Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Business

Can Information Systems Foster Emotional Intelligence? A Design Theory-Based Approach, Richard J. Burkhard, Thomas A. Horan, Brian N. Hilton, Michael Leih Jan 2009

Can Information Systems Foster Emotional Intelligence? A Design Theory-Based Approach, Richard J. Burkhard, Thomas A. Horan, Brian N. Hilton, Michael Leih

Journal of International Technology and Information Management

Researchers in Information Systems (IS) have conducted extensive research into various kinds of collaboration systems over the last twenty-five years. A parallel stream of inquiry in psychology and management has developed research in organizational Emotional Intelligence, which contributes to the effectiveness of group interactions by increasing cooperation and reducing conflict. Collaboration systems present a special opportunity to introduce soft management functions such as Emotional Intelligence because they are designed as an intelligent channel of interaction between group members. This research used an Information Systems Design Theory approach to guide the integration of Emotional Intelligence functions into collaboration systems. Two artifact …


Using Computer Resources For Personal Activities At Work: Employee Perceptions Of Acceptable Behavior, Troy J. Strader, Lou Ann Simpson, Suzanne R. Clayton Jan 2009

Using Computer Resources For Personal Activities At Work: Employee Perceptions Of Acceptable Behavior, Troy J. Strader, Lou Ann Simpson, Suzanne R. Clayton

Journal of International Technology and Information Management

Employees use computer resources at work for personal activities and the implementation of countermeasures has not reduced this behavior. In this study we investigate the extent to which an employee’s ethical orientation and supervisory role have an impact on their perceptions regarding these behaviors. We find that employees assess acceptability using a utilitarian orientation. The more money and time involved in an activity, the more employees perceive them to be unacceptable. We also find that supervisors view these activities as less acceptable than do non-supervisor employees. Demographics have little to do with explaining perceptions. Research and managerial implications are discussed.


Validating An End-User Computing Satisfaction Instrument: A Confirmatory Factor Analysis Approach Using International Data, Kee-Sook Lim, Jeen-Su Lim, John H. Heinrichs Jan 2008

Validating An End-User Computing Satisfaction Instrument: A Confirmatory Factor Analysis Approach Using International Data, Kee-Sook Lim, Jeen-Su Lim, John H. Heinrichs

Journal of International Technology and Information Management

This study evaluates the construct validity of an end-user computing satisfaction scale in the context of the Korean culture. The structure and dimensionality, reliability and validity of an end-user computing satisfaction (EUCS) instrument were cross-validated using data obtained from 108 managers of Korean firms in the context of the end-user satisfaction with their office information system. The results of this study are generally consistent with previous findings regarding the measurement property of this instrument. However, Korean data also supports the five correlated first-order factors model. Managerial and research implications of the identified results are discussed.


Expanding Group Support System Capabilities From The Knowledge Management Perspective, Shin-Yuan Hung, King-Zoo Tang, Tsan-Chuan Shu Jan 2008

Expanding Group Support System Capabilities From The Knowledge Management Perspective, Shin-Yuan Hung, King-Zoo Tang, Tsan-Chuan Shu

Journal of International Technology and Information Management

A group support system (GSS) is a computer-based system that enables people in different places to discuss and make decisions on connected computers. Expanding GSS capabilities from the knowledge management perspective is believed to significantly improve the performance and satisfaction of group meetings. This study develops the organizational knowledge management process, proposed by Alavi and Leidner (2001), to expand the capabilities of a GSS. Additionally, a prototype system has been implemented. Finally, an experiment is conducted to evaluate the system and demonstrate its applicability and usability. Experimental results indicate that users perceive a web-based GSS with knowledge management capabilities to …


Seniors And Information Technology: Are We Shrinking The Digital Divide?, Mark E. Mcmurtrey, Ronald E. Mcgaughey, James R. Downey Jan 2008

Seniors And Information Technology: Are We Shrinking The Digital Divide?, Mark E. Mcmurtrey, Ronald E. Mcgaughey, James R. Downey

Journal of International Technology and Information Management

The “digital divide” has been present in the field of information technology (IT) since the inception of the digital computer. Throughout the course of history, one group (or more) has had better access to computer and information technology than another faction. For example: rich versus poor, young versus old, advanced societies versus less developed countries, etc. This disparity has existed for a variety of reasons, among them political, cultural, economic and even class or socioeconomic in nature. This paper examines one particular component of this phenomenon, the “gray divide” pertaining to the use of IT by our elderly, or senior …


Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan Jan 2007

Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan

Journal of International Technology and Information Management

This paper asked professionals in the legal system to evaluate the current state and effectiveness of laws to identify and deter computer crime. Responses were evaluated with a formal structural equation model. The results generally show that legal professionals believe potential jurors have minimal knowledge of computer crime issues. More importantly, they also believe that judges have little knowledge or experience. A similar lack of knowledge by defense attorneys indicates that it could be difficult for a person accused of computer related infractions to find adequate representation. On the other hand, more experienced participants do not believe computer laws present …


Differing Cultural Perceptions Regarding The Appropriate Use Of Workplace Computer Technologies, Heidi Perreault, Nancy Keith Jan 2006

Differing Cultural Perceptions Regarding The Appropriate Use Of Workplace Computer Technologies, Heidi Perreault, Nancy Keith

Journal of International Technology and Information Management

This study examined differences in perceptions of U.S. and international college students regarding appropriate use of computers. Ten common inappropriate computer-use behaviors were presented to students. Only two of the ten behaviors were identified by the students as being unacceptable. When compared by geographic region, the U.S. students rated four of the actions as being less acceptable than did the international students. Work experience had minimal influence on the students’ perceptions. The results indicate that regardless of nationality or previous work experience, students lack understanding of the appropriate use of workplace computer technologies. The results reinforce the need for corporations …


The Effects Of Personal Innovativeness , Perceived Risk , And Computer Self -Efficacy On Online Purchasing Intent, Randall J. Boyle, Cynthia P. Ruppel Jan 2006

The Effects Of Personal Innovativeness , Perceived Risk , And Computer Self -Efficacy On Online Purchasing Intent, Randall J. Boyle, Cynthia P. Ruppel

Journal of International Technology and Information Management

The rapid growth of e-commerce makes it important for the success of companies to understand both the factors that facilitate and are barriers to these transactions. Therefore, the purpose of this study is to investigate the relationships between perceived Internet risk, personal innovativeness and computer/web self-efficacy, and online purchases intentions as three of these factors. Results indicate that perceived Internet risk, personal innovativeness and computer/web self-efficacy are all strongly related to online purchasing intentions. There is also a strong relationship between computer self- efficacy and personal innovativeness, two of the values-compatibility variables related to intention to purchase on-line. Suggestions for …


Access To Computer Technologies At Home Improves Wages In The Marketplace, Pankaj Kumar Maskara, Rajesh Aggarwal, Rajesh Maskara Jan 2006

Access To Computer Technologies At Home Improves Wages In The Marketplace, Pankaj Kumar Maskara, Rajesh Aggarwal, Rajesh Maskara

Journal of International Technology and Information Management

This study suggests that having access to a computer and the Internet at home leads to better wages. We normally have the idea that people with higher wages have computers and Internet access at home. But with declining prices of home PCs and the increasing importance of Internet, this no longer seems to be the case. The new owners of PC today are considerably poorer and less educated than in the past. People with access to a PC and Internet at home appear to earn 8.6% more than their counterpart. This result seems to suggest that University policies requiring students …


Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey Jan 2006

Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey

Journal of International Technology and Information Management

Networked computers and electronic data storage make computer security a fundamental component of a company’s survival. Security incidents can cause reputation damage, loss customers, or even liability. Companies that are unable or unwilling to hire certified security professionals often rely on non-security IT professionals for assistance. This paper provides a checklist the non-security professional can use to assist the company in the critical areas of conducting risk analysis, performing vulnerability assessments, educating employees and developing computer security policies and procedures


Internet Technology In 2010: The Issue Of Ipv6 Adoption In The U.S.A., Garry L. White, Jaymeen R. Shah, James R. Cook Jan 2005

Internet Technology In 2010: The Issue Of Ipv6 Adoption In The U.S.A., Garry L. White, Jaymeen R. Shah, James R. Cook

Journal of International Technology and Information Management

Computer industry literature suggests that IPv4 Internet addresses are likely to have been depleted by the year 2010, and at least Asia and Europe will be using the new IPv6 Internet addresses. Literature also suggests that the U.S.A. is lagging behind Asia and Europe with the implementation of IPv6. Empirical data supporting the fact that the U.S.A. is lagging behind is not available in the literature. This paper presents the issues regarding IPv6, reasons why Asia and Europe are implementing IPv6, and why the U.S.A. is lagging behind. Empirical data is presented to support the literature’s suggestion that the U.S.A. …


Applying Theoretical Frameworks To Explicate Physician Acceptance Of Computerized Physician Order Entry (Cpoe), David Rosenthal, Elaine Seeman, Shanan Gibson Jan 2005

Applying Theoretical Frameworks To Explicate Physician Acceptance Of Computerized Physician Order Entry (Cpoe), David Rosenthal, Elaine Seeman, Shanan Gibson

Journal of International Technology and Information Management

This paper reports the findings of a pilot study undertaken to ascertain the feasibility of incorporating the Theory of Planned Behavior and the Taxonomy of Work Values into the explanation of physician technology acceptance of a new organizational technology – Computerized Physician Order Entry (CPOE). While Davis’s Technology Acceptance Model has received much empirical support, we posit that certain complexities associated with the physician population and the hospital environment warrant the inclusion of other theoretical models as a means of furthering our understanding of technology acceptance. Although preliminary in nature, this study finds support for the inclusion of both the …