scispace - formally typeset
Search or ask a question

Showing papers in "European Journal of Information Systems in 2007"


Journal ArticleDOI
TL;DR: This model elaborates the interdependent and asymmetric effects of inhibiting usage perceptions on HIT usage intentions relative to enabling perceptions, such as perceived usefulness and perceived ease of use, and proposes perceived threat as a predictor of resistance.
Abstract: This paper presents a theoretical model of physician resistance of healthcare information technology (HIT) usage by integrating the technology acceptance and resistance to change literature...

552 citations


Journal ArticleDOI
TL;DR: Although conceptually distinct, online shopping habit and online shopping experience have similar effects on repurchase intention, they both have positive mediated effects through satisfaction and moderate the relationship between satisfaction and online repurchase intend.
Abstract: In this study, we further develop the information systems continuance model in the context of online shopping, using a contingency theory that accounts for the roles of online shopping habit and online shopping experience. Specifically, we argue and empirically demonstrate that although conceptually distinct, online shopping habit and online shopping experience have similar effects on repurchase intention. They both have positive mediated effects through satisfaction and moderate the relationship between satisfaction and online repurchase intention. The results of a survey study involving 122 online customers provide strong support for our research model. We also identify after-sale service, transaction efficiency, security, convenience, and cost savings as important online shopping usefulness drivers. Theoretical and practical implications include establishing a contingency theory to more fully explain online customer retention as well as guidelines for development of customer relationship management initiatives.

415 citations


Journal ArticleDOI
TL;DR: This research provides a framework that explains Extended Use and is one of the few studies that investigates IS use behavior that exceeds simple, shallow, and routine use.
Abstract: Investments in complex information systems by organizations reached a record high of U.S.$26.7 billion in 2004. Yet, organizations seldom use these systems to the fullest extent and attain the expe...

383 citations


Journal ArticleDOI
TL;DR: The results of this study suggest the need for caution in applying TAM in at least 20 countries, and demonstrate that although the model has been successful in predicting adoption behaviours in some international settings, it might not hold in all cultures.
Abstract: The technology acceptance model (TAM) is one of the most widely used behavioural models in the information systems (IS) field. Researchers have used the model to study many different IS adoption situations and contexts, and it usually demonstrates validity and reliability. Although TAM was developed in the U.S., the TAM model has also been used in other countries. Transferring a model to another cultural context should be subjected to rigorous testing, and a few studies have begun to examine the applicability of TAM in a small variety of cultures. This study contributes to the growing multi-cultural examination of TAM, and demonstrates that although the model has been successful in predicting adoption behaviours in some international settings, it might not hold in all cultures. Almost 4000 students from several universities around the world provided the data for the study. Data analysis revealed that the TAM model does not hold for certain cultural orientations. Most significantly, low Uncertainty Avoidance, high Masculinity, high-Power Distance, and high Collectivism seem to nullify the effects of Perceived Ease of Use and/or Perceived Usefulness. Since TAM has been shown to be widely applicable to various technological innovations, it is likely to continue to be applied broadly and globally. However, the results of this study suggest the need for caution in applying TAM in at least 20 countries.

316 citations


Journal ArticleDOI
TL;DR: This study investigates the underlying motivations and driving forces behind the adoption of RFID using the theory of technology-push and need-pull and found that the relationships between those three categories and the likelihood of adopting RFID are strengthened or weakened by organizational readiness.
Abstract: This study examines the radio frequency identification (RFID) adoption decision process and proposes a model predicting the likelihood of adopting RFID within organizations in the healthcare indust...

294 citations


Journal ArticleDOI
TL;DR: An evaluative design framework for e-Government projects that complements traditional approaches to IS evaluation is developed based upon Moor's concept of public value, which focuses upon citizens' and clients' experiences of service provision and service outcomes as contributors to the formation of public trust.
Abstract: e-Government systems differ from commercial information systems (IS) in that they frequently encompass strategic goals that go beyond efficiency, effectiveness and economy, and include political and social objectives such as trust in government, social inclusion, community regeneration, community well-being and sustainability. Designing e-Government systems that help to meet these objectives is a significant challenge for the future. This paper develops an evaluative design framework for e-Government projects that complements traditional approaches to IS evaluation. The framework is based upon Moor's concept of public value. It focuses upon citizens' and clients' experiences of service provision and service outcomes as contributors to the formation of public trust. Trust is shown to be related to the extent to which people feel that an e-Government service enhances their sense of being well-informed, gives them greater personal control, and provides them with a sense of influence or contingency. The framework's development and validation are founded upon analyses of a two live case studies in south-east England and London, U.K.

284 citations


Journal ArticleDOI
TL;DR: Using data from six public sector information-sharing projects, this paper reveals how some managerial and cultural impediments limit perceptions of expected benefits and provides managers with specific advice on how to better understand users' perceptions and expectations.
Abstract: Information-sharing projects are becoming increasingly important in both public and private organizations. Generally, organizations base their decision to move forward with an information-sharing p...

281 citations


Journal ArticleDOI
TL;DR: This paper draws on actor-network theory to provide a perspective that is used to explain the trajectory of an e-Government case study and offers insights into e- government leadership as a process of network formation and maintenance; and into the tensions between network stability and design stabilisation.
Abstract: A number of models have been offered to help explain the trajectories of e-Government projects: their frequent failures and their rarer successes. Most, though, lack a sense of the political intera...

234 citations


Journal ArticleDOI
TL;DR: The analysis of the VIEGO workshops depicted that an e-Government research agenda involves a combination of social, technological and organisational issues at both governmental and individual citizen level, ultimately driven by empirical case-based experience and active participation in e- government processes.
Abstract: This paper presents the findings of an exploratory research project into future e-Government (electronic Government) initiatives. The Virtual Institute for Electronic Government Research (VIEGO) project aimed at identifying and further developing the research agenda of e-Government based on a solid practical ground. As such, the paper offers a novel methodology in identifying the road map for future e-Government initiatives based on a series of workshops organised around the U.K. hosting a mixture of stakeholders involving both academics and practitioners. The analysis of the VIEGO workshops depicted that an e-Government research agenda involves a combination of social, technological and organisational issues at both governmental and individual citizen level, ultimately driven by empirical case-based experience and active participation in e-Government processes. Unlike other propositions for the future of e-Government offered in the e-Government literature, it raised research questions not only originated from an analysis of e-Government literature but also on the outcome of brainstorming, reflections and contemplations throughout the duration of the project.

214 citations


Journal ArticleDOI
TL;DR: Results indicate that perceived critical mass influences use intentions directly and through perceptions of the characteristics of the innovation, and predicts a sizable and significant portion of both attitudes and use intentions.
Abstract: Computer-based communication technologies are increasingly important to personal and organizational communication One important factor related to the adoption and diffusion of communication innovations is critical mass Critical mass influences the adoption and diffusion of interactive communication innovations, both through network externalities and through sustainability of the innovation Unfortunately, critical mass is difficult to measure and is typically only demonstrable after the critical mass point has been reached Potential adopters’ perceptions of critical mass also may be important to adoption decisions In this paper, we extend this thinking using a synthesis of the Theory of Reasoned Action and Diffusion of Innovation theory by developing a research model The model is empirically tested using survey data that are analyzed using partial least squares The focal innovation is instant messaging Results indicate that perceived critical mass influences use intentions directly and through perceptions of the characteristics of the innovation The perceived innovation characteristics impact attitude toward use, which in turn impacts use intentions The model predicts a sizable and significant portion of both attitudes and use intentions Further, perceived critical mass is able to explain a significant portion of the variance in each perceived innovation characteristic Implications for research and practice are discussed

212 citations


Journal ArticleDOI
TL;DR: A structured method is derived to model how actors might be identified and the individual actors' differing views emerge which could enable decision-making bodies to produce more robust proposals if they incorporated some of the appropriate views.
Abstract: The adoption of information systems in healthcare is no less significant than in any other commercial or caring organisation. The literature on IS adoption in healthcare, makes it clear that the ac...

Journal ArticleDOI
TL;DR: PLS analysis of survey data collected from 209 employees in seven organizations that had engaged in a large-scale IT implementation revealed that project champion charisma was positively associated with increased performance expectancy, effort expectancy, social influence and facilitating condition perceptions of users.
Abstract: Although there is widespread agreement that leadership has important effects on information technology (IT) acceptance and use, relatively little empirical research to date has explored this phenomenon in detail. This paper integrates the unified theory of acceptance and use of technology (UTAUT) with charismatic leadership theory, and examines the role of project champions influencing user adoption. PLS analysis of survey data collected from 209 employees in seven organizations that had engaged in a large-scale IT implementation revealed that project champion charisma was positively associated with increased performance expectancy, effort expectancy, social influence and facilitating condition perceptions of users. Theoretical and managerial implications are discussed, and suggestions for future research in this area are provided.

Journal ArticleDOI
TL;DR: In this article, the adoption behavior of small businesses in relation to business-to-business (B2B) trading exchanges in the context of Western Australia has been investigated and the results confirmed that a positive attitude towards B2B trading exchanges leads to the intention to adopt B2Bs in small businesses.
Abstract: Small businesses, in general, play dominant roles in terms of employment generation and share in total business activities. However, studies have shown that small businesses are also slow in their uptake of modern technologies including electronic commerce. This paper presents the result of an empirical study that investigates the adoption behaviour of small businesses in relation to business-to-business (B2B) trading exchanges in the context of Western Australia. Following extensive literature review on innovation adoption–diffusion theories and qualitative field study, a research model was developed which treated six sets of antecedents of small business's attitude towards B2B trading exchanges. The findings revealed that external influences raise the small business's awareness of an innovation. This awareness leads to the evaluation of the perceived direct and indirect benefits and a positive evaluation leads to a positive attitude towards the innovation. The results confirmed that a positive attitude towards B2B trading exchanges leads to the intention to adopt B2B trading exchanges in small businesses. The findings also confirm that external, belief, contextual and control factors drive the attitude towards B2B trading exchanges. Implications of the results are highlighted.

Journal ArticleDOI
TL;DR: A journal ranking for business and management based on a statistical analysis of the Harzing data set which contains 13 rankings is presented, finding a high degree of conformity between them as shown by a principal components analysis.
Abstract: Creating rankings of academic journals is an important but contentious issue. It is of especial interest in the U.K. at this time (2007) as we are only one year away from getting the results of the next Research Assessment Exercise (RAE) the importance of which, for U.K. universities, can hardly be overstated. The purpose of this paper is to present a journal ranking for business and management based on a statistical analysis of the Harzing data set which contains 13 rankings. The primary aim of the analysis is two-fold – to investigate relationships between the different rankings, including that between peer rankings and citation behaviour; and to develop a ranking based on four groups that could be useful for the RAE. Looking at the different rankings, the main conclusions are that there is in general a high degree of conformity between them as shown by a principal components analysis. Cluster analysis is used to create four groups of journals relevant to the RAE. The higher groups are found to correspond well with previous studies of top management journals and also gave, unlike them, equal coverage to all the management disciplines. The RAE Business and Management panel have a huge and unenviable task in trying to judge the quality of over 10,000 publications and they will inevitably have to resort to some standard mechanistic procedures to do so. This work will hopefully contribute by producing a ranking based on a statistical analysis of a variety of measures.

Journal ArticleDOI
TL;DR: In this paper, the authors present metamodel-independent algorithms and associated tools for detecting mappings and differences between domain-specific models, with facilities for graphical visualization of the detected differences.
Abstract: Model differentiation techniques, which provide the capability to identify mappings and differences between models, are essential to many model development and management practices. There has been initial research toward model differentiation applied to Unified Modeling Language (UML) diagrams, but differentiation of domain-specific models has not been explored deeply in the modeling community. Traditional modeling practice using the UML relies on a single fixed general-purpose language (i.e., all UML diagrams conform to a single metamodel). In contrast, Domain-Specific Modeling (DSM) is an emerging model-driven paradigm in which multiple metamodels are used to define various modeling languages that represent the key concepts and abstractions for particular domains. Therefore, domain-specific models may conform to various metamodels, which requires model differentiation algorithms be metamodel-independent and able to apply to multiple domain-specific modeling languages. This paper presents metamodel-independent algorithms and associated tools for detecting mappings and differences between domain-specific models, with facilities for graphical visualization of the detected differences.

Journal ArticleDOI
TL;DR: A conceptual framework, based on institutional theory and systems ontology, is proposed to assess the misalignments between package functionality and organisational requirements and suggests strategies that implementing organisations and package vendors may pursue.
Abstract: Even with today's ‘best practice’ software, commercial packages continue to pose significant alignment challenges for many organisations. This paper proposes a conceptual framework, based on institutional theory and systems ontology, to assess the misalignments between package functionality and organisational requirements. We suggest that these misalignments can arise from incompatibility in the externally imposed or voluntarily adopted structures embedded in the organisation and package, as well as differences in the way the meaning of organisational reality is ontologically represented in the deep or surface structure of packages. The synthesis of the institutional-ontological dimensions leads us to identify four types of misalignments with varying degrees of severity – imposed-deep, imposed-surface, voluntary-deep, and voluntary-surface – and to predict their likely resolution. We test the predictions using over 400 misalignments from package implementations at three different sites. The findings support the predictions: the majority of imposed-deep misalignments were resolved via package customisation. Imposed-surface and voluntary-deep misalignments were more often resolved via organisational adaptation and voluntary-surface misalignments were almost always resolved via organisational adaptation. The extent of project success also appeared to be influenced by the number of misalignments and the proportion of imposed-deep misalignments. We conclude by suggesting strategies that implementing organisations and package vendors may pursue.

Journal ArticleDOI
TL;DR: The analysis finds that usefulness and innovativeness have a positive direct effect on BI with respect to both functions, namely communications and information access, and patients in primary care, as opposed to specialist, provider settings intend to engage in electronic communications.
Abstract: Healthcare providers have recently begun deploying Internet-based patient–physician portals. These applications allow patients to both communicate with their providers and access personal m...

Journal ArticleDOI
TL;DR: The study findings suggest that user perceptions regarding network externalities have a positive impact on use of electronic communication systems while perceptions of problems associated with unsolicited messages and perceived usefulness of alternative systems do not significantly affect system use.
Abstract: Electronic mail (e-mail) and instant messaging (IM) systems represent two communication technologies that are potentially substitutable. A unique feature of e-mail and IM is that their value to an individual user increases as the number of other people adopting the system grows. This is referred to as a positive network externality. This externality makes it difficult for consumers to switch to other systems because of the potential loss of connectivity with network members. Further, as this externality grows, it has unintended negative consequences in the form of spim and spam. Including these three network externality effects – positive, cross-impact, and negative – the present study investigates the determinants of electronic communication system use based on an extended Technology Acceptance Model. The study findings suggest that user perceptions regarding network externalities have a positive impact on use of electronic communication systems while perceptions of problems associated with unsolicited messages and perceived usefulness of alternative systems do not significantly affect system use. This study contributes to our understanding of the factors that affect use of existing and newer alternative communication technologies.

Journal ArticleDOI
TL;DR: The concepts of hospitality and hostility are used to turn attention to the interaction between the host and the guest and consider how the boundaries between them evolved in the everyday work practices of orthopaedic surgeons.
Abstract: The purpose of this paper is to discuss the adoption of healthcare information systems (HIS) from a user perspective. Our case study concerns how a group of orthopaedic surgeons experienced and reacted to the adoption and mandatory use of an Electronic Patient Record system in a Danish hospital. We propose to use the concepts of hospitality and hostility to turn our attention to the interaction between the host (the surgeons) and the guest (the information system) and consider how the boundaries between them evolved in the everyday work practices. As an alternative to previous studies on technology adoption, these concepts help us appreciate and put special emphasis on particular aspects of the adoption process: the mutual and co-constitutive relationship between the users and the technology and the continued co-existence of both positive and negative attitudes among the users. The findings suggest an alternative way of thinking about an adoption process that is considered relevant to managers who strive to ensure successful adoption of HIS.

Journal ArticleDOI
Joe Peppard1
TL;DR: A robust argument is presented as to why it can be difficult for chief information officers (CIOs) to generate business value from investments that their organizations make in information technology with contemporary organizational structures, authority patterns, processes and mindsets.
Abstract: This paper presents a robust argument as to why it can be difficult for chief information officers (CIOs) to generate business value from investments that their organizations make in information technology (IT) with contemporary organizational structures, authority patterns, processes and mindsets. This argument is built on the subtle premise that organizations should not seek to merely manage IT but to manage the delivery of business value through IT. It takes the view that this latter quest is knowledge-based and that the knowledge resources to successfully deliver this value are distributed throughout the organization. Crucially, this knowledge is not located solely within the IT function, presenting a challenge for the CIO for its integration and coordination. With the CIO having little or no jurisdiction over all required knowledge, its deployment will therefore be fragmented. The conundrum of IT management is how to generate value through IT without having access and authority over necessary resources. Research and practitioner implications of this analysis are highlighted.

Journal ArticleDOI
TL;DR: The urgent need for more research on product software and the directions is pointed out and a new framework for the categorization of product software is provided.
Abstract: Both the impact of software on life and our dependence on software is rapidly increasing. Using product software is an everyday phenomenon and product software is a major worldwide industry. Yet, there are very few scientific studies reported on the engineering of product software specifically. In this paper, we discuss specifics of the software business, the various terms used for product software and provide our definition of product software. Moreover, we explain difference between product software and tailor-made software from a software development perspective and provide a new framework for the categorization of product software. This paper points out the urgent need for more research on product software and the directions.

Journal ArticleDOI
TL;DR: This study defines and to prioritize the strengths, weaknesses, opportunities, and threats of SWOT groups and their subfactors for e-Government in Turkey and evaluates the alternative strategies at the national level in Turkey using the SWOT approach in combination with analytic hierarchy process (AHP).
Abstract: The e-Government agenda is being pursued throughout the world to one degree or another, but it has added significance in Central Europe. The region is just beginning to emerge from a period of far-...

Journal ArticleDOI
TL;DR: It is found that the European publication record is disappointing and several constructive reasons are proposed including the lack of appreciation of the article genre, weak publishing cultures, and inadequate Ph.D. preparation for article publishing are proposed.
Abstract: We review the status of European publishing in high-impact Information System (IS) journals finding that the European publication record is disappointing. We consider popular explanations to this state of affairs and find them neither credible nor useful for improving the European record. We propose several constructive reasons for this including (1) the lack of appreciation of the article genre, (2) weak publishing cultures, (3) inadequate Ph.D. preparation for article publishing, (4) weak reviewing practices, (5) poorer command of research methods, (6) poorer understanding of the reviewing protocols, and (7) institutional shaping of research funding in Europe. We formulate several recommendations to affect these causes at the individual, institutional, journal, and European community level.

Journal ArticleDOI
TL;DR: It is found that learning-related scale, related knowledge, and diversity were positively associated with small physician practices' stage of assimilation of EMR technology.
Abstract: Small physician practices play an essential role in the healthcare delivery system but are least likely to adopt health information technologies such as electronic medical records (EMRs) Factors c

Journal ArticleDOI
TL;DR: A brief account of hermeneutics in action is provided through a description of research investigating notions of convenience in home Internet shopping, which enabled the researcher to reveal unexpectedly the practice of using surrogates in Internet shopping.
Abstract: This paper puts forward a case for using hermeneutics in information systems (IS) research. Unlike case study and action research, which could now be described as ‘mainstream’ interpretive research in IS, hermeneutics is neither well accepted nor much practiced in IS research. A suitable hermeneutic approach is described in detail. A brief account of hermeneutics in action is provided through a description of research investigating notions of convenience in home Internet shopping. The hermeneutic circle enabled the researcher to reveal unexpectedly the practice of using surrogates in Internet shopping and this example illustrates some of the potential of the approach in IS research.

Journal ArticleDOI
TL;DR: A social network analysis (SNA) of the European Conference on Information Systems (ECIS) community based on patterns of co-authorship is presented, considering the usefulness of SNA as a method to support IS research.
Abstract: This paper presents a social network analysis (SNA) of the European Conference on Information Systems (ECIS) community based on patterns of co-authorship. ECIS contributions are separated into research papers and panels to create social networks that are then analyzed using a range of global network level and individual ego (co-author, panellist) measures. The research community is found to have few properties of the ‘small world’ and to represent an agglomeration of co-authorships. The panels network has the properties of a ‘small world’ and displays a stronger sense of social cohesion. An analysis of individual actors (egos) provides insight into who is central to the ECIS community. Based on the SNA, a range of possible interventions are proposed that could aid the future development of the ECIS community. The paper concludes by considering the usefulness of SNA as a method to support IS research.

Journal ArticleDOI
TL;DR: The research finds that U.S. counties’ adoption of e-Government is highly associated with certain socioeconomic factors; in addition, the functionalities of U.s. county e- government portals are significantly related to six socioeconomic factors according to the multiple regression analysis.
Abstract: This research presents a comprehensive analysis of U.S. counties’ adoption of e-Government and the functions of the websites. By using content analysis methodology, the services and functions of U.S. county e-Government portals are scrutinized. The investigation instrument is based on political and technological theories, an e-Government stage model, and the review of literature. The research finds that U.S. counties’ adoption of e-Government is highly associated with certain socioeconomic factors; in addition, the functionalities of U.S. county e-Government portals are significantly related to six socioeconomic factors according to the multiple regression analysis. The research provides insights for government officials and practitioners to understand and improve e-Government practice. It also sheds light on e-Government research by bringing in a valuable research instrument and comprehensive data about e-Government adoption. The implications for future research are discussed.

Journal ArticleDOI
TL;DR: A series of papers is presented examining how user perceptions of the characteristics of REVS (Remote Electronic Voting Systems) such as availability, mobility, accuracy, privacy protection and ease of use, affect their intention to use it.
Abstract: According to a report by Kable (a leading provider of public sector research), U.K. central government information and communication technology (ICT) spend, which represents one of the largest in t...

Journal ArticleDOI
TL;DR: This paper reflects on European research on IS as presented during the first 10 years of the European Conference on Information Systems (ECIS), and presents the key characteristics of the ECIS conferences, together with a profile of European IS research activity as presented at ECIS.
Abstract: The information systems (IS) community is truly international, yet there is often a sense that different elements of the community have different profiles in terms of their research and publication expectations. This paper contributes to this discussion by developing a profile of European IS research that can be used as a basis for international comparisons. It reflects on European research on IS as presented during the first 10 years of the European Conference on Information Systems (ECIS). Based on an analysis of all papers published in the ECIS proceedings during the period 1993–2002, the paper presents the key characteristics of the ECIS conferences, together with a profile of European IS research activity as presented at ECIS. In particular, it highlights the key references and sources used by researchers presenting papers at ECIS. It articulates the research areas presented at ECIS and explores the claim that European IS draws more on social theories than elsewhere. Its contribution in presenting a profile of European research in the IS field lies in identifying particular characteristics of the European style of research that can be compared to that undertaken in other parts of the world.

Journal ArticleDOI
TL;DR: The study employs social representations theory and methods to understand how IT professionals today make sense of and assign meaning to burnout in the context of their work, and contributes to the development of a renewed research agenda.
Abstract: Despite the pervasiveness and high costs of burnout in IT, our understanding of this problem remains limited Review of IS research on job stress/burnout reveals that this body of work has relied heavily on general OB theory (parsimonious models generalizable across a variety of occupations and social contexts) More recently, scholars have argued for the addition of an occupation-specific approach to complement general OB theory, incorporating factors and concerns particular to a profession/work environment to increase explanatory power and relevance The purpose of the exploratory study in this paper is to provide a foundation for such an occupation-specific research agenda on burnout in the IT profession As an initial step, we employ social representations theory and methods to understand how IT professionals today make sense of and assign meaning to burnout in the context of their work Transcripts from in-depth interviews of 20 IT professionals were content-analyzed and 22 key topics (concepts) were identified Quantitative methods, including analysis of similarity, were used to create a social representations ‘map’ reflecting these professionals' views of burnout The study contributes to the development of a renewed research agenda by pinpointing highly salient issues and specific work contexts warranting priority in future investigations