compared and a regression model was used to assess the impact of smart devices, the number of activities performed online, and the specific online applications. A small but significant increase of EIU levels was observed in Belgium, Denmark, Romania, the UK, and overall. Although smartphone use is a positive predictor of EIU, it is moderated by the increasing number of activities performed online. The increase in levels of EIU is also associated with the daily use of online games and social networking sites.  相似文献   

20.
Firms have at their disposal an increasing amount of personal information about consumers gathered through various means. Studies find that personalizing online interactions improves customer relationships and increases desirable behaviors, such as positive word-of-mouth and increased purchase intent. However, other research suggests that the use of personal information stimulates privacy concern, which has a negative effect on behavior. This study examines potential moderators of the negative effects of privacy concern on behavioral intentions in the context of personalized online interactions. Results show that increasing perceived information control reduces the negative effect of privacy concern on intentions to engage in positive behaviors. In contrast, the offer of compensation has no effect on the relationship between privacy concern and these behavioral intentions. However, compensation increases the salience of trust to privacy concern.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号