scispace - formally typeset
Search or ask a question

Showing papers in "Management Information Systems Quarterly in 2008"


Journal ArticleDOI
TL;DR: The successful completion of most tasks involving more than one individual requires both conveyance and convergence processes, thus communication performance will be improved when individuals use a variety of media to perform a task, rather than just one medium.
Abstract: This paper expands, refines, and explicates media synchronicity theory, originally proposed in a conference proceeding in 1999 (Dennis and Valacich 1999). Media synchronicity theory (MST) focuses on the ability of media to support synchronicity, a shared pattern of coordinated behavior among individuals as they work together. We expand on the original propositions of MST to argue that communication is composed of two primary processes: conveyance and convergence. The familiarity of individuals with the tasks they are performing and with their coworkers will also affect the relative amounts of these two processes. Media synchronicity theory proposes that for conveyance processes, use of media supporting lower synchronicity should result in better communication performance. For convergence processes, use of media supporting higher synchronicity should result in better communication performance. We identify five capabilities of media (symbol sets, parallelism, transmission velocity, rehearsability, and reprocessability) that influence the development of synchronicity and thus the successful performance of conveyance and convergence communication processes. The successful completion of most tasks involving more than one individual requires both conveyance and convergence processes, thus communication performance will be improved when individuals use a variety of media to perform a task, rather than just one medium.

1,275 citations


Journal ArticleDOI
TL;DR: A model is developed that employs behavioral intention, facilitating conditions, and behavioral expectation as predictors of the three conceptualizations of system use that explains 65 percent, 60 percent, and 60 percent of the variance in duration, frequency, and intensity ofSystem use respectively.
Abstract: Employees' underutilization of new information systems undermines organizations' efforts to gain benefits from such systems. The two main predictors of individual-level system use in prior research-behavioral intention and facilitating conditions-have limitations that we discuss. We introduce behavioral expectation as a predictor that addresses some of the key limitations and provides a better understanding of system use. System use is examined in terms of three key conceptualizations: duration, frequency, and intensity. We develop a model that employs behavioral intention, facilitating conditions, and behavioral expectation as predictors of the three conceptualizations of system use. We argue that each of these three determinants play different roles in predicting each of the three conceptualizations of system use. We test the proposed model in the context of a longitudinal field study of 321 users of a new information system. The model explains 65 percent, 60 percent, and 60 percent of the variance in duration, frequency, and intensity of system use respectively. We offer theoretical and practical implications for our findings.

726 citations


Journal ArticleDOI
TL;DR: Differences in the behavioral models between socio-economically advantaged and disadvantaged users who have direct usage experience are theorized and empirically tested and reveal distinct behavioral models and isolate the key factors that differentially impact the two groups.
Abstract: Digital inequality is one of the most critical issues in the knowledge economy. The private and public sectors have devoted tremendous resources to address such inequality, yet the results are inconclusive. Theoretically grounded empirical research is needed both to expand our understanding of digital inequality and to inform effective policy making and intervention. The context of our investigation is a city government project, known as the LaGrange Internet TV initiative, which allowed all city residents to access the Internet via their cable televisions at no additional cost. We examine the residents' post-implementation continued use intentions through a decomposed theory of planned behavior perspective, which is elaborated to include personal network exposure. Differences in the behavioral models between socio-economically advantaged and disadvantaged users who have direct usage experience are theorized and empirically tested. The results reveal distinct behavioral models and isolate the key factors that differentially impact the two groups. The advantaged group has a higher tendency to respond to personal network exposure. Enjoyment and confidence in using information and communication technologies, availability, and perceived behavioral control are more powerful in shaping continued ICT use intention for the disadvantaged. Implications for research and practice are discussed.

604 citations


Journal ArticleDOI
TL;DR: This study argues that offshore outsourcing involves a number of extra costs for the client organization that account for the economic failure of offshore projects, and disaggregate these extra costs into their constituent parts and to explain why they differ between offshored software projects.
Abstract: Gaining economic benefits from substantially lower labor costs has been reported as a major reason for offshoring labor-intensive information systems services to low-wage countries. However, if wage differences are so high, why is there such a high level of variation in the economic success between offshored IS projects? This study argues that offshore outsourcing involves a number of extra costs for the client organization that account for the economic failure of offshore projects. The objective is to disaggregate these extra costs into their constituent parts and to explain why they differ between offshored software projects. The focus is on software development and maintenance projects that are offshored to Indian vendors. A theoretical framework is developed a priori based on transaction cost economics (TCE) and the knowledge-based view of the firm, complemented by factors that acknowledge the specific offshore context. The framework is empirically explored using a multiple case study design including six offshored software projects in a large German financial service institution. The results of our analysis indicate that the client incurs post- contractual extra costs for four types of activities: (1) requirements specification and design, (2) knowledge transfer, (3) control, and (4) coordination. In projects that require a high level of client-specific knowledge about idiosyncratic business processes and software systems, these extra costs were found to be substantially higher than in projects where more general knowledge was needed. Notably, these costs most often arose independently from the threat of opportunistic behavior, challenging the predominant TCE logic of market failure. Rather, the client extra costs were particularly high in client-specific projects because the effort for managing the consequences of the knowledge asymmetries between client and vendor was particularly high in these projects. Prior experiences of the vendor with related client projects were found to reduce the level of extra costs but could not fully offset the increase in extra costs in highly client-specific projects. Moreover, cultural and geographic distance between client and vendor as well as personnel turnover were found to increase client extra costs. Slight evidence was found, however, that the cost-increasing impact of these factors was also leveraged in projects with a high level of required client-specific knowledge (moderator effect).

556 citations


Journal ArticleDOI
TL;DR: A critical review of the work of Giddens and its application in the Information Systems field is presented and it is suggested that there may be significant opportunities for the Information systems field in pursuing structurational research that engages sympathetically, yet critically, with Gidden's work.
Abstract: The work of the contemporary British sociologist Anthony Giddens, and in particular his structuration theory, has been widely cited by Information Systems researchers. This paper presents a critical review of the work of Giddens and its application in the Information Systems field. Following a brief overview of Giddens's work as a whole, some key aspects of structuration theory are described, and their implications for Information Systems research discussed. We then identify 331 Information Systems articles published between 1983 and 2004 that have drawn on Giddens's work and analyze their use of structuration theory. Based on this analysis a number of features of structurational research in the Information Systems field and its relationship to Giddens's ideas are discussed. These findings offer insight on Information Systems researchers' use of social theory in general and suggest that there may be significant opportunities for the Information Systems field in pursuing structurational research that engages sympathetically, yet critically, with Giddens's work.

546 citations


Journal ArticleDOI
TL;DR: The results indicate that some discernible patterns emerge in the relationships between the antecedents and the three groups of IPPR, which could enable researchers to analyze a variety of behavioral responses to information privacy threats in a fairly systematic manner.
Abstract: Although Internet users are expected to respond in various ways to privacy threats from online companies, little attention has been paid so far to the complex nature of how users respond to these threats. This paper has two specific goals in its effort to fill this gap in the literature. The first, so that these outcomes can be systematically investigated, is to develop a taxonomy of information privacy-protective responses (IPPR). This taxonomy consists of six types of behavioral responses-refusal, misrepresentation, removal, negative word-of-mouth, complaining directly to online companies, and complaining indirectly to third-party organizations-that are classified into three categories: information provision, private action, and public action. Our second goal is to develop a nomological model with several salient antecedents-concerns for information privacy, perceived justice, and societal benefits from complaining-of IPPR, and to show how the antecedents differentially affect the six types of IPPR. The nomological model is tested with data collected from 523 Internet users. The results indicate that some discernible patterns emerge in the relationships between the antecedents and the three groups of IPPR. These patterns enable researchers to better understand why a certain type of IPPR is similar to or distinct from other types of IPPR. Such an understanding could enable researchers to analyze a variety of behavioral responses to information privacy threats in a fairly systematic manner. Overall, this paper contributes to researchers' theory-building efforts in the area of information privacy by breaking new ground for the study of individuals' responses to information privacy threats.

540 citations


Journal ArticleDOI
TL;DR: This analysis demonstrates that the information systems academic discipline has maintained a relatively stable research identity that focuses on how IT systems are developed and how individuals, groups, organizations, and markets interact with IT.
Abstract: What is the intellectual core of the information systems discipline? This study uses latent semantic analysis to examine a large body of published IS research in order to address this question. Specifically, the abstracts of all research papers over the time period from 1985 through 2006 published in three top IS research journals-MIS Quarterly, Information Systems Research, and Journal of Management Information Systems-were analyzed. This analysis identified five core research areas: (1) information technology and organizations; (2) IS development; (3) IT and individuals; (4) IT and markets; and (5) IT and groups. Over the time frame of our analysis, these core topics have remained quite stable. However, the specific research themes within each core area have evolved significantly, reflecting research that has focused less on technology development and more on the social context in which information technologies are designed and used. As such, this analysis demonstrates that the information systems academic discipline has maintained a relatively stable research identity that focuses on how IT systems are developed and how individuals, groups, organizations, and markets interact with IT.

528 citations



Journal ArticleDOI
TL;DR: A psychological contract perspective on the use of the open source development model as a global sourcing strategy-opensourcing, as it is called here-whereby commercial companies and open source communities collaborate on development of software of commercial interest to the company is presented.
Abstract: This paper presents a psychological contract perspective on the use of the open source development model as a global sourcing strategy-opensourcing, as we term it here-whereby commercial companies and open source communities collaborate on development of software of commercial interest to the company. Building on previous research on information systems outsourcing, a theoretical framework for exploring the opensourcing phenomenon is derived. The first phase of the research concerned qualitative case studies involving three commercial organizations (IONA Technologies, Philips Medical Systems, and Telefonica) that had "liberated" what had hitherto been proprietary software and sought to grow a global open source community around their product. We followed this with a large-scale survey involving additional exemplars of the phenomenon. The study identifies a number of symmetrical and complementary customer and community obligations that are associated with opensourcing success. We also identify a number of tension points on which customer and community perceptions tend to vary. Overall the key watchwords for opensourcing are openness, trust, tact, professionalism, transparency, and complementariness: The customer and community need to establish a trusted partnership of shared responsibility in building an overall opensourcing ecosystem. The study reveals an ongoing shift from OSS as a community of individual developers to OSS as a community of commercial organizations, primarily small to medium-sized enterprises. It also reveals that opensourcing provides ample opportunity for companies to headhunt top developers, hence moving from outsourcing to a largely unknown OSS workforce toward recruitment of developers from a global open source community whose talents have become known as a result of the opensourcing experience.

459 citations


Journal ArticleDOI
TL;DR: This paper presents an actionable, systematic approach to evaluating, establishing, and further improving research relevance, based on the analyses of three dimensions of relevance that are critical to practitioners' attempts to internalize IS research findings (importance, accessibility, and suitability).
Abstract: This paper takes a first step in aiding researchers to improve the relevance of their research to practice. By proposing that Information Systems researchers conduct applicability checks with practitioners on the research objects (for example, theories, models, frameworks, processes, technical artifacts, or other theoretically based IS artifacts) they either produce or use in theory-focused research, our paper presents an actionable, systematic approach to evaluating, establishing, and further improving research relevance. Furthermore, because it is an approach that can be conducted as an additional step either at the beginning or the end of the traditional research life cycle, it leaves untouched the rigorous methods used to conduct the study, that is, it does not compromise traditional research models. The approach we propose is based on the analyses of three dimensions of relevance that are critical to practitioners' attempts to internalize IS research findings (importance, accessibility, and suitability), and a comprehensive set of solutions that can be used to address them. Our analysis reveals that the most critical dimension for practice is the importance of the research to the needs of practice. The solution we propose to address that need is to conduct an applicability check on the research objects of interest. The applicability check forms an integral part of the research process, either prior to or following engagement in a typical research process. We present principles and criteria for the conduct and evaluation of an applicability check, which is primarily based on the focus group method, and secondarily on a modified nominal group technique.

435 citations


Journal ArticleDOI
TL;DR: In this article, a case study of a large financial services firm, which sourced a variety of high-end IT work to its wholly owned subsidiaries ("captive centers") and to third party vendors in multiple global locations (in particular, to India and Russia), is presented.
Abstract: Increasingly, firms source more complex and strategic as well as harder to codify information technology projects to low-cost offshore locations. Completing such projects successfully requires close collaboration among all participants. Yet, achieving such collaboration is extremely difficult because of the complexity of the context: multiple and overlapping boundaries associated with diverse organizational and national contexts separate the participants. These boundaries also lead to a pronounced imbalance of resources among onshore and offshore contributors giving rise to status differences and inhibiting collaboration. This research adopts a practice perspective to investigate how differences in country and organizational contexts give rise to boundaries and associated status differences in offshore application development projects and how these boundaries and status differences can be renegotiated in practice to establish effective collaboration. To illustrate and refine the theory, a qualitative case study of a large financial services firm, which sourced a variety of high-end IT work to its wholly owned subsidiaries ("captive centers") and to third party vendors in multiple global locations (in particular, to India and Russia), is presented. Using a grounded theory approach, the paper finds that differences in country contexts gave rise to a number of boundaries that inhibited collaboration effectiveness, while differences in organizational contexts were largely mediated through organizational practices that treated vendor centers and captive units similarly. It also shows that some key onshore managers were able to alleviate status differences and facilitate effective collaboration across diverse country contexts by drawing on their position and resources. Implications are drawn for the theory and practice of global software development and multiparty collaboration.

Journal ArticleDOI
TL;DR: The conclusion is that merely focusing on the technical soundness of the IS and the way in which it benefits employees may not be sufficient, rather, the input requirements of users for achieving the corresponding needs fulfillments also need to be examined.
Abstract: End user satisfaction (EUS) is critical to successful information systems implementation. Many EUS studies in the past have attempted to identify the antecedents of EUS, yet most of the relationships found have been criticized for their lack of a strong theoretical underpinning. Today it is generally understood that IS failure is due to psychological and organizational issues rather than technological issues, hence individual differences must be addressed. This study proposes a new model with an objective to extend our understanding of the antecedents of EUS by incorporating three well-founded theories of motivation, namely expectation theory, needs theory, and equity theory. The uniqueness of the model not only recognizes the three different needs (i.e., work performance, relatedness, and self-development) that users may have with IS use, but also the corresponding inputs required from each individual to achieve those needs fulfillments, which have been ignored in most previous studies. This input/needs fulfillment ratio, referred to as equitable needs fulfillment, is likely to vary from one individual to another and satisfaction will only result in a user if the needs being fulfilled are perceived as "worthy" to obtain. The partial least squares (PLS) method of structural equation modeling was used to analyze 922 survey returns collected form the hotel and airline sectors. The results of the study show that IS end users do have different needs. Equitable work performance fulfillment and equitable relatedness fulfillment play a significant role in affecting the satisfaction of end users. The results also indicate that the impact of perceived IS performance expectations on EUS is not as significant as most previous studies have suggested. The conclusion is that merely focusing on the technical soundness of the IS and the way in which it benefits employees may not be sufficient. Rather, the input requirements of users for achieving the corresponding needs fulfillments also need to be examined.

Journal ArticleDOI
TL;DR: In this paper, a case study of a geographically distributed information systems development project at one of India's largest offshore vendors is presented, where the authors show that knowledge and experience asymmetries, and requirements and task characteristics (such as complexity, instability, ambiguity, and novelty) prompt onsite and offshore team members to engage in acts of sensegiving, sensedemanding, and sensebreaking.
Abstract: Achieving shared, common, or mutual understandings among geographically dispersed workers is a central concern in the distributed work literature. Nonetheless, little is known yet about the socio-cognitive acts and communication processes involved with synchronizing and cocreating understandings in such settings. Building on a case study of a geographically distributed information systems development project at one of India's largest offshore vendors, we postulate that knowledge and experience asymmetries, and requirements and task characteristics (such as complexity, instability, ambiguity, and novelty) prompt onsite and offshore team members to engage in acts of sensegiving, sensedemanding, and sensebreaking. This allows them to make sense of their tasks and their environment, and it increases the likelihood that congruent and actionable understandings emerge. Furthermore, it assists them in cocreating novel understandings, especially when acts of sensegiving and sensedemanding are complemented with instances of sensebreaking. Our results contribute to the literature by explaining how distributed team members mitigate problems of understanding, transfer preexisting understandings, and cocreate novel understandings. Acts of sensegiving, sensedemanding, and sensebreaking allow distributed team members to jointly explore and generate value, thereby amplifying the performance of distributed workers.

Journal ArticleDOI
TL;DR: The variation of IT Governance archetypes suggests that even when top management approval is required, the IT department may not play a key role in the IT investment decision process and that the allocation of final decision rights is only a part of IT governance.
Abstract: This study identifies governance patterns for information technology investment decision processes and explores the impact of organizations' investment characteristics, external environment, and internal context on the shaping of those patterns. By identifying the lead actors of the initiation, development, and approval stages in IT governance, the patterns of 57 IT investment decisions at 6 hospitals are analyzed. The results reveal seven IT governance archetypes: (1) top management monarchy, (2) top management-IT duopoly, (3) IT monarchy, (4) administration monarchy, (5) administration- IT duopoly, (6) professional monarchy, and (7) professional- IT duopoly. Each archetype is analyzed by taking into account four specific factors: IT investment level, external influence, organizational centralization, and IT function power. This study makes several contributions to IT governance theory and practice. First, IT governance is reframed to include pre-decision stages, highlighting the importance of participants other than the final decision maker. Second, the variation of IT governance archetypes suggests that even when top management approval is required, the IT department may not play a key role in the IT investment decision process. Third, governance of the pre-decision initiation and development stages is found to be jointly affected by several contextual factors, suggesting that the allocation of final decision rights is only a part of IT governance. While decision rights may be allocated by the organization a priori, the actual patterns of IT governance are contingent on contextual factors. It is important to understand how IT governance archetypes are shaped because they may affect desired outcomes of IT investments.

Journal ArticleDOI
TL;DR: It is argued that it is important to examine consumers' intent to adopt electronic channels, not as a monolithic decision, but as a choice they make at each of four stages in the purchase process: requirements determination, vendor selection, purchase, and after-sales service.
Abstract: The Internet has the potential to fundamentally change the structure of marketing channels, but only if consumers choose to adopt electronic channels. Thus, this paper aims to develop a more nuanced understanding of consumer channel choices. Specifically, it contends that it is important to examine consumers' intent to adopt electronic channels, not as a monolithic decision, but as a choice they make at each of four stages in the purchase process: requirements determination, vendor selection, purchase, and after-sales service. Innovation diffusion theory suggests that consumers make adoption decisions based on their perceptions of the relative advantage of the innovation. The relative advantage of electronic channels is conceptualized as a multidimensional construct involving a cumulative assessment of the perceived relative merits of channels on three dimensions: convenience, trust, and efficacy of information acquisition. Combining the multidimensional nature of relative advantage with the multistage purchase process, the central assertion, and intended contribution, of this paper is to show that the relative advantage of electronic channels, and the influence of each dimension of relative advantage on the adoption of electronic channels, will vary across the different stages of the purchase process. Survey data were collected from faculty and staff at a large university about their intention to use the web for auto insurance transactions. The results provide support for the multidimensional nature of relative advantage, although the emergent factors do not align neatly with the hypothesized dimensions (convenience, trust, and efficacy of information acquisition) or stages. Results of the study support three conclusions. First, the dimensions along which consumers assess relative advantage blend hypothesized dimensions such as trust and convenience with stages of the purchase process. Second, consumers consider the relative advantage of channels at two distinct stages of the purchase process: gathering information and executing the transaction. Third, different dimensions of relative advantage are critical in predicting consumer channel choice at each stage.

Journal ArticleDOI
TL;DR: A general method for constructing a design theory nexus is developed and its utility is illustrated using two field studies that develops and applies an organizational change nexus and a user involvement nexus.
Abstract: Managers frequently face ill-structured or "wicked" problems. Such problems are characterized by a large degree of uncertainty with respect to how the problem should be approached and how to establish and evaluate the set of alternative solutions. A design theory nexus is a set of constructs and methods that enable the construction of models that connect numerous design theories with alternative solutions. It thereby offers a unique problem-solving approach that is particularly useful for addressing ill-structured or wicked problems. For each alternative solution in a design theory nexus one or more unique criteria are established to formulate a specific design theory. We develop a general method for constructing a design theory nexus and illustrate its utility using two field studies. One develops and applies an organizational change nexus. The other develops and applies a user involvement nexus. Each is a specific instantiation of the general design theory nexus constructs. Using these illustrations, we provide examples of how to evaluate


Journal ArticleDOI
TL;DR: In this article, the authors studied a firm that sent engineering tasks from home sites in Mexico and the United States to an offshore site in India and found that despite having proper formal education and ample tool skills, the Indian engineers had difficulty interpreting the implicit knowledge embodied in artifacts sent to them from Mexico and United States.
Abstract: Studies have shown the knowledge transfer problems that arise when communication and storage technologies are employed to accomplish work across time and space. Much less is known about knowledge transfer problems associated with transformational technologies, which afford the creation, modification, and manipulation of digital artifacts. Yet, these technologies play a critical role in offshoring by allowing the distribution of work at the task level, what we call task-based offshoring. For example, computer-aided engineering applications transform input like physical dimensions, location coordinates, and material properties into computational models that can be shared electronically among engineers around the world as they work together on analysis tasks. Digital artifacts created via transformational technologies often embody implicit knowledge that must be correctly interpreted to successfully act upon the artifacts. To explore what problems might arise in interpreting this implicit knowledge across time and space, and how individuals might remedy these problems, we studied a firm that sent engineering tasks from home sites in Mexico and the United States to an offshore site in India. Despite having proper formal education and ample tool skills, the Indian engineers had difficulty interpreting the implicit knowledge embodied in artifacts sent to them from Mexico and the United States. To resolve and prevent the problems that subsequently arose, individuals from the home sites developed five new work practices to transfer occupational knowledge to the offshore site. The five practices were defining requirements, monitoring progress, fixing returns, routing tasks strategically, and filtering quality. The extent to which sending engineers in our study were free from having to enact these new work practices because on-site coordinators acted on their behalf predicted their perceptions of the effectiveness of the offshoring arrangement, but Indian engineers preferred learning from sending engineers, not on-site coordinators. Our study contributes to theories of knowledge transfer and has practical implications for managing task-based offshoring arrangements.

Journal ArticleDOI
TL;DR: In this article, the mediating role of decision process variables in the use of online customer DSS is examined through an experimental study of an alternative-based and an attribute-based DSS for product customization by online customers.
Abstract: In the decision support systems literature, most studies have concentrated on the direct effects of DSS use and design on decision outcomes and user performance in the workplace. Fewer DSS studies have integrated decision process variables, such as user beliefs and attitudes, in their models. In this paper, we examine the mediating role of decision process variables in the use of an online customer DSS. We do so through an experimental study of an alternative-based and an attribute-based DSS for product customization by online customers. Using cognitive fit and flow theories, we develop a theoretical model with four mediating decision process variables (perceived usefulness, perceived ease of use, perceived enjoyment, and perceived control) and two of their antecedents: interface design (attribute-based versus alternative-based) and task complexity (choice set size). Our results show that the impact of DSS interface design on behavioral intentions is fully mediated by perceived usefulness and perceived enjoyment, although not by perceived control. Specifically, we verify that users of an attribute-based DSS express higher perceived usefulness and perceived enjoyment than users of an alternative-based one. In addition, we find that task complexity has an interesting relationship with usefulness and enjoyment, both of which follow an inverted U-shaped curve as choice set size increases. Finally, we find that for users of the alternative-based DSS, perceived ease of use and perceived control decrease as task complexity increases. However, the attribute-based DSS alleviates that decline for both variables. Among other contributions, our results indicate the importance of including decision process variables when studying DSS as well as the complex effect of task complexity on those variables. Our study also provides some important guidelines for online companies that provide customer DSS on their websites, especially the danger of providing too many product choice options that can overwhelm customers and harm their shopping experience.

Journal ArticleDOI
TL;DR: An online programming marketplace is examined and it is found that this profound tilt to low-wage nations is overstated, and the strongest determinant of the winning bid is client loyalty.
Abstract: In a world that is flat, where all clients and providers can easily transact with one another, offshoring represents the proposition that information technology providers from low-wage nations can now underbid providers from high-wage nations and win contracts. We examined a particularly flat "world"-an online programming marketplace-and found that this profound tilt to low-wage nations is overstated. We analyzed the entire history of transactions at one of the major online programming marketplaces, a marketplace for outsourcing small IT projects. The data spanned 38 months and included over 263,000 bids by over 31,000 providers from 70 countries on over 20,000 small IT projects requested by over 7,900 clients from 59 countries. Contrary to the world-is-flat proposition, the data in this particular site show some client preference for domestic providers. However, the largest group of clients, the American clients, are a marked exception to clients in the rest of the world: they give relatively less preference to domestic providers. In a sense, the American clients have a higher preference for offshore providers. Among non-American clients the preference for domestic providers is mitigated when both client and provider are from an English-speaking nation. Relative bid price, often very low already, also determines the winning bid, as does the ratio of purchasing power parity (PPP) between the country of the client and the country of the provider. Nonetheless, the strongest determinant of the winning bid is client loyalty: the client gives very strong preference to a provider with whom there has been a previous relationship, regardless of whether the provider is offshore or domestic.

Journal ArticleDOI
TL;DR: A new set of constructs and methodologies are defined upon which an IT ecosystem model is developed to provide a formal problem representation structure for the analysis of information technology development trends and to reduce the complexity of the IT landscape for practitioners making IT investment decisions.
Abstract: A major problem for firms making information technology investment decisions is predicting and understanding the effects of future technological developments on the value of present technologies. Failure to adequately address this problem can result in wasted organization resources in acquiring, developing, managing, and training employees in the use of technologies that are short-lived and fail to produce adequate return on investment. The sheer number of available technologies and the complex set of relationships among them make IT landscape analysis extremely challenging. Most IT-consuming firms rely on third parties and suppliers for strategic recommendations on IT investments, which can lead to biased and generic advice. We address this problem by defining a new set of constructs and methodologies upon which we develop an IT ecosystem model. The objective of these artifacts is to provide a formal problem representation structure for the analysis of information technology development trends and to reduce the complexity of the IT landscape for practitioners making IT investment decisions. We adopt a process theory perspective and use a combination of visual mapping and quantification strategies to develop our artifacts and a state diagram-based technique to represent evolutionary transitions over time. We illustrate our approach using two exemplars: digital music technologies and wireless networking technologies. We evaluate the utility of our approach by conducting in-depth interviews with IT industry experts and demonstrate the contribution of our approach relative to existing techniques for technology forecasting.

Journal ArticleDOI
TL;DR: The contribution of the study is to show that the premium on business familiarity and the trust it implies is not in directly affecting price, but, rather, in changing how the relationship is managed toward a tendency to sign time and materials contracts.
Abstract: This study examines the role of business familiarity in determining how software development outsourcing projects are managed and priced to address risks. Increased business familiarity suggests both more prior knowledge, and hence reduced adverse selection risk, and increased implied trust about future behavior, and hence implied reduced moral hazard risk. Preferring high business familiarity partners may also alleviate concerns about incomplete contracts. By reducing these risks, higher business familiarity is hypothesized to be associated with higher priced projects, reduced penalties, and an increased tendency to contract on a time and materials rather than a fixed price basis. These hypotheses were examined with objective contractual legal data from contracts made by a leading international bank. Integrating trust theory into agency theory and into incomplete contract theory and examining unique contract data, the contribution of the study is to show that the premium on business familiarity and the trust it implies is not in directly affecting price, but, rather, in changing how the relationship is managed toward a tendency to sign time and materials contracts. Implications about integrating trust into agency theory and incomplete contract theory, as well as implications regarding trust premiums and software development outsourcing, are discussed.


Journal ArticleDOI
TL;DR: The results revealed that the CyberGate system and its underlying design framework can dramatically improve CMC text analysis capabilities over those provided by existing systems.
Abstract: Content analysis of computer-mediated communication (CMC) is important for evaluating the effectiveness of electronic communication in various organizational settings. CMC text analysis relies on systems capable of providing suitable navigation and knowledge discovery functionalities. However, existing CMC systems focus on structural features, with little support for features derived from message text. This deficiency is attributable to the informational richness and representational complexities associated with CMC text. In order to address this shortcoming, we propose a design framework for CMC text analysis systems. Grounded in systemic functional linguistic theory, the proposed framework advocates the development of systems capable of representing the rich array of information types inherent in CMC text. It also provides guidelines regarding the choice of features, feature selection, and visualization techniques that CMC text analysis systems should employ. The CyberGate system was developed as an instantiation of the design framework. CyberGate incorporates a rich feature set and complementary feature selection and visualization methods, including the writeprints and ink blots techniques. An application example was used to illustrate the system's ability to discern important patterns in CMC text. Furthermore, results from numerous experiments conducted in comparison with benchmark methods confirmed the viability of CyberGate's features and techniques. The results revealed that the CyberGate system and its underlying design framework can dramatically improve CMC text analysis capabilities over those provided by existing systems.

Journal ArticleDOI
TL;DR: Using this conceptualization, the paper synthesizes what is known about the role of culture in IS initiatives, and proposes a model of the relationships between culture, the development and use processes, and an information system.
Abstract: Culture plays an increasingly important role in information systems initiatives, and it receives considerable attention from researchers who have studied a variety of aspects of its role in IS initiatives. Notwithstanding the contributions of research to date, our knowledge of how culture influences-and is influenced by-the development and use processes and an information system itself remains fragmented. Knowledge fragmentation is amplified by the fact that conceptualizations of culture differ among researchers. Indeed, most researchers agree that culture consists of patterns of meaning underlying a variety of manifestations. Researchers diverge, however, on the degree of consensus on these interpretations that they assume to be reached within a collective. In order to integrate these divergent conceptualizations of culture, we adopt the view that no single perspective is sufficient to capture the complexity of interplay between culture, the processes of developing and using an IS, and the IS itself. We have, therefore, adopted a conceptualization that views culture from three perspectives-integration, differentiation, and fragmentation-that come into play simultaneously and jointly. Using this conceptualization, the paper synthesizes what is known about the role of culture in IS initiatives, and proposes a model of the relationships between culture, the development and use processes, and an information system.

Journal ArticleDOI
TL;DR: The findings suggest that increasing the quality of an auction business's e-image does increase consumers' willingness to transact with the business, and increases prices received at auction.
Abstract: Businesses can choose who they want to be online. Product and company attributes that are directly perceivable in the real world can be manipulated to make a favorable impression on online buyers. This study examines whether creating a more professional online e-image can signal consumers about unobservable product or company quality, and whether this signal influences their willingness to transact with the company, and ultimately the prices they are willing to pay for the company's goods and services. An empirical study is presented that examines two online auction businesses utilizing different company names and auction listing styles to sell items in parallel over the course of one year. The findings suggest that increasing the quality of an auction business's e-image does increase consumers' willingness to transact with the business, and increases prices received at auction. The study also demonstrates the ability to use eBay as an experimental laboratory for testing a variety of hypotheses about purchasing behavior online.

Journal ArticleDOI
TL;DR: In the special issue of MIS Quarterly as discussed by the authors, the authors bring together a set of high quality papers that will describe the state of IS offshore outsourcing practice, provide a select sample of research findings, and sug gest potential future research in this domain.
Abstract: well. The new realities of outsourcing and offshoring present information systems executives with legal, cultural, and managerial challenges that are not yet fully understood and educators with questions concerning appropriate curricula for the new environment. Because, there is little empirical research published in scholarly IS journals about the offshore outsourcing of information system activities and its impact on education and practice, the intent of the editors for this special issue of MIS Quarterlyis to bring together a set of high quality papers that will (1) describe the state of IS offshore outsourcing practice, (2) provide a select sample of research findings, and (3) sug gest potential future research in this domain.

Journal ArticleDOI
TL;DR: The results indicate emotional dissonance predicts work exhaustion better than do perceived workload, role conflict, or role ambiguity, constructs which have long been associated with work exhaustion.
Abstract: The information technology professional is regularly expected to work with colleagues in both IT and other areas of the organization. During these interactions, the IT employee is expected to conform to occupational or organizational norms regarding the display of emotion. How do these display norms affect the IT professional? This study examines an IT professional's emotional dissonance, the conflict between norms of emotional display and an employee's felt emotion. Emotional dissonance is studied as a factor of IT professionals' work exhaustion, job satisfaction, and turnover intention, modeled as an extension to the work of Moore (2000a). The results indicate emotional dissonance predicts work exhaustion better than do perceived workload, role conflict, or role ambiguity, constructs which have long been associated with work exhaustion. Job satisfaction is influenced directly by role ambiguity and work exhaustion. In turn, job satisfaction influences employee turnover intention. We discuss implications of these findings for both IT management and future research.

Journal ArticleDOI
TL;DR: An economic learning model is presented that helps to formalize the complex relationships among an offshoring firm's knowledge levels, production costs, and coordination costs and may help guide firms as they consider the impacts of offshore contracts and knowledge management investments on firm knowledge, production Costs, and Coordination costs.
Abstract: In this paper, we present an economic learning model that helps to formalize the complex relationships among an offshoring firm's knowledge levels, production costs, and coordination costs Specifically, we model a domestic firm's use of a selective offshore strategy (ie, offshoring only a portion of its information technology activities) to exploit, through IT investments or contractual provisions, the foreign vendor's large, scale-driven repository of production knowledge We illustrate the conditions under which knowledge transfers during offshoring may reduce a domestic firm's in-house production costs, leading to total cost savings in both the short term and the long term Alternatively, when knowledge transfers are not sufficiently large, some short-lived offshoring projects may generate substantial cost savings to the domestic firm; however, long-lived offshoring projects may cause a disruption in the knowledge supply chain, resulting in substantial losses in the later stages of the project A firm that fails to realize the costs associated with such a disruption soon enough in the project life may find itself locked into a disadvantageous offshoring agreement without any recourse However, a domestic firm may be able to overcome a disruption in its knowledge supply chain by exploiting the learning-by-doing production knowledge generated by the foreign vendor's economies of scale The managerial implications derived from our learning model may help guide firms as they consider the impacts of offshore contracts and knowledge management investments on firm knowledge, production costs, and coordination costs

Journal ArticleDOI
TL;DR: The use of a semantic differential scale, which is referred to as a fast form, to assess the constructs of TAM, confirms that the constructs that are measured by the fast form are psychometrically equivalent to those that are measures by the Likert scales, providing strong evidence for nomological validity.
Abstract: Nearly all prior studies on the technology acceptance model (TAM) have used Likert scales to measure the model's constructs, but the use of only this type of scale has two shortcomings. One is that such use prevents us from exposing the model's constructs to a robust test of their measure and relationships to each other, termed their nomological validity. The other is that such use leaves us unsure about whether or not we have selected an efficient way, in terms of survey completion time, to assess these constructs. Past researchers have used short form scales to address the issue of efficiency, but there are problems that may result from such efforts. In this study, we address both shortcomings by exploring the use of a semantic differential scale, which we refer to as a fast form, to assess the constructs of TAM. In this regard, we do three things. First, we describe how fast form as a scale may be developed. Second, we conduct a psychometric evaluation of the constructs that are measured by the fast form and examine their relationships. Third, we assess the efficiency of the fast form by comparing the time required to complete a survey with it to that which is required to complete a survey with Likert scales. Our results confirm that the constructs that are measured by the fast form are psychometrically equivalent to those that are measured by the Likert scales. The relationship among these constructs was unchanged, providing strong evidence for nomological validity. The fast form also yielded a 40 percent reduction in the survey completion time, proving its superior efficiency. We conclude with a description of the implications of these results for research and practice.