scispace - formally typeset
Search or ask a question

Showing papers in "Information & Management in 2009"


Journal ArticleDOI
TL;DR: Support is found for the relationships that encompass the model of IS success by aggregating the results of 52 empirical studies that examined relationships within the IS success model at the individual level of analysis.

604 citations


Journal ArticleDOI
TL;DR: These findings advance knowledge of IT adoption and suggest that it should start to identify the contexts of both the benefits of use and in learning to use the system.

466 citations


Journal ArticleDOI
TL;DR: A model that went beyond intention and included key relational concepts (satisfaction, value, loyalty, etc.) was developed and trust and its components are a major part of this model, which was based on strong theoretical foundations.

399 citations


Journal ArticleDOI
TL;DR: This study explored the effect of national culture on consumer acceptance of e-commerce in China and adopted Hofstede's cultural dimensions (power distance, individualism, masculinity, uncertainty avoidance, and long-term orientation) as moderators.

375 citations


Journal ArticleDOI
TL;DR: This study showed that switching costs positively moderated the effect of customer satisfaction on customer loyalty and thus customer loyalty to an e-commerce website.

345 citations


Journal ArticleDOI
TL;DR: A distinction was made between two approaches towards managing knowledge sharing: an emergent approach, focusing on the social dynamics between organizational members and the nature of their daily tasks, and an engineering approach, focus on management interventions to facilitate knowledge transfer.

330 citations


Journal ArticleDOI
TL;DR: Empirically examined the degree to which three industry characteristics influenced the impact of each type of IT capability on measures of financial performance and found there was general support for the posited contingency model.

320 citations


Journal ArticleDOI
TL;DR: In this article, international information security management guidelines play a key role in managing and certifying organizational IS, and they should be seen as a library of material on information management for practitioners. But they do not pay enough attention to the differences between organizations and the fact that their security requirements are different.

289 citations


Journal ArticleDOI
TL;DR: The findings suggested that traditional project management risks were important in both contexts; however, the offshore context seemed to be more vulnerable to some traditional risks as well as factors that were unique to it.

268 citations


Journal ArticleDOI
TL;DR: It is decided that an iterative approach to implementing smart phone adoption was effective and managerial implications are discussed.

253 citations


Journal ArticleDOI
Jung Lee1, Jae-Nam Lee1
TL;DR: This study examined the actions of a customer when inferring product information from electronic word-of-mouth (eWOM) material at a website and developed a customer purchase intention model and simulated various eWOM levels within this, adopting an objectivity-subjectivity dichotomy.

Journal ArticleDOI
TL;DR: The results indicated that, on average, the announcement of a corporate security breach had a negative impact of about 1% of the market value of the firm during the days surrounding the event.

Journal ArticleDOI
TL;DR: Analysis provided strong support for the hypotheses that gender exerted a significant moderating role on model relationships and the influence of trust on commitment and of commitment on loyalty was significantly stronger for females than males.

Journal ArticleDOI
TL;DR: This work investigated cognitive engagement, prior experience, computer anxiety, and organizational support as determinants of CSE in the use of a multimedia ERP system's training tool and determined the benefits of a sequential multi-method approach using structural equation modeling and neural network analysis.

Journal ArticleDOI
TL;DR: In this article, the authors applied a multi-channel store image perspective to assess its influence on online purchase intentions and found that offline and online store perceptions directly influenced online purchase intention.

Journal ArticleDOI
TL;DR: Cyber incivility has negative consequences on both individuals and organizations, so it is important that firms educate employees and have appropriate policies to discourage cyber incvility.

Journal ArticleDOI
TL;DR: IT usage models are extended to include the role of IT's perceived work compatibility in shaping users' IT usage intention, usage, and performance in work settings to better explain IT usage in personal-settings.

Journal ArticleDOI
TL;DR: It is found that the CIOs' role has evolved to reflect both the firm's IS infrastructure and strategy, and this has led to two versions of the role: an executive-level manager focused on the company's strategy and processes, and a technicalmanager focused on minimizing costs by rationalizing and leveraging the existing IS infrastructure.

Journal ArticleDOI
TL;DR: The dimensions of social relationship and its importance in the use of a KMS by employees are explored and social capital theory was employed to establish the social relationship construct and its three dimensions: tie strength, shared norms, and trust.

Journal ArticleDOI
TL;DR: It is found that workplace characteristics out-predicted job characteristics, however, this was true only for programmer/analysts and the reverse was true for technical support personnel.

Journal ArticleDOI
TL;DR: A multidimensional definition of IT infrastructure (ITI) was developed and applied in exploring the perceived strategic payoffs of ITI-enabled flexibility and showed that large organizational size or reporting to the CEO reduced the positive effects of the range of managerial ITI capabilities on competitive impacts.

Journal ArticleDOI
TL;DR: It was showed that perceived BPO benefits have a substantially stronger impact on intention to increase the level of BPO than perceived risks, and the experience that banks have with the BPO process moderated the impact of factors affecting the perceived risks and benefits.

Journal ArticleDOI
TL;DR: The factors influencing the adoption of Internet Protocol Television were determined by surveying 320 consumers using a modified TAM as a conceptual framework and SEM for analysis and perceived quality of the content and system and perceived playfulness.

Journal ArticleDOI
TL;DR: The findings highlighted the significant potential of RFID when it is integrated with other technologies such as global positioning or product life cycle management systems.

Journal ArticleDOI
TL;DR: The results demonstrated that the effect of B2B supply chain integration on financial, market, and operational performance decreased as product turbulence and demand unpredictability jointly increased.

Journal ArticleDOI
TL;DR: The authors' findings placed IS service quality in a causal network leading to IS service reuse and highlighted the relative importance that service quality value played in predicting behavioral intention to reuse the service.

Journal ArticleDOI
TL;DR: The findings indicated that a voluntary developer's involvement was very important to his or her performance and that involvement was dependent on individual motivations and project community factors.

Journal ArticleDOI
TL;DR: It is found that for a sample of 108 students in an systems analysis and design course, self-efficacy was positively and significantly related to performance, and that performance was positive and significant related to subsequent self- efficacy.

Journal ArticleDOI
TL;DR: An analysis based on subjects' responses after using a hypothetical shopping website confirmed the two-sided nature of personalized recommendations, suggesting that the approach and avoidance strategies in persuasive communications can be effectively applied to personalized recommendation services on the web.

Journal ArticleDOI
TL;DR: A study of a social security smart card project developed and now operating in Shanghai demonstrates how localized e-government efforts may be implemented throughout the tiers of the municipal government, to present an e- government model that can be diffused to other parts of the country.