-------- Original Message -------- Subject: [AISWorld] Journal of Organizational and End User Computing. 24, 1, 2012 Abstracts Date: Thu, 8 Dec 2011 17:33:08 -0700 From: Mahmood, M. Adam mmahmood@utep.edu To: aisworld@lists.aisnet.org aisworld@lists.aisnet.org
The contents of the latest issue of: Journal of Organizational and End User Computing (JOEUC), an ISI-indexed Journal Official Publication of the Information Resources Management Association Volume 24 Issue 1, January-March 2012 Published: Quarterly in Print and Electronically ISSN: 1546-2234 EISSN: 1546-5012 Published by IGI Publishing, Hershey-New York, USA www.igi-global.com/joeuc
Editor-in-Chief: M. Adam Mahmood, University of Texas at El Paso, USA
EDITORIAL NOTE
An extended version of the abstracts for the aforementioned JOEUC issue is provided below for your information and perusal. If you would like to submit a manuscript to the journal for publication consideration, please consult the manuscript submission guidelines provided at http://www.igi-global.com/Files/AuthorEditor/guidelinessubmission.pdf. After reviewing the guidelines, please send an electronic version of your manuscript to us.
PAPER ONE
Post-Acceptance Intentions and Behaviors: An Empirical Investigation of Information Technology Use and Innovation
Pamela E. Carter, North Carolina A&T State University, USA Jason Bennett Thatcher, Clemson University, USA Katherine M. Chudoba, Utah State University, USA Kent Marett, Mississippi State University, USA
Due to its extensive use for the study of information technology adoption and use, the Technology Acceptance Model (TAM) serves as an ideal base model for the study of post-acceptance IT diffusion outcomes. The research presented in this paper incrementally builds on TAM-based research to gain meaningful insights into the potential differences individuals' exhibit in three types of diffusion outcomes in a post-acceptance context. The authors model and test the effects of perceived usefulness and perceived ease of use on intentions to use, intentions to explore, and trying to innovate - IT diffusion outcomes proposed as vital in a post-acceptance context. In addition to TAM predictive variables, the authors investigate how autonomy, a personal control factor, and subjective norms, a social factor, influence individuals' intentions toward and behaviors associated with technology use. The findings suggest cognitive intention outcomes are more likely to be influenced by technology-related factors, while behavioral outcomes are more likely to be influenced by social and personal control factors in post-acceptance contexts. Implications of the study for practice and future research are also discussed.
To obtain a copy of the entire article, click on the link below. http://www.igi-global.com/article/post-acceptance-intentions-behaviors/61410
To view a sample PDF of this article, click on the link below. http://www.igi-global.com/viewtitlesample.aspx?id=61410 PAPER TWO
IS Security Policy Violations: A Rational Choice Perspective
Anthony Vance, Brigham Young University, USA Mikko Siponen, University of Oulu, Finland
Employee violations of IS security policies are reported as a key concern for organizations. Although behavioral research on IS security has received increasing attention from IS scholars, little empirical research has examined this problem. To address this research gap, the authors test a model based on Rational Choice Theory (RCT)-a prominent criminological theory not yet applied in IS-which explains, in terms of a utilitarian calculation, an individual's decision to commit a violation. Empirical results show that the effects of informal sanctions, moral beliefs, and perceived benefits convincingly explain employee IS security policy violations, while the effect of formal sanctions is insignificant. Based on these findings, the authors discuss several implications for research and practice.
To obtain a copy of the entire article, click on the link below. http://www.igi-global.com/article/security-policy-violations/61411
To view a sample PDF of this article, click on the link below. http://www.igi-global.com/viewtitlesample.aspx?id=61411
PAPER THREE
Typing Biometric Keypads: Combining Keystroke Time and Pressure Features to Improve Authentication
Benjamin Ngugi, Suffolk University, USA Peter Tarasewich, Northeastern University, USA Michael Recce, Jersey Institute of Technology, USA
Pervasive online applications are changing the way people perform routine activities. But while providing convenience to individuals and organizations, these applications can pose a significant remote user authentication challenge. Current authentication systems can be strengthened by adding an additional biometric layer to an existing authentication process. This paper addresses implementing such a solution by 1) presenting a novel biometric method that uses key-press pressure and timing patterns from a typed password to determine whether the person typing it is its true owner (even with a compromised PIN); and 2) investigating differences in perceptions of biometric keypads between two user groups, nursing and computing majors. Results reveal that combining pressure and timing patterns leads to better authentication compared with timing patterns alone. Furthermore, nursing majors are more cautious in accepting biometric keypad technology than computing majors, suggesting that care must be taken when introducing such technologies to different groups of people.
To obtain a copy of the entire article, click on the link below. http://www.igi-global.com/article/typing-biometric-keypads/61412
To view a sample PDF of this article, click on the link below. http://www.igi-global.com/viewtitlesample.aspx?id=61412
PAPER FOUR
Technology-Mediated Collaboration, Shared Mental Model and Task Performance
Hayward P. Andres, North Carolina A&T State University, USA
This study takes a direct observation research approach to examine how the impact of collaboration mode on team productivity and process satisfaction is mediated by shared mental model. Team cognition and social impact theories are integrated to provide a framework for explaining how technology-mediated collaboration constrains or enhances team shared mental model development and its subsequent impact on task outcomes. Partial least squares analysis revealed that technology-mediated collaboration impacts shared mental model development. The results also demonstrate that timely and accurate development of shared mental model facilitates increases in both productivity and team process satisfaction. Direct observation of team process behaviors suggests that collaboration modes differ not only in their impact on communication facilitation but efficacy-based, motivational, and social influence factors (e.g., self-efficacy and team-efficacy, perceived salience and credibility of contributions, social influence on action, etc.) as well. Shared mental model development requires quality communication among team members that are motivated to participate by a positive team climate that promotes idea convergence.
To obtain a copy of the entire article, click on the link below. http://www.igi-global.com/article/technology-mediated-collaboration-shared-m...
To view a sample PDF of this article, click on the link below. http://www.igi-global.com/viewtitlesample.aspx?id=61413
PAPER FIVE
Exploring Choice as an Antecedent to Behavior: Incorporating Alternatives into the Technology Acceptance Process
Miguel I. Aguirre-Urreta, DePaul University, USA George M. Marakas, University of Kansas, USA
In this paper, the authors conduct a study to explore the evaluation and choice between candidate software applications. Using business professionals, technology adoption is investigated by presenting participants with an alternative choice set using software applications relevant to the professional domain of the subjects. Results from this study, focusing on models of intentions, provide evidence to suggest the underlying process by which choice behaviors are determined and demonstrate the value of incorporating choice into models of technology adoption, particularly in situations where selection is made from a set of candidate technologies, such as in an organizational adoption decision. In addition, theoretically derived models of comparison processes are examined to develop further understanding into how individuals arrive at a specific choice behavior. A second study is conducted to further validate the obtained results. Implications for future research into the processes leading to adoption of information technologies are also presented.
To obtain a copy of the entire article, click on the link below. http://www.igi-global.com/article/exploring-choice-antecedent-behavior/61414
To view a sample PDF of this article, click on the link below. http://www.igi-global.com/viewtitlesample.aspx?id=61414
This journal is also included in the IGI Global aggregated "InfoSci-Journals" database: http://www.igi-global.com/EResources/InfoSciJournals.aspx.
Happy holidays!
Sincerely,
M. Adam Mahmood
_______________________________________________ AISWorld mailing list AISWorld@lists.aisnet.org