Showing papers in "Information & Management in 2009"
••
TL;DR: Support is found for the relationships that encompass the model of IS success by aggregating the results of 52 empirical studies that examined relationships within the IS success model at the individual level of analysis.
604 citations
••
TL;DR: These findings advance knowledge of IT adoption and suggest that it should start to identify the contexts of both the benefits of use and in learning to use the system.
466 citations
••
TL;DR: A model that went beyond intention and included key relational concepts (satisfaction, value, loyalty, etc.) was developed and trust and its components are a major part of this model, which was based on strong theoretical foundations.
399 citations
••
TL;DR: This study explored the effect of national culture on consumer acceptance of e-commerce in China and adopted Hofstede's cultural dimensions (power distance, individualism, masculinity, uncertainty avoidance, and long-term orientation) as moderators.
375 citations
••
TL;DR: This study showed that switching costs positively moderated the effect of customer satisfaction on customer loyalty and thus customer loyalty to an e-commerce website.
345 citations
••
TL;DR: A distinction was made between two approaches towards managing knowledge sharing: an emergent approach, focusing on the social dynamics between organizational members and the nature of their daily tasks, and an engineering approach, focus on management interventions to facilitate knowledge transfer.
330 citations
••
TL;DR: Empirically examined the degree to which three industry characteristics influenced the impact of each type of IT capability on measures of financial performance and found there was general support for the posited contingency model.
320 citations
••
TL;DR: In this article, international information security management guidelines play a key role in managing and certifying organizational IS, and they should be seen as a library of material on information management for practitioners. But they do not pay enough attention to the differences between organizations and the fact that their security requirements are different.
289 citations
••
TL;DR: The findings suggested that traditional project management risks were important in both contexts; however, the offshore context seemed to be more vulnerable to some traditional risks as well as factors that were unique to it.
268 citations
••
TL;DR: It is decided that an iterative approach to implementing smart phone adoption was effective and managerial implications are discussed.
253 citations
••
TL;DR: This study examined the actions of a customer when inferring product information from electronic word-of-mouth (eWOM) material at a website and developed a customer purchase intention model and simulated various eWOM levels within this, adopting an objectivity-subjectivity dichotomy.
••
TL;DR: The results indicated that, on average, the announcement of a corporate security breach had a negative impact of about 1% of the market value of the firm during the days surrounding the event.
••
TL;DR: Analysis provided strong support for the hypotheses that gender exerted a significant moderating role on model relationships and the influence of trust on commitment and of commitment on loyalty was significantly stronger for females than males.
••
TL;DR: This work investigated cognitive engagement, prior experience, computer anxiety, and organizational support as determinants of CSE in the use of a multimedia ERP system's training tool and determined the benefits of a sequential multi-method approach using structural equation modeling and neural network analysis.
••
TL;DR: In this article, the authors applied a multi-channel store image perspective to assess its influence on online purchase intentions and found that offline and online store perceptions directly influenced online purchase intention.
••
TL;DR: Cyber incivility has negative consequences on both individuals and organizations, so it is important that firms educate employees and have appropriate policies to discourage cyber incvility.
••
TL;DR: IT usage models are extended to include the role of IT's perceived work compatibility in shaping users' IT usage intention, usage, and performance in work settings to better explain IT usage in personal-settings.
••
TL;DR: It is found that the CIOs' role has evolved to reflect both the firm's IS infrastructure and strategy, and this has led to two versions of the role: an executive-level manager focused on the company's strategy and processes, and a technicalmanager focused on minimizing costs by rationalizing and leveraging the existing IS infrastructure.
••
TL;DR: The dimensions of social relationship and its importance in the use of a KMS by employees are explored and social capital theory was employed to establish the social relationship construct and its three dimensions: tie strength, shared norms, and trust.
••
TL;DR: It is found that workplace characteristics out-predicted job characteristics, however, this was true only for programmer/analysts and the reverse was true for technical support personnel.
••
TL;DR: A multidimensional definition of IT infrastructure (ITI) was developed and applied in exploring the perceived strategic payoffs of ITI-enabled flexibility and showed that large organizational size or reporting to the CEO reduced the positive effects of the range of managerial ITI capabilities on competitive impacts.
••
TL;DR: It was showed that perceived BPO benefits have a substantially stronger impact on intention to increase the level of BPO than perceived risks, and the experience that banks have with the BPO process moderated the impact of factors affecting the perceived risks and benefits.
••
TL;DR: The factors influencing the adoption of Internet Protocol Television were determined by surveying 320 consumers using a modified TAM as a conceptual framework and SEM for analysis and perceived quality of the content and system and perceived playfulness.
••
TL;DR: The findings highlighted the significant potential of RFID when it is integrated with other technologies such as global positioning or product life cycle management systems.
••
TL;DR: The results demonstrated that the effect of B2B supply chain integration on financial, market, and operational performance decreased as product turbulence and demand unpredictability jointly increased.
••
TL;DR: The authors' findings placed IS service quality in a causal network leading to IS service reuse and highlighted the relative importance that service quality value played in predicting behavioral intention to reuse the service.
••
TL;DR: The findings indicated that a voluntary developer's involvement was very important to his or her performance and that involvement was dependent on individual motivations and project community factors.
••
TL;DR: It is found that for a sample of 108 students in an systems analysis and design course, self-efficacy was positively and significantly related to performance, and that performance was positive and significant related to subsequent self- efficacy.
••
TL;DR: An analysis based on subjects' responses after using a hypothetical shopping website confirmed the two-sided nature of personalized recommendations, suggesting that the approach and avoidance strategies in persuasive communications can be effectively applied to personalized recommendation services on the web.
••
TL;DR: A study of a social security smart card project developed and now operating in Shanghai demonstrates how localized e-government efforts may be implemented throughout the tiers of the municipal government, to present an e- government model that can be diffused to other parts of the country.