1
|
Mady A, Gupta S, Warkentin M. The effects of knowledge mechanisms on employees' information security threat construal. INFORMATION SYSTEMS JOURNAL 2023. [DOI: 10.1111/isj.12424] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/11/2023]
Affiliation(s)
- Ashraf Mady
- University of North Georgia Dahlonega Georgia USA
| | | | | |
Collapse
|
2
|
Darban M. Explore to Learn. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2022. [DOI: 10.1145/3533692.3533697] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
Abstract
Explorative information systems behaviors are the ways in which individuals actively revise their usage and discover creative means of applying the system, extending the potentials of the system, and enhancing task performance. This study has developed a specific concept of explorative system behavior-explorative information technology (IT) learning-to describe users' post-training learning behavior-novel use. Adapting a herding lens, we study the individual and team-level triggers of explorative learning cognitions. The study tests the proposed cross-level model and collects data from 225 individuals who are divided into 51 teams. The results indicate that individuals tend to innovatively use a system through developed exploration cognitions in team settings as a response to examined herd behavior triggers. The study uncovered that members of cohesive teams and learners with high uncertainty perceptions are more likely to imitate the observed explorative learning behaviors of their peers and reproduce such behaviors in the long term.
Collapse
Affiliation(s)
- Mehdi Darban
- Louisiana State University - Shreveport, Shreveport, LA, USA
| |
Collapse
|
3
|
Mullins JK, Cronan TP. Enterprise systems knowledge, beliefs, and attitude: A model of informed technology acceptance. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2021. [DOI: 10.1016/j.ijinfomgt.2021.102348] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
4
|
Bridging the Digital Divide for Older Adults via Observational Training: Effects of Model Identity from a Generational Perspective. SUSTAINABILITY 2020. [DOI: 10.3390/su12114555] [Citation(s) in RCA: 16] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/28/2022]
Abstract
The proliferation of technology offers potential solutions for enhancing the well-being of older adults. However, older adults often have low digital literacy and are disengaged from the digital world. With age-appropriate training, older adults are expected to acquire a wide range of technological skills and bridge the digital divide. Through the lens of social cognitive theory, this study aims to investigate the effectiveness of observational training through behavior modeling in enhancing technology acceptance in older adults. The moderating effects of model identity on training outcomes from a generational perspective are examined. An empirical training experiment was completed with 59 community-dwelling older adults. Training outcomes were measured using cognitive knowledge, affective variables, and meta-cognition. The results ascertain the effectiveness of observational training in improving their technological knowledge, self-efficacy, outcome expectations, and sense of social connectedness when using technologies. From a generational perspective, the older adult behavior model is more effective than the young or child behavior models in increasing self-efficacy and willingness to use technology. The model identity further enhances the positive outcomes of training. The results of this study contribute to designing educational interventions to bridge the digital divide.
Collapse
|
5
|
Gupta S, Bostrom RP. A Revision of Computer Self-Efficacy Conceptualizations in Information Systems. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2019. [DOI: 10.1145/3330472.3330478] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]
Abstract
Computer self-efficacy is one of the more important constructs in information systems (IS) research. Over the years, IS researchers have debated about its multifaceted nature. Yet, despite, extensive debate, we contend that for information systems, the conceptualization of various self-efficacy dimensions is incomplete. The primary dimension currently focused on is the specificity of the technology. This has resulted in two types of self-efficacy being investigated: computer self-efficacy and specific computer self-efficacy. However, the task being performed with technology has received limited attention in information systems self-efficacy research and discussions. We argue that there are four distinct types of computer self-efficacy constructs that are derived from combining the dimensions of specificity of information technology (specific/general) and task type (simple/complex) into a 2x2 model. Using data gathered from a quasi-experimental study, we illustrate how these constructs are not only theoretically different but also have a distinct measurement item set. Implications for expanding self-efficacy research are discussed at the end.
Collapse
|
6
|
Gallivan MJ. Author Highlights for the Past 35 Years. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2019. [DOI: 10.1145/3312576.3312586] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
Abstract
This essay reviews leading contributions to The DATA BASE for Advances in Information Systems over the past 35 years, both in terms of identifying leading scholars who published most frequently in the journal as well as papers that have been cited most frequently. Using standard scientometric methods, I identify the leading authors who published five or more papers since 1982. In terms of analyzing highly cited papers, I organize the analysis into four time periods of nine years each, a structure that reveals that The DATA BASE has been a longstanding venue for IS scholars to introduce their early work - whether conceptual or empirical. Notably, several esteemed IS scholars published early conceptual versions of their ideas in The DATA BASE - often many years before they followed up with related work in other journals. In terms of highly cited papers, the analysis in this essay also reveals that The DATA BASE shifted toward publishing empirical papers after 1990 and, despite the prevalence of positivist, quantitative research during the past 25 years, qualitative research has also become prominent in the journal. More recently, the journal has also featured several literature review papers on important topic areas, such as virtual teams, technostress, IT outsourcing, and IT security. This essay reviews leading contributions to The DATA BASE for Advances in Information Systems over the past 35 years, both in terms of identifying leading scholars who published most frequently in the journal as well as papers that have been cited most frequently. Using standard scientometric methods, I identify the leading authors who published five or more papers since 1982. In terms of analyzing highly cited papers, I organize the analysis into four time periods of nine years each, a structure that reveals that The DATA BASE has been a longstanding venue for IS scholars to introduce their early work - whether conceptual or empirical. Notably, several esteemed IS scholars published early conceptual versions of their ideas in The DATA BASE - often many years before they followed up with related work in other journals. In terms of highly cited papers, the analysis in this essay also reveals that The DATA BASE shifted toward publishing empirical papers after 1990 and, despite the prevalence of positivist, quantitative research during the past 25 years, qualitative research has also become prominent in the journal. More recently, the journal has also featured several literature review papers on important topic areas, such as virtual teams, technostress, IT outsourcing, and IT security.
Collapse
|
7
|
Söllner M, Bitzer P, Janson A, Leimeister JM. Process is King: Evaluating the Performance of Technology-mediated Learning in Vocational Software Training. JOURNAL OF INFORMATION TECHNOLOGY 2018. [DOI: 10.1057/s41265-017-0046-6] [Citation(s) in RCA: 19] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
Abstract
Technology-mediated learning (TML) is a major trend in education, since it allows to integrate the strengths of traditional- and IT-based learning activities. However, TML providers still struggle in identifying areas for improvement in their TML offerings. One reason for their struggles is inconsistencies in the literature regarding drivers of TML performance. Prior research suggests that these inconsistencies in TML literature might stem from neglecting the importance of considering the process perspective in addition to the input and outcome perspectives. This gap needs to be addressed to better understand the different drivers of the performance of TML scenarios. Filling this gap would further support TML providers with more precise guidance on how to (re-)design their offerings toward their customers’ needs. To achieve our goal, we combine qualitative and quantitative methods to develop and evaluate a holistic model for assessing TML performance. In particular, we consolidate the body of literature, followed by a focus group workshop and a Q-sorting exercise with TML practitioners, and an empirical pre-study to develop and initially test our research model. Afterward, we collect data from 161 participants of TML vocational software trainings and evaluate our holistic model for assessing TML performance. The results provide empirical evidence for the importance of the TML process quality dimension as suggested in prior literature and highlighted by our TML practitioners. Our main theoretical as well as practical contribution is a holistic model that provides comprehensive insights into which constructs and facets shape the performance of TML in vocational software trainings.
Collapse
Affiliation(s)
- Matthias Söllner
- Institute of Information Management,
University of St. Gallen, Müller-Friedberg-Strasse 8, 9000 St. Gallen, Switzerland
- Information Systems, Research Center for IS
Design (ITeG), Information Systems, University of Kassel, Pfannkuchstr. 1, Kassel 34121,
Germany
| | - Philipp Bitzer
- Information Systems, Research Center for IS
Design (ITeG), Information Systems, University of Kassel, Pfannkuchstr. 1, Kassel 34121,
Germany
| | - Andreas Janson
- Information Systems, Research Center for IS
Design (ITeG), Information Systems, University of Kassel, Pfannkuchstr. 1, Kassel 34121,
Germany
| | - Jan Marco Leimeister
- Institute of Information Management,
University of St. Gallen, Müller-Friedberg-Strasse 8, 9000 St. Gallen, Switzerland
- Information Systems, Research Center for IS
Design (ITeG), Information Systems, University of Kassel, Pfannkuchstr. 1, Kassel 34121,
Germany
| |
Collapse
|
8
|
Santhanam R, Liu D, Shen WCM. Research Note—Gamification of Technology-Mediated Training: Not All Competitions Are the Same. INFORMATION SYSTEMS RESEARCH 2016. [DOI: 10.1287/isre.2016.0630] [Citation(s) in RCA: 100] [Impact Index Per Article: 12.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
|
9
|
Charland P, Léger PM, Cronan TP, Robert J. Developing and Assessing Erp Competencies: Basic and Complex Knowledge. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2015. [DOI: 10.1080/08874417.2015.11645798] [Citation(s) in RCA: 8] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
|
10
|
Bitzer P, Söllner M, Leimeister JM. Design Principles for High-Performance Blended Learning Services Delivery. BUSINESS & INFORMATION SYSTEMS ENGINEERING 2015. [DOI: 10.1007/s12599-015-0403-3] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
|
11
|
Léger PM, Davis FD, Cronan TP, Perret J. Neurophysiological correlates of cognitive absorption in an enactive training context. COMPUTERS IN HUMAN BEHAVIOR 2014. [DOI: 10.1016/j.chb.2014.02.011] [Citation(s) in RCA: 24] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
|
12
|
Abstract
Advances in technology-mediated learning (TML) have created opportunities to personalize learning, based on the assumption that individual differences affect one's ability to learn. However, cumulative research on individual differences is equivocal, and largely excludes the learning process. The authors argue that without a model that incorporates the process of learning, the authors cannot empirically assess how individual differences influence learning outcomes. This study first models the learning process in terms of two sub-processes: process appropriation and content assimilation. Second, it partially tests the model within a technology-mediated learning (TML) environment used to provide end-user IT training. The results support the efficacy of individual differences' influence on learning outcomes, while shedding light on how this effect occurs. Individual differences affect the appropriation of TML supplied structures, which in turn impacts learning outcomes. The research method used in the study is a laboratory experiment. Data was analyzed using SEM.
Collapse
Affiliation(s)
- Saurabh Gupta
- Department of Management, University of North Florida, Jacksonville, FL, USA
| | - Rob Anson
- College of Business and Economics, Boise State University, Boise, ID, USA
| |
Collapse
|
13
|
Gupta S, Bostrom R. Research Note—An Investigation of the Appropriation of Technology-Mediated Training Methods Incorporating Enactive and Collaborative Learning. INFORMATION SYSTEMS RESEARCH 2013. [DOI: 10.1287/isre.1120.0433] [Citation(s) in RCA: 55] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
|
14
|
Hardin AM, Looney CA, Fuller MA. Self-efficacy, learning method appropriation and software skills acquisition in learner-controlled CSSTS environments. INFORMATION SYSTEMS JOURNAL 2013. [DOI: 10.1111/isj.12016] [Citation(s) in RCA: 14] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
|
15
|
Current World Literature. Curr Opin Anaesthesiol 2012; 25:111-20. [DOI: 10.1097/aco.0b013e32834fd93c] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/14/2022]
|
16
|
Current World Literature. Curr Opin Anaesthesiol 2011; 24:705-12. [DOI: 10.1097/aco.0b013e32834e25f9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
|