Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Information Systems (3)
- Internet (2)
- Core competencies (1)
- Corporations (1)
- Decision making (1)
-
- E-Commerce (1)
- Electronic commerce (1)
- Fair Information Practices (1)
- Information privacy (1)
- Information technology (1)
- Online Privacy (1)
- Online environments (1)
- Organizational impacts (1)
- Outsourcing (1)
- Performance management (1)
- Personal information (1)
- Privacy policies (1)
- Resource Dependency Theory (1)
- Social issues (1)
- Studies (1)
- Web surveys (1)
- File Type
Articles 1 - 9 of 9
Full-Text Articles in Management Information Systems
Information Privacy: Understanding How Firms Behave Online, Gerald Kane, Kathy Schwaig, Veda Storey
Information Privacy: Understanding How Firms Behave Online, Gerald Kane, Kathy Schwaig, Veda Storey
Kathy S Schwaig
The acquisition and use of personal information by large corporations continues to be a leading issue in the age of virtual communication and collaboration. This research reviews and analyzes the privacy policies of large US companies to evaluate the substance and quality of their stated information practices. Six factors are identified that indicate the extent to which a firm is dependent upon consumer personal information, and therefore, more likely to develop high quality privacy statements. The study’s findings provide practical and theoretical implications for information privacy issues, particularly for consumers who need to decide whether to disclose their personal identifying …
The Quality Of Online Privacy Policies: A Resource-Dependency Perspective, Veda Storey, Gerald Kane, Kathy Schwaig
The Quality Of Online Privacy Policies: A Resource-Dependency Perspective, Veda Storey, Gerald Kane, Kathy Schwaig
Kathy S Schwaig
Privacy concerns and practices, especially those dealing with the acquisition and use of consumer personal information by corporations, are at the fore front of business and social issues associated with the information age. This research examines the privacy policies of large US companies to assess the substance and quality of their stated information practices. Six factors are identified that indicate the extent to which a firm is dependent upon consumer personal information, and therefore more likely to develop high quality privacy statements. The study findings provide practical and theoretical implications for information privacy issues, particularly for consumers who need to …
Strategic Dependence On The It Resource And Outsourcing: A Test Of The Strategic Control Model, Detmar Straub, Peter Weill, Kathy Schwaig
Strategic Dependence On The It Resource And Outsourcing: A Test Of The Strategic Control Model, Detmar Straub, Peter Weill, Kathy Schwaig
Kathy S Schwaig
Using resource dependency theory (RDT), this research analyzes how organizations control their information technology resources to improve organizational performance. According to RDT, organizations must manage their dependency on external organizations and limit external dependencies when resources are considered critical. The current study proposes and tests a portion of a Strategic Control Model positing that managers seek to control important, strategic resources in order to create value for the firm and to avoid dependency on external entities. Utilizing a research design that captured extensive quantitative data on the control of IT functions and services, the research team gathered 5 years of …
Privacy, Fair Information Practices And The Fortune 500: The Virtual Reality Of Compliance, Kathy Schwaig, Gerald Kane, Veda Storey
Privacy, Fair Information Practices And The Fortune 500: The Virtual Reality Of Compliance, Kathy Schwaig, Gerald Kane, Veda Storey
Kathy S Schwaig
Corporate information privacy policies are receiving increased attention in the information privacy debate. Prior studies used Web surveys to analyze the content of online information privacy policies and to assess whether or not the policies comply with a standard known as the Fair Information Practices. One assumption of these studies is that the main role of a privacy policy is to protect the consumer by communicating a firm's information practices. This paper employs Habermas's Theory of Communicative Action to uncover the much more complex and multifaceted roles that privacy policies actually play in a social context. Overall, the study's findings …
A Model Of Consumers' Perceptions Of The Invasion Of Information Privacy, Kathy Schwaig, A. Segars, V. Grover, K. Fiedler
A Model Of Consumers' Perceptions Of The Invasion Of Information Privacy, Kathy Schwaig, A. Segars, V. Grover, K. Fiedler
Kathy S Schwaig
No abstract provided.
Project Management Issues In It Offshore Outsourcing, Kathy Schwaig, E. Leeds, S. Gilliam
Project Management Issues In It Offshore Outsourcing, Kathy Schwaig, E. Leeds, S. Gilliam
Kathy S Schwaig
No abstract provided.
An Empirical Examination Of The Concern For Information Privacy Instrument, Kathy Schwaig, A. Segars
An Empirical Examination Of The Concern For Information Privacy Instrument, Kathy Schwaig, A. Segars
Kathy S Schwaig
No abstract provided.
A Conceptual Investigation Of The E-Commerce Industry, V. Storey, D. Straub, Kathy Schwaig, R. Welke
A Conceptual Investigation Of The E-Commerce Industry, V. Storey, D. Straub, Kathy Schwaig, R. Welke
Kathy S Schwaig
No abstract provided.
Plugging The Knowledge Drain: Strategies And Technologies For Acquiring Knowledge In Lean Organizations, Kathy Schwaig, V.C. Storey, D. Robey
Plugging The Knowledge Drain: Strategies And Technologies For Acquiring Knowledge In Lean Organizations, Kathy Schwaig, V.C. Storey, D. Robey
Kathy S Schwaig
No abstract provided.