Post on 31-Mar-2020
ISBN: 978-1-60560-953-9
14th Americas Conference on Information Systems (AMCIS 2008)
Toronto, Ontario, Canada 14-17 August 2008
Volume 1 of 6
Printed from e-media with permission by:
Curran Associates, Inc. 57 Morehouse Lane
Red Hook, NY 12571 www.proceedings.com
Some format issues inherent in the e-media version may also appear in this print version. Copyright© (2008) by the AIS/ICIS Administrative Office All rights reserved. Printed by Curran Associates, Inc. (2009) For permission requests, please contact the AIS/ICIS Administrative Office at the address below. AIS/ICIS Administrative Office P.O. Box 2712 Atlanta, Georgia 30301-2712 Phone: 404 760 4247 Fax: 404 760 4938 icis@gsu.edu
TABLE OF CONTENTS
Volume 1
Measuring the Value of User Participation in Change Projects – Results from Case Studies in the Mobile IT-Service Sector .........................................................................................................................1
B. Thurnher, J. vom Brocke
Will Flow Experience Lead to Better Outcomes in Online Shopping?...........................................................9Y. Guo, M.S. Poole
A Constructive Approach to Information Systems Security Training: An Action Research Experience..........................................................................................................................................................15
Juhani Heikka
Decision Support for Perceived Threat in the Context of Intrusion Detection Systems .............................23C. Leberknight, G. Widmeyer, M. Recce
A Novel Trust Model to Support Adhoc Collaboration .................................................................................33K. Kosaka, S. Chatterjee, H. Fu
Misalignment of Expectations for Entry-Level IT Auditors .........................................................................41J. Merhout, M. Flittner, D. Havelka
Infrastructure Interdependencies Modeling and Analysis - A Review and Synthesis ................................50N. Xiao, R. Sharman, H.R. Rao, S. Upadhaya
Securing Personal Information Assets: Testing Antecedents of Behavioral Intentions ..............................60J. Kim, K. Arnett, G. Templeton
Analysis of Student Vulnerabilities to Phishing .............................................................................................75J. Bailey, R. Mitchell, B. Jensen
Mindful Administration of IS Security Policies..............................................................................................85J. Parrish Jr., J. Kuhn Jr., J. Courtney
Defending Cyber Terrorism - A Game Theoretic Modeling Approach .......................................................94T. Bandyopadhyay, H. Mattord
Activity Theory Guided Role Engineering....................................................................................................103M. Gupta
Effects of Prior Experience and Individual Differences on Perceived Risk of Online Shoppers: A Preliminary Study .....................................................................................................................114
I. Gabriel, E. Nyshadham
Towards the Development of an Integrative Framework for Technology Mediated Learning ...............123Y. Hwang
Using Technological Tools to Solve Group Work Problems in Higher Education of Under Developing Countries: a Case Study .............................................................................................................131
H.U. Khan
Teaching and Learning about Virtual Collaboration: What We Know and Need to Know ....................138A. Davis, I. Zigurs
Employers’ Support of the Use of E-portfolios by Job Applicants .............................................................146D. Gehris, A. Fundaburk
Developing a Grounded Theory Model on Collaboration in Learning ......................................................156M. Boese, H. Sheng, R. Hall
The Effect of Learning Styles on Academic Performance in Technology Mediated Learning ................167B. McQuaid
The Use Of Wireless Internet Parks To Facilitate Adoption And Diffusion Of E-Government Services: An Empirical Study In Qatar ..................................................................................171
S. Al-Shafi, V. Weerakkody
Realising Transformational Stage E-Government: Challenges, Issues and Complexities........................185V. Weerakkody, G. Dhillon, Y. Dwivedi, W. Currie
Extending IT Infrastructures in the Local Government Authorities Through Enterprise Application Integration ..................................................................................................................................202
M.M. Kamal, M. Themistocleous, T. Elliman
e-Government Implementation Challenges at a Local Level: A Citizen's Centric Perspective ...............216V. Jain, S. Kesar
Efficacy and Acceptance in E-file Adoption .................................................................................................226L. Carter, L. Schaupp
Understanding the Influence of the Providers’ Organizational and Environmental Context on the Success of Small and Medium Sized Enterprises (SMEs) Seeking to Access the Benefits of Outsourcing Through Aggregation ............................................................................................237
M. Borman
IT Outsourcing Adoption by Small and Medium Enterprises: A Diffusion of Innovation Approach..........................................................................................................................................................248
Abhijit Chaudhury, Pratyush Bharati
An OBTG (Organizational – Business – Technological - Governmental) E-business Adoption Model for Small and Medium Sized Enterprises.........................................................................262
D.J. Kim
The Development of IT Business Alignment and Usage Patterns Over Time in SME: A Longitudinal Case Study ................................................................................................................................270
H.T. Wagner
Adoption and Evaluation of E-business in Thai SMEs: A Process Perspective.........................................280L. Kaewkitipong, D. Brown
An Analysis of the Management Capabilities of ICT Innovation for Sustained Competitiveness in SMEs ...............................................................................................................................293
S. Shang, L-Y. Liao
Change Agents Intervention in E-Business Adoption by SMEs: Evidence from a Developing Country ........................................................................................................................................306
S. Thompson, D. Brown
An Empirical Study of the Relationship between IT Infrastructure Flexibility and IT Responsiveness in SMEs: A Resource-Based Analysis ................................................................................313
J. Zhang, H. Li, J. Ziegelmayer
Towards a Stage Model for E-Business Adoption among SMEs: Preliminary Results for Manufacturing and Service Films..................................................................................................................320
S. Magal, P. Kosalge, N. Levenburg
Information Technology and Business Value in a Global Economy: Do Information Technology Investments Pay Off in a Developing Economy? .....................................................................333
A. Prasad, J. Heales
End User Adoption of ERP Systems: Investigation of Four Beliefs............................................................344I. Al-Jabri, A. Al-Hadab
Barriers to Enterprise System Implementation Success: Learning from Practitioners in Poland ..........352P. Soja
Internet Business Practices Across the Globe: Lessons from Emerging Economies .................................362J. Whitaker, N. Melville, R. Plice, J. Dedrick
Analysis of the Effects of Technological and Organizational Features on Intranet and Portal Usage.....................................................................................................................................................372
R.B. deCarvalho, M.A.T. Ferreira, C.W. Choo, R.V. daSilva, L.A. Joia
Email as an Integration Device: A Study of Work Place Information Seeking .........................................384D. Stenmark, T. Jadaan
Inscriptions on Intranets as Information Infrastructures – Exposing the Cultivation Chasm ................391B. O'Flaherty, J. Whalley
Factors Influencing Saudi Consumers Loyalty towards B2C E-Commerce ..............................................400M. Eid, F.U. Al-Anazi
Factors Affecting the Acceptance of Internet and Ebusiness Technologies in Atlantic Canada’s SMEs: A Structural Equation Model ............................................................................................................410
P. Ifinedo
Factors Influencing Intention to Gamble Online..........................................................................................421C.B.P. Lee, L.H. Xia
An Assessment of Mobile Consumer Interest in Jamaica: Preempting a Decline in Average Revenue per User ............................................................................................................................................................432
P. Golding, O. Donaldson
Factors Affecting Mobile Commerce Adoption: A Cross-Cultural Study in China and United States...446H. Dai, P. Palvia
Performance Improvements Based on RFID – Empirical Findings from a Cross-sectoral Study...........460T. Faupel, J. Strueker, D. Gille
Assessing the Effects of Enhanced Supply Chain Visibility Through RFID ..............................................470A. Melski, J. Mueller, A. Zeier, M. Schumann
RFID Adoption: An exploratory Study of Issues and Concerns .................................................................482A.S. Kunnathur, S. Vaithianathan
Profiling Benefits of RFID Applications .......................................................................................................491Henning Baars, Xuanpu Sun, Jens Struker, Daniel Gille
Drivers of RFID Adoption in the Automotive Industry...............................................................................501H. Krasnova, L. Weser, L. Ivantysynova
Stages in Adoption of RFID Innovations by Organizations: Identifying Facilitators and Inhibitors .....509A. Jeyaraj, A. Sengupta, V. Sethi
The Land and Water Integration Decision Support System .......................................................................516I. Wong, P. Fong, W. Booty, C. Nielsen, G. Benoy, D. Swayne
An Integrated Logistics Model for Environmental Conscious Supply Chain Network Design ...............523A. Chaabane, A. Ramudhin, M. Paquet, M.A. Benkaddour
Smart Knowledge Capture for Developing Adaptive Management Systems.............................................528P.J. Murphy, N. Li, R. Averill-Murray, P. Burgess, n. Strout
Blowing the Whistle on Unethical Information Technology Practices: The Role of Machiavellianism, Gender and Computer Literacy.....................................................................................542
Y. Niu, A. Stylianou, S. Winter
Enabling Attributes for Team-Based Knowledge Sharing: A Preliminary Empirical Test .....................555B. Ibragimova, S.D. Ryan
An Empirical Study of the Effects of Principal Component Analysis on Symbolic Classifiers................563H. Zhao, A.P. Sinha, S. Ram
A Text Mining Approach to Support Intraday Financial Decision-Making..............................................570S.S. Groth, J. Muntermann
Attribute Noise-Sensitivity Impact: Model Performance and Feature Ranking .......................................581M. Sidahmed
Dynamic Effects of Communication in Software Development Teams: A Comparison of Three Models ...................................................................................................................................................592
Jun He
Readiness of Small Enterprises for GIS: The Question of Strategy ...........................................................606J. Pick, K. Gollakota, H. Falatoon, R. Greene
Migrating Legacy Systems in the Global Merger & Acquisition Environment Teaching Case...............616P. Katerattanakul, H-J. Kam, J.J. Lee, S. Hong
Critical Success Factors in SOA Implementation ........................................................................................626J. Erickson, K. Siau
Conceptualization and Measurement of the Capability Maturity Model (CMM): An Examination of Past Practices and Suggestions for Future Approaches ..........................................................................635
M. Swinarski, E. Jackson, R. Kishore
Business Intelligence Center Concepts ..........................................................................................................644C. Unger, H-G. Kemper, A. Russland
Directions in Business Intelligence: An Analysis of Applications ...............................................................656R. Hayen
Mastering Business Intelligence Complexity A Service-based Approach as a Prerequisite for BI Governance ......................................................................................................................................................666
T. Horakh, H. Baars, H-G. Kemper
Combining System Dynamics and Multidimensional Modelling – A Metamodel Based Approach ........677L. Burmester, M. Goeken
Volume 2
Information Buried in B2B Contracts: Towards Identifying Interdependencies in IT Service Processes ..........................................................................................................................................................688
S. Sen, A. Deokar
Cross-Organization and Cross-Border IS/IT Collaboration: A Literature Review..................................696M. Madberger, N. Roztocki
IT Outsourcing Relationship Quality Dimensions and Drivers: Empirical Evidence from the Financial Industry.....................................................................................................................................707
S. Blumenberg
Drivers of Individual Performance in IT Offshore Outsourcing Projects – A Case Study from the German Banking Industry..............................................................................................................723
R. Gregory, R. Beck, M. Prifling
e-Collaboration Satisfaction: Empirical Field Studies of Disconfirmation Theory Across Two Cultures ...................................................................................................................................................731
G-J. deVreede, B. Relnig, R. Briggs
Picking Up the Pieces after a “Successful” Implementation: Networks, Coalitions and ERP Systems .............................................................................................................................................................741
B. Bob-Jones, M. Newman, K. Lyytinen
Language of Change .......................................................................................................................................753H. Rashid
Striking the Right Balance When Users are Good at IT Too!: Partnering for Enterprise System Success.................................................................................................................................................788
J. Davis, W. Kettinger, D. Kunev
The Role of Information Technology in Firm Agility: An Electronic Integration Perspective ................797S. Nazir, A. Pinsonneault
Comparing the Operational Integration of a Core Information System in Insourcing and Outsourcing Firms ..........................................................................................................................................807
D. Beimborn, F. Schlosser, T. Weitzel, R. Hirscheim, A. Schwarz
Enterprise Architecture: Charting the Territory for Academic Research ................................................817L. Kappelman, T. McGinnis, A. Petite, B. Salmans, A. Sidorova
Web-Based vs. Traditional Education: Does Distance Education at the Graduate Level Deserve a Failing Grade? ...............................................................................................................................827
B.M. Jones, A. Everard
A Study of the Changing Process of Knowledge-Sharing Habits................................................................832M-L. Young, C-C. Chen
The Effects of Using a Tablet PC on Teaching and Learning Processes ....................................................840F. Chen, J. Sager, G. Corbitt, K. Sandoe
Toward an Engaging Learning Experience for Students ............................................................................851R.A.M. Rosario, G. Widmeyer, S. Hiltz
An Empirical Investigation of the Relationships among Math Confidence, Computer Confidence, and Computer Self-Efficacy: Implications for Technology Education .................................858
R.F. Morris Jr., E. Thrasher
Examining Approaches to Effective Concept Delivery: One Professor’s Approach in the MIS Survey Course .........................................................................................................................................869
D. Schwieger
Simulation Gaming in Technology Management .........................................................................................879T. Ben-Zvi, T. Carton
Internationalizing The Information Systems Curriculum: A Case Study .................................................888A. Molla, H. Deng, B. Corbitt
Understanding the Formation and Effects of General Computer Self-Efficacy in Business Students............................................................................................................................................................898
J. He, J.E. Adams
Keeping an IS Program Viable by Offering IT Literacy as a Service Course: One Department’s Response to Declining Enrollments .......................................................................................911
M. Murray, J. Perez
Challenges in Teaching Large Online Sections.............................................................................................913C. Navarrete, R. Guthrie
Learning Effectiveness and Student Satisfaction in Mobile Classrooms....................................................923W. Chen, V. Balijepally, P. Sutanto
Student Perceptions of On-line Homework-Grading Software...................................................................930C. Khanlarian, R. King
Learning REAL Business Skills in a Virtual World: An Action Learning Perspective............................939R.K.F. Ip, C. Wagner, S.J. Zhao
Curriculum Decisions: Assessing and Updating IS Curriculum.................................................................949T. Dodson, R. Giorcelli
Pleasing Some of the People Most of the Time: A Pilot Study of a Citrix Implementation......................958J. Fustos, K. Marold, G. Morris
Emotional Responses to Computer-Based Training Materials in Education ............................................968S. Chinn, R. Heiser, J. Suleiman
Progress and Peril in the Championing Process...........................................................................................977M. Mirza, A. Pinsonneault, R. Tamblyn
Healthcare Information Technology Adoption and Protection Motivation: A Study of Computerized Physician Order Entry Systems............................................................................................985
A.N.K. Chen, Y.G. Lee
User Perceptions and Employment of Interface Agents for Email Notification: An Inductive Approach ........................................................................................................................................995
A. Serenko
Power Operation in ISD: Technological Frames Perspectives ..................................................................1012C. Chang
ICT Transformation in China after Its WTO Entry: Lessons from the Tobacco Industry ...................1023A. Hochstein, Y. Zhu
Cognition and Culture in ICT Experience..................................................................................................1034Weiwei Tan, Raafat Saade
Are Chinese Online Consumers Different? An Investigation of Online Consumer’s Repeat Purchase Intention in China.........................................................................................................................1043
H. Dai, R. King
Bottlenecks in the Process of Improving ICT Infrastructure in Developing Countries: A Chinese Perspective.......................................................................................................................................1056
S. Akkaladevi, X. Luo
There All Along? A Preliminary Meta-Analysis of the Moderating Gender Effects in Technology Acceptance Research ................................................................................................................1066
W.N. Sun, M. Aguirre-Urreta, M. Ellis, G. Marakas
How Personality and Relationship Affect Customers’ Adoption of Advanced Self Service Technology in Branch Banking....................................................................................................................1074
S. Berger
The Impact of the Big Five Personality Traits on the Acceptance of Social Networking Website ...........................................................................................................................................................1083
P. Rosen, D. Kluember
Exploring the Role of Gender on Bloggers’ Switching Behaviors ............................................................1093K. Zhang, C. Cheung, M.K.O. Lee, H. Chen
Achieving Cultural Fit in Global Information Systems Implementation .................................................1103E. Brainin
An Empirical Study on the Effect of Attitude toward Change and Computer Self-Efficacy on ERP Adoption: A Comparison of the Local and Global Packages ......................................................1127
K-Y. Kwahk
National Culture’s Impact on B2B Technology Adoption in Thailand ....................................................1138S. Vatanasakdakul
Understanding Music Sharing Behavior in China: Development of an Instrument ...............................1148D. Amoroso, P. Dembla, H. Wang, M. Greiner, P. Liu
A Moral Hazard Perspective on Environmental Uncertainty and IT Governance.................................1158L. Xue, G. Ray, B. Gu
CIO and CEO Heterogeneity, IT Support, and IT Competitiveness in Stable and Unstable Environments: An Empirical Study ............................................................................................................1168
G. Bassellier, E. Gagnon, A. Pinsonneault
The Moderating Effect of Top Management’s Collective Mindfulness on the Relationship between Top Management Support and IS Function Performance .........................................................1176
S. Khan, D. Mirchandani
Enterprise Systems Education: New Directions & Challenges for the Future ........................................1185B. Cameron
Framework and Reference for Architecture Design ..................................................................................1195M. Rohloff
Towards an Economic Justification of Service Oriented Architectures – Measuring the Financial Impact............................................................................................................................................1209
J. vom Brocke, O. Thomas, C. Sonnenberg
Towards a Reference Architecture of Intent for Information Systems Strategic Alignment .................1219R. Woolridge, D. Hale, J. Hale
Associations and Mutual Properties – An Experimental Assessment ......................................................1231J. Evermann, H. Halimi
System Analysis as Scientific Inquiry ..........................................................................................................1242J. Evermann, R. Mistry
Perceived Evaluability – Development of a Theoretical Model and a Measurement Scale ....................1255J. Becker, D. Pfeiffer, C. Janiesch
Towards the Specification of Digital Content – The Enterprise Content Modeling Language (ECML) ........................................................................................................................................1266
J. vom Brocke, J Becker, A. Simons, S. Fleischer
Perceived Risk and Resilience in the Face of Natural Disasters: A Study of Hospital Information Infrastructure Systems: Research in Progress......................................................................1276
I. Park, R. Sharman, H.R. Rao, S. Upadhyaya
Information Sharing and Emergency Services: An Examination using Information Security Principles ........................................................................................................................................1285
W.A. Conklin
A Design Study of an Animated System for Representing Finnacial Ratios............................................1292L. Zhao, J. Grant, F. Collopy, R. Boland Jr.
Enablers and Inhibitors of Healthcare Information Technology Adoption: Toward a Dual-Factor Model .................................................................................................................................................1301
A. Bhattacherjee, N. Hikmet
What’s the Weather Like? The Effect of Team Climate and Individual Attributes on Individual Intention to Explore a New Technology ...................................................................................1309
L. Maruping, M. Magni, L. Caporarello, S. Basaglia
Contextualizing the Adoption of Electronic Collaboration Tools: System and Team Considerations ...............................................................................................................................................1323
O. Turel, Y. Zhang
Decision Factors for the Adoption of E-Finance and Other E-Commerce Systems................................1331F. He, P. Mykytyn
Linux vs. Windows in the Middle Kingdom: A Strategic Valuation Model for Platform Competition ...................................................................................................................................................1339
J. Gallagher, Y-M. Wang
Open Source Software Adoption: an Investigation Into Motivations and Amotivations of Users.........1352Y. Li, C-H. Tan, H-H. Teo
Reconsidering Subjective Norm – A Multilayer-Framework for Modeling Normative Beliefs in IT Adoption ...................................................................................................................................1363
A. Eckhardt, S. Laumer, T. Weitzel
Volume 3
Drivers and Inhibitors of SOA Business Value – Conceptualizing a Research Model............................1372
D. Beimborn, N. Joachim, T. Weitzel
Integration Scenarios for Business Collaboration......................................................................................1382P. Schubert
Experiences while Selecting, Adapting and Implementing ERP systems in SMEs: A Case Study ........1392A. Winkelmann, K. Klose
Inhibiting Factors for Adopting Enterprise Systems in Networks of Small and Medium-sized Enterprises – an Exploratory Case Study..........................................................................................1403
M. Schafermeyer, C. Rosenkranz
Towards an Understanding of the Business Value of Business Process Standardization – A Case Study Approach ...................................................................................................................................1412
A. Von Stetten, B. Muenstermann, A. Eckhardt, S. Laumer
Locating Base Stations for Mobile Servers .................................................................................................1420T. Drezner, Z. Drezner
Corporate Acceptance of M-Technology in the Service Sector: A Case Study........................................1427R. Tassabehji, J. Wallace, A. Srivastava
Adoption of Mobile Services Upgrade: New and Current Users ..............................................................1440K.K.W. Ho
A Principal-Agent Perspective on ERP Implementation Decisions-An Empirical Analysis Based on Chinese Listed Companies ...........................................................................................................1452
L. Wang, J. Zhang, L. Yang, Q. Liao
Organizational and Information Systems Factors in Post-Merger Technology Integration ..................1464G. Baro, A. Chakrabarti, F. Deek
Real Options: Strategic Technology Migration Options in Wireless Industry ........................................1479H.J. Kim
Strategic Alignment Maturity: a Structural Equation Model Validation................................................1491J. Luftman, J. Dorociak, R. Kempaiah, R. Rigoni
Business-IS Alignment: Assessment Process to Aligh IT Projects with Business Strategy.....................1507A. Gutierrez, C. Mylonadis, J. Orozco, A. Serrano
On the Impact of Strategic Planning on Mandatory IS Investments........................................................1516K. Krell, S. Matook
How to Achieve IT Business Alignment? Investigating the Role of Business Process Documentation in US and German Banks ..................................................................................................1525
D. Beimborn, R. Hirschheim, F. Schlosser, A. Schwarz, T. Weitzel
Virtual Community Ventures: Success Drivers in the Case of Online Video Sharing............................1533C. Loebbecke, C. Huyskens
Flexible Vwap Executions in Electronic Trading .......................................................................................1542P. Gomber, M. Lutat, A. Wranik
Defining the Business Model in the New World of Digital Business .........................................................1551M. Al-Debei, R. El-Haddadeh, D. Avison
The Mediating Role of Trust in the Relationship between Online Shopping Experience and Consumer’s Shopping Values ......................................................................................................................1562
M. Kim, C.W. Yoo, C. Rhee, Y.C. Choe
Analysis of Book Resale in Amazon Upgrade Framework: A Game-theory Approach .........................1573L. Chen
A Cross-Category Analysis of the Effects of Consumer Reviews and Ratings ........................................1583B. Wang, B-J. Jiang
Selling and Renting Information Goods: Case of E-books ........................................................................1592H. Singh
Information Technology, Improvisation and Crisis Response: Review of Literature and Proposal for Theory ......................................................................................................................................1601
A. Adrot, D. Robey
Measuring Enjoyment of Computer Game Play ........................................................................................1611X. Fang, S. Chan, J. Brzezinski, C. Nair
Online Gaming Adoption in Competitive Social Networks: Combining the Theory of Planned Behavior and Social Network Theory...........................................................................................1621
T. Weiss, C. Loebbecke
Breaking Down the Boundaries: Interdisciplinarity and the Future of KM ...........................................1632Rachel Jones
IT and NPD Performance: Unveiling the Mediating Effects of Process Integration and Knowledge Integration .................................................................................................................................1640
S. Addas, A. Pinsonneault
By When Do You Need This Done? Discovering Knowledge Workers’ Time Management Practices .........................................................................................................................................................1653
D. Wu, K. Passerini, M. Bartolacci
Exploring the Influence of Ethical Norms on Organizational Knowledge Management: An Ethical Climate Perspective..........................................................................................................................1660
F-C. Tseng, G.F. Wang, Y-J. Fan
Would You Share? Examining How Knowledge Type and Communication Channel Influence Knowledge Sharing ......................................................................................................................1669
P. DiGangi, M. Wasko
Knowledge Integration in Software Teams.................................................................................................1681N. Mehta, D. Hall, T. Byrd
A Business Process Oriented Method of KM Solution Design: the Case of Samsung Electronics Anycall Gumi .............................................................................................................................1689
P. Baloh, K. Uthicke, G. Moon, C. Jaekwon
Increased Knowledge Transfer and Content Management.......................................................................1700J. Erickson, J. Brickey
Empowerment of Slum Children in Developing Countries through Information Technology: Human Capabilities versus Environmental Determinism ...................................................1709
V. Vinekar
A Content-Based Pricing Model for Municipal and Community Wireless Networks ............................1717A. Abdelaal, H.H. Ali
A Dynamic Query-rewriting Mechanism for Rolebased Access Control in Databases ..........................1724J. Jarman, J. McCart, D. Berndt, J. Ligatti
Threat Modeling the Enterprise ..................................................................................................................1734J. Ingalsbe, D. Shoemaker, N. Mead, A. Drommi
The Role of Access to Personal Support in Fostering Frequent Information Systems Use ....................1742B. Furneaux
Factors Affecting Malaysian Accountants’ Broadband Adoption and Use Behavior .............................1754M. Selamat, Y. Dwivedi, M. Wahab, M. Samsudin, M. Williams, B. Lal
A Profile of Research on Adoption and Diffusion of ICT/IT/IS in the Consumer/Household/Residential Context .................................................................................................1764
Y. Dwivedi, M. Williams, A. Dwivedi, B. Lal
Internet Access in South African Homes: Factors Influencing Consumer Choice..................................1774I. Brown, B. Letsididi, M. Nazeer
Facilitating Sensemaking in Organizations through Social Navigation Systems.....................................1784J. Wu, A. Pinsonneault
The Impact of Virtuality on the Flexibility of Virtual Teams in Software Development Projects...........................................................................................................................................................1793
S. Bakshi, S. Krishna
Risky Group Decision Making: A Comparative Analysis of FTF and CMC Teams in Stock-Trak Investment Simulations ............................................................................................................1802
F. He, P. Mykytyn, J. Pearson, Y. Sheng
Gender, Media and Leader Emergence: Examining the Impression Management Strategies of Men and Women in Different Settings ..................................................................................1810
L. Chidambaram, J. Lim, T. Carte
Whose (Partially Distributed) Team Are You On? Interviews about “Us-vs.-Them” in Corporate Settings ........................................................................................................................................1822
R. Privman, S. Hiltz
Following the Sun: Exploring Productivity in Temporally Dispersed Teams .........................................1833J. Colazo
An Experimental Investigation of Online Banking Adoption in China....................................................1840Guangying Hua
Unweaving the Phisher’s Net: An Exploratory Study ...............................................................................1848B. Perez-Mira
Mobile User’s Privacy Decision Making: Integrating Economic Exchange and Social Justice Perspectives .......................................................................................................................................1857
H. Xu, M. Rosson, J. Carroll
Efficacy of Privacy Assurance Mechanisms in the Context of Disclosing Health Information Online .......................................................................................................................................1866
G. Bansal, F. Zahedi, D. Gefen
An Exploratory Study of Bloggers’ Information Sharing Behavior: The Role of Online Privacy Concerns ..........................................................................................................................................1877
S. Chai, S. Das, H.R. Rao
Mediated Internet Experience for Senior Citizens .....................................................................................1885R. Chakraborty, R. Rao, V. Sankaranarayanan, S. Upadhyyaya
Enabling an Agile Information Supply Chain in Service Oriented Architectures with Web Services...........................................................................................................................................................1895
C. Abraham, I. Junglas, M. Willis
Estimating Agile Software Project Effort: An Empirical Study ...............................................................1907L. Cao
A Social Status Perspective of Network Utility over Electronic Channels in Academic Communities..................................................................................................................................................1917
K. Sherif, J. Wilcox, J. Song
Privacy Threat Model for Data Portability in Social Network Applications ...........................................1929S. Weiss
Social Network Sites: Antecedents of User Adoption and Usage ..............................................................1937D. Sledgianowski, S. Kulviwat
Information Disclosure by Children in Social Networking – And, What Do the Parents Know? .........1947Z. DeSouza, G. Dick
Online Social Lending: Borrower-generated Content ...............................................................................1957A. Ortega, F. Bell
The Business Value of Social Network Technologies: A Framework for Identifying Opportunities for Business Value and an Emerging Research Program .................................................1965
D. Kettles, J.S. David
Is There Gold in California Data Mines?: Using Stakeholder Theory to Analyze the Tradeoff between Individual Privacy and the Public Good .....................................................................1984
J. Fedorowicz, J. Gogan, M. Culnan
Do We Need Intermediaries in E-Government? Intermediaries to Create a Demand-driven Government ...................................................................................................................................................1992
M. Janssen, B. Klievink
The Appropriation and Enactment of E-government Projects by ICT Professionals: A Case Study of Dubai......................................................................................................................................2000
N. Alghatam
Business Process Model-based Evaluation of ICT Investments in Public Administrations ...................2009J. Becker, P. Bergener, S. Kleist, D. Pfeifer, M. Rackers
A Preliminary Assessment of the Impact of eGovernment Technologies in Governmental Agencies..........................................................................................................................................................2018
G. Leo
Sources of Conflict between Developers and Testers in Software Development: A Preliminary Investigation .............................................................................................................................2046
X. Zhang, J. Dhaliwal, M. Gillenson, G. Moeller
Volume 4
If ICTs are Laboratories…...........................................................................................................................2058
E. Davenport, K. Horton
Closing the Business-IT ‘Gap’: A Trust-Building Approach ....................................................................2065T. Hatzakis
A Graph Theoretic Approach for Analysis and Design of Community Wireless Networks ..................2077A. Abdelaal, H.H. Ali
Information Technology and Business Value: How Complementary IT Usage Platform and Capable Resources Explain IT Business Value Variation .........................................................................2085
A. Prasad, J. Heales
A Methodological Examination of Empirical Research on Information Systems Success: 2003 to 2007 ...................................................................................................................................................2096
N. Urbach, S. Smolnik, G. Riempp
Complementarities in Extended Enterprises: A Framework for IT Value..............................................2110 S. Kanungo, S. Prasad, V. Jain
Simulation of Automated File Migration in Information Lifecycle Management...................................2118L. Turczyk, C. Frei, M. Behrens, N. Liebau, R. Steinmetz
Toward IT Value Mapping – An Approach to Value-Based IT Management ........................................2129S. Lanzinner, J. Leimeister, H. Krcmar
Understanding the Information Technology Innovation Impact on Firm Performance: An Empirical Investigation.................................................................................................................................2139
M. Ko, J. Clark
Event Studies in Information Systems Research: A Review .....................................................................2148N. Roztocki, H. Weistroffer
IT Innovation Capability and Returns on IT Innovation Persistence ......................................................2158J-H. Lim, T. Stratopoulos
Information Systems and Stock Return Volatility .....................................................................................2173E. Rubin, A. Rubin
Managing Creative Risks..............................................................................................................................2184J. Becker, S. Seidel, F. Muller-Wienbergen, A. Winkelmann
Leveraging Group Cohesiveness to Form Workflow Teams.....................................................................2192A. Bajaj, R. Russell
Value-oriented Process Modeling – Towards a Financial Perspective on Business Process Redesign .........................................................................................................................................................2206
J. vom Brocke, J. Mendling, J. Recker
Paradigm and Pluralism: Using Theory from Occupational Sociology and the Sociology of the Professions to Frame an Identity for IS ................................................................................................2216
M. Somers
Information Systems and Decision Quality: Lessons from Information Economics and Agency Theory...............................................................................................................................................2224
F. Wall
Self-Organization Mechanisms for Information Systems – A Survey ......................................................2233A. Miede, N. Repp, J. Eckert, R. Steinmetz
Concepts from Coevolution in Information Systems .................................................................................2241G. Lewis
B2B Online Reverse Auctions and the Future of Information Systems as the Discipline of Reference........................................................................................................................................................2248
M. Charki, N. Charki
Classification of Communication Defects in DWH Projects......................................................................2260A. Hoffmann, W. Behrmann
The Hirsch Family of Bibliometric Indices As an Improved Measure of is Academic Journal Impact ..............................................................................................................................................2269
M. Cuellar, H. Takeda, D. Truex
Journal Rankings 2008: A Synthesis of Studies..........................................................................................2279M. Gillenson, T. Stafford
Design Criteria for Transparent Mobile Event Recommendations ..........................................................2291M. Radmacher
e-Accessibility: Making the Web Accessible to the Visually Impaired Persons.......................................2302S. Ferreira, D. Silveira, M. Chauvel, M. Ferreira
A Meta-analytic Review of More than a Decade of Research on General Computer Self-Efficacy: Research in Progress.....................................................................................................................2310
C. Posey, Y. Liu, B. Fuller
The Effect of Background Music-induced Arousal on Online Consumer Search Behavior: Evaluating Search Performance and Experience .......................................................................................2317
X. Lingling, K. Haur, C. Chuan
Why and When Will Banner Blindness Occur? An Analysis Based on the Dual Processing Theory ............................................................................................................................................................2326
Y. Sun, K.H. Lim, J.Z. Peng, C. Jiang, X. Chen
The Importance of “who” and “what” in Interruption Management: Empirical Evidence from a Cell Phone Use Study........................................................................................................................2335
S. Grandhi, N. Laws, B. Amento, Q. Jones
A Location-based Approach for Distributed Kiosk Design .......................................................................2343A. Luse, S. Vidrio-Baron, B. Mennecke, A. Townsend
Online Form Complexity Assessment for Developing Assistive Technologies.........................................2351T. Elliman, A. Money, L. Lines, S. Fernando
Understanding and Managing Website Information Content: The WICS Method................................2360J. Hasley, D. Gregg
Generation Y & Web Design: Usability through Eye Tracking................................................................2372S. Djamasbi, T. Tullis, M. Siegel, D. Capozzo, R. Groezinger, F. Ng
Work Flow and Performance under Computer Mediated Interruptions ................................................2383K. Basoglu, M. Fuller
The Impact of Structural Embeddedness on Perceived Trust on Alternative Trading Systems, Trading Cost, and Access to Information in the Fixed-Income Market ...................................2393
G. Bhandari, J. Siam
The “Love of Art” vs. Website Design: An Application of Bourdieu’s Theory in Online Environments ................................................................................................................................................2400
J. Pallud, D. Straub
Introduction of a Coding Scheme of the Source and Target in Appropriation Moves ...........................2409D. Miller
Using Actor Network Theory to Interpret the Introduction of Information Systems within the London Ambulance Service ...................................................................................................................2417
L. Brooks, G. Fitzgerald, C. Atkinson
Factors Motivating Software Piracy in Vietnam ........................................................................................2431C.W. Yoo, M. Kim, Y. Choe, V. Tuan
The Sieve of Overspecialization ...................................................................................................................2443W. Bonner
A Mobile Support System for Collaborative Multi-Vendor Sales Processes ...........................................2451J. Kokemuller, H. Kett, O. Hoss, A. Weisbecker
The Impact Logic of Mobile Technology Usage on Job Production .........................................................2460S. Deibert A. Heinzl, F. Rothlauf
Prototypical Implementation of an Intermediary Platform for Context-sensitive Mobile Marketing Applications ................................................................................................................................2473
A. Albers, C. Kahl
Supporting Global Software Development with Web2.0 Technologies – Insights from an Empirical Study.............................................................................................................................................2485
A. Benlian, T. Hess
Real-time Control Mediation in Agile Distributed Software Development .............................................2494J. Persson, I. Aaen, L. Mathiassen
Leadership and Trust in Partially Distributed Software Development Teams .......................................2502L. Plotnick, S. Hiltz, R. Ocker, A. Rutkowski, M. Rosson
IS-Related Operational Risk: An Exploratory Analysis............................................................................2509J. Goldstein, M. Benaroch, A. Chernobai
Moving Towards Information System Security Accreditation within Australian State Government Agencies ...................................................................................................................................2515
S. Smith, R. Jamieson, D. Bunker, D. Winchester
An Open Reference Framework For Enterprise Information Security Risk Management Using the STOPE Scope and the Six-Sigma Process ..................................................................................2525
M. Saleh, A. Alfantookh, J. Mellor, S. Bakry
A Method for Authentication Services in Wireless Networks ...................................................................2539H. Ngo, X. Wu, P.D. Le, C. Wilson
Cross Domain Privacy Protection for Location-Based Services ...............................................................2548O. Jorns, G. Quirchmayr
Managing of Information Systems Risks in Extended Enterprises: The Case of Outsourcing ..............2556B. Schlaak, S. Dynes, L. Kolbe, R. Schierholz
How Users Respond to Authentication Methods A Study of Security Readiness....................................2567J. Sun, P. Ahluwalia
Do People Trust Facebook as a Technology or as a “Person”? Distinguishing Technology Trust from Interpersonal Trust ...................................................................................................................2577
N. Lankton, D. McNight
Font Personality and B2C E-Commerce Trust...........................................................................................2587S. Sasidharan, G. Dhanesh
Trust and Satisfaction As the Relational Outcomes of Perceived Usefulness in B2C Online Service Context..............................................................................................................................................2593
M. Mantymaki, R. Raitoharju
The Role of Trust in the Intention to Use Feedback from Reputation Systems ......................................2604S. Vannoy, A. Nath, L. Iyer
Privacy Statements, Information Sharing, and Web Purchasing .............................................................2616S. Dasgupta, L. Amey
The Impact of IT Structure and Firm Interdependency on Relational Rents in Innovation Collaboration Networks................................................................................................................................2626
P. Gangi, A. Bush
E-collaboration Systems in Virtual Organizations – Recommendations for Tool Support Based on Genre Analysis ..............................................................................................................................2636
K. Reimer, N. Vehring
Communication and Ties in Distributed Work ..........................................................................................2644A. Tay
e-HR Systems Implementation: A Conceptual Framework ......................................................................2660S. Pant, A. Chatterjee
Good Works and Networks: Information System as Nexus for the Promotion of Sustainable Community Development ........................................................................................................2666
N. Ramiller, M. Pullman
Because Excel will Mind Me! The State of Constituent Data Management in Small Nonprofit Organizations...............................................................................................................................2674
H. West, G. Green
A Leadership Knowledge Management Model for E-Government: A Preliminary Empirical Test ...............................................................................................................................................2689
X. Zhang, V. Prybutok, S. Ryan, J. Sharp
Social Inclusiveness of Electronic Public Service Delivery in Germany –A Quantitative Analysis ..........................................................................................................................................................2698
J. Becker, P. Bergener, Bjorn Niehaves, M. Rackers
An Internet EDI Model for E-Government ................................................................................................2707F. Holder, A. Pidduck
Evaluating eGovernment in the Large – A Requirements-Oriented Approach ......................................2716T. Matheis, J. Ziemann, D. Schmidt, M. Wimmer, P. Loos
Adoption of e-Government in Europe: A Regional Level Perspective .....................................................2727M. Williams, Y. Dwivedi
An Exploratory Analysis of E-government Development in the Caribbean ............................................2736R. Joseph, P. Jeffers
Volume 5
New Public Management and IT: A Mexican Case Study.........................................................................2746
J. Vilchis, R. Sandoval-Almazan
Blackberry Addiction: Symptoms and Outcomes ......................................................................................2754O. Turel, A. Serenko, N. Bontis
RFID-based Recommender Systems in Stationary Trade .........................................................................2765T. Hansen, P. Loos
Connecting to the Next Generation Mobile Desktop..................................................................................2775G. Mangalaraj, C. Amaravadi
Mobile Computing Trends in IS Research: An Inductive Categorization Analysis................................2784Y. Yu, A. Datta, D. Ladd, S. Sarker
The Evolution of the German Corporate Network (1896-1933) ...............................................................2795K. Krenn, P. Windolf
Social Network and Content Analysis: An Integrated Methodology to Investigate a Global Community Evolution...................................................................................................................................2805
M. DeMaggio, F. Grippa, G. Passiante
Profile of the Social Network in Photo Sharing Systems ...........................................................................2815P. Kazienko, K. Musial, T. Kajdanowicz
Social Network Analysis using Author Co-citation Data...........................................................................2827H. Kim, G. Barnett
Studying Community Dynamics with an Incremental Graph Mining Algorithm...................................2836T. Flakowski, A. Barth, M. Spiliopoulou
Social Sensors for Automatic Data Collection ............................................................................................2847D. Olguin, A. Pentland
Seeking Synergies between Four Views of Service in the IS Field ............................................................2857S. Alter
Fit between IT Outsourcing Supplier Sourcing Capabilities and Organizational Structure: A Conceptual Model .....................................................................................................................................2869
A. Plugge, H. Bouwman
Service Consumer Model: Understanding and Describing Consumers for New Service Development ..................................................................................................................................................2879
A. Hochstein, W. Brenner, B. Schindholzer
Modeling, Customer-Specific Configuration and Calculation of Value Bundles ....................................2890J. Becker, D. Beverungen, R. Knackstedt, O. Muller
Bidder Migration and Its Price Effects on Auctions ..................................................................................2900M. Lin, W. Jank
A Matching Algorithm for Selecting Web Services Based on Non-Functional Features ........................2915S. Elnaffar
‘Academic Capitalism’: Universities’ Consultancy Agendas ....................................................................2926K. Grant, G. Spinelli, P. Duncan, R. Hackney, D. Edgar
Developing the Concept of Individual IT-Culture: The Spinning Top Metaphor...................................2940I. Walsh, H. Kefi
The Role of IT Culture in IT Management: Searching for Individual Archetypal IT Cultural Profiles ............................................................................................................................................2952
I. Walsh, H. Kefi
A Rural Tale: A Cautionary Allegory For IS Researchers........................................................................2968M. Newman
Teenagers’ Elective Use of Computer Technology in Middle and High Schools: The Role of Gender............................................................................................................................................................2980
S. Vilvovsky, J.Fedorowicz, A. Golibersuch
Intentions to Use Virtual Worlds: An Exploratory Study .........................................................................2992J. Shen, L. Eder
Second Life: Community and Society as a Focus for Marketing Approaches.........................................2999R. Hooker, D. Paradice
Towards World of Warcraft as an Experiment Platform for Teams .......................................................3010A. Dannecker, S. Richter, U. Lechner, N. Dressner, S. Fabisch, A. Ilsemann
Piloting RFID in an Aerospace and Defense Supply Chain.......................................................................3024A. Tewary, P. Kosalge, J. Motwani
E-Transcript Web Services System Supporting Dynamic Conversion Between XML and EDI............3036M. Kwak, W. Kang, G. Leroy, S. Chatterjee
Knowing A Few Rules Doesn’t Mean You Can Play the Game: The Limits of “Best Practice” in Enterprise Systems...................................................................................................................3045
P. Devadoss, M. Chiasson, R. Fuente
Exploring Different Roles of Information Technology for Increasing Productivity: Manufacturing vs. Service Industries..........................................................................................................3052
J. Moon, S. Jo, H-K. Lee, S-O. Kwon
An Exploratory Study on Environmental Sustainability and IT Use .......................................................3063L. Sayeed, S. Gill
An Ethnorelative Framework for Information Systems Design ...............................................................3070D. Saab
A Preliminary Investigation of the Moderating Affects of National Culture and Regulation on the Relationship between Innovation and Performance of Information Service Firms ....................3081
K. Bagchi, P. Kirs
A Conceptual Model for Explaining Violations of the Information Security Policy (ISP): a Cross Cultural Perspective ...........................................................................................................................3089
K. Alshare, P. Lane
Cross Cultural Study of Multimedia Effects on First Impression Bias ....................................................3099X. Fang, T. Rajkumar
An Investigation into the Relationship between Gender Perception of Computing, Computer Self-efficacy, and Anxiety: Comparison between the US and India .......................................3105
K. Laosethakul, T. Leingpibul
Culture and IS: A Criticism of Predefined Cultural Archetypes Studies ................................................3113M. Ali, L. Brooks
Project Management Techniques for Managing Cross-Cultural Differences in IT Offshore Outsourcing ...................................................................................................................................................3124
M. Prifling, R. Gregory, R. Beck
A Bayesian-Decision Analysis Framework for the Financial Evaluation of Automatic Incident Detection Devices............................................................................................................................3133
P. Pendharkar
Updating Data Warehouses with Temporal Data ......................................................................................3139N. Rahman
The Effect of Individual Differences, Tasks, and Decision Models on User Acceptance of Decision Support Systems.............................................................................................................................3147
Y. Liu, A. Chen
A New Method for Conflict Resolution Based on Multiagent Reinforcement Learning Algorithms .....................................................................................................................................................3158
D. Li, Ju Jiang, H. Gong, J. Liu, B. Jiang
How the Web Influences the Way We Perceive and Evaluate Goods: An Exploratory Study ..............3166Y. Wan, M. Nakayama, N. Sutcliffe
Exploring the Relationship Between Knowledge Management and Organizational Learning Via Fuzzy Cognitive Mapping .....................................................................................................3175
A. Sharif, Z. Irani
Research in Healthcare DSS: Where Do We Go from Here? ...................................................................3186W. Landrum, J. Huscroft, T. Peachey, D. Hall
An Ontology-based Approach for Model Representation, Sharing and Reuse .......................................3194A. Deokar, O. El-Gayar, N. Taskin, R. Aljafari
Adoption of Information Technology by Micro-enterprises: Insights from a Rural Community .........3203S. Qureshi, M. Kamal, T. Good
Acculturation to the Global Culture, Ethnic Identification and the Adoption of Social Computing .....................................................................................................................................................3214
R. Ayouby, A. Croteau
A Model for Understanding Success of Virtual Community Management Teams .................................3224C. Rosenkranz, C. Feddersen
A Service Integration Model of Value Creation: A Study of Commercial Online Communities..................................................................................................................................................3234
J. Cai, L. Qiu, F. Ren
Online Consumer Reviews: Does Negative Electronic Word-of-Mouth Hurt More? .............................3242C. Cheung, M.K.O. Lee
Virtual Organizations in Practice: A European Perspective.....................................................................3252A. Abuelmaatti, Y. Rezgui
Antecedents of Behavioral Intention of Virtual Community Participation: An Empirical Study .........3261H. Li, V. Lai
Economics of Virtual Communities – The Case of the Berlin Stock Exchange .......................................3270J. vom Brocke, C. Sonnenberg, C. Lattemann, S. Stieglitz
The Benefits of Unexpected Informal Customer Support from Vendors in Online Communities ........3281Y. Merin, W. Wang
From Dichotomy to Ambidexterity: Transcending Traditions in Software Management .....................3289N. Napier, L. Mathiassen, D. Robey
Requirement Prioritization Decision Factors for Agile Development Environments .............................3298G. Hoff, A. Fruhling, K. Ward
Integrating Lightweight Systems Analysis into the Unified Process by Using Service Responsibility Tables ....................................................................................................................................3309
X. Tan, S. Alter, K. Siau
Systems Analysis Using the Transtheoretical Model of Behavioral Change: Encouraging Adoption of “Best Practices” Over “Standard Practices” .........................................................................3319
M. Benton, M. Tremaine
Understanding Use Cases: Harnessing the Power of Narratives to Comprehend Application Domains..........................................................................................................................................................3328
M. Hvalshagen, V. Khatri, R. Venkataraman
The Impact of Operating System Obsolescence on the Life Cycle of Distributed Systems ....................3336H. Mattord, T. Bandyopadhyay
The Overreliance on Analyst Experience in the Selection of Requirements Elicitation Techniques .....................................................................................................................................................3343
R. Fuller, C. Davis
A Software Release Planning Methodology for Developers ......................................................................3353J. Jewer, K. McKay
Application of Domain Ontology for Decision Support in Medical Emergency Coordination ..............3364F. Sujanto, F. Burstein, A. Ceglowski, L. Churilov
Information Theoretic Approach to Design of Emergency Response Systems........................................3374R. Chen, R. Sharman, H. Rao, S. Upadhyaya
Using Biometric Authentication to Improve Fire Ground Accountability: An Assessment of Firefighter Privacy Concerns...................................................................................................................3384
D. Carpenter, A. McLeod Jr., J. Clark
A Model of Error Propagation in Satisficing Decisions and its Application to Database Quality Management ....................................................................................................................................3394
I. Gelman
A Framework for Classification of the Data and Information Quality Literature and Preliminary Results (1996-2007) ..................................................................................................................3405
M. Neely, J. Cook
Towards a Semantic Data Quality Management – Using Ontologies to Assess Master Data Quality in Retailing .......................................................................................................................................3419
J. Becker, M. Matzner, O. Muller, A. Winkelmann
Volume 6
The Economic Sciences and the Information Age: Lessons from the Nobel Laureates ..........................3430
P. Alexander, J. Alexander
Impacts of Social Network Structure on Knowledge Sharing in Open Source Software Development Teams ......................................................................................................................................3439
Y. Long, K. Siau
Open Source Software in Complex Domains: Current Perceptions in the Embedded Systems Area .................................................................................................................................................3449
B. Lundell, B. Lings, A. Syberfeldt
Toward a Theory of Socialization in Open Source Software Communities: A Symbolic Interactionist Perspective .............................................................................................................................3456
J. Devan, D. DiTullio
Lessons Learned from the Development and Marketing of Mozilla Firefox Browser ............................3464L. Jin, B. Robertson
A Cooperative Analysis Framework for Investment Decisions in Community Source Partnerships...................................................................................................................................................3473
M. Liu, D. Zeng, J. Zhao
A Comparison of Evaluation Networks and Collaboration Networks in Open Source Software Communities..................................................................................................................................3484
D. Hu, J. Zhao
Uma Análise do Nível de Maturidade do Alinhamento Estratégico entre Negócio e Tecnologia de Informação ............................................................................................................................3492
A. Brodbeck, E. Rigoni, N. Hoppen
Evaluation of Information Technology Business Value: Review theoretical and Initial Study in a Brazilian Industry .......................................................................................................................3500
M. Neto, F. Viana, M. Anez
Factores que Influyen la Decisión de Tecnologías de Información“Outsource” .....................................3513 L. Flores, C. Navarrete, J. Gomez
Orientação do Alinhamento Estratégico entre Negócio e Tecnologia de Informação: uma Análise Focada no Processo de Desenvolvimento de Produtos .................................................................3529
E. Tonollli, A. Brodbeck
El Impacto del Adiestramiento, Habilidades en Tecnología de la Información y Gerencia de Proyectos en el Éxito de Implementaciones de Sistemas Integrados de Planificación de Recursos Empresariales (ERP) en la Pequeña y Mediana Empresa: Una investigación empírica en América Latina.........................................................................................................................3538
M. Maldonado, M. Santana, O. Lorenzo
Mobile Telephony in Latin America: New Opportunities to Reduce Poverty? .......................................3551C. Bonina, M. Illa
Una Experiencia de Vinculación entre un Programa Académico, las Necesidades de la Industria y las Tendencias de la Disciplina .................................................................................................3561
M. Mejia, J. Incera, M. Conway
Participación de los Usuarios en la Evaluación de Sistemas de Información ..........................................3568J. Reynoso, M. Sandoval
Análisis de los Roles De Liderazgo en la Implementación de Sistemas Empresariales (ERP). Caso de una Universidad Mexicana ................................................................................................3578
N. Sanchez, P. Santiago, J. Mendoza, J. Martinez-Herrejon
Identity Meanings and Online Interactions of Hybrid Transnational Communities of Immigrants ....................................................................................................................................................3588
E. Hueta, C. Navarrete
Mapas de Conocimiento: Caso Práctico en una Entidad Gubernamental ...............................................3596E. Vilcapoma-Escurra, J. Robles-Flores
Clusterización de la Industria de Software en México...............................................................................3606C. Dorantes, J. Torres
Social Cognitive Theory: Information Security Awareness and Practice ................................................3614S. Galvez, I. Guzman
Exploratory Study of the Factors that Influence the Adoption of Electronic Commerce in a Latin-American Context...............................................................................................................................3625
E. Grandon, N. Poblete
B2C Advice on Complex Service Products via Video Calls: Explanations from Social Presence and Adaptive Structuration Theory ............................................................................................3634
M. Schmidt, R. Walczuch, K. deRuyter
Being Interrupted by Instant Messaging: Does it Matter Who is Interrupting - the Boss or the Coworker? ...............................................................................................................................................3641
A. Gupta, H. Li
Collaborative Worlds and Avatar-Based Communication: A Comparison of Virtual Worlds with Traditional and Computer-Mediated Communications Media ..........................................3648
S. Goh, D. Paradice
IT Outsourcing: Examined Under the Resource-Based View Lens..........................................................3657S. Wunnava, S. Ellis, M. Kroll, J. Watkins
Stakeholder Analysis Framework for IT Enabled Healthcare Outsourcing: Critical Success Factors ..............................................................................................................................................3662
S. Chatterjee, L. Obal, B. Tulu, S. Murthy
Boundary Spanning Capabilities in Offshored Information Systems Development Projects: A Conceptual Framework ............................................................................................................................3676
P. Krishman, C. Ranganathan
Revising the IT Outsourcing Decision Model: A Transaction Cost Perspective .....................................3685F. Alaghehband, S. Wu, S. Rivard, S. Goyette
Deriving a Holistic Performance Measurement System for the European Clearing Industry...............3695M. Chlistalla, T. Schaper
Requirements Specification for Supply Chain Controlling – a Mini Case Study....................................3708M. Laumann
A Fuzzy Logic Approach to Prove Bullwhip Effect in Supply Chains .....................................................3718M. Zarandi, M. Avazbeigi
Calculating the Process Driven Business Value of RFID Investments – A Causal Model for the Measurement of RFID Technologies in Supply Chain Logistics ........................................................3729
J. Becker, L. Vilkov
Facilitating Flexibility in Supply Chain Organizations: The Confounding Effect of Information....................................................................................................................................................3739
J. Skipper, W. Landrum, J. Huscroft, D. Hall, T. Peachey, J. Hanna
IT Portfolio Management: A Case Study ....................................................................................................3749J. Burke, M. Shaw
Language-critical Enterprise and Software Engineering ..........................................................................3760E. Ortner
An Exploratory Study Comparing the Core Concepts of Information Systems Development and Software Engineering .....................................................................................................3772
N. Hassan, L. Mathiassen
Understanding Factors Influencing Proficient Information Systems Usage............................................3781B. Eschenbrenner, F. Nah
Improving End-User Satisfaction through Techno-Stress Prevention: Some Empirical Evidences........................................................................................................................................................3789
Q. Tu, M. Tarafdar, T. Ragu-Nathan, B. Ragu-Nathan
User Adoption of a CRM-based Information System within a Financial Services Organisation: An Empirical Analysis..........................................................................................................3797
A. Sharif, Z. Irani
Understanding the Motivations of Customer Knowledge Sharing in Online Community .....................3808S. Shek, C-L. Sia
Isolation and Emotions in the Workplace: The Influence of Perceived Media Richness and Virtuality........................................................................................................................................................3815
J. Pallud, C. Elie-Dit-Cosaque
Knowledge Management Culture Audit: Capturing Tacit Perceptions and Barriers ............................3824M. Levy, I. Hadar, S. Greenspan, E. Hadar
They Call For Help, But Don’t Always Listen: The Development of the User-Help Desk Knowledge Application Model .....................................................................................................................3832
C. Carr, P. Bateman, S. Navlakha
Developing Knowledge Absorptive Capacity of SMEs in China...............................................................3844A. Yu, X-Y. Dong, D-J. Qi
The Impacts of Socio-economic and Cultural Factors on the Network Readiness of Nations: A Focus on the Regions of Africa .................................................................................................3853
P. Ifinedo
Learning from the Past & Charting the Future of IS Research on Africa: Reflections on Information Systems Research on Africa within Western Information Systems Journals ....................3863
P. Meso
Information Systems Ph.D. Program in Africa: The Case of Addis Ababa University - Ethiopia ........3877S. Negash, R. Watson
Service Management in Operations.............................................................................................................3884S. Conger, M. Winniford, L. Erickson-Harris
Quality of IS in Services: Theory of Constructs for Service, Information, and System .........................3894Y. Ding
Using ITIL to Improve IT Services..............................................................................................................3903K. Duffy, B. Denison
A Reference Process Model for IT Service Management ..........................................................................3912M. Rohloff
Towards a Generic Governance Model for Service-oriented Architectures ............................................3922M. Niemann, J. Eckert, N. Repp, R. Steinmetz
Error Reduction in Healthcare Delivery .....................................................................................................3932D. Poo, S. Sethi, A. Ratty
Examining HIV and Tuberculosis using a Decision Support Systems Computer Simulation Model: The Case of the Russian Federation ...............................................................................................3938
R. Lebcir, R. Atun, R. Coker
Assessing Hospital Information Systems Processes: A Validation of PRISE Information Systems Success Model In.............................................................................................................................3956
S. Ozkan, N. Baykal, M. Sincan
Technology Management Competency of Healthcare IS Professionals and Its Effects on IT-healthcare Partnerships ..........................................................................................................................3968
J-H. Wu, Y-C. Chen
Cost Of Controlling Modern Healthcare With Information Systems ......................................................3978M. Guah, K. Fink
Quality Assurance Based Healthcare Information System Design ...........................................................3986M. Shaw, B. Stahl
Health Service Providers’ Preferences in ICT Use for Health Service Delivery in Namibia..................3995M. Shivute, V. Owei, B. Maumbe
Toward Adopting a Nationwide Health Information Network (NHIN): Promises and Challenges ......................................................................................................................................................4013
N/A
Dynamic Healthcare Connectivity and Collaboration with Multi-Agent Systems ..................................4023J. Woodside
Prospective Analysis of the Mobile Health Information Systems in China..............................................4032X. Li
Towards a Knowledge-Based Secure Healthcare Resource Balancing System .......................................4041A. Immonen, R. Bali, N. Wickramasinghe
Health Informatics: A UK and Canadian Perspective on Current and Future Challenges ...................4046V. Baskaran, R. Bali, H. Arochena, R. Naguib, M. Khanapi, B. Shah, A. Guergachi, C. Byrne, N. Wickramasinghe
A Flexible Telemedicine Framework for the Continuous Upkeep of Patient Lifetime Health Records (F2U-LHR)......................................................................................................................................4052
V. Baskaran, R. Bali, R. Naguib, M. Ghani, I. Marshall, J. Puentes, N. Wickramasinghe
Bridging Care Communication and Health Management within Diverse and Underserved Populations ....................................................................................................................................................4064
N. Botts, T. Horan
Finding a Grassroots Voice for Consumer Empowerment in E-healthcare: a State Level Perspective Using the Grounded Theory Investigation .............................................................................4072
S. Drye Cannoy, A. Salam, L. Iyer
A Monte Carlo Investigation of Partial Least Squares, with Implications for Both Structural and Measurement Models..........................................................................................................4083
M. Aguirre-Urreta, G. Marakas, M. Ellis, W. Sun
Courting Multidisciplinary Illiteracy ..........................................................................................................4097N. Hassan
Author Index