AN EMPIRICAL COMPARISON OF FOUR TEXT MINING METHODS
Sangno Lee Jaeki Song Yongjin Kim
Abstract: The amount of textual data that is available for researchers and businesses to analyze is increasing at a dramatic rate. This reality has led IS researchers to investigate various text mining techniques. This essay examines four text mining methods that are frequently used in order to identify their characteristics and limitations. The four methods that we examine are (1) latent semantic analysis, (2) probabilistic latent semantic analysis, (3) latent Dirichlet allocation, and (4) correlated topic model. We review these four methods and compare them with topic detection and spam filtering to reveal their peculiarity. Our paper sheds light on the theory that underlies text mining methods and provides guidance for researchers who seek to apply these methods.
Keywords: Text Mining, Vector Space Model, Latent Semantic Analysis, Probabilistic Latent Semantic Analysis, Latent Dirichlet Allocation, Correlated Topic Model
TOWARDS INNOVATIVE DESIGN RESEARCH IN INFORMATION SYSTEMS
Shouhong Wang Hai Wang
Abstract: Design research has recently received considerable attention in the IS community. The existing IS design research frameworks assume that IT is a part of the environment of IS research. This assumption overlooks the interrelationships between IS research and IT innovation. This paper analyzes the proactive role of design research in IS in the perspective of IT innovation. It suggests that design theories in IS need to emphasize more on the alignment of design research in IS and IT innovation. Three recent design research exemplars in the IS research literature (two from The Journal of Computer Information Systems, and one from Industrial Management & Data Systems) are used to explain this component of design research in IS.
Keywords: Design Research in Information Systems, Design Theory in Information Systems, Design Research Guidelines, IT Innovation
PROJECT RISK DIFFERENCES BETWEEN VIRTUAL AND CO-LOCATED TEAMS
April Reed Linda Knight
Abstract: Although software development projects increasingly incorporate virtual team members, most research performed on project risk to date was conducted on projects using traditional co-located teams incorporating face-to-face communications. This paper identifies a set of risk factors particularly important to virtual teams but rarely discussed. Results, from a survey of over 150 Information Technology (IT) practitioners, are based on actual project experiences. Out of fifty-five risk factors included in the survey, seven factors showed significant differences in effect on the successful completion of projects based on project environment. Notably, the results showed a significantly greater impact for all seven risk factors in virtual software development environments, when compared to development using traditional face-to-face teams. This increased risk is termed the Magnifier Effect. Anticipating the Magnifier Effect can allow practitioners who are managing projects in a virtual environment to anticipate and mitigate the added risks of using virtual software development teams.
Keywords: IT Project Management, Virtual Teams, Risk Management
Dion Goh Rebecca Ang Chei Lee Chu Lee
Abstract: The increasing popularity of mobile devices presents an opportunity for developing innovative mobile tourism services for tourism-related organizations. While there is much research on mobile tourism applications and on tourist needs and behavior, there is comparatively less work on studying the types of services they desire. The present study aims to determine mobile services that are important from the tourists’ perspective using a factor analytic approach. This was first done via a survey of the literature and confirmed by a focus group. The set of candidate tourism services was then translated into a questionnaire for determining their appropriateness for mobile tourism. Thereafter, exploratory and confirmatory factor analytic procedures were performed. Our findings show that tourists appear to favor basic services such as those providing information about transportation, accommodation and food, while advanced ones such as context-aware services and trip planning were deemed comparatively less desirable. Practical and theoretical implications of our findings are also discussed.
Keywords: Mobile Tourism Services, Exploratory And Confirmatory Factor Analysis, Requirements Elicitation, Systems Design And Implementation
Jordan Shropshire Merrill Warkentin Allen Johnston
Abstract: This article examines the impact of negative message framing on security technology adoption. Based on previous studies, it was hypothesized that negatively-framed messages would have a greater effect on the adoption of security technologies which detect system abuse than on technologies for prevention. To test this hypothesis, two security technologies were selected: one to represent preventative technologies and one to represent detective technologies. Undergraduate business students at a major southeastern university were first introduced to both security technologies, then exposed to negatively-framed messages and asked to complete a survey regarding their attitudes and intentions toward adopting each. In line with previous studies, it was determined that negatively-framed messages are better suited for detection technologies than for prevention technologies, and that IS managers should become more sensitive to the manner in which new security technologies are introduced and to the factors that help shape adoption intentions.
Keywords: Information Security, Message Framing, Technology Adoption, Persuasion, Detection, Prevention
Y. Yuen Paul Yeow Nena Lim Najib Saylani
Abstract: The research examines and compares crucial factors affecting consumer acceptance of Internet banking services (IBS) in two groups of culturally different countries i.e. the developed (the United States and Australia) and developing (Malaysia) countries. To date, no prior research considers cultural differences in studying IBS adoption of these countries although IBS is a global service. The research model is based on UTAUT model with two additional factors. A questionnaire was distributed to 766 respondents from the three countries. Results reveal that for both the developed and developing countries, attitude toward using IBS is the most important factor followed by performance expectancy. Due to cultural differences between the developed and developing countries (e.g. uncertainty avoidance, individualism, and power distance), perceived credibility of IBS is relevant only in the developed countries. This research helps banks promote their service globally. It also enhances UTAUT model.
Keywords: Internet Banking Service, UTAUT Model, Hofstede’s Cultural Factors, User Acceptance, Developed and Developing Countries
Han Li Rathindra Sarathy Heng Xu
Abstract: The effect of situational factors is largely ignored by current studies on information privacy. This paper theorized and empirically tested how an individual’s decision-making on information disclosure is driven by competing situational benefits and risk factors. The results of this study indicate that, in the context of an e-commerce transaction with an unfamiliar vendor, information disclosure is the result of competing influences of exchange benefits and two types of privacy beliefs (privacy protection belief and privacy risk belief). In addition, the effect of monetary rewards is dependent upon the fairness of information exchange. Monetary rewards could undermine information disclosure when information collected has low relevance to the purpose of the e-commerce transaction.
Keywords: Privacy Belief, Information Disclosure, Exchange Benefits, Fairness of Information Exchange
June Wei Joshua Howell
Abstract: The existing research showed approaches that support and enhance information system in commercial banking remain fuzzy concerning the fulfilled information technology level. This paper proposed to build an electronic strategy analysis model for commercial banking business based on the strategic value chain analysis, in order to accelerate information technology adoption for commercial banking business. Specifically, first, it developed a Commercial Banking Electronic Strategy model to demonstrate how information technology supports the commercial banking business. Second, the developed model was decomposed to derive seventy-eight implementable items in commercial banking electronic business. Third, the current pattern of information technology adoption in the twenty dominant U.S. commercial banking companies was analyzed to get a structured picture of the research in the domain. The pattern analysis across electronic business items classified the derived seventy-eight items into three categories. The pattern analysis across banks classified these twenty dominant banks into four groups based on multivariate cluster analysis. The study concludes that the electronic strategy model based electronic business solutions are crucial to accelerate the information technology adoption in commercial banking; and thereby, enhancing banking security and reducing risks involved in financial crisis. Recommendations and implications were also discussed.
Keywords: Electronic Strategy Model, Value Chain Management, Commercial Banking, Electronic Business
Justin Bond Chetan Sankar Qiang Le
Abstract: This study reports on a controlled experiment using undergraduate African American students at one of the United States’ Historically Black Colleges and Universities (HBCU). Information technology rich multimedia instructional materials were implemented in an attempt to increase the level of perceived leadership skills in the classroom. A comparison was conducted to examine the various attitudes and perceptions of minority students using multimedia case studies versus traditional teaching methods. The results suggest that the use of multimedia case studies in minority classrooms has the potential to improve perceived leadership skills more so than traditional teaching methods. It is important to note, however, that the social, cultural, and psychological nuances associated with individual ethnic groups are extremely complex and possibly beyond the scope of this research.
Keywords: Computer Aided Learning, Engineering Education, Multimedia Systems, Information Technology
Terry Smith Alex Koohang Robert Behling
Abstract: The purpose of this study was to identify the perceived relative importance of the technology issues among managers. A survey instrument that described 10 technology management issues was administered to IT managers of various organizations. The survey also included an open-ended question asking the respondents to describe what they saw as the three greatest challenges to effectively managing information technology. Data privacy, data management, meeting legal requirements and protecting systems from hackers were identified as very important by the IT managers. Less than one-half of the managers deemed employee penetration and staff training as very important IT management issues. Respondents’ answers to the open-ended questions indicating major challenges yielded into three separate categories: shrinking IT budgets; need for enhanced security; and data management with regulatory requirements. Discussion and recommendations are made based on the study findings.
Keywords: Technology Issues, Technology Challenges, Managing Technology, Business, Organization
Abstract: This paper discusses factors affecting the buy-it-now (BIN) market behavior in online auctions. The study includes performing a probit analysis — using a collected data set to find out how the independent variables affect the BIN behavior. Three most critical factors, starting price, BIN price and seller’s reputation, were identified by the probit model for studying whether a BIN option was used or not. Then, the study uses a factorial design to identify impacts of important factors. The key findings are that the BIN price plays an important role in affecting the final price formation (47.6%) and a seller’s reputation is critical to affect the performance of the bid duration (74.9%). These observations can help the predictions of the final price formation and bid duration in the future and further improve the efficiency of the BIN institution. Sellers should use an attractable BIN price to increase their revenue rate and keep an excellent reputation to reduce the bid duration. Since the starting price has only minor effects, the seller needs not to put much effort on that and the so-called “one dollar auction” seems to be a good idea.
Keywords: Buy-it-Now, Performance, Online Auctions, Probit Analysis, Bid Arrival Modeling, Factorial Design Experiment, Electronic Commerce
Nancy Hite Barbara Railsback
Abstract: The development of customer-centered websites is a difficult but essential component of many organizations’ overall management information systems. Specifically, the study examined the content and characteristics of the web home pages and admissions-related web pages of a sample of institutions listed in the U.S. News & World Report List of Best Colleges & Universities to help web developers create customer-centric sites and to help web design educators teach students to create such sites. Overall, the content of the text and the images was user-centered. Three design principles were followed on over 90% of the websites: consistency of font styles as well as text and background colors, fast loading time, and hyperlinks placed in the two places users view first. Accessibility by the visually impaired may be difficult as numerous websites used images and bullets as hyperlinks and did not have high contrast between text and background colors.
Keywords: Websites, Content Analysis, Web Design, User-Interface
Sangjae Lee Hyuncul Ahn
Abstract: A control framework for successful business-to-consumer information systems (B2CIS) implementation was developed based on IS controls and implementation studies. Our research model suggests that top management support, system compatibility, IS infrastructure, IS expertise, and perceived importance of IS security affect four control modes: controls for system continuity, access controls, communication controls and informal controls. Furthermore, it posits that B2CIS controls affect B2CIS implementation, which has three dimensions: volume, sophistication, and information contents. Empirical tests indicated that IS infrastructure and perceived importance of IS security affect the usage of four modes of B2CIS controls, while system compatibility affects the usage of all these control modes except communication controls. The controls for system continuity are the most important controls for B2CIS implementation. This study provides insights into the adequacy of security measures undertaken under specific organizational circumstances for systems implementation.
Keywords: Business-To-Consumer Information Systems (B2CIS), Organizational Contexts, Controls, Implementation of B2CIS